Additional Information
Book Details
Abstract
Business Data Communications and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.
The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.
Table of Contents
| Section Title | Page | Action | Price |
|---|---|---|---|
| Cover | Cover | ||
| Contents | 5 | ||
| Online Resources | 12 | ||
| Preface | 13 | ||
| About the Authors | 20 | ||
| Chapter 0 Reader’s and Instructor’s Guide | 21 | ||
| 0.1 Outline of This Book | 22 | ||
| 0.2 Topic Ordering | 22 | ||
| 0.3 Internet and Web Resources | 23 | ||
| 0.4 Useful Publications | 24 | ||
| Chapter 1 Introduction | 26 | ||
| 1.1 Information and Communication | 27 | ||
| 1.2 Data Communications and Networking for Today’s Enterprise | 28 | ||
| 1.3 Convergence and Unified Communications | 32 | ||
| 1.4 The Nature of Business Information Requirements | 39 | ||
| 1.5 The Transmission of Information | 41 | ||
| 1.6 Distributed Data Processing | 42 | ||
| 1.7 The Internet and Distributed Applications | 43 | ||
| 1.8 Networks | 45 | ||
| 1.9 Management Issues | 51 | ||
| 1.10 Standards | 53 | ||
| 1.11 Key Terms, Review Questions, and Problems | 54 | ||
| Appendix 1A Prefixes for Numerical Units | 55 | ||
| PART ONE: REQUIREMENTS | 57 | ||
| Chapter 2 Business Information | 57 | ||
| 2.1 Audio | 59 | ||
| 2.2 Data | 62 | ||
| 2.3 Image | 65 | ||
| 2.4 Video | 70 | ||
| 2.5 Performance Measures | 73 | ||
| Application Note: File Sizes | 80 | ||
| 2.6 Summary | 81 | ||
| 2.7 Key Terms, Review Questions, and Problems | 81 | ||
| Chapter 3 Distributed Data Processing | 85 | ||
| 3.1 Centralized Versus Distributed Processing | 87 | ||
| 3.2 Forms of Distributed Data Processing | 102 | ||
| 3.3 Distributed Data | 105 | ||
| 3.4 Networking Implications of DDP | 111 | ||
| 3.5 Big Data Infrastructure Considerations | 113 | ||
| Application Note: Distributed Computing Support | 115 | ||
| 3.6 Summary | 116 | ||
| 3.7 Key Terms, Review Questions, and Problems | 117 | ||
| PART TWO: DATA COMMUNICATIONS | 121 | ||
| Chapter 4 Data Transmission | 121 | ||
| 4.1 Signals for Conveying Information | 122 | ||
| 4.2 Transmission Impairments and Channel Capacity | 133 | ||
| Application Note: Analog Signals | 140 | ||
| 4.3 Summary | 142 | ||
| 4.4 Key Terms, Review Questions, and Problems | 142 | ||
| Chapter 5 Data Communication Fundamentals | 144 | ||
| 5.1 Analog and Digital Data Communications | 145 | ||
| 5.2 Data Encoding Techniques | 149 | ||
| 5.3 Asynchronous and Synchronous Transmission | 161 | ||
| 5.4 Error Detection | 165 | ||
| Application Note: Devices, Encoding, Communication Parameters, and Protocols | 168 | ||
| 5.5 Summary | 169 | ||
| 5.6 Key Terms, Review Questions, and Problems | 170 | ||
| Chapter 6 Data Link Control and Multiplexing | 173 | ||
| 6.1 Flow Control and Error Control | 175 | ||
| 6.2 Motivation for Multiplexing | 177 | ||
| 6.3 Frequency-Division Multiplexing | 178 | ||
| 6.4 Synchronous Time-Division Multiplexing | 185 | ||
| Application Note: Changing Communications | 192 | ||
| 6.5 Summary | 193 | ||
| 6.6 Key Terms, Review Questions, and Problems | 194 | ||
| Appendix 6A: High Level Data Link Control Protocol | 196 | ||
| PART THREE: THE INTERNET AND DISTRIBUTED APPLICATIONS | 202 | ||
| Chapter 7 The Internet | 202 | ||
| 7.1 The Structure of the Internet | 203 | ||
| 7.2 Internet Domains | 213 | ||
| 7.3 Dynamic Host Configuration Protocol | 219 | ||
| Application Note: Fitting DNS into Your Organizational Structure | 222 | ||
| 7.4 Summary | 223 | ||
| 7.5 Key Terms, Review Questions, and Problems | 224 | ||
| Chapter 8 TCP/IP | 226 | ||
| 8.1 A Simple Protocol Architecture | 228 | ||
| 8.2 The TCP/IP Architecture | 235 | ||
| 8.3 Internetworking | 242 | ||
| 8.4 Virtual Private Networks and IP Security | 246 | ||
| Application Note: Practical Guide to Networking | 250 | ||
| 8.5 Summary | 251 | ||
| 8.6 Key Terms, Review Questions, and Problems | 252 | ||
| Appendix 8A: TCP, UDP, and IP Details | 255 | ||
| Appendix 8B: The Trivial File Transfer Protocol | 259 | ||
| Chapter 9 Client/Server, Intranet, and Cloud Computing | 264 | ||
| 9.1 The Growth of Client/Server Computing | 265 | ||
| 9.2 Client/Server Applications | 268 | ||
| 9.3 Middleware | 274 | ||
| 9.4 Intranets | 282 | ||
| 9.5 Extranets | 286 | ||
| 9.6 Service-Oriented Architecture | 287 | ||
| 9.7 Cloud Computing | 290 | ||
| Application Note: To Be Fat or Thin—That Is the Question | 296 | ||
| 9.8 Summary | 298 | ||
| 9.9 Key Terms, Review Questions, and Problems | 299 | ||
| Chapter 10 Internet-Based Applications | 301 | ||
| 10.1 Electronic Mail | 302 | ||
| 10.2 Web Access and HTTP | 312 | ||
| 10.3 Web Security | 318 | ||
| 10.4 Multimedia Applications | 320 | ||
| 10.5 Acceptable Use Policies | 323 | ||
| Application Note: To Serve or Not to Serve | 326 | ||
| 10.6 Summary | 327 | ||
| 10.7 Key Terms, Review Questions, and Problems | 328 | ||
| Chapter 11 Internet Operation | 330 | ||
| 11.1 Internet Addressing | 331 | ||
| 11.2 Internet Routing Protocols | 336 | ||
| 11.3 Multicasting | 341 | ||
| 11.4 Quality of Service | 344 | ||
| 11.5 Differentiated Services | 348 | ||
| 11.6 Service Level Agreements | 352 | ||
| 11.7 IP Performance Metrics | 354 | ||
| Application Note: Where Does My Network Address Come From? | 356 | ||
| 11.8 Summary | 357 | ||
| 11.9 Key Terms, Review Questions, and Problems | 358 | ||
| PART FOUR: LOCAL AREA NETWORKS | 360 | ||
| Chapter 12 LAN Architecture and Infrastructure | 360 | ||
| 12.1 Background | 361 | ||
| 12.2 LAN Configuration | 366 | ||
| 12.3 Guided Transmission Media | 369 | ||
| 12.4 LAN Protocol Architecture | 378 | ||
| Application Note: Cabling Infrastructure | 383 | ||
| 12.5 Summary | 385 | ||
| 12.6 Key Terms, Review Questions, and Problems | 385 | ||
| Appendix 12A: Decibels and Signal Strength | 387 | ||
| Chapter 13 Ethernet, Switches, and Virtual LANs | 390 | ||
| 13.1 Traditional Ethernet | 391 | ||
| 13.2 Bridges, Hubs, and Switches | 397 | ||
| 13.3 High-Speed Ethernet | 404 | ||
| 13.4 Virtual LANs | 411 | ||
| 13.5 Power over Ethernet | 416 | ||
| Application Note: Networking with Ethernet | 418 | ||
| 13.6 Summary | 419 | ||
| 13.7 Key Terms, Review Questions, and Problems | 420 | ||
| Chapter 14 Wireless LANs | 422 | ||
| 14.1 Overview | 423 | ||
| 14.2 Wi-Fi Architecture and Services | 426 | ||
| 14.3 IEEE 802.11 MAC and Physical Layer Standards | 431 | ||
| 14.4 Gigabit WLANs | 437 | ||
| 14.5 IEEE 802.11 Security Considerations | 438 | ||
| Application Note: Deploying WLANs | 439 | ||
| 14.6 Summary | 441 | ||
| 14.7 Key Terms, Review Questions, and Problems | 441 | ||
| PART FIVE: WIDE AREA NETWORKS | 443 | ||
| Chapter 15 WAN Technology and Protocols | 443 | ||
| 15.1 Switching Techniques | 444 | ||
| 15.2 Circuit-Switching Networks | 446 | ||
| 15.3 Packet-Switching Networks | 451 | ||
| 15.4 Traditional Wide Area Network Alternatives | 456 | ||
| 15.5 Voice Over IP | 460 | ||
| 15.6 Presence | 465 | ||
| 15.7 Summary | 467 | ||
| 15.8 Key Terms, Review Questions, and Problems | 468 | ||
| Chapter 16 WAN Services | 470 | ||
| 16.1 Wide Area Networking Alternatives | 472 | ||
| 16.2 Frame Relay | 476 | ||
| 16.3 Asynchronous Transfer Mode (ATM) | 483 | ||
| 16.4 Multiprotocol Label Switching (MPLS) | 490 | ||
| 16.5 Wide Area Ethernet | 493 | ||
| Application Note: Off-Site Connectivity Solutions | 495 | ||
| 16.6 Summary | 496 | ||
| 16.7 Key Terms, Review Questions, and Problems | 497 | ||
| Chapter 17 Wireless WANs | 499 | ||
| 17.1 Cellular Wireless Network | 501 | ||
| 17.2 Multiple Access | 508 | ||
| 17.3 Third-Generation Wireless Communication | 511 | ||
| 17.4 Fourth-Generation Wireless Communication | 516 | ||
| 17.5 Satellite Communications | 519 | ||
| Application Note: Laptops, Netbooks, PDAs, and Cell Phones | 525 | ||
| 17.6 Summary | 527 | ||
| 17.7 Key Terms, Review Questions, and Problems | 527 | ||
| PART SIX: MANAGEMENT ISSUES | 530 | ||
| Chapter 18 Computer and Network Security Threats | 530 | ||
| 18.1 Computer Security Concepts | 531 | ||
| 18.2 Threats, Attacks, and Assets | 533 | ||
| 18.3 Intruders | 538 | ||
| 18.4 Malicious Software Overview | 542 | ||
| 18.5 Viruses, Worms, Bots, and Spam | 546 | ||
| 18.6 Keyloggers, Phishing, Spyware | 556 | ||
| 18.7 Computer Security Trends | 558 | ||
| 18.8 Summary | 560 | ||
| 18.9 Key Terms, Review Questions, and Problems | 560 | ||
| Chapter 19 Computer and Network Security Techniques | 564 | ||
| 19.1 Virtual Private Networks and IPsec | 565 | ||
| 19.2 SSL and TLS | 568 | ||
| 19.3 Wi-Fi Protected Access | 570 | ||
| 19.4 Intrusion Detection | 573 | ||
| 19.5 Firewalls | 576 | ||
| 19.6 Malware Defense | 581 | ||
| Application Note: Security Layers | 583 | ||
| 19.7 Summary | 585 | ||
| 19.8 Key Terms, Review Questions, and Problems | 586 | ||
| Appendix A: Projects for Teaching Business Data Communications | 589 | ||
| A.1 Animations and Animation Projects | 590 | ||
| A.2 Practical Exercises | 591 | ||
| A.3 Wireshark Projects | 592 | ||
| A.4 Research Projects | 592 | ||
| A.5 Security Case Studies | 593 | ||
| A.6 Reading/Report Assignments | 593 | ||
| A.7 Writing Assignments | 593 | ||
| Glossary | 594 | ||
| A | 594 | ||
| B | 594 | ||
| C | 594 | ||
| D | 595 | ||
| E | 596 | ||
| F | 596 | ||
| G | 597 | ||
| H | 597 | ||
| I | 597 | ||
| L | 597 | ||
| M | 597 | ||
| N | 598 | ||
| O | 598 | ||
| P | 598 | ||
| Q | 599 | ||
| R | 599 | ||
| S | 599 | ||
| T | 600 | ||
| U | 600 | ||
| V | 600 | ||
| W | 600 | ||
| References | 601 | ||
| Index | 604 | ||
| A | 604 | ||
| B | 604 | ||
| C | 605 | ||
| D | 606 | ||
| E | 607 | ||
| F | 608 | ||
| G | 609 | ||
| H | 609 | ||
| I | 609 | ||
| J | 611 | ||
| K | 611 | ||
| L | 611 | ||
| M | 612 | ||
| N | 613 | ||
| O | 613 | ||
| P | 613 | ||
| Q | 614 | ||
| R | 614 | ||
| S | 615 | ||
| T | 616 | ||
| U | 617 | ||
| V | 618 | ||
| W | 618 | ||
| X | 619 |