HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Business Data Communications, 6/e,is ideal for use in Business Data Communications, Data Communications, and introductory Networking for Business courses. Business Data Communications, 6/e,covers the fundamentals of data communications, networking, distributed applications, and network management and security. Stallings presents these concepts in a way that relates specifically to the business environment and the concerns of business management and staff, structuring his text around requirements, ingredients, and applications. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications. Throughout the text, references to the interactive, online animations supply a powerful tool in understanding complex protocol mechanisms. The Sixth Edition maintains Stallings' superlative support for either a research projects or modeling projects component in the course. The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
Preface Chapter 0 Introduction
0.1 Outline of This Book
0.2 Topic Ordering
0.3 Internet and Web Resources
0.4 Useful Publications
Chapter 1 Introduction1.1 Information and Communication
1.2 Data Communications and Networking for Today's Enterprise
1.3 Convergence and Unified Communications
1.4 The Nature of Business Information Requirements
1.5 Distributed Data Processing
1.6 The Internet and Distributed Applications
1.7 Networks
1.8 The Transmission of Information
1.9 Management Issues
1.10 Standards
1.11 Recommended Web Sites
1.12 Key Terms and Review Questions
Appendix 1A Prefixes for Numerical Units
PART ONE REQUIREMENTS Chapter 2 Business Information2.1 Audio
2.2 Data
2.3 Image
2.4 Video
2.5 Performance Measures
Application Note: File Sizes
2.6 Summary
2.7 Recommended Reading and Web Sites
2.8 Key Terms, Review Questions, and Problems
Chapter 3 Distributed Data Processing3.1 Centralized Versus Distributed Processing
3.2 Forms of Distributed Data Processing
3.3 Distributed Data
3.4 Networking Implications of DDP
Application Note: Distributed Computing Support
3.5 Summary
3.6 Recommended Reading
3.7 Key Terms, Review Questions, and Problems
Case Study I MasterCard International PART TWO THE INTERNET AND DISTRIBUTED APPLICATIONS Chapter 4 Internet History and Architecture4.1 Internet History
4.2 Internet Architecture
4.3 Internet Domains
Application Note: Fitting DNS into your organizational structure
4.4 Summary
4.5 Recommended Reading
4.6 Key Terms, Review Questions, and Problems
Chapter 5 TCP/IP and OSI5.1 A Simple Protocol Architecture
5.2 The TCP/IP Protocol Architecture
5.3 Internetworking
5.4 The OSI Protocol Architecture
5.5 Virtual Private Networks and IP Security
Application Note: Practical Guide to Networking
5.6 Summary
5.7 Recommended Reading and Web Sites
5.8 Key Terms, Review Questions, and Problems
Appendix 5A TCP and IP Details
Appendix 5B The Trivial File Transfer Protocol
Case Study II Florida Department of Management Services - Part One Chapter 6 Client/Server and Intranet Computing6.1 The Growth of Client/Server Computing
6.2 Client/Server Applications
6.3 Middleware
6.4 Intranets
6.5 Extranets
6.6 Service Oriented Architecture
Application Note: To Be Fat or Thin — That is the Question
6.6 Summary
6.7 Recommended Reading and Web Sites
6.8 Key Terms, Review Questions, and Problems
Chapter 7 Internet-Based Applications7.1 Electronic Mail and SMTP
7.2 Web Access and HTTP
7.3 Web Security
7.4 Internet Telephony and SIP
Application Note: To Serve or Not to Serve?
7.5 Summary
7.6 Recommended Reading and Web Sites
7.7 Key Terms, Review Questions, and Problems
Case Study III ING Life Chapter 8 Internet Operation8.1 Internet Addressing
8.2 Internet Routing Protocols
8.3 The Need for Speed and Quality of Service
8.4 Differentiated Services
8.5 Service Level Agreements
8.6 IP Performance Metrics
Application Note: Where Does My Network Address Come From?
8.7 Summary
8.8 Recommended Reading and Web Sites
8.9 Key Terms, Review Questions, and Problems
PART THREE LOCAL AREA NETWORKS Chapter 9 LAN Architecture and Protocols9.1 Background
9.2 LAN Configurations
9.3 Guided Transmission Media
9.4 LAN Protocol Architecture
Application Note: Cabling Infrastructure
9.5 Summary
9.6 Recommended Reading and Web Sites
9.7 Key Terms, Review Questions, and Problems
Appendix 9A Decibels and Signal Strength
Chapter 10 Ethernet and Fibre Channel10.1 The Emergence of High-Speed LANs
10.2 Traditional Ethernet
10.3 Bridges, Hubs, and Switches
10.4 High-Speed Ethernet
Application Note: Networking with Ethernet
10.5 Summary
10.6 Recommended Reading and Web Sites
10.7 Key Terms, Review Questions, and Problems
Case Study IV Carlson Companies Chapter 11 Wireless LANs11.1 Overview
11.2 Wi-Fi Architecture and Services
11.3 IEEE 802.11 MAC and Physical Layer Standards
11.4 IEEE 802.11 Security
Application Note: Deploying Wireless LANs
11.5 Summary
11.6 Recommended Reading and Web Sites
11.7 Key Terms, Review Questions, and Problems
Case Study V St. Luke's Episcopal Hospital PART FOUR WIDE AREA NETWORKS Chapter 12 Circuit Switching and Packet Switching12.1 Switching Techniques
12.2 Circuit Switching Networks
12.3 Packet Switching Networks
12.4 Traditional Wide Area Network Alternatives
Application Note: Switching
12.5 Summary
12.6 Recommended Reading and Web Sites
12.7 Key Terms, Review Questions, and Problems
Chapter 13 Frame Relay and ATM13.1 Wide Area Networking Alternatives
13.2 Frame Relay
13.3 Asynchronous Transfer Mode (ATM)
Application Note: Off-site Connectivity Solutions
13.4 Summary
13.5 Recommended Reading and Web Sites
13.6 Key Terms, Review Questions, and Problems
Case Study VI Florida Department of Management Services - Part Two Case Study VII Guardian Life Insurance Chapter 14 Wireless WANs14.1 Cellular Wireless Networks
14.2 Multiple Access
14.3 Third-Generation Wireless Communications
14.4 Satellite Communications
Application Note: PDAs, Cell Phones, and Laptops
14.5 Summary
14.6 Recommended Reading and Web Sites
14.7 Key Terms, Review Questions, and Problems
Case Study VIII Choice Hotels International PART FIVE DATA COMMUNICATIONS Chapter 15 Data Transmission15.1 Signals for Conveying Information
15.2 Transmission Impairments and Channel Capacity
Application Note: PDAs, Cell Phones, and Laptops
15.3 Summary
15.4 Recommended Reading and Web Sites
15.5 Key Terms, Review Questions, and Problems
Chapter 16 Data Communication Fundamentals16.1 Analog and Digital Data Communication
16.2 Data Encoding Techniques
16.3 Asynchronous and Synchronous Transmission
16.4 Error Detection
Application Note: Devices, Encoding, Communication Parameters and Protocols
16.5 Summary
16.6 Recommended Reading and Web Sites
16.7 Key Terms, Review Questions, and Problems
Chapter 17 Data Link Control and Multiplexing17.1 Flow Control and Error Control
17.2 High-Level Data Link Control
17.3 Motivation for Multiplexing
17.4 Frequency-Division Multiplexing
17.5 Synchronous Time-Division Multiplexing
Application Note: Changing Communications
17.6 Summary
17.7 Recommended Reading and Web Sites
17.8 Key Terms, Review Questions, and Problems
Case Study IX Haukeland University Hospital PART SIX MANAGEMENT ISSUES Chapter 18 Computer and Network Security Threats18.1 Computer Security Concepts
18.2 Threats, Attacks, and Assets
18.3 Intruders
18.4 Malicious Software Overview
18.5 Viruses, Worms, and Bots
18.6 Recommended Reading and Web Sites
18.7 Key Terms, Review Questions, and Problems
Chapter 19 Computer and Network Security Techniques19.1 Virtual Private Networks and IPSec
19.2 SSL and TLS
19.3 Wi-Fi Protected Access
19.4 Intrusion Detection
19.5 Malware Defense
19.6 Recommended Reading
19.7 Key Terms, Review Questions, and Problems
Case Study X The Hacker in All of Us Chapter 20 Network Management (ONLINE)20.1 Network Management Requirements
20.2 Network Management Systems
20.3 Technical Control
20.4 Performance Monitoring
20.5 Simple Network Management Protocol (SNMP)
20.6 Summary
20.7 Recommended Reading and Web Sites
20.8 Key Terms, Review Questions, and Problems
Chapter 21 Network Planning and Design (ONLINE)21.1 The Project Environment – The Big Picture
21.2 Planning
21.3 Design Techniques
21.4 Some Capacity Planning and Network Design Tools
21.5 Recommended Reading
21.6 Key Terms, Review Questions, and Problems
Appendix 21A Some Simple Design Algorithms
Appendix 21B Selling Books Online – A Case Study
Appendix A Business Data Communications ProjectsA.1 Animation Projects
A.2 Practical Exercises
A.3 Ethereal Projects
A.4 Research Projects
A.5 Reading/Report Assignments
A.6 Writing Assignments
Glossary References Index ONLINE APPENDICES William Stallings.com/BDC/BDC6e.html Appendix B Standards OrganizationsB.1 The Importance of Standards
B.2 Standards and Regulation
B.3 Standards-Setting Organizations
Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)C.1 Uniform Resource Locator
C.2 Uniform Resource Identifier
C.3 To Learn More
Appendix D The International Reference Alphabet Appendix E The TCP/IP ChecksumE.1 Ones-Complement Addition
E.2 Use in TCP and IP
Appendix F IBM's System Network Architecture (SNA)F.1 Network Architecture
F.2 Advanced Program-to-Program Communication
F.3 Protocol Architecture
Appendix G Fibre ChannelAppendix H Bluetooth
Appendix I Multipath Interference and Orthogonal Frequency Division Multiplexing (OFDM)
Appendix J Cryptographic AlgorithmsJ.1 Symmetric Encryption
J.2 Public-Key Cryptography
J.3 Secure Hash Functions