Features
- Flexible organization. The ordering of topics is presented with a top-down approach, with the early part of the book dealing with applications and upper-level protocols. However, the book is designed to support a bottom-up approach as well.
- Detailed examination of client/server computing and service oriented architecture. Provides students with information about how these vital topics for corporate data communication work, allowing them to understand their functions and the approach for organizing enterprise systems.
- Detailed discussion of all networking technologies, including LANs and WANs. Students can compare and evaluate competing approaches and thus understand each better. Wireless networks and quality of service are especially important topics.
- Solid coverage of the TCP/IP set of protocols. Students are given the foundation and context for understanding the protocols and standards that form the foundation for all data networking.
- Extensive use of real-world case studies. Shows students how companies have dealt with the real issues, problems, and opportunities presented by communications and network technology.
- Numerous questions, homework problems, and worked-out examples. Offers students a chance to apply and test their knowledge.
- Tables and figures. Helps students clarify concepts to aid in comprehension.
- Suggested readings, key word lists, and recommended Web Sites conclude each chapter, and encourage students to further explore topics of interest. Seven online appendices provide supplemental material for students.
- Companion Website¿Access textbook-related resources and support materials for students and instructors maintained by the author.
- Student Resource Site¿ http://williamstallings.com/BusinessDataComm/ ¿contains the following resources
- Online Chapters
- Online Appendices
- Useful Documents
- Practice Problems (homework problems with solutions)
- Useful Websites
- General Sites
- The Instructor Resource Website, http://williamstallings.com/BusinessDataComm, contains the following resources:
- Student Resources link: Useful links and documents for students.
- Instructor Resources link: Useful links and documents for instructors
- Instructor Resource Center: This password-protected web site includes:
- Solutions Manual: Solutions to end-of-chapter Review Questions and Problems.
- Projects Manual: Suggested project assignments for 6 different types of assignment, written especially for this book.
- Animation Assignments
- Practical Exercises
- Ethereal Projects
- Research Projects
- Reading/Report Assignments
- Writing Assignments
- PowerPoint Slides: A set of slides covering all chapters, suitable for use in lecturing.
- Testbank
- PDF files: Reproductions of all figures and tables from the book
- Sample Syllabi
- Copyright 2013
- Dimensions: 7" x 9-1/8"
- Pages: 624
- Edition: 7th
-
Book
- ISBN-10: 0-13-302389-3
- ISBN-13: 978-0-13-302389-3
For Business Data Communications, Data Communications, and introductory Networking for Business courses. T he content is also appropriate for the Introduction to Networking course in a MBA program.
Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.
The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.
Table of Contents
Table of Contents
- Chapter 0 Reader's and Instructor's Guide
- 0.1 Outline of This Book
- 0.2 Topic Ordering
- 0.3 Internet and Web Resources
- 0.4 Useful Publications
- Chapter 1 Introduction
- 1.1 Information and Communication
- 1.2 Data Communications and Networking for Today's Enterprise
- 1.3 Convergence and Unified Communications
- 1.4 The Nature of Business Information Requirements
- 1.5 The Transmission of Information
- 1.6 Distributed Data Processing
- 1.7 The Internet and Distributed Applications
- 1.8 Networks
- 1.9 Management Issues
- 1.10 Standards
- 1.11 Key Terms, Review Questions, and Problems
- Appendix 1A Prefixes for Numerical Units
- Case Study I Unified Communications at Boeing (ONLINE)
PART ONE REQUIREMENTS
- Chapter 2 Business Information
- 2.1 Audio
- 2.2 Data
- 2.3 Image
- 2.4 Video
- 2.5 Performance Measures
- Application Note: File Sizes
- 2.6 Summary
- 2.7 Key Terms, Review Questions, and Problems
- Case Study II CORE Credit Union (ONLINE)
- Chapter 3 Distributed Data Processing
- 3.1 Centralized Versus Distributed Processing
- 3.2 Forms of Distributed Data Processing
- 3.3 Distributed Data
- 3.4 Networking Implications of DDP
- 3.5 Big Data Infrastructure Considerations
- 3.6 Summary
- 3.7 Key Terms, Review Questions, and Problems
- Case Study III Managing Massive Data Warehouses at MasterCard International (ONLINE)
PART TWO DATA COMMUNICATIONS
- Chapter 4 Data Transmission
- 4.1 Signals for Conveying Information
- 4.2 Transmission Impairments and Channel Capacity
- Application Note: Analog Signals
- 4.3 Summary
- 4.4 Key Terms, Review Questions, and Problems
- Chapter 5 Data Communication Fundamentals
- 5.1 Analog and Digital Data Communications
- 5.2 Data Encoding Techniques
- 5.3 Asynchronous and Synchronous Transmission
- 5.4 Error Detection
- Application Note: Devices, Encoding, Communication Parameters and Protocols
- 5.5 Summary
- 5.6 Key Terms, Review Questions, and Problems
- Chapter 6 Data Link Control and Multiplexing
- 6.1 Flow Control and Error Control
- 6.2 Motivation for Multiplexing
- 6.3 Frequency-Division Multiplexing
- 6.4 Synchronous Time-Division Multiplexing
- Application Note: Changing Communications
- 6.5 Summary
- 6.6 Key Terms, Review Questions, and Problems
- Appendix 6A High-Level Data Link Control Protocol
- Case Study IV Broadband Access: Global and Local Issues (ONLINE)
PART THREE THE INTERNET AND DISTRIBUTED APPLICATIONS
- Chapter 7 The Internet
- 7.1 The Structure of the Internet
- 7.2 Internet Domains
- Application Note: Fitting DNS into your organizational structure
- 7.3 Dynamic Host Configuration Protocol
- 7.4 Summary
- 7.5 Key Terms, Review Questions, and Problems
- Case Study V Net Neutrality (ONLINE)
- Chapter 8 TCP/IP
- 8.1 A Simple Protocol Architecture
- 8.2 The TCP/IP Protocol Architecture
- 8.3 Internetworking
- 8.4 Virtual Private Networks and IP Security
- Application Note: Practical Guide to Networking
- 8.5 Summary
- 8.6 Key Terms, Review Questions, and Problems
- Appendix 8A TCP, UDP, and IP Details
- Appendix 8B The Trivial File Transfer Protocol
- Chapter 9 Client/Server, Intranet, and Cloud Computing
- 9.1 The Growth of Client/Server Computing
- 9.2 Client/Server Applications
- 9.3 Middleware
- 9.4 Intranets
- 9.5 Extranets
- 9.6 Service-Oriented Architecture
- Application Note: To Be Fat or Thin–That is the Question
- 9.7 Cloud Computing
- 9.8 Summary
- 9.9 Key Terms, Review Questions, and Problems
- Case Study VI Shifting Sands: Chevron’s Migration to the Cloud
- Chapter 10 Internet-Based Applications
- 10.1 Electronic Mail
- 10.2 Web Access and HTTP
- 10.3 Web Security
- 10.4 Multimedia Applications
- Application Note: To Serve or Not to Serve?
- 10.5 Acceptable Use Policiess
- 10.6 Summary
- 10.7 Key Terms, Review Questions, and Problems
- Case Study VII E-Business at Guardian Life (ONLINE)
- Chapter 11 Internet Operation
- 11.1 Internet Addressing
- 11.2 Internet Routing Protocols
- 11.3 Multicasting
- 11.4 Quality of Service
- 11.5 Differentiated Services
- 11.6 Service Level Agreements
- 11.7 IP Performance Metrics
- Application Note: Where Does My Network Address Come From?
- 11.8 Summary
- 11.9 Key Terms, Review Questions, and Problems
PART FOUR LOCAL AREA NETWORKS
- Chapter 12 LAN Architecture and Infrastructure
- 12.1 Background
- 12.2 LAN Configuration
- 12.3 Guided Transmission Media
- 12.4 LAN Protocol Architecture
- Application Note: Cabling Infrastructure
- 12.5 Summary
- 12.6 Key Terms, Review Questions, and Problems
- Appendix 12A Decibels and Signal Strength
- Case Study VIII Carlson Companies
- Chapter 13 Ethernet, Switches, and Virtual LANs
- 13.1 Traditional Ethernet
- 13.2 Bridges, Hubs, and Switches
- 13.3 High-Speed Ethernet
- Application Note: Networking with Ethernet
- 13.4 Virtual LANs
- 13.5 Power over Ethernet
- 13.6 Summary
- 13.7 Key Terms, Review Questions, and Problems
- Chapter 14 Wireless LANs
- 14.1 Overview
- 14.2 Wi-Fi Architecture and Services
- 14.3 IEEE 802.11 MAC and Physical Layer Standards
- 14.4 Gigibit WLANs
- 14.5 IEEE 802.11 Security Considerations
- Application Note: Deploying WLANs
- 14.6 Summary
- 14.7 Key Terms, Review Questions, and Problems
- Case Study IX St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery
PART FIVE WIDE AREA NETWORKS
- Chapter 15 WAN Technology and Protocols
- 15.1 Switching Techniques
- 15.2 Circuit-Switching Networks
- 15.3 Packet-Switching Networks
- 15.4 Traditional Wide Area Network Alternatives
- 15.5 Voice over IP
- 15.6 Presence
- 15.7 Summary
- 15.8 Key Terms, Review Questions, and Problems
- Chapter 16 WAN Services
- 16.1 Wide Area Networking Alternatives
- 16.2 Frame Relay
- 16.3 Asynchronous Transfer Mode (ATM)
- Application Note: Off-site Connectivity Solutions
- 16.4 Multiprotocol Label Switching (MPLS)
- 16.5 Wide Area Ethernet
- 16.6 Summary
- 16.7 Key Terms, Review Questions, and Problems
- Chapter 17 Wireless WANs
- 17.1 Cellular Wireless Networks
- 17.2 Multiple Access
- 17.3 Third-Generation Wireless Communication
- 17.4 Fourth-Generation Wireless Communciation
- 17.5 Satellite Communications
- Application Note: Laptops, Netbooks, PDAs, and Cell Phones
- 17.6 Summary
- 17.7 Key Terms, Review Questions, and Problems
- Case Study X Choice Hotels
PART SIX MANAGEMENT ISSUES
- Chapter 18 Computer and Network Security Threats
- 18.1 Computer Security Concepts
- 18.2 Threats, Attacks, and Assets
- 18.3 Intruders
- 18.4 Malicious Software Overview
- 18.5 Viruses, Worms, Bots, and Spam
- 18.6 Keyloggers, Phishing, Spyware
- 18.7 Computer Security Trends
- 18.8 Key Terms, Review Questions, and Problems
- Chapter 19 Computer and Network Security Techniques
- 19.1 Virtual Private Networks and IPsec
- 19.2 SSL and TLS
- 19.3 Wi-Fi Protected Access
- 19.4 Intrusion Detection
- 19.5 Firewalls
- 19.6 Malware Defense
- Application Note: Security Layers
- 19.7 Key Terms, Review Questions, and Problems
- Case Study XI Cloud Computing (In)Security
- Chapter 20 Network Management (ONLINE)
- Chapter 21 Network Planning and Design (ONLINE)
Appendix A Business Data Communications Projects
- A.1 Animations and Animation Projects
- A.2 Practical Exercises
- A.3 Wireshark Projects
- A.4 Research Projects
- A.5 Security Case Studies
- A.6 Reading/Report Assignments
- A.7 Writing Assignments
Glossary
References
Index
ONLINE CHAPTERS AND APPENDICES[1]
- Chapter 20 Network Management (ONLINE)
- 20.1 Network Management Requirements
- 20.2 Network Management Systems
- 20.3 Simple Network Management Protocol (SNMP)
- Application Note: How Much Management?
- 20.4 Key Terms, Review Questions, and Problems
- Chapter 21 Network Planning and Design (ONLINE)
- 21.1 The Project Environment–The Big Picture
- 21.2 Planning
- 21.3 Design Techniques
- 21.4 Some Capacity Planning and Network Design Tools
- Appendix 21A Some Simple Design Algorithms
- Appendix 21B Selling Books Online–A Case Study
Appendix B Standards Organizations
- B.1 The Importance of Standards
- B.2 Standards and Regulation
- B.3 Standards-Setting Organizations
Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)
- C.1 Uniform Resource Locator
- C.2 Uniform Resource Identifier