
Business Data Communications- Infrastructure, Networking and Security
by Stallings, William; Case, Tom-
Complimentary 7-Day eTextbook Access - Read more
When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
Buy New
Rent Textbook
Rent Digital
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
0.1 Outline of This Book
0.2 Topic Ordering
0.3 Internet and Web Resources
0.4 Useful Publications
Chapter 1 Introduction
1.1 Information and Communication
1.2 Data Communications and Networking for Today's Enterprise
1.3 Convergence and Unified Communications
1.4 The Nature of Business Information Requirements
1.5 The Transmission of Information
1.6 Distributed Data Processing
1.7 The Internet and Distributed Applications
1.8 Networks
1.9 Management Issues
1.10 Standards
1.11 Key Terms, Review Questions, and Problems
Appendix 1A Prefixes for Numerical Units
Case Study I Unified Communications at Boeing (ONLINE)
PART ONE REQUIREMENTS
Chapter 2 Business Information
2.1 Audio
2.2 Data
2.3 Image
2.4 Video
2.5 Performance Measures
Application Note: File Sizes
2.6 Summary
2.7 Key Terms, Review Questions, and Problems
Case Study II CORE Credit Union (ONLINE)
Chapter 3 Distributed Data Processing
3.1 Centralized Versus Distributed Processing
3.2 Forms of Distributed Data Processing
3.3 Distributed Data
3.4 Networking Implications of DDP
3.5 Big Data Infrastructure Considerations
3.6 Summary
3.7 Key Terms, Review Questions, and Problems
Case Study III Managing Massive Data Warehouses at MasterCard International (ONLINE)
PART TWO DATA COMMUNICATIONS
Chapter 4 Data Transmission
4.1 Signals for Conveying Information
4.2 Transmission Impairments and Channel Capacity
Application Note: Analog Signals
4.3 Summary
4.4 Key Terms, Review Questions, and Problems
Chapter 5 Data Communication Fundamentals
5.1 Analog and Digital Data Communications
5.2 Data Encoding Techniques
5.3 Asynchronous and Synchronous Transmission
5.4 Error Detection
Application Note: Devices, Encoding, Communication Parameters and Protocols
5.5 Summary
5.6 Key Terms, Review Questions, and Problems
Chapter 6 Data Link Control and Multiplexing
6.1 Flow Control and Error Control
6.2 Motivation for Multiplexing
6.3 Frequency-Division Multiplexing
6.4 Synchronous Time-Division Multiplexing
Application Note: Changing Communications
6.5 Summary
6.6 Key Terms, Review Questions, and Problems
Appendix 6A High-Level Data Link Control Protocol
Case Study IV Broadband Access: Global and Local Issues (ONLINE)
PART THREE THE INTERNET AND DISTRIBUTED APPLICATIONS
Chapter 7 The Internet
7.1 The Structure of the Internet
7.2 Internet Domains
Application Note: Fitting DNS into your organizational structure
7.3 Dynamic Host Configuration Protocol
7.4 Summary
7.5 Key Terms, Review Questions, and Problems
Case Study V Net Neutrality (ONLINE)
Chapter 8 TCP/IP
8.1 A Simple Protocol Architecture
8.2 The TCP/IP Protocol Architecture
8.3 Internetworking
8.4 Virtual Private Networks and IP Security
Application Note: Practical Guide to Networking
8.5 Summary
8.6 Key Terms, Review Questions, and Problems
Appendix 8A TCP, UDP, and IP Details
Appendix 8B The Trivial File Transfer Protocol
Chapter 9 Client/Server, Intranet, and Cloud Computing
9.1 The Growth of Client/Server Computing
9.2 Client/Server Applications
9.3 Middleware
9.4 Intranets
9.5 Extranets
9.6 Service-Oriented Architecture
Application Note: To Be Fat or Thin–That is the Question
9.7 Cloud Computing
9.8 Summary
9.9 Key Terms, Review Questions, and Problems
Case Study VI Shifting Sands: Chevron’s Migration to the Cloud
Chapter 10 Internet-Based Applications
10.1 Electronic Mail
10.2 Web Access and HTTP
10.3 Web Security
10.4 Multimedia Applications
Application Note: To Serve or Not to Serve?
10.5 Acceptable Use Policiess
10.6 Summary
10.7 Key Terms, Review Questions, and Problems
Case Study VII E-Business at Guardian Life (ONLINE)
Chapter 11 Internet Operation
11.1 Internet Addressing
11.2 Internet Routing Protocols
11.3 Multicasting
11.4 Quality of Service
11.5 Differentiated Services
11.6 Service Level Agreements
11.7 IP Performance Metrics
Application Note: Where Does My Network Address Come From?
11.8 Summary
11.9 Key Terms, Review Questions, and Problems
PART FOUR LOCAL AREA NETWORKS
Chapter 12 LAN Architecture and Infrastructure
12.1 Background
12.2 LAN Configuration
12.3 Guided Transmission Media
12.4 LAN Protocol Architecture
Application Note: Cabling Infrastructure
12.5 Summary
12.6 Key Terms, Review Questions, and Problems
Appendix 12A Decibels and Signal Strength
Case Study VIII Carlson Companies
Chapter 13 Ethernet, Switches, and Virtual LANs
13.1 Traditional Ethernet
13.2 Bridges, Hubs, and Switches
13.3 High-Speed Ethernet
Application Note: Networking with Ethernet
13.4 Virtual LANs
13.5 Power over Ethernet
13.6 Summary
13.7 Key Terms, Review Questions, and Problems
Chapter 14 Wireless LANs
14.1 Overview
14.2 Wi-Fi Architecture and Services
14.3 IEEE 802.11 MAC and Physical Layer Standards
14.4 Gigibit WLANs
14.5 IEEE 802.11 Security Considerations
Application Note: Deploying WLANs
14.6 Summary
14.7 Key Terms, Review Questions, and Problems
Case Study IX St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery
PART FIVE WIDE AREA NETWORKS
Chapter 15 WAN Technology and Protocols
15.1 Switching Techniques
15.2 Circuit-Switching Networks
15.3 Packet-Switching Networks
15.4 Traditional Wide Area Network Alternatives
15.5 Voice over IP
15.6 Presence
15.7 Summary
15.8 Key Terms, Review Questions, and Problems
Chapter 16 WAN Services
16.1 Wide Area Networking Alternatives
16.2 Frame Relay
16.3 Asynchronous Transfer Mode (ATM)
Application Note: Off-site Connectivity Solutions
16.4 Multiprotocol Label Switching (MPLS)
16.5 Wide Area Ethernet
16.6 Summary
16.7 Key Terms, Review Questions, and Problems
Chapter 17 Wireless WANs
17.1 Cellular Wireless Networks
17.2 Multiple Access
17.3 Third-Generation Wireless Communication
17.4 Fourth-Generation Wireless Communciation
17.5 Satellite Communications
Application Note: Laptops, Netbooks, PDAs, and Cell Phones
17.6 Summary
17.7 Key Terms, Review Questions, and Problems
Case Study X Choice Hotels
PART SIX MANAGEMENT ISSUES
Chapter 18 Computer and Network Security Threats
18.1 Computer Security Concepts
18.2 Threats, Attacks, and Assets
18.3 Intruders
18.4 Malicious Software Overview
18.5 Viruses, Worms, Bots, and Spam
18.6 Keyloggers, Phishing, Spyware
18.7 Computer Security Trends
18.8 Key Terms, Review Questions, and Problems
Chapter 19 Computer and Network Security Techniques
19.1 Virtual Private Networks and IPsec
19.2 SSL and TLS
19.3 Wi-Fi Protected Access
19.4 Intrusion Detection
19.5 Firewalls
19.6 Malware Defense
Application Note: Security Layers
19.7 Key Terms, Review Questions, and Problems
Case Study XI Cloud Computing (In)Security
Chapter 20 Network Management (ONLINE)
Chapter 21 Network Planning and Design (ONLINE)
Appendix A Business Data Communications Projects
A.1 Animations and Animation Projects
A.2 Practical Exercises
A.3 Wireshark Projects
A.4 Research Projects
A.5 Security Case Studies
A.6 Reading/Report Assignments
A.7 Writing Assignments
Glossary
References
Index
ONLINE CHAPTERS AND APPENDICES[1]
Chapter 20 Network Management (ONLINE)
20.1 Network Management Requirements
20.2 Network Management Systems
20.3 Simple Network Management Protocol (SNMP)
Application Note: How Much Management?
20.4 Key Terms, Review Questions, and Problems
Chapter 21 Network Planning and Design (ONLINE)
21.1 The Project Environment–The Big Picture
21.2 Planning
21.3 Design Techniques
21.4 Some Capacity Planning and Network Design Tools
Appendix 21A Some Simple Design Algorithms
Appendix 21B Selling Books Online–A Case Study
Appendix B Standards Organizations
B.1 The Importance of Standards
B.2 Standards and Regulation
B.3 Standards-Setting Organizations
Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)
C.1 Uniform Resource Locator
C.2 Uniform Resource Identifier
C.3 To Learn More
Appendix D The International Reference Alphabet
Appendix E The TCP/IP Checksum
E.1 Ones-Complement Addition
E.2 Use in TCP and IP
Appendix F IBM's System Network Architecture (SNA)
F.1 Network Architecture
F.2 Advanced Program-to-Program Communication
F.3 Protocol Architecture
Appendix G Fibre Channel
G.1 Fibre Channel Elements
G.2 Fibre Channel Protocol Architecture
Appendix H Bluetooth
H.1 Bluetooth Applications
H.2 Bluetooth Standards Documents
H.3 Protocol Architecture
H.4 Usage Models
H.5 Piconets and Scatternets
Appendix I Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM)
I.1 Multipath Interference
I.2 Orthogonal Frequency-Division Multiplexing
Appendix J Cryptographic Algorithms
J.1 Symmetric Encryption
J.2 Public-Key Cryptography
J.3 Message Authentication and Hash Functions
J.4 Secure Hash Functions
Appendix K Sliding-Window Flow Control and Error Control
K.1 Flow Control
K.2 Error Control
Appendix L The OSI Model
L.1 The Model
L.2 The OSI Layers
Appendix M Code Division Multiple Access
[1] Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book.
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.