Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010340785 | HF5548.2 S83 2013 | Open Access Book | Book | Searching... |
Searching... | 30000010241470 | TK5105 S72 2013 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
For Business Data Communications, Data Communications, and introductory Networking for Business courses. T he content is also appropriate for the Introduction to Networking course in a MBA program.
Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.
The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.
Table of Contents
Chapter 0 Reader's and Instructor's Guide |
0.1 Outline of This Book |
0.2 Topic Ordering |
0.3 Internet and Web Resources |
0.4 Useful Publications |
Chapter 1 Introduction |
1.1 Information and Communication |
1.2 Data Communications and Networking for Today's Enterprise |
1.3 Convergence and Unified Communications |
1.4 The Nature of Business Information Requirements |
1.5 The Transmission of Information |
1.6 Distributed Data Processing |
1.7 The Internet and Distributed Applications |
1.8 Networks |
1.9 Management Issues |
1.10 Standards |
1.11 Key Terms, Review Questions, and Problems |
Appendix 1A Prefixes for Numerical Units |
Case Study I Unified Communications at Boeing(ONLINE) |
Part One Requirements |
Chapter 2 Business Information |
2.1 Audio |
2.2 Data |
2.3 Image |
2.4 Video |
2.5 Performance Measures |
Application Note: File Sizes |
2.6 Summary |
2.7 Key Terms, Review Questions, and Problems |
Case Study II CORE Credit Union (Online) |
Chapter 3 Distributed Data Processing |
3.1 Centralized Versus Distributed Processing |
3.2 Forms of Distributed Data Processing |
3.3 Distributed Data |
3.4 Networking Implications of DDP |
3.5 Big Data Infrastructure Considerations |
3.6 Summary |
3.7 Key Terms, Review Questions, and Problems |
Case Study III Managing Massive Data Warehouses at MasterCard International (Online) |
Part Two Data Communications |
Chapter 4 Data Transmission |
4.1 Signals for Conveying Information |
4.2 Transmission Impairments and Channel Capacity |
Application Note: Analog Signals |
4.3 Summary |
4.4 Key Terms, Review Questions, and Problems |
Chapter 5 Data Communication Fundamentals |
5.1 Analog and Digital Data Communications |
5.2 Data Encoding Techniques |
5.3 Asynchronous and Synchronous Transmission |
5.4 Error Detection |
Application Note: Devices, Encoding, Communication Parameters and Protocols |
5.5 Summary |
5.6 Key Terms, Review Questions, and Problems |
Chapter 6 Data Link Control and Multiplexing |
6.1 Flow Control and Error Control |
6.2 Motivation for Multiplexing |
6.3 Frequency-Division Multiplexing |
6.4 Synchronous Time-Division Multiplexing |
Application Note: Changing Communications |
6.5 Summary |
6.6 Key Terms, Review Questions, and Problems |
Appendix 6A High-Level Data Link Control Protocol |
Case Study IV Broadband Access: Global and Local Issues (Online) |
Part Three The Internet and Distributed Applications |
Chapter 7 The Internet |
7.1 The Structure of the Internet |
7.2 Internet Domains |
Application Note: Fitting DNS into your organizational structure |
7.3 Dynamic Host Configuration Protocol |
7.4 Summary |
7.5 Key Terms, Review Questions, and Problems |
Case Study V Net Neutrality (Online) |
Chapter 8 TCP/IP |
8.1 A Simple Protocol Architecture |
8.2 The TCP/IP Protocol Architecture |
8.3 Internetworking |
8.4 Virtual Private Networks and IP Security |
Application Note: Practical Guide to Networking |
8.5 Summary |
8.6 Key Terms, Review Questions, and Problems |
Appendix 8A TCP, UDP, and IP Details |
Appendix 8B The Trivial File Transfer Protocol |
Chapter 9 Client/Server, Intranet, and Cloud Computing |
9.1 The Growth of Client/Server Computing |
9.2 Client/Server Applications |
9.3 Middleware |
9.4 Intranets |
9.5 Extranets |
9.6 Service-Oriented Architecture |
Application Note: To Be Fat or ThinûThat is the Question |
9.7 Cloud Computing |
9.8 Summary |
9.9 Key Terms, Review Questions, and Problems |
Case Study VI Shifting Sands: ChevronÆs Migration to the Cloud |
Internet-Based Applications |
Electronic Mail |
Web Access and HTTP |
Web Security |
Multimedia Applications |
Acceptable Use Policiess |
Summary |
Key Terms, Review Questions, and Problems |
E-Business at Guardian Life (Online) |
Internet Operation |
Internet Addressing |
Internet Routing Protocols |
Multicasting |
Quality of Service |
Differentiated Services |
Service Level Agreements |
IP Performance Metrics |
Summary |
Key Terms, Review Questions, and Problems |
Local Area Networks |
LAN Architecture and Infrastructure |
Background |
LAN Configuration |
Guided Transmission Media |
LAN Protocol Architecture |
Summary |
Key Terms, Review Questions, and Problems |
Decibels and Signal Strength |
Carlson Companies |
Ethernet, Switches, and Virtual LANs |
Traditional Ethernet |
Bridges, Hubs, and Switches |
High-Speed Ethernet |
Virtual LANs |
Power over Ethernet |
Summary |
Key Terms, Review Questions, and Problems |
Wireless LANs |
Overview |
Wi-Fi Architecture and Services |
IEEE 802.11 MAC and Physical Layer Standards |
Gigibit WLANs |
IEEE 802.11 Security Considerations |
Summary |
Key Terms, Review Questions, and Problems |
St. LukeÆs Health Care System: Using Mobility to Advance Health Care Delivery |
Wide Area Networks |
WAN Technology and Protocols |
Switching Techniques |
Circuit-Switching Networks |
Packet-Switching Networks |
Traditional Wide Area Network Alternatives |
Voice over IP |
Presence |
Summary |
Key Terms, Review Questions, and Problems |
WAN Services |
Wide Area Networking Alternatives |
Frame Relay |
Asynchronous Transfer Mode (ATM) |
Multiprotocol Label Switching (MPLS) |
Wide Area Ethernet |
Summary |
Key Terms, Review Questions, and Problems |
Wireless WANs |
Cellular Wireless Networks |
Multiple Access |
Third-Generation Wireless Communication |
Fourth-Generation Wireless Communciation |
Satellite Communications |
Summary |
Key Terms, Review Questions, and Problems |
Choice Hotels |
Management Issues |
Computer and Network Security Threats |
Computer Security Concepts |
Threats, Attacks, and Assets |
Intruders |
Malicious Software Overview |
Viruses, Worms, Bots, and Spam |
Keyloggers, Phishing, Spyware |
Computer Security Trends |
Key Terms, Review Questions, and Problems |
Computer and Network Security Techniques |
Virtual Private Networks and IPsec |
SSL and TLS |
Wi-Fi Protected Access |
Intrusion Detection |
Firewalls |
Malware Defense |
Key Terms, Review Questions, and Problems |
Cloud Computing (In)Security |
Network Management (Online) |
Network Planning and Design (Online) |
Business Data Communications Projects |
Animations and Animation Projects |
Practical Exercises |
Wireshark Projects |
Research Projects |
Security Case Studies |
Reading/Report Assignments |
Writing Assignments |
Network Management (Online) |
Network Management Requirements |
Network Management Systems |
Simple Network Management Protocol (SNMP) |
Key Terms, Review Questions, and Problems |
Network Planning and Design (Online) |
The Project EnvironmentûThe Big Picture |
Planning |
Design Techniques |
Some Capacity Planning and Network Design Tools |
Some Simple Design Algorithms |
Selling Books OnlineûA Case Study |
Standards Organizations |
Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs) |
The International Reference Alphabet |
The TCP/IP Checksum |
IBM's System Network Architecture (SNA) |
Fibre Channel |
Bluetooth |
Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM) |
Cryptographic Algorithms |
Sliding-Window Flow Control and Error Control |
The OSI Model |
Code Division Multiple Access |