Cover image for Business data communications : infrastructure, networking and security
Title:
Business data communications : infrastructure, networking and security
Personal Author:
Edition:
Seventh edition.
Publication Information:
Boston : Pearson, c2013
Physical Description:
xx, 599 pages : illustrations ; 25 cm.
ISBN:
9780133023893
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010340785 HF5548.2 S83 2013 Open Access Book Book
Searching...
Searching...
30000010241470 TK5105 S72 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

For Business Data Communications, Data Communications, and introductory Networking for Business courses. T he content is also appropriate for the Introduction to Networking course in a MBA program.


Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.


The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.


Table of Contents

Chapter 0 Reader's and Instructor's Guide
0.1 Outline of This Book
0.2 Topic Ordering
0.3 Internet and Web Resources
0.4 Useful Publications
Chapter 1 Introduction
1.1 Information and Communication
1.2 Data Communications and Networking for Today's Enterprise
1.3 Convergence and Unified Communications
1.4 The Nature of Business Information Requirements
1.5 The Transmission of Information
1.6 Distributed Data Processing
1.7 The Internet and Distributed Applications
1.8 Networks
1.9 Management Issues
1.10 Standards
1.11 Key Terms, Review Questions, and Problems
Appendix 1A Prefixes for Numerical Units
Case Study I Unified Communications at Boeing(ONLINE)
Part One Requirements
Chapter 2 Business Information
2.1 Audio
2.2 Data
2.3 Image
2.4 Video
2.5 Performance Measures
Application Note: File Sizes
2.6 Summary
2.7 Key Terms, Review Questions, and Problems
Case Study II CORE Credit Union (Online)
Chapter 3 Distributed Data Processing
3.1 Centralized Versus Distributed Processing
3.2 Forms of Distributed Data Processing
3.3 Distributed Data
3.4 Networking Implications of DDP
3.5 Big Data Infrastructure Considerations
3.6 Summary
3.7 Key Terms, Review Questions, and Problems
Case Study III Managing Massive Data Warehouses at MasterCard International (Online)
Part Two Data Communications
Chapter 4 Data Transmission
4.1 Signals for Conveying Information
4.2 Transmission Impairments and Channel Capacity
Application Note: Analog Signals
4.3 Summary
4.4 Key Terms, Review Questions, and Problems
Chapter 5 Data Communication Fundamentals
5.1 Analog and Digital Data Communications
5.2 Data Encoding Techniques
5.3 Asynchronous and Synchronous Transmission
5.4 Error Detection
Application Note: Devices, Encoding, Communication Parameters and Protocols
5.5 Summary
5.6 Key Terms, Review Questions, and Problems
Chapter 6 Data Link Control and Multiplexing
6.1 Flow Control and Error Control
6.2 Motivation for Multiplexing
6.3 Frequency-Division Multiplexing
6.4 Synchronous Time-Division Multiplexing
Application Note: Changing Communications
6.5 Summary
6.6 Key Terms, Review Questions, and Problems
Appendix 6A High-Level Data Link Control Protocol
Case Study IV Broadband Access: Global and Local Issues (Online)
Part Three The Internet and Distributed Applications
Chapter 7 The Internet
7.1 The Structure of the Internet
7.2 Internet Domains
Application Note: Fitting DNS into your organizational structure
7.3 Dynamic Host Configuration Protocol
7.4 Summary
7.5 Key Terms, Review Questions, and Problems
Case Study V Net Neutrality (Online)
Chapter 8 TCP/IP
8.1 A Simple Protocol Architecture
8.2 The TCP/IP Protocol Architecture
8.3 Internetworking
8.4 Virtual Private Networks and IP Security
Application Note: Practical Guide to Networking
8.5 Summary
8.6 Key Terms, Review Questions, and Problems
Appendix 8A TCP, UDP, and IP Details
Appendix 8B The Trivial File Transfer Protocol
Chapter 9 Client/Server, Intranet, and Cloud Computing
9.1 The Growth of Client/Server Computing
9.2 Client/Server Applications
9.3 Middleware
9.4 Intranets
9.5 Extranets
9.6 Service-Oriented Architecture
Application Note: To Be Fat or ThinûThat is the Question
9.7 Cloud Computing
9.8 Summary
9.9 Key Terms, Review Questions, and Problems
Case Study VI Shifting Sands: ChevronÆs Migration to the Cloud
Internet-Based Applications
Electronic Mail
Web Access and HTTP
Web Security
Multimedia Applications
Acceptable Use Policiess
Summary
Key Terms, Review Questions, and Problems
E-Business at Guardian Life (Online)
Internet Operation
Internet Addressing
Internet Routing Protocols
Multicasting
Quality of Service
Differentiated Services
Service Level Agreements
IP Performance Metrics
Summary
Key Terms, Review Questions, and Problems
Local Area Networks
LAN Architecture and Infrastructure
Background
LAN Configuration
Guided Transmission Media
LAN Protocol Architecture
Summary
Key Terms, Review Questions, and Problems
Decibels and Signal Strength
Carlson Companies
Ethernet, Switches, and Virtual LANs
Traditional Ethernet
Bridges, Hubs, and Switches
High-Speed Ethernet
Virtual LANs
Power over Ethernet
Summary
Key Terms, Review Questions, and Problems
Wireless LANs
Overview
Wi-Fi Architecture and Services
IEEE 802.11 MAC and Physical Layer Standards
Gigibit WLANs
IEEE 802.11 Security Considerations
Summary
Key Terms, Review Questions, and Problems
St. LukeÆs Health Care System: Using Mobility to Advance Health Care Delivery
Wide Area Networks
WAN Technology and Protocols
Switching Techniques
Circuit-Switching Networks
Packet-Switching Networks
Traditional Wide Area Network Alternatives
Voice over IP
Presence
Summary
Key Terms, Review Questions, and Problems
WAN Services
Wide Area Networking Alternatives
Frame Relay
Asynchronous Transfer Mode (ATM)
Multiprotocol Label Switching (MPLS)
Wide Area Ethernet
Summary
Key Terms, Review Questions, and Problems
Wireless WANs
Cellular Wireless Networks
Multiple Access
Third-Generation Wireless Communication
Fourth-Generation Wireless Communciation
Satellite Communications
Summary
Key Terms, Review Questions, and Problems
Choice Hotels
Management Issues
Computer and Network Security Threats
Computer Security Concepts
Threats, Attacks, and Assets
Intruders
Malicious Software Overview
Viruses, Worms, Bots, and Spam
Keyloggers, Phishing, Spyware
Computer Security Trends
Key Terms, Review Questions, and Problems
Computer and Network Security Techniques
Virtual Private Networks and IPsec
SSL and TLS
Wi-Fi Protected Access
Intrusion Detection
Firewalls
Malware Defense
Key Terms, Review Questions, and Problems
Cloud Computing (In)Security
Network Management (Online)
Network Planning and Design (Online)
Business Data Communications Projects
Animations and Animation Projects
Practical Exercises
Wireshark Projects
Research Projects
Security Case Studies
Reading/Report Assignments
Writing Assignments
Network Management (Online)
Network Management Requirements
Network Management Systems
Simple Network Management Protocol (SNMP)
Key Terms, Review Questions, and Problems
Network Planning and Design (Online)
The Project EnvironmentûThe Big Picture
Planning
Design Techniques
Some Capacity Planning and Network Design Tools
Some Simple Design Algorithms
Selling Books OnlineûA Case Study
Standards Organizations
Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)
The International Reference Alphabet
The TCP/IP Checksum
IBM's System Network Architecture (SNA)
Fibre Channel
Bluetooth
Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM)
Cryptographic Algorithms
Sliding-Window Flow Control and Error Control
The OSI Model
Code Division Multiple Access