Business Data Communications- Infrastructure, Networking and Security

Business Data Communications- Infrastructure, Networking and Security

3.43 (37 ratings by Goodreads)
By (author)  , By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 11 business days
When will my order arrive?


For Business Data Communications, Data Communications, and introductory Networking for Business courses. The content is also appropriate for the Introduction to Networking course in a MBA program.

Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.

The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.

The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.
show more

Product details

  • Hardback | 624 pages
  • 185 x 238 x 26mm | 940g
  • Pearson
  • United States
  • English
  • 7th edition
  • 0133023893
  • 9780133023893
  • 1,868,833

Table of contents

Chapter 0 Reader's and Instructor's Guide 0.1 Outline of This Book

0.2 Topic Ordering

0.3 Internet and Web Resources

0.4 Useful Publications

Chapter 1 Introduction 1.1 Information and Communication

1.2 Data Communications and Networking for Today's Enterprise

1.3 Convergence and Unified Communications

1.4 The Nature of Business Information Requirements

1.5 The Transmission of Information

1.6 Distributed Data Processing

1.7 The Internet and Distributed Applications

1.8 Networks

1.9 Management Issues

1.10 Standards

1.11 Key Terms, Review Questions, and Problems

Appendix 1A Prefixes for Numerical Units

Case Study I Unified Communications at Boeing (ONLINE)


Chapter 2 Business Information 2.1 Audio

2.2 Data

2.3 Image

2.4 Video

2.5 Performance Measures

Application Note: File Sizes

2.6 Summary

2.7 Key Terms, Review Questions, and Problems

Case Study II CORE Credit Union (ONLINE)

Chapter 3 Distributed Data Processing 3.1 Centralized Versus Distributed Processing

3.2 Forms of Distributed Data Processing

3.3 Distributed Data

3.4 Networking Implications of DDP

3.5 Big Data Infrastructure Considerations

3.6 Summary

3.7 Key Terms, Review Questions, and Problems

Case Study III Managing Massive Data Warehouses at MasterCard International (ONLINE)


Chapter 4 Data Transmission 4.1 Signals for Conveying Information

4.2 Transmission Impairments and Channel Capacity

Application Note: Analog Signals

4.3 Summary

4.4 Key Terms, Review Questions, and Problems

Chapter 5 Data Communication Fundamentals 5.1 Analog and Digital Data Communications

5.2 Data Encoding Techniques

5.3 Asynchronous and Synchronous Transmission

5.4 Error Detection

Application Note: Devices, Encoding, Communication Parameters and Protocols

5.5 Summary

5.6 Key Terms, Review Questions, and Problems

Chapter 6 Data Link Control and Multiplexing 6.1 Flow Control and Error Control

6.2 Motivation for Multiplexing

6.3 Frequency-Division Multiplexing

6.4 Synchronous Time-Division Multiplexing

Application Note: Changing Communications

6.5 Summary

6.6 Key Terms, Review Questions, and Problems

Appendix 6A High-Level Data Link Control Protocol

Case Study IV Broadband Access: Global and Local Issues (ONLINE)


Chapter 7 The Internet 7.1 The Structure of the Internet

7.2 Internet Domains

Application Note: Fitting DNS into your organizational structure

7.3 Dynamic Host Configuration Protocol

7.4 Summary

7.5 Key Terms, Review Questions, and Problems

Case Study V Net Neutrality (ONLINE)

Chapter 8 TCP/IP 8.1 A Simple Protocol Architecture

8.2 The TCP/IP Protocol Architecture

8.3 Internetworking

8.4 Virtual Private Networks and IP Security

Application Note: Practical Guide to Networking

8.5 Summary

8.6 Key Terms, Review Questions, and Problems

Appendix 8A TCP, UDP, and IP Details

Appendix 8B The Trivial File Transfer Protocol

Chapter 9 Client/Server, Intranet, and Cloud Computing 9.1 The Growth of Client/Server Computing

9.2 Client/Server Applications

9.3 Middleware

9.4 Intranets

9.5 Extranets

9.6 Service-Oriented Architecture

Application Note: To Be Fat or Thin-That is the Question

9.7 Cloud Computing

9.8 Summary

9.9 Key Terms, Review Questions, and Problems

Case Study VI Shifting Sands: Chevron's Migration to the Cloud

Chapter 10 Internet-Based Applications 10.1 Electronic Mail

10.2 Web Access and HTTP

10.3 Web Security

10.4 Multimedia Applications

Application Note: To Serve or Not to Serve?

10.5 Acceptable Use Policiess

10.6 Summary

10.7 Key Terms, Review Questions, and Problems

Case Study VII E-Business at Guardian Life (ONLINE)

Chapter 11 Internet Operation 11.1 Internet Addressing

11.2 Internet Routing Protocols

11.3 Multicasting

11.4 Quality of Service

11.5 Differentiated Services

11.6 Service Level Agreements

11.7 IP Performance Metrics

Application Note: Where Does My Network Address Come From?

11.8 Summary

11.9 Key Terms, Review Questions, and Problems


Chapter 12 LAN Architecture and Infrastructure 12.1 Background

12.2 LAN Configuration

12.3 Guided Transmission Media

12.4 LAN Protocol Architecture

Application Note: Cabling Infrastructure

12.5 Summary

12.6 Key Terms, Review Questions, and Problems

Appendix 12A Decibels and Signal Strength

Case Study VIII Carlson Companies

Chapter 13 Ethernet, Switches, and Virtual LANs 13.1 Traditional Ethernet

13.2 Bridges, Hubs, and Switches

13.3 High-Speed Ethernet

Application Note: Networking with Ethernet

13.4 Virtual LANs

13.5 Power over Ethernet

13.6 Summary

13.7 Key Terms, Review Questions, and Problems

Chapter 14 Wireless LANs 14.1 Overview

14.2 Wi-Fi Architecture and Services

14.3 IEEE 802.11 MAC and Physical Layer Standards

14.4 Gigibit WLANs

14.5 IEEE 802.11 Security Considerations

Application Note: Deploying WLANs

14.6 Summary

14.7 Key Terms, Review Questions, and Problems

Case Study IX St. Luke's Health Care System: Using Mobility to Advance Health Care Delivery


Chapter 15 WAN Technology and Protocols 15.1 Switching Techniques

15.2 Circuit-Switching Networks

15.3 Packet-Switching Networks

15.4 Traditional Wide Area Network Alternatives

15.5 Voice over IP

15.6 Presence

15.7 Summary

15.8 Key Terms, Review Questions, and Problems

Chapter 16 WAN Services 16.1 Wide Area Networking Alternatives

16.2 Frame Relay

16.3 Asynchronous Transfer Mode (ATM)

Application Note: Off-site Connectivity Solutions

16.4 Multiprotocol Label Switching (MPLS)

16.5 Wide Area Ethernet

16.6 Summary

16.7 Key Terms, Review Questions, and Problems

Chapter 17 Wireless WANs 17.1 Cellular Wireless Networks

17.2 Multiple Access

17.3 Third-Generation Wireless Communication

17.4 Fourth-Generation Wireless Communciation

17.5 Satellite Communications

Application Note: Laptops, Netbooks, PDAs, and Cell Phones

17.6 Summary

17.7 Key Terms, Review Questions, and Problems

Case Study X Choice Hotels


Chapter 18 Computer and Network Security Threats 18.1 Computer Security Concepts

18.2 Threats, Attacks, and Assets

18.3 Intruders

18.4 Malicious Software Overview

18.5 Viruses, Worms, Bots, and Spam

18.6 Keyloggers, Phishing, Spyware

18.7 Computer Security Trends

18.8 Key Terms, Review Questions, and Problems

Chapter 19 Computer and Network Security Techniques 19.1 Virtual Private Networks and IPsec

19.2 SSL and TLS

19.3 Wi-Fi Protected Access

19.4 Intrusion Detection

19.5 Firewalls

19.6 Malware Defense

Application Note: Security Layers

19.7 Key Terms, Review Questions, and Problems

Case Study XI Cloud Computing (In)Security

Chapter 20 Network Management (ONLINE)

Chapter 21 Network Planning and Design (ONLINE)

Appendix A Business Data Communications Projects A.1 Animations and Animation Projects

A.2 Practical Exercises

A.3 Wireshark Projects

A.4 Research Projects

A.5 Security Case Studies

A.6 Reading/Report Assignments

A.7 Writing Assignments





Chapter 20 Network Management (ONLINE) 20.1 Network Management Requirements

20.2 Network Management Systems

20.3 Simple Network Management Protocol (SNMP)

Application Note: How Much Management?

20.4 Key Terms, Review Questions, and Problems

Chapter 21 Network Planning and Design (ONLINE) 21.1 The Project Environment-The Big Picture

21.2 Planning

21.3 Design Techniques

21.4 Some Capacity Planning and Network Design Tools

Appendix 21A Some Simple Design Algorithms

Appendix 21B Selling Books Online-A Case Study

Appendix B Standards Organizations B.1 The Importance of Standards

B.2 Standards and Regulation

B.3 Standards-Setting Organizations

Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs) C.1 Uniform Resource Locator

C.2 Uniform Resource Identifier

C.3 To Learn More

Appendix D The International Reference Alphabet

Appendix E The TCP/IP Checksum E.1 Ones-Complement Addition

E.2 Use in TCP and IP

Appendix F IBM's System Network Architecture (SNA) F.1 Network Architecture

F.2 Advanced Program-to-Program Communication

F.3 Protocol Architecture

Appendix G Fibre Channel G.1 Fibre Channel Elements

G.2 Fibre Channel Protocol Architecture

Appendix H Bluetooth H.1 Bluetooth Applications

H.2 Bluetooth Standards Documents

H.3 Protocol Architecture

H.4 Usage Models

H.5 Piconets and Scatternets

Appendix I Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM) I.1 Multipath Interference

I.2 Orthogonal Frequency-Division Multiplexing

Appendix J Cryptographic Algorithms J.1 Symmetric Encryption

J.2 Public-Key Cryptography

J.3 Message Authentication and Hash Functions

J.4 Secure Hash Functions

Appendix K Sliding-Window Flow Control and Error Control K.1 Flow Control

K.2 Error Control

Appendix L The OSI Model L.1 The Model

L.2 The OSI Layers

Appendix M Code Division Multiple Access

[1] Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book.
show more

Rating details

37 ratings
3.43 out of 5 stars
5 16% (6)
4 38% (14)
3 24% (9)
2 16% (6)
1 5% (2)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X