Skip to content

Business Data Communications Infrastructure, Networking and Security

Best in textbook rentals since 2012!

ISBN-10: 0133023893

ISBN-13: 9780133023893

Edition: 7th 2013

Authors: William Stallings, Tom Case

List price: $213.32
Blue ribbon 30 day, 100% satisfaction guarantee!

Rental notice: supplementary materials (access codes, CDs, etc.) are not guaranteed with rental orders.

what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

For Business Data Communications, Data Communications, and introductory Networking for Business courses.Business Data Communications and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.The diverse set of projects and student exercises enables the…    
Customers also bought

Book details

List price: $213.32
Edition: 7th
Copyright year: 2013
Publisher: Pearson Education
Publication date: 8/28/2012
Binding: Hardcover
Pages: 624
Size: 7.30" wide x 9.40" long x 1.05" tall
Weight: 2.684
Language: English

Reader's and Instructor's Guide
Outline of This Book
Topic Ordering
Internet and Web Resources
Useful Publications
Introduction
Information and Communication
Data Communications and Networking for Today's Enterprise
Convergence and Unified Communications
The Nature of Business Information Requirements
The Transmission of Information
Distributed Data Processing
The Internet and Distributed Applications
Networks
Management Issues
Standards
Key Terms, Review Questions, and Problems
Prefixes for Numerical Units
Unified Communications at Boeing(ONLINE)
Requirements
Business Information
Audio
Data
Image
Video
Performance Measures
Application Note: File Sizes
Summary
Key Terms, Review Questions, and Problems
CORE Credit Union (Online)
Distributed Data Processing
Centralized Versus Distributed Processing
Forms of Distributed Data Processing
Distributed Data
Networking Implications of DDP
Big Data Infrastructure Considerations
Summary
Key Terms, Review Questions, and Problems
Managing Massive Data Warehouses at MasterCard International (Online)
Data Communications
Data Transmission
Signals for Conveying Information
Transmission Impairments and Channel Capacity
Application Note: Analog Signals
Summary
Key Terms, Review Questions, and Problems
Data Communication Fundamentals
Analog and Digital Data Communications
Data Encoding Techniques
Asynchronous and Synchronous Transmission
Error Detection
Application Note: Devices, Encoding, Communication Parameters and Protocols
Summary
Key Terms, Review Questions, and Problems
Data Link Control and Multiplexing
Flow Control and Error Control
Motivation for Multiplexing
Frequency-Division Multiplexing
Synchronous Time-Division Multiplexing
Application Note: Changing Communications
Summary
Key Terms, Review Questions, and Problems
High-Level Data Link Control Protocol
Broadband Access: Global and Local Issues (Online)
The Internet and Distributed Applications
The Internet
The Structure of the Internet
Internet Domains
Application Note: Fitting DNS into your organizational structure
Dynamic Host Configuration Protocol
Summary
Key Terms, Review Questions, and Problems
Net Neutrality (Online)
TCP/IP
A Simple Protocol Architecture
The TCP/IP Protocol Architecture
Internetworking
Virtual Private Networks and IP Security
Application Note: Practical Guide to Networking
Summary
Key Terms, Review Questions, and Problems
TCP, UDP, and IP Details
The Trivial File Transfer Protocol
Client/Server, Intranet, and Cloud Computing
The Growth of Client/Server Computing
Client/Server Applications
Middleware
Intranets
Extranets
Service-Oriented Architecture
Application Note: To Be Fat or Thin�That is the Question
Cloud Computing
Summary
Key Terms, Review Questions, and Problems
Shifting Sands: Chevron�s Migration to the Cloud
Internet-Based Applications
Electronic Mail
Web Access and HTTP
Web Security
Multimedia Applications
Acceptable Use Policiess
Summary
Key Terms, Review Questions, and Problems
E-Business at Guardian Life (Online)
Internet Operation
Internet Addressing
Internet Routing Protocols
Multicasting
Quality of Service
Differentiated Services
Service Level Agreements
IP Performance Metrics
Summary
Key Terms, Review Questions, and Problems
Local Area Networks
LAN Architecture and Infrastructure
Background
LAN Configuration
Guided Transmission Media
LAN Protocol Architecture
Summary
Key Terms, Review Questions, and Problems
Decibels and Signal Strength
Carlson Companies
Ethernet, Switches, and Virtual LANs
Traditional Ethernet
Bridges, Hubs, and Switches
High-Speed Ethernet
Virtual LANs
Power over Ethernet
Summary
Key Terms, Review Questions, and Problems
Wireless LANs
Overview
Wi-Fi Architecture and Services
IEEE 802.11 MAC and Physical Layer Standards
Gigibit WLANs
IEEE 802.11 Security Considerations
Summary
Key Terms, Review Questions, and Problems
St. Luke�s Health Care System: Using Mobility to Advance Health Care Delivery
Wide Area Networks
WAN Technology and Protocols
Switching Techniques
Circuit-Switching Networks
Packet-Switching Networks
Traditional Wide Area Network Alternatives
Voice over IP
Presence
Summary
Key Terms, Review Questions, and Problems
WAN Services
Wide Area Networking Alternatives
Frame Relay
Asynchronous Transfer Mode (ATM)
Multiprotocol Label Switching (MPLS)
Wide Area Ethernet
Summary
Key Terms, Review Questions, and Problems
Wireless WANs
Cellular Wireless Networks
Multiple Access
Third-Generation Wireless Communication
Fourth-Generation Wireless Communciation
Satellite Communications
Summary
Key Terms, Review Questions, and Problems
Choice Hotels
Management Issues
Computer and Network Security Threats
Computer Security Concepts
Threats, Attacks, and Assets
Intruders
Malicious Software Overview
Viruses, Worms, Bots, and Spam
Keyloggers, Phishing, Spyware
Computer Security Trends
Key Terms, Review Questions, and Problems
Computer and Network Security Techniques
Virtual Private Networks and IPsec
SSL and TLS
Wi-Fi Protected Access
Intrusion Detection
Firewalls
Malware Defense
Key Terms, Review Questions, and Problems
Cloud Computing (In)Security
Network Management (Online)
Network Planning and Design (Online)
Business Data Communications Projects
Animations and Animation Projects
Practical Exercises
Wireshark Projects
Research Projects
Security Case Studies
Reading/Report Assignments
Writing Assignments
Network Management (Online)
Network Management Requirements
Network Management Systems
Simple Network Management Protocol (SNMP)
Key Terms, Review Questions, and Problems
Network Planning and Design (Online)
The Project Environment�The Big Picture
Planning
Design Techniques
Some Capacity Planning and Network Design Tools
Some Simple Design Algorithms
Selling Books Online�A Case Study
Standards Organizations
Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)
The International Reference Alphabet
The TCP/IP Checksum
IBM's System Network Architecture (SNA)
Fibre Channel
Bluetooth
Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM)
Cryptographic Algorithms
Sliding-Window Flow Control and Error Control
The OSI Model
Code Division Multiple Access