Business Data Communications- Infrastructure, Networking and Security, 7th edition

  • William Stallings
  • Tom Case


For Business Data Communications, Data Communications, and introductory Networking for Business courses. The content is also appropriate for the Introduction to Networking course in a MBA program.

Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.

The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.

The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.

Table of contents

Chapter 0       Reader's and Instructor's Guide

         0.1         Outline of This Book

         0.2         Topic Ordering

         0.3         Internet and Web Resources

         0.4         Useful Publications


Chapter 1       Introduction

         1.1         Information and Communication

         1.2         Data Communications and Networking for Today's Enterprise

         1.3         Convergence and Unified Communications

         1.4         The Nature of Business Information Requirements

         1.5         The Transmission of Information

         1.6         Distributed Data Processing

         1.7         The Internet and Distributed Applications

         1.8         Networks

         1.9         Management Issues

         1.10         Standards

         1.11         Key Terms, Review Questions, and Problems

         Appendix 1A  Prefixes for Numerical Units


Case Study I   Unified Communications at Boeing (ONLINE)




Chapter 2       Business Information

         2.1         Audio

         2.2         Data

         2.3         Image

         2.4         Video

         2.5         Performance Measures

         Application Note:   File Sizes

         2.6         Summary

         2.7         Key Terms, Review Questions, and Problems


Case Study II       CORE Credit Union (ONLINE)


Chapter 3       Distributed Data Processing

         3.1         Centralized Versus Distributed Processing

         3.2         Forms of Distributed Data Processing

         3.3         Distributed Data

         3.4         Networking Implications of DDP

         3.5         Big Data Infrastructure Considerations

         3.6         Summary

         3.7         Key Terms, Review Questions, and Problems


Case Study III       Managing Massive Data Warehouses at MasterCard International (ONLINE)




Chapter 4       Data Transmission

         4.1         Signals for Conveying Information

         4.2         Transmission Impairments and Channel Capacity

         Application Note: Analog Signals

         4.3         Summary

         4.4         Key Terms, Review Questions, and Problems


Chapter 5       Data Communication Fundamentals

         5.1         Analog and Digital Data Communications

         5.2         Data Encoding Techniques

         5.3         Asynchronous and Synchronous Transmission

         5.4         Error Detection

         Application Note: Devices, Encoding, Communication Parameters and Protocols

         5.5         Summary

         5.6         Key Terms, Review Questions, and Problems


Chapter 6       Data Link Control and Multiplexing

         6.1         Flow Control and Error Control

         6.2         Motivation for Multiplexing

         6.3         Frequency-Division Multiplexing

         6.4         Synchronous Time-Division Multiplexing

         Application Note: Changing Communications

         6.5         Summary

         6.6         Key Terms, Review Questions, and Problems

         Appendix 6A         High-Level Data Link Control Protocol


Case Study IV  Broadband Access: Global and Local Issues (ONLINE)




Chapter 7       The Internet

         7.1         The Structure of the Internet

         7.2         Internet Domains

         Application Note: Fitting DNS into your organizational structure

         7.3         Dynamic Host Configuration Protocol

         7.4         Summary

         7.5         Key Terms, Review Questions, and Problems


Case Study V       Net Neutrality (ONLINE)


Chapter 8       TCP/IP

         8.1         A Simple Protocol Architecture

         8.2         The TCP/IP Protocol Architecture

         8.3         Internetworking

         8.4         Virtual Private Networks and IP Security

         Application Note: Practical Guide to Networking

         8.5         Summary

         8.6         Key Terms, Review Questions, and Problems

         Appendix 8A TCP, UDP, and IP Details

         Appendix 8B The Trivial File Transfer Protocol


Chapter 9       Client/Server, Intranet, and Cloud Computing

         9.1         The Growth of Client/Server Computing

         9.2         Client/Server Applications

         9.3         Middleware

         9.4         Intranets

         9.5         Extranets

         9.6         Service-Oriented Architecture

         Application Note:   To Be Fat or Thin–That is the Question

         9.7    Cloud Computing

         9.8         Summary

         9.9         Key Terms, Review Questions, and Problems


Case Study VI       Shifting Sands: Chevron’s Migration to the Cloud


Chapter 10       Internet-Based Applications

         10.1         Electronic Mail

         10.2         Web Access and HTTP

         10.3         Web Security

         10.4         Multimedia Applications

         Application Note:   To Serve or Not to Serve?

         10.5         Acceptable Use Policiess

         10.6         Summary

         10.7         Key Terms, Review Questions, and Problems


Case Study VII       E-Business at Guardian Life (ONLINE)


Chapter 11       Internet Operation

         11.1         Internet Addressing

         11.2         Internet Routing Protocols

         11.3         Multicasting

         11.4         Quality of Service

         11.5         Differentiated Services

         11.6         Service Level Agreements

         11.7         IP Performance Metrics

         Application Note:  Where Does My Network Address Come From?

         11.8         Summary

         11.9         Key Terms, Review Questions, and Problems





Chapter 12       LAN Architecture and Infrastructure

         12.1         Background

         12.2         LAN Configuration

         12.3         Guided Transmission Media

         12.4         LAN Protocol Architecture

         Application Note:  Cabling Infrastructure

         12.5         Summary

         12.6         Key Terms, Review Questions, and Problems

         Appendix 12A         Decibels and Signal Strength


Case Study VIII       Carlson Companies


Chapter 13       Ethernet, Switches, and Virtual LANs

         13.1         Traditional Ethernet

         13.2         Bridges, Hubs, and Switches

         13.3         High-Speed Ethernet

         Application Note: Networking with Ethernet

         13.4         Virtual LANs

         13.5         Power over Ethernet

         13.6         Summary

         13.7         Key Terms, Review Questions, and Problems


Chapter 14       Wireless LANs

         14.1         Overview

         14.2         Wi-Fi Architecture and Services

         14.3         IEEE 802.11 MAC and Physical Layer Standards

         14.4         Gigibit WLANs

         14.5         IEEE 802.11 Security Considerations

         Application Note: Deploying WLANs

         14.6         Summary

         14.7         Key Terms, Review Questions, and Problems


Case Study IX       St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery




Chapter 15       WAN Technology and Protocols

         15.1         Switching Techniques

         15.2         Circuit-Switching Networks

         15.3         Packet-Switching Networks

         15.4         Traditional Wide Area Network Alternatives

         15.5         Voice over IP

         15.6         Presence

         15.7         Summary

         15.8         Key Terms, Review Questions, and Problems


Chapter 16       WAN Services

         16.1         Wide Area Networking Alternatives

         16.2         Frame Relay

         16.3         Asynchronous Transfer Mode (ATM)

         Application Note: Off-site Connectivity Solutions

         16.4         Multiprotocol Label Switching (MPLS)

         16.5         Wide Area Ethernet

         16.6         Summary

         16.7         Key Terms, Review Questions, and Problems


Chapter 17       Wireless WANs

         17.1         Cellular Wireless Networks

         17.2         Multiple Access

         17.3         Third-Generation Wireless Communication

         17.4         Fourth-Generation Wireless Communciation

         17.5         Satellite Communications

         Application Note: Laptops, Netbooks, PDAs, and Cell Phones

         17.6         Summary

         17.7         Key Terms, Review Questions, and Problems


Case Study X       Choice Hotels




Chapter 18 Computer and Network Security Threats

         18.1         Computer Security Concepts

         18.2         Threats, Attacks, and Assets

         18.3         Intruders

         18.4         Malicious Software Overview

         18.5          Viruses, Worms, Bots, and Spam

         18.6         Keyloggers, Phishing, Spyware

         18.7         Computer Security Trends

         18.8         Key Terms, Review Questions, and Problems


Chapter 19 Computer and Network Security Techniques

         19.1         Virtual Private Networks and IPsec

         19.2         SSL and TLS

         19.3         Wi-Fi Protected Access

         19.4         Intrusion Detection

         19.5         Firewalls

         19.6         Malware Defense

         Application Note: Security Layers

         19.7         Key Terms, Review Questions, and Problems


Case Study XI       Cloud Computing (In)Security


Chapter 20       Network Management (ONLINE)


Chapter 21       Network Planning and Design (ONLINE)


Appendix A              Business Data Communications Projects

         A.1         Animations and Animation Projects

         A.2         Practical Exercises

         A.3         Wireshark Projects

         A.4         Research Projects

         A.5         Security Case Studies

         A.6         Reading/Report Assignments

         A.7         Writing Assignments










Chapter 20       Network Management (ONLINE)

         20.1         Network Management Requirements

         20.2         Network Management Systems

         20.3         Simple Network Management Protocol (SNMP)

         Application Note: How Much Management?

         20.4         Key Terms, Review Questions, and Problems


Chapter 21       Network Planning and Design (ONLINE)

         21.1         The Project Environment–The Big Picture

         21.2         Planning

         21.3         Design Techniques

         21.4         Some Capacity Planning and Network Design Tools

         Appendix 21A         Some Simple Design Algorithms

         Appendix 21B         Selling Books Online–A Case Study


Appendix B              Standards Organizations

         B.1         The Importance of Standards

         B.2         Standards and Regulation

         B.3         Standards-Setting Organizations


Appendix C       Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)

         C.1         Uniform Resource Locator

         C.2         Uniform Resource Identifier

         C.3         To Learn More


Appendix D              The International Reference Alphabet


Appendix E        The TCP/IP Checksum

         E.1         Ones-Complement Addition

         E.2         Use in TCP and IP


Appendix F              IBM's System Network Architecture (SNA)

         F.1         Network Architecture

         F.2         Advanced Program-to-Program Communication

         F.3         Protocol Architecture


Appendix G       Fibre Channel

         G.1         Fibre Channel Elements

         G.2         Fibre Channel Protocol Architecture


Appendix H       Bluetooth

         H.1         Bluetooth Applications

         H.2         Bluetooth Standards Documents

         H.3         Protocol Architecture

         H.4         Usage Models

         H.5         Piconets and Scatternets


Appendix I              Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM)

         I.1         Multipath Interference

         I.2         Orthogonal Frequency-Division Multiplexing


Appendix J              Cryptographic Algorithms

         J.1         Symmetric Encryption

         J.2         Public-Key Cryptography

         J.3         Message Authentication and Hash Functions

         J.4         Secure Hash Functions


Appendix K       Sliding-Window Flow Control and Error Control

         K.1         Flow Control

         K.2         Error Control


Appendix L              The OSI Model

         L.1         The Model

         L.2         The OSI Layers


Appendix M              Code Division Multiple Access


[1] Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book.

For teachers

All the material you need to teach your courses.

Discover teaching material

Published by Pearson (August 28th 2012) - Copyright © 2013