Overview
Description
For Business Data Communications, Data Communications, and introductory Networking for Business courses.
Business Data Communications, 6/e, covers the fundamentals of data communications, networking, distributed applications, and network management and security. Stallings presents these concepts in a way that relates specifically to the business environment and the concerns of business management and staff, structuring his text around requirements, ingredients, and applications. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications. Throughout the text, references to the interactive, online animations supply a powerful tool in understanding complex protocol mechanisms.
The Sixth Edition maintains Stallings' superlative support for either a research projects or modeling projects component in the course. The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
Features
- Flexible organization. The ordering of topics is presented with a top-down approach, with the early part of the book dealing with applications and upper-level protocols. However, the book is designed to support a bottom-up approach as well.
- Detailed examination of client/server computing and service oriented architecture. Provides students with information about how these vital topics for corporate data communication work, allowing them to understand their functions and the approach for organizing enterprise systems.
- Detailed discussion of all networking technologies, including LANs and WANs. Students can compare and evaluate competing approaches and thus understand each better. Wireless networks and quality of service are especially important topics.
- Solid coverage of the TCP/IP set of protocols. Students are given the foundation and context for understanding the protocols and standards that form the foundation for all data networking.
- Extensive use of real-world case studies. Shows students how companies have dealt with the real issues, problems, and opportunities presented by communications and network technology.
- Numerous questions, homework problems, and worked-out examples. Offers students a chance to apply and test their knowledge.
- Tables and figures. Helps students clarify concepts to aid in comprehension.
- Suggested readings, key word lists, and recommended Web Sites conclude each chapter, and encourage students to further explore topics of interest. Seven online appendices provide supplemental material for students.
- Companion Website Access textbook-related resources and support materials for students and instructors maintained by the author.
- Student Resource Site Access a wealth of computer science-related information including mathematics reviews, how-to documents, research resources, and career explorations maintained by the author.
- Instructor Resource Center: This password-protected web site includes:
- Solutions Manual: Solutions to end-of-chapter Review Questions and Problems.
- Projects Manual: Suggested project assignments for 6 different types of assignment, written especially for this book.
- Animation Assignments
- Practical Exercises
- Ethereal Projects
- Research Projects
- Reading/Report Assignments
- Writing Assignments
- PowerPoint Slides: A set of slides covering all chapters, suitable for use in lecturing.
- PDF files: Reproductions of all figures and tables from the book
New to This Edition
- New incorporation of interactive, online animations. A total of 12 Web-based animations are used to illustrate key functions. These animations are a tremendous help in visualizing the complex mechanisms of network protocols. They can be used in a passive or active mode for self-study, or an assignment.
- New coverage of IP performance metrics and service level agreements (SLAs). Information systems managers need these increasingly important tools to properly manage enterprise networks and ensure that quality of service (QoS) meets requirements.
- New unified communications concepts. New treatment of concepts representing the leading edge of business network design, including unified communications, convergence, and service oriented architecture (SOA).
- Security material has been expanded to two stand-alone chapters and interspersed throughout the text.
- Part six of the prior edition, Security, has been completely rewritten and expanded to two chapters, reflecting the growing importance Security holds to information systems managers.
- Unique to this text, additional security material is also embedded throughout relevant chapters.
- All of the material has been updated for the latest technologies and developments in the field. Updated coverage includes specifications of WiFi/IEEE 802.11 wireless LANs, including 802.11n. New details of Gigabit Ethernet and 10-Gbps Ethernet standards are provided.
- New homework problems and additional text and figures have been added.
Table of Contents
Preface
Chapter 0 Introduction
0.1 Outline of This Book
0.2 Topic Ordering
0.3 Internet and Web Resources
0.4 Useful Publications
Chapter 1 Introduction
1.1 Information and Communication
1.2 Data Communications and Networking for Today's Enterprise
1.3 Convergence and Unified Communications
1.4 The Nature of Business Information Requirements
1.5 Distributed Data Processing
1.6 The Internet and Distributed Applications
1.7 Networks
1.8 The Transmission of Information
1.9 Management Issues
1.10 Standards
1.11 Recommended Web Sites
1.12 Key Terms and Review Questions
Appendix 1A Prefixes for Numerical Units
PART ONE REQUIREMENTS
Chapter 2 Business Information
2.1 Audio
2.2 Data
2.3 Image
2.4 Video
2.5 Performance Measures
Application Note: File Sizes
2.6 Summary
2.7 Recommended Reading and Web Sites
2.8 Key Terms, Review Questions, and Problems
Chapter 3 Distributed Data Processing
3.1 Centralized Versus Distributed Processing
3.2 Forms of Distributed Data Processing
3.3 Distributed Data
3.4 Networking Implications of DDP
Application Note: Distributed Computing Support
3.5 Summary
3.6 Recommended Reading
3.7 Key Terms, Review Questions, and Problems
Case Study I MasterCard International
PART TWO THE INTERNET AND DISTRIBUTED APPLICATIONS
Chapter 4 Internet History and Architecture
4.1 Internet History
4.2 Internet Architecture
4.3 Internet Domains
Application Note: Fitting DNS into your organizational structure
4.4 Summary
4.5 Recommended Reading
4.6 Key Terms, Review Questions, and Problems
Chapter 5 TCP/IP and OSI
5.1 A Simple Protocol Architecture
5.2 The TCP/IP Protocol Architecture
5.3 Internetworking
5.4 The OSI Protocol Architecture
5.5 Virtual Private Networks and IP Security
Application Note: Practical Guide to Networking
5.6 Summary
5.7 Recommended Reading and Web Sites
5.8 Key Terms, Review Questions, and Problems
Appendix 5A TCP and IP Details
Appendix 5B The Trivial File Transfer Protocol
Case Study II Florida Department of Management Services - Part One
Chapter 6 Client/Server and Intranet Computing
6.1 The Growth of Client/Server Computing
6.2 Client/Server Applications
6.3 Middleware
6.4 Intranets
6.5 Extranets
6.6 Service Oriented Architecture
Application Note: To Be Fat or Thin — That is the Question
6.6 Summary
6.7 Recommended Reading and Web Sites
6.8 Key Terms, Review Questions, and Problems
Chapter 7 Internet-Based Applications
7.1 Electronic Mail and SMTP
7.2 Web Access and HTTP
7.3 Web Security
7.4 Internet Telephony and SIP
Application Note: To Serve or Not to Serve?
7.5 Summary
7.6 Recommended Reading and Web Sites
7.7 Key Terms, Review Questions, and Problems
Case Study III ING Life
Chapter 8 Internet Operation
8.1 Internet Addressing
8.2 Internet Routing Protocols
8.3 The Need for Speed and Quality of Service
8.4 Differentiated Services
8.5 Service Level Agreements
8.6 IP Performance Metrics
Application Note: Where Does My Network Address Come From?
8.7 Summary
8.8 Recommended Reading and Web Sites
8.9 Key Terms, Review Questions, and Problems
PART THREE LOCAL AREA NETWORKS
Chapter 9 LAN Architecture and Protocols
9.1 Background
9.2 LAN Configurations
9.3 Guided Transmission Media
9.4 LAN Protocol Architecture
Application Note: Cabling Infrastructure
9.5 Summary
9.6 Recommended Reading and Web Sites
9.7 Key Terms, Review Questions, and Problems
Appendix 9A Decibels and Signal Strength
Chapter 10 Ethernet and Fibre Channel
10.1 The Emergence of High-Speed LANs
10.2 Traditional Ethernet
10.3 Bridges, Hubs, and Switches
10.4 High-Speed Ethernet
Application Note: Networking with Ethernet
10.5 Summary
10.6 Recommended Reading and Web Sites
10.7 Key Terms, Review Questions, and Problems
Case Study IV Carlson Companies
Chapter 11 Wireless LANs
11.1 Overview
11.2 Wi-Fi Architecture and Services
11.3 IEEE 802.11 MAC and Physical Layer Standards
11.4 IEEE 802.11 Security
Application Note: Deploying Wireless LANs
11.5 Summary
11.6 Recommended Reading and Web Sites
11.7 Key Terms, Review Questions, and Problems
Case Study V St. Luke's Episcopal Hospital
PART FOUR WIDE AREA NETWORKS
Chapter 12 Circuit Switching and Packet Switching
12.1 Switching Techniques
12.2 Circuit Switching Networks
12.3 Packet Switching Networks
12.4 Traditional Wide Area Network Alternatives
Application Note: Switching
12.5 Summary
12.6 Recommended Reading and Web Sites
12.7 Key Terms, Review Questions, and Problems
Chapter 13 Frame Relay and ATM
13.1 Wide Area Networking Alternatives
13.2 Frame Relay
13.3 Asynchronous Transfer Mode (ATM)
Application Note: Off-site Connectivity Solutions
13.4 Summary
13.5 Recommended Reading and Web Sites
13.6 Key Terms, Review Questions, and Problems
Case Study VI Florida Department of Management Services - Part Two
Case Study VII Guardian Life Insurance
Chapter 14 Wireless WANs
14.1 Cellular Wireless Networks
14.2 Multiple Access
14.3 Third-Generation Wireless Communications
14.4 Satellite Communications
Application Note: PDAs, Cell Phones, and Laptops
14.5 Summary
14.6 Recommended Reading and Web Sites
14.7 Key Terms, Review Questions, and Problems
Case Study VIII Choice Hotels International
PART FIVE DATA COMMUNICATIONS
Chapter 15 Data Transmission
15.1 Signals for Conveying Information
15.2 Transmission Impairments and Channel Capacity
Application Note: PDAs, Cell Phones, and Laptops
15.3 Summary
15.4 Recommended Reading and Web Sites
15.5 Key Terms, Review Questions, and Problems
Chapter 16 Data Communication Fundamentals
16.1 Analog and Digital Data Communication
16.2 Data Encoding Techniques
16.3 Asynchronous and Synchronous Transmission
16.4 Error Detection
Application Note: Devices, Encoding, Communication Parameters and Protocols
16.5 Summary
16.6 Recommended Reading and Web Sites
16.7 Key Terms, Review Questions, and Problems
Chapter 17 Data Link Control and Multiplexing
17.1 Flow Control and Error Control
17.2 High-Level Data Link Control
17.3 Motivation for Multiplexing
17.4 Frequency-Division Multiplexing
17.5 Synchronous Time-Division Multiplexing
Application Note: Changing Communications
17.6 Summary
17.7 Recommended Reading and Web Sites
17.8 Key Terms, Review Questions, and Problems
Case Study IX Haukeland University Hospital
PART SIX MANAGEMENT ISSUES
Chapter 18 Computer and Network Security Threats
18.1 Computer Security Concepts
18.2 Threats, Attacks, and Assets
18.3 Intruders
18.4 Malicious Software Overview
18.5 Viruses, Worms, and Bots
18.6 Recommended Reading and Web Sites
18.7 Key Terms, Review Questions, and Problems
Chapter 19 Computer and Network Security Techniques
19.1 Virtual Private Networks and IPSec
19.2 SSL and TLS
19.3 Wi-Fi Protected Access
19.4 Intrusion Detection
19.5 Malware Defense
19.6 Recommended Reading
19.7 Key Terms, Review Questions, and Problems
Case Study X The Hacker in All of Us
Chapter 20 Network Management (ONLINE)
20.1 Network Management Requirements
20.2 Network Management Systems
20.3 Technical Control
20.4 Performance Monitoring
20.5 Simple Network Management Protocol (SNMP)
20.6 Summary
20.7 Recommended Reading and Web Sites
20.8 Key Terms, Review Questions, and Problems
Chapter 21 Network Planning and Design (ONLINE)
21.1 The Project Environment – The Big Picture
21.2 Planning
21.3 Design Techniques
21.4 Some Capacity Planning and Network Design Tools
21.5 Recommended Reading
21.6 Key Terms, Review Questions, and Problems
Appendix 21A Some Simple Design Algorithms
Appendix 21B Selling Books Online – A Case Study
Appendix A Business Data Communications Projects
A.1 Animation Projects
A.2 Practical Exercises
A.3 Ethereal Projects
A.4 Research Projects
A.5 Reading/Report Assignments
A.6 Writing Assignments
Glossary
References
Index
ONLINE APPENDICES William Stallings.com/BDC/BDC6e.html
Appendix B Standards Organizations
B.1 The Importance of Standards
B.2 Standards and Regulation
B.3 Standards-Setting Organizations
Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)
C.1 Uniform Resource Locator
C.2 Uniform Resource Identifier
C.3 To Learn More
Appendix D The International Reference Alphabet
Appendix E The TCP/IP Checksum
E.1 Ones-Complement Addition
E.2 Use in TCP and IP
Appendix F IBM's System Network Architecture (SNA)
F.1 Network Architecture
F.2 Advanced Program-to-Program Communication
F.3 Protocol Architecture
Appendix G Fibre Channel
Appendix H Bluetooth
Appendix I Multipath Interference and Orthogonal Frequency Division Multiplexing (OFDM)
Appendix J Cryptographic Algorithms
J.1 Symmetric Encryption
J.2 Public-Key Cryptography
J.3 Secure Hash Functions
Order
Pearson offers affordable and accessible purchase options to meet the needs of your students. Connect with us to learn more.
K12 Educators: Contact your Savvas Learning Company Account General Manager for purchase options. Instant Access ISBNs are for individuals purchasing with credit cards or PayPal.
Savvas Learning Company is a trademark of Savvas Learning Company LLC.
Digital
Paper
About the Author(s)
Dr. William Stallings has authored 17 titles, and counting revised editions, over 41 books on computer security, computer networking, and computer architecture. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He has received the award for the Best Computer Science textbook of the year from the Text and Academic Authors Association 10 times - most recently in 2008 for his text, Computer Security: Principles and Practice.
Dr. Stallings is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. He is a frequent lecturer and author of numerous technical papers. Dr. Stallings created and maintains the Computer Science Student Resource Site, which provides documents and links on subjects of interest to computer science students and professionals. He holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.
Previous editions

Sign In
We're sorry! We don't recognize your username or password. Please try again.
Sign Up
Instructor resource file download
The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning.
Signed out
You have successfully signed out and will be required to sign back in should you need to download more resources.