Business Data Communications- Infrastructure, Networking and Security, 7th Edition
©2013 |Pearson | Available
William Stallings
Tom Case
©2013 |Pearson | Available
Introducing Pearson+ 1500+ eTexts and study tools, all in one place. Subscriptions starting at $9.99/month.
K-12 educators: This link is for individuals purchasing with credit cards or PayPal only. Contact your Savvas Learning Company Account General Manager for purchase options.
For Business Data Communications, Data Communications, and introductory Networking for Business courses. The content is also appropriate for the Introduction to Networking course in a MBA program.
Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.
In the four years since the sixth edition of this book was published, the field has seen continued innovations and improvements. In this new edition, we try to capture these changes while maintaining a broad and comprehensive coverage of the entire field. To begin this process of revision, the sixth edition of this book was extensively reviewed by a number of professors who teach the subject and by professionals working in the field. The result is that, in many places, the narrative has been clarified and tightened, and illustrations have been improved. Beyond the refinements to improve pedagogy and user-friendliness, there have been substantive changes throughout the book. Much of the material has been revised and new material has been added. The most noteworthy changes are as follows:
Chapter 0 Reader's and Instructor's Guide
0.1 Outline of This Book
0.2 Topic Ordering
0.3 Internet and Web Resources
0.4 Useful Publications
Chapter 1 Introduction
1.1 Information and Communication
1.2 Data Communications and Networking for Today's Enterprise
1.3 Convergence and Unified Communications
1.4 The Nature of Business Information Requirements
1.5 The Transmission of Information
1.6 Distributed Data Processing
1.7 The Internet and Distributed Applications
1.8 Networks
1.9 Management Issues
1.10 Standards
1.11 Key Terms, Review Questions, and Problems
Appendix 1A Prefixes for Numerical Units
Case Study I Unified Communications at Boeing (ONLINE)
PART ONE REQUIREMENTS
Chapter 2 Business Information
2.1 Audio
2.2 Data
2.3 Image
2.4 Video
2.5 Performance Measures
Application Note: File Sizes
2.6 Summary
2.7 Key Terms, Review Questions, and Problems
Case Study II CORE Credit Union (ONLINE)
Chapter 3 Distributed Data Processing
3.1 Centralized Versus Distributed Processing
3.2 Forms of Distributed Data Processing
3.3 Distributed Data
3.4 Networking Implications of DDP
3.5 Big Data Infrastructure Considerations
3.6 Summary
3.7 Key Terms, Review Questions, and Problems
Case Study III Managing Massive Data Warehouses at MasterCard International (ONLINE)
PART TWO DATA COMMUNICATIONS
Chapter 4 Data Transmission
4.1 Signals for Conveying Information
4.2 Transmission Impairments and Channel Capacity
Application Note: Analog Signals
4.3 Summary
4.4 Key Terms, Review Questions, and Problems
Chapter 5 Data Communication Fundamentals
5.1 Analog and Digital Data Communications
5.2 Data Encoding Techniques
5.3 Asynchronous and Synchronous Transmission
5.4 Error Detection
Application Note: Devices, Encoding, Communication Parameters and Protocols
5.5 Summary
5.6 Key Terms, Review Questions, and Problems
Chapter 6 Data Link Control and Multiplexing
6.1 Flow Control and Error Control
6.2 Motivation for Multiplexing
6.3 Frequency-Division Multiplexing
6.4 Synchronous Time-Division Multiplexing
Application Note: Changing Communications
6.5 Summary
6.6 Key Terms, Review Questions, and Problems
Appendix 6A High-Level Data Link Control Protocol
Case Study IV Broadband Access: Global and Local Issues (ONLINE)
PART THREE THE INTERNET AND DISTRIBUTED APPLICATIONS
Chapter 7 The Internet
7.1 The Structure of the Internet
7.2 Internet Domains
Application Note: Fitting DNS into your organizational structure
7.3 Dynamic Host Configuration Protocol
7.4 Summary
7.5 Key Terms, Review Questions, and Problems
Case Study V Net Neutrality (ONLINE)
Chapter 8 TCP/IP
8.1 A Simple Protocol Architecture
8.2 The TCP/IP Protocol Architecture
8.3 Internetworking
8.4 Virtual Private Networks and IP Security
Application Note: Practical Guide to Networking
8.5 Summary
8.6 Key Terms, Review Questions, and Problems
Appendix 8A TCP, UDP, and IP Details
Appendix 8B The Trivial File Transfer Protocol
Chapter 9 Client/Server, Intranet, and Cloud Computing
9.1 The Growth of Client/Server Computing
9.2 Client/Server Applications
9.3 Middleware
9.4 Intranets
9.5 Extranets
9.6 Service-Oriented Architecture
Application Note: To Be Fat or Thin–That is the Question
9.7 Cloud Computing
9.8 Summary
9.9 Key Terms, Review Questions, and Problems
Case Study VI Shifting Sands: Chevron’s Migration to the Cloud
Chapter 10 Internet-Based Applications
10.1 Electronic Mail
10.2 Web Access and HTTP
10.3 Web Security
10.4 Multimedia Applications
Application Note: To Serve or Not to Serve?
10.5 Acceptable Use Policiess
10.6 Summary
10.7 Key Terms, Review Questions, and Problems
Case Study VII E-Business at Guardian Life (ONLINE)
Chapter 11 Internet Operation
11.1 Internet Addressing
11.2 Internet Routing Protocols
11.3 Multicasting
11.4 Quality of Service
11.5 Differentiated Services
11.6 Service Level Agreements
11.7 IP Performance Metrics
Application Note: Where Does My Network Address Come From?
11.8 Summary
11.9 Key Terms, Review Questions, and Problems
PART FOUR LOCAL AREA NETWORKS
Chapter 12 LAN Architecture and Infrastructure
12.1 Background
12.2 LAN Configuration
12.3 Guided Transmission Media
12.4 LAN Protocol Architecture
Application Note: Cabling Infrastructure
12.5 Summary
12.6 Key Terms, Review Questions, and Problems
Appendix 12A Decibels and Signal Strength
Case Study VIII Carlson Companies
Chapter 13 Ethernet, Switches, and Virtual LANs
13.1 Traditional Ethernet
13.2 Bridges, Hubs, and Switches
13.3 High-Speed Ethernet
Application Note: Networking with Ethernet
13.4 Virtual LANs
13.5 Power over Ethernet
13.6 Summary
13.7 Key Terms, Review Questions, and Problems
Chapter 14 Wireless LANs
14.1 Overview
14.2 Wi-Fi Architecture and Services
14.3 IEEE 802.11 MAC and Physical Layer Standards
14.4 Gigibit WLANs
14.5 IEEE 802.11 Security Considerations
Application Note: Deploying WLANs
14.6 Summary
14.7 Key Terms, Review Questions, and Problems
Case Study IX St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery
PART FIVE WIDE AREA NETWORKS
Chapter 15 WAN Technology and Protocols
15.1 Switching Techniques
15.2 Circuit-Switching Networks
15.3 Packet-Switching Networks
15.4 Traditional Wide Area Network Alternatives
15.5 Voice over IP
15.6 Presence
15.7 Summary
15.8 Key Terms, Review Questions, and Problems
Chapter 16 WAN Services
16.1 Wide Area Networking Alternatives
16.2 Frame Relay
16.3 Asynchronous Transfer Mode (ATM)
Application Note: Off-site Connectivity Solutions
16.4 Multiprotocol Label Switching (MPLS)
16.5 Wide Area Ethernet
16.6 Summary
16.7 Key Terms, Review Questions, and Problems
Chapter 17 Wireless WANs
17.1 Cellular Wireless Networks
17.2 Multiple Access
17.3 Third-Generation Wireless Communication
17.4 Fourth-Generation Wireless Communciation
17.5 Satellite Communications
Application Note: Laptops, Netbooks, PDAs, and Cell Phones
17.6 Summary
17.7 Key Terms, Review Questions, and Problems
Case Study X Choice Hotels
PART SIX MANAGEMENT ISSUES
Chapter 18 Computer and Network Security Threats
18.1 Computer Security Concepts
18.2 Threats, Attacks, and Assets
18.3 Intruders
18.4 Malicious Software Overview
18.5 Viruses, Worms, Bots, and Spam
18.6 Keyloggers, Phishing, Spyware
18.7 Computer Security Trends
18.8 Key Terms, Review Questions, and Problems
Chapter 19 Computer and Network Security Techniques
19.1 Virtual Private Networks and IPsec
19.2 SSL and TLS
19.3 Wi-Fi Protected Access
19.4 Intrusion Detection
19.5 Firewalls
19.6 Malware Defense
Application Note: Security Layers
19.7 Key Terms, Review Questions, and Problems
Case Study XI Cloud Computing (In)Security
Chapter 20 Network Management (ONLINE)
Chapter 21 Network Planning and Design (ONLINE)
Appendix A Business Data Communications Projects
A.1 Animations and Animation Projects
A.2 Practical Exercises
A.3 Wireshark Projects
A.4 Research Projects
A.5 Security Case Studies
A.6 Reading/Report Assignments
A.7 Writing Assignments
Glossary
References
Index
ONLINE CHAPTERS AND APPENDICES[1]
Chapter 20 Network Management (ONLINE)
20.1 Network Management Requirements
20.2 Network Management Systems
20.3 Simple Network Management Protocol (SNMP)
Application Note: How Much Management?
20.4 Key Terms, Review Questions, and Problems
Chapter 21 Network Planning and Design (ONLINE)
21.1 The Project Environment–The Big Picture
21.2 Planning
21.3 Design Techniques
21.4 Some Capacity Planning and Network Design Tools
Appendix 21A Some Simple Design Algorithms
Appendix 21B Selling Books Online–A Case Study
Appendix B Standards Organizations
B.1 The Importance of Standards
B.2 Standards and Regulation
B.3 Standards-Setting Organizations
Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)
C.1 Uniform Resource Locator
C.2 Uniform Resource Identifier
C.3 To Learn More
Appendix D The International Reference Alphabet
Appendix E The TCP/IP Checksum
E.1 Ones-Complement Addition
E.2 Use in TCP and IP
Appendix F IBM's System Network Architecture (SNA)
F.1 Network Architecture
F.2 Advanced Program-to-Program Communication
F.3 Protocol Architecture
Appendix G Fibre Channel
G.1 Fibre Channel Elements
G.2 Fibre Channel Protocol Architecture
Appendix H Bluetooth
H.1 Bluetooth Applications
H.2 Bluetooth Standards Documents
H.3 Protocol Architecture
H.4 Usage Models
H.5 Piconets and Scatternets
Appendix I Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM)
I.1 Multipath Interference
I.2 Orthogonal Frequency-Division Multiplexing
Appendix J Cryptographic Algorithms
J.1 Symmetric Encryption
J.2 Public-Key Cryptography
J.3 Message Authentication and Hash Functions
J.4 Secure Hash Functions
Appendix K Sliding-Window Flow Control and Error Control
K.1 Flow Control
K.2 Error Control
Appendix L The OSI Model
L.1 The Model
L.2 The OSI Layers
Appendix M Code Division Multiple Access
[1] Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book.
Download Figures (application/zip) (84.9MB)
Companion Website for Business Data Communications- Infrastructure, Networking and Security, 7th Edition
Stallings
©2013
Format | Website | |
ISBN-13: | 9780133023909 | |
Online purchase price | $24.99 | |
Availability |
Live
|
Pearson offers affordable and accessible purchase options to meet the needs of your students. Connect with us to learn more.
K12 Educators: Contact your Savvas Learning Company Account General Manager for purchase options. Instant Access ISBNs are for individuals purchasing with credit cards or PayPal.
Savvas Learning Company is a trademark of Savvas Learning Company LLC.
Stallings
©2013  | Pearson
Format | Website | |
ISBN-13: | 9780133023909 | |
Online purchase price | $24.99 | Students, buy access |
Availability |
Live
|
Stallings & Case
©2012  | Pearson
Format | Electronic Book | |
ISBN-13: | 9780137558469 | |
Online purchase price | $39.96 | Students, buy or rent this eText |
Availability |
Live
|
Stallings & Case
©2013  | Pearson  | 624 pp
We're sorry! We don't recognize your username or password. Please try again.
The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning.
You have successfully signed out and will be required to sign back in should you need to download more resources.