Business Data Communications- Infrastructure, Networking and Security / Edition 7

Hardcover (Print)
Rent from
(Save 75%)
Est. Return Date: 07/28/2015
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $90.43
Usually ships in 1-2 business days
(Save 48%)
Other sellers (Hardcover)
  • All (22) from $90.43   
  • New (15) from $119.19   
  • Used (7) from $90.43   


For Business Data Communications, Data Communications, and introductory Networking for Business courses. T he content is also appropriate for the Introduction to Networking course in a MBA program.

Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.

The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.

The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.

Read More Show Less

Product Details

  • ISBN-13: 9780133023893
  • Publisher: Pearson
  • Publication date: 9/14/2012
  • Edition description: New Edition
  • Edition number: 7
  • Pages: 624
  • Sales rank: 244,347
  • Product dimensions: 9.20 (w) x 7.20 (h) x 1.00 (d)

Table of Contents

Chapter 0 Reader's and Instructor's Guide

0.1 Outline of This Book

0.2 Topic Ordering

0.3 Internet and Web Resources

0.4 Useful Publications

Chapter 1 Introduction

1.1 Information and Communication

1.2 Data Communications and Networking for Today's Enterprise

1.3 Convergence and Unified Communications

1.4 The Nature of Business Information Requirements

1.5 The Transmission of Information

1.6 Distributed Data Processing

1.7 The Internet and Distributed Applications

1.8 Networks

1.9 Management Issues

1.10 Standards

1.11 Key Terms, Review Questions, and Problems

Appendix 1A Prefixes for Numerical Units

Case Study I Unified Communications at Boeing (ONLINE)


Chapter 2 Business Information

2.1 Audio

2.2 Data

2.3 Image

2.4 Video

2.5 Performance Measures

Application Note: File Sizes

2.6 Summary

2.7 Key Terms, Review Questions, and Problems

Case Study II CORE Credit Union (ONLINE)

Chapter 3 Distributed Data Processing

3.1 Centralized Versus Distributed Processing

3.2 Forms of Distributed Data Processing

3.3 Distributed Data

3.4 Networking Implications of DDP

3.5 Big Data Infrastructure Considerations

3.6 Summary

3.7 Key Terms, Review Questions, and Problems

Case Study III Managing Massive Data Warehouses at MasterCard International (ONLINE)


Chapter 4 Data Transmission

4.1 Signals for Conveying Information

4.2 Transmission Impairments and Channel Capacity

Application Note: Analog Signals

4.3 Summary

4.4 Key Terms, Review Questions, and Problems

Chapter 5 Data Communication Fundamentals

5.1 Analog and Digital Data Communications

5.2 Data Encoding Techniques

5.3 Asynchronous and Synchronous Transmission

5.4 Error Detection

Application Note: Devices, Encoding, Communication Parameters and Protocols

5.5 Summary

5.6 Key Terms, Review Questions, and Problems

Chapter 6 Data Link Control and Multiplexing

6.1 Flow Control and Error Control

6.2 Motivation for Multiplexing

6.3 Frequency-Division Multiplexing

6.4 Synchronous Time-Division Multiplexing

Application Note: Changing Communications

6.5 Summary

6.6 Key Terms, Review Questions, and Problems

Appendix 6A High-Level Data Link Control Protocol

Case Study IV Broadband Access: Global and Local Issues (ONLINE)


Chapter 7 The Internet

7.1 The Structure of the Internet

7.2 Internet Domains

Application Note: Fitting DNS into your organizational structure

7.3 Dynamic Host Configuration Protocol

7.4 Summary

7.5 Key Terms, Review Questions, and Problems

Case Study V Net Neutrality (ONLINE)

Chapter 8 TCP/IP

8.1 A Simple Protocol Architecture

8.2 The TCP/IP Protocol Architecture

8.3 Internetworking

8.4 Virtual Private Networks and IP Security

Application Note: Practical Guide to Networking

8.5 Summary

8.6 Key Terms, Review Questions, and Problems

Appendix 8A TCP, UDP, and IP Details

Appendix 8B The Trivial File Transfer Protocol

Chapter 9 Client/Server, Intranet, and Cloud Computing

9.1 The Growth of Client/Server Computing

9.2 Client/Server Applications

9.3 Middleware

9.4 Intranets

9.5 Extranets

9.6 Service-Oriented Architecture

Application Note: To Be Fat or Thin–That is the Question

9.7 Cloud Computing

9.8 Summary

9.9 Key Terms, Review Questions, and Problems

Case Study VI Shifting Sands: Chevron’s Migration to the Cloud

Chapter 10 Internet-Based Applications

10.1 Electronic Mail

10.2 Web Access and HTTP

10.3 Web Security

10.4 Multimedia Applications

Application Note: To Serve or Not to Serve?

10.5 Acceptable Use Policiess

10.6 Summary

10.7 Key Terms, Review Questions, and Problems

Case Study VII E-Business at Guardian Life (ONLINE)

Chapter 11 Internet Operation

11.1 Internet Addressing

11.2 Internet Routing Protocols

11.3 Multicasting

11.4 Quality of Service

11.5 Differentiated Services

11.6 Service Level Agreements

11.7 IP Performance Metrics

Application Note: Where Does My Network Address Come From?

11.8 Summary

11.9 Key Terms, Review Questions, and Problems


Chapter 12 LAN Architecture and Infrastructure

12.1 Background

12.2 LAN Configuration

12.3 Guided Transmission Media

12.4 LAN Protocol Architecture

Application Note: Cabling Infrastructure

12.5 Summary

12.6 Key Terms, Review Questions, and Problems

Appendix 12A Decibels and Signal Strength

Case Study VIII Carlson Companies

Chapter 13 Ethernet, Switches, and Virtual LANs

13.1 Traditional Ethernet

13.2 Bridges, Hubs, and Switches

13.3 High-Speed Ethernet

Application Note: Networking with Ethernet

13.4 Virtual LANs

13.5 Power over Ethernet

13.6 Summary

13.7 Key Terms, Review Questions, and Problems

Chapter 14 Wireless LANs

14.1 Overview

14.2 Wi-Fi Architecture and Services

14.3 IEEE 802.11 MAC and Physical Layer Standards

14.4 Gigibit WLANs

14.5 IEEE 802.11 Security Considerations

Application Note: Deploying WLANs

14.6 Summary

14.7 Key Terms, Review Questions, and Problems

Case Study IX St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery


Chapter 15 WAN Technology and Protocols

15.1 Switching Techniques

15.2 Circuit-Switching Networks

15.3 Packet-Switching Networks

15.4 Traditional Wide Area Network Alternatives

15.5 Voice over IP

15.6 Presence

15.7 Summary

15.8 Key Terms, Review Questions, and Problems

Chapter 16 WAN Services

16.1 Wide Area Networking Alternatives

16.2 Frame Relay

16.3 Asynchronous Transfer Mode (ATM)

Application Note: Off-site Connectivity Solutions

16.4 Multiprotocol Label Switching (MPLS)

16.5 Wide Area Ethernet

16.6 Summary

16.7 Key Terms, Review Questions, and Problems

Chapter 17 Wireless WANs

17.1 Cellular Wireless Networks

17.2 Multiple Access

17.3 Third-Generation Wireless Communication

17.4 Fourth-Generation Wireless Communciation

17.5 Satellite Communications

Application Note: Laptops, Netbooks, PDAs, and Cell Phones

17.6 Summary

17.7 Key Terms, Review Questions, and Problems

Case Study X Choice Hotels


Chapter 18 Computer and Network Security Threats

18.1 Computer Security Concepts

18.2 Threats, Attacks, and Assets

18.3 Intruders

18.4 Malicious Software Overview

18.5 Viruses, Worms, Bots, and Spam

18.6 Keyloggers, Phishing, Spyware

18.7 Computer Security Trends

18.8 Key Terms, Review Questions, and Problems

Chapter 19 Computer and Network Security Techniques

19.1 Virtual Private Networks and IPsec

19.2 SSL and TLS

19.3 Wi-Fi Protected Access

19.4 Intrusion Detection

19.5 Firewalls

19.6 Malware Defense

Application Note: Security Layers

19.7 Key Terms, Review Questions, and Problems

Case Study XI Cloud Computing (In)Security

Chapter 20 Network Management (ONLINE)

Chapter 21 Network Planning and Design (ONLINE)

Appendix A Business Data Communications Projects

A.1 Animations and Animation Projects

A.2 Practical Exercises

A.3 Wireshark Projects

A.4 Research Projects

A.5 Security Case Studies

A.6 Reading/Report Assignments

A.7 Writing Assignments





Chapter 20 Network Management (ONLINE)

20.1 Network Management Requirements

20.2 Network Management Systems

20.3 Simple Network Management Protocol (SNMP)

Application Note: How Much Management?

20.4 Key Terms, Review Questions, and Problems

Chapter 21 Network Planning and Design (ONLINE)

21.1 The Project Environment–The Big Picture

21.2 Planning

21.3 Design Techniques

21.4 Some Capacity Planning and Network Design Tools

Appendix 21A Some Simple Design Algorithms

Appendix 21B Selling Books Online–A Case Study

Appendix B Standards Organizations

B.1 The Importance of Standards

B.2 Standards and Regulation

B.3 Standards-Setting Organizations

Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)

C.1 Uniform Resource Locator

C.2 Uniform Resource Identifier

C.3 To Learn More

Appendix D The International Reference Alphabet

Appendix E The TCP/IP Checksum

E.1 Ones-Complement Addition

E.2 Use in TCP and IP

Appendix F IBM's System Network Architecture (SNA)

F.1 Network Architecture

F.2 Advanced Program-to-Program Communication

F.3 Protocol Architecture

Appendix G Fibre Channel

G.1 Fibre Channel Elements

G.2 Fibre Channel Protocol Architecture

Appendix H Bluetooth

H.1 Bluetooth Applications

H.2 Bluetooth Standards Documents

H.3 Protocol Architecture

H.4 Usage Models

H.5 Piconets and Scatternets

Appendix I Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM)

I.1 Multipath Interference

I.2 Orthogonal Frequency-Division Multiplexing

Appendix J Cryptographic Algorithms

J.1 Symmetric Encryption

J.2 Public-Key Cryptography

J.3 Message Authentication and Hash Functions

J.4 Secure Hash Functions

Appendix K Sliding-Window Flow Control and Error Control

K.1 Flow Control

K.2 Error Control

Appendix L The OSI Model

L.1 The Model

L.2 The OSI Layers

Appendix M Code Division Multiple Access

[1] Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)