Business Data Communications / Edition 6 by William Stallings | 9780136067412 | Hardcover | Barnes & Noble
Business Data Communications / Edition 6

Business Data Communications / Edition 6

1.0 1
by William Stallings
     
 

ISBN-10: 0136067417

ISBN-13: 9780136067412

Pub. Date: 10/17/2008

Publisher: Prentice Hall

Business Data Communications, 6/e, is ideal for use in Business Data Communications, Data Communications, and introductory Networking for Business courses.

Business Data Communications, 6/e,covers the fundamentals of data communications, networking, distributed applications, and network management and security. Stallings presents

Overview

Business Data Communications, 6/e, is ideal for use in Business Data Communications, Data Communications, and introductory Networking for Business courses.

Business Data Communications, 6/e,covers the fundamentals of data communications, networking, distributed applications, and network management and security. Stallings presents these concepts in a way that relates specifically to the business environment and the concerns of business management and staff, structuring his text around requirements, ingredients, and applications. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications. Throughout the text, references to the interactive, online animations supply a powerful tool in understanding complex protocol mechanisms.

The Sixth Edition maintains Stallings' superlative support for either a research projects or modeling projects component in the course. The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.

Product Details

ISBN-13:
9780136067412
Publisher:
Prentice Hall
Publication date:
10/17/2008
Series:
Alternative eText Formats Series
Edition description:
Older Edition
Pages:
624
Product dimensions:
7.20(w) x 9.20(h) x 1.10(d)

Table of Contents

Preface

Chapter 0 Introduction

0.1 Outline of This Book

0.2 Topic Ordering

0.3 Internet and Web Resources

0.4 Useful Publications

Chapter 1 Introduction

1.1 Information and Communication

1.2 Data Communications and Networking for Today's Enterprise

1.3 Convergence and Unified Communications

1.4 The Nature of Business Information Requirements

1.5 Distributed Data Processing

1.6 The Internet and Distributed Applications

1.7 Networks

1.8 The Transmission of Information

1.9 Management Issues

1.10 Standards

1.11 Recommended Web Sites

1.12 Key Terms and Review Questions

Appendix 1A Prefixes for Numerical Units

PART ONE REQUIREMENTS

Chapter 2 Business Information

2.1 Audio

2.2 Data

2.3 Image

2.4 Video

2.5 Performance Measures

Application Note: File Sizes

2.6 Summary

2.7 Recommended Reading and Web Sites

2.8 Key Terms, Review Questions, and Problems

Chapter 3 Distributed Data Processing

3.1 Centralized Versus Distributed Processing

3.2 Forms of Distributed Data Processing

3.3 Distributed Data

3.4 Networking Implications of DDP

Application Note: Distributed Computing Support

3.5 Summary

3.6 Recommended Reading

3.7 Key Terms, Review Questions, and Problems

Case Study I MasterCard International

PART TWO THE INTERNET AND DISTRIBUTED APPLICATIONS

Chapter 4 Internet History and Architecture

4.1 Internet History

4.2 Internet Architecture

4.3 Internet Domains

Application Note: Fitting DNS into your organizational structure

4.4 Summary

4.5 Recommended Reading

4.6 Key Terms, Review Questions, and Problems

Chapter 5 TCP/IP and OSI

5.1 A Simple Protocol Architecture

5.2 The TCP/IP Protocol Architecture

5.3 Internetworking

5.4 The OSI Protocol Architecture

5.5 Virtual Private Networks and IP Security

Application Note: Practical Guide to Networking

5.6 Summary

5.7 Recommended Reading and Web Sites

5.8 Key Terms, Review Questions, and Problems

Appendix 5A TCP and IP Details

Appendix 5B The Trivial File Transfer Protocol

Case Study II Florida Department of Management Services - Part One

Chapter 6 Client/Server and Intranet Computing

6.1 The Growth of Client/Server Computing

6.2 Client/Server Applications

6.3 Middleware

6.4 Intranets

6.5 Extranets

6.6 Service Oriented Architecture

Application Note: To Be Fat or Thin — That is the Question

6.6 Summary

6.7 Recommended Reading and Web Sites

6.8 Key Terms, Review Questions, and Problems

Chapter 7 Internet-Based Applications

7.1 Electronic Mail and SMTP

7.2 Web Access and HTTP

7.3 Web Security

7.4 Internet Telephony and SIP

Application Note: To Serve or Not to Serve?

7.5 Summary

7.6 Recommended Reading and Web Sites

7.7 Key Terms, Review Questions, and Problems

Case Study III ING Life

Chapter 8 Internet Operation

8.1 Internet Addressing

8.2 Internet Routing Protocols

8.3 The Need for Speed and Quality of Service

8.4 Differentiated Services

8.5 Service Level Agreements

8.6 IP Performance Metrics

Application Note: Where Does My Network Address Come From?

8.7 Summary

8.8 Recommended Reading and Web Sites

8.9 Key Terms, Review Questions, and Problems

PART THREE LOCAL AREA NETWORKS

Chapter 9 LAN Architecture and Protocols

9.1 Background

9.2 LAN Configurations

9.3 Guided Transmission Media

9.4 LAN Protocol Architecture

Application Note: Cabling Infrastructure

9.5 Summary

9.6 Recommended Reading and Web Sites

9.7 Key Terms, Review Questions, and Problems

Appendix 9A Decibels and Signal Strength

Chapter 10 Ethernet and Fibre Channel

10.1 The Emergence of High-Speed LANs

10.2 Traditional Ethernet

10.3 Bridges, Hubs, and Switches

10.4 High-Speed Ethernet

Application Note: Networking with Ethernet

10.5 Summary

10.6 Recommended Reading and Web Sites

10.7 Key Terms, Review Questions, and Problems

Case Study IV Carlson Companies

Chapter 11 Wireless LANs

11.1 Overview

11.2 Wi-Fi Architecture and Services

11.3 IEEE 802.11 MAC and Physical Layer Standards

11.4 IEEE 802.11 Security

Application Note: Deploying Wireless LANs

11.5 Summary

11.6 Recommended Reading and Web Sites

11.7 Key Terms, Review Questions, and Problems

Case Study V St. Luke's Episcopal Hospital

PART FOUR WIDE AREA NETWORKS

Chapter 12 Circuit Switching and Packet Switching

12.1 Switching Techniques

12.2 Circuit Switching Networks

12.3 Packet Switching Networks

12.4 Traditional Wide Area Network Alternatives

Application Note: Switching

12.5 Summary

12.6 Recommended Reading and Web Sites

12.7 Key Terms, Review Questions, and Problems

Chapter 13 Frame Relay and ATM

13.1 Wide Area Networking Alternatives

13.2 Frame Relay

13.3 Asynchronous Transfer Mode (ATM)

Application Note: Off-site Connectivity Solutions

13.4 Summary

13.5 Recommended Reading and Web Sites

13.6 Key Terms, Review Questions, and Problems

Case Study VI Florida Department of Management Services - Part Two

Case Study VII Guardian Life Insurance

Chapter 14 Wireless WANs

14.1 Cellular Wireless Networks

14.2 Multiple Access

14.3 Third-Generation Wireless Communications

14.4 Satellite Communications

Application Note: PDAs, Cell Phones, and Laptops

14.5 Summary

14.6 Recommended Reading and Web Sites

14.7 Key Terms, Review Questions, and Problems

Case Study VIII Choice Hotels International

PART FIVE DATA COMMUNICATIONS

Chapter 15 Data Transmission

15.1 Signals for Conveying Information

15.2 Transmission Impairments and Channel Capacity

Application Note: PDAs, Cell Phones, and Laptops

15.3 Summary

15.4 Recommended Reading and Web Sites

15.5 Key Terms, Review Questions, and Problems

Chapter 16 Data Communication Fundamentals

16.1 Analog and Digital Data Communication

16.2 Data Encoding Techniques

16.3 Asynchronous and Synchronous Transmission

16.4 Error Detection

Application Note: Devices, Encoding, Communication Parameters and Protocols

16.5 Summary

16.6 Recommended Reading and Web Sites

16.7 Key Terms, Review Questions, and Problems

Chapter 17 Data Link Control and Multiplexing

17.1 Flow Control and Error Control

17.2 High-Level Data Link Control

17.3 Motivation for Multiplexing

17.4 Frequency-Division Multiplexing

17.5 Synchronous Time-Division Multiplexing

Application Note: Changing Communications

17.6 Summary

17.7 Recommended Reading and Web Sites

17.8 Key Terms, Review Questions, and Problems

Case Study IX Haukeland University Hospital

PART SIX MANAGEMENT ISSUES

Chapter 18 Computer and Network Security Threats

18.1 Computer Security Concepts

18.2 Threats, Attacks, and Assets

18.3 Intruders

18.4 Malicious Software Overview

18.5 Viruses, Worms, and Bots

18.6 Recommended Reading and Web Sites

18.7 Key Terms, Review Questions, and Problems

Chapter 19 Computer and Network Security Techniques

19.1 Virtual Private Networks and IPSec

19.2 SSL and TLS

19.3 Wi-Fi Protected Access

19.4 Intrusion Detection

19.5 Malware Defense

19.6 Recommended Reading

19.7 Key Terms, Review Questions, and Problems

Case Study X The Hacker in All of Us

Chapter 20 Network Management (ONLINE)

20.1 Network Management Requirements

20.2 Network Management Systems

20.3 Technical Control

20.4 Performance Monitoring

20.5 Simple Network Management Protocol (SNMP)

20.6 Summary

20.7 Recommended Reading and Web Sites

20.8 Key Terms, Review Questions, and Problems

Chapter 21 Network Planning and Design (ONLINE)

21.1 The Project Environment – The Big Picture

21.2 Planning

21.3 Design Techniques

21.4 Some Capacity Planning and Network Design Tools

21.5 Recommended Reading

21.6 Key Terms, Review Questions, and Problems

Appendix 21A Some Simple Design Algorithms

Appendix 21B Selling Books Online – A Case Study

Appendix A Business Data Communications Projects

A.1 Animation Projects

A.2 Practical Exercises

A.3 Ethereal Projects

A.4 Research Projects

A.5 Reading/Report Assignments

A.6 Writing Assignments

Glossary

References

Index

ONLINE APPENDICES William Stallings.com/BDC/BDC6e.html

Appendix B Standards Organizations

B.1 The Importance of Standards

B.2 Standards and Regulation

B.3 Standards-Setting Organizations

Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)

C.1 Uniform Resource Locator

C.2 Uniform Resource Identifier

C.3 To Learn More

Appendix D The International Reference Alphabet

Appendix E The TCP/IP Checksum

E.1 Ones-Complement Addition

E.2 Use in TCP and IP

Appendix F IBM's System Network Architecture (SNA)

F.1 Network Architecture

F.2 Advanced Program-to-Program Communication

F.3 Protocol Architecture

Appendix G Fibre Channel

Appendix H Bluetooth

Appendix I Multipath Interference and Orthogonal Frequency Division Multiplexing (OFDM)

Appendix J Cryptographic Algorithms

J.1 Symmetric Encryption

J.2 Public-Key Cryptography

J.3 Secure Hash Functions

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >