Business Data Communications
Pearson (Verlag)
978-0-13-606741-2 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
Business Data Communications, 6/e,covers the fundamentals of data communications, networking, distributed applications, and network management and security. Stallings presents these concepts in a way that relates specifically to the business environment and the concerns of business management and staff, structuring his text around requirements, ingredients, and applications. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications. Throughout the text, references to the interactive, online animations supply a powerful tool in understanding complex protocol mechanisms.
The Sixth Edition maintains Stallings' superlative support for either a research projects or modeling projects component in the course. The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
Dr. William Stallings has authored 17 titles, and counting revised editions, over 41 books on computer security, computer networking, and computer architecture. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He has received the award for the Best Computer Science textbook of the year from the Text and Academic Authors Association 10 times - most recently in 2008 for his text, Computer Security: Principles and Practice. Dr. Stallings is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. He is a frequent lecturer and author of numerous technical papers. Dr. Stallings created and maintains the Computer Science Student Resource Site, which provides documents and links on subjects of interest to computer science students and professionals. He holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.
Preface
Chapter 0 Introduction 0.1 Outline of This Book
0.2 Topic Ordering
0.3 Internet and Web Resources
0.4 Useful Publications
Chapter 1 Introduction 1.1 Information and Communication
1.2 Data Communications and Networking for Today's Enterprise
1.3 Convergence and Unified Communications
1.4 The Nature of Business Information Requirements
1.5 Distributed Data Processing
1.6 The Internet and Distributed Applications
1.7 Networks
1.8 The Transmission of Information
1.9 Management Issues
1.10 Standards
1.11 Recommended Web Sites
1.12 Key Terms and Review Questions
Appendix 1A Prefixes for Numerical Units
PART ONE REQUIREMENTS
Chapter 2 Business Information 2.1 Audio
2.2 Data
2.3 Image
2.4 Video
2.5 Performance Measures
Application Note: File Sizes
2.6 Summary
2.7 Recommended Reading and Web Sites
2.8 Key Terms, Review Questions, and Problems
Chapter 3 Distributed Data Processing 3.1 Centralized Versus Distributed Processing
3.2 Forms of Distributed Data Processing
3.3 Distributed Data
3.4 Networking Implications of DDP
Application Note: Distributed Computing Support
3.5 Summary
3.6 Recommended Reading
3.7 Key Terms, Review Questions, and Problems
Case Study I MasterCard International
PART TWO THE INTERNET AND DISTRIBUTED APPLICATIONS
Chapter 4 Internet History and Architecture 4.1 Internet History
4.2 Internet Architecture
4.3 Internet Domains
Application Note: Fitting DNS into your organizational structure
4.4 Summary
4.5 Recommended Reading
4.6 Key Terms, Review Questions, and Problems
Chapter 5 TCP/IP and OSI 5.1 A Simple Protocol Architecture
5.2 The TCP/IP Protocol Architecture
5.3 Internetworking
5.4 The OSI Protocol Architecture
5.5 Virtual Private Networks and IP Security
Application Note: Practical Guide to Networking
5.6 Summary
5.7 Recommended Reading and Web Sites
5.8 Key Terms, Review Questions, and Problems
Appendix 5A TCP and IP Details
Appendix 5B The Trivial File Transfer Protocol
Case Study II Florida Department of Management Services - Part One
Chapter 6 Client/Server and Intranet Computing 6.1 The Growth of Client/Server Computing
6.2 Client/Server Applications
6.3 Middleware
6.4 Intranets
6.5 Extranets
6.6 Service Oriented Architecture
Application Note: To Be Fat or Thin — That is the Question
6.6 Summary
6.7 Recommended Reading and Web Sites
6.8 Key Terms, Review Questions, and Problems
Chapter 7 Internet-Based Applications 7.1 Electronic Mail and SMTP
7.2 Web Access and HTTP
7.3 Web Security
7.4 Internet Telephony and SIP
Application Note: To Serve or Not to Serve?
7.5 Summary
7.6 Recommended Reading and Web Sites
7.7 Key Terms, Review Questions, and Problems
Case Study III ING Life
Chapter 8 Internet Operation 8.1 Internet Addressing
8.2 Internet Routing Protocols
8.3 The Need for Speed and Quality of Service
8.4 Differentiated Services
8.5 Service Level Agreements
8.6 IP Performance Metrics
Application Note: Where Does My Network Address Come From?
8.7 Summary
8.8 Recommended Reading and Web Sites
8.9 Key Terms, Review Questions, and Problems
PART THREE LOCAL AREA NETWORKS
Chapter 9 LAN Architecture and Protocols 9.1 Background
9.2 LAN Configurations
9.3 Guided Transmission Media
9.4 LAN Protocol Architecture
Application Note: Cabling Infrastructure
9.5 Summary
9.6 Recommended Reading and Web Sites
9.7 Key Terms, Review Questions, and Problems
Appendix 9A Decibels and Signal Strength
Chapter 10 Ethernet and Fibre Channel 10.1 The Emergence of High-Speed LANs
10.2 Traditional Ethernet
10.3 Bridges, Hubs, and Switches
10.4 High-Speed Ethernet
Application Note: Networking with Ethernet
10.5 Summary
10.6 Recommended Reading and Web Sites
10.7 Key Terms, Review Questions, and Problems
Case Study IV Carlson Companies
Chapter 11 Wireless LANs 11.1 Overview
11.2 Wi-Fi Architecture and Services
11.3 IEEE 802.11 MAC and Physical Layer Standards
11.4 IEEE 802.11 Security
Application Note: Deploying Wireless LANs
11.5 Summary
11.6 Recommended Reading and Web Sites
11.7 Key Terms, Review Questions, and Problems
Case Study V St. Luke's Episcopal Hospital
PART FOUR WIDE AREA NETWORKS
Chapter 12 Circuit Switching and Packet Switching 12.1 Switching Techniques
12.2 Circuit Switching Networks
12.3 Packet Switching Networks
12.4 Traditional Wide Area Network Alternatives
Application Note: Switching
12.5 Summary
12.6 Recommended Reading and Web Sites
12.7 Key Terms, Review Questions, and Problems
Chapter 13 Frame Relay and ATM 13.1 Wide Area Networking Alternatives
13.2 Frame Relay
13.3 Asynchronous Transfer Mode (ATM)
Application Note: Off-site Connectivity Solutions
13.4 Summary
13.5 Recommended Reading and Web Sites
13.6 Key Terms, Review Questions, and Problems
Case Study VI Florida Department of Management Services - Part Two
Case Study VII Guardian Life Insurance
Chapter 14 Wireless WANs 14.1 Cellular Wireless Networks
14.2 Multiple Access
14.3 Third-Generation Wireless Communications
14.4 Satellite Communications
Application Note: PDAs, Cell Phones, and Laptops
14.5 Summary
14.6 Recommended Reading and Web Sites
14.7 Key Terms, Review Questions, and Problems
Case Study VIII Choice Hotels International
PART FIVE DATA COMMUNICATIONS
Chapter 15 Data Transmission 15.1 Signals for Conveying Information
15.2 Transmission Impairments and Channel Capacity
Application Note: PDAs, Cell Phones, and Laptops
15.3 Summary
15.4 Recommended Reading and Web Sites
15.5 Key Terms, Review Questions, and Problems
Chapter 16 Data Communication Fundamentals 16.1 Analog and Digital Data Communication
16.2 Data Encoding Techniques
16.3 Asynchronous and Synchronous Transmission
16.4 Error Detection
Application Note: Devices, Encoding, Communication Parameters and Protocols
16.5 Summary
16.6 Recommended Reading and Web Sites
16.7 Key Terms, Review Questions, and Problems
Chapter 17 Data Link Control and Multiplexing 17.1 Flow Control and Error Control
17.2 High-Level Data Link Control
17.3 Motivation for Multiplexing
17.4 Frequency-Division Multiplexing
17.5 Synchronous Time-Division Multiplexing
Application Note: Changing Communications
17.6 Summary
17.7 Recommended Reading and Web Sites
17.8 Key Terms, Review Questions, and Problems
Case Study IX Haukeland University Hospital
PART SIX MANAGEMENT ISSUES
Chapter 18 Computer and Network Security Threats 18.1 Computer Security Concepts
18.2 Threats, Attacks, and Assets
18.3 Intruders
18.4 Malicious Software Overview
18.5 Viruses, Worms, and Bots
18.6 Recommended Reading and Web Sites
18.7 Key Terms, Review Questions, and Problems
Chapter 19 Computer and Network Security Techniques 19.1 Virtual Private Networks and IPSec
19.2 SSL and TLS
19.3 Wi-Fi Protected Access
19.4 Intrusion Detection
19.5 Malware Defense
19.6 Recommended Reading
19.7 Key Terms, Review Questions, and Problems
Case Study X The Hacker in All of Us
Chapter 20 Network Management (ONLINE) 20.1 Network Management Requirements
20.2 Network Management Systems
20.3 Technical Control
20.4 Performance Monitoring
20.5 Simple Network Management Protocol (SNMP)
20.6 Summary
20.7 Recommended Reading and Web Sites
20.8 Key Terms, Review Questions, and Problems
Chapter 21 Network Planning and Design (ONLINE) 21.1 The Project Environment – The Big Picture
21.2 Planning
21.3 Design Techniques
21.4 Some Capacity Planning and Network Design Tools
21.5 Recommended Reading
21.6 Key Terms, Review Questions, and Problems
Appendix 21A Some Simple Design Algorithms
Appendix 21B Selling Books Online – A Case Study
Appendix A Business Data Communications Projects A.1 Animation Projects
A.2 Practical Exercises
A.3 Ethereal Projects
A.4 Research Projects
A.5 Reading/Report Assignments
A.6 Writing Assignments
Glossary
References
Index
ONLINE APPENDICES William Stallings.com/BDC/BDC6e.html
Appendix B Standards Organizations B.1 The Importance of Standards
B.2 Standards and Regulation
B.3 Standards-Setting Organizations
Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs) C.1 Uniform Resource Locator
C.2 Uniform Resource Identifier
C.3 To Learn More
Appendix D The International Reference Alphabet
Appendix E The TCP/IP Checksum E.1 Ones-Complement Addition
E.2 Use in TCP and IP
Appendix F IBM's System Network Architecture (SNA) F.1 Network Architecture
F.2 Advanced Program-to-Program Communication
F.3 Protocol Architecture
Appendix G Fibre Channel
Appendix H Bluetooth
Appendix I Multipath Interference and Orthogonal Frequency Division Multiplexing (OFDM)
Appendix J Cryptographic Algorithms J.1 Symmetric Encryption
J.2 Public-Key Cryptography
J.3 Secure Hash Functions
Erscheint lt. Verlag | 28.11.2008 |
---|---|
Sprache | englisch |
Maße | 178 x 235 mm |
Gewicht | 1021 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Mathematik / Informatik ► Mathematik ► Finanz- / Wirtschaftsmathematik | |
ISBN-10 | 0-13-606741-7 / 0136067417 |
ISBN-13 | 978-0-13-606741-2 / 9780136067412 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich