Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Business Data Communications - William Stallings, Tom Case

Business Data Communications

Infrastructure, Networking and Security
Buch | Hardcover
624 Seiten
2012 | 7th edition
Pearson (Verlag)
978-0-13-302389-3 (ISBN)
CHF 229,95 inkl. MwSt
  • Titel erscheint in neuer Auflage
  • Artikel merken
For Business Data Communications, Data Communications, and introductory Networking for Business courses. T he content is also appropriate for the Introduction to Networking course in a MBA program.




Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.



The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.

Table of Contents



Chapter 0 Reader's and Instructor's Guide

0.1 Outline of This Book
0.2 Topic Ordering
0.3 Internet and Web Resources
0.4 Useful Publications


Chapter 1 Introduction

1.1 Information and Communication
1.2 Data Communications and Networking for Today's Enterprise
1.3 Convergence and Unified Communications
1.4 The Nature of Business Information Requirements
1.5 The Transmission of Information
1.6 Distributed Data Processing
1.7 The Internet and Distributed Applications
1.8 Networks
1.9 Management Issues
1.10 Standards
1.11 Key Terms, Review Questions, and Problems
Appendix 1A Prefixes for Numerical Units


Case Study I Unified Communications at Boeing (ONLINE)

PART ONE REQUIREMENTS

Chapter 2 Business Information

2.1 Audio
2.2 Data
2.3 Image
2.4 Video
2.5 Performance Measures
Application Note: File Sizes
2.6 Summary
2.7 Key Terms, Review Questions, and Problems


Case Study II CORE Credit Union (ONLINE)
Chapter 3 Distributed Data Processing

3.1 Centralized Versus Distributed Processing
3.2 Forms of Distributed Data Processing
3.3 Distributed Data
3.4 Networking Implications of DDP
3.5 Big Data Infrastructure Considerations
3.6 Summary
3.7 Key Terms, Review Questions, and Problems


Case Study III Managing Massive Data Warehouses at MasterCard International (ONLINE)

PART TWO DATA COMMUNICATIONS

Chapter 4 Data Transmission

4.1 Signals for Conveying Information
4.2 Transmission Impairments and Channel Capacity
Application Note: Analog Signals
4.3 Summary
4.4 Key Terms, Review Questions, and Problems


Chapter 5 Data Communication Fundamentals

5.1 Analog and Digital Data Communications
5.2 Data Encoding Techniques
5.3 Asynchronous and Synchronous Transmission
5.4 Error Detection
Application Note: Devices, Encoding, Communication Parameters and Protocols
5.5 Summary
5.6 Key Terms, Review Questions, and Problems


Chapter 6 Data Link Control and Multiplexing

6.1 Flow Control and Error Control
6.2 Motivation for Multiplexing
6.3 Frequency-Division Multiplexing
6.4 Synchronous Time-Division Multiplexing
Application Note: Changing Communications
6.5 Summary
6.6 Key Terms, Review Questions, and Problems
Appendix 6A High-Level Data Link Control Protocol


Case Study IV Broadband Access: Global and Local Issues (ONLINE)

PART THREE THE INTERNET AND DISTRIBUTED APPLICATIONS

Chapter 7 The Internet

7.1 The Structure of the Internet
7.2 Internet Domains
Application Note: Fitting DNS into your organizational structure
7.3 Dynamic Host Configuration Protocol
7.4 Summary
7.5 Key Terms, Review Questions, and Problems


Case Study V Net Neutrality (ONLINE)
Chapter 8 TCP/IP

8.1 A Simple Protocol Architecture
8.2 The TCP/IP Protocol Architecture
8.3 Internetworking
8.4 Virtual Private Networks and IP Security
Application Note: Practical Guide to Networking
8.5 Summary
8.6 Key Terms, Review Questions, and Problems
Appendix 8A TCP, UDP, and IP Details
Appendix 8B The Trivial File Transfer Protocol


Chapter 9 Client/Server, Intranet, and Cloud Computing

9.1 The Growth of Client/Server Computing
9.2 Client/Server Applications
9.3 Middleware
9.4 Intranets
9.5 Extranets
9.6 Service-Oriented Architecture
Application Note: To Be Fat or Thin–That is the Question
9.7 Cloud Computing
9.8 Summary
9.9 Key Terms, Review Questions, and Problems


Case Study VI Shifting Sands: Chevron’s Migration to the Cloud
Chapter 10 Internet-Based Applications

10.1 Electronic Mail
10.2 Web Access and HTTP
10.3 Web Security
10.4 Multimedia Applications
Application Note: To Serve or Not to Serve?
10.5 Acceptable Use Policiess
10.6 Summary
10.7 Key Terms, Review Questions, and Problems


Case Study VII E-Business at Guardian Life (ONLINE)
Chapter 11 Internet Operation

11.1 Internet Addressing
11.2 Internet Routing Protocols
11.3 Multicasting
11.4 Quality of Service
11.5 Differentiated Services
11.6 Service Level Agreements
11.7 IP Performance Metrics
Application Note: Where Does My Network Address Come From?
11.8 Summary
11.9 Key Terms, Review Questions, and Problems



PART FOUR LOCAL AREA NETWORKS

Chapter 12 LAN Architecture and Infrastructure

12.1 Background
12.2 LAN Configuration
12.3 Guided Transmission Media
12.4 LAN Protocol Architecture
Application Note: Cabling Infrastructure
12.5 Summary
12.6 Key Terms, Review Questions, and Problems
Appendix 12A Decibels and Signal Strength


Case Study VIII Carlson Companies
Chapter 13 Ethernet, Switches, and Virtual LANs

13.1 Traditional Ethernet
13.2 Bridges, Hubs, and Switches
13.3 High-Speed Ethernet
Application Note: Networking with Ethernet
13.4 Virtual LANs
13.5 Power over Ethernet
13.6 Summary
13.7 Key Terms, Review Questions, and Problems


Chapter 14 Wireless LANs

14.1 Overview
14.2 Wi-Fi Architecture and Services
14.3 IEEE 802.11 MAC and Physical Layer Standards
14.4 Gigibit WLANs
14.5 IEEE 802.11 Security Considerations
Application Note: Deploying WLANs
14.6 Summary
14.7 Key Terms, Review Questions, and Problems


Case Study IX St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery

PART FIVE WIDE AREA NETWORKS

Chapter 15 WAN Technology and Protocols

15.1 Switching Techniques
15.2 Circuit-Switching Networks
15.3 Packet-Switching Networks
15.4 Traditional Wide Area Network Alternatives
15.5 Voice over IP
15.6 Presence
15.7 Summary
15.8 Key Terms, Review Questions, and Problems


Chapter 16 WAN Services

16.1 Wide Area Networking Alternatives
16.2 Frame Relay
16.3 Asynchronous Transfer Mode (ATM)
Application Note: Off-site Connectivity Solutions
16.4 Multiprotocol Label Switching (MPLS)
16.5 Wide Area Ethernet
16.6 Summary
16.7 Key Terms, Review Questions, and Problems


Chapter 17 Wireless WANs

17.1 Cellular Wireless Networks
17.2 Multiple Access
17.3 Third-Generation Wireless Communication
17.4 Fourth-Generation Wireless Communciation
17.5 Satellite Communications
Application Note: Laptops, Netbooks, PDAs, and Cell Phones
17.6 Summary
17.7 Key Terms, Review Questions, and Problems


Case Study X Choice Hotels

PART SIX MANAGEMENT ISSUES

Chapter 18 Computer and Network Security Threats

18.1 Computer Security Concepts
18.2 Threats, Attacks, and Assets
18.3 Intruders
18.4 Malicious Software Overview
18.5 Viruses, Worms, Bots, and Spam
18.6 Keyloggers, Phishing, Spyware
18.7 Computer Security Trends
18.8 Key Terms, Review Questions, and Problems


Chapter 19 Computer and Network Security Techniques

19.1 Virtual Private Networks and IPsec
19.2 SSL and TLS
19.3 Wi-Fi Protected Access
19.4 Intrusion Detection
19.5 Firewalls
19.6 Malware Defense
Application Note: Security Layers
19.7 Key Terms, Review Questions, and Problems


Case Study XI Cloud Computing (In)Security
Chapter 20 Network Management (ONLINE)
Chapter 21 Network Planning and Design (ONLINE)

Appendix A Business Data Communications Projects

A.1 Animations and Animation Projects
A.2 Practical Exercises
A.3 Wireshark Projects
A.4 Research Projects
A.5 Security Case Studies
A.6 Reading/Report Assignments
A.7 Writing Assignments

Glossary References Index ONLINE CHAPTERS AND APPENDICES[1]

Chapter 20 Network Management (ONLINE)

20.1 Network Management Requirements
20.2 Network Management Systems
20.3 Simple Network Management Protocol (SNMP)
Application Note: How Much Management?
20.4 Key Terms, Review Questions, and Problems


Chapter 21 Network Planning and Design (ONLINE)

21.1 The Project Environment–The Big Picture
21.2 Planning
21.3 Design Techniques
21.4 Some Capacity Planning and Network Design Tools
Appendix 21A Some Simple Design Algorithms
Appendix 21B Selling Books Online–A Case Study



Appendix B Standards Organizations

B.1 The Importance of Standards
B.2 Standards and Regulation
B.3 Standards-Setting Organizations

Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)

C.1 Uniform Resource Locator
C.2 Uniform Resource Identifier

Erscheint lt. Verlag 29.11.2012
Sprache englisch
Maße 185 x 238 mm
Gewicht 940 g
Themenwelt Mathematik / Informatik Informatik Datenbanken
Mathematik / Informatik Informatik Netzwerke
Informatik Office Programme Outlook
Wirtschaft Betriebswirtschaft / Management
ISBN-10 0-13-302389-3 / 0133023893
ISBN-13 978-0-13-302389-3 / 9780133023893
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich