(0) items

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Business Data Communications- Infrastructure, Networking and Security,9780133023893
This item qualifies for

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Business Data Communications- Infrastructure, Networking and Security

by ;


Pub. Date:
List Price: $182.80

Rent Textbook


Buy New Textbook

Currently Available, Usually Ships in 24-48 Hours


Downloadable Offline Access
  • Apple Devices
  • Android Devices
  • Windows Devices
  • Mac Devices


Used Textbook

We're Sorry
Sold Out

More New and Used
from Private Sellers
Starting at $74.50

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 7th edition with a publication date of 8/28/2012.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
  • The eBook copy of this book is not guaranteed to include any supplemental materials. Typically only the book itself is included.

Related Products

  • Business Data Communications
    Business Data Communications
  • Business Data Communications
    Business Data Communications
  • Business Data Communications
    Business Data Communications
  • Business Data Communications
    Business Data Communications


For Business Data Communications, Data Communications, and introductory Networking for Business courses. Business Data Communications and Securitycovers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications. The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students. The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.

Table of Contents

Chapter 0       Reader's and Instructor's Guide

         0.1         Outline of This Book

         0.2         Topic Ordering

         0.3         Internet and Web Resources

         0.4         Useful Publications


Chapter 1       Introduction

         1.1         Information and Communication

         1.2         Data Communications and Networking for Today's Enterprise

         1.3         Convergence and Unified Communications

         1.4         The Nature of Business Information Requirements

         1.5         The Transmission of Information

         1.6         Distributed Data Processing

         1.7         The Internet and Distributed Applications

         1.8         Networks

         1.9         Management Issues

         1.10         Standards

         1.11         Key Terms, Review Questions, and Problems

         Appendix 1A  Prefixes for Numerical Units


Case Study I   Unified Communications at Boeing (ONLINE)




Chapter 2       Business Information

         2.1         Audio

         2.2         Data

         2.3         Image

         2.4         Video

         2.5         Performance Measures

         Application Note:   File Sizes

         2.6         Summary

         2.7         Key Terms, Review Questions, and Problems


Case Study II       CORE Credit Union (ONLINE)


Chapter 3       Distributed Data Processing

         3.1         Centralized Versus Distributed Processing

         3.2         Forms of Distributed Data Processing

         3.3         Distributed Data

         3.4         Networking Implications of DDP

         3.5         Big Data Infrastructure Considerations

         3.6         Summary

         3.7         Key Terms, Review Questions, and Problems


Case Study III       Managing Massive Data Warehouses at MasterCard International (ONLINE)




Chapter 4       Data Transmission

         4.1         Signals for Conveying Information

         4.2         Transmission Impairments and Channel Capacity

         Application Note: Analog Signals

         4.3         Summary

         4.4         Key Terms, Review Questions, and Problems


Chapter 5       Data Communication Fundamentals

         5.1         Analog and Digital Data Communications

         5.2         Data Encoding Techniques

         5.3         Asynchronous and Synchronous Transmission

         5.4         Error Detection

         Application Note: Devices, Encoding, Communication Parameters and Protocols

         5.5         Summary

         5.6         Key Terms, Review Questions, and Problems


Chapter 6       Data Link Control and Multiplexing

         6.1         Flow Control and Error Control

         6.2         Motivation for Multiplexing

         6.3         Frequency-Division Multiplexing

         6.4         Synchronous Time-Division Multiplexing

         Application Note: Changing Communications

         6.5         Summary

         6.6         Key Terms, Review Questions, and Problems

         Appendix 6A         High-Level Data Link Control Protocol


Case Study IV  Broadband Access: Global and Local Issues (ONLINE)




Chapter 7       The Internet

         7.1         The Structure of the Internet

         7.2         Internet Domains

         Application Note: Fitting DNS into your organizational structure

         7.3         Dynamic Host Configuration Protocol

         7.4         Summary

         7.5         Key Terms, Review Questions, and Problems


Case Study V       Net Neutrality (ONLINE)


Chapter 8       TCP/IP

         8.1         A Simple Protocol Architecture

         8.2         The TCP/IP Protocol Architecture

         8.3         Internetworking

         8.4         Virtual Private Networks and IP Security

         Application Note: Practical Guide to Networking

         8.5         Summary

         8.6         Key Terms, Review Questions, and Problems

         Appendix 8A TCP, UDP, and IP Details

         Appendix 8B The Trivial File Transfer Protocol


Chapter 9       Client/Server, Intranet, and Cloud Computing

         9.1         The Growth of Client/Server Computing

         9.2         Client/Server Applications

         9.3         Middleware

         9.4         Intranets

         9.5         Extranets

         9.6         Service-Oriented Architecture

         Application Note:   To Be Fat or Thin–That is the Question

         9.7    Cloud Computing

         9.8         Summary

         9.9         Key Terms, Review Questions, and Problems


Case Study VI       Shifting Sands: Chevron’s Migration to the Cloud


Chapter 10       Internet-Based Applications

         10.1         Electronic Mail

         10.2         Web Access and HTTP

         10.3         Web Security

         10.4         Multimedia Applications

         Application Note:   To Serve or Not to Serve?

         10.5         Acceptable Use Policiess

         10.6         Summary

         10.7         Key Terms, Review Questions, and Problems


Case Study VII       E-Business at Guardian Life (ONLINE)


Chapter 11       Internet Operation

         11.1         Internet Addressing

         11.2         Internet Routing Protocols

         11.3         Multicasting

         11.4         Quality of Service

         11.5         Differentiated Services

         11.6         Service Level Agreements

         11.7         IP Performance Metrics

         Application Note:  Where Does My Network Address Come From?

         11.8         Summary

         11.9         Key Terms, Review Questions, and Problems





Chapter 12       LAN Architecture and Infrastructure

         12.1         Background

         12.2         LAN Configuration

         12.3         Guided Transmission Media

         12.4         LAN Protocol Architecture

         Application Note:  Cabling Infrastructure

         12.5         Summary

         12.6         Key Terms, Review Questions, and Problems

         Appendix 12A         Decibels and Signal Strength


Case Study VIII       Carlson Companies


Chapter 13       Ethernet, Switches, and Virtual LANs

         13.1         Traditional Ethernet

         13.2         Bridges, Hubs, and Switches

         13.3         High-Speed Ethernet

         Application Note: Networking with Ethernet

         13.4         Virtual LANs

         13.5         Power over Ethernet

         13.6         Summary

         13.7         Key Terms, Review Questions, and Problems


Chapter 14       Wireless LANs

         14.1         Overview

         14.2         Wi-Fi Architecture and Services

         14.3         IEEE 802.11 MAC and Physical Layer Standards

         14.4         Gigibit WLANs

         14.5         IEEE 802.11 Security Considerations

         Application Note: Deploying WLANs

         14.6         Summary

         14.7         Key Terms, Review Questions, and Problems


Case Study IX       St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery




Chapter 15       WAN Technology and Protocols

         15.1         Switching Techniques

         15.2         Circuit-Switching Networks

         15.3         Packet-Switching Networks

         15.4         Traditional Wide Area Network Alternatives

         15.5         Voice over IP

         15.6         Presence

         15.7         Summary

         15.8         Key Terms, Review Questions, and Problems


Chapter 16       WAN Services

         16.1         Wide Area Networking Alternatives

         16.2         Frame Relay

         16.3         Asynchronous Transfer Mode (ATM)

         Application Note: Off-site Connectivity Solutions

         16.4         Multiprotocol Label Switching (MPLS)

         16.5         Wide Area Ethernet

         16.6         Summary

         16.7         Key Terms, Review Questions, and Problems


Chapter 17       Wireless WANs

         17.1         Cellular Wireless Networks

         17.2         Multiple Access

         17.3         Third-Generation Wireless Communication

         17.4         Fourth-Generation Wireless Communciation

         17.5         Satellite Communications

         Application Note: Laptops, Netbooks, PDAs, and Cell Phones

         17.6         Summary

         17.7         Key Terms, Review Questions, and Problems


Case Study X       Choice Hotels




Chapter 18 Computer and Network Security Threats

         18.1         Computer Security Concepts

         18.2         Threats, Attacks, and Assets

         18.3         Intruders

         18.4         Malicious Software Overview

         18.5          Viruses, Worms, Bots, and Spam

         18.6         Keyloggers, Phishing, Spyware

         18.7         Computer Security Trends

         18.8         Key Terms, Review Questions, and Problems


Chapter 19 Computer and Network Security Techniques

         19.1         Virtual Private Networks and IPsec

         19.2         SSL and TLS

         19.3         Wi-Fi Protected Access

         19.4         Intrusion Detection

         19.5         Firewalls

         19.6         Malware Defense

         Application Note: Security Layers

         19.7         Key Terms, Review Questions, and Problems


Case Study XI       Cloud Computing (In)Security


Chapter 20       Network Management (ONLINE)


Chapter 21       Network Planning and Design (ONLINE)


Appendix A              Business Data Communications Projects

         A.1         Animations and Animation Projects

         A.2         Practical Exercises

         A.3         Wireshark Projects

         A.4         Research Projects

         A.5         Security Case Studies

         A.6         Reading/Report Assignments

         A.7         Writing Assignments










Chapter 20       Network Management (ONLINE)

         20.1         Network Management Requirements

         20.2         Network Management Systems

         20.3         Simple Network Management Protocol (SNMP)

         Application Note: How Much Management?

         20.4         Key Terms, Review Questions, and Problems


Chapter 21       Network Planning and Design (ONLINE)

         21.1         The Project Environment–The Big Picture

         21.2         Planning

         21.3         Design Techniques

         21.4         Some Capacity Planning and Network Design Tools

         Appendix 21A         Some Simple Design Algorithms

         Appendix 21B         Selling Books Online–A Case Study


Appendix B              Standards Organizations

         B.1         The Importance of Standards

         B.2         Standards and Regulation

         B.3         Standards-Setting Organizations


Appendix C       Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)

         C.1         Uniform Resource Locator

         C.2         Uniform Resource Identifier

         C.3         To Learn More


Appendix D              The International Reference Alphabet


Appendix E        The TCP/IP Checksum

         E.1         Ones-Complement Addition

         E.2         Use in TCP and IP


Appendix F              IBM's System Network Architecture (SNA)

         F.1         Network Architecture

         F.2         Advanced Program-to-Program Communication

         F.3         Protocol Architecture


Appendix G       Fibre Channel

         G.1         Fibre Channel Elements

         G.2         Fibre Channel Protocol Architecture


Appendix H       Bluetooth

         H.1         Bluetooth Applications

         H.2         Bluetooth Standards Documents

         H.3         Protocol Architecture

         H.4         Usage Models

         H.5         Piconets and Scatternets


Appendix I              Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM)

         I.1         Multipath Interference

         I.2         Orthogonal Frequency-Division Multiplexing


Appendix J              Cryptographic Algorithms

         J.1         Symmetric Encryption

         J.2         Public-Key Cryptography

         J.3         Message Authentication and Hash Functions

         J.4         Secure Hash Functions


Appendix K       Sliding-Window Flow Control and Error Control

         K.1         Flow Control

         K.2         Error Control


Appendix L              The OSI Model

         L.1         The Model

         L.2         The OSI Layers


Appendix M              Code Division Multiple Access


[1] Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book.

Please wait while the item is added to your cart...