Description Business Data Communications and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.
The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.
Flexible organization. The ordering of topics is presented with a top-down approach, with the early part of the book dealing with applications and upper-level protocols. However, the book is designed to support a bottom-up approach as well.
Detailed examination of client/server computing and service oriented architecture.Provides students with information about how these vital topics for corporate data communication work, allowing them to understand their functions and the approach for organizing enterprise systems.
Detailed discussion of all networking technologies, including LANs and WANs.Students can compare and evaluate competing approaches and thus understand each better. Wireless networks and quality of service are especially important topics.
Solid coverage of the TCP/IP set of protocols. Students are given the foundation and context for understanding the protocols and standards that form the foundation for all data networking.
Extensive use of real-world case studies. Shows students how companies have dealt with the real issues, problems, and opportunities presented by communications and network technology.
Numerous questions, homework problems, and worked-out examples. Offers students a chance to apply and test their knowledge.
Tables and figures. Helps students clarify concepts to aid in comprehension.
Suggested readings, key word lists, and recommended Web Sites conclude each chapter, and encourage students to further explore topics of interest. Seven online appendices provide supplemental material for students.
New to This Edition In the four years since the sixth edition of this book was published, the field has seen continued innovations and improvements. In this new edition, we try to capture these changes while maintaining a broad and comprehensive coverage of the entire field. To begin this process of revision, the sixth edition of this book was extensively reviewed by a number of professors who teach the subject and by professionals working in the field. The result is that, in many places, the narrative has been clarified and tightened, and illustrations have been improved. Beyond the refinements to improve pedagogy and user-friendliness, there have been substantive changes throughout the book. Much of the material has been revised and new material has been added. The most noteworthy changes are as follows:
The addition of Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University.
Security coverage. Coverage of security-related issues is featured in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security.
Now aligns with the ACM/AIS IS 2010 curriculum model. The new edition should be especially appealing to universities seeking alignment with the ACM/AIS IS 2010 curriculum model. BDC 7e covers all the recommended topics for IS 2010.5 IT Infrastructure, one of the core courses in the model curriculum. It also addresses multiple topics recommended for the IS 2010.3 Enterprise Architecture course including virtualization, business continuity, software as a service (SaaS), enterprise data models, network management, and emerging technologies.
Cloud computing. Cloud computing has become a vital and essential tool in business IT. Cloud computing concepts are covered in a number of chapters throughout the book.
Fourth generation (4G) mobile networks. 4G networks continue to expand worldwide and a section covering this recent technology has been added.
Dynamic Host Configuration Protocol (DHCP). DHCP is a widely used protocol that enables dynamic IP address assignment. A new section covers this protocol.
Electronic Mail. The section on email in Chapter 10 has been expanded to include a discussion of the standard Internet Mail Architecture.
Multimedia Applications. A new discussion of this topic is in Chapter 10.
Acceptable Use Policies. A new section on acceptable use policies for email, Web, and Internet applications is in Chapter 10.
Internet addressing. The section on Internet addressing has been updated and expanded to include CIDR and IPv6 addresses.
Multicasting. A new section on multicasting, which is increasingly important in the business environment, has been added.
VoIP. Voice over IP is increasingly replacing traditional voice services. A new section in Chapter 15 discusses technology and service aspects.
Presence information and services. The increased use of instant messaging and VoIP, plus the increased use of collaboration services, are all supported by presence services now becoming available. A new section in Chapter 15 explores presence information and services.
Sample syllabus. The text contains more material than can be conveniently covered in one semester. Accordingly, instructors are provided with several sample syllabi that guide the use of the text within limited time (e.g., 16 weeks or 12 weeks). These samples are based on real-world experience by professors with the sixth edition.
Table of Contents Chapter 0.Reader’s and Instructor’s Guide Chapter 1.Introduction Case Study I Unified Communications at Boeing (ONLINE) Part One REQUIREMENTS Chapter 2.Business Information Case Study II CORE Credit Union (ONLINE) Chapter 3.Distributed Data Processing Case Study III Managing Massive Data Werehouses MasterCard Part Two DATA COMMUNICATIONS Chapter 4.Data Transmission Chapter 5.Data Communication Fundamentals Chapter 6.Data Link Control and Multiplexing Case Study IV Broadband Access: Global and Local Issues (ONLINE) Part Three THE INTERNET AND DISTRIBUTED APPLICATIONS Chapter 7.The Internet Case Study V Net Neutrality (ONLINE) Chapter 8.TCP/IP Chapter 9.Client/Server, Intranet, and Cloud Computing Case Study VI Shifting Sands: Chevron’s Migration to the Cloud (ONLINE) Chapter 10. Internet-Based Applications Case Study VII E-Business at Guardian Life (ONLINE) Chapter 11.Internet Operation Part Four LOCAL AREA NETWORKS Chapter 12.LAN Architecture and Infrastructure Case Study VIII Carlson Companies (ONLINE) Chapter 13.Ethernet, Switches, and Virtual LANs 390 Chapter 14.Wireless Case Study IX St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery (ONLINE) Part Five WIDE AREA NETWORKS Chapter 15.WAN Technology and Protocols Chapter 16.WAN Services Chapter 17.Wireless WANs Case Study X Choice Hotels (ONLINE) Part Six MANAGEMENT ISSUES Chapter 18.Computer and Network Security Threats Chapter 19.Computer and Network Security Techniques Case Study XI Cloud Computing (In)Security (ONLINE) Chapter 20.Network Management (ONLINE) Chapter 21. Network Planning and Design (ONLINE)
William Stallings Thomas L. Case, Georgia Southern University