Home > Store > Networking

Business Data Communications- Infrastructure, Networking and Security, 7th Edition

Register your product to gain access to bonus material or receive a coupon.

Business Data Communications- Infrastructure, Networking and Security, 7th Edition


  • Your Price: $157.08
  • List Price: $184.80
  • Usually ships in 24 hours.



  • Flexible organization. The ordering of topics is presented with a top-down approach, with the early part of the book dealing with applications and upper-level protocols. However, the book is designed to support a bottom-up approach as well.
  • Detailed examination of client/server computing and service oriented architecture. Provides students with information about how these vital topics for corporate data communication work, allowing them to understand their functions and the approach for organizing enterprise systems.
  • Detailed discussion of all networking technologies, including LANs and WANs. Students can compare and evaluate competing approaches and thus understand each better. Wireless networks and quality of service are especially important topics.
  • Solid coverage of the TCP/IP set of protocols. Students are given the foundation and context for understanding the protocols and standards that form the foundation for all data networking.
  • Extensive use of real-world case studies. Shows students how companies have dealt with the real issues, problems, and opportunities presented by communications and network technology.
  • Numerous questions, homework problems, and worked-out examples. Offers students a chance to apply and test their knowledge.
  • Tables and figures. Helps students clarify concepts to aid in comprehension.
  • Suggested readings, key word lists, and recommended Web Sites conclude each chapter, and encourage students to further explore topics of interest. Seven online appendices provide supplemental material for students.
  • Companion Website¿Access textbook-related resources and support materials for students and instructors maintained by the author.
  • Student Resource Site¿ http://williamstallings.com/BusinessDataComm/ ¿contains the following resources
    • Online Chapters
    • Online Appendices
    • Useful Documents
    • Practice Problems (homework problems with solutions)
    • Useful Websites
    • General Sites
  • The Instructor Resource Website, http://williamstallings.com/BusinessDataComm, contains the following resources:
    • Student Resources link: Useful links and documents for students.
    • Instructor Resources link: Useful links and documents for instructors
  • Instructor Resource Center: This password-protected web site includes:
    • Solutions Manual: Solutions to end-of-chapter Review Questions and Problems.
    • Projects Manual: Suggested project assignments for 6 different types of assignment, written especially for this book.
      • Animation Assignments
      • Practical Exercises
      • Ethereal Projects
      • Research Projects
      • Reading/Report Assignments
      • Writing Assignments
    • PowerPoint Slides: A set of slides covering all chapters, suitable for use in lecturing.
    • Testbank
    • PDF files: Reproductions of all figures and tables from the book
    • Sample Syllabi


  • Copyright 2013
  • Dimensions: 7" x 9-1/4"
  • Pages: 624
  • Edition: 7th
  • Book
  • ISBN-10: 0-13-302389-3
  • ISBN-13: 978-0-13-302389-3

For Business Data Communications, Data Communications, and introductory Networking for Business courses. The content is also appropriate for the Introduction to Networking course in a MBA program.

Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.

The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.

The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.

Sample Content

Table of Contents

Chapter 0       Reader's and Instructor's Guide

         0.1         Outline of This Book

         0.2         Topic Ordering

         0.3         Internet and Web Resources

         0.4         Useful Publications

Chapter 1       Introduction

         1.1         Information and Communication

         1.2         Data Communications and Networking for Today's Enterprise

         1.3         Convergence and Unified Communications

         1.4         The Nature of Business Information Requirements

         1.5         The Transmission of Information

         1.6         Distributed Data Processing

         1.7         The Internet and Distributed Applications

         1.8         Networks

         1.9         Management Issues

         1.10         Standards

         1.11         Key Terms, Review Questions, and Problems

         Appendix 1A  Prefixes for Numerical Units

Case Study I   Unified Communications at Boeing (ONLINE) PART ONE  REQUIREMENTS Chapter 2       Business Information

         2.1         Audio

         2.2         Data

         2.3         Image

         2.4         Video

         2.5         Performance Measures

         Application Note:   File Sizes

         2.6         Summary

         2.7         Key Terms, Review Questions, and Problems

Case Study II       CORE Credit Union (ONLINE) Chapter 3       Distributed Data Processing

         3.1         Centralized Versus Distributed Processing

         3.2         Forms of Distributed Data Processing

         3.3         Distributed Data

         3.4         Networking Implications of DDP

         3.5         Big Data Infrastructure Considerations

         3.6         Summary

         3.7         Key Terms, Review Questions, and Problems

Case Study III       Managing Massive Data Warehouses at MasterCard International (ONLINE) PART TWO   DATA COMMUNICATIONS Chapter 4       Data Transmission

         4.1         Signals for Conveying Information

         4.2         Transmission Impairments and Channel Capacity

         Application Note: Analog Signals

         4.3         Summary

         4.4         Key Terms, Review Questions, and Problems

Chapter 5       Data Communication Fundamentals

         5.1         Analog and Digital Data Communications

         5.2         Data Encoding Techniques

         5.3         Asynchronous and Synchronous Transmission

         5.4         Error Detection

         Application Note: Devices, Encoding, Communication Parameters and Protocols

         5.5         Summary

         5.6         Key Terms, Review Questions, and Problems

Chapter 6       Data Link Control and Multiplexing

         6.1         Flow Control and Error Control

         6.2         Motivation for Multiplexing

         6.3         Frequency-Division Multiplexing

         6.4         Synchronous Time-Division Multiplexing

         Application Note: Changing Communications

         6.5         Summary

         6.6         Key Terms, Review Questions, and Problems

         Appendix 6A         High-Level Data Link Control Protocol

Case Study IV  Broadband Access: Global and Local Issues (ONLINE) PART THREE THE INTERNET AND DISTRIBUTED APPLICATIONS Chapter 7       The Internet

         7.1         The Structure of the Internet

         7.2         Internet Domains

         Application Note: Fitting DNS into your organizational structure

         7.3         Dynamic Host Configuration Protocol

         7.4         Summary

         7.5         Key Terms, Review Questions, and Problems

Case Study V       Net Neutrality (ONLINE) Chapter 8       TCP/IP

         8.1         A Simple Protocol Architecture

         8.2         The TCP/IP Protocol Architecture

         8.3         Internetworking

         8.4         Virtual Private Networks and IP Security

         Application Note: Practical Guide to Networking

         8.5         Summary

         8.6         Key Terms, Review Questions, and Problems

         Appendix 8A TCP, UDP, and IP Details

         Appendix 8B The Trivial File Transfer Protocol

Chapter 9       Client/Server, Intranet, and Cloud Computing

         9.1         The Growth of Client/Server Computing

         9.2         Client/Server Applications

         9.3         Middleware

         9.4         Intranets

         9.5         Extranets

         9.6         Service-Oriented Architecture

         Application Note:   To Be Fat or Thin–That is the Question

         9.7    Cloud Computing

         9.8         Summary

         9.9         Key Terms, Review Questions, and Problems

Case Study VI       Shifting Sands: Chevron’s Migration to the Cloud Chapter 10       Internet-Based Applications

         10.1         Electronic Mail

         10.2         Web Access and HTTP

         10.3         Web Security

         10.4         Multimedia Applications

         Application Note:   To Serve or Not to Serve?

         10.5         Acceptable Use Policiess

         10.6         Summary

         10.7         Key Terms, Review Questions, and Problems

Case Study VII       E-Business at Guardian Life (ONLINE) Chapter 11       Internet Operation

         11.1         Internet Addressing

         11.2         Internet Routing Protocols

         11.3         Multicasting

         11.4         Quality of Service

         11.5         Differentiated Services

         11.6         Service Level Agreements

         11.7         IP Performance Metrics

         Application Note:  Where Does My Network Address Come From?

         11.8         Summary

         11.9         Key Terms, Review Questions, and Problems

PART FOUR LOCAL AREA NETWORKS Chapter 12       LAN Architecture and Infrastructure

         12.1         Background

         12.2         LAN Configuration

         12.3         Guided Transmission Media

         12.4         LAN Protocol Architecture

         Application Note:  Cabling Infrastructure

         12.5         Summary

         12.6         Key Terms, Review Questions, and Problems

         Appendix 12A         Decibels and Signal Strength

Case Study VIII       Carlson Companies Chapter 13       Ethernet, Switches, and Virtual LANs

         13.1         Traditional Ethernet

         13.2         Bridges, Hubs, and Switches

         13.3         High-Speed Ethernet

         Application Note: Networking with Ethernet

         13.4         Virtual LANs

         13.5         Power over Ethernet

         13.6         Summary

         13.7         Key Terms, Review Questions, and Problems

Chapter 14       Wireless LANs

         14.1         Overview

         14.2         Wi-Fi Architecture and Services

         14.3         IEEE 802.11 MAC and Physical Layer Standards

         14.4         Gigibit WLANs

         14.5         IEEE 802.11 Security Considerations

         Application Note: Deploying WLANs

         14.6         Summary

         14.7         Key Terms, Review Questions, and Problems

Case Study IX       St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery PART FIVE WIDE AREA NETWORKS Chapter 15       WAN Technology and Protocols

         15.1         Switching Techniques

         15.2         Circuit-Switching Networks

         15.3         Packet-Switching Networks

         15.4         Traditional Wide Area Network Alternatives

         15.5         Voice over IP

         15.6         Presence

         15.7         Summary

         15.8         Key Terms, Review Questions, and Problems

Chapter 16       WAN Services

         16.1         Wide Area Networking Alternatives

         16.2         Frame Relay

         16.3         Asynchronous Transfer Mode (ATM)

         Application Note: Off-site Connectivity Solutions

         16.4         Multiprotocol Label Switching (MPLS)

         16.5         Wide Area Ethernet

         16.6         Summary

         16.7         Key Terms, Review Questions, and Problems

Chapter 17       Wireless WANs

         17.1         Cellular Wireless Networks

         17.2         Multiple Access

         17.3         Third-Generation Wireless Communication

         17.4         Fourth-Generation Wireless Communciation

         17.5         Satellite Communications

         Application Note: Laptops, Netbooks, PDAs, and Cell Phones

         17.6         Summary

         17.7         Key Terms, Review Questions, and Problems

Case Study X       Choice Hotels PART SIX MANAGEMENT ISSUES Chapter 18 Computer and Network Security Threats

         18.1         Computer Security Concepts

         18.2         Threats, Attacks, and Assets

         18.3         Intruders

         18.4         Malicious Software Overview

         18.5          Viruses, Worms, Bots, and Spam

         18.6         Keyloggers, Phishing, Spyware

         18.7         Computer Security Trends

         18.8         Key Terms, Review Questions, and Problems

Chapter 19 Computer and Network Security Techniques

         19.1         Virtual Private Networks and IPsec

         19.2         SSL and TLS

         19.3         Wi-Fi Protected Access

         19.4         Intrusion Detection

         19.5         Firewalls

         19.6         Malware Defense

         Application Note: Security Layers

         19.7         Key Terms, Review Questions, and Problems

Case Study XI       Cloud Computing (In)Security Chapter 20       Network Management (ONLINE) Chapter 21       Network Planning and Design (ONLINE) Appendix A              Business Data Communications Projects

         A.1         Animations and Animation Projects

         A.2         Practical Exercises

         A.3         Wireshark Projects

         A.4         Research Projects

         A.5         Security Case Studies

         A.6         Reading/Report Assignments

         A.7         Writing Assignments

Glossary References Index ONLINE CHAPTERS AND APPENDICES[1] Chapter 20       Network Management (ONLINE)

         20.1         Network Management Requirements

         20.2         Network Management Systems

         20.3         Simple Network Management Protocol (SNMP)

         Application Note: How Much Management?

         20.4         Key Terms, Review Questions, and Problems

Chapter 21       Network Planning and Design (ONLINE)

         21.1         The Project Environment–The Big Picture

         21.2         Planning

         21.3         Design Techniques

         21.4         Some Capacity Planning and Network Design Tools

         Appendix 21A         Some Simple Design Algorithms

         Appendix 21B         Selling Books Online–A Case Study

Appendix B              Standards Organizations

         B.1         The Importance of Standards

         B.2         Standards and Regulation

         B.3         Standards-Setting Organizations

Appendix C       Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs)

         C.1         Uniform Resource Locator

         C.2         Uniform Resource Identifier

         C.3         To Learn More

Appendix D              The International Reference Alphabet Appendix E        The TCP/IP Checksum

         E.1         Ones-Complement Addition

         E.2         Use in TCP and IP

Appendix F              IBM's System Network Architecture (SNA)

         F.1         Network Architecture

         F.2         Advanced Program-to-Program Communication

         F.3         Protocol Architecture

Appendix G       Fibre Channel

         G.1         Fibre Channel Elements

         G.2         Fibre Channel Protocol Architecture

Appendix H       Bluetooth

         H.1         Bluetooth Applications

         H.2         Bluetooth Standards Documents

         H.3         Protocol Architecture

         H.4         Usage Models

         H.5         Piconets and Scatternets

Appendix I              Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM)

         I.1         Multipath Interference

         I.2         Orthogonal Frequency-Division Multiplexing

Appendix J              Cryptographic Algorithms

         J.1         Symmetric Encryption

         J.2         Public-Key Cryptography

         J.3         Message Authentication and Hash Functions

         J.4         Secure Hash Functions

Appendix K       Sliding-Window Flow Control and Error Control

         K.1         Flow Control

         K.2         Error Control

Appendix L              The OSI Model

         L.1         The Model

         L.2         The OSI Layers

Appendix M              Code Division Multiple Access

[1] Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book.


Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership