Presentation is loading. Please wait.

Presentation is loading. Please wait.

Telecom- munications, the Internet, and Wireless Technology

Similar presentations


Presentation on theme: "Telecom- munications, the Internet, and Wireless Technology"— Presentation transcript:

1 Telecom- munications, the Internet, and Wireless Technology
CHAPTER SEVEN Telecom- munications, the Internet, and Wireless Technology Oleh : Kundang K Juman

2 Management Information Systems
Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES After reading this chapter, you will be able to answer the following questions: What are the principal components of telecommunications networks and key networking technologies? What are the main telecommunications transmission media and types of networks? How do the Internet and Internet technology work, and how do they support communication and e-business? Continued …

3 LEARNING OBJECTIVES (continued)
What are the principal technologies and standards for wireless networking, communication, and Internet access? Why are radio frequency identification (RFID) and wireless sensor networks valuable for business?

4 Hyundai Heavy Industries Creates a Wireless Shipyard
Problem: Shipbuilding space is too large (4.2 sq mi) and complex to track inventory in real-time, limiting efficiency Solution: High-speed wireless network built by KT Corp, using radio sensors, notebooks, mobiles, Web cams Illustrates: Powerful capabilities and solutions offered by contemporary networking technology Use of radio sensor technologies to track inventory This slide discusses the chapter opening case. Ask students specifically why it was important to track inventory in real-time. Ultimately, even small improvements in efficiency, added up over thousands of workers and millions of parts, add up to large-scale cost improvements. You can also ask students how they think radio sensor technology works and is able to track individual inventory elements.

5 Telecommunications and Networking in Today’s Business World
Networking and Communication Trends Convergence: Telephone networks and computer networks converging into single digital network using Internet standards E.g. cable companies providing voice service Broadband: More than 60% Canadian Internet users have broadband access Broadband wireless: Voice and data communication as well as Internet access are increasingly taking place over broadband wireless platforms This slide discusses recent developments in networking technologies. Ask students to give other examples of convergence. How fast is broadband today? Do all of the students have broadband? Note that in 2000, typical Internet access speeds were 56 kbps over a telephone line, costing 25 cents per kilobit, while today broadband speeds are 1-15 mbps, costing less than 1 cent per kilobit. Are students aware of how fast their Internet connections are at home, school, or work? Ask students if they know the speed of their cell phone’s Internet connection. The point here is to try and raise student awareness of telecommunications systems, and their capacities.

6 Telecommunications and Networking in Today’s Business World
What is a computer network? Network Interface Card (NIC) Network Operating System (NOS) Routes and manages communications on the network and coordinates network resources Dedicated server computer Hubs Routers This slide describes what a network is along with the components that you will find in a simple network (illustrated on the next slide.) Ask students to describe the function of a NIC. What is a connection “medium”? Ask students to describe the purpose of a hub, switch, and router.

7 Telecommunications and Networking in Today’s Business World
This graphic illustrates the components of a simple network. While the NOS is shown as part of the server, note that, depending on the type of software, an NOS may also be designed to reside on client computers. Do some students have a home computer network? Ask them to describe the elements of the network.

8 Telecommunications and Networking in Today’s Business World
Networks in Large Companies Hundreds of local area networks (LANs) linked to firm-wide corporate network Various powerful servers Web site Corporate intranet, extranet Backend systems Mobile wireless LANs (Wi-Fi networks) Videoconferencing system Telephone network Wireless cell phones This slide looks at the additional components one might expect to find in the network of a large company that has many locations and thousands of employees (illustrated on the next slide). Ask students what is meant by “backend systems.” Note that many firms are dispensing with traditional landline telephone networks and using Internet telephones that run on existing internal data networks and the Internet.

9 Telecommunications and Networking in Today’s Business World
This graphic illustrates the components of a large company’s network. Note the difference between the wireless LAN, which allows wireless access within the office, and the mobile Wi-Fi network, which allows Internet access to employees outside of offices. The advantage of telephone-based wireless systems is that they do not require a Wi-Fi hotspot to work, and in fact can connect users to the entire globe through their telephone networks. Cable networks – major competitors of telephone company Internet providers – do not really have a mobile option some firms are developing a Wi-Max capability that could potentially serve an entire metropolitan area. This development will take many years, and in 2010 many Wi-Max metropolitan experiments were behind schedule.

10 Telecommunications and Networking in Today’s Business World
Key Digital Networking Technologies Client/server computing Packet Switching TCP/IP and Connectivity This slide and following two slides look at the main technologies in use today for networks: client/server computing, packet switching, and TCP/IP. Ask students what advantages client/server computing has over centralized mainframe computing.

11 Telecommunications and Networking in Today’s Business World
Client/Server Computing Client/server computing is a distributed processing model in which some processing power is located within small, inexpensive client computers The clients are linked to one another through a network that is controlled by a network server computer The server sets the rules of communication for the network and provides every client with an address so others can find it on the network

12 Telecommunications and Networking in Today’s Business World
Packet Switching Messages are first broken down into small bundles of data called packets Packets are sent along different communication paths as paths become available Packets are reassembled once they reach their destinations This slide continues the discussion of the three main networking technologies today, looking at the second, packet switching. Note that circuit-switched networks were expensive and wasted available communications capacity – the circuit had to be maintained whether data was being sent or not. It is also important to note that packet switching enables packets to follow many different paths. What is the advantage of this capability?

13 Telecommunications and Networking in Today’s Business World

14 Telecommunications and Networking in Today’s Business World
TCP/IP and connectivity Connectivity between computers enabled by protocols Rules that govern transmission of information between two points Transmission Control Protocol/Internet Protocol (TCP/IP) Common worldwide standard that is basis for Internet Department of Defense reference model for TCP/IP Four layers Application layer Transport layer Internet layer Network interface layer This slide continues the discussion of the three main networking technologies in use today, and looks at the third, TCP/IP. Note that in a network, there are typically many different types of hardware and software components that need to work together to transmit and receive information. Different components in a network communicate with each other only by adhering to a common set of rules called protocols. In the past, many diverse proprietary and incompatible protocols often forced business firms to purchase computing and communications equipment from a single vendor. But today corporate networks are increasingly using a single, common, worldwide standard called Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP actually is a suite of protocols, the main ones of which are TCP and IP. Ask students what these two main protocols are responsible for.

15 Telecommunications and Networking in Today’s Business World
This graphic illustrates the four layers of the DOD reference model for TCP/IP. Note that what happens, when computer A sends a message to computer B, is that the data that computer A creates is transferred within that computer from the application layer to subsequent layers in sequence. In this process it is split into packets, and information is added at each stage, ultimately translating the packets into a form that can be transferred over the network interface. After traveling over the network interface, the packets are reassembled at the recipient computer, from the network interface layer up, ultimately for use by the application layer.

16 Communications Networks
Signals: digital versus analog Digital: discrete, binary waveform Analog: continuous waveform, typically used for voice A modem (modulator - demodulator) converts from one state to the other

17 Communications Networks
This graphic illustrates the differences between digital and analog signals, and shows how digital signals can be sent to other computers over analog cables such as telephone and cable lines which are analog. Note that digital signals are representations of the two binary digits, 0 and 1, and are represented logically as on and off electrical pulses (in reality as different voltages). Ask students what MODEM stands for.

18 Communications Networks
Types of Networks Local Area Network (LAN) Campus Area Network (CAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) This slide looks at the types of networks that organizations use. Ask students what the differences are between digital and analog signals. Another example of the difference between analog and digital signals is the difference between vinyl records and digital CDs and MP3s. Ask students to describe and distinguish between LANs, CANs, WANs, and MANs, and also to talk about their different range of operation. Note that a network can be defined by the way the clients interact (client/server vs. peer-to-peer); the type of physical medium to carry signals (Ethernet, Fast Ethernet, etc.), and the way in which computers are connected and send signals to each other (topology).

19 Communications Networks
This graphic illustrates the three main topologies in use in LANs. In a star topology, all devices on the network connect to a single hub and all network traffic flows through the hub. In an extended star network, multiple layers or hubs are organized into a hierarchy. In a bus topology, one station transmits signals, which travel in both directions along a single transmission segment. All of the signals are broadcast in both directions to the entire network. All machines on the network receive the same signals, and software installed on the client’s enables each client to listen for messages addressed specifically to it. A ring topology connects network components in a closed loop. Messages pass from computer to computer in only one direction around the loop, and only one station at a time may transmit. The ring topology is primarily found in older LANs using Token Ring networking software. Ask students which of the topologies is the most common.

20 Communications Networks
This graphic illustrates the three main topologies in use in LANs. In a star topology, all devices on the network connect to a single hub and all network traffic flows through the hub. In an extended star network, multiple layers or hubs are organized into a hierarchy. In a bus topology, one station transmits signals, which travel in both directions along a single transmission segment. All of the signals are broadcast in both directions to the entire network. All machines on the network receive the same signals, and software installed on the client’s enables each client to listen for messages addressed specifically to it. A ring topology connects network components in a closed loop. Messages pass from computer to computer in only one direction around the loop, and only one station at a time may transmit. The ring topology is primarily found in older LANs using Token Ring networking software. Ask students which of the topologies is the most common.

21 Communications Networks
Physical transmission media Twisted wire Coaxial cable Fibre optics and optical networks Wireless transmission media Microwave, satellite, cellular Transmission speed (hertz, bandwidth) This slide looks at the media involved in network transmission. Note that many of the telephone systems in buildings had twisted wires installed for analog communication, but they can be used for digital communication as well. Also, today, telecommunications companies are starting to bring fibre optic cable into the home for high-speed Internet access. Ask students what characteristic of microwave transmission means that transmission stations must be 37 miles apart. Note that the transmission capacity of a medium (bps) is dependent on its frequency, which is measured in hertz, or cycles per second. Ask students to define bandwidth (it is the difference between the highest and lowest frequencies that can be accommodated on a single channel.)

22 Communications Networks

23 The Global Internet What is the Internet? Links hundreds of thousands of individual networks all over the world Most homes connect to the internet by subscribing to an Internet Service Provider (ISP) Digital Subscriber Line (DSL) Cable Internet connections T1 and T3 lines This slide examines what the Internet is – ask students to describe it and what they use it for. The text refers to the Internet as the most extensive public communication system and the world’s largest implementation of client/server computing. Ask students how they connect to the Internet. Do any of their families use dial-up (telephone/modem). Do any use satellite? Note that T lines are leased, dedicated lines suitable for businesses or government agencies requiring high-speed guaranteed service levels. Do students know that the Internet does not guarantee any service level, and only agrees to make a “best effort.”

24 Internet Addressing and Architecture
The Global Internet Internet Addressing and Architecture The Domain Name System Every device connected to the Internet has a unique 32-bit numeric IP address A Domain Name System (DNS) converts IP addresses to English-like domain names The domain name is the English-like name that corresponds to the unique 32-bit numeric IP address Internet Architecture and Governance

25 The Global Internet

26 The Global Internet

27 The Future Internet: IPv6 and Internet 2
The Global Internet The Future Internet: IPv6 and Internet 2 IPv6: allows 128 bit addresses, a quadrillion possible addresses Internet2: consortia of agencies working to provide an new robust and high-bandwidth version of the Internet

28 The Global Internet

29 Internet Services and Communications Tools
The Global Internet Internet Services and Communications Tools Chatting and Instant Messaging Newgroups Telnet File Transfer Protocol (FTP) World Wide Web

30 The Global Internet

31 The Battle over Net Neutrality
The Global Internet The Battle over Net Neutrality Read the Window on Organizations, and then discuss the following questions: What is network neutrality? Why has the Internet operated under net neutrality up to this point? Who is in favor of net neutrality? Who is opposed? Why? What would be the impact on individual users, businesses, and government if Internet providers switched to a tiered service model? Are you in favor of legislation enforcing network neutrality? Why or why not? This Interactive Session looks at the issue of network neutrality, the idea that Internet service providers must allow customers equal access to content and applications at the same price, regardless of the size, source or nature of the content. It illustrates some of the challenges and concerns involved when there is a conflict of interest between private and public sectors. If you were an Internet ISP, or backbone owner like Verizon, would you be in favor of net neutrality or against it? How about Google? Ask students if this debate is a political debate among large Internet players, an economic debate where some firms make a lot of money while others lose money, or is it a moral and ethical issue? Ask students to find analogies, such as toll highways versus free ways, or peak time pricing for electricity. Should trucks be charged a higher fee for the use of highways than autos because they cause greater wear and tear on roads given their weight? The owners of the Internet pipelines are private companies who have invested private shareholder resources into a telecommunications network. Why can’t they charge what they want for this service, or charge different amounts for heavy users of the network compared to light users?

32 delivers voice in digital form over the Internet
The Global Internet Voice over IP (VoIP) delivers voice in digital form over the Internet Unified Communications integrates all communications (voice, data, etc.) into one stream to allow user to switch back and forth Virtual Private Networks (VPN) secure, encrypted private network for use internal to an organization

33 The Global Internet

34 The Global Internet

35 Monitoring Employees on Networks: Unethical or Good Business?
The Global Internet Monitoring Employees on Networks: Unethical or Good Business? Read the Window on Management, and then discuss the following questions: Should managers monitor employee and Internet usage? Why or why not? Describe an effective and Web use policy for a company. Should managers inform employees that their Web behaviour is being monitored? Or should managers monitor secretly? Why or why not? Ask students how they would feel about and Internet monitoring as a manager or as an owner of a business – then ask how they would feel about it as an employee. Can they appreciate the ethical dilemma as well as the business need for monitoring? As managers, would they support the idea of monitoring employee use of the Internet to ensure employees are really working and not fooling around on Facebook? Do firms have the right to prohibit employees from using Twitter, Facebook, eBay, and hundreds of other sites while at work?

36 The Web Hypertext Transfer Protocol (HTTP)
The Global Internet The Web Hypertext Transfer Protocol (HTTP) Communications standard used for transferring Web pages Uniform resource locators (URLs) Addresses of Web pages Web servers Software for locating and managing Web pages This slide looks at one of the most popular services on the Internet, the Web, and the main protocols enabling the Web. The Web is an interlinked connection of Web sites, which are collections of Web pages linked to a home page. These pages are created using a text markup language call HTML, and transmitted to user’s Web browsers by HTTP. Web page addresses (URLs) are composed of the domain name of the web site and the file location of the individual web page. Ask students if any have created Web pages using HTML, and if so, to describe what this is like. How have they made the Web pages visible to others on the Web? There is a learning track available online that shows students how to create Web pages using basic HTML.

37 Searching for information on the Web
The Global Internet Searching for information on the Web Search engines Started in early 1990s as relatively simple software programs using keyword indexes Search engine marketing Today, major source of Internet advertising revenue via search engine marketing, using complex algorithms and page ranking techniques to locate results Search engine optimization Process of improving the quality and volume of traffic to a website This slide looks at how people find information of interest on the Web. The primary method is through search engines, which today act as major portals to the Web. Ask students where their initial points of entry are on the Web, and how they find information they are interested in. Most will be Google users, but ask if they have they looked at Bing, the Microsoft search engine that is showing some promise. The text discusses how big the Web is, in terms of pages. Google visited over 100 billion web pages in 2010, but this doesn’t include the “deep Web” Ask students what the “deep Web” is. Web pages a available only to subscribers for a fee (“premium content”) do not allow crawlers to index the pages. Shopping bots are always fun to visit in class. Ask students what they might be interested in having you shop for, and then use one of the shop bots like Shopzilla or Pricegrabber.

38 The Global Internet

39 The Global Internet

40 Intelligent Agent Shopping Bots Web 2.0
The Global Internet Intelligent Agent Shopping Bots Web 2.0 Blogs Wikis RSS Mash-ups Social software Web 3.0: The Future Web Semantic web This slide discusses Web 2.0 services. Ask students to give an example of a Web 2.0 application and identify what features of that application correspond to the four Web 2.0 features listed here. An example might be Facebook. This slide discusses the next wave of improving the Web, a collaborative effort to make searching the Web more productive and meaningful for people. The text estimates that 50% of search engine queries produce meaningful results, or an appropriate result in the first three listings. Ask students what their experience of searching the Web is like, specifically. When they use Google, or another search engine, how do they determine which search results to click on. How many of the results from a search are valuable or appropriate? The text cites the example of searching for Paris Hilton versus Hilton in Paris. Both these searches produce similar results, because the computer does not understand the difference between these two concepts. In a more semantic Web, the difference would be understood. For “intelligent” computing, the text uses the example of using the Semantic web to set up and coordinate plans for a movie with a group of friends – changes to the plan would only take a few voice or text commands using a smartphone. Ask students what they think of these future visions of the Web. Note that the Web is not just a collection of destination sites, but a source of data and services that can be combined to create applications users need. Ask if students use a blog reader, such as Google Reader, to read their blogs. If they have, they have used RSS to pull in the content from their blogs to read them in one place. Note that wikis are used in business to share information. The text cites the example of Motorola, whose sales reps use wikis to share sales information. Instead of developing a different pitch for each client, reps reuse the information posted on the wiki. How do companies use blogs and RSS?

41 The Wireless Revolution
Wireless devices Cellular systems Cellular network standards and generations Mobile wireless standards for Web access This slide discusses the continuing revolution in wireless communication. Ask students to identify the wireless computing devices they use. (Cell phones, smart phones, PDAs, netbooks, laptops, ereaders, etc.) Ask students what changes or improvements have happened in their cell phone service over the past two years. Have they purchased or upgraded a cell phone in that time, and if so, why? How many students are using 3G phones? How many 4G? The next complete evolution in wireless communication, termed 4G, will be entirely packet-switched and capable of providing between 1 Mbps and 1 Gbps speeds, with premium quality and high security. 4G technologies currently include Long Term Evolution (LTE, Verizon), Ultra Mobile Broadband (UMB), and the mobile WiMax. Have students had any experience with these technologies?

42 The Wireless Revolution
Wireless computer networks and Internet access Bluetooth Wi-Fi and Wireless Internet access WiMax This slide discusses the current standards in wireless networking. Ask students if they have any Bluetooth or wireless devices they use for computing. Many cars have Bluetooth support for cell phones. Note that in most Wi-Fi communications, wireless devices communicate with a wired LAN using an access point.

43 The Wireless Revolution

44 The Wireless Revolution

45 The Wireless Revolution
RFID and Wireless Sensor Networks Radio frequency identification (RFID) Use tiny tags with embedded microchips containing data about an item and location, and antenna Tags transmit radio signals over short distances to special RFID readers, which send data over network to computer for processing Active RFID: Tags have batteries, data can be rewritten, range is hundreds of feet, more expensive Passive RFID: Range is shorter, also smaller, less expensive, powered by radio frequency energy This slide continues the discussion of RFID technology. While the cost of RFID tags used to be too costly for widespread implementation, today the cost is about 10 cents for a passive tag, so RFID is becoming more cost-effective. Ask students why special hardware and software is needed to use RFID. (To filter, aggregate, and prevent RFID data from overloading business networks and system applications. ) Also, applications will need to be redesigned to accept massive volumes of frequently generated RFID data and to share those data with other applications. Major enterprise software vendors, including SAP and Oracle-PeopleSoft, now offer RFID-ready versions of their supply chain management applications.

46 The Wireless Revolution

47 The Wireless Revolution
Wireless sensor networks Networks of hundreds or thousands of interconnected wireless devices embedded into physical environment to provide measurements of many points over large spaces Used to monitor building security, detect hazardous substances in air, monitor environmental changes, traffic, or military activity Devices have built-in processing, storage, and radio frequency sensors and antennas Require low-power, long-lasting batteries and ability to endure in the field without maintenance

48 The Wireless Revolution

49 Telecom- munications, the Internet, and Wireless Technology
CHAPTER SEVEN Telecom- munications, the Internet, and Wireless Technology


Download ppt "Telecom- munications, the Internet, and Wireless Technology"

Similar presentations


Ads by Google