* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download CH07 - Cameron School of Business
Deep packet inspection wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Wireless security wikipedia , lookup
Airborne Networking wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Cellular network wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Business Driven Information Systems 2e CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved SECTION 7.1 NETWORKS AND TELECOMMUNICATIONS McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved 7-3 INTRODUCTION • Telecommunication system - enable the transmission of data over public or private networks • Network - a communications system created by linking two or more computers using establishing standards, or protocols 7-4 NETWORK BASICS • Local area network (LAN) - is designed to connect a group of computers in close proximity to each other such as in an office building, a school, or a home. • Wide area network (WAN) - spans a large geographic area, such as a state, province, or country • Metropolitan area network (MAN) - a large computer network usually spanning a city 7-5 The Internet • The network of networks. • So how does it work? 7-6 VOICE OVER IP (VoIP) • Voice over IP (VoIP) - uses TCP/IP technology to transmit voice calls over long-distance telephone lines 7-7 NETWORKING BUSINESSES 7-8 INCREASING THE SPEED OF BUSINESS • Bandwidth - a measure of the medium's capacity • Broadband - refers to high-speed Internet connections transmitting data at speeds greater than 200 kilobytes per second (Kbps) 7-9 INCREASING THE SPEED OF BUSINESS 7-10 SECURING BUSINESS NETWORKS • There have been many network security problems - networks are a tempting target for mischief and fraud • An organization has to be concerned about… – Proper identification of users and authorization of network access – The control of access, and the protection of data integrity SECTION 7.2 MOBILE TECHNOLOGY McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved 7-12 BUSINESS DRIVERS FOR A MOBILE WORKFORCE • The terms mobile and wireless are often used synonymously, but actually denote two different technologies – Mobile means the technology can travel with the user, but it is not necessarily in real-time – Wireless gives users a live (Internet) connection via satellite or radio transmitters 7-13 USING CELLULAR TECHNOLOGIES IN BUSINESS 7-14 USING CELLULAR TECHNOLOGIES IN BUSINESS 7-15 USING CELLULAR TECHNOLOGIES IN BUSINESS • The latest trends in cell phones reflect a convergence of voice, video and data communications • By blending information with entertainment, cell phones are centerstage in the evolving trend of mobile infotainment 7-16 USING SATELLITE TECHNOLOGIES IN BUSINESS 7-17 Global Positioning System (GPS) 7-18 Global Positioning System (GPS) • Geographic information system (GIS) is designed to work with information that can be shown on a map • Some cell phone providers equip their phones with GPS chips that enable users to be located to within a geographical location about the size of a tennis court 7-19 WiMAX • The main problem with Wi-Fi access is that hot spots are very small, so coverage is sparse • WiMAX - is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access 7-20 Radio Frequency Identification (RFID) • Radio frequency identification (RFID) - use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers • RFID tag - contains a microchip and an antenna, and typically work by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag 7-21 Radio Frequency Identification (RFID) 7-22 MOBILE WORKFORCE TRENDS • • • • • Social networking gets mobilized Mobile TV Location-based services Mobile advertising Wireless providers move into home entertainment • Wireless security moves to the forefront • Enterprise mobility