+ All Categories
Home > Documents > Telecommunications and Networking 1866

Telecommunications and Networking 1866

Date post: 09-Apr-2018
Category:
Upload: 27901
View: 216 times
Download: 0 times
Share this document with a friend

of 50

Transcript
  • 8/8/2019 Telecommunications and Networking 1866

    1/50

    TelecommunicationsTelecommunicationsand Networkingand Networking

  • 8/8/2019 Telecommunications and Networking 1866

    2/50

    Learning ObjectivesLearning Objectives

    1.1. Understand the concept of a network.Understand the concept of a network.

    2.2.Apply Metcalfes law in understanding theApply Metcalfes law in understanding the

    value of a network.value of a network.3.3. Identify several major developments andIdentify several major developments and

    trends in the industries, technologies, andtrends in the industries, technologies, and

    business applications ofbusiness applications oftelecommunications and Internettelecommunications and Internet

    technologies.technologies.

    4.4. Examples of the business value of Internet,Examples of the business value of Internet,

    intranet, and extranet a lications.intranet, and extranet a lications.

  • 8/8/2019 Telecommunications and Networking 1866

    3/50

    Learning ObjectivesLearning Objectives

    5.5. Identify the basic components, functions,Identify the basic components, functions,

    and types of telecommunications networksand types of telecommunications networks

    used in business.used in business.6.6. Explain the functions of major componentsExplain the functions of major components

    of telecommunications network hardware,of telecommunications network hardware,

    software, media, and services.software, media, and services.

    7.7. Explain the concept of client/serverExplain the concept of client/server

    networking.networking.

    8.8. Understand the two forms of peerUnderstand the two forms of peer--toto--peerpeer

    networkin .networkin .

  • 8/8/2019 Telecommunications and Networking 1866

    4/50

    Learning ObjectivesLearning Objectives

    10.10.Identify the various transmission mediaIdentify the various transmission media

    and topologies used in telecommunicationsand topologies used in telecommunications

    networks.networks.11.11.Understand the fundamentals of wirelessUnderstand the fundamentals of wireless

    network technologies.network technologies.

    12.12.Explain the concepts behind TCP/IP.Explain the concepts behind TCP/IP.13.13.Understand the seven layers of the OSIUnderstand the seven layers of the OSI

    network model.network model.

  • 8/8/2019 Telecommunications and Networking 1866

    5/50

    Network ConceptsNetwork Concepts

    NetworkNetwork

    An interconnected chain, group or systemAn interconnected chain, group or system

    Number of possible connections on aNumber of possible connections on a

    network is N * (Nnetwork is N * (N--1)/21)/2

    WhereN

    = number of nodes (points ofWhereN

    = number of nodes (points ofconnections on the network)connections on the network)

    Example, if there are 10 computers on aExample, if there are 10 computers on a

    network, there are 10 * 9/2 = 45 possiblenetwork, there are 10 * 9/2 = 45 possible

    connectionsconnections

  • 8/8/2019 Telecommunications and Networking 1866

    6/50

    TelecommunicationsTelecommunications

    TelecommunicationsTelecommunications

    Exchange of information in any form (voice,Exchange of information in any form (voice,

    data, text, images, audio, video) over networksdata, text, images, audio, video) over networks

  • 8/8/2019 Telecommunications and Networking 1866

    7/50

    Basic conceptsBasic concepts Communication protocols (TCP/IP)Communication protocols (TCP/IP)

    Data transmission methodsData transmission methods

    AsynchronousAsynchronous

    SynchronousSynchronous

    ConnectingConnecting ModemModem

    Hardwired and remoteHardwired and remote

    Data transmission channels (bps)Data transmission channels (bps)

    narrow bands: 5narrow bands: 5--3030

    voice bands: 1,000voice bands: 1,000--9,6009,600 broad bands: 100,000broad bands: 100,000

    Types of communication linesTypes of communication lines

    simplexsimplex

    half half--duplexduplex

    duplexduplex

  • 8/8/2019 Telecommunications and Networking 1866

    8/50

    NetworksNetworks ConceptConcept

    "a group of interconnected computers, workstations, or computer devices"a group of interconnected computers, workstations, or computer devices

    (such as printers and data storage systems).(such as printers and data storage systems).

    Network topologyNetwork topology

    busbus

    star star

    ringring

    LocalLocal--area networksarea networks bus: Ethernet, carrier sense multiple access (CSMA)bus: Ethernet, carrier sense multiple access (CSMA)

    ring: token passing methodring: token passing method

    Distributed data processingDistributed data processing

    "interconnects sites of one organization not only for communication of data"interconnects sites of one organization not only for communication of data

    and messages but also forand messages but also for

    the sharing of resources."the sharing of resources."

  • 8/8/2019 Telecommunications and Networking 1866

    9/50

    Open SystemsOpen Systems

    Information systems that use common standardsInformation systems that use common standards

    for hardware, software, applications and networksfor hardware, software, applications and networks

    Internet networking technologies are a commonInternet networking technologies are a common

    standard for open systemsstandard for open systems

    ConnectivityConnectivity::

    Ability of networked computers to easily access andAbility of networked computers to easily access and

    communicate with each other and share informationcommunicate with each other and share information InteroperabilityInteroperability::

    The ability of an open system to enable end userThe ability of an open system to enable end user

    applications to be accomplished using differentapplications to be accomplished using different

    varieties of computer systems, software packages,varieties of computer systems, software packages,

  • 8/8/2019 Telecommunications and Networking 1866

    10/50

    MiddlewareMiddleware

    Any programming that serves to glueAny programming that serves to glue

    together two separate programstogether two separate programs

  • 8/8/2019 Telecommunications and Networking 1866

    11/50

  • 8/8/2019 Telecommunications and Networking 1866

    12/50

    Internet Service ProviderInternet Service Provider

    ISPISP

    A company that specializes in providing easyA company that specializes in providing easy

    access to the Internetaccess to the Internet For a monthly fee, you get software, user name,For a monthly fee, you get software, user name,

    password and accesspassword and access

    ISPs are connect to one another throughISPs are connect to one another through

    network access pointsnetwork access points

  • 8/8/2019 Telecommunications and Networking 1866

    13/50

    An Intranet Also look at fig 6.8An Intranet Also look at fig 6.8

    A network inside an organizationA network inside an organization

    That uses Internet technologies (such as WebThat uses Internet technologies (such as Web

    browsers and servers, TCP/IP protocols, HTML,browsers and servers, TCP/IP protocols, HTML,etc.)etc.)

    To provide an InternetTo provide an Internet--like environment withinlike environment within

    the organizationthe organization

    For information sharing, communications,For information sharing, communications,collaboration and support of businesscollaboration and support of business

    processesprocesses Protected by security measuresProtected by security measures

    Can be accessed by authorized users through the InternetCan be accessed by authorized users through the Internet

  • 8/8/2019 Telecommunications and Networking 1866

    14/50

    Extranet (also look at fig 6.9)Extranet (also look at fig 6.9)

    Network links that use Internet technologiesNetwork links that use Internet technologies

    To connect the Intranet of a businessTo connect the Intranet of a business

    With the Intranets of its customers, suppliers orWith the Intranets of its customers, suppliers orother business partnersother business partners

  • 8/8/2019 Telecommunications and Networking 1866

    15/50

    GPSGPS

    1.1. The global positioning system (GPS) is a majorThe global positioning system (GPS) is a major

    technological achievement that has broadtechnological achievement that has broad--

    reaching implications for business. Using thereaching implications for business. Using the

    Internet,Internet,

    Can find other innovative uses forGPS.Can find other innovative uses forGPS.

    Good places to start familiarizing yourself withGood places to start familiarizing yourself with

    current accomplishments arecurrent accomplishments are The GPSWorld site atThe GPSWorld site at

    http://www.gpsworld.com/gpsworld/http://www.gpsworld.com/gpsworld/

    The GPS Overview atThe GPS Overview at

    http://www.colorado.edu/geography/gcraft/notes/gps/http://www.colorado.edu/geography/gcraft/notes/gps/

    gps_f.htmlgps_f.html

  • 8/8/2019 Telecommunications and Networking 1866

    16/50

    Telecommunications networkTelecommunications network

    Any arrangement where a sender transmitsAny arrangement where a sender transmits

    a message to a receiver over a channela message to a receiver over a channel

    consisting of some type of mediumconsisting of some type of medium

  • 8/8/2019 Telecommunications and Networking 1866

    17/50

    Types ofNetworksTypes ofNetworks

    WANWAN

    LANLAN

    VPNVPN C/SC/S

  • 8/8/2019 Telecommunications and Networking 1866

    18/50

    VPNVPN

    Basically, a VPN is a private network that uses aBasically, a VPN is a private network that uses a

    public network (usually the Internet) to connectpublic network (usually the Internet) to connect

    remote sites or users together. Instead of using aremote sites or users together. Instead of using a

    dedicated, realdedicated, real--world connection such as leasedworld connection such as leasedline, a VPN uses "virtual" connectionsline, a VPN uses "virtual" connections routedrouted

    through the Internet from the company's privatethrough the Internet from the company's private

    network to the remote site or employee.network to the remote site or employee.

    Source: computer.Howstuffworks.comSource: computer.Howstuffworks.com

  • 8/8/2019 Telecommunications and Networking 1866

    19/50

    VPNVPN

    I

    c

    rt s

    is c

    s t

    s , I

    c .

    A ty i l V P i h t h v i L A N t th r r th q rt r f y , th r L A N s t r t ff i s r

    f ilit i s i iv i l s e rs e c t i fr t i th e f ie l .

  • 8/8/2019 Telecommunications and Networking 1866

    20/50

    Internetwork ProcessorsInternetwork Processors

    SwitchSwitch makes connections betweenmakes connections between

    telecommunications circuits in a networktelecommunications circuits in a network

    RouterRouter intelligent communicationsintelligent communicationsprocessor that interconnects networksprocessor that interconnects networks

    based on different protocolsbased on different protocols

    HubHub a port switching communicationsa port switching communicationsprocessorprocessor

    GatewayGateway connects networks usingconnects networks using

    different communications architecturesdifferent communications architectures

  • 8/8/2019 Telecommunications and Networking 1866

    21/50

    ROUTERSROUTERS

    Routers are specialized computers that sendRouters are specialized computers that send

    your messages and those of every otheryour messages and those of every other

    Internet user speeding to their destinationsInternet user speeding to their destinationsalong thousands of pathways.along thousands of pathways.

    Fujitsu GeoStream R980 industrial strengt routerFujitsu GeoStream R980 industrial strengt router

  • 8/8/2019 Telecommunications and Networking 1866

    22/50

    ROUTERSROUTERS

    configuration tableconfiguration table. A configuration table is a collection of. A configuration table is a collection ofinformation, including:information, including:

    Information on which connections lead to particular groupsInformation on which connections lead to particular groupsof addressesof addresses

    Priorities for connections to be usedPriorities for connections to be used Rules for handling both routine and special cases of trafficRules for handling both routine and special cases of traffic

    A router, then, has two separate but related jobs:A router, then, has two separate but related jobs:

    The router ensures that information doesn't go where it'sThe router ensures that information doesn't go where it'snot needed. This is crucial for keeping large volumes ofnot needed. This is crucial for keeping large volumes ofdata from clogging the connections of "innocentdata from clogging the connections of "innocentbystanders."bystanders."

    The router makes sure that information does make it to theThe router makes sure that information does make it to theintended destination.intended destination.

    Computer.howstuffworks.comComputer.howstuffworks.com

  • 8/8/2019 Telecommunications and Networking 1866

    23/50

    Distributed data processingDistributed data processingTSS - Time Sharing Systems

    CSS - Client Server Systems

    PC

    MAINFRAME

    PC PC PC

  • 8/8/2019 Telecommunications and Networking 1866

    24/50

    Client/Server networksClient/Server networks

    ClientsClients: End user personal computers: End user personal computers

    or networked computersor networked computers

    Interconnected by LANsInterconnected by LANs

    ServersServers: manage networks: manage networks

    Processing shared between clients andProcessing shared between clients and

    serversservers

  • 8/8/2019 Telecommunications and Networking 1866

    25/50

    CSS arc itectureCSS arc itecture

    PC PC PC PC

    L A N

    FileServer

    PrintServer

    Communica-tions Server

    Remote

    Server

  • 8/8/2019 Telecommunications and Networking 1866

    26/50

    PeerPeer--toto--peer networks (p 209)peer networks (p 209)

    Networks that connect from one PC to another PCNetworks that connect from one PC to another PC

    PeerPeer--toto--peer networking enables or en ances t epeer networking enables or en ances t efollowing scenarios:following scenarios:

    RealReal--time communications (RTC)time communications (RTC) CollaborationCollaboration

    Content distributionContent distribution

    Distributed processingDistributed processing

    Impro ed Internet tec nologiesImpro ed Internet tec nologies

    Source: www.microsoft.comSource: www.microsoft.com

  • 8/8/2019 Telecommunications and Networking 1866

    27/50

    Wireless TechnologiesWireless Technologies

    Terrestrial microwaveTerrestrial microwave

    Earthbound microwave systems that transmitEarthbound microwave systems that transmit

    highhigh--speed radio signals in a linespeed radio signals in a line--ofof--sight pathsight path

    Between relay systems spaced approximatelyBetween relay systems spaced approximately

    3030--miles apartmiles apart

    Communications satellitesCommunications satellites

    Satellite serves as relay stations forSatellite serves as relay stations for

    communications signalscommunications signals

    Uses microwave radio signalsUses microwave radio signals

  • 8/8/2019 Telecommunications and Networking 1866

    28/50

    Wireless TechnologiesWireless Technologies

    Cellular and PCS telephone and pagerCellular and PCS telephone and pager

    systemssystems

    Divide the geographic area into small areas orDivide the geographic area into small areas orcellscells

    Each cell has transmitter or radio relay antennaEach cell has transmitter or radio relay antenna

    to send message from one cell to anotherto send message from one cell to another

    Wireless LANsWireless LANs Radio signals within an office or buildingRadio signals within an office or building

    Connect PCs to networksConnect PCs to networks

    BluetoothBluetooth

  • 8/8/2019 Telecommunications and Networking 1866

    29/50

    BluetoothBluetooth

    Bluetooth is a standard developed by a group ofBluetooth is a standard developed by a group of

    electronics manufacturers that allows any sort ofelectronics manufacturers that allows any sort of

    electronic equipmentelectronic equipment ---- from computers andfrom computers and cellcell

    phonesphones toto keyboardskeyboards and headphonesand headphones ---- to maketo makeits own connections, without wires, cables or anyits own connections, without wires, cables or any

    direct action from a user.direct action from a user.

    Bluetooth can connect up toBluetooth can connect up to eig t de iceseig t de ices

    simultaneously. With all of those devicessimultaneously. With all of those devices

    in the same 10in the same 10--meter (32meter (32--foot) radiusfoot) radius

  • 8/8/2019 Telecommunications and Networking 1866

    30/50

    http://www1.us.dell.com/content/topics/globahttp://www1.us.dell.com/content/topics/globa

    l.aspx/solutions/en/truemobile?c=us&cs=04l.aspx/solutions/en/truemobile?c=us&cs=04

    &l=en&s=bsd&l=en&s=bsd

  • 8/8/2019 Telecommunications and Networking 1866

    31/50

    Cell PhonesCell Phones

    GSM (CDMA) vs TDMAGSM (CDMA) vs TDMA

    Cell vs MobileCell vs Mobile

  • 8/8/2019 Telecommunications and Networking 1866

    32/50

    GSMGSM CDMACDMA

    DigitalDigital YESYES YESYES

    Network T peNetwork T pePP--GSM 900 (primar ) 900MHzGSM 900 (primar ) 900MHz

    bandband

    CDMA 800 , 800MHz band (X1CDMA 800 , 800MHz band (X1is a ailable.. but is notis a ailable.. but is not

    being talked about ere)being talked about ere)

    Maximum talk range from a tower (pls. note ou willMaximum talk range from a tower (pls. note ou will

    need a carkit for our mobile to ac ie e t eseneed a carkit for our mobile to ac ie e t ese

    numbers in some cases)numbers in some cases)

    35KM (stock cell) 70KM ER , EER35KM (stock cell) 70KM ER , EER105KM possible wit105KM possible wit

    special towersspecial towersApprox 110KMApprox 110KM

    Background Noise suppressionBackground Noise suppression YES (Included in EFR)YES (Included in EFR) YESYES

    Talk TimeTalk Time

    Hig er due toDTX and t eHig er due toDTX and t e

    "pulse" nature of TDMA."pulse" nature of TDMA.

    ower due toower due to

    CDMACDMA transmitting alltransmitting allt e t ime.t e time.

    Standb TimesStandb TimesHig er due t e "pulse" nature ofHig er due t e "pulse" nature of

    TDMATDMAHigHig

    International RoamingInternational Roaming

    YES (o er 138 GSM countriesYES (o er 138 GSM countries

    world wide)world wide) VERY OW 15?VERY OW 15?

    World wide customersWorld wide customers 200 Mil200 Mil 35Mil35Mil

    SMSSMS YESYES YESYES

    Fax + DataFax + Data YESYES YESYES

    Built in "Intelligence"Built in "Intelligence" HIGHHIGH MEDIUMMEDIUM

  • 8/8/2019 Telecommunications and Networking 1866

    33/50

    EDI ConceptsEDI Concepts

    EDI is a mechanism for electronic tradingEDI is a mechanism for electronic trading

    EDI replaces paper flow with online transactionsEDI replaces paper flow with online transactions

    EDI architectureEDI architecture

    --------> see next slide> see next slide

    EDI is for trading partnersEDI is for trading partners

    Implementation plan is a key factorImplementation plan is a key factor

    Obstacles:Obstacles: lack of transaction standardizationlack of transaction standardization

    high starthigh start--up costsup costs

    EDI thirdEDI third--party suppliersparty suppliers

    AT&T, Control Data, EDS, GE, Western Union, IBM, Martin MariettaAT&T, Control Data, EDS, GE, Western Union, IBM, Martin Marietta

    Data Systems, etc.Data Systems, etc.

  • 8/8/2019 Telecommunications and Networking 1866

    34/50

    EDI arc itectureEDI arc itecture

    Tradi g art er 1 Tradi g art er 2

    system

    transactionssystem

    transactions

    standard

    transactions

    AcquisitionSystem

    Transaction

    Converter

    Transaction

    Converter

    Or

    derEntrySystem

    ORDER ORDER

    CONFIRMATIONCONFIRMATION

  • 8/8/2019 Telecommunications and Networking 1866

    35/50

    Network Topologies (p 219)Network Topologies (p 219)

    TopologyTopology: structure of a network: structure of a network

    StarStar: ties end user computers to a central: ties end user computers to a centralcomputercomputer

    RingRing: ties local computer processors: ties local computer processors

    together in a ring on a relatively equal basistogether in a ring on a relatively equal basis BusBus: local processors share the same: local processors share the same

    communications channelcommunications channel

  • 8/8/2019 Telecommunications and Networking 1866

    36/50

    Network Architectures &Network Architectures &

    ProtocolsProtocols ProtocolProtocol: standard set of rules and: standard set of rules and

    procedures for the control ofprocedures for the control of

    communications in a networkcommunications in a network Network Architecture:Network Architecture:

    Master plan of standard protocols, hardware,Master plan of standard protocols, hardware,

    software and interfaces between end users andsoftware and interfaces between end users and

    computer systemscomputer systems

    Goal of promoting an open, simple, flexible, andGoal of promoting an open, simple, flexible, and

    efficient telecommunications environmentefficient telecommunications environment

  • 8/8/2019 Telecommunications and Networking 1866

    37/50

    OSI & TCP/IP Models (p 221)OSI & TCP/IP Models (p 221)

    Open Systems Interconnection (OSI)Open Systems Interconnection (OSI) ModelModel

    A sevenA seven--layer model that serves as a standardlayer model that serves as a standard

    model for network architecturesmodel for network architectures

    Model for how messages should be transmittedModel for how messages should be transmitted

    between two points in a networkbetween two points in a network

    Each layer adds functionsEach layer adds functions

    Transmission Control Protocol / InternetTransmission Control Protocol / InternetProtocol (TCP/IP)Protocol (TCP/IP)

    A five layer telecommunications protocol usedA five layer telecommunications protocol used

    by the Internetby the Internet

  • 8/8/2019 Telecommunications and Networking 1866

    38/50

    IPIP

    Internet protocolInternet protocol

    Each system connected to the internet is identified by a 32Each system connected to the internet is identified by a 32--bit IP addressbit IP address

    Four numbers separated by a decimalFour numbers separated by a decimal

    Each represented by octal (8 bits; hence 0Each represented by octal (8 bits; hence 0--255)255)

    Ex: 168.212.226.204Ex: 168.212.226.204

    Binary format:Binary format:10101000.11010100.11100010.11001100.10101000.11010100.11100010.11001100.

    A new protocol IPv6 allows for 128 bit IP addressesA new protocol IPv6 allows for 128 bit IP addresses

    to look up an IP address :to look up an IP address :http://www.kloth.net/services/nslookup.phphttp://www.kloth.net/services/nslookup.php

    to find info:to find info:

    http://www.geobytes.com/IpLocator.htmhttp://www.geobytes.com/IpLocator.htm

  • 8/8/2019 Telecommunications and Networking 1866

    39/50

    Basic Communications ModelBasic Communications ModelStandards are needed at all LayersStandards are needed at all Layers

    User Layer

    pplication Layer

    omputer (Transport) Layer

    Transmission Layer

  • 8/8/2019 Telecommunications and Networking 1866

    40/50

    Internet TelephonyInternet Telephony

    Using an Internet connection to pass voiceUsing an Internet connection to pass voice

    data using IPdata using IP

    Voice over IP (VoIP)Voice over IP (VoIP) Skips standard longSkips standard long--distance phone chargesdistance phone charges

  • 8/8/2019 Telecommunications and Networking 1866

    41/50

    VOIP (source www.fcc.gov)VOIP (source www.fcc.gov)

  • 8/8/2019 Telecommunications and Networking 1866

    42/50

    BandwidthBandwidth

    BandwidthBandwidth

    Frequency range of a telecommunicationsFrequency range of a telecommunications

    channelchannel

    Determines transmission rateDetermines transmission rate

    Classified in bits per second (bps)Classified in bits per second (bps)

    Transmission Rates:Transmission Rates:

    NarrowNarrow--bandband lowlow--speedspeed

    BroadbandBroadband highhigh--speedspeed

  • 8/8/2019 Telecommunications and Networking 1866

    43/50

    WiFiWiFi

    WIreless FIdelity (WiFi)WIreless FIdelity (WiFi)---- used generically when referringused generically when referringof any type ofof any type of802.11802.11

    ""WiWi--FiFi CertifiedCertified" (a registered trademark) by the Wi" (a registered trademark) by the Wi--FiFiAlliance areAlliance are interoperableinteroperable with each other,with each other,

    even if they are from different manufacturers. A user with aeven if they are from different manufacturers. A user with a"Wi"Wi--Fi Certified" product can use anyFi Certified" product can use any

    brand ofbrand ofaccess pointaccess point with any other brand of clientwith any other brand of client

    hardwarehardware that also is certifiedthat also is certified

    http://www.webopedia.com/TERM/W/Wi_Fi.htmlhttp://www.webopedia.com/TERM/W/Wi_Fi.html

  • 8/8/2019 Telecommunications and Networking 1866

    44/50

    Additional ReadingsAdditional Readings

    Voice o er data networksVoice o er data networks

    Networking Hardware QuizNetworking Hardware Quiz

    abc of wireless ANabc of wireless AN

    ISDN TutoriISDN Tutorialal Et ernet tutorialEt ernet tutorial

    Internet ProtocolInternet Protocol

    T in clientsT in clients

    UNIX/NT integrationUNIX/NT integration Cell p onesCell p ones

  • 8/8/2019 Telecommunications and Networking 1866

    45/50

    RWC 1: SAIC, HewlettRWC 1: SAIC, Hewlett--Packard, GE, and Ot ers:Packard, GE, and Ot ers:

    Wireless, Wireless E er w ereWireless, Wireless E er w ere

    W at are some of t e business benefitsW at are some of t e business benefits

    associated wit using wireless networks toassociated wit using wireless networks to

    collect and transmit data?collect and transmit data?

    Benefits would includeBenefits would include

    Superfast wireless connections to the Web.Superfast wireless connections to the Web.

    Cost is about oneCost is about one--fourth of existing costs forfourth of existing costs for

    connection to the Web.connection to the Web.

    Productivity gains such as a 45% gain at UPS.Productivity gains such as a 45% gain at UPS.

  • 8/8/2019 Telecommunications and Networking 1866

    46/50

    W at are some of t e c allenges being faced in t is useW at are some of t e c allenges being faced in t is use

    of wireless tec nologies? W at solutions can ouof wireless tec nologies? W at solutions can ou

    offer?offer?

    Having everyone online in a meeting can be toxic toHaving everyone online in a meeting can be toxic toproductivity. No laptop policies for important meetings.productivity. No laptop policies for important meetings.

    Enormous pressure within companies to provide WiEnormous pressure within companies to provide Wi--Fi inFi in

    all areas of the company. Which employees haveall areas of the company. Which employees havecompelling needs for Wicompelling needs for Wi--Fi accessFi access

    Cost exceeds the benefit to be gained by providing WiCost exceeds the benefit to be gained by providing Wi--FiFisuch as in a manufacturing plant that would requiresuch as in a manufacturing plant that would require

    numerous additional access points than usual.numerous additional access points than usual.

    Security of information available via the WiSecurity of information available via the Wi--Fi system.Fi system.Delay implementation until security assurances are met.Delay implementation until security assurances are met.

  • 8/8/2019 Telecommunications and Networking 1866

    47/50

    T e use of wireless networking asT e use of wireless networking as

    described in t e case is bot inno ati e anddescribed in t e case is bot inno ati e and

    useful. W at ot er business uses can ouuseful. W at ot er business uses can ou

    en ision for t is approac ?en ision for t is approac ?

  • 8/8/2019 Telecommunications and Networking 1866

    48/50

    RWC 2: Mar land and Colorado: Ser ingRWC 2: Mar land and Colorado: Ser ing

    Its Citizens Wit out Using WiresIts Citizens Wit out Using Wires

    1.1. W at is t e business alue of ad anced mobile tec nologies toW at is t e business alue of ad anced mobile tec nologies toMar lands emergenc management ser ices?Mar lands emergenc management ser ices?

    Direct agentsDirect agents toward places where their presence is requiredtoward places where their presence is required

    GiveGive notice of impending natural disastersnotice of impending natural disasters with forecasts andwith forecasts andinstructions on how to proceed.instructions on how to proceed.

    Improve information gatheringImprove information gathering on the extent and magnitude ofon the extent and magnitude ofdevastation.devastation.

    Reduce the amount of manual dataReduce the amount of manual data--entryentry, leading to improved, leading to improvedresponse times and reduction of errors (i.e. address is automaticallyresponse times and reduction of errors (i.e. address is automaticallycaptured and popcaptured and pop--up menus limit possible answers).up menus limit possible answers).

    In w at ot er go ernment ser ices couldIn w at ot er go ernment ser ices could

  • 8/8/2019 Telecommunications and Networking 1866

    49/50

    In w at ot er go ernment ser ices couldIn w at ot er go ernment ser ices could

    GPS ser e to pro ide business alue?GPS ser e to pro ide business alue?

    Gi e some examples.Gi e some examples.

    States National Guards, to monitor and direct personnel inStates National Guards, to monitor and direct personnel incase of an emergency.case of an emergency.

    Emergency Services, to direct ambulances, firefighters,Emergency Services, to direct ambulances, firefighters,

    etc.etc.

    Department of Treasury / Federal Reserve, to track theDepartment of Treasury / Federal Reserve, to track thelocation of armored trucks both for regular traffic and inlocation of armored trucks both for regular traffic and incase of a hijacking.case of a hijacking.

    The military in general, given that it has one of the largestThe military in general, given that it has one of the largestmanpower and logistics network in the country.manpower and logistics network in the country.

    A t di d t i k i t d itA t di d t i k i t d it

  • 8/8/2019 Telecommunications and Networking 1866

    50/50

    Are t ere disad antages or risks associated witAre t ere disad antages or risks associated wit

    t e deplo ment of GPS s stems to monitort e deplo ment of GPS s stems to monitor

    t e location of people? Explain.t e location of people? Explain.

    Invasions of privacyInvasions of privacy

    Limitation on the freedom of movementLimitation on the freedom of movement

    Could allow not only the government butCould allow not only the government but

    also private individuals to monitor otheralso private individuals to monitor otherpeoples movements.peoples movements.


Recommended