8/2/2019 Chap6 IT Ethics and Issues
1/43
2008 Prentice-Hall, Inc. Slide 1
Tomorrows Technology
and You8th Edition
8/2/2019 Chap6 IT Ethics and Issues
2/43
2008 Prentice-Hall, Inc. Slide 2
Tomorrows Technology
and You 8/e
Chapter 8
Networking and Digital Communication
8/2/2019 Chap6 IT Ethics and Issues
3/43
2008 Prentice-Hall, Inc. Slide 3
Tomorrows Technology and You 8/eChapter 8
Objectives
Describe the basic types of technology that make
telecommunication possible.
Describe the nature and function of local area networks
and wide area networks.
Discuss the uses and implications of email, instant
messaging, blogging, teleconferencing, and other formsof online communication.
8/2/2019 Chap6 IT Ethics and Issues
4/43
2008 Prentice-Hall, Inc. Slide 4
Tomorrows Technology and You 8/e
Chapter 8
Objectives (continued)
Explain how wireless network technology is
transforming the ways people work and communicate.
Describe current and future trends in
telecommunications and networking.
8/2/2019 Chap6 IT Ethics and Issues
5/43
2008 Prentice-Hall, Inc. Slide 5
Tomorrows Technology and You 8/e
Chapter 8
Arthur C. Clarkes Magical ProphecyClarkes laws
If an elderly but distinguished scientist says
that something is possible, he is almostcertainly right, but if he says that it is
impossible he is very probably wrong.
The only way to find the limits of the possible
is to go beyond them into the impossible.
Any sufficiently advanced technology isindistinguishable from magic.
8/2/2019 Chap6 IT Ethics and Issues
6/43
2008 Prentice-Hall, Inc. Slide 6
Tomorrows Technology and You 8/e
Chapter 8
Arthur C. Clarkes Magical Prophecy Arthur C. Clarkes most famous work was the
monumental 1968 film 2001: A Space Odyssey,
in which he collaborated with movie director
Stanley Kubrick. Clarkes most visionary work may be a paper
published in 1945 in which he predicted the use
ofgeostationary communications satellites
satellites that match the Earths rotation so they
can hang in a stationary position relative to thespinning planet below, relaying wireless
transmissions between locations on the planet.
8/2/2019 Chap6 IT Ethics and Issues
7/43
2008 Prentice-Hall, Inc. Slide 7
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
A computer network is any system of two or
more computers that are linked together.
How is networking important? People share computer hardware, thus reducing
costs.
People share data and software programs, thus
increasing efficiency and production.
People work together in ways that are otherwise
difficult or impossible.
8/2/2019 Chap6 IT Ethics and Issues
8/43
2008 Prentice-Hall, Inc. Slide 8
Tomorrows Technology and You 8/e
Chapter 8
Basic Network AnatomyNetworks Near and Far
In a local area network (LAN) computers are physically close to each other,usually in the same building.Computers are linked within a building or
cluster of buildings.
Each computer and peripheral is an individualnode on the network.
Nodes are connected by cables, which may beeither twisted pair (copper wires) or coaxial cable.
In a wireless network each node has a tiny radio (or, less commonly, infrared)transmitter connected to its network port.
Computers send and receive data through the air rather than through cables.
8/2/2019 Chap6 IT Ethics and Issues
9/43
2008 Prentice-Hall, Inc. Slide 9
Tomorrows Technology and You 8/e
Chapter 8
Basic Network AnatomyA metropolitan area network (MAN) links two or more LANs within a city.
A wide area network (WAN) extends over a long distance.
Each networked LAN site is a node on the WAN.
Data transmitted over common pathways called a backbone.
8/2/2019 Chap6 IT Ethics and Issues
10/43
2008 Prentice-Hall, Inc. Slide 10
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
Communication frequently happens between LANs and WANs
Routers: hardware devices or software programs that route messages as they travel
between networks
Mesh networks:an alternative to todays networks; rely on centralized routers
Used to set up small, temporary communication systems
Example: emergency personnel use at fire scenes to coordinate actions
Pretty soon youll have no more
idea ofwhat computer youre using
than you have an idea ofwhere your
electricity comes from.Danny Hillis, computer designer
8/2/2019 Chap6 IT Ethics and Issues
11/43
2008 Prentice-Hall, Inc. Slide 11
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
Specialized Networks: From GPS to Financial Systems
Global Positioning System (GPS)
GPS is a specialized network developed by
U.S. Department of Defense.
It includes 24 satellites that circle the Earth.
Each satellite contains a computer, an atomic
clock, and a radio.
On the ground, a GPS receiver can use
signals broadcast by three or four visible
satellites to determine its position.
8/2/2019 Chap6 IT Ethics and Issues
12/43
2008 Prentice-Hall, Inc. Slide 12
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
Networks that keep our global financial systems running:
Automated Teller Machine (ATM):a specialized terminal linked to a banks main
computer through a commercial banking network
8/2/2019 Chap6 IT Ethics and Issues
13/43
2008 Prentice-Hall, Inc. Slide 13
Tomorrows Technology and You 8/e
Chapter 8
Basic Network AnatomyThe Network Interface
A network interface card (NIC) permits
direct network connection:
Adds an additional serial port to the computer
Controls the flow of data between the computers RAM
and the network cable
The most common types of networks today require some kind of Ethernet card
or port in each computer.
Ethernet is a popular networking architecture developed in 1976 at Xerox.
Most newer PCs include an Ethernet port on the main circuit board, so they dont
require NICs to connect to Ethernet networks.
8/2/2019 Chap6 IT Ethics and Issues
14/43
2008 Prentice-Hall, Inc. Slide 14
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
Communication la Modem
Modem: a hardware device that connects a
computers serial port to a telephone line
(for remote access)
May be internal on the system board or external,
sitting in a box linked to a serial port
Modem transmission speed measured in bits per second (bps)
Transmit at 28,000 bps to 56.6K bps
8/2/2019 Chap6 IT Ethics and Issues
15/43
2008 Prentice-Hall, Inc. Slide 15
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
Computers send digital signals.
The modem (modulator/demodulator) converts the digital signals toanalog so that the message can be transmitted through telephone lines andconverts it back on the other end.
8/2/2019 Chap6 IT Ethics and Issues
16/43
2008 Prentice-Hall, Inc. Slide 16
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
Broadband connectiona connection with much greaterbandwidth than modems have
DSL uses standard phone lines and is provided by phone companies in
many areas.Cable modems provide fast network connections through cable
television networks in many areas.
High-speed wireless connections can connect computers to networksusing radio waves rather than wires.
Satellite dishes can deliver fast computer network connections as wellas television programs.
8/2/2019 Chap6 IT Ethics and Issues
17/43
8/2/2019 Chap6 IT Ethics and Issues
18/43
2008 Prentice-Hall, Inc. Slide 18
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
Wireless Network Technology
A lightning-fast network connection to your desktop is of little use if youre
away from your desk most of the time; when bandwidth is less important thanmobility and portability, wireless technology can provide practical solutions.
The fastest growing wireless LAN technology is known as Wi-Fior802.11b.
8/2/2019 Chap6 IT Ethics and Issues
19/43
2008 Prentice-Hall, Inc. Slide 19
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
Bluetooth: another type of wireless technologyNamed for a Danish king who overcame his countrys religious differences
Overcomes differences between mobile phones, handheld computers, and PCs, making
it possible for all of these devices to communicate with each other regardless of
operating system
T T h l d Y 8/
8/2/2019 Chap6 IT Ethics and Issues
20/43
2008 Prentice-Hall, Inc. Slide 20
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
With Bluetooth its possible to create a
personal area network (PAN)a network that
links a variety of personal electronic devices so they can
communicate with each other.
Bluetooth technology is currently limited to simple deviceconnectivity, but in the future it will open up all kinds of
possibilities:A pacemaker senses a heart attack and notifies the victims
mobile phone to dial 911.
A car radio communicates with parking-lot video cameras
to find out where spaces are available.
8/2/2019 Chap6 IT Ethics and Issues
21/43
2008 Prentice-Hall, Inc. Slide 21
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
More examples of Bluetooth possibilities:
A pen scans business cards and sends the
information to a PDA inside a briefcase.
A medical wristband transmits an accidentvictims vital information to a doctors
handheld computer.
A cell phone tells you about specials on
clothes that are available in your size as you
walk past stores in a mall.
8/2/2019 Chap6 IT Ethics and Issues
22/43
2008 Prentice-Hall, Inc. Slide 22
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
Communication Software
Protocol is a set of rules for the exchange of data between a
terminal and a computer or between two computers.
Communication software establishes a protocol that is followed
by the computers hardware.
8/2/2019 Chap6 IT Ethics and Issues
23/43
2008 Prentice-Hall, Inc. Slide 23
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
Communication software takes many forms:Network operating system (NOS)
System handles communications among many
workstations.
Client/server model One or more computers act as dedicated servers and all the
remaining computers act as clients.
Peer-to-peer model
Every computer on the network is both client and server.
Many networks are hybrids, using features of the
client/server and peer-to-peer models.
Tomorrows Technology and You 8/e
8/2/2019 Chap6 IT Ethics and Issues
24/43
2008 Prentice-Hall, Inc. Slide 24
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
The Network Advantage
Why do people use networks?
Networks enable people to share computer hardware resources, reducing
costs and enabling people to take advantage of powerful computerequipment.
Networks enable people to share data and software programs, increasing
efficiency and productivity.
Networks enable people to work together or collaborate in ways that are
difficult or impossible without network technology.
Tomorrows Technology and You 8/e
8/2/2019 Chap6 IT Ethics and Issues
25/43
2008 Prentice-Hall, Inc. Slide 25
Tomorrows Technology and You 8/e
Chapter 8
Basic Network Anatomy
A Home Computer Network
Firewall/router
USB cable
DSL modem
Wireless laptop
Multiplayer games
Wireless accesspoint
T T h l d Y 8/
8/2/2019 Chap6 IT Ethics and Issues
26/43
2008 Prentice-Hall, Inc. Slide 26
Tomorrows Technology and You 8/e
Chapter 8
Interpersonal Computing:
From Email to Social Networks
The Many Faces of Email
Email systems enable you to send and receive messages to otherson the network.
Web-based email systems and many older UNIX-based programs require
that read and unread messages be stored in post office boxes or folders
on the remote mail servers.
Many email messages are plain ASCII text.
T T h l d Y 8/
8/2/2019 Chap6 IT Ethics and Issues
27/43
2008 Prentice-Hall, Inc. Slide 27
Tomorrows Technology and You 8/e
Chapter 8
Interpersonal Computing:
From Email to Social Networks
Even if their software can display HTML mail, not all email users wantHTML
emails:
HTML encoding can slow down an email program.
An HTML email message can also carry a Web bug.
Most email programs can send and receive formatted word processor
documents, pictures, and other multimedia files as attachments to messages.
T T h l d Y 8/
8/2/2019 Chap6 IT Ethics and Issues
28/43
2008 Prentice-Hall, Inc. Slide 28
Tomorrows Technology and You 8/e
Chapter 8
Interpersonal Computing:
From Email to Social Networks
Mailing Lists
Mailing lists enable you to participate in email discussion groups on
special-interest topics.Subscribing to a busy list might mean receiving hundreds of messages
each day.
To avoid being overwhelmed by incoming mail, many list members sign up to
receive them in daily digest form.
Some lists are moderated to ensure that the quality of the discussion remains high.
T T h l d Y 8/
8/2/2019 Chap6 IT Ethics and Issues
29/43
2008 Prentice-Hall, Inc. Slide 29
Tomorrows Technology and You 8/e
Chapter 8
Interpersonal Computing:
From Email to Social Networks
Newsgroups
Newsgroup: a public discussion on a particular subject
Notes are written to a central Internet site.
Notes are redistributed through a worldwide newsgroup network called USENET.
Listserv mail messages are delivered automatically to your mailbox, but you have
to seek out information in newsgroups.
Mailing list messages are sent to a specific group of people, whereas newsgroup
messages are available for anyone to see.
Moderated newsgroups contain only messages that have been filtered bydesignated moderators.
T T h l d Y 8/
8/2/2019 Chap6 IT Ethics and Issues
30/43
2008 Prentice-Hall, Inc. Slide 30
Tomorrows Technology and You 8/e
Chapter 8
Interpersonal Computing:
From Email to Social Networks
Rules of Thumb: Online Survival Tips
Let your system do as much of the work as possible.
Store names and addresses in computer-accessibleaddressbook.
Dont share your email address.
Dont open suspicious attachments.
Protect your privacy.
Cross-check on-line information sources.Be aware and awake.
Avoid information overload.
T T h l d Y 8/
8/2/2019 Chap6 IT Ethics and Issues
31/43
2008 Prentice-Hall, Inc. Slide 31
Tomorrows Technology and You 8/e
Chapter 8
Interpersonal Computing:
From Email to Social NetworksInstant Messaging and Teleconferencing:
Real-Time Communication
Mailing lists and newsgroups are delayed or asynchronous
communication.
The sender and the recipients dont have to be logged in at the same time.
Instant messaging (IM) has been possible since the days of text-only
Internet access.
Newer, easier to use messaging systems from AOL, Microsoft, Yahoo,Apple, and others have turned instant messaging into one of the most
popular Internet activities.
T T h l d Y 8/
8/2/2019 Chap6 IT Ethics and Issues
32/43
2008 Prentice-Hall, Inc. Slide 32
Tomorrows Technology and You 8/e
Chapter 8
Interpersonal Computing:
From Email to Social Networks
Online services also offer chat roomspublic or private virtual conference
rooms where people with similar interests or motivations can type messages
to each other and receive near instant responses.
Several IM programs make it possible to carry on two-way videoteleconferences.
Tomorro s Technolog and Yo 8/e
8/2/2019 Chap6 IT Ethics and Issues
33/43
2008 Prentice-Hall, Inc. Slide 33
Tomorrows Technology and You 8/e
Chapter 8
Interpersonal Computing:
From Email to Social NetworksComputer Telephony
Voice mail is a messaging system with the ability to store, organize, and
forward messages.An example of a growing trend toward computer telephony integration
(CTI) is the linking of computers and telephones to gain productivity.
Its also possible to send voice signals through a LAN, a WAN, or the
Internet, bypassing the phone companies (and their charges) altogether.
Handheld PDA computers use software to integrate the functions of aPDA, a phone, and an Internet terminal.
Tomorrows Technology and You 8/e
8/2/2019 Chap6 IT Ethics and Issues
34/43
2008 Prentice-Hall, Inc. Slide 34
Tomorrows Technology and You 8/e
Chapter 8Interpersonal Computing:
From Email to Social Networks
Computer Telephony
Internet Telephony has become a legitimate competitor to traditional
phone companies.
Voice over IP (VoIP) requires a broadband connection to carry your
call over the Internet.
You can place a calling using either a traditional phone with an adapter
or an Internet-connected PC with a microphone headset andappropriate software.
Tomorrows Technology and You 8/e
8/2/2019 Chap6 IT Ethics and Issues
35/43
2008 Prentice-Hall, Inc. Slide 35
Tomorrow s Technology and You 8/e
Chapter 8Interpersonal Computing:
From Email to Social Networks
Computer Telephony
Advantages of VoIPCalls are less expensive if you already have a broadband connection.
Calls are routed to you no matter where you are connected.
VoIP phones integrate more easily with online address books, video
conference services, and other Internet services.
Tomorrows Technology and You 8/e
8/2/2019 Chap6 IT Ethics and Issues
36/43
2008 Prentice-Hall, Inc. Slide 36
Tomorrow s Technology and You 8/e
Chapter 8Interpersonal Computing:
From Email to Social Networks
Computer Telephony
Disadvantages of VoIPCommunication is impossible during a power outage (most networks
are unusable).
There is no 911 or directory assistance service available.
Quality is suspect because there is no guarantee of packets being
delivered in a timely manner.
Tomorrows Technology and You 8/e
8/2/2019 Chap6 IT Ethics and Issues
37/43
2008 Prentice-Hall, Inc. Slide 37
Tomorrows Technology and You 8/e
Chapter 8
Interpersonal Computing:
From Email to Social Networks
Social Networks and Information Sharing
Online communities such as MySpace and Facebook
Massively multiplayer role playing games (MMORPG)
Common information resources such as Flickr and Wikipedia
8/2/2019 Chap6 IT Ethics and Issues
38/43
2008 Prentice-Hall, Inc. Slide 38
Tomorrows Technology and You 8/e
Chapter 8
Online RisksEmail Issues
Problems with Spammore than 50% of e-mails are unsolicited.
Email and teleconferencing are vulnerable to machine failures, network
glitches, human errors, and security breaches.
Email can be overwhelming.
Email can pose a threat to privacy.
T T h l d Y 8/
8/2/2019 Chap6 IT Ethics and Issues
39/43
2008 Prentice-Hall, Inc. Slide 39
Tomorrows Technology and You 8/e
Chapter 8
Online Risks
Dont Get HookedAdvice on Phishing
Examine the URL in the address bar.
Re-examine the URL in the address bar.
Look for the https prefix.Look for the padlock icon.
Pay attention to pop-up warnings about fraudulent certificates.
Make your own Web connection.
8/2/2019 Chap6 IT Ethics and Issues
40/43
2008 Prentice-Hall, Inc. Slide 40
Tomorrows Technology and You 8/e
Chapter 8
Online Risks
CookiesCan be used by snoopers to get information about you
Wireless issues of access, security, and privacy
Perils of posting too much information on blogs and websites
Internet AddictionSome game players spend 40-80 hrs a week online
Virtual Sweatshops
8/2/2019 Chap6 IT Ethics and Issues
41/43
2008 Prentice-Hall, Inc. Slide 41
Tomorrows Technology and You 8/e
Chapter 8
Online RisksDigital Communication in Perspective
Many services we take for granted todayvideo rentals, cable TV,
newspapers, and magazines, for examplewill be transformed or
replaced by digital high-bandwidth interactive delivery systems of thefuture.
At the same time, entirely new forms of communication are likely to
emerge.
Telecommunications technology is rapidly changing our lives, and the
changes will accelerate as the technology improves.
8/2/2019 Chap6 IT Ethics and Issues
42/43
2008 Prentice-Hall, Inc. Slide 42
Tomorrows Technology and You 8/e
Chapter 8
Lesson SummaryNetworking is one of the most important trends in computing today.
LANs are made up of computers that are close enough to be directlyconnected with cables or wireless radio transmitters/receivers.
Most LANs include shared printers and file servers.
WANs are made up of computers separated by considerable distance.
Many computer networks are connected together through the Internet somessages and data can pass back and forth among them.
Some specialized networks, including global positioning systems andfinancial systems serve unique functions.
Tomorrows Technology and You 8/e
8/2/2019 Chap6 IT Ethics and Issues
43/43
Slide 43
Tomorrow s Technology and You 8/e
Chapter 8
Lesson Summary (continued)
Most computer networks today use the Ethernet architecture; an Ethernet
port is a standard feature on most modern PCs.
Communication software takes care of the details of communication
between machinesdetails like protocols that determine how signals willbe sent and received.
Email, instant messaging, and teleconferencing are the most common
forms of communication between people on computer networks.
Its not clear how all of these emerging technologies will converge; what is
clear is that the wireless revolution is far from over.