+ All Categories
Transcript
  • 8/2/2019 Chap6 IT Ethics and Issues

    1/43

    2008 Prentice-Hall, Inc. Slide 1

    Tomorrows Technology

    and You8th Edition

  • 8/2/2019 Chap6 IT Ethics and Issues

    2/43

    2008 Prentice-Hall, Inc. Slide 2

    Tomorrows Technology

    and You 8/e

    Chapter 8

    Networking and Digital Communication

  • 8/2/2019 Chap6 IT Ethics and Issues

    3/43

    2008 Prentice-Hall, Inc. Slide 3

    Tomorrows Technology and You 8/eChapter 8

    Objectives

    Describe the basic types of technology that make

    telecommunication possible.

    Describe the nature and function of local area networks

    and wide area networks.

    Discuss the uses and implications of email, instant

    messaging, blogging, teleconferencing, and other formsof online communication.

  • 8/2/2019 Chap6 IT Ethics and Issues

    4/43

    2008 Prentice-Hall, Inc. Slide 4

    Tomorrows Technology and You 8/e

    Chapter 8

    Objectives (continued)

    Explain how wireless network technology is

    transforming the ways people work and communicate.

    Describe current and future trends in

    telecommunications and networking.

  • 8/2/2019 Chap6 IT Ethics and Issues

    5/43

    2008 Prentice-Hall, Inc. Slide 5

    Tomorrows Technology and You 8/e

    Chapter 8

    Arthur C. Clarkes Magical ProphecyClarkes laws

    If an elderly but distinguished scientist says

    that something is possible, he is almostcertainly right, but if he says that it is

    impossible he is very probably wrong.

    The only way to find the limits of the possible

    is to go beyond them into the impossible.

    Any sufficiently advanced technology isindistinguishable from magic.

  • 8/2/2019 Chap6 IT Ethics and Issues

    6/43

    2008 Prentice-Hall, Inc. Slide 6

    Tomorrows Technology and You 8/e

    Chapter 8

    Arthur C. Clarkes Magical Prophecy Arthur C. Clarkes most famous work was the

    monumental 1968 film 2001: A Space Odyssey,

    in which he collaborated with movie director

    Stanley Kubrick. Clarkes most visionary work may be a paper

    published in 1945 in which he predicted the use

    ofgeostationary communications satellites

    satellites that match the Earths rotation so they

    can hang in a stationary position relative to thespinning planet below, relaying wireless

    transmissions between locations on the planet.

  • 8/2/2019 Chap6 IT Ethics and Issues

    7/43

    2008 Prentice-Hall, Inc. Slide 7

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    A computer network is any system of two or

    more computers that are linked together.

    How is networking important? People share computer hardware, thus reducing

    costs.

    People share data and software programs, thus

    increasing efficiency and production.

    People work together in ways that are otherwise

    difficult or impossible.

  • 8/2/2019 Chap6 IT Ethics and Issues

    8/43

    2008 Prentice-Hall, Inc. Slide 8

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network AnatomyNetworks Near and Far

    In a local area network (LAN) computers are physically close to each other,usually in the same building.Computers are linked within a building or

    cluster of buildings.

    Each computer and peripheral is an individualnode on the network.

    Nodes are connected by cables, which may beeither twisted pair (copper wires) or coaxial cable.

    In a wireless network each node has a tiny radio (or, less commonly, infrared)transmitter connected to its network port.

    Computers send and receive data through the air rather than through cables.

  • 8/2/2019 Chap6 IT Ethics and Issues

    9/43

    2008 Prentice-Hall, Inc. Slide 9

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network AnatomyA metropolitan area network (MAN) links two or more LANs within a city.

    A wide area network (WAN) extends over a long distance.

    Each networked LAN site is a node on the WAN.

    Data transmitted over common pathways called a backbone.

  • 8/2/2019 Chap6 IT Ethics and Issues

    10/43

    2008 Prentice-Hall, Inc. Slide 10

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    Communication frequently happens between LANs and WANs

    Routers: hardware devices or software programs that route messages as they travel

    between networks

    Mesh networks:an alternative to todays networks; rely on centralized routers

    Used to set up small, temporary communication systems

    Example: emergency personnel use at fire scenes to coordinate actions

    Pretty soon youll have no more

    idea ofwhat computer youre using

    than you have an idea ofwhere your

    electricity comes from.Danny Hillis, computer designer

  • 8/2/2019 Chap6 IT Ethics and Issues

    11/43

    2008 Prentice-Hall, Inc. Slide 11

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    Specialized Networks: From GPS to Financial Systems

    Global Positioning System (GPS)

    GPS is a specialized network developed by

    U.S. Department of Defense.

    It includes 24 satellites that circle the Earth.

    Each satellite contains a computer, an atomic

    clock, and a radio.

    On the ground, a GPS receiver can use

    signals broadcast by three or four visible

    satellites to determine its position.

  • 8/2/2019 Chap6 IT Ethics and Issues

    12/43

    2008 Prentice-Hall, Inc. Slide 12

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    Networks that keep our global financial systems running:

    Automated Teller Machine (ATM):a specialized terminal linked to a banks main

    computer through a commercial banking network

  • 8/2/2019 Chap6 IT Ethics and Issues

    13/43

    2008 Prentice-Hall, Inc. Slide 13

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network AnatomyThe Network Interface

    A network interface card (NIC) permits

    direct network connection:

    Adds an additional serial port to the computer

    Controls the flow of data between the computers RAM

    and the network cable

    The most common types of networks today require some kind of Ethernet card

    or port in each computer.

    Ethernet is a popular networking architecture developed in 1976 at Xerox.

    Most newer PCs include an Ethernet port on the main circuit board, so they dont

    require NICs to connect to Ethernet networks.

  • 8/2/2019 Chap6 IT Ethics and Issues

    14/43

    2008 Prentice-Hall, Inc. Slide 14

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    Communication la Modem

    Modem: a hardware device that connects a

    computers serial port to a telephone line

    (for remote access)

    May be internal on the system board or external,

    sitting in a box linked to a serial port

    Modem transmission speed measured in bits per second (bps)

    Transmit at 28,000 bps to 56.6K bps

  • 8/2/2019 Chap6 IT Ethics and Issues

    15/43

    2008 Prentice-Hall, Inc. Slide 15

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    Computers send digital signals.

    The modem (modulator/demodulator) converts the digital signals toanalog so that the message can be transmitted through telephone lines andconverts it back on the other end.

  • 8/2/2019 Chap6 IT Ethics and Issues

    16/43

    2008 Prentice-Hall, Inc. Slide 16

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    Broadband connectiona connection with much greaterbandwidth than modems have

    DSL uses standard phone lines and is provided by phone companies in

    many areas.Cable modems provide fast network connections through cable

    television networks in many areas.

    High-speed wireless connections can connect computers to networksusing radio waves rather than wires.

    Satellite dishes can deliver fast computer network connections as wellas television programs.

  • 8/2/2019 Chap6 IT Ethics and Issues

    17/43

  • 8/2/2019 Chap6 IT Ethics and Issues

    18/43

    2008 Prentice-Hall, Inc. Slide 18

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    Wireless Network Technology

    A lightning-fast network connection to your desktop is of little use if youre

    away from your desk most of the time; when bandwidth is less important thanmobility and portability, wireless technology can provide practical solutions.

    The fastest growing wireless LAN technology is known as Wi-Fior802.11b.

  • 8/2/2019 Chap6 IT Ethics and Issues

    19/43

    2008 Prentice-Hall, Inc. Slide 19

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    Bluetooth: another type of wireless technologyNamed for a Danish king who overcame his countrys religious differences

    Overcomes differences between mobile phones, handheld computers, and PCs, making

    it possible for all of these devices to communicate with each other regardless of

    operating system

    T T h l d Y 8/

  • 8/2/2019 Chap6 IT Ethics and Issues

    20/43

    2008 Prentice-Hall, Inc. Slide 20

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    With Bluetooth its possible to create a

    personal area network (PAN)a network that

    links a variety of personal electronic devices so they can

    communicate with each other.

    Bluetooth technology is currently limited to simple deviceconnectivity, but in the future it will open up all kinds of

    possibilities:A pacemaker senses a heart attack and notifies the victims

    mobile phone to dial 911.

    A car radio communicates with parking-lot video cameras

    to find out where spaces are available.

  • 8/2/2019 Chap6 IT Ethics and Issues

    21/43

    2008 Prentice-Hall, Inc. Slide 21

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    More examples of Bluetooth possibilities:

    A pen scans business cards and sends the

    information to a PDA inside a briefcase.

    A medical wristband transmits an accidentvictims vital information to a doctors

    handheld computer.

    A cell phone tells you about specials on

    clothes that are available in your size as you

    walk past stores in a mall.

  • 8/2/2019 Chap6 IT Ethics and Issues

    22/43

    2008 Prentice-Hall, Inc. Slide 22

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    Communication Software

    Protocol is a set of rules for the exchange of data between a

    terminal and a computer or between two computers.

    Communication software establishes a protocol that is followed

    by the computers hardware.

  • 8/2/2019 Chap6 IT Ethics and Issues

    23/43

    2008 Prentice-Hall, Inc. Slide 23

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    Communication software takes many forms:Network operating system (NOS)

    System handles communications among many

    workstations.

    Client/server model One or more computers act as dedicated servers and all the

    remaining computers act as clients.

    Peer-to-peer model

    Every computer on the network is both client and server.

    Many networks are hybrids, using features of the

    client/server and peer-to-peer models.

    Tomorrows Technology and You 8/e

  • 8/2/2019 Chap6 IT Ethics and Issues

    24/43

    2008 Prentice-Hall, Inc. Slide 24

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    The Network Advantage

    Why do people use networks?

    Networks enable people to share computer hardware resources, reducing

    costs and enabling people to take advantage of powerful computerequipment.

    Networks enable people to share data and software programs, increasing

    efficiency and productivity.

    Networks enable people to work together or collaborate in ways that are

    difficult or impossible without network technology.

    Tomorrows Technology and You 8/e

  • 8/2/2019 Chap6 IT Ethics and Issues

    25/43

    2008 Prentice-Hall, Inc. Slide 25

    Tomorrows Technology and You 8/e

    Chapter 8

    Basic Network Anatomy

    A Home Computer Network

    Firewall/router

    USB cable

    DSL modem

    Wireless laptop

    Multiplayer games

    Wireless accesspoint

    T T h l d Y 8/

  • 8/2/2019 Chap6 IT Ethics and Issues

    26/43

    2008 Prentice-Hall, Inc. Slide 26

    Tomorrows Technology and You 8/e

    Chapter 8

    Interpersonal Computing:

    From Email to Social Networks

    The Many Faces of Email

    Email systems enable you to send and receive messages to otherson the network.

    Web-based email systems and many older UNIX-based programs require

    that read and unread messages be stored in post office boxes or folders

    on the remote mail servers.

    Many email messages are plain ASCII text.

    T T h l d Y 8/

  • 8/2/2019 Chap6 IT Ethics and Issues

    27/43

    2008 Prentice-Hall, Inc. Slide 27

    Tomorrows Technology and You 8/e

    Chapter 8

    Interpersonal Computing:

    From Email to Social Networks

    Even if their software can display HTML mail, not all email users wantHTML

    emails:

    HTML encoding can slow down an email program.

    An HTML email message can also carry a Web bug.

    Most email programs can send and receive formatted word processor

    documents, pictures, and other multimedia files as attachments to messages.

    T T h l d Y 8/

  • 8/2/2019 Chap6 IT Ethics and Issues

    28/43

    2008 Prentice-Hall, Inc. Slide 28

    Tomorrows Technology and You 8/e

    Chapter 8

    Interpersonal Computing:

    From Email to Social Networks

    Mailing Lists

    Mailing lists enable you to participate in email discussion groups on

    special-interest topics.Subscribing to a busy list might mean receiving hundreds of messages

    each day.

    To avoid being overwhelmed by incoming mail, many list members sign up to

    receive them in daily digest form.

    Some lists are moderated to ensure that the quality of the discussion remains high.

    T T h l d Y 8/

  • 8/2/2019 Chap6 IT Ethics and Issues

    29/43

    2008 Prentice-Hall, Inc. Slide 29

    Tomorrows Technology and You 8/e

    Chapter 8

    Interpersonal Computing:

    From Email to Social Networks

    Newsgroups

    Newsgroup: a public discussion on a particular subject

    Notes are written to a central Internet site.

    Notes are redistributed through a worldwide newsgroup network called USENET.

    Listserv mail messages are delivered automatically to your mailbox, but you have

    to seek out information in newsgroups.

    Mailing list messages are sent to a specific group of people, whereas newsgroup

    messages are available for anyone to see.

    Moderated newsgroups contain only messages that have been filtered bydesignated moderators.

    T T h l d Y 8/

  • 8/2/2019 Chap6 IT Ethics and Issues

    30/43

    2008 Prentice-Hall, Inc. Slide 30

    Tomorrows Technology and You 8/e

    Chapter 8

    Interpersonal Computing:

    From Email to Social Networks

    Rules of Thumb: Online Survival Tips

    Let your system do as much of the work as possible.

    Store names and addresses in computer-accessibleaddressbook.

    Dont share your email address.

    Dont open suspicious attachments.

    Protect your privacy.

    Cross-check on-line information sources.Be aware and awake.

    Avoid information overload.

    T T h l d Y 8/

  • 8/2/2019 Chap6 IT Ethics and Issues

    31/43

    2008 Prentice-Hall, Inc. Slide 31

    Tomorrows Technology and You 8/e

    Chapter 8

    Interpersonal Computing:

    From Email to Social NetworksInstant Messaging and Teleconferencing:

    Real-Time Communication

    Mailing lists and newsgroups are delayed or asynchronous

    communication.

    The sender and the recipients dont have to be logged in at the same time.

    Instant messaging (IM) has been possible since the days of text-only

    Internet access.

    Newer, easier to use messaging systems from AOL, Microsoft, Yahoo,Apple, and others have turned instant messaging into one of the most

    popular Internet activities.

    T T h l d Y 8/

  • 8/2/2019 Chap6 IT Ethics and Issues

    32/43

    2008 Prentice-Hall, Inc. Slide 32

    Tomorrows Technology and You 8/e

    Chapter 8

    Interpersonal Computing:

    From Email to Social Networks

    Online services also offer chat roomspublic or private virtual conference

    rooms where people with similar interests or motivations can type messages

    to each other and receive near instant responses.

    Several IM programs make it possible to carry on two-way videoteleconferences.

    Tomorro s Technolog and Yo 8/e

  • 8/2/2019 Chap6 IT Ethics and Issues

    33/43

    2008 Prentice-Hall, Inc. Slide 33

    Tomorrows Technology and You 8/e

    Chapter 8

    Interpersonal Computing:

    From Email to Social NetworksComputer Telephony

    Voice mail is a messaging system with the ability to store, organize, and

    forward messages.An example of a growing trend toward computer telephony integration

    (CTI) is the linking of computers and telephones to gain productivity.

    Its also possible to send voice signals through a LAN, a WAN, or the

    Internet, bypassing the phone companies (and their charges) altogether.

    Handheld PDA computers use software to integrate the functions of aPDA, a phone, and an Internet terminal.

    Tomorrows Technology and You 8/e

  • 8/2/2019 Chap6 IT Ethics and Issues

    34/43

    2008 Prentice-Hall, Inc. Slide 34

    Tomorrows Technology and You 8/e

    Chapter 8Interpersonal Computing:

    From Email to Social Networks

    Computer Telephony

    Internet Telephony has become a legitimate competitor to traditional

    phone companies.

    Voice over IP (VoIP) requires a broadband connection to carry your

    call over the Internet.

    You can place a calling using either a traditional phone with an adapter

    or an Internet-connected PC with a microphone headset andappropriate software.

    Tomorrows Technology and You 8/e

  • 8/2/2019 Chap6 IT Ethics and Issues

    35/43

    2008 Prentice-Hall, Inc. Slide 35

    Tomorrow s Technology and You 8/e

    Chapter 8Interpersonal Computing:

    From Email to Social Networks

    Computer Telephony

    Advantages of VoIPCalls are less expensive if you already have a broadband connection.

    Calls are routed to you no matter where you are connected.

    VoIP phones integrate more easily with online address books, video

    conference services, and other Internet services.

    Tomorrows Technology and You 8/e

  • 8/2/2019 Chap6 IT Ethics and Issues

    36/43

    2008 Prentice-Hall, Inc. Slide 36

    Tomorrow s Technology and You 8/e

    Chapter 8Interpersonal Computing:

    From Email to Social Networks

    Computer Telephony

    Disadvantages of VoIPCommunication is impossible during a power outage (most networks

    are unusable).

    There is no 911 or directory assistance service available.

    Quality is suspect because there is no guarantee of packets being

    delivered in a timely manner.

    Tomorrows Technology and You 8/e

  • 8/2/2019 Chap6 IT Ethics and Issues

    37/43

    2008 Prentice-Hall, Inc. Slide 37

    Tomorrows Technology and You 8/e

    Chapter 8

    Interpersonal Computing:

    From Email to Social Networks

    Social Networks and Information Sharing

    Online communities such as MySpace and Facebook

    Massively multiplayer role playing games (MMORPG)

    Common information resources such as Flickr and Wikipedia

  • 8/2/2019 Chap6 IT Ethics and Issues

    38/43

    2008 Prentice-Hall, Inc. Slide 38

    Tomorrows Technology and You 8/e

    Chapter 8

    Online RisksEmail Issues

    Problems with Spammore than 50% of e-mails are unsolicited.

    Email and teleconferencing are vulnerable to machine failures, network

    glitches, human errors, and security breaches.

    Email can be overwhelming.

    Email can pose a threat to privacy.

    T T h l d Y 8/

  • 8/2/2019 Chap6 IT Ethics and Issues

    39/43

    2008 Prentice-Hall, Inc. Slide 39

    Tomorrows Technology and You 8/e

    Chapter 8

    Online Risks

    Dont Get HookedAdvice on Phishing

    Examine the URL in the address bar.

    Re-examine the URL in the address bar.

    Look for the https prefix.Look for the padlock icon.

    Pay attention to pop-up warnings about fraudulent certificates.

    Make your own Web connection.

  • 8/2/2019 Chap6 IT Ethics and Issues

    40/43

    2008 Prentice-Hall, Inc. Slide 40

    Tomorrows Technology and You 8/e

    Chapter 8

    Online Risks

    CookiesCan be used by snoopers to get information about you

    Wireless issues of access, security, and privacy

    Perils of posting too much information on blogs and websites

    Internet AddictionSome game players spend 40-80 hrs a week online

    Virtual Sweatshops

  • 8/2/2019 Chap6 IT Ethics and Issues

    41/43

    2008 Prentice-Hall, Inc. Slide 41

    Tomorrows Technology and You 8/e

    Chapter 8

    Online RisksDigital Communication in Perspective

    Many services we take for granted todayvideo rentals, cable TV,

    newspapers, and magazines, for examplewill be transformed or

    replaced by digital high-bandwidth interactive delivery systems of thefuture.

    At the same time, entirely new forms of communication are likely to

    emerge.

    Telecommunications technology is rapidly changing our lives, and the

    changes will accelerate as the technology improves.

  • 8/2/2019 Chap6 IT Ethics and Issues

    42/43

    2008 Prentice-Hall, Inc. Slide 42

    Tomorrows Technology and You 8/e

    Chapter 8

    Lesson SummaryNetworking is one of the most important trends in computing today.

    LANs are made up of computers that are close enough to be directlyconnected with cables or wireless radio transmitters/receivers.

    Most LANs include shared printers and file servers.

    WANs are made up of computers separated by considerable distance.

    Many computer networks are connected together through the Internet somessages and data can pass back and forth among them.

    Some specialized networks, including global positioning systems andfinancial systems serve unique functions.

    Tomorrows Technology and You 8/e

  • 8/2/2019 Chap6 IT Ethics and Issues

    43/43

    Slide 43

    Tomorrow s Technology and You 8/e

    Chapter 8

    Lesson Summary (continued)

    Most computer networks today use the Ethernet architecture; an Ethernet

    port is a standard feature on most modern PCs.

    Communication software takes care of the details of communication

    between machinesdetails like protocols that determine how signals willbe sent and received.

    Email, instant messaging, and teleconferencing are the most common

    forms of communication between people on computer networks.

    Its not clear how all of these emerging technologies will converge; what is

    clear is that the wireless revolution is far from over.


Top Related