MIS 6th Edition Bidgoli Solutions Manual Download
MIS 6th Edition Bidgoli Solutions Manual Download
MIS 6th Edition Bidgoli Solutions Manual Download
Chapter 6
Data Communication: Delivering Information
Anywhere and Anytime
Learning Objectives
Data communication is the electronic transfer of data from one location to another. An
2
Data communication applications can enhance decision makers’ efficiency and effectiveness
in many ways. For example, data communication applications support just-in-time delivery of
goods, which reduces inventory costs and improves the competitive edge. Data
communication systems also make virtual organizations possible, and these can cross
geographic boundaries to develop products more quickly and effectively. It also enables
organizations to use e-mail and electronic file transfer to improve efficiency and productivity.
Following are some of the ways data communication technologies affect the workplace:
• Online training for employees can be provided via virtual classrooms.
• Internet searches for information on products, services, and innovation keep employees
up to date.
• The Internet and data communication systems facilitate lifelong learning, which will be
an asset for knowledge workers of the future.
• Boundaries between work and personal life are less clear-cut as data communication is
more available in both homes and businesses.
• Web and video conferencing are easier, which can reduce the costs of business travel.
E-collaborations and virtual meetings are other important applications of data communication
systems for managers. These applications are cost effective and improve customer service.
In-Class Activity
Have students make a list of different methods that they have used to communicate data from
one point to another. Students should select the most effective and most reliable method for
data communication from this list.
Discussion Question
Why is an efficient data communication system critical to an organization? List some of the
ways data communication technologies affect the workplace.
Data transmission channels are generally divided into two types: broadband and narrowband. In
broadband data transmission, multiple pieces of data are sent simultaneously to increase the
transmission rate. Narrowband is a voice-grade transmission channel capable of transmitting a
maximum of 56,000 bps, so only a limited amount of information can be transferred in a specific
period of time.
Before a communication link can be established between two devices, they must be
synchronized, meaning that both devices must start and stop communicating at the same point.
Synchronization is handled with protocols, rules that govern data communication, including
error detection, message length, and transmission speed.
4
B. Modems
A modem (short for “modulator-demodulator”) is a device that connects a user to the Internet.
Dial-up, digital subscriber line (DSL), and cable access require modems to connect to the
Internet. In today’s broadband world, DSL or cable modems are common. Digital subscriber
line (DSL), a common carrier service, is a high-speed service that uses ordinary phone lines.
With DSL connections, users can receive data at up to 7.1 Mbps and send data at around 1
Mbps, although the actual speed is determined by proximity to the provider’s location. Cable
modems, on the other hand, use the same cable that connects to TVs for Internet connections;
they can usually reach transmission speeds of about 16 Mbps.
C. Communication Media
Communication media, or channels, connect sender and receiver devices. They can be
conducted (wired or guided) or radiated (wireless). They can be conducted (wired or guided)
or radiated (wireless).
Conducted media provide a physical path along which signals are transmitted, including
twisted pair copper cable, coaxial cable, and fiber optics. Twisted pair copper cable consists
of two copper lines twisted around each other and either shielded or unshielded. Coaxial
cables are thick cables that can be used for both data and voice transmissions. Fiber-optic
5
cables are glass tubes (half the diameter of a human hair) surrounded by concentric layers of
glass, called “cladding,” to form a light path through wire cables. Fiber-optic cables have a
higher capacity, smaller size, lighter weight, lower attenuation, and higher security than other
cable types; they also have the highest bandwidth of any communication medium.
Radiated media use an antenna for transmitting data through air or water. Some of these
media are based on “line of sight” (an open path between sending and receiving devices or
antennas), including broadcast radio, terrestrial microwave, and satellite. Satellites link
ground-based microwave transmitters/receivers, known as Earth stations, and are commonly
used in long-distance telephone transmissions and TV signals. Terrestrial microwave systems
use Earth-based transmitters and receivers and are often used for point-to-point links between
buildings.
In-Class Activity
Ask students to research the latest advancements in communication media and present their
findings in class.
Discussion Question
A. Centralized Processing
In a centralized processing system, all processing is done at one central computer. The main
advantage of this configuration is being able to exercise tight control over system operations
6
and applications. The main disadvantage is lack of responsiveness to users’ needs, because the
system and its users could be located far apart from each other. This configuration is not used
much now.
B. Decentralized Processing
In decentralized processing, each user, department, or division has its own computer
(sometimes called an “organizational unit”) for performing processing tasks. A decentralized
processing system is certainly more responsive to users than a centralized processing system.
Decentralized systems have some drawbacks, including lack of coordination among
organizational units, the high cost of having many systems, and duplication of efforts.
C. Distributed Processing
The Open Systems Interconnection (OSI) model is a seven-layer architecture for defining
how data is transmitted from computer to computer in a network. Each layer in the
architecture performs a specific task:
• Application layer—serves as the window through which applications access network
services. It performs different tasks, depending on the application, and provides services
that support users’ tasks, such as file transfers, database access, and e-mail.
• Presentation layer—formats message packets.
• Session layer—establishes a communication session between computers.
7
• Transport layer—generates the receiver’s address and ensures the integrity of messages
by making sure packets are delivered without error, in sequence, and with no loss or
duplication.
• Network layer—routes messages.
• Data Link layer—oversees the establishment and control of the communication link.
• Physical layer—specifies the electrical connections between computers and the
transmission medium; defines the physical medium used for communication.
In-Class Activity
Ask students to identify instances where each type of processing configuration is used.
Have them cite both the advantages and disadvantages of each configuration within the
scope of the example. Then, have students discuss their examples in class.
Discussion Question
Describe the task performed by each layer in the Open Systems Interconnection (OSI)
model.
There are three major types of networks: local area networks, wide area networks, and
metropolitan area networks. In all these networks, computers are usually connected to the
network via a network interface card (NIC), a hardware component that enables computers to
communicate over a network. A NIC, also called an “adapter card,” is the physical link between
a network and a workstation, so it operates at the OSI model’s Physical and Data Link layers.
A local area network (LAN) connects workstations and peripheral devices that are in close
proximity. Usually, a LAN covers a limited geographical area, such as a building or campus,
and one company owns it. Its data transfer speed varies from 100 Mbps to 10 Gbps.
LANs are used most often to share resources, such as peripherals, files, and software. They
are also used to integrate services, such as e-mail and file sharing. In a LAN environment,
8
there are two basic terms to remember: Ethernet and Ethernet cable. Ethernet is a standard
communication protocol embedded in software and hardware devices used for building a
LAN. An Ethernet cable is used to connect computers, hubs, switches, and routers to a
network.
A wide area network (WAN) can span several cities, states, or even countries, and it is
usually owned by several different parties. The data transfer speed depends on the speed of its
interconnections (called “links”) and can vary from 28.8 Kbps to 155 Mbps. A WAN can use
many different communication media (coaxial cables, satellite, and fiber optics) and terminals
of different sizes and sophistication (PCs, workstations, and mainframes); it can also be
connected to other networks.
The Institute of Electrical and Electronics Engineers (IEEE) developed specifications for a
public, independent, high-speed network that connects a variety of data communication
systems, including LANs and WANs in the metropolitan areas. This network, called a
metropolitan area network (MAN), is designed to handle data communication for multiple
organizations in a city and sometimes nearby cities as well. The data transfer speed varies
In-Class Activity
Ask students to list the different types of networks that they have used, and to describe their
experience (data transfer speed) with each type of network.
V. Network Topologies
Why does the data transfer speed of different networks vary? What are the factors affecting the
data transfer speed?
9
A. Star Topology
The star topology usually consists of a central computer (host computer, often a server) and a
series of nodes (typically, workstations or peripheral devices). The host computer supplies the
main processing power. If a node fails, it does not affect the network’s operation, but if the
host computer fails, the entire network goes down.
B. Ring Topology
In a ring topology, no host computer is required because each computer manages its own
connectivity. Computers and devices are arranged in a circle so each node is connected to two
other nodes: its upstream neighbor and its downstream neighbor. Transmission is in one
direction, and nodes repeat a signal before passing it to the downstream neighbor. If any link
between nodes is severed, the entire network is affected, and failure of a single node disrupts
the entire network. A ring topology needs less cable than a star topology, but it is similar to a
star topology in that it is better for handling heavy but short bursts of traffic.
C. Bus Topology
The bus topology (also called “linear bus”) connects nodes along a network segment, but the
ends of the cable are not connected, as they are in a ring topology. A hardware device called a
terminator is used at each end of the cable to absorb the signal. Without a terminator, the
signal would bounce back and forth along the length of the cable and prevent network
communication.
D. Hierarchical Topology
A hierarchical topology (also called a “tree”) combines computers with different processing
strengths in different organizational levels. Traditional mainframe networks also use a
hierarchical topology. The mainframe computer is at the top, front-end processors (FEPs) are
at the next level, controllers and multiplexers are at the next level, and terminals and
workstations are at the bottom level. A controller is a hardware and software device that
controls data transfer from a computer to a peripheral device (examples are a monitor, a
printer, or a keyboard) and vice versa. A multiplexer is a hardware device that allows several
nodes to share one communication channel.
The hierarchical topology offers a great deal of network control and lower cost, compared to a
star topology. Its disadvantages include that network expansion may pose a problem, and
there could be traffic congestion at the root and higher-level nodes.
E. Mesh Topology
In a mesh topology (also called “plex” or “interconnected”), every node (which can differ in
size and configuration from the others) is connected to every other node. This topology is
highly reliable. Failure of one or a few nodes does not usually cause a major problem in
network operation, because many other nodes are available.
In-Class Activity
Ask students to draw the layout of the different topologies mentioned in the text—star, ring,
bus, hierarchical, and mesh. The drawings would help the students differentiate between
these topologies.
Discussion Question
What are the factors that affect the selection of a type of network topology?
11
A. Protocols
Protocols are agreed-on methods and rules that electronic devices use to exchange
information. Some protocols deal with hardware connections, and others control data
transmission and file transfers. Protocols also specify the format of message packets sent
between computers.
C. Routing
Packet switching is a network communication method that divides data into small packets and
transmits them to an address, where they are reassembled. A packet is a collection of binary
digits—including message data and control characters for formatting and transmitting—sent
from computer to computer over a network.
The path or route that data takes on a network is determined by the type of network and the
software used to transmit data. The process of deciding which path that data takes is called
routing. Routing is similar to the path one takes from home to work. A packet’s route can
change each time a connection is made, based on the amount of traffic and the availability of
the circuit. The decision about which route to follow is done in one of two ways: at a central
location (centralized routing) or at each node along the route (distributed routing). In most
cases, a routing table, generated automatically by software, is used to determine the best
possible route for the packet. The routing table lists nodes on a network and the path to each
12
node, along with alternate routes and the speed of existing routes
In centralized routing, one node is in charge of selecting the path for all packets. This node,
considered the network routing manager, stores the routing table, and any changes to a route
must be made at this node. All network nodes periodically forward status information on the
number of inbound, outbound, and processed messages to the network routing manager. The
network routing manager, therefore, has an overview of the network and can determine
whether any part of it is underused or overused.
Distributed routing relies on each node to calculate the best possible route. Each node
contains its own routing table with current information on the status of adjacent nodes so
packets can follow the best possible route. Each node also sends status messages periodically
so adjacent nodes can update their tables. Distributed routing eliminates the problems caused
by having the routing table at a centralized site. If one node is not operational, routing tables
at other nodes are updated, and the packet is sent along a different path.
D. Routers
A router is a network connection device containing software that connects network systems
and controls traffic flow between them. Routers operate at the Network layer of the OSI
model and handle routing packets on a network. Cisco Systems and Juniper Networks are two
major router vendors.
A router performs the same functions as a bridge but is a more sophisticated device. A bridge
connects two LANs using the same protocol, and the communication medium does not have
to be the same on both LANs. Routers can also choose the best possible path for packets
based on distance or cost. A router can also be used to isolate a portion of the LAN from the
rest of the network; this process is called “segmenting.”
There are two types of routers: static and dynamic. A static router requires the network
routing manager to give it information about which addresses are on which network. A
dynamic router can build tables that identify addresses on each network. Dynamic routers
are used more often now, particularly on the Internet.
E. Client/Server Model
In the client/server model, software runs on the local computer (the client) and
communicates with the remote server to request information or services. A server is a remote
computer on the network that provides information or services in response to client requests.
13
In the most basic client/server configuration, the following events usually take place:
• The user runs client software to create a query.
• The client accepts the request and formats it so the server can understand it.
• The client sends the request to the server over the network.
• The server receives and processes the query.
• The results are sent to the client.
• The results are formatted and displayed to the user in an understandable format.
The main advantage of the client/server architecture is its scalability, meaning its ability to
grow. Client/server architectures can be scaled horizontally or vertically. Horizontal scaling
means adding more workstations (clients), and vertical scaling means migrating the network
to larger, faster servers.
To understand client/server architecture better, one can think of it in terms of these three
levels of logic:
• Presentation logic: This is the top level, which is concerned with how data is returned to
the client.
• Application logic: This is concerned with the software processing requests for users.
• Data management logic: This is concerned with data management and storage
operations.
The real challenge in a client/server architecture is how to divide these three logics
between the client and server.
Two-Tier Architecture
In the two-tier architecture, a client (tier one) communicates directly with the server (tier
two). The presentation logic is always on the client, and the data management logic is on
the server. The application logic can be on the client, on the server, or split between them,
although it is usually on the client side. This architecture is effective in small workgroups.
Because application logic is usually on the client side, a two-tier architecture has the
advantages of application development speed, simplicity, and power. On the downside, any
changes in application logic, such as stored procedures and validation rules for databases,
require major modifications of clients, resulting in upgrade and modification costs.
N-Tier Architectures
14
In a two-tier architecture, if the application logic is modified, it can affect the processing
workload. An n-tier architecture attempts to balance the workload between client and
server by removing application processing from both the client and server and placing it on
a middle-tier server. The most common n-tier architecture is the three-tier architecture.
Improving network performance is a major advantage of n-tier architecture.
In-Class Activity
Ask students if they have used a router or have one at home to connect to the internet.
Have them identify if the router is a static or a dynamic router and also its manufacturer.
Discussion Question
In the context of networking, what do you understand by protocols? Discuss the functions
of Transmission Control Protocol and Internet Protocol.
A wireless network is a network that uses wireless instead of wired technology. A mobile
network (also called a “cellular network”) is a network operating on a radio frequency (RF),
consisting of radio cells, each served by a fixed transmitter, known as a “cell site” or “base
station.”
Wireless and mobile networks have the advantages of mobility, flexibility, ease of installation,
and low cost. These systems are particularly effective when no infrastructure (such as
communication lines or established wired networks) is in place. Drawbacks of mobile and
wireless networks include the following:
• Limited throughput—throughput is similar to bandwidth. It is the amount of data
transferred or processed in a specified time, usually one second.
• Limited range—the distance a signal can travel without losing strength is more limited in
mobile and wireless networks.
• In-building penetration problems—wireless signals might not be able to pass through
certain building materials or might have difficulty passing through walls.
• Vulnerability to frequency noise—interference from other signals, usually called “noise,”
can cause transmission problems.
• Security—wireless network traffic can be captured with sniffers.
There are various definitions of mobile and wireless computing. Mobile computing might simply
15
mean using a laptop away from the office or using a modem to access the corporate network
from a client’s office. Neither activity requires wireless technology. Wireless LANs usually refer
to proprietary LANs, meaning they use a certain vendor’s specifications.
Wireless networks have many advantages. For example, healthcare workers who use handheld,
notebook computers or tablets (such as the iPad) with wireless capabilities are able to get patient
information quickly. Because the information can be sent to and saved on a centralized database,
it is available to other workers instantly.
A Wireless Technologies
In a wireless environment, portable computers use small antennas to communicate with radio
towers in the surrounding area. Satellites in near-Earth orbit pick up low-powered signals
from mobile and portable network devices. Wireless technologies generally fall into two
groups:
• Wireless LANs (WLANs)—like their wired counterparts, WLANs are characterized by
having one owner and covering a limited area.
• Wireless WANs (WWANs)—these networks cover a broader area than WLANs and
include the following devices: cellular networks, cellular digital packet data (CDPD),
paging networks, personal communication systems (PCS), packet radio networks,
broadband personal communications systems (BPCS), microwave networks, and
satellite networks.
B. Mobile Networks
Mobile devices register by subscribing to a carrier service (provider) licensed for certain
geographic areas. When a mobile unit is outside its provider’s coverage area, roaming occurs.
To improve the efficiency and quality of digital communications, two technologies have been
developed: Time Division Multiple Access and Code Division Multiple Access. Time
Division Multiple Access (TDMA) divides each channel into six time slots. Each user is
allocated two slots: one for transmission and one for reception. Code Division Multiple
Access (CDMA) transmits multiple encoded messages over a wide frequency and then
decodes them at the receiving end.
16
Advanced Mobile Phone System (AMPS) is the analog mobile phone standard developed by
Bell Labs and introduced in 1983. Digital technologies, however, are more widely used
because of higher data capacities, improved voice quality, encryption capabilities, and
integration with other digital networks. Many businesses use wireless and mobile networks to
improve customer service and reduce operational costs.
In-Class Activity
Prior to class, divide students into two groups and ask each group to carry out a survey on
which mobile technology consumers prefer—Time Division Multiple Access (TDMA) or
Code Division Multiple Access (CDMA). Have each group focus on the features, advantages,
and disadvantages of each technology. Finally, have each group present their findings in class.
Discussion Question
What are the benefits and limitations of using wireless and mobile networks over wired
technology?
Security is important in any type of network, but it is especially important in a wireless network,
because anyone walking or driving within the range of an access point (AP), even if outside the
home or office, can use the network. An AP is the part of a WLAN that connects it to other
networks. There are several techniques for improving the security of a wireless network:
• SSID (Service Set Identifier)—all client computers that try to access the AP are required to
include an SSID in all their packets. A packet without an SSID is not processed by the AP.
• WEP (Wired Equivalent Privacy)—a key must be manually entered into the AP and the
client computer. The key encrypts the message before transmission.
• EAP (Extensible Authentication Protocol)—EAP keys are dynamically generated based on
the user’s ID and password. When the user logs out of the system, the key is discarded.
• WPA (Wi-Fi Protected Access)—this technique combines the strongest features of WEP
and EAP. Keys are fixed, as in WEP, or dynamically changed, as in EAP. However, the
WPA key is longer than the WEP key; therefore, it is more difficult to break.
17
• WPA2 or 802.11i—this technique uses EAP to obtain a master key. With this master key, a
user’s computer and the AP negotiate for a key that will be used for a session. After the
session is terminated, the key is discarded.
In-Class Activity
Ask students to use a Wi-Fi enabled phone to scan for WLAN hotspots in their surrounding
area. Students would be able to see a list of WLAN networks after the scan. Students
should now determine the type of security used for the networks in this list. Security type
could be SSID (Service Set Identifier), WEP (Wired Equivalent Privacy), EAP (Extensible
Authentication Protocol), WPA (Wi-Fi Protected Access), WPA2 or 802.11i, or none.
Discussion Question
List the different techniques for improving the security of a wireless network.
In data communication, convergence refers to integrating voice, video, and data so that
multimedia information can be used for decision making. Convergence requires major network
upgrades, because video requires much more bandwidth. This has changed, however, with the
availability of high-speed technologies, such as Asynchronous Transfer Mode (ATM), Gigabit
Ethernet, 3G and 4G networks, and more demand for applications using these technologies.
Gigabit Ethernet is a LAN transmission standard capable of 1 Gbps and 10 Gbps data transfer
speeds. The ATM is a packet-switching service that operates at 25 Mbps and 622 Mbps, with
maximum speed of up to 10 Gbps. The 3G network is the third generation of mobile networking
and telecommunications. It has increased the rate of information transfer, its quality, video and
broadband wireless data transfers, and the quality of Internet telephony or Voice over Internet
Protocol (VoIP).
• Consumer products and services, such as virtual classrooms, telecommuting, and virtual
reality
As a tool for delivering services, the Internet is an important contributor to the convergence
phenomenon.
In-Class Activity
Prior to class, ask students to make a Skype call to their friends using different technologies
such as 2G, 3G, and 4G. Students should share their experience in the class. Students
should observe the audio and video quality while using each technology and point out if
there was a lag during the call.
Discussion Question
How can an organization benefit from convergence? What are the applications of
convergence?
Key Terms
Data communication is the electronic transfer of data from one location to another. (P. 115)
Bandwidth is the amount of data that can be transferred from one point to another in a certain
time period, usually one second. (P. 117)
Attenuation is the loss of power in a signal as it travels from the sending device to the receiving
device. (P. 117)
In broadband data transmission, multiple pieces of data are sent simultaneously to increase the
transmission rate. (P. 117)
Protocols are rules that govern data communication, including error detection, message length,
and transmission speed. (P. 117)
19
A modem (short for “modulator-demodulator”) is a device that connects a user to the Internet.
(P. 117)
Digital subscriber line (DSL), a common carrier service, is a high-speed service that uses
ordinary phone lines. (P. 118)
Communication media, or channels, connect sender and receiver devices. They can be
conducted or radiated. (P. 118)
Conducted media provide a physical path along which signals are transmitted, including twisted
pair copper cable, coaxial cable, and fiber optics. (P. 118)
Radiated media use an antenna for transmitting data through air or water. (P. 119)
In a centralized processing system, all processing is done at one central computer. (P. 119)
In decentralized processing, each user, department, or division has its own computer
(sometimes called an “organizational unit”) for performing processing tasks. (P. 120)
The Open Systems Interconnection (OSI) model is a seven-layer architecture for defining how
data is transmitted from computer to computer in a network, from the physical connection to the
network to the applications that users run. It also standardizes interactions between network
computers exchanging information. (P. 120)
A local area network (LAN) connects workstations and peripheral devices that are in close
proximity. (P. 122)
A wide area network (WAN) can span several cities, states, or even countries, and it is usually
owned by several different parties. (P. 122)
A metropolitan area network (MAN) is designed to handle data communication for multiple
organizations in a city and sometimes nearby cities as well. (P. 123)
The star topology usually consists of a central computer (host computer, often a server) and a
series of nodes (typically, workstations or peripheral devices). (P. 123)
In a ring topology, no host computer is required because each computer manages its own
connectivity. (P. 124)
The bus topology (also called “linear bus”) connects nodes along a network segment, but the
ends of the cable are not connected, as they are in a ring topology. (P. 124)
A hierarchical topology (also called a “tree”) combines computers with different processing
strengths in different organizational levels. (P. 125)
A controller is a hardware and software device that controls data transfer from a computer to a
peripheral device (examples are a monitor, a printer, or a keyboard) and vice versa. (P. 125)
A multiplexer is a hardware device that allows several nodes to share one communication
channel. (P. 125)
In a mesh topology (also called “plex” or “interconnected”), every node (which can differ in size
and configuration from the others) is connected to every other node. (P. 125)
A packet is a collection of binary digits—including message data and control characters for
formatting and transmitting—sent from computer to computer over a network. (P. 126)
Routing is the process of deciding which path to take on a network. This is determined by the
type of network and the software used to transmit data. (P. 126)
A routing table, generated automatically by software, is used to determine the best possible
route for a packet. (P. 126)
In centralized routing, one node is in charge of selecting the path for all packets. This node,
considered the network routing manager, stores the routing table, and any changes to a route
must be made at this node. (P. 126)
Distributed routing relies on each node to calculate its own best possible route. Each node
21
contains its own routing table with current information on the status of adjacent nodes so packets
can follow the best possible route. (P. 127)
A router is a network connection device containing software that connects network systems and
controls traffic flow between them. (P. 127)
A static router requires the network routing manager to give it information about which
addresses are on which network. (P. 127)
A dynamic router can build tables that identify addresses on each network. (P. 127)
In the client/server model, software runs on the local computer (the client) and communicates
with the remote server to request information or services. A server is a remote computer on the
network that provides information or services in response to client requests. (P. 127)
In the two-tier architecture (the most common type), a client (tier one) communicates directly
with the server (tier two). (P. 128)
An n-tier architecture attempts to balance the workload between client and server by removing
application processing from both the client and server and placing it on a middle-tier server. (P.
128)
A wireless network is a network that uses wireless instead of wired technology. (P. 129)
A mobile network (also called a cellular network) is a network operating on a radio frequency
(RF), consisting of radio cells, each served by a fixed transmitter, known as a cell site or base
station. (P. 129)
To improve the efficiency and quality of digital communications, Time Division Multiple
Access (TDMA) divides each channel into six time slots. Each user is allocated two slots: one
for transmission and one for reception. This method increases efficiency by 300 percent, as it
allows carrying three calls on one channel. (P. 132)
To improve the efficiency and quality of digital communications, Code Division Multiple
Access (CDMA) transmits multiple encoded messages over a wide frequency and then decodes
them at the receiving end. (P. 132)
22
In data communication, convergence refers to integrating voice, video, and data so that
multimedia information can be used for decision making. (P. 135)
1. List three reasons that managers should know about data communication.
Students’ answers will vary. However, some students may mention that managers should
know about data communication because of the following reasons:
• Data communication applications support just-in-time delivery of goods, which
reduces inventory costs and improves the competitive edge.
• Data communication systems enable organizations to use e-mail and electronic file
transfer to improve efficiency and productivity.
• Data communication systems make virtual organizations possible, and these can
cross geographic boundaries to develop products more quickly and effectively.
The five types of network topologies are: star topology, ring topology, bus topology,
hierarchical topology, and mesh topology.
5. Among the three types of networks (LAN, WAN, and MAN), which is the fastest?
A router is a network connection device containing software that connects network systems
and controls traffic flow between them. Routers can prevent network jams that delay
23
packet delivery, and they can handle packets of different sizes. A router can also be used to
isolate a portion of the LAN from the rest of the network.
7. What are protocols in a data communication environment? Why are they needed?
Protocols are rules that govern data communication, including error detection, message
length, and transmission speed. They are agreed-on methods and rules that electronic
devices use to exchange information. People need a common language to communicate,
and the same is true of computer and other electronic devices. Some protocols deal with
hardware connections, and others control data transmission and file transfers. Protocols
also specify the format of message packets sent between computers.
In the two-tier architecture, a client (tier one) communicates directly with the server (tier
two). The presentation logic is always on the client, and the data management logic is on
the server. The application logic can be on the client, on the server, or split between them,
although it is usually on the client side.
Projects
1. A newly established Internet company with 40 employees needs your advice. They are
looking for a collaboration tool and have narrowed their choices to GoToMeeting, WebEx,
and My Web Conferences. After reading the information presented in this chapter and other
sources, prepare a two-page document that includes two advantages and two disadvantages
of each tool. Which one is your final recommendation? Why did you choose that tool over
the other two?
2. Cisco and Polycom are two major vendors of telepresence products. After reading the
information presented in this chapter and other sources, write a one-page paper that
identifies one top-of-the-line product from each company. Which product would you
recommend to the company mentioned in Project 1? What are you basing your
recommendation on? What are two advantages of using a telepresence system compared to
a face-to-face meeting? What are two disadvantages?
3. Mobile and wireless devices are being increasingly used in the health care industry. After
24
reading the information presented in this chapter and other sources, write a two-page paper
that outlines five applications of these devices in this industry. Also, identify three mobile
apps that could be used by medical personnel to increase their productivity.
4. After reading the information presented in this chapter and other sources, write a two-page
paper that identifies five mobile apps that could be used in the banking industry. How do
these apps increase the productivity of the bankers and their customers? Do you see any
drawbacks involved in using these apps?
5. After reading the information presented in this chapter and other sources, write a one-page
paper that includes a six-item bulleted lists for improving the privacy and security of your
smartphone. Generally speaking, are iOS devices more or less secure than Android
devices?
6. After reading the information presented in this chapter and other sources, write a two-page
paper that describes five business applications of convergence. Which industries are
expected to gain the most from the convergence trend?
Students’ answers will vary. E-commerce, entertainment, videos on demand, video and
computer conferencing, virtual classrooms, telecommuting are just a few examples.
1. Bandwidth is the amount of data that can be transferred from one point to another in a
certain time period, usually one second. True or False?
Answer: True
2. Communication media, or channels, connect sender and receiver devices. True or False?
Answer: True
3. The Open Systems Interconnection (OSI) model is an eight-layer architecture for defining
how data is transmitted from computer to computer in a network. True or False?
25
Answer: False
4. All of the following are among the advantages of bus topology except?
a. It is easier to extend.
b. It is very reliable.
c. It handles steady (even) traffic well.
d. Fault diagnostic is easy.
Answer: d
5. All of the following are among the advantages of wireless and mobile networks except?
a. Limited throughput
b. Mobility
c. Flexibility
d. Ease of installation
Answer: a
Answer: c
Case Studies
1. How has Walmart improved its data communication systems for suppliers?
Students’ answers will vary. Walmart has made several changes in data communication
systems to improve its suppliers’ access to sales and inventory data. For example, the
company added a customized Web site for suppliers, such as Mattel, Procter & Gamble,
and Warner-Lambert.
With Walmart’s network, suppliers can access sales, inventory, and forecasting data over
extremely fast connections. To ensure confidentiality of data, a sophisticated security
system has been implemented to prevent suppliers from accessing data about one another’s
products.
Walmart uses the latest in wireless technology in its operations for warehouse management
systems (WMS) to track and manage the flow of goods through its distribution centers.
Another application of wireless technology is for controlling and monitoring forklifts and
industrial vehicles that move merchandise inside its distribution centers.
The Vehicle Management System (VMS) is the latest application of data communications
in Walmart. Among other features, the VMS includes a two-way text messaging system
that enables management to effectively divert material handling resources to where they
are needed the most. (The VMS works effectively with RFID systems.) According to
Walmart, the VMS has improved safety and has also significantly improved the
productivity of its operations.
Case Study 6-2: Protecting the Security and Privacy of Mobile Devices
1. What are some examples of security risks associated with a mobile device?
Some examples of security risks associated with a mobile device are: malware, premium
SMS billing, e-mail and SMS phishing, spyware, and malicious Web sites.
These devices automatically track a user’s location because of their GPS capabilities.
3. What are a couple of recommendations for protecting your mobile device against these
threats?
Students’ answers will vary. Some students may suggest that one should never leave one’s
mobile device unlocked or unattended. Additionally, one should always protect it with a
password.