Chapter 7
Chapter 7
Chapter 7
1
OF
TELECOMMUNICATIONS
NETWORKS AND KEY
NETWORKING
TECHNOLOGIES?
NETWORKING AND COMUNICATION
TRENDS
Firms in the past used two fundamentally different types of networks: telephone networks and
computer networks. Telephone networks historically handled voice communication, and computer
networks handled data traffic. Telephone companies built telephone networks throughout the twentieth
century by using voice transmission technologies (hardware and software), and these companies
almost always operated as regulated monopolies throughout the world. Computer companies
originally built computer networks to transmit data between computers in different locations.
NETWORKS IN LARGE COMPANIES
The network we’ve just described might be suitable for a small business, but what about large
companies with many locations and thousands of employees? As a firm grows, its small networks can
be tied together into a corporate-wide networking infrastructure. The network infrastructure for a large
corporation consists of a large number of these small local area networks linked to other local area
networks and to firmwide corporate networks. A number of powerful servers support a corporate
website, a corporate intranet, and perhaps an extranet. Some of these servers link to other large
computers supporting backend systems.Figure 7. 2provides an illustration of these more complex,
larger scale corporate-wide networks.
CLIENT/SERVER COMPUTING
Client/server computing has largely replaced centralized mainframe computing in which nearly all the
processing takes place on a central large mainframe computer. Client/server computing has extended
computing to departments, workgroups, factory floors, and other parts of the business that could not
be served by a centralized architecture. It also makes it possible for personal computing devices such
as PCs, laptops, and mobile phones to be connected to networks such as the Internet. The Internet is
the largest implementation of client/server computing.
TCP/IP AND CONECTIVITY
In a typical telecommunications network, diverse hardware and software components need to work
together to transmit information. Different components in a network communicate with each other by
adhering to a common set of rules called protocols. A protocol is a set of rules and procedures
governing transmission of information between two points in a network.
THE TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOL (TCP/IP) REFERENCE
MODEL :
1. Application layer. The Application layer enables client application programs to access the other
layers and defines the protocols that applications use to exchange data. One of these application
protocols is the Hypertext Transfer Protocol (HTTP), which is used to transfer web page files.
2. Transport layer. The Transport layer is responsible for providing the Application layer with
communication and packet services. This layer includes TCP and other protocols.
3. Internet layer. The Internet layer is responsible for addressing, routing, and packaging data
packets called IP datagrams. The Internet Protocol is one of the protocols used in this layer
4. Internet layer. The Internet layer is responsible for addressing, routing, and packaging data
packets called IP datagrams. The Internet Protocol is one of the protocols used in this layer
WHAT ARE THE
DIFFERENTS TYPES OF
NETWORKS?
7.2
SIGNALS : DIGITAL VERSUS ANALOG
There are two ways to communicate a message in a network: an analog signal or a digital signal.
An analog signal is represented by a continuous waveform that passes through a communications
medium and has been used for voice communication. The most common analog devices are the
telephone handset, the speaker on your computer, or your iPod earphone, all of which create analog
waveforms that your ear can hear.
A digital signal is a discrete, binary waveform rather than a continuous waveform. Digital signals
communicate information as strings of two discrete states: one bits and zero bits, which are
represented as on-off electrical pulses.
TYPES OF NETWORKS
LOCAL AREA NETWORK (LAN)
A local area network (LAN) is designed to connect personal computers and other digital devices
within a half-mile or 500-meter radius. LANs typically connect a few computers in a small office, all
the computers in one building, or all the computers in several buildings in close proximity. LANs also
are used to link to long-distance wide area networks (WANs, described later in this section) and other
networks around the world, using the Internet.
METROPOLITAN AND WIDE AREA NETWORKS
Wide area networks (WANs) span broad geographical distances—entire regions, states, continents, or
the entire globe. The most universal and powerful WAN is the Internet. Computers connect to a WAN
through public networks, such as the telephone system or private cable systems, or through leased
lines or satellites
A metropolitan area network (MAN) is a network that spans a metropolitan area, usually a city and its
major suburbs. Its geographic scope falls between a WAN and a LAN.
>
HOW DO THE INTERNET
AND INTERNET
7.3
TECHNOLOGY WORK, AND
HOW DO THEY SUPPORT
COMMUNICATION AND E-
BUSINESS?
WHAT IS THE INTERNET
The Internet is the world’s most extensive public communication system. It’s also the world’s largest
implementation of client/server computing and Internetworking, linking millions of individual
networks all over the world. Most homes and small businesses connect to the Internet by subscribing
to an Internet service provider. An Internet service provider (ISP) is a commercial organization with a
permanent connection to the Internet that sells temporary connections to retail subscribers. EarthLink,
NetZero, AT&T, and Time Warner are ISPs. Individuals also connect to the Internet through their
business firms, universities, or research centers that have designated Internet domains
THE DOMAIN NAME SYSTEM
Because it would be incredibly difficult for Internet users to remember strings of 12 numbers, the
Domain Name System (DNS) converts domain names to IP addresses. The domain name is the
English-like name that corresponds to 288 Part Two Information Technology Infrastructure the unique
32-bit numeric IP address for each computer connected to the Internet. DNS servers maintain a
database containing IP addresses mapped to their corresponding domain names. To access a computer
on the Internet, users need only specify its domain name.
WHAT ARE THE
>
PRINCIPAL
TECHNOLOGIES AND 7.4
STANDARD FOR
WIRELESS
NETWORKING,COMMU
NICATION, AND
INTERNET ACCESS?
CELLULAR SYSTEM
Digital cellular service uses several competing standards. In Europe and much of the rest of the world
outside the United Sates, the standard is Global System for Mobile Communications (GSM). GSM’s
strength is its international roaming capability. There are GSM cell phone systems in the United
States, including T-Mobile and AT&T. A competing standard in the United States is Code Division
Multiple Access (CDMA), which is the system Verizon and Sprint use. CDMA was developed by the
military during World War II. It transmits over several frequencies, occupies the entire spectrum, and
randomly assigns users to a range of frequencies over time, making it more efficient than GSM.
Earlier generations of cellular systems were designed primarily for voice and limited data transmission in the form of
short text messages. Today wireless carriers offer 3G and 4G networks. 3G networks, with transmission speeds ranging
from 144 Kbps for mobile users in, say, a car, to more than 2 Mbps for stationary 306 Part Two Information Technology
Infrastructure users, offer fair transmission speeds for e-mail, browsing the web, and online shopping but are too slow
for videos.
4G networks have much higher speeds: 100 megabits/second download and 50 megabits upload speed, with more than
enough capacity for watching high-definition video on your smartphone. Long Term Evolution (LTE) and mobile
Worldwide Interoperability for Microwave Access (WiMax—see the following section) are the current 4G standards.
BLUETOOTH
Bluetooth is the popular name for the 802.15 wireless networking standard, which is useful for
creating small personal area networks (PANs). It links up to eight devices within a 10-meter area using
low-power, radio-based communication and can transmit up to 722 Kbps in the 2.4-GHz band.
Wireless phones, pagers, computers, printers, and computing devices using Bluetooth communicate
with each other and even operate each other without direct user intervention.
WIFI AND WIRELESS INTERNETT ACCESS
The 802.11 set of standards for wireless LANs and wireless Internet access is also known as Wi-Fi.
The first of these standards to be widely adopted was 802.11b, which can transmit up to 11 Mbps in
the unlicensed 2.4-GHz band and has an effective distance of 30 to 50 meters. The 802.11g standard
can transmit up to 54 Mbps in the 2.4-GHz range. 802.11n is capable of transmitting over 100 Mbps.
Today’s PCs and netbooks have built-in support for Wi-Fi, as do the iPhone, iPad, and other
smartphones.
RADIO FREQUENCY INDENTIFICATION
( RFID )
Radio frequency identification (RFID) systems provide a powerful technology for tracking the
movement of goods throughout the supply chain. RFID systems use tiny tags with embedded
microchips containing data about an item and its location to transmit radio signals over a short
distance to RFID readers. The RFID readers then pass the data over a network to a computer for
processing. Unlike bar codes, RFID tags do not need line-of-sight contact to be read.
WIRELESS SENSOR NETWORKS
If your company wanted state-of-the art technology to monitor building security or detect hazardous
substances in the air, it might deploy a wireless sensor network. Wireless sensor networks (WSNs) are
networks of interconnected wireless devices that are embedded in the physical environment to provide
measurements of many points over large spaces. These devices have built-in processing, storage, and
radio frequency sensors and antennas. They are linked into an interconnected network that routes the
data they capture to a computer for analysis.
CASE STUDY QUESTIONS, PAGE 297
1. Should managers monitor employee e-mail and Internet usage? Why or why not?
Should managers monitor employee e-mail and internet usage because to ensure that employees are
not wasting time at work. After that, behavior creates serius business problem. Checking e-mail,
responding to instant messages, or sneaking in a brief YouTube vedio create a series of nonstop
interruptions that divert employee attention from the job tasks they are supposed to be performing.
Many companies have begun monitoring employee use of e-mail and internet, sometimes without their
knowledge. Why not managers monitor employee e-mail and internet usage because worker can
increase their knowledge by finding key information on the internet and facilitate employees to
perform work beyond expectations. Employee too much time on personel business translate into lost
revenue and some employees may even b e billing time they spend pursuing personel interests online
to clients, thus overcharging them. I think managers should monitor employees’ email and Internet
usage during work time. Employees are paid to work. They have a common goal to maximize
company’s wealth. Anything beyond this goal should not be done during work hours. As the article
said, if employee is caught doing illegal activities online while they are working, the company will be
sued. It is wasting company’s resources on unnecessary dispute.
Monitoring employee email and Internet usage may temporarily reduce employee’s morale. They will
not feel free when they use computer. As the time goes by, they may get used to it. The rule will guide
they act properly online when they are working. In the long run, it helps company to conduct business
efficiency and effectively. Hundred percent of company’s resource is working for generate revenue.
2. Describe an effective e-mail and web use policy for a company.
An effective email and web use policy should include clear guide line what action is permitted and
what is not, such as racist and sexually explicit has to be banned. Any employee step inside the banned
area could be fired immediately. Also, managers could make the policy flexible. They could allow
employee doing non work-related legal online surfing and email during break time and lunch time
with limited speed load. If they occupied too much speed load, the regular online traffic will be
blocked which could damage both hardware and software on company’s server. Since the policy is
adopted, everyone in the company should work base on it, even include managers because employee
will not be convinced if they see their boss does personal activities online during work time.
Furthermore, everyone’s online activities should be kept in privacy as long as it is legal. Managers do
not have the right to ask employee what they do online during break time and lunch hour. Also
company has the responsibility to maintain the hardware and software which block spam because it
could cause employees read non-work related information from their email inbox and hardly to find a
legitimate email among hundreds spam.
For example, clear information is to leave no room for interpretation, a company's Internet use policy
should convey the rules clearly and explicitly. For example, the policy should indicate what type of
sites are forbidden under any circumstances. These may include social networking sites and should
include sites that contain pornographic, violent or threatening content. If certain styles of sites are
allowed under the company's policy, they should be liste and second is fairness If the company's
management wants its employees to be content, there should be a degree of fairness and flexibility in
the Web-use policy. While an employer might say employees cannot check their personal email at
work, employees will likely do so. Realizing this fact, the employer can write the policy reminding
employees that "reasonable" personal Internet usage, such as checking emails, bank balances and news
sites, is acceptable in moderation during breaks and lunch.
3. Should managers inform employees that their web behavior is being monitored? Or should
managers monitor secretly? Why or why not?
The managers should inform the employees that their uses of the web is monitored. If the managers
let the employees know about their computers are monitored the employees will avoid using their
personel business, then they will concentrate during their work hours. My opinion about it, the
managers should let the employees know about that to focus in their work for example can explain
how the result from measuring and managing performance inform employee development.Measuring
and managing helps a company to improve quality, retain key employees and be ahead of their
competitors. A company can see how well a business is doing by the amount of customers and profits
they make. They can compare how well employees work by checking each employee individually to
see how much they have produced. Measuring employee development. Bench marking Using standard
measurements in a service can be used to compare with other organizations in order to gain
perspective on organizational performance. Performance management bring together many of the
elements which go to make up the successful practice of people management, including learning and
development.
We’re used to thinking of ongoing performance management for employees, for example, setting
goals, monitoring the employee’s achievement of those goals, sharing feedback with the employee,
evaluating the employee’s performances, rewarding performance or firing the employee.Employees
are happier if they know how they are doing, if they know they are doing a good job and it has been
acknowledged, they will generally continue to do a good job as and strive to do more. If people don’t
receive feedback and they aren’t doing a good job, employers expect them to be satisfied or
productive.