<ul><li>Case 2/p128 </li></ul>
1. What are the business benefits of adopting open-source software? <ul><li>Benefits include:  </li></ul><ul><li>reduced c...
2. What are the risks associated with open-source software? How can these risks be addressed? <ul><li>Risks include:  </li...
<ul><li>3. Do you see open-source software eventually replacing the current proprietary software model?  </li></ul>
BLOG  (web+log) source: http://en.wikipedia.org/wiki/Blog#Types_of_blogs <ul><li>A  blog  is a  user-generated  website wh...
Myspace source: http://en.wikipedia.org/wiki/MySpace <ul><li>MySpace  is a  social networking   website  offering an inter...
Drawing money from an ATM
Telecommunications and Networking
Learning Objectives <ul><li>Understand the concept of a network. </li></ul><ul><li>Apply Metcalfe’s law in understanding t...
Learning Objectives <ul><li>Identify the basic components, functions, and types of telecommunications networks used in bus...
Learning Objectives <ul><li>Identify the various transmission media and topologies used in telecommunications networks. </...
Network Concepts <ul><li>Network </li></ul><ul><ul><li>An interconnected chain, group or system </li></ul></ul><ul><li>Num...
Telecommunications <ul><li>Telecommunications </li></ul><ul><ul><li>Exchange of information in any form (voice, data, text...
Basic concepts <ul><li>Communication protocols (TCP/IP) </li></ul><ul><li>Data transmission methods </li></ul><ul><ul><li>...
Networks <ul><li>Concept </li></ul><ul><ul><li>&quot;a group of interconnected computers, workstations, or computer device...
Open Systems <ul><li>Information systems that use common standards for hardware, software, applications and networks </li>...
Middleware <ul><li>Any programming that serves to “glue together” two separate programs </li></ul>
Internet2 <ul><li>Next generation of the Internet </li></ul><ul><li>High-performance network </li></ul><ul><li>In use at 2...
Internet Service Provider <ul><li>ISP </li></ul><ul><ul><li>A company that specializes in providing easy access to the Int...
An Intranet Also look at fig 6.8 <ul><li>A network inside an organization </li></ul><ul><ul><li>That uses Internet technol...
Extranet (also look at fig 6.9) <ul><li>Network links that use Internet technologies </li></ul><ul><ul><li>To connect the ...
GPS <ul><li>The global positioning system (GPS) is a major technological achievement that has broad-reaching implications ...
Telecommunications network <ul><li>Any arrangement where a sender transmits a message to a receiver over a channel consist...
Types of Networks <ul><li>WAN </li></ul><ul><li>LAN </li></ul><ul><li>VPN </li></ul><ul><li>C/S </li></ul>
VPN <ul><li>Basically, a VPN is a private network that uses a public network (usually the Internet) to connect remote site...
VPN
Internetwork Processors <ul><li>Switch  – makes connections between telecommunications circuits in a network </li></ul><ul...
ROUTERS <ul><li>Routers are specialized computers that send your messages and those of every other Internet user speeding ...
ROUTERS <ul><li>configuration table . A configuration table is a collection of information, including:  </li></ul><ul><li>...
Distributed data processing TSS - Time Sharing Systems CSS - Client Server Systems MAINFRAME PC PC PC PC
Client/Server networks <ul><li>Clients : End user personal computers or networked computers </li></ul><ul><li>Interconnect...
CSS architecture PC PC PC PC L A N File Server Print Server Communica-  tions Server Remote Server
Peer-to-peer networks (p 209) <ul><li>Networks that connect from one PC to another PC </li></ul><ul><li>Peer-to-peer netwo...
Wireless Technologies <ul><li>Terrestrial microwave </li></ul><ul><ul><li>Earthbound microwave systems that transmit high-...
Wireless Technologies <ul><li>Cellular and PCS telephone and pager systems </li></ul><ul><ul><li>Divide the geographic are...
Bluetooth <ul><li>Bluetooth is a standard developed by a group of electronics manufacturers that allows any sort of electr...
<ul><li>http://www.dell.com/content/topics/topic.aspx/global/shared/corp/media/en/studio_dell?c=us&l=en&s=corp&targetNetwo...
Steps in wireless network source: www.dell.com
Cell Phones source: howstuffworks.com <ul><li>GSM (CDMA) vs TDMA </li></ul><ul><li>TDMA (time division multiple access) as...
Band/Mode <ul><li>Multiple band  - A phone that has multiple-band capability can  switch frequencies . For example, a dual...
EDI Concepts <ul><li>EDI is a mechanism for electronic trading </li></ul><ul><li>EDI replaces paper flow with online trans...
EDI architecture
Network Topologies (p 219) <ul><li>Topology :  structure of a network </li></ul><ul><li>Star : ties end user computers to ...
Network Architectures & Protocols <ul><li>Protocol : standard set of rules and procedures for the control of communication...
OSI & TCP/IP Models (p 221) <ul><li>Open Systems Interconnection (OSI)  Model </li></ul><ul><ul><li>A seven-layer model th...
IP <ul><li>Internet protocol </li></ul><ul><li>Each system connected to the internet is identified by a 32-bit IP address ...
Basic Communications Model Standards are needed at all Layers User Layer Application Layer Computer (Transport) Layer Tran...
Internet Telephony <ul><li>Using an Internet connection to pass voice data using IP  </li></ul><ul><li>Voice over IP (VoIP...
VOIP (source www.fcc.gov)
Bandwidth <ul><li>Bandwidth </li></ul><ul><ul><li>Frequency range of a telecommunications channel </li></ul></ul><ul><ul><...
WiFi <ul><li>WIreless FIdelity (WiFi)-- used generically when referring of any type of  802.11   </li></ul><ul><li>&quot; ...
Additional Readings <ul><li>Voice over data networks </li></ul><ul><li>Networking Hardware Quiz   </li></ul><ul><li>abc  o...
RWC 1: SAIC, Hewlett-Packard, GE, and Others: Wireless, Wireless Everywhere <ul><li>What are some of the business benefits...
What are some of the challenges being faced in this use of wireless technologies?  What solutions can you offer? <ul><li>H...
The use of wireless networking as described in the case is both innovative and useful. What other business uses can you en...
RWC 2: Maryland and Colorado: Serving Its Citizens Without Using Wires <ul><li>What is the business value of advanced mobi...
In what other government services could GPS serve to provide business value? Give some examples. <ul><li>States’ National ...
Are there disadvantages or risks associated with the deployment of GPS systems to monitor the location of people?  Explain...
Upcoming SlideShare
Loading in …5
×

Lecture 6_telecomm_aggarwal.PPT

1,438 views

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,438
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
27
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Open systems provide greater connectivity. Open systems also provide high degree of interoperability.
  • Internet2 may never replace the Internet. May remain a scientific and government network.
  • Two tiered client server includes just client and server Maybe connected to optional super servers
  • With a central server architecture, P2P file-sharing software connects your PC to a central server that contains a directory of all the other users in the network. When you request a file, the server searches the directory for any other users who have that file and are online. You click on list and make the P2P connection. Napster used this architecture. Pure P2P has no central directory or server.
  • Bandwidth is sometimes called baud rate. Think of channel as a pipe with water in it. The wider the pipe, the more water that can flow through it. Narrow-band – unshielded twisted-pair Broadband – microwave, fiber optic or satellite
  • Lecture 6_telecomm_aggarwal.PPT

    1. 1. <ul><li>Case 2/p128 </li></ul>
    2. 2. 1. What are the business benefits of adopting open-source software? <ul><li>Benefits include: </li></ul><ul><li>reduced cost of purchase, </li></ul><ul><li>less chance of obsolescence, </li></ul><ul><li>broader access to technical support, </li></ul><ul><li>lower cost of upgrade. </li></ul>
    3. 3. 2. What are the risks associated with open-source software? How can these risks be addressed? <ul><li>Risks include: </li></ul><ul><li>potential abandonment of standard, </li></ul><ul><li>loss of liability shift to software vendor, </li></ul><ul><li>lack of quality technical support. </li></ul>
    4. 4. <ul><li>3. Do you see open-source software eventually replacing the current proprietary software model? </li></ul>
    5. 5. BLOG (web+log) source: http://en.wikipedia.org/wiki/Blog#Types_of_blogs <ul><li>A blog is a user-generated website where entries are made in journal style and displayed in a reverse chronological order . </li></ul><ul><li>Blogs often provide commentary or news on a particular subject, such as food, politics, or local news; some function as more personal online diaries </li></ul><ul><li>Youtube type of a video weblog </li></ul>
    6. 6. Myspace source: http://en.wikipedia.org/wiki/MySpace <ul><li>MySpace is a social networking website offering an interactive, user-submitted network of friends, personal profiles, blogs, groups, photos, music and videos. MySpace also features an internal search engine and an internal e-mail system </li></ul>
    7. 7. Drawing money from an ATM
    8. 8. Telecommunications and Networking
    9. 9. Learning Objectives <ul><li>Understand the concept of a network. </li></ul><ul><li>Apply Metcalfe’s law in understanding the value of a network. </li></ul><ul><li>Identify several major developments and trends in the industries, technologies, and business applications of telecommunications and Internet technologies. </li></ul><ul><li>Examples of the business value of Internet, intranet, and extranet applications. </li></ul>
    10. 10. Learning Objectives <ul><li>Identify the basic components, functions, and types of telecommunications networks used in business. </li></ul><ul><li>Explain the functions of major components of telecommunications network hardware, software, media, and services. </li></ul><ul><li>Explain the concept of client/server networking. </li></ul><ul><li>Understand the two forms of peer-to-peer networking. </li></ul><ul><li>Explain the difference between digital and analog signals. </li></ul>
    11. 11. Learning Objectives <ul><li>Identify the various transmission media and topologies used in telecommunications networks. </li></ul><ul><li>Understand the fundamentals of wireless network technologies. </li></ul><ul><li>Explain the concepts behind TCP/IP. </li></ul><ul><li>Understand the seven layers of the OSI network model. </li></ul>
    12. 12. Network Concepts <ul><li>Network </li></ul><ul><ul><li>An interconnected chain, group or system </li></ul></ul><ul><li>Number of possible connections on a network is N * (N-1)/2 </li></ul><ul><ul><li>Where N = number of nodes (points of connections on the network) </li></ul></ul><ul><ul><li>Example, if there are 10 computers on a network, there are 10 * 9/2 = 45 possible connections </li></ul></ul>
    13. 13. Telecommunications <ul><li>Telecommunications </li></ul><ul><ul><li>Exchange of information in any form (voice, data, text, images, audio, video) over networks </li></ul></ul>
    14. 14. Basic concepts <ul><li>Communication protocols (TCP/IP) </li></ul><ul><li>Data transmission methods </li></ul><ul><ul><li>Asynchronous </li></ul></ul><ul><ul><li>Synchronous </li></ul></ul><ul><li>Connecting </li></ul><ul><ul><li>Modem </li></ul></ul><ul><ul><li>Hardwired and remote </li></ul></ul><ul><li>Data transmission channels (bps) </li></ul><ul><ul><li>narrow bands: 5-30 </li></ul></ul><ul><ul><li>voice bands: 1,000-9,600 </li></ul></ul><ul><ul><li>broad bands: 100,000 </li></ul></ul><ul><li>Types of communication lines </li></ul><ul><ul><li>simplex </li></ul></ul><ul><ul><li>half-duplex </li></ul></ul><ul><ul><li>duplex </li></ul></ul>
    15. 15. Networks <ul><li>Concept </li></ul><ul><ul><li>&quot;a group of interconnected computers, workstations, or computer devices (such as printers and data storage systems).” </li></ul></ul><ul><li>Network topology </li></ul><ul><ul><li>bus </li></ul></ul><ul><ul><li>star </li></ul></ul><ul><ul><li>ring </li></ul></ul><ul><li>Local-area networks </li></ul><ul><ul><li>bus: Ethernet, carrier sense multiple access (CSMA) </li></ul></ul><ul><ul><li>ring: token passing method </li></ul></ul><ul><li>Distributed data processing </li></ul><ul><ul><li>&quot;interconnects sites of one organization not only for communication of data and messages but also for the sharing of resources.&quot; </li></ul></ul>
    16. 16. Open Systems <ul><li>Information systems that use common standards for hardware, software, applications and networks </li></ul><ul><li>Internet networking technologies are a common standard for open systems </li></ul><ul><li>Connectivity : </li></ul><ul><ul><li>Ability of networked computers to easily access and communicate with each other and share information </li></ul></ul><ul><li>Interoperability : </li></ul><ul><ul><li>The ability of an open system to enable end user applications to be accomplished using different varieties of computer systems, software packages, and databases provided by a variety of interconnected networks </li></ul></ul>
    17. 17. Middleware <ul><li>Any programming that serves to “glue together” two separate programs </li></ul>
    18. 18. Internet2 <ul><li>Next generation of the Internet </li></ul><ul><li>High-performance network </li></ul><ul><li>In use at 200 universities, scientific institutions, communications corporations </li></ul>
    19. 19. Internet Service Provider <ul><li>ISP </li></ul><ul><ul><li>A company that specializes in providing easy access to the Internet </li></ul></ul><ul><ul><li>For a monthly fee, you get software, user name, password and access </li></ul></ul><ul><li>ISPs are connect to one another through network access points </li></ul>
    20. 20. An Intranet Also look at fig 6.8 <ul><li>A network inside an organization </li></ul><ul><ul><li>That uses Internet technologies (such as Web browsers and servers, TCP/IP protocols, HTML, etc.) </li></ul></ul><ul><ul><li>To provide an Internet-like environment within the organization </li></ul></ul><ul><ul><li>For information sharing, communications, collaboration and support of business processes </li></ul></ul><ul><ul><li>Protected by security measures </li></ul></ul><ul><ul><li>Can be accessed by authorized users through the Internet </li></ul></ul>
    21. 21. Extranet (also look at fig 6.9) <ul><li>Network links that use Internet technologies </li></ul><ul><ul><li>To connect the Intranet of a business </li></ul></ul><ul><ul><li>With the Intranets of its customers, suppliers or other business partners </li></ul></ul>
    22. 22. GPS <ul><li>The global positioning system (GPS) is a major technological achievement that has broad-reaching implications for business. Using the Internet, </li></ul><ul><ul><li>Can find other innovative uses for GPS. </li></ul></ul><ul><ul><li>Good places to start familiarizing yourself with current accomplishments are </li></ul></ul><ul><ul><ul><li>The GPSWorld site at http://www.gpsworld.com/gpsworld/ </li></ul></ul></ul><ul><ul><ul><li>The GPS Overview at http://www.colorado.edu/geography/gcraft/notes/gps/gps_f.html </li></ul></ul></ul>
    23. 23. Telecommunications network <ul><li>Any arrangement where a sender transmits a message to a receiver over a channel consisting of some type of medium </li></ul>
    24. 24. Types of Networks <ul><li>WAN </li></ul><ul><li>LAN </li></ul><ul><li>VPN </li></ul><ul><li>C/S </li></ul>
    25. 25. VPN <ul><li>Basically, a VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses &quot;virtual&quot; connections routed through the Internet from the company's private network to the remote site or employee. </li></ul><ul><li>Source: computer.Howstuffworks.com </li></ul>
    26. 26. VPN
    27. 27. Internetwork Processors <ul><li>Switch – makes connections between telecommunications circuits in a network </li></ul><ul><li>Router – intelligent communications processor that interconnects networks based on different protocols </li></ul><ul><li>Hub – a port switching communications processor </li></ul><ul><li>Gateway – connects networks using different communications architectures </li></ul>
    28. 28. ROUTERS <ul><li>Routers are specialized computers that send your messages and those of every other Internet user speeding to their destinations along thousands of pathways. </li></ul><ul><li>Fujitsu GeoStream R980 industrial strength router </li></ul>
    29. 29. ROUTERS <ul><li>configuration table . A configuration table is a collection of information, including: </li></ul><ul><li>Information on which connections lead to particular groups of addresses </li></ul><ul><li>Priorities for connections to be used </li></ul><ul><li>Rules for handling both routine and special cases of traffic </li></ul><ul><li>A router, then, has two separate but related jobs: </li></ul><ul><li>The router ensures that information doesn't go where it's not needed. This is crucial for keeping large volumes of data from clogging the connections of &quot;innocent bystanders.&quot; </li></ul><ul><li>The router makes sure that information does make it to the intended destination. </li></ul><ul><li>Computer.howstuffworks.com </li></ul>
    30. 30. Distributed data processing TSS - Time Sharing Systems CSS - Client Server Systems MAINFRAME PC PC PC PC
    31. 31. Client/Server networks <ul><li>Clients : End user personal computers or networked computers </li></ul><ul><li>Interconnected by LANs </li></ul><ul><li>Servers : manage networks </li></ul><ul><li>Processing shared between clients and servers </li></ul>
    32. 32. CSS architecture PC PC PC PC L A N File Server Print Server Communica- tions Server Remote Server
    33. 33. Peer-to-peer networks (p 209) <ul><li>Networks that connect from one PC to another PC </li></ul><ul><li>Peer-to-peer networking enables or enhances the following scenarios: </li></ul><ul><li>Real-time communications (RTC) </li></ul><ul><li>Collaboration </li></ul><ul><li>Content distribution </li></ul><ul><li>Distributed processing </li></ul><ul><li>Improved Internet technologies </li></ul><ul><li>Source: www.microsoft.com </li></ul>
    34. 34. Wireless Technologies <ul><li>Terrestrial microwave </li></ul><ul><ul><li>Earthbound microwave systems that transmit high-speed radio signals in a line-of-sight path </li></ul></ul><ul><ul><li>Between relay systems spaced approximately 30-miles apart </li></ul></ul><ul><li>Communications satellites </li></ul><ul><ul><li>Satellite serves as relay stations for communications signals </li></ul></ul><ul><ul><li>Uses microwave radio signals </li></ul></ul>
    35. 35. Wireless Technologies <ul><li>Cellular and PCS telephone and pager systems </li></ul><ul><ul><li>Divide the geographic area into small areas or cells </li></ul></ul><ul><ul><li>Each cell has transmitter or radio relay antenna to send message from one cell to another </li></ul></ul><ul><li>Wireless LANs </li></ul><ul><ul><li>Radio signals within an office or building </li></ul></ul><ul><ul><li>Connect PCs to networks </li></ul></ul><ul><li>Bluetooth </li></ul><ul><ul><li>Short-range wireless technology </li></ul></ul><ul><ul><li>To connect PC to peripherals such as printer </li></ul></ul>
    36. 36. Bluetooth <ul><li>Bluetooth is a standard developed by a group of electronics manufacturers that allows any sort of electronic equipment -- from computers and cell phones to keyboards and headphones -- to make its own connections, without wires, cables or any direct action from a user. </li></ul><ul><li>Bluetooth can connect up to eight devices </li></ul><ul><li>simultaneously. With all of those devices </li></ul><ul><li>in the same 10-meter (32-foot) radius </li></ul>
    37. 37. <ul><li>http://www.dell.com/content/topics/topic.aspx/global/shared/corp/media/en/studio_dell?c=us&l=en&s=corp&targetNetwork=2&targetChannel=4&targetMedia=32 </li></ul>
    38. 38. Steps in wireless network source: www.dell.com
    39. 39. Cell Phones source: howstuffworks.com <ul><li>GSM (CDMA) vs TDMA </li></ul><ul><li>TDMA (time division multiple access) assigns each call a certain portion of time on a designated frequency. </li></ul><ul><li>Works on either the 800-MHz or 1900-MHz frequency bands. </li></ul><ul><li>CDMA (code division multiple access) gives a unique code to each call and spreads it over the available frequencies. </li></ul><ul><li>GSM operates in the 900-MHz and 1800-MHz bands in Europe and Asia and in the 850-MHz and 1900-MHz (sometimes referred to as 1.9-GHz) band in the United States </li></ul><ul><li>Cell vs Mobile </li></ul>
    40. 40. Band/Mode <ul><li>Multiple band - A phone that has multiple-band capability can switch frequencies . For example, a dual-band TDMA phone could use TDMA services in either an 800-MHz or a 1900-MHz system. A quad-band GSM phone could use GSM service in the 850-MHz, 900-MHz, 1800-MHz or 1900-MHz band. </li></ul><ul><li>Multiple mode - In cell phones, &quot;mode&quot; refers to the type of transmission technology used. So, a phone that supported AMPS and TDMA could switch back and forth as needed. It's important that one of the modes is AMPS -- this gives you analog service if you are in an area that doesn't have digital support. </li></ul>
    41. 41. EDI Concepts <ul><li>EDI is a mechanism for electronic trading </li></ul><ul><li>EDI replaces paper flow with online transactions </li></ul><ul><li>EDI architecture </li></ul><ul><li>EDI is for trading partners </li></ul><ul><li>Implementation plan is a key factor </li></ul><ul><li>Obstacles: </li></ul><ul><ul><li>lack of transaction standardization </li></ul></ul><ul><ul><li>high start-up costs </li></ul></ul><ul><li>EDI third-party suppliers </li></ul><ul><ul><li>AT&T, Control Data, EDS, GE, Western Union, IBM, Martin Marietta Data Systems, etc. </li></ul></ul>
    42. 42. EDI architecture
    43. 43. Network Topologies (p 219) <ul><li>Topology : structure of a network </li></ul><ul><li>Star : ties end user computers to a central computer </li></ul><ul><li>Ring : ties local computer processors together in a ring on a relatively equal basis </li></ul><ul><li>Bus : local processors share the same communications channel </li></ul>
    44. 44. Network Architectures & Protocols <ul><li>Protocol : standard set of rules and procedures for the control of communications in a network </li></ul><ul><li>Network Architecture: </li></ul><ul><ul><li>Master plan of standard protocols, hardware, software and interfaces between end users and computer systems </li></ul></ul><ul><ul><li>Goal of promoting an open, simple, flexible, and efficient telecommunications environment </li></ul></ul>
    45. 45. OSI & TCP/IP Models (p 221) <ul><li>Open Systems Interconnection (OSI) Model </li></ul><ul><ul><li>A seven-layer model that serves as a standard model for network architectures </li></ul></ul><ul><ul><li>Model for how messages should be transmitted between two points in a network </li></ul></ul><ul><ul><li>Each layer adds functions </li></ul></ul><ul><li>Transmission Control Protocol / Internet Protocol (TCP/IP) </li></ul><ul><ul><li>A five layer telecommunications protocol used by the Internet </li></ul></ul>
    46. 46. IP <ul><li>Internet protocol </li></ul><ul><li>Each system connected to the internet is identified by a 32-bit IP address </li></ul><ul><li>Four numbers separated by a decimal </li></ul><ul><li>Each represented by octal (8 bits; hence 0-255) </li></ul><ul><li>Ex: 168.212.226.204 </li></ul><ul><li>Binary format: </li></ul><ul><li>10101000.11010100.11100010.11001100 </li></ul><ul><li>A new protocol IPv6 allows for 128 bit IP addresses </li></ul><ul><li>to look up an IP address : http://www.kloth.net/services/nslookup.php   </li></ul><ul><li>to find info:  </li></ul><ul><li>http://www.geobytes.com/IpLocator.htm </li></ul>
    47. 47. Basic Communications Model Standards are needed at all Layers User Layer Application Layer Computer (Transport) Layer Transmission Layer
    48. 48. Internet Telephony <ul><li>Using an Internet connection to pass voice data using IP </li></ul><ul><li>Voice over IP (VoIP) </li></ul><ul><li>Skips standard long-distance phone charges </li></ul>
    49. 49. VOIP (source www.fcc.gov)
    50. 50. Bandwidth <ul><li>Bandwidth </li></ul><ul><ul><li>Frequency range of a telecommunications channel </li></ul></ul><ul><ul><li>Determines transmission rate </li></ul></ul><ul><ul><li>Classified in bits per second (bps) </li></ul></ul><ul><li>Transmission Rates: </li></ul><ul><ul><li>Narrow-band – low-speed </li></ul></ul><ul><ul><li>Broadband – high-speed </li></ul></ul>
    51. 51. WiFi <ul><li>WIreless FIdelity (WiFi)-- used generically when referring of any type of 802.11 </li></ul><ul><li>&quot; Wi-Fi Certified &quot; (a registered trademark) by the Wi-Fi Alliance are interoperable with each other, </li></ul><ul><li>even if they are from different manufacturers. A user with a &quot;Wi-Fi Certified&quot; product can use any </li></ul><ul><li>brand of access point with any other brand of client hardware that also is certified </li></ul><ul><li>http://www.webopedia.com/TERM/W/Wi_Fi.html </li></ul>
    52. 52. Additional Readings <ul><li>Voice over data networks </li></ul><ul><li>Networking Hardware Quiz   </li></ul><ul><li>abc of wireless LAN </li></ul><ul><li>ISDN Tutori al </li></ul><ul><li>Ethernet tutorial </li></ul><ul><li>Internet Protocol </li></ul><ul><li>Thin clients </li></ul><ul><li>  UNIX/NT integration </li></ul><ul><li>Cell phones </li></ul>
    53. 53. RWC 1: SAIC, Hewlett-Packard, GE, and Others: Wireless, Wireless Everywhere <ul><li>What are some of the business benefits </li></ul><ul><li>associated with using wireless networks to </li></ul><ul><li>collect and transmit data? </li></ul><ul><li>Benefits would include” </li></ul><ul><li>Superfast wireless connections to the Web. </li></ul><ul><li>Cost is about one-fourth of existing costs for connection to the Web. </li></ul><ul><li>Productivity gains such as a 45% gain at UPS. </li></ul>
    54. 54. What are some of the challenges being faced in this use of wireless technologies? What solutions can you offer? <ul><li>Having everyone online in a meeting can be toxic to productivity. “No laptop” policies for important meetings. </li></ul><ul><li>Enormous pressure within companies to provide Wi-Fi in all areas of the company. Which employees have compelling needs for Wi-Fi access </li></ul><ul><li>Cost exceeds the benefit to be gained by providing Wi-Fi such as in a manufacturing plant that would require numerous additional access points than usual. </li></ul><ul><li>Security of information available via the Wi-Fi system. Delay implementation until security assurances are met. </li></ul>
    55. 55. The use of wireless networking as described in the case is both innovative and useful. What other business uses can you envision for this approach?
    56. 56. RWC 2: Maryland and Colorado: Serving Its Citizens Without Using Wires <ul><li>What is the business value of advanced mobile technologies to Maryland’s emergency management services? </li></ul><ul><li>Direct agents toward places where their presence is required </li></ul><ul><li>Give notice of impending natural disasters with forecasts and instructions on how to proceed. </li></ul><ul><li>Improve information gathering on the extent and magnitude of devastation. </li></ul><ul><li>Reduce the amount of manual data-entry , leading to improved response times and reduction of errors (i.e. address is automatically captured and pop-up menus limit possible answers). </li></ul>
    57. 57. In what other government services could GPS serve to provide business value? Give some examples. <ul><li>States’ National Guards, to monitor and direct personnel in case of an emergency. </li></ul><ul><li>Emergency Services, to direct ambulances, firefighters, etc. </li></ul><ul><li>Department of Treasury / Federal Reserve, to track the location of armored trucks both for regular traffic and in case of a hijacking. </li></ul><ul><li>The military in general, given that it has one of the largest manpower and logistics network in the country. </li></ul>
    58. 58. Are there disadvantages or risks associated with the deployment of GPS systems to monitor the location of people? Explain. <ul><li>Invasions of privacy </li></ul><ul><li>Limitation on the freedom of movement </li></ul><ul><li>Could allow not only the government but also private individuals to monitor other people’s movements. </li></ul>

    ×