SlideShare a Scribd company logo
1 of 12
General Motors Corporation
The Business Value
of Wireless LANs
New Shores International College
Global BBM 2012-15
India
Presented to: Prof. SANDHYA
Auto makers started installing wireless links in the mid-1990s, using
proprietary methods until the Wi-Fi international wireless LAN standard
appeared in 2001.
Wireless LANs as a mission critical infrastructure for its manufacturing
operations.
They initially use the massive in-plant wireless LAN infrastructure to
track materials and replenish parts at stations on its assembly lines.
They support wide range of application, which include access to
computer-aided design drawings and plant configuration information.
SUMMARY
It provides you with agility and flexibility that did not exist before.
GM has already equipped 75 to 100 forklift trucks with wireless
terminals in each plant.
When workers need to replenish parts for their station, they press a
button using the wireless.
They are also concerned with the network security.
Their biggest strategic weapon may be its involvement with standards
bodies and vendors to see that standardized security methods are
quickly incorporated into wireless gear.
1) What is the business value of wireless
LANs to GM ?
There are several advantages to GM by adopting the
wireless LANs. It helps GM in reducing costs and also
helps to recoup its investment quickly .
Some of the advantages of wireless LANs to GM :
 Wireless LANs helps in tracking materials replenish
parts at stations on its assembly line.
QUESTIONS & ANSWERS
 It can also support wide range of other applications,
which includes access to computer-aided design
drawings and plant configuration information, which
can also be called “virtual factory” database.
 It also bring change in ability to send and receive
information to and from workers and system in
manufacturing .
 GM faced real problem with locating parts, but with
wireless LAN facility the parts can be located easily
with wireless LAN based material management system
which helps in reducing manufacturing costs.
 Wireless LAN helps GM workers who are in need to
replenish parts, can press a button on wireless
pendent at their workstation, the request is displayed
on a screen in forklift, showing location of worker and
materials required. This helps in minimizing the time
and manufacturing work can be done efficiently.
2) What is the security vulnerabilities of
wireless LANs? Is GM taking
appropriate security measures? why
or why not?
The security vulnerabilities of wireless LANs is
hackers. GM is concerned about hackers, who can
hack systems through wireless transmission.
GM has adopted some approaches to overcome this
problem. GM segments its network with firewalls
and virtual private networks and they do detailed
site survey that look at all radio interference
sources. It also relies on good security software.
3) What are some other possible business
applications of wireless LANs?
Evaluate the benefits and challenges
of one of them to a large or small
business.
some other possible business applications of
wireless LANs are :
 Wireless LANs can also be used in corporate offices
and business firms.
 Automatic request of materials.
 Some companies are launching wireless LANs
accessible mobile phones and other hand held devices
like PDAs etc..
 Scalability.
Benefits
1. It is faster and less expensive than other common
wire based LAN technologies.
2. The Wi-Fi or LANs enable laptop or PCs can connect
easily to internet and other networks.
3. It helps to minimize the wiring cost in office which
is very difficult and costly task.
4. It helps in eliminating the mistakes and damages of
repairing wires.
Challenges :
The main challenges of wireless LANs is from hackers.
They can hack into systems through wireless
transmission.
But this problem can be solved through security systems,
by relaying on good security software.
The installation charges of wireless LANs is costly and it
is
difficult to implement and maintain the same.
The use of wireless LANs is growing rapidly as
new high speed technologies are implemented,
which is used in increasing number of
business, public and home environment.
ConclusionConclusion

More Related Content

What's hot

Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Carotek
 
Wide Area Network for Govt. of Delhi
Wide Area Network for Govt. of Delhi Wide Area Network for Govt. of Delhi
Wide Area Network for Govt. of Delhi Videoguy
 
Building the Anytime, Anywhere Network
Building the Anytime, Anywhere NetworkBuilding the Anytime, Anywhere Network
Building the Anytime, Anywhere NetworkJuniper Networks
 
A design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeA design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeIMPULSE_TECHNOLOGY
 
Mobile computing
Mobile computingMobile computing
Mobile computingLi Zhao
 

What's hot (11)

Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...
 
Wide Area Network for Govt. of Delhi
Wide Area Network for Govt. of Delhi Wide Area Network for Govt. of Delhi
Wide Area Network for Govt. of Delhi
 
Building the Anytime, Anywhere Network
Building the Anytime, Anywhere NetworkBuilding the Anytime, Anywhere Network
Building the Anytime, Anywhere Network
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
A design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeA design for wireless access control system based on zig bee
A design for wireless access control system based on zig bee
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Wireless Applications
Wireless ApplicationsWireless Applications
Wireless Applications
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Presentation1
Presentation1Presentation1
Presentation1
 
M2M communications
M2M communicationsM2M communications
M2M communications
 

Viewers also liked

Viewers also liked (6)

New shores college bangalore - New shores
New shores college bangalore - New shoresNew shores college bangalore - New shores
New shores college bangalore - New shores
 
Question 4(kelly)
Question 4(kelly)Question 4(kelly)
Question 4(kelly)
 
Q2 powerpoint
Q2 powerpointQ2 powerpoint
Q2 powerpoint
 
Question 2
Question 2Question 2
Question 2
 
Ecocarga iranzu ana
Ecocarga iranzu anaEcocarga iranzu ana
Ecocarga iranzu ana
 
Navarre
NavarreNavarre
Navarre
 

Similar to new shores international college bangalore - New shores College

SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewBryan Kester
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfBoney Maundu Slim
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Ericsson
 
Bhadale group of companies telecom industry products catalogue
Bhadale group of companies telecom industry products catalogueBhadale group of companies telecom industry products catalogue
Bhadale group of companies telecom industry products catalogueVijayananda Mohire
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 
(1) itt capabilities 2013
(1) itt capabilities 2013(1) itt capabilities 2013
(1) itt capabilities 2013ErichDang
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfAnil
 
5 g network-slicing-report
5 g network-slicing-report5 g network-slicing-report
5 g network-slicing-reportermnas2482
 
HSDPA bundled Solution
HSDPA bundled SolutionHSDPA bundled Solution
HSDPA bundled SolutionJojo Marquez
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...SecurityGen1
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
 

Similar to new shores international college bangalore - New shores College (20)

SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M Overview
 
Case study of wireless networking for small business
Case study of wireless networking for small businessCase study of wireless networking for small business
Case study of wireless networking for small business
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network”
 
Bhadale group of companies telecom industry products catalogue
Bhadale group of companies telecom industry products catalogueBhadale group of companies telecom industry products catalogue
Bhadale group of companies telecom industry products catalogue
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
(1) itt capabilities 2013
(1) itt capabilities 2013(1) itt capabilities 2013
(1) itt capabilities 2013
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
5 g network-slicing-report
5 g network-slicing-report5 g network-slicing-report
5 g network-slicing-report
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
HSDPA bundled Solution
HSDPA bundled SolutionHSDPA bundled Solution
HSDPA bundled Solution
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
 
MIMIC Simulator Network Simulator
MIMIC Simulator Network SimulatorMIMIC Simulator Network Simulator
MIMIC Simulator Network Simulator
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
 

More from new shores

Newshores bangalore international college - New shores college.
Newshores bangalore international college - New shores college. Newshores bangalore international college - New shores college.
Newshores bangalore international college - New shores college. new shores
 
New shores college - New shores international College.
New shores college - New shores international College. New shores college - New shores international College.
New shores college - New shores international College. new shores
 
Newshores international college - New shores Bangalore
Newshores international college - New shores BangaloreNewshores international college - New shores Bangalore
Newshores international college - New shores Bangalorenew shores
 
New shores international college - New shores Bangalore
New shores international college - New shores BangaloreNew shores international college - New shores Bangalore
New shores international college - New shores Bangalorenew shores
 
New shores International College - New shores Model un
New shores International College - New shores Model unNew shores International College - New shores Model un
New shores International College - New shores Model unnew shores
 
New shores international College, Bangalore - The business value of wireless
New shores international College, Bangalore - The business value of wirelessNew shores international College, Bangalore - The business value of wireless
New shores international College, Bangalore - The business value of wirelessnew shores
 
About new shores
About new shoresAbout new shores
About new shoresnew shores
 

More from new shores (7)

Newshores bangalore international college - New shores college.
Newshores bangalore international college - New shores college. Newshores bangalore international college - New shores college.
Newshores bangalore international college - New shores college.
 
New shores college - New shores international College.
New shores college - New shores international College. New shores college - New shores international College.
New shores college - New shores international College.
 
Newshores international college - New shores Bangalore
Newshores international college - New shores BangaloreNewshores international college - New shores Bangalore
Newshores international college - New shores Bangalore
 
New shores international college - New shores Bangalore
New shores international college - New shores BangaloreNew shores international college - New shores Bangalore
New shores international college - New shores Bangalore
 
New shores International College - New shores Model un
New shores International College - New shores Model unNew shores International College - New shores Model un
New shores International College - New shores Model un
 
New shores international College, Bangalore - The business value of wireless
New shores international College, Bangalore - The business value of wirelessNew shores international College, Bangalore - The business value of wireless
New shores international College, Bangalore - The business value of wireless
 
About new shores
About new shoresAbout new shores
About new shores
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

new shores international college bangalore - New shores College

  • 1. General Motors Corporation The Business Value of Wireless LANs
  • 2. New Shores International College Global BBM 2012-15 India Presented to: Prof. SANDHYA
  • 3. Auto makers started installing wireless links in the mid-1990s, using proprietary methods until the Wi-Fi international wireless LAN standard appeared in 2001. Wireless LANs as a mission critical infrastructure for its manufacturing operations. They initially use the massive in-plant wireless LAN infrastructure to track materials and replenish parts at stations on its assembly lines. They support wide range of application, which include access to computer-aided design drawings and plant configuration information. SUMMARY
  • 4. It provides you with agility and flexibility that did not exist before. GM has already equipped 75 to 100 forklift trucks with wireless terminals in each plant. When workers need to replenish parts for their station, they press a button using the wireless. They are also concerned with the network security. Their biggest strategic weapon may be its involvement with standards bodies and vendors to see that standardized security methods are quickly incorporated into wireless gear.
  • 5. 1) What is the business value of wireless LANs to GM ? There are several advantages to GM by adopting the wireless LANs. It helps GM in reducing costs and also helps to recoup its investment quickly . Some of the advantages of wireless LANs to GM :  Wireless LANs helps in tracking materials replenish parts at stations on its assembly line. QUESTIONS & ANSWERS
  • 6.  It can also support wide range of other applications, which includes access to computer-aided design drawings and plant configuration information, which can also be called “virtual factory” database.  It also bring change in ability to send and receive information to and from workers and system in manufacturing .  GM faced real problem with locating parts, but with wireless LAN facility the parts can be located easily with wireless LAN based material management system which helps in reducing manufacturing costs.
  • 7.  Wireless LAN helps GM workers who are in need to replenish parts, can press a button on wireless pendent at their workstation, the request is displayed on a screen in forklift, showing location of worker and materials required. This helps in minimizing the time and manufacturing work can be done efficiently.
  • 8. 2) What is the security vulnerabilities of wireless LANs? Is GM taking appropriate security measures? why or why not? The security vulnerabilities of wireless LANs is hackers. GM is concerned about hackers, who can hack systems through wireless transmission. GM has adopted some approaches to overcome this problem. GM segments its network with firewalls and virtual private networks and they do detailed site survey that look at all radio interference sources. It also relies on good security software.
  • 9. 3) What are some other possible business applications of wireless LANs? Evaluate the benefits and challenges of one of them to a large or small business. some other possible business applications of wireless LANs are :  Wireless LANs can also be used in corporate offices and business firms.  Automatic request of materials.  Some companies are launching wireless LANs accessible mobile phones and other hand held devices like PDAs etc..  Scalability.
  • 10. Benefits 1. It is faster and less expensive than other common wire based LAN technologies. 2. The Wi-Fi or LANs enable laptop or PCs can connect easily to internet and other networks. 3. It helps to minimize the wiring cost in office which is very difficult and costly task. 4. It helps in eliminating the mistakes and damages of repairing wires.
  • 11. Challenges : The main challenges of wireless LANs is from hackers. They can hack into systems through wireless transmission. But this problem can be solved through security systems, by relaying on good security software. The installation charges of wireless LANs is costly and it is difficult to implement and maintain the same.
  • 12. The use of wireless LANs is growing rapidly as new high speed technologies are implemented, which is used in increasing number of business, public and home environment. ConclusionConclusion