SlideShare a Scribd company logo
1 of 12
General Motors Corporation
The Business Value
of Wireless LANs
New Shores International College
Global BBM 2012-15
India
Presented to: Prof. SANDHYA
Auto makers started installing wireless links in the mid-1990s, using
proprietary methods until the Wi-Fi international wireless LAN standard
appeared in 2001.
Wireless LANs as a mission critical infrastructure for its manufacturing
operations.
They initially use the massive in-plant wireless LAN infrastructure to
track materials and replenish parts at stations on its assembly lines.
They support wide range of application, which include access to
computer-aided design drawings and plant configuration information.
SUMMARY
It provides you with agility and flexibility that did not exist before.
GM has already equipped 75 to 100 forklift trucks with wireless
terminals in each plant.
When workers need to replenish parts for their station, they press a
button using the wireless.
They are also concerned with the network security.
Their biggest strategic weapon may be its involvement with standards
bodies and vendors to see that standardized security methods are
quickly incorporated into wireless gear.
1) What is the business value of wireless
LANs to GM ?
There are several advantages to GM by adopting the
wireless LANs. It helps GM in reducing costs and also
helps to recoup its investment quickly .
Some of the advantages of wireless LANs to GM :
 Wireless LANs helps in tracking materials replenish
parts at stations on its assembly line.
QUESTIONS & ANSWERS
 It can also support wide range of other applications,
which includes access to computer-aided design
drawings and plant configuration information, which
can also be called “virtual factory” database.
 It also bring change in ability to send and receive
information to and from workers and system in
manufacturing .
 GM faced real problem with locating parts, but with
wireless LAN facility the parts can be located easily
with wireless LAN based material management system
which helps in reducing manufacturing costs.
 Wireless LAN helps GM workers who are in need to
replenish parts, can press a button on wireless
pendent at their workstation, the request is displayed
on a screen in forklift, showing location of worker and
materials required. This helps in minimizing the time
and manufacturing work can be done efficiently.
2) What is the security vulnerabilities of
wireless LANs? Is GM taking
appropriate security measures? why
or why not?
The security vulnerabilities of wireless LANs is
hackers. GM is concerned about hackers, who can
hack systems through wireless transmission.
GM has adopted some approaches to overcome this
problem. GM segments its network with firewalls
and virtual private networks and they do detailed
site survey that look at all radio interference
sources. It also relies on good security software.
3) What are some other possible business
applications of wireless LANs?
Evaluate the benefits and challenges
of one of them to a large or small
business.
some other possible business applications of
wireless LANs are :
 Wireless LANs can also be used in corporate offices
and business firms.
 Automatic request of materials.
 Some companies are launching wireless LANs
accessible mobile phones and other hand held devices
like PDAs etc..
 Scalability.
Benefits
1. It is faster and less expensive than other common
wire based LAN technologies.
2. The Wi-Fi or LANs enable laptop or PCs can connect
easily to internet and other networks.
3. It helps to minimize the wiring cost in office which
is very difficult and costly task.
4. It helps in eliminating the mistakes and damages of
repairing wires.
Challenges :
The main challenges of wireless LANs is from hackers.
They can hack into systems through wireless
transmission.
But this problem can be solved through security systems,
by relaying on good security software.
The installation charges of wireless LANs is costly and it
is
difficult to implement and maintain the same.
The use of wireless LANs is growing rapidly as
new high speed technologies are implemented,
which is used in increasing number of
business, public and home environment.
ConclusionConclusion

More Related Content

What's hot

Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Carotek
 
Wide Area Network for Govt. of Delhi
Wide Area Network for Govt. of Delhi Wide Area Network for Govt. of Delhi
Wide Area Network for Govt. of Delhi Videoguy
 
Building the Anytime, Anywhere Network
Building the Anytime, Anywhere NetworkBuilding the Anytime, Anywhere Network
Building the Anytime, Anywhere NetworkJuniper Networks
 
A design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeA design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeIMPULSE_TECHNOLOGY
 
Mobile computing
Mobile computingMobile computing
Mobile computingLi Zhao
 

What's hot (11)

Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...
 
Wide Area Network for Govt. of Delhi
Wide Area Network for Govt. of Delhi Wide Area Network for Govt. of Delhi
Wide Area Network for Govt. of Delhi
 
Building the Anytime, Anywhere Network
Building the Anytime, Anywhere NetworkBuilding the Anytime, Anywhere Network
Building the Anytime, Anywhere Network
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
A design for wireless access control system based on zig bee
A design for wireless access control system based on zig beeA design for wireless access control system based on zig bee
A design for wireless access control system based on zig bee
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Wireless Applications
Wireless ApplicationsWireless Applications
Wireless Applications
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Presentation1
Presentation1Presentation1
Presentation1
 
M2M communications
M2M communicationsM2M communications
M2M communications
 

Viewers also liked

Viewers also liked (6)

new shores international college bangalore - New shores College
new shores international college bangalore - New shores Collegenew shores international college bangalore - New shores College
new shores international college bangalore - New shores College
 
Question 4(kelly)
Question 4(kelly)Question 4(kelly)
Question 4(kelly)
 
Question 2
Question 2Question 2
Question 2
 
Q2 powerpoint
Q2 powerpointQ2 powerpoint
Q2 powerpoint
 
Ecocarga iranzu ana
Ecocarga iranzu anaEcocarga iranzu ana
Ecocarga iranzu ana
 
Navarre
NavarreNavarre
Navarre
 

Similar to New shores college bangalore - New shores

SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewBryan Kester
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfBoney Maundu Slim
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Ericsson
 
Bhadale group of companies telecom industry products catalogue
Bhadale group of companies telecom industry products catalogueBhadale group of companies telecom industry products catalogue
Bhadale group of companies telecom industry products catalogueVijayananda Mohire
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 
(1) itt capabilities 2013
(1) itt capabilities 2013(1) itt capabilities 2013
(1) itt capabilities 2013ErichDang
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfAnil
 
5 g network-slicing-report
5 g network-slicing-report5 g network-slicing-report
5 g network-slicing-reportermnas2482
 
HSDPA bundled Solution
HSDPA bundled SolutionHSDPA bundled Solution
HSDPA bundled SolutionJojo Marquez
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecurity Gen
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...SecurityGen1
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
 

Similar to New shores college bangalore - New shores (20)

SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M Overview
 
Case study of wireless networking for small business
Case study of wireless networking for small businessCase study of wireless networking for small business
Case study of wireless networking for small business
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network”
 
Bhadale group of companies telecom industry products catalogue
Bhadale group of companies telecom industry products catalogueBhadale group of companies telecom industry products catalogue
Bhadale group of companies telecom industry products catalogue
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
(1) itt capabilities 2013
(1) itt capabilities 2013(1) itt capabilities 2013
(1) itt capabilities 2013
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
5 g network-slicing-report
5 g network-slicing-report5 g network-slicing-report
5 g network-slicing-report
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
HSDPA bundled Solution
HSDPA bundled SolutionHSDPA bundled Solution
HSDPA bundled Solution
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Securing Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
 
MIMIC Simulator Network Simulator
MIMIC Simulator Network SimulatorMIMIC Simulator Network Simulator
MIMIC Simulator Network Simulator
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
 

More from new shores

Newshores bangalore international college - New shores college.
Newshores bangalore international college - New shores college. Newshores bangalore international college - New shores college.
Newshores bangalore international college - New shores college. new shores
 
New shores college - New shores international College.
New shores college - New shores international College. New shores college - New shores international College.
New shores college - New shores international College. new shores
 
Newshores international college - New shores Bangalore
Newshores international college - New shores BangaloreNewshores international college - New shores Bangalore
Newshores international college - New shores Bangalorenew shores
 
New shores international college - New shores Bangalore
New shores international college - New shores BangaloreNew shores international college - New shores Bangalore
New shores international college - New shores Bangalorenew shores
 
New shores International College - New shores Model un
New shores International College - New shores Model unNew shores International College - New shores Model un
New shores International College - New shores Model unnew shores
 
New shores international College, Bangalore - The business value of wireless
New shores international College, Bangalore - The business value of wirelessNew shores international College, Bangalore - The business value of wireless
New shores international College, Bangalore - The business value of wirelessnew shores
 
About new shores
About new shoresAbout new shores
About new shoresnew shores
 

More from new shores (7)

Newshores bangalore international college - New shores college.
Newshores bangalore international college - New shores college. Newshores bangalore international college - New shores college.
Newshores bangalore international college - New shores college.
 
New shores college - New shores international College.
New shores college - New shores international College. New shores college - New shores international College.
New shores college - New shores international College.
 
Newshores international college - New shores Bangalore
Newshores international college - New shores BangaloreNewshores international college - New shores Bangalore
Newshores international college - New shores Bangalore
 
New shores international college - New shores Bangalore
New shores international college - New shores BangaloreNew shores international college - New shores Bangalore
New shores international college - New shores Bangalore
 
New shores International College - New shores Model un
New shores International College - New shores Model unNew shores International College - New shores Model un
New shores International College - New shores Model un
 
New shores international College, Bangalore - The business value of wireless
New shores international College, Bangalore - The business value of wirelessNew shores international College, Bangalore - The business value of wireless
New shores international College, Bangalore - The business value of wireless
 
About new shores
About new shoresAbout new shores
About new shores
 

Recently uploaded

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

New shores college bangalore - New shores

  • 1. General Motors Corporation The Business Value of Wireless LANs
  • 2. New Shores International College Global BBM 2012-15 India Presented to: Prof. SANDHYA
  • 3. Auto makers started installing wireless links in the mid-1990s, using proprietary methods until the Wi-Fi international wireless LAN standard appeared in 2001. Wireless LANs as a mission critical infrastructure for its manufacturing operations. They initially use the massive in-plant wireless LAN infrastructure to track materials and replenish parts at stations on its assembly lines. They support wide range of application, which include access to computer-aided design drawings and plant configuration information. SUMMARY
  • 4. It provides you with agility and flexibility that did not exist before. GM has already equipped 75 to 100 forklift trucks with wireless terminals in each plant. When workers need to replenish parts for their station, they press a button using the wireless. They are also concerned with the network security. Their biggest strategic weapon may be its involvement with standards bodies and vendors to see that standardized security methods are quickly incorporated into wireless gear.
  • 5. 1) What is the business value of wireless LANs to GM ? There are several advantages to GM by adopting the wireless LANs. It helps GM in reducing costs and also helps to recoup its investment quickly . Some of the advantages of wireless LANs to GM :  Wireless LANs helps in tracking materials replenish parts at stations on its assembly line. QUESTIONS & ANSWERS
  • 6.  It can also support wide range of other applications, which includes access to computer-aided design drawings and plant configuration information, which can also be called “virtual factory” database.  It also bring change in ability to send and receive information to and from workers and system in manufacturing .  GM faced real problem with locating parts, but with wireless LAN facility the parts can be located easily with wireless LAN based material management system which helps in reducing manufacturing costs.
  • 7.  Wireless LAN helps GM workers who are in need to replenish parts, can press a button on wireless pendent at their workstation, the request is displayed on a screen in forklift, showing location of worker and materials required. This helps in minimizing the time and manufacturing work can be done efficiently.
  • 8. 2) What is the security vulnerabilities of wireless LANs? Is GM taking appropriate security measures? why or why not? The security vulnerabilities of wireless LANs is hackers. GM is concerned about hackers, who can hack systems through wireless transmission. GM has adopted some approaches to overcome this problem. GM segments its network with firewalls and virtual private networks and they do detailed site survey that look at all radio interference sources. It also relies on good security software.
  • 9. 3) What are some other possible business applications of wireless LANs? Evaluate the benefits and challenges of one of them to a large or small business. some other possible business applications of wireless LANs are :  Wireless LANs can also be used in corporate offices and business firms.  Automatic request of materials.  Some companies are launching wireless LANs accessible mobile phones and other hand held devices like PDAs etc..  Scalability.
  • 10. Benefits 1. It is faster and less expensive than other common wire based LAN technologies. 2. The Wi-Fi or LANs enable laptop or PCs can connect easily to internet and other networks. 3. It helps to minimize the wiring cost in office which is very difficult and costly task. 4. It helps in eliminating the mistakes and damages of repairing wires.
  • 11. Challenges : The main challenges of wireless LANs is from hackers. They can hack into systems through wireless transmission. But this problem can be solved through security systems, by relaying on good security software. The installation charges of wireless LANs is costly and it is difficult to implement and maintain the same.
  • 12. The use of wireless LANs is growing rapidly as new high speed technologies are implemented, which is used in increasing number of business, public and home environment. ConclusionConclusion