SlideShare a Scribd company logo
Chapter 5: Networking and
Communication
Learning Objectives
Upon successful completion of this chapter, you will be
able to:
• understand the history and development of
networking technologies;
• define the key terms associated with networking
technologies;
• understand the importance of broadband
technologies; and
• describe organizational networking.
Introduction
In the early days of computing, computers were seen as devices
for making calculations, storing data, and automating business
processes. However, as the devices evolved, it became apparent
that
many of the functions of telecommunications could be
integrated
into the computer. During the 1980s, many organizations began
Chapter 5: Networking and
Communication | 99
combining their once-separate telecommunications and
information systems departments into an Information
Technology
(IT) department. This ability for computers to communicate
with
one another and to facilitate communication between
individuals
and groups has had a major impact on the growth of computing
over
the past several decades.
Computer networking began in the 1960s with the birth of the
Internet. However, while the Internet and web were evolving,
corporate networking was also taking shape in the form of local
area networks and client-server computing. The Internet went
commercial in 1994 as technologies began to pervade all areas
of the
organization. Today it would be unthinkable to have a computer
that
did not include communications capabilities. This chapter
reviews
the different technologies that have been put in place to enable
this
communications revolution.
A Brief History of the Internet
In the Beginning: ARPANET
The story of the Internet, and networking in general, can be
traced
back to the late 1950s. The United States was in the depths of
the
Cold War with the USSR as each nation closely watched the
other
to determine which would gain a military or intelligence
advantage.
In 1957, the Soviets surprised the U.S. with the launch of
Sputnik,
propelling us into the space age. In response to Sputnik, the
U.S.
Government created the Advanced Research Projects Agency
(ARPA), whose initial role was to ensure that the U.S. was not
surprised again. It was from ARPA, now called DARPA
((Defense Advanced Research Projects Agency), that the
Internet
first sprang.
100 | Information Systems for Business and Beyond (2019)
http://history.nasa.gov/sputnik
ARPA was the center of computing research in the 1960s, but
there was just one problem. Many of the computers could not
communicate with each other. In 1968 ARPA sent out a request
for proposals for a communication technology that would allow
different computers located around the country to be integrated
together into one network. Twelve companies responded to the
request, and a company named Bolt, Beranek, and Newman
(BBN)
won the contract. They immediately began work and were able
to
complete the job just one year later.
ARPA Net 1969
Professor Len Kleinrock of UCLA along with a group of
graduate
students were the first to successfully send a transmission over
the ARPANET. The event occurred on October 29, 1969 when
they
attempted to send the word “login” from their computer at
UCLA to
the Stanford Research Institute. You can read their actual notes.
The
first four nodes were at UCLA, University of California,
Stanford,
and the University of Utah.
Chapter 5: Networking and Communication | 101
https://www.lk.cs.ucla.edu/internet_first_words.html
The Internet and the World Wide Web
Over the next decade, the ARPANET grew and gained
popularity.
During this time, other networks also came into existence.
Different
organizations were connected to different networks. This led to
a
problem. The networks could not communicate with each other.
Each network used its own proprietary language, or protocol
(see
sidebar for the definition of protocol) to send information back
and
forth. This problem was solved by the invention of
Transmission
Control Protocol/Internet Protocol (TCP/IP). TCP/IP was
designed
to allow networks running on different protocols to have an
intermediary protocol that would allow them to communicate.
So
as long as your network supported TCP/IP, you could
communicate
with all of the other networks running TCP/IP. TCP/IP quickly
became the standard protocol and allowed networks to
communicate with each other. It is from this breakthrough that
we
first got the term Internet, which simply means “an
interconnected
network of networks.”
Sidebar: An Internet Vocabulary Lesson
Network communication is full of some very technical concepts
based on simple principles. Learn the following terms and
you’ll be
able to hold your own in a conversation about the Internet.
• Packet The fundamental unit of data transmitted over the
Internet. When a host (PC, workstation, server, printer, etc.)
intends to send a message to another host (for example, your
PC sends a request to YouTube to open a video), it breaks the
message down into smaller pieces, called packets. Each packet
has the sender’s address, the destination address, a sequence
102 | Information Systems for Business and Beyond (2019)
number, and a piece of the overall message to be sent.
Different packets in a single message can take a variety of
routes to the destination and they can arrive at different times.
For this reason the sequence number is used to reassemble the
packets in the proper order at the destination.
• Switch A network device that connects multiple hosts together
and forwards packets based on their destination within the
local network which is commonly known as a Local Area
Network (LAN).
• Router A device that receives and analyzes packets and then
routes them towards their destination. In some cases a router
will send a packet to another router. In other cases it will send
it directly to its destination. Routers are used to connect one
network to another network.
• IP Address Every device on the Internet (personal computer, a
tablet, a smartphone, etc.) is assigned a unique identifying
number called an IP (Internet Protocol) address. Originally, the
IPv4 (version 4) standard was used. It had a format of four
numbers with values ranging from 0 and 255 separated by a
period. For example, the domain Dell.com has the IPv4 address
107.23.196.166. The IPv4 standard has a limit of 4,294,967,296
possible addresses. As the use of the Internet has grown, the
number of IP addresses needed has increased to the point
where the use of IPv4 addresses will be exhausted. This has led
to the new IPv6 standard.The IPv6 standard is formatted as
eight groups of four hexadecimal digits, such as
2001:0db8:85a3:0042:1000:8a2e:0370:7334. The IPv6 standard
has a limit of 3.4×1038 possible addresses. For example, the
domain LinkedIn.com has an IPv6 address of:
[2620:109:c002::6cae:a0a]. You probably noticed that the
address has only five groups of numbers. That’s because IPv6
allows the use of two semi-colons ( :: ) to indicate groups that
are all zeroes and do not need to be displayed. For more detail
about the IPv6 standard, see this Wikipedia article.
• Domain name If you had to try to remember the IP address of
Chapter 5: Networking and Communication | 103
https://en.wikipedia.org/wiki/IPv6
every web site you wanted to access, the Internet would not be
nearly as easy to use. A domain name is a human-friendly
name, convenient for remembering a website. These names
generally consist of a descriptive word followed by a dot
(period) and the Top-Level Domain (TLD). For example,
Wikipedia’s domain name is wikipedia.org. Wikipedia describes
the organization and .org is the TLD. Other well-known TLDs
include .com, .net, and .gov. For a list and description of top
level domain names, see this Wikipedia article.
• DNS DNS stands for “domain name server or system.” DNS
acts
as the directory of websites on the Internet. When a request to
access a host with a domain name is given, a DNS server is
queried. It returns the IP address of the host requested,
allowing for proper routing.
• Packet-switching When a message’s packets are sent on the
Internet, routers try to find the optimal route for each packet.
This can result in packets being sent on different routes to
their destination. After the packets arrive they are re-
assembled into the original message for the recipient. For
more details on packet-switching, see this interactive web
page.
• Protocol A protocol is the set of rules that govern how
communications take place on a network. For example, File
Transfer Protocol (FTP) are the communication rules for
transferring files from one host to another. TCP/IP, discussed
earlier, is known as a protocol suite since it contains numerous
protocols.
104 | Information Systems for Business and Beyond (2019)
https://en.wikipedia.org/wiki/List_of_Internet_top-
level_domains
http://www.pbs.org/opb/nerds2.0.1/geek_glossary/packet_switch
ing_flash.html
http://www.pbs.org/opb/nerds2.0.1/geek_glossary/packet_switch
ing_flash.html
Internet Users Worldwide, December 2017.
(Public Domain. Courtesy of the Miniwatts Marketing Group)
The 1980s witnessed a significant growth in Internet
usage. Internet access came primarily from government,
academic,
and research organizations. Much to the surprise of the
engineers,
the early popularity of the Internet was driven by the use of
electronic mail (see the next sidebar ).
Initially, Internet use meant having to type commands, even
including IP addresses, in order to access a web server. That all
changed in 1990 when Tim Berners-Lee introduced his World
Wide
Web project which provided an easy way to navigate the
Internet
through the use of hypertext. The World Wide Web gained even
more steam in 1993 with the release of the Mosaic browser
which
allowed graphics and text to be combined as a way to present
information and navigate the Internet.
The Dot-Com Bubble
In the 1980s and early 1990s, the Internet was being managed
by
the National Science Foundation (NSF). The NSF had restricted
commercial ventures on the Internet, which meant that no one
could buy or sell anything online. In 1991, the NSF transferred
its
role to three other organizations, thus getting the US
government
out of direct control over the Internet and essentially opening
up
commerce online.
This new commercialization of the Internet led to what is now
known as the dot-com bubble. A frenzy of investment in new
dot-
Chapter 5: Networking and Communication | 105
https://www.internetworldstats.com/stats.htm
https://www.internetworldstats.com/stats.htm
com companies took place in the late 1990s with new tech
companies issuing Initial Public Offerings (IPO) and heating up
the
stock market. This investment bubble was driven by the fact
that
investors knew that online commerce would change everything.
Unfortunately, many of these new companies had poor business
models and anemic financial statements showing little or no
profit.
In 2000 and 2001, the bubble burst and many of these new
companies went out of business. Some companies survived,
including Amazon (started in 1994) and eBay (1995). After the
dot-
com bubble burst, a new reality became clear. In order to
succeed
online, e-business companies would need to develop business
models appropriate for the online environment.
Web 2.0
In the first few years of the World Wide Web, creating and
hosting a
website required a specific set of knowledge. A person had to
know
how to set up a web server, get a domain name, create web
pages in
HTML, and troubleshoot various technical issues.
Starting in the early 2000s, major changes came about in how
the
Internet was being used. These changes have come to be known
as
Web 2.0. Here are some key characteristics in Web 2.0.
• Universal access to Apps
• Value is found in content, not display software
• Data can be easily shared
• Distribution is bottom up, not top down
• Employees and customers can use access and use tools on
their own
• Informal networking is encouraged since more contributors
results in better content
• Social tools encourage people to share information
1
106 | Information Systems for Business and Beyond (2019)
Social networking, the last item in the list, has led to major
changes in society. Prior to Web 2.0 major news outlets
investigated
and reported important news stories of the day. But in today’s
world
individuals are able to easily share their own views on various
events. Apps such as Facebook, Twitter, Youtube, and personal
blogs
allow people to express their own viewpoint.
Sidebar: E-mail Is the “Killer” App for the
Internet
As discussed in chapter 3, a “killer app” is a use of a device
that
becomes so essential that large numbers of people will buy the
device just to run that application. The killer app for the
personal
computer was the spreadsheet, enabling users to enter data,
write
formulas, and easily make “what if” decisions. With the
introduction
of the Internet came another killer app – E-mail.
The Internet was originally designed as a way for the
Department
of Defense to manage projects. However, the invention of
electronic
mail drove demand for the Internet. While this wasn’t what
developers had in mind, it turned out that people connecting
with
people was the killer app for the Internet. As we look back
today, we
can see this being repeated again and again with new
technologies
that enable people to connect with each other.
Sidebar: The Internet and the World Wide Web
1. [1]
Chapter 5: Networking and Communication | 107
Are Not the Same Thing
Many times the terms “Internet” and “World Wide Web,” or
even
just “the web,” are used interchangeably. But really, they are
not the
same thing.
The Internet is an interconnected network of networks. Services
such as email, voice and video, file transfer, and the World
Wide
Web all run across the Internet.The World Wide Web is simply
one
part of the Internet. It is made up of web servers that have
HTML
pages that are being viewed on devices with web browsers.
The Growth of High Speed Internet
In the early days of the Internet, most access was accomplished
via
a modem over an analog telephone line. A modem was
connected
to the incoming phone line when then connected to a computer.
Speeds were measured in bits-per-second (bps), with speeds
growing from 1200 bps to 56,000 bps over the years.
Connection to
the Internet via modems is called dial-up access. As the web
became
more interactive, dial-up hindered usage when users wanted to
transfer more and more data. As a point of reference,
downloading
a typical 3.5 MB song would take 24 minutes at 1200 bps and 2
minutes at 28,800 bps.
High speed Internet speeds, by definition, are a minimum of
256,000 bps, though most connections today are much faster,
measured in millions of bits per second (megabits or Mbps) or
even
billions (gigabits). For the home user, a high speed connection
is
usually accomplished via the cable television lines or phone
lines
using a Digital Subscriber Line (DSL). Both cable and DSL
have
similar prices and speeds, though price and speed can vary in
local
communities. According to the website Recode, the average
home
108 | Information Systems for Business and Beyond (2019)
broadband speed ranges from 12 Mbps and 125 Mbps.2
Telecommunications companies provide T1 and T3 lines for
greater
bandwidth and reliability.
High speed access, also known as broadband, is important
because it impacts how the Internet is used. Communities with
high speed Internet have found residences and businesses
increase
usage of digital resources. Access to high speed Internet is now
considered a basic human right by the United Nations, as
declared
in their 2011 statement:
“Broadband technologies are fundamentally transforming the
way
we live,” the Broadband Commission for Digital Development,
set up
in 2017 by the UN Educational Scientific and Cultural
Organization
(UNESCO) and the UN International Telecommunications
Union
(ITU), said in issuing “The Broadband Challenge” at a
leadership
summit in Geneva.
“It is vital that no one be excluded from the new global
knowledge
societies we are building. We believe that communication is not
just
a human need – it is a right.”3
Wireless Networking
Thanks to wireless technology, access to the Internet is virtually
everywhere, especially through a smartphone.
Wi-Fi
Wi-Fi takes an Internet signal and converts it into radio waves.
2. [2]
3. [3]
Chapter 5: Networking and Communication | 109
http://www.un.org/apps/news/story.asp?Cr=broadband&NewsID
=40191#.UZlTSyvSOPU
http://www.un.org/apps/news/story.asp?Cr=broadband&NewsID
=40191#.UZlTSyvSOPU
http://www.unesco.org/new/en/unesco
http://www.itu.int/
http://www.broadbandcommission.org/Documents/Broadband_C
hallenge.pdf
These radio waves can be picked up within a radius of
approximately 65 feet by devices with a wireless adapter.
Several
Wi-Fi specifications have been developed over the years,
starting
with 802.11b in 1999, followed by the 802.11g specification in
2003
and 802.11n in 2009. Each new specification improved the
speed and
range of Wi-Fi, allowing for more uses. One of the primary
places
where Wi-Fi is being used is in the home. Home users access
Wi-Fi
via in-home routers provided by the telecommunications firm
that
services the residence.
Mobile Network
As the cellphone has evolved into the smartphone, the desire for
Internet access on these devices has led to data networks being
included as part of the mobile phone network. While Internet
connections were technically available earlier, it was really with
the release of the 3G networks in 2001 (2002 in the US) that
smartphones and other cellular devices could access data from
the
Internet. This new capability drove the market for new and more
powerful smartphones, such as the iPhone, introduced in 2007.
In
2011, wireless carriers began offering 4G data speeds, giving
the
cellular networks the same speeds that customers were
accustomed
to getting via their home connection.
Beginning in 2019, some part of the world began seeing the
implementation of 5G communication networks. Speeds
associated
with 5G will be greater than 1 GB/second, providing connection
speeds to handle just about any type of application. Some have
speculated that the 5G implementation will lead households to
eliminate the purchase of wired Internet connections for their
homes, just using 5G wireless connections instead.
110 | Information Systems for Business and Beyond (2019)
3G, 4G, and 5G Comparison
3G 4G 5G
Deployed 2004-2005 2006-2010 By 2020
Bandwidth 2 mbps 200 mbps > 1 gbps,
Service
Integrated
high-quality
audio, video
and data
Dynamic
information
access, variable
devices
Dynamic information
access, variable devices
with all capabilities
(James Dean, Raconteur, December 7, 2014)
4
Sidebar: Why Doesn’t My Cellphone Work When
I Travel Abroad?
As mobile phone technologies have evolved, providers in
different
countries have chosen different communication standards for
their
mobile phone networks. There are two competing standards in
the
US: GSM (used by AT&T and T-Mobile) and CDMA (used by
the
other major carriers). Each standard has its pros and cons, but
the bottom line is that phones using one standard cannot easily
switch to the other. This is not a big deal in the US because
mobile
networks exist to support both standards. But when traveling to
other countries, you will find that most of them use GSM
networks.
The one exception is Japan which has standardized on CDMA.
It is
possible for a mobile phone using one type of network to switch
to the other type of network by changing out the SIM card,
which
controls your access to the mobile network. However, this will
not
4. [4]
Chapter 5: Networking and Communication | 111
work in all cases. If you are traveling abroad, it is always best
to
consult with your mobile provider to determine the best way to
access a mobile network.
Bluetooth
While Bluetooth is not generally used to connect a device to the
Internet, it is an important wireless technology that has enabled
many functionalities that are used every day. When created in
1994
by Ericsson, it was intended to replace wired connections
between
devices. Today, it is the standard method for wirelessly
connecting
nearby devices. Bluetooth has a range of approximately 300 feet
and consumes very little power, making it an excellent choice
for
a variety of purposes. Some applications of Bluetooth include:
connecting a printer to a personal computer, connecting a
mobile
phone and headset, connecting a wireless keyboard and mouse
to a
computer, or connecting your mobile phone to your car,
resulting in
hands free operation of your phone.
112 | Information Systems for Business and Beyond (2019)
Typical VoIP
communicati
on
VoIP
Voice over IP (VoIP) allows analog signals to be converted to
digital
signals, then transmitted on a network. By using existing
technologies and software, voice communication over the
Internet
is now available to anyone with a browser (think Skype,
WebEx,
Google Hangouts). Beyond this, many companies are now
offering
VoIP-based telephone service for business and home use.
Chapter 5: Networking and Communication | 113
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/volp.png
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/volp.png
Organizational Networking
LAN and WAN
Scope of business networks
While the Internet was evolving and creating a way for
organizations to connect to each other and the world, another
revolution was taking place inside organizations. The
proliferation
of personal computers led to the need to share resources such
as printers, scanners, and data. Organizations solved this
problem
through the creation of local area networks (LANs), which
allowed
computers to connect to each other and to peripherals.
A LAN is a local network, usually operating in the same
building
or on the same campus. A Wide Area Network (WAN) provides
connectivity over a wider area such as an organization’s
locations in
different cities or states.
114 | Information Systems for Business and Beyond (2019)
Client-Server
Client-server computing provides stand-alone devices such as
personal computers, printers, and file servers to work together.
The
personal computer originally was used as a stand-alone
computing
device. A program was installed on the computer and then used
to
do word processing or calculations. With the advent of
networking
and local area networks, computers could work together to solve
problems. Higher-end computers were installed as servers, and
users on the local network could run applications and share
information among departments and organizations.
Intranet
An intranet, as the name implies, provides web-based resources
for the users within an organization. These web pages are not
accessible to those outside the company. The pages typically
contain information useful to employees such as policies and
procedures. In an academic setting the intranet provides an
interface to learning resources for students.
Extranet
Sometimes an organization wants to be able to collaborate with
its customers or suppliers while at the same time maintaining
the
security of being inside its own network. In cases like this a
company may want to create an extranet, which is a part of a
company’s network that can be made available securely to those
outside of the company. Extranets can be used to allow
customers
to log in and place orders, or for suppliers to check their
customers’
inventory levels.
Chapter 5: Networking and Communication | 115
Sometimes an organization will need to allow someone who is
not
located physically within its internal network to gain secure
access
to the intranet. This access can be provided by a virtual private
network (VPN). VPNs will be discussed further in Chapter 6
which
focuses on Information Security).
Sidebar: Microsoft’s SharePoint Powers the
Intranet
As organizations begin to see the power of collaboration
between
their employees, they often look for solutions that will allow
them
to leverage their intranet to enable more collaboration. Since
most
companies use Microsoft products for much of their computing,
some are using Microsoft’s SharePoint to support employee
collaboration.
SharePoint provides a communication and collaboration
platform
that integrates seamlessly with Microsoft’s Office suite of
applications. Using SharePoint, employees can share a
document
and edit it together, avoiding the need to email the document for
others to review. Projects and documents can be managed
collaboratively across the organization. Corporate documents
are
indexed and made available for search.
Cloud Computing
Cloud computing was covered in Chapter 3. The universal
availability of the Internet combined with increases in
processing
116 | Information Systems for Business and Beyond (2019)
power and data-storage capacity have made cloud computing a
viable option for many companies. Using cloud computing,
companies or individuals can contract to store data on storage
devices somewhere on the Internet. Applications can be
“rented”
as needed, giving a company the ability to quickly deploy new
applications. The I.T. department benefits from not having to
maintain software that is provided on the cloud.
Sidebar: Metcalfe’s Law
Just as Moore’s Law describes how computing power is
increasing
over time, Metcalfe’s Law describes the power of networking.
Metcalfe’s Law states that the value of a telecommunications
network is proportional to the square of the number of
connected
users of the system, or N2. If a network has 10 nodes, the
inherent
value is 100, or 102.
Metcalfe’s Law is attributed to Robert Metcalfe, the co-inventor
of
Ethernet. It attempts to address the added value provided by
each
node on the network. Think about it this way: If none of your
friends
were on Instagram, would you spend much time there? If no one
else at your school or place of work had e-mail, would it be
very
useful to you? Metcalfe’s Law tries to quantify this value.
Summary
The networking revolution has completely changed how
personal
computers are used. Today, no one would imagine using a
computer
that was not connected to one or more networks. The
development
Chapter 5: Networking and Communication | 117
of the Internet and World Wide Web, combined with wireless
access, has made information available at our fingertips. The
Web
2.0 revolution has made everyone potential authors of web
content.
As networking technology has matured, the use of Internet
technologies has become a standard for every type of
organization.
The use of intranets and extranets has allowed organizations to
deploy functionality to employees and business partners alike,
increasing efficiencies and improving communications. Cloud
computing has truly made information available everywhere.
Study Questions
1. What were the first four locations hooked up to the Internet
(ARPANET)?
2. What does the term packet mean?
3. Which came first, the Internet or the World Wide Web?
4. What was revolutionary about Web 2.0?
5. What was the so-called killer app for the Internet?
6. What does the term VoIP mean?
7. What is a LAN?
8. What is the difference between an intranet and an extranet?
9. What is Metcalfe’s Law?
Exercises
1. What is the difference between the Internet and the World
Wide Web? Create at least three statements that identify the
differences between the two.
2. Who are the broadband providers in your area? What are the
118 | Information Systems for Business and Beyond (2019)
prices and speeds offered?
3. Pretend you are planning a trip to three foreign countries in
the next month. Consult your wireless carrier to determine if
your mobile phone would work properly in those countries.
What would the costs be? What alternatives do you have if it
would not work?
Labs
1. Check the speed of your Internet connection by going to the
following web site: speedtest.net
What is your download and upload speed?
2. What is the IP address of your computer? How did you find
it?
Hint for Windows: Go to the start icon and click Run. Then
open the Command Line Interface by typing: cmd Then type:
ipconfigWhat is your IPv4 address?What is your IPv6 address?
3. When you enter an address in your web browser, a Domain
Name Server (DNS) is used to lookup the IP address of the site
you are seeking. To locate the DNS server …
6 3
4
oRg aniz aTional le aRning
TheoRies anD TeChnology
Introduction
The purpose of this chapter is to provide readers with an under-
standing of organizational theory. The chapter covers some
aspects
of the history and context of organizational learning. It also
defines
and explains various learning protocols, and how they can be
used to
promote organizational learning. The overall objective of
organiza-
tional learning is to support a process that guides individuals,
groups,
and entire communities through transformation. Indeed,
evidence of
organizational transformation provides the very proof that
learning
has occurred, and that changes in behavior are occurring. What
is
important in this regard is that transformation remains internal
to
the organization so that it can evolve in a progressive manner
while
maintaining the valuable knowledge base that is contained
within
the personnel of an organization. Thus, the purpose of organiza-
tional learning is to foster evolutionary transformation that will
lead
to change in behaviors and that is geared toward improving
strategic
performance.
Approaches to organizational learning typically address how
indi-
viduals, groups, and organizations “notice and interpret
information
and use it to alter their fit with their environments” (Aldrich,
2001,
p. 57). As such, however, organizational learning does not
direct itself
toward, and therefore has not been able to show, an inherent
link to
success—which is a critical concern for executive management.
There
are two perspectives on organizational learning theory. On the
one
hand, the adoptive approach, pioneered by Cyert and March
(1963),
treats organizations as goal-oriented activity systems. These
systems
generate learning when repeating experiences that have either
suc-
ceeded or failed, discarding, of course, processes that have
failed.
6 4 INFORMATION TECHNOLO GY
Knowledge development, on the other hand, treats organizations
as
sets of interdependent members with shared patterns of
cognition and
belief (Argyris & Schö n, 1996). Knowledge development
empha-
sizes that learning is not limited to simple trial and error, or
direct
experience. Instead, learning is understood also to be inferential
and
vicarious; organizations can generate new knowledge through
experi-
mentation and creativity. It is the knowledge development
perspec-
tive that fits conceptually and empirically with work on
technological
evolution and organizational knowledge creation and
deployment
(Tushman & Anderson, 1986).
There is a complication in the field of organizational learning
over
whether it is a technical or social process. Scholars disagree on
this
point. From the technical perspective, organizational learning is
about the effective processing of, interpretation of, and
response to
information both inside and outside the organization. “An
organiza-
tion is assumed to learn if any of its units acquires knowledge
that it
recognizes as potentially useful to the organization” (Huber,
1991,
p. 89). From the social perspective, on the other hand, comes
the con-
cept that learning is “something that takes place not with the
heads of
individuals, but in the interaction between people” (Easterby-
Smith
et al., 1999, p. 6). The social approach draws from the notion
that
patterns of behavior are developed, via patterns of socialization,
by
evolving tacit knowledge and skills. There is, regrettably, a lack
of
ongoing empirical investigation in the area of organizational
learning
pertaining, for example, to in-depth case studies, to
micropractices
within organizational settings, and to processes that lead to
outcomes.
Indeed, measuring learning is a difficult process, which is why
there
is a lack of research that focuses on outputs. As Prange (1999,
p. 24)
notes: “The multitude of ways in which organizational learning
has
been classified and used purports an ‘organizational learning
jungle,’
which is becoming progressively dense and impenetrable.”
Mackenzie
(1994, p. 251) laments that what the “scientific community
devoted
to organizational learning has not produced discernable
intellectual
progress.”
Ultimately, organizational learning must provide transformation
that links to performance. Most organizations seeking improved
per-
formance expect changes that will support new outcomes. The
study of
organizational learning needs an overarching framework under
which
6 5orGAnIz AtIonAl le ArnInG theorIes
an inquiry into the pivotal issues surrounding organizational
change
can be organized. Frameworks that support organizational
learning,
whether their orientation is on individuals, groups, or
infrastructure,
need to allow for natural evolution within acceptable time
frames for
the organization. This is the problem of organizational learning
the-
ory. It lacks a method of producing measurable results that
executives
can link to performance. While scholars seek outcomes through
stra-
tegic learning, there must be tangible evidence of individual and
orga-
nizational performance to ensure future investments in the
concepts
of learning. Technology, we should remember, represents the
oppor-
tunity to provide outcomes through strategic learning that
addresses
transitions and transformations over a specific life cycle.
We saw this opportunity occur in the Ravell case study; the
information technology (IT) department used organizational
learn-
ing. Specifically, individual reflective practices were used to
provide
measurable outcomes for the organization. In this case, the out-
comes related to a specific event, the physical move of the
business
to a different location. Another lesson we can derive (with
hindsight)
from the Ravell experience is that learning was converted to
strategic
benefit for the organization. The concept of converting learning
to
strategic benefit was pioneered by Pietersen (2002). He
established a
strategic learning cycle composed of four component processes
that he
identified with the action verbs learn, focus, align, and execute.
These
are stages in the learning cycle, as follows:
1. Learn: Conduct a situation analysis to generate insights into
the competitive environment and into the realities of the
company.
2. Focus: Translate insights into a winning proposition that
out-
lines key priorities for success.
3. Align: Align the organization and energize the people behind
the new strategic focus.
4. Execute: Implement strategy and experiment with new con-
cepts. Interpret results and continue the cycle.
At Ravell, technology assisted in driving the learning cycle
because,
by its dynamic nature, it mandated the acceleration of the cycle
that
Pietersen (2002) describes in his stage strategy of
implementation.
Thus, Ravell required the process Pietersen outlined to occur
within
6 6 INFORMATION TECHNOLO GY
6 months, and therein established the opportunity to provide
outcomes.
It also altered the culture of the organization (i.e., the evolution
in cul-
ture was tangible because the transformation was concrete).
We see from the Ravell case that technology represents the best
opportunity to apply organizational learning techniques because
the
use of it requires forms of evolutionary-related change.
Organizations
are continually seeking to improve their operations and
competi-
tive advantage through efficiency and effective processes. As I
have
discussed in previous chapters, today’s businesses are
experiencing
technological dynamism (defined as causing accelerated and
dynamic
transformations), and this is due to the advent of
technologically driven
processes. That is, organizations are experiencing more pressure
to
change and compete as a result of the accelerations that
technology
has brought about. Things happen quicker, and more
unpredictably,
than before. This situation requires organizations to sense the
need for
change and execute that change. The solution I propose is to tie
orga-
nizational theory to technological implementation. Another way
of
defining this issue is to provide an overarching framework that
orga-
nizes an inquiry into the issues surrounding organizational
change.
Another dimension of organizational learning is political.
Argyris
(1993) and Senge (1990) argue that politics gets “in the way of
good
learning.” In my view, however, the political dimension is very
much
part of learning. It seems naï ve to assume that politics can be
elimi-
nated from the daily commerce of organizational
communication.
Instead, it needs to be incorporated as a factor in organizational
learn-
ing theory rather than attempting to disavow or eliminate it,
which is
not realistic. Ravell also revealed that political factors are
simply part
of the learning process. Recall that during my initial efforts to
create
a learning organization there were IT staff members who
deliberately
refused to cooperate, assuming that they could “outlast” me in
my
interim tenure as IT director. But politics, of course, is not
limited to
internal department negotiations; it was also a factor at Ravell
with,
and among, departments outside IT. These interdepartmental
rela-
tionships applied especially to line managers, who became
essential
advocates for establishing and sustaining necessary forms of
learning
at the organizational level. But, not all line managers responded
with
the same enthusiasm, and a number of them did not display a
sense of
authentically caring about facilitating synergies across
departments.
6 7orGAnIz AtIonAl le ArnInG theorIes
The irrepressible existence of politics in social organizations,
however,
must not in itself deter us from implementing organizational
learn-
ing practices; it simply means that that we must factor it in as
part
of the equation. At Ravell, I had to work within the constraints
of
both internal and external politics. Nevertheless, in the end I
was able
to accomplish the creation of a learning organization. Another
way
one might look at the road bumps of politics is to assume that
they
will temporarily delay or slow the implementation of
organizational
learning initiatives. But, let us make no mistake about the
potentially
disruptive nature of politics because, as we know, in its extreme
cases
of inflexibility, it can be damaging.
I have always equated politics with the dilemma of blood
cholesterol.
We know that there are two types of cholesterol: “good”
cholesterol
and “bad” cholesterol. We all know that bad cholesterol in your
blood
can cause heart disease, among other life-threatening
conditions.
However, good cholesterol is essential to the body. My point is
simple;
the general word politics can have damaging perceptions. When
most
people discuss the topic of cholesterol, they focus on the bad
type, not
the good. Such is the same with politics—that is, most
individuals dis-
cuss the bad type, which often corresponds with their personal
expe-
riences. My colleague Professor Lyle Yorks, at Columbia
University,
often lectures on the importance of politics and its positive
aspects for
establishing strategic advocacy, defined as the ability to
establish per-
sonal and functional influence through cultivating alliances
through
defining opportunities for the adding value to either the top or
bottom
line (Langer & Yorks, 2013). Thus, politics can add value for
indi-
viduals by allowing them to initiate and influence relationships
and
conversations with other leaders. This, then, is “good” politics!
North American cultural norms account for much of what goes
into organizational learning theory, such as individualism, an
empha-
sis on rationality, and the importance of explicit, empirical
informa-
tion. IT, on the other hand, has a broadening, globalizing effect
on
organizational learning because of the sheer increase in the
number of
multicultural organizations created through the expansion of
global
firms. Thus, technology also affects the social aspects of
organizational
learning, particularly as it relates to the cultural evolution of
commu-
nities. Furthermore, technology has shown us that what works in
one
culture may not work in another. Dana Deasy, the former CIO
of the
6 8 INFORMATION TECHNOLO GY
Americas region/sector for Siemens AG, experienced the
difficulties
and challenges of introducing technology standards on a global
scale.
He quickly learned that what worked in North America did not
oper-
ate with the same expectations in Asia or South America. I
discuss
Siemens AG as a case study in Chapter 8.
It is my contention, however, that technology can be used as an
intervention that can actually increase organizational learning.
In
effect, the implementation of organizational learning has lacked
and
has needed concrete systemic processes that show results. A
solution
to this need can be found, as I have found it, in the
incorporation of
IT itself into the process of true organizational learning. The
prob-
lem with IT is that we keep trying to simplify it—trying to
reduce
its complexity. However, dealing with the what, when, and how
of
working with technology is complex. Organizations need a kind
of
mechanism that can provide a way to absorb and learn all of the
com-
plex pieces of technology.
It is my position that organizational change often follows learn-
ing, which to some extent should be expected. What controls
whether
change is radical or evolutionary depends on the basis on which
new processes are created (Argyris & Schö n, 1996; Senge,
1990;
Swieringa & Wierdsma, 1992). Indeed, at Ravell the learning
fol-
lowed the Argyris and Schö n approach: that radical change
occurs
when there are major events that support the need for
accelerated
change. In other words, critical events become catalysts that
promote
change, through reflection. On the other hand, there can be non-
event-related learning, that is not so much radical in nature, as
it is
evolutionary. Thus, evolutionary learning is characterized as an
ongo-
ing process that slowly establishes the need for change over
time. This
evolutionary learning process compares to what Senge (1990, p.
15)
describes as “learning in wholes as opposed to pieces.”
This concept of learning is different from an event-driven
perspec-
tive, and it supports the natural tendency that groups and
organiza-
tions have to protect themselves from open confrontation and
critique.
However, technology provides an interesting variable in this
regard.
It is generally accepted as an agent of change that must be
addressed
by the organization. I believe that this agency can be seized as
an
opportunity to promote such change because it establishes a
reason
why organizations need to deal with the inevitable transitions
brought
6 9orGAnIz AtIonAl le ArnInG theorIes
about by technology. Furthermore, as Huysman (1999) points
out, the
history of organizational learning has not often created
measurable
improvement, particularly because implementing the theories
has not
always been efficient or effective. Much of the impetus for
implement-
ing a new technology, however, is based on the premise that its
use
will result in such benefits. Therefore, technology provides
compelling
reasons for why organizational learning is important: to
understand
how to deal with agents of change, and to provide ongoing
changes in
the processes that improve competitive advantage.
There is another intrinsic issue here. Uses of technology have
not
always resulted in efficient and effective outcomes, particularly
as
they relate to a firm’s expected ROI. In fact, IT projects often
cost
more than expected and tend to be delivered late. Indeed,
research
performed by the Gartner Group and CIO Magazine (Koch,
1999)
reports that 54% of IT projects are late and that 22% are never
com-
pleted. In May 2009, McGraw reported similar trends, so
industry
performance has not materially improved. This is certainly a
disturb-
ing statistic for a dynamic variable of change that promises
outcomes
of improved efficiency and effectiveness. The question then is
why is
this occurring? Many scholars might consider the answer to this
ques-
tion as complex. It is my claim, however, based on my own
research,
that the lack of organizational learning, both within IT and
within
other departments, poses, perhaps, the most significant barrier
to the
success of these projects in terms of timeliness and completion.
Langer
(2001b) suggests that the inability of IT organizations to
understand
how to deal with larger communities within the organization
and to
establish realistic and measurable outcomes are relevant both to
many
of the core values of organizational learning and to its
importance in
attaining results. What better opportunity is there to combine
the
strengths and weaknesses of each of IT and organizational
learning?
Perhaps what is most interesting—and, in many ways, lacking
within the literature on organizational learning—is the actual
way
individuals learn. To address organizational learning, I believe
it is
imperative to address the learning styles of individuals within
the
organization. One fundamental consideration to take into
account
is that of individual turnover within departments. Thus, methods
to measure or understand organizational learning must
incorporate
the individual; how the individual learns, and what occurs when
70 INFORMATION TECHNOLO GY
individuals change positions or leave, as opposed to solely
focusing
on the event-driven aspect of evolutionary learning. There are
two
sociological positions about how individual learning occurs.
The first
suggests that individual action derives from determining
influences
in the social system, and the other suggests that it emanates
from
individual action. The former proposition supports the concept
that
learning occurs at the organizational, or group level, and the
lat-
ter supports it at the individual level of action and experience.
The
“system” argument focuses on learning within the organization
as a
whole and claims that individual action functions within its
boundar-
ies. The “individual” argument claims that learning emanates
from
the individual first and affects the system as a result of
outcomes from
individual actions. Determining a balance between individual
and
organizational learning is an issue debated by scholars and an
impor-
tant one that this book must address.
Why is this issue relevant to the topic of IT and organizational
learning? Simply put, understanding the nature of evolving
technolo-
gies requires that learning—and subsequent learning
outcomes—will
be heavily affected by the processes in which it is delivered.
Therefore,
without understanding the dynamics of how individuals and
organi-
zations learn, new technologies may be difficult to assimilate
because
of a lack of process that can determine how they can be best
used in
the business. What is most important to recognize is the way in
which
responsive organizational dynamism (ROD) needs both the
system
and individual approaches. Huysman (1999) suggests (and I
agree)
that organizational versus individual belief systems are not
mutually
exclusive pairs but dualities. In this way, organizational
processes are
not seen as just top-down or bottom-up affairs, but as
accumulations
of history, assimilated in organizational memory, which
structures
and positions the agency or capacity for learning. In a similar
way,
organizational learning can be seen as occurring through the
actions
of individuals, even when they are constrained by institutional
forces.
The strategic integration component of ROD lends itself to the
system
model of learning to the extent that it almost mandates change—
change that, if not addressed, will inevitably affect the
competitive
advantage of the organization. On the other hand, the cultural
assim-
ilation component of ROD is also involved because of its effect
on
individual behavior. Thus, the ROD model needs to be expanded
to
71orGAnIz AtIonAl le ArnInG theorIes
show the relationship between individual and organizational
learning
as shown in Figure 4.1.
An essential challenge to technology comes from the fact that
organizations are not sure about how to handle its overall
potential.
Thus, in a paradoxical way, this quandary provides a
springboard to
learning by utilizing organizational learning theories and
concepts to
create new knowledge, by learning from experience, and
ultimately by
linking technology to learning and performance. This
perspective can
be promoted from within the organization because chief
executives
are generally open to investing in learning as long as core
business
principles are not violated. This position is supported by my
research
with chief executives that I discussed in Chapter 2.
Organizational
dynamism
Acceleration of events that
require different
infrastructures and
organizational processes
Requires
Strategic
integration
Cultural
assimilation
Organization
structures
(system)
Individual
actions
Renegotiation of
relationship
Organizational learning techniques
Symptoms and
implications
Technology
Figure 4.1 ROD and organizational learning.
72 INFORMATION TECHNOLO GY
Organizational learning can also assist in the adoption of
technologies by providing a mechanism to help individuals
manage
change. This notion is consistent with Aldrich (2001), who
observes
that many organizations reject technology-driven changes or
“pio-
neering ventures,” which he called competence-destroying
ventures
because they threaten existing norms and processes.
Organizations
would do well to understand the value of technology,
particularly for
those who adopt it early (early adopters), and how it can lead to
com-
petitive advantages. Thus, organizations that position
themselves to
evolve, to learn, and to create new knowledge are better
prepared to
foster the handling, absorption, and acceptance of technology-
driven
change than those that are not. Another way to view this ethic is
to
recognize that organizations need to be “ready” to deal with
change—
change that is accelerated by technology innovations. Although
Aldrich (2001) notes that organizational learning has not been
tied
to performance and success, I believe it will be the technology
revolu-
tion that establishes the catalyst that can tie organizational
learning
to performance.
The following sections of this chapter expand on the core
concept
that the success of ROD is dependent on the uses of
organizational
learning techniques. In each section, I correlate this concept to
many
of the organizational learning theories and show how they can
be
tailored and used to provide important outcomes that assist the
pro-
motion of both technological innovation and organizational
learning.
Learning Organizations
Business strategists have realized that the ability of an
organization
to learn faster, or “better,” than its competitors may indeed be
the key
to long-term business success (Collis, 1994; Dodgson, 1993;
Grant,
1996; Jones, 1975). A learning organization is defined as a
form of
organization that enables, in an active sense, the learning of its
mem-
bers in such a way that it creates positive outcomes, such as
innovation,
efficiency, improved alignment with the environment, and
competi-
tive advantage. As such, a learning organization is one that
acquires
knowledge from within. Its evolution, then, is primarily driven
by
itself without the need for interference from outside forces. In
this
sense, it is a self-perpetuating and self-evolving system of
individual
73orGAnIz AtIonAl le ArnInG theorIes
and organizational transformations integrated into the daily
processes
of the organization. It should be, in effect, a part of normal
organiza-
tional behavior. The focus of organizational learning is not so
much
on the process of learning but more on the conditions that allow
suc-
cessful outcomes to flourish. Learning organization literature
draws
from organizational learning theory, particularly as it relates to
inter-
ventions based on outcomes. This provides an alternative to
social
approaches.
In reviewing these descriptions of what a learning organization
does, and why it is important, we can begin to see that
technology may
be one of the few agents that can actually show what learning
organi-
zations purport to do. Indeed, Ravell created an evolving
population
that became capable of dealing with environmental changes
brought
on by technological innovation. The adaptation of these changes
created those positive outcomes and improved efficiencies.
Without
organizational learning, specifically the creation of a learning
organi-
zation, many innovations brought about by technology could
produce
chaos and instability. Organizations generally tend to suffer
from, and
spend too much time reflecting on, their past dilemmas.
However,
given the recent phenomenon of rapid changes in technology,
orga-
nizations can no longer afford the luxury of claiming that there
is
simply too much else to do to be constantly worrying about
technol-
ogy. Indeed, Lounamaa and March (1987) state that
organizations
can no longer support the claim that too-frequent changes will
inhibit
learning. The fact is that such changes must be taken as
evolutionary,
and as a part of the daily challenges facing any organization.
Because
a learning organization is one that creates structure and
strategies, it
is positioned to facilitate the learning of all its members, during
the
ongoing infiltration of technology-driven agents of change.
Boland
et al. (1994) show that information systems based on
multimedia
technologies may enhance the appreciation of diverse
interpretations
within organizations and, as such, support learning
organizations.
Since learning organizations are deliberately created to
facilitate the
learning of their members, understanding the urgency of
technologi-
cal changes can provide the stimulus to support planned
learning.
Many of the techniques used in the Ravell case study were
based
on the use of learning organizational techniques, many of which
were
pioneered by Argyris and Schö n (1996). Their work focuses on
using
74 INFORMATION TECHNOLO GY
“action science” methods to create and maintain learning
organiza-
tions. A key component of action science is the use of reflective
prac-
tices—including what is commonly known among researchers
and
practitioners as reflection in action and reflection on action.
Reflection
with action is the term I use as a rubric for these various
methods,
involving reflection in relation to activity. Reflection has
received
a number of definitions, from different sources in the literature.
Depending on the emphasis, whether on theory or practice,
defini-
tions vary from philosophical articulation (Dewey, 1933;
Habermas,
1998), to practice-based formulations, such as Kolb’s (1984b)
use of
reflection in the experiential learning cycle. Specifically,
reflection
with action carries the resonance of Schö n’s (1983) twin
constructs:
reflection on action and reflection in action, which emphasize
reflec-
tion in retrospect, and reflection to determine which actions to
take
in the present or immediate future, respectively. Dewey (1933)
and
Hullfish and Smith (1978) also suggest that the use of reflection
sup-
ports an implied purpose: individuals reflect for a purpose that
leads
to the processing of a useful outcome. This formulation
suggests the
possibility of reflection that is future oriented—what we might
call
“reflection to action.” These are methodological orientations
covered
by the rubric.
Reflective practices are integral to ROD because so many
technology-based projects are event driven and require
individu-
als to reflect before, during, and after actions. Most important
to
this process is that these reflections are individually driven and
that
technology projects tend to accelerate the need for rapid
decisions.
In other words, there are more dynamic decisions to be made in
less
time. Without operating in the kind of formation that is a
learning
organization, IT departments cannot maintain the requisite
infra-
structure to develop products timely on time and support
business
units—something that clearly is not happening if we look at the
existing lateness of IT projects. With respect to the role of
reflec-
tion in general, the process can be individual or organizational.
While groups can reflect, it is in being reflective that
individuals
bring about “an orientation to their everyday lives,” according
to
Moon (1999). “For others reflection comes about when
conditions
in the learning environment are appropriate” (p. 186). However,
IT departments have long suffered from not having the
conditions
75orGAnIz AtIonAl le ArnInG theorIes
to support such an individual learning environment. This is why
implementing a learning organization is so appealing as a
remedy
for a chronic problem.
Communities of Practice
Communities of practice are based on the assumption that
learning
starts with engagement in social practice and that this practice
is the
fundamental construct by which individuals learn (Wenger,
1998).
Thus, communities of practice are formed to get things done by
using
a shared way of pursuing interest. For individuals, this means
that
learning is …
Assignment 1
Textbook:Information Systems for Business and Beyond
Please answer the following
From Chapter 5 – study questions 1-9, Exercise 1
From Chapter 6 – study questions 1-10, Exercise 6, & 7
All the above questions should be submitted in one Word
document
Please understand that Plagiarism will not be tolerated and will
result in a zero grade.
Submission Requirements
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: At-least 4 pages, make sure not to limit your work to 4
pages, but answer all the questions. If you can do it 3 pages
work for me as long as you answered all the questions.
References: Please use citations and references where
appropriate
No Plagiarism
Assignment 2
Textbook:Information Technology and Organizational Learning
Please answer the Following
From Chapter 4 – Review the section on Linear Development in
Learning Approaches. Discuss how learning changes over time
impact organizational culture. What is the impact of this
cultural change on the success of IT projects?
From Chapter 5 – Review the Roles of Line Management and
Social Network and Information Technology sections. Note the
various roles in the organization and note the similarities and
differences within each role. Also, note how innovation
technology management shapes how we communicate amongst
coworkers within an organization.
Submission Requirements
Font: Times New Roman, size 12, double-space
Length: At one page for each chapter (total pages should be 2)
Citation Style: APA
References: Please use citations and references where
appropriate
No Plagiarism
The above submission should adhere to APA formatting
standards. Remember the page length does not include the APA
cover page or any references. Please understand that Plagiarism
will not be tolerated and will result in a zero grade.

More Related Content

Similar to Chapter 5 Networking and Communication Learning Objecti.docx

Analysis the article from foreign Affairs (April 1945), The Camp.docx
Analysis the article from foreign Affairs (April 1945), The Camp.docxAnalysis the article from foreign Affairs (April 1945), The Camp.docx
Analysis the article from foreign Affairs (April 1945), The Camp.docx
nettletondevon
 
Websites 2007/2010 version
Websites 2007/2010 versionWebsites 2007/2010 version
Websites 2007/2010 version
Johan Koren
 
Unit 1 - Introduction.pptx
Unit 1 - Introduction.pptxUnit 1 - Introduction.pptx
Unit 1 - Introduction.pptx
Bhisandulal
 
Using Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For CommunicationUsing Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For Communication
Chelsea Porter
 
Websites
WebsitesWebsites
Websites
Johan Koren
 
Internet Introduction
Internet IntroductionInternet Introduction
Internet Introduction
Dr Vijay Pithadia Director
 
Internet to Web
Internet to WebInternet to Web
Internet to Web
Johan Koren
 
Internet
InternetInternet
The Links that became a Web: The 40-Year-Old Internet and the 20-Year-Old Web
The Links that became a Web:  The 40-Year-Old Internet and the 20-Year-Old WebThe Links that became a Web:  The 40-Year-Old Internet and the 20-Year-Old Web
The Links that became a Web: The 40-Year-Old Internet and the 20-Year-Old Web
Johan Koren
 
Bjmc i-i, met, unit-iv, the internet
Bjmc i-i, met, unit-iv, the internetBjmc i-i, met, unit-iv, the internet
Bjmc i-i, met, unit-iv, the internet
Rai University
 
Internet service
Internet serviceInternet service
Internet service
ashrafulislam293
 
Internet Principles and Components, Client-Side Programming
Internet Principles and Components, Client-Side ProgrammingInternet Principles and Components, Client-Side Programming
Internet Principles and Components, Client-Side Programming
Prabu U
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
Renee Jones
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
Md. Mashiur Rahman
 
Web Technology Management Lecture II
Web Technology Management Lecture IIWeb Technology Management Lecture II
Web Technology Management Lecture II
sopekmir
 
History of the Internet.doc
History of the Internet.docHistory of the Internet.doc
History of the Internet.doc
NPeredaSamyJ
 
Internet Appendix A
Internet Appendix AInternet Appendix A
Internet Appendix A
dpd
 
Sekolah ictl
Sekolah ictlSekolah ictl
Sekolah ictl
Khairul Ummi
 
Computer Networking-The past, present and future.pptx
Computer Networking-The past, present and future.pptxComputer Networking-The past, present and future.pptx
Computer Networking-The past, present and future.pptx
ChideraAnichebe
 
Internet
InternetInternet
Internet
Mukul Kumar
 

Similar to Chapter 5 Networking and Communication Learning Objecti.docx (20)

Analysis the article from foreign Affairs (April 1945), The Camp.docx
Analysis the article from foreign Affairs (April 1945), The Camp.docxAnalysis the article from foreign Affairs (April 1945), The Camp.docx
Analysis the article from foreign Affairs (April 1945), The Camp.docx
 
Websites 2007/2010 version
Websites 2007/2010 versionWebsites 2007/2010 version
Websites 2007/2010 version
 
Unit 1 - Introduction.pptx
Unit 1 - Introduction.pptxUnit 1 - Introduction.pptx
Unit 1 - Introduction.pptx
 
Using Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For CommunicationUsing Interconnected Computer Networks For Communication
Using Interconnected Computer Networks For Communication
 
Websites
WebsitesWebsites
Websites
 
Internet Introduction
Internet IntroductionInternet Introduction
Internet Introduction
 
Internet to Web
Internet to WebInternet to Web
Internet to Web
 
Internet
InternetInternet
Internet
 
The Links that became a Web: The 40-Year-Old Internet and the 20-Year-Old Web
The Links that became a Web:  The 40-Year-Old Internet and the 20-Year-Old WebThe Links that became a Web:  The 40-Year-Old Internet and the 20-Year-Old Web
The Links that became a Web: The 40-Year-Old Internet and the 20-Year-Old Web
 
Bjmc i-i, met, unit-iv, the internet
Bjmc i-i, met, unit-iv, the internetBjmc i-i, met, unit-iv, the internet
Bjmc i-i, met, unit-iv, the internet
 
Internet service
Internet serviceInternet service
Internet service
 
Internet Principles and Components, Client-Side Programming
Internet Principles and Components, Client-Side ProgrammingInternet Principles and Components, Client-Side Programming
Internet Principles and Components, Client-Side Programming
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 
Web Technology Management Lecture II
Web Technology Management Lecture IIWeb Technology Management Lecture II
Web Technology Management Lecture II
 
History of the Internet.doc
History of the Internet.docHistory of the Internet.doc
History of the Internet.doc
 
Internet Appendix A
Internet Appendix AInternet Appendix A
Internet Appendix A
 
Sekolah ictl
Sekolah ictlSekolah ictl
Sekolah ictl
 
Computer Networking-The past, present and future.pptx
Computer Networking-The past, present and future.pptxComputer Networking-The past, present and future.pptx
Computer Networking-The past, present and future.pptx
 
Internet
InternetInternet
Internet
 

More from robertad6

Chapter 8 Religion and the Restoration of Health in Afric.docx
Chapter 8  Religion and the Restoration of Health in Afric.docxChapter 8  Religion and the Restoration of Health in Afric.docx
Chapter 8 Religion and the Restoration of Health in Afric.docx
robertad6
 
Chapter 8 - Children of alcoholics often display characteristic tr.docx
Chapter 8 - Children of alcoholics often display characteristic tr.docxChapter 8 - Children of alcoholics often display characteristic tr.docx
Chapter 8 - Children of alcoholics often display characteristic tr.docx
robertad6
 
Chapter 8 - Review the Siemens AG case study.  Note the importan.docx
Chapter 8 - Review the Siemens AG case study.  Note the importan.docxChapter 8 - Review the Siemens AG case study.  Note the importan.docx
Chapter 8 - Review the Siemens AG case study.  Note the importan.docx
robertad6
 
Chapter 7Victimology and Patterns of VictimizationThe a.docx
Chapter 7Victimology and Patterns of VictimizationThe a.docxChapter 7Victimology and Patterns of VictimizationThe a.docx
Chapter 7Victimology and Patterns of VictimizationThe a.docx
robertad6
 
Chapter 7Thinking and IntelligenceFigure 7.1 Thinking .docx
Chapter 7Thinking and IntelligenceFigure 7.1 Thinking .docxChapter 7Thinking and IntelligenceFigure 7.1 Thinking .docx
Chapter 7Thinking and IntelligenceFigure 7.1 Thinking .docx
robertad6
 
Chapter 7 2. How does a false positive alarm differ from a f.docx
Chapter 7 2. How does a false positive alarm differ from a f.docxChapter 7 2. How does a false positive alarm differ from a f.docx
Chapter 7 2. How does a false positive alarm differ from a f.docx
robertad6
 
Chapter 7 covers Corporate Information Security and Privacy Regu.docx
Chapter 7 covers Corporate Information Security and Privacy Regu.docxChapter 7 covers Corporate Information Security and Privacy Regu.docx
Chapter 7 covers Corporate Information Security and Privacy Regu.docx
robertad6
 
Chapter 7The Problem of EvilOf all the objections to theism pr.docx
Chapter 7The Problem of EvilOf all the objections to theism pr.docxChapter 7The Problem of EvilOf all the objections to theism pr.docx
Chapter 7The Problem of EvilOf all the objections to theism pr.docx
robertad6
 
Chapter 7Social Networking,Engagement, andSocial Metrics.docx
Chapter 7Social Networking,Engagement, andSocial Metrics.docxChapter 7Social Networking,Engagement, andSocial Metrics.docx
Chapter 7Social Networking,Engagement, andSocial Metrics.docx
robertad6
 
CHAPTER 7The CPU and MemoryThe Architecture of Comp.docx
CHAPTER 7The CPU and MemoryThe Architecture of Comp.docxCHAPTER 7The CPU and MemoryThe Architecture of Comp.docx
CHAPTER 7The CPU and MemoryThe Architecture of Comp.docx
robertad6
 
Chapter 7QUESTION 1. Which of the following is defin.docx
Chapter 7QUESTION 1. Which of the following is defin.docxChapter 7QUESTION 1. Which of the following is defin.docx
Chapter 7QUESTION 1. Which of the following is defin.docx
robertad6
 
Chapter 7One pageAPA stylePlease comment on the followin.docx
Chapter 7One pageAPA stylePlease comment on the followin.docxChapter 7One pageAPA stylePlease comment on the followin.docx
Chapter 7One pageAPA stylePlease comment on the followin.docx
robertad6
 
CHAPTER 7Managing Financial OperationsRevenue cycle (bil.docx
CHAPTER 7Managing Financial OperationsRevenue cycle (bil.docxCHAPTER 7Managing Financial OperationsRevenue cycle (bil.docx
CHAPTER 7Managing Financial OperationsRevenue cycle (bil.docx
robertad6
 
CHAPTER 7Primate BehaviorWhat is Meant By Behavior.docx
CHAPTER 7Primate BehaviorWhat is Meant By Behavior.docxCHAPTER 7Primate BehaviorWhat is Meant By Behavior.docx
CHAPTER 7Primate BehaviorWhat is Meant By Behavior.docx
robertad6
 
Chapter 7Medical Care Production and Costs(c) 2012 Cengage.docx
Chapter 7Medical Care Production and Costs(c) 2012 Cengage.docxChapter 7Medical Care Production and Costs(c) 2012 Cengage.docx
Chapter 7Medical Care Production and Costs(c) 2012 Cengage.docx
robertad6
 
Chapter 7Evaluating HRD ProgramsWerner© 2017 Cengage Learn.docx
Chapter 7Evaluating HRD ProgramsWerner© 2017 Cengage Learn.docxChapter 7Evaluating HRD ProgramsWerner© 2017 Cengage Learn.docx
Chapter 7Evaluating HRD ProgramsWerner© 2017 Cengage Learn.docx
robertad6
 
CHAPTER 7INTEREST RATES AND BOND VALUATIONCopyright © 2019 M.docx
CHAPTER 7INTEREST RATES AND BOND VALUATIONCopyright © 2019 M.docxCHAPTER 7INTEREST RATES AND BOND VALUATIONCopyright © 2019 M.docx
CHAPTER 7INTEREST RATES AND BOND VALUATIONCopyright © 2019 M.docx
robertad6
 
CHAPTER 7FriendshipTHE NATURE OF FRIENDSHIPFRIENDSHIP ACROSS T.docx
CHAPTER 7FriendshipTHE NATURE OF FRIENDSHIPFRIENDSHIP ACROSS T.docxCHAPTER 7FriendshipTHE NATURE OF FRIENDSHIPFRIENDSHIP ACROSS T.docx
CHAPTER 7FriendshipTHE NATURE OF FRIENDSHIPFRIENDSHIP ACROSS T.docx
robertad6
 
Chapter 7Lean Thinking and Lean SystemsMcGraw-Hill Ed.docx
Chapter 7Lean Thinking and Lean SystemsMcGraw-Hill Ed.docxChapter 7Lean Thinking and Lean SystemsMcGraw-Hill Ed.docx
Chapter 7Lean Thinking and Lean SystemsMcGraw-Hill Ed.docx
robertad6
 
Chapter 7Food, Nutrition & Obesity PolicyEyler, Chriqui, M.docx
Chapter 7Food, Nutrition & Obesity PolicyEyler, Chriqui, M.docxChapter 7Food, Nutrition & Obesity PolicyEyler, Chriqui, M.docx
Chapter 7Food, Nutrition & Obesity PolicyEyler, Chriqui, M.docx
robertad6
 

More from robertad6 (20)

Chapter 8 Religion and the Restoration of Health in Afric.docx
Chapter 8  Religion and the Restoration of Health in Afric.docxChapter 8  Religion and the Restoration of Health in Afric.docx
Chapter 8 Religion and the Restoration of Health in Afric.docx
 
Chapter 8 - Children of alcoholics often display characteristic tr.docx
Chapter 8 - Children of alcoholics often display characteristic tr.docxChapter 8 - Children of alcoholics often display characteristic tr.docx
Chapter 8 - Children of alcoholics often display characteristic tr.docx
 
Chapter 8 - Review the Siemens AG case study.  Note the importan.docx
Chapter 8 - Review the Siemens AG case study.  Note the importan.docxChapter 8 - Review the Siemens AG case study.  Note the importan.docx
Chapter 8 - Review the Siemens AG case study.  Note the importan.docx
 
Chapter 7Victimology and Patterns of VictimizationThe a.docx
Chapter 7Victimology and Patterns of VictimizationThe a.docxChapter 7Victimology and Patterns of VictimizationThe a.docx
Chapter 7Victimology and Patterns of VictimizationThe a.docx
 
Chapter 7Thinking and IntelligenceFigure 7.1 Thinking .docx
Chapter 7Thinking and IntelligenceFigure 7.1 Thinking .docxChapter 7Thinking and IntelligenceFigure 7.1 Thinking .docx
Chapter 7Thinking and IntelligenceFigure 7.1 Thinking .docx
 
Chapter 7 2. How does a false positive alarm differ from a f.docx
Chapter 7 2. How does a false positive alarm differ from a f.docxChapter 7 2. How does a false positive alarm differ from a f.docx
Chapter 7 2. How does a false positive alarm differ from a f.docx
 
Chapter 7 covers Corporate Information Security and Privacy Regu.docx
Chapter 7 covers Corporate Information Security and Privacy Regu.docxChapter 7 covers Corporate Information Security and Privacy Regu.docx
Chapter 7 covers Corporate Information Security and Privacy Regu.docx
 
Chapter 7The Problem of EvilOf all the objections to theism pr.docx
Chapter 7The Problem of EvilOf all the objections to theism pr.docxChapter 7The Problem of EvilOf all the objections to theism pr.docx
Chapter 7The Problem of EvilOf all the objections to theism pr.docx
 
Chapter 7Social Networking,Engagement, andSocial Metrics.docx
Chapter 7Social Networking,Engagement, andSocial Metrics.docxChapter 7Social Networking,Engagement, andSocial Metrics.docx
Chapter 7Social Networking,Engagement, andSocial Metrics.docx
 
CHAPTER 7The CPU and MemoryThe Architecture of Comp.docx
CHAPTER 7The CPU and MemoryThe Architecture of Comp.docxCHAPTER 7The CPU and MemoryThe Architecture of Comp.docx
CHAPTER 7The CPU and MemoryThe Architecture of Comp.docx
 
Chapter 7QUESTION 1. Which of the following is defin.docx
Chapter 7QUESTION 1. Which of the following is defin.docxChapter 7QUESTION 1. Which of the following is defin.docx
Chapter 7QUESTION 1. Which of the following is defin.docx
 
Chapter 7One pageAPA stylePlease comment on the followin.docx
Chapter 7One pageAPA stylePlease comment on the followin.docxChapter 7One pageAPA stylePlease comment on the followin.docx
Chapter 7One pageAPA stylePlease comment on the followin.docx
 
CHAPTER 7Managing Financial OperationsRevenue cycle (bil.docx
CHAPTER 7Managing Financial OperationsRevenue cycle (bil.docxCHAPTER 7Managing Financial OperationsRevenue cycle (bil.docx
CHAPTER 7Managing Financial OperationsRevenue cycle (bil.docx
 
CHAPTER 7Primate BehaviorWhat is Meant By Behavior.docx
CHAPTER 7Primate BehaviorWhat is Meant By Behavior.docxCHAPTER 7Primate BehaviorWhat is Meant By Behavior.docx
CHAPTER 7Primate BehaviorWhat is Meant By Behavior.docx
 
Chapter 7Medical Care Production and Costs(c) 2012 Cengage.docx
Chapter 7Medical Care Production and Costs(c) 2012 Cengage.docxChapter 7Medical Care Production and Costs(c) 2012 Cengage.docx
Chapter 7Medical Care Production and Costs(c) 2012 Cengage.docx
 
Chapter 7Evaluating HRD ProgramsWerner© 2017 Cengage Learn.docx
Chapter 7Evaluating HRD ProgramsWerner© 2017 Cengage Learn.docxChapter 7Evaluating HRD ProgramsWerner© 2017 Cengage Learn.docx
Chapter 7Evaluating HRD ProgramsWerner© 2017 Cengage Learn.docx
 
CHAPTER 7INTEREST RATES AND BOND VALUATIONCopyright © 2019 M.docx
CHAPTER 7INTEREST RATES AND BOND VALUATIONCopyright © 2019 M.docxCHAPTER 7INTEREST RATES AND BOND VALUATIONCopyright © 2019 M.docx
CHAPTER 7INTEREST RATES AND BOND VALUATIONCopyright © 2019 M.docx
 
CHAPTER 7FriendshipTHE NATURE OF FRIENDSHIPFRIENDSHIP ACROSS T.docx
CHAPTER 7FriendshipTHE NATURE OF FRIENDSHIPFRIENDSHIP ACROSS T.docxCHAPTER 7FriendshipTHE NATURE OF FRIENDSHIPFRIENDSHIP ACROSS T.docx
CHAPTER 7FriendshipTHE NATURE OF FRIENDSHIPFRIENDSHIP ACROSS T.docx
 
Chapter 7Lean Thinking and Lean SystemsMcGraw-Hill Ed.docx
Chapter 7Lean Thinking and Lean SystemsMcGraw-Hill Ed.docxChapter 7Lean Thinking and Lean SystemsMcGraw-Hill Ed.docx
Chapter 7Lean Thinking and Lean SystemsMcGraw-Hill Ed.docx
 
Chapter 7Food, Nutrition & Obesity PolicyEyler, Chriqui, M.docx
Chapter 7Food, Nutrition & Obesity PolicyEyler, Chriqui, M.docxChapter 7Food, Nutrition & Obesity PolicyEyler, Chriqui, M.docx
Chapter 7Food, Nutrition & Obesity PolicyEyler, Chriqui, M.docx
 

Recently uploaded

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 

Recently uploaded (20)

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 

Chapter 5 Networking and Communication Learning Objecti.docx

  • 1. Chapter 5: Networking and Communication Learning Objectives Upon successful completion of this chapter, you will be able to: • understand the history and development of networking technologies; • define the key terms associated with networking technologies; • understand the importance of broadband technologies; and • describe organizational networking. Introduction In the early days of computing, computers were seen as devices for making calculations, storing data, and automating business processes. However, as the devices evolved, it became apparent that
  • 2. many of the functions of telecommunications could be integrated into the computer. During the 1980s, many organizations began Chapter 5: Networking and Communication | 99 combining their once-separate telecommunications and information systems departments into an Information Technology (IT) department. This ability for computers to communicate with one another and to facilitate communication between individuals and groups has had a major impact on the growth of computing over the past several decades. Computer networking began in the 1960s with the birth of the Internet. However, while the Internet and web were evolving, corporate networking was also taking shape in the form of local area networks and client-server computing. The Internet went commercial in 1994 as technologies began to pervade all areas
  • 3. of the organization. Today it would be unthinkable to have a computer that did not include communications capabilities. This chapter reviews the different technologies that have been put in place to enable this communications revolution. A Brief History of the Internet In the Beginning: ARPANET The story of the Internet, and networking in general, can be traced back to the late 1950s. The United States was in the depths of the Cold War with the USSR as each nation closely watched the other to determine which would gain a military or intelligence advantage. In 1957, the Soviets surprised the U.S. with the launch of Sputnik, propelling us into the space age. In response to Sputnik, the U.S. Government created the Advanced Research Projects Agency
  • 4. (ARPA), whose initial role was to ensure that the U.S. was not surprised again. It was from ARPA, now called DARPA ((Defense Advanced Research Projects Agency), that the Internet first sprang. 100 | Information Systems for Business and Beyond (2019) http://history.nasa.gov/sputnik ARPA was the center of computing research in the 1960s, but there was just one problem. Many of the computers could not communicate with each other. In 1968 ARPA sent out a request for proposals for a communication technology that would allow different computers located around the country to be integrated together into one network. Twelve companies responded to the request, and a company named Bolt, Beranek, and Newman (BBN) won the contract. They immediately began work and were able to complete the job just one year later.
  • 5. ARPA Net 1969 Professor Len Kleinrock of UCLA along with a group of graduate students were the first to successfully send a transmission over the ARPANET. The event occurred on October 29, 1969 when they attempted to send the word “login” from their computer at UCLA to the Stanford Research Institute. You can read their actual notes. The first four nodes were at UCLA, University of California, Stanford, and the University of Utah. Chapter 5: Networking and Communication | 101 https://www.lk.cs.ucla.edu/internet_first_words.html The Internet and the World Wide Web Over the next decade, the ARPANET grew and gained popularity. During this time, other networks also came into existence. Different organizations were connected to different networks. This led to a
  • 6. problem. The networks could not communicate with each other. Each network used its own proprietary language, or protocol (see sidebar for the definition of protocol) to send information back and forth. This problem was solved by the invention of Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP was designed to allow networks running on different protocols to have an intermediary protocol that would allow them to communicate. So as long as your network supported TCP/IP, you could communicate with all of the other networks running TCP/IP. TCP/IP quickly became the standard protocol and allowed networks to communicate with each other. It is from this breakthrough that we first got the term Internet, which simply means “an interconnected network of networks.” Sidebar: An Internet Vocabulary Lesson Network communication is full of some very technical concepts
  • 7. based on simple principles. Learn the following terms and you’ll be able to hold your own in a conversation about the Internet. • Packet The fundamental unit of data transmitted over the Internet. When a host (PC, workstation, server, printer, etc.) intends to send a message to another host (for example, your PC sends a request to YouTube to open a video), it breaks the message down into smaller pieces, called packets. Each packet has the sender’s address, the destination address, a sequence 102 | Information Systems for Business and Beyond (2019) number, and a piece of the overall message to be sent. Different packets in a single message can take a variety of routes to the destination and they can arrive at different times. For this reason the sequence number is used to reassemble the packets in the proper order at the destination. • Switch A network device that connects multiple hosts together and forwards packets based on their destination within the local network which is commonly known as a Local Area
  • 8. Network (LAN). • Router A device that receives and analyzes packets and then routes them towards their destination. In some cases a router will send a packet to another router. In other cases it will send it directly to its destination. Routers are used to connect one network to another network. • IP Address Every device on the Internet (personal computer, a tablet, a smartphone, etc.) is assigned a unique identifying number called an IP (Internet Protocol) address. Originally, the IPv4 (version 4) standard was used. It had a format of four numbers with values ranging from 0 and 255 separated by a period. For example, the domain Dell.com has the IPv4 address 107.23.196.166. The IPv4 standard has a limit of 4,294,967,296 possible addresses. As the use of the Internet has grown, the number of IP addresses needed has increased to the point where the use of IPv4 addresses will be exhausted. This has led to the new IPv6 standard.The IPv6 standard is formatted as eight groups of four hexadecimal digits, such as 2001:0db8:85a3:0042:1000:8a2e:0370:7334. The IPv6 standard
  • 9. has a limit of 3.4×1038 possible addresses. For example, the domain LinkedIn.com has an IPv6 address of: [2620:109:c002::6cae:a0a]. You probably noticed that the address has only five groups of numbers. That’s because IPv6 allows the use of two semi-colons ( :: ) to indicate groups that are all zeroes and do not need to be displayed. For more detail about the IPv6 standard, see this Wikipedia article. • Domain name If you had to try to remember the IP address of Chapter 5: Networking and Communication | 103 https://en.wikipedia.org/wiki/IPv6 every web site you wanted to access, the Internet would not be nearly as easy to use. A domain name is a human-friendly name, convenient for remembering a website. These names generally consist of a descriptive word followed by a dot (period) and the Top-Level Domain (TLD). For example, Wikipedia’s domain name is wikipedia.org. Wikipedia describes the organization and .org is the TLD. Other well-known TLDs include .com, .net, and .gov. For a list and description of top
  • 10. level domain names, see this Wikipedia article. • DNS DNS stands for “domain name server or system.” DNS acts as the directory of websites on the Internet. When a request to access a host with a domain name is given, a DNS server is queried. It returns the IP address of the host requested, allowing for proper routing. • Packet-switching When a message’s packets are sent on the Internet, routers try to find the optimal route for each packet. This can result in packets being sent on different routes to their destination. After the packets arrive they are re- assembled into the original message for the recipient. For more details on packet-switching, see this interactive web page. • Protocol A protocol is the set of rules that govern how communications take place on a network. For example, File Transfer Protocol (FTP) are the communication rules for transferring files from one host to another. TCP/IP, discussed earlier, is known as a protocol suite since it contains numerous protocols.
  • 11. 104 | Information Systems for Business and Beyond (2019) https://en.wikipedia.org/wiki/List_of_Internet_top- level_domains http://www.pbs.org/opb/nerds2.0.1/geek_glossary/packet_switch ing_flash.html http://www.pbs.org/opb/nerds2.0.1/geek_glossary/packet_switch ing_flash.html Internet Users Worldwide, December 2017. (Public Domain. Courtesy of the Miniwatts Marketing Group) The 1980s witnessed a significant growth in Internet usage. Internet access came primarily from government, academic, and research organizations. Much to the surprise of the engineers, the early popularity of the Internet was driven by the use of electronic mail (see the next sidebar ). Initially, Internet use meant having to type commands, even including IP addresses, in order to access a web server. That all changed in 1990 when Tim Berners-Lee introduced his World Wide Web project which provided an easy way to navigate the Internet through the use of hypertext. The World Wide Web gained even
  • 12. more steam in 1993 with the release of the Mosaic browser which allowed graphics and text to be combined as a way to present information and navigate the Internet. The Dot-Com Bubble In the 1980s and early 1990s, the Internet was being managed by the National Science Foundation (NSF). The NSF had restricted commercial ventures on the Internet, which meant that no one could buy or sell anything online. In 1991, the NSF transferred its role to three other organizations, thus getting the US government out of direct control over the Internet and essentially opening up commerce online. This new commercialization of the Internet led to what is now known as the dot-com bubble. A frenzy of investment in new dot- Chapter 5: Networking and Communication | 105 https://www.internetworldstats.com/stats.htm https://www.internetworldstats.com/stats.htm
  • 13. com companies took place in the late 1990s with new tech companies issuing Initial Public Offerings (IPO) and heating up the stock market. This investment bubble was driven by the fact that investors knew that online commerce would change everything. Unfortunately, many of these new companies had poor business models and anemic financial statements showing little or no profit. In 2000 and 2001, the bubble burst and many of these new companies went out of business. Some companies survived, including Amazon (started in 1994) and eBay (1995). After the dot- com bubble burst, a new reality became clear. In order to succeed online, e-business companies would need to develop business models appropriate for the online environment. Web 2.0 In the first few years of the World Wide Web, creating and hosting a
  • 14. website required a specific set of knowledge. A person had to know how to set up a web server, get a domain name, create web pages in HTML, and troubleshoot various technical issues. Starting in the early 2000s, major changes came about in how the Internet was being used. These changes have come to be known as Web 2.0. Here are some key characteristics in Web 2.0. • Universal access to Apps • Value is found in content, not display software • Data can be easily shared • Distribution is bottom up, not top down • Employees and customers can use access and use tools on their own • Informal networking is encouraged since more contributors results in better content • Social tools encourage people to share information 1 106 | Information Systems for Business and Beyond (2019)
  • 15. Social networking, the last item in the list, has led to major changes in society. Prior to Web 2.0 major news outlets investigated and reported important news stories of the day. But in today’s world individuals are able to easily share their own views on various events. Apps such as Facebook, Twitter, Youtube, and personal blogs allow people to express their own viewpoint. Sidebar: E-mail Is the “Killer” App for the Internet As discussed in chapter 3, a “killer app” is a use of a device that becomes so essential that large numbers of people will buy the device just to run that application. The killer app for the personal computer was the spreadsheet, enabling users to enter data, write formulas, and easily make “what if” decisions. With the introduction of the Internet came another killer app – E-mail.
  • 16. The Internet was originally designed as a way for the Department of Defense to manage projects. However, the invention of electronic mail drove demand for the Internet. While this wasn’t what developers had in mind, it turned out that people connecting with people was the killer app for the Internet. As we look back today, we can see this being repeated again and again with new technologies that enable people to connect with each other. Sidebar: The Internet and the World Wide Web 1. [1] Chapter 5: Networking and Communication | 107 Are Not the Same Thing Many times the terms “Internet” and “World Wide Web,” or even just “the web,” are used interchangeably. But really, they are not the same thing.
  • 17. The Internet is an interconnected network of networks. Services such as email, voice and video, file transfer, and the World Wide Web all run across the Internet.The World Wide Web is simply one part of the Internet. It is made up of web servers that have HTML pages that are being viewed on devices with web browsers. The Growth of High Speed Internet In the early days of the Internet, most access was accomplished via a modem over an analog telephone line. A modem was connected to the incoming phone line when then connected to a computer. Speeds were measured in bits-per-second (bps), with speeds growing from 1200 bps to 56,000 bps over the years. Connection to the Internet via modems is called dial-up access. As the web became more interactive, dial-up hindered usage when users wanted to transfer more and more data. As a point of reference, downloading a typical 3.5 MB song would take 24 minutes at 1200 bps and 2
  • 18. minutes at 28,800 bps. High speed Internet speeds, by definition, are a minimum of 256,000 bps, though most connections today are much faster, measured in millions of bits per second (megabits or Mbps) or even billions (gigabits). For the home user, a high speed connection is usually accomplished via the cable television lines or phone lines using a Digital Subscriber Line (DSL). Both cable and DSL have similar prices and speeds, though price and speed can vary in local communities. According to the website Recode, the average home 108 | Information Systems for Business and Beyond (2019) broadband speed ranges from 12 Mbps and 125 Mbps.2 Telecommunications companies provide T1 and T3 lines for greater bandwidth and reliability. High speed access, also known as broadband, is important
  • 19. because it impacts how the Internet is used. Communities with high speed Internet have found residences and businesses increase usage of digital resources. Access to high speed Internet is now considered a basic human right by the United Nations, as declared in their 2011 statement: “Broadband technologies are fundamentally transforming the way we live,” the Broadband Commission for Digital Development, set up in 2017 by the UN Educational Scientific and Cultural Organization (UNESCO) and the UN International Telecommunications Union (ITU), said in issuing “The Broadband Challenge” at a leadership summit in Geneva. “It is vital that no one be excluded from the new global knowledge societies we are building. We believe that communication is not just
  • 20. a human need – it is a right.”3 Wireless Networking Thanks to wireless technology, access to the Internet is virtually everywhere, especially through a smartphone. Wi-Fi Wi-Fi takes an Internet signal and converts it into radio waves. 2. [2] 3. [3] Chapter 5: Networking and Communication | 109 http://www.un.org/apps/news/story.asp?Cr=broadband&NewsID =40191#.UZlTSyvSOPU http://www.un.org/apps/news/story.asp?Cr=broadband&NewsID =40191#.UZlTSyvSOPU http://www.unesco.org/new/en/unesco http://www.itu.int/ http://www.broadbandcommission.org/Documents/Broadband_C hallenge.pdf These radio waves can be picked up within a radius of approximately 65 feet by devices with a wireless adapter. Several Wi-Fi specifications have been developed over the years, starting
  • 21. with 802.11b in 1999, followed by the 802.11g specification in 2003 and 802.11n in 2009. Each new specification improved the speed and range of Wi-Fi, allowing for more uses. One of the primary places where Wi-Fi is being used is in the home. Home users access Wi-Fi via in-home routers provided by the telecommunications firm that services the residence. Mobile Network As the cellphone has evolved into the smartphone, the desire for Internet access on these devices has led to data networks being included as part of the mobile phone network. While Internet connections were technically available earlier, it was really with the release of the 3G networks in 2001 (2002 in the US) that smartphones and other cellular devices could access data from the Internet. This new capability drove the market for new and more powerful smartphones, such as the iPhone, introduced in 2007. In
  • 22. 2011, wireless carriers began offering 4G data speeds, giving the cellular networks the same speeds that customers were accustomed to getting via their home connection. Beginning in 2019, some part of the world began seeing the implementation of 5G communication networks. Speeds associated with 5G will be greater than 1 GB/second, providing connection speeds to handle just about any type of application. Some have speculated that the 5G implementation will lead households to eliminate the purchase of wired Internet connections for their homes, just using 5G wireless connections instead. 110 | Information Systems for Business and Beyond (2019) 3G, 4G, and 5G Comparison 3G 4G 5G Deployed 2004-2005 2006-2010 By 2020 Bandwidth 2 mbps 200 mbps > 1 gbps,
  • 23. Service Integrated high-quality audio, video and data Dynamic information access, variable devices Dynamic information access, variable devices with all capabilities (James Dean, Raconteur, December 7, 2014) 4 Sidebar: Why Doesn’t My Cellphone Work When I Travel Abroad? As mobile phone technologies have evolved, providers in different countries have chosen different communication standards for their mobile phone networks. There are two competing standards in the US: GSM (used by AT&T and T-Mobile) and CDMA (used by the other major carriers). Each standard has its pros and cons, but
  • 24. the bottom line is that phones using one standard cannot easily switch to the other. This is not a big deal in the US because mobile networks exist to support both standards. But when traveling to other countries, you will find that most of them use GSM networks. The one exception is Japan which has standardized on CDMA. It is possible for a mobile phone using one type of network to switch to the other type of network by changing out the SIM card, which controls your access to the mobile network. However, this will not 4. [4] Chapter 5: Networking and Communication | 111 work in all cases. If you are traveling abroad, it is always best to consult with your mobile provider to determine the best way to access a mobile network. Bluetooth
  • 25. While Bluetooth is not generally used to connect a device to the Internet, it is an important wireless technology that has enabled many functionalities that are used every day. When created in 1994 by Ericsson, it was intended to replace wired connections between devices. Today, it is the standard method for wirelessly connecting nearby devices. Bluetooth has a range of approximately 300 feet and consumes very little power, making it an excellent choice for a variety of purposes. Some applications of Bluetooth include: connecting a printer to a personal computer, connecting a mobile phone and headset, connecting a wireless keyboard and mouse to a computer, or connecting your mobile phone to your car, resulting in hands free operation of your phone. 112 | Information Systems for Business and Beyond (2019) Typical VoIP
  • 26. communicati on VoIP Voice over IP (VoIP) allows analog signals to be converted to digital signals, then transmitted on a network. By using existing technologies and software, voice communication over the Internet is now available to anyone with a browser (think Skype, WebEx, Google Hangouts). Beyond this, many companies are now offering VoIP-based telephone service for business and home use. Chapter 5: Networking and Communication | 113 https://opentextbook.site/informationsystems2019/wp- content/uploads/sites/3/2018/07/volp.png https://opentextbook.site/informationsystems2019/wp- content/uploads/sites/3/2018/07/volp.png Organizational Networking LAN and WAN Scope of business networks While the Internet was evolving and creating a way for
  • 27. organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. A LAN is a local network, usually operating in the same building or on the same campus. A Wide Area Network (WAN) provides connectivity over a wider area such as an organization’s locations in different cities or states. 114 | Information Systems for Business and Beyond (2019) Client-Server Client-server computing provides stand-alone devices such as personal computers, printers, and file servers to work together. The
  • 28. personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or calculations. With the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. Intranet An intranet, as the name implies, provides web-based resources for the users within an organization. These web pages are not accessible to those outside the company. The pages typically contain information useful to employees such as policies and procedures. In an academic setting the intranet provides an interface to learning resources for students. Extranet Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining
  • 29. the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of a company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and place orders, or for suppliers to check their customers’ inventory levels. Chapter 5: Networking and Communication | 115 Sometimes an organization will need to allow someone who is not located physically within its internal network to gain secure access to the intranet. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in Chapter 6 which focuses on Information Security). Sidebar: Microsoft’s SharePoint Powers the Intranet As organizations begin to see the power of collaboration
  • 30. between their employees, they often look for solutions that will allow them to leverage their intranet to enable more collaboration. Since most companies use Microsoft products for much of their computing, some are using Microsoft’s SharePoint to support employee collaboration. SharePoint provides a communication and collaboration platform that integrates seamlessly with Microsoft’s Office suite of applications. Using SharePoint, employees can share a document and edit it together, avoiding the need to email the document for others to review. Projects and documents can be managed collaboratively across the organization. Corporate documents are indexed and made available for search. Cloud Computing Cloud computing was covered in Chapter 3. The universal availability of the Internet combined with increases in
  • 31. processing 116 | Information Systems for Business and Beyond (2019) power and data-storage capacity have made cloud computing a viable option for many companies. Using cloud computing, companies or individuals can contract to store data on storage devices somewhere on the Internet. Applications can be “rented” as needed, giving a company the ability to quickly deploy new applications. The I.T. department benefits from not having to maintain software that is provided on the cloud. Sidebar: Metcalfe’s Law Just as Moore’s Law describes how computing power is increasing over time, Metcalfe’s Law describes the power of networking. Metcalfe’s Law states that the value of a telecommunications network is proportional to the square of the number of connected users of the system, or N2. If a network has 10 nodes, the inherent
  • 32. value is 100, or 102. Metcalfe’s Law is attributed to Robert Metcalfe, the co-inventor of Ethernet. It attempts to address the added value provided by each node on the network. Think about it this way: If none of your friends were on Instagram, would you spend much time there? If no one else at your school or place of work had e-mail, would it be very useful to you? Metcalfe’s Law tries to quantify this value. Summary The networking revolution has completely changed how personal computers are used. Today, no one would imagine using a computer that was not connected to one or more networks. The development Chapter 5: Networking and Communication | 117 of the Internet and World Wide Web, combined with wireless access, has made information available at our fingertips. The
  • 33. Web 2.0 revolution has made everyone potential authors of web content. As networking technology has matured, the use of Internet technologies has become a standard for every type of organization. The use of intranets and extranets has allowed organizations to deploy functionality to employees and business partners alike, increasing efficiencies and improving communications. Cloud computing has truly made information available everywhere. Study Questions 1. What were the first four locations hooked up to the Internet (ARPANET)? 2. What does the term packet mean? 3. Which came first, the Internet or the World Wide Web? 4. What was revolutionary about Web 2.0? 5. What was the so-called killer app for the Internet? 6. What does the term VoIP mean? 7. What is a LAN? 8. What is the difference between an intranet and an extranet?
  • 34. 9. What is Metcalfe’s Law? Exercises 1. What is the difference between the Internet and the World Wide Web? Create at least three statements that identify the differences between the two. 2. Who are the broadband providers in your area? What are the 118 | Information Systems for Business and Beyond (2019) prices and speeds offered? 3. Pretend you are planning a trip to three foreign countries in the next month. Consult your wireless carrier to determine if your mobile phone would work properly in those countries. What would the costs be? What alternatives do you have if it would not work? Labs 1. Check the speed of your Internet connection by going to the following web site: speedtest.net What is your download and upload speed?
  • 35. 2. What is the IP address of your computer? How did you find it? Hint for Windows: Go to the start icon and click Run. Then open the Command Line Interface by typing: cmd Then type: ipconfigWhat is your IPv4 address?What is your IPv6 address? 3. When you enter an address in your web browser, a Domain Name Server (DNS) is used to lookup the IP address of the site you are seeking. To locate the DNS server … 6 3 4 oRg aniz aTional le aRning TheoRies anD TeChnology Introduction The purpose of this chapter is to provide readers with an under- standing of organizational theory. The chapter covers some aspects of the history and context of organizational learning. It also defines and explains various learning protocols, and how they can be used to promote organizational learning. The overall objective of organiza- tional learning is to support a process that guides individuals, groups,
  • 36. and entire communities through transformation. Indeed, evidence of organizational transformation provides the very proof that learning has occurred, and that changes in behavior are occurring. What is important in this regard is that transformation remains internal to the organization so that it can evolve in a progressive manner while maintaining the valuable knowledge base that is contained within the personnel of an organization. Thus, the purpose of organiza- tional learning is to foster evolutionary transformation that will lead to change in behaviors and that is geared toward improving strategic performance. Approaches to organizational learning typically address how indi- viduals, groups, and organizations “notice and interpret information and use it to alter their fit with their environments” (Aldrich, 2001, p. 57). As such, however, organizational learning does not direct itself toward, and therefore has not been able to show, an inherent link to success—which is a critical concern for executive management. There are two perspectives on organizational learning theory. On the one hand, the adoptive approach, pioneered by Cyert and March (1963), treats organizations as goal-oriented activity systems. These
  • 37. systems generate learning when repeating experiences that have either suc- ceeded or failed, discarding, of course, processes that have failed. 6 4 INFORMATION TECHNOLO GY Knowledge development, on the other hand, treats organizations as sets of interdependent members with shared patterns of cognition and belief (Argyris & Schö n, 1996). Knowledge development empha- sizes that learning is not limited to simple trial and error, or direct experience. Instead, learning is understood also to be inferential and vicarious; organizations can generate new knowledge through experi- mentation and creativity. It is the knowledge development perspec- tive that fits conceptually and empirically with work on technological evolution and organizational knowledge creation and deployment (Tushman & Anderson, 1986). There is a complication in the field of organizational learning over whether it is a technical or social process. Scholars disagree on this point. From the technical perspective, organizational learning is about the effective processing of, interpretation of, and
  • 38. response to information both inside and outside the organization. “An organiza- tion is assumed to learn if any of its units acquires knowledge that it recognizes as potentially useful to the organization” (Huber, 1991, p. 89). From the social perspective, on the other hand, comes the con- cept that learning is “something that takes place not with the heads of individuals, but in the interaction between people” (Easterby- Smith et al., 1999, p. 6). The social approach draws from the notion that patterns of behavior are developed, via patterns of socialization, by evolving tacit knowledge and skills. There is, regrettably, a lack of ongoing empirical investigation in the area of organizational learning pertaining, for example, to in-depth case studies, to micropractices within organizational settings, and to processes that lead to outcomes. Indeed, measuring learning is a difficult process, which is why there is a lack of research that focuses on outputs. As Prange (1999, p. 24) notes: “The multitude of ways in which organizational learning has been classified and used purports an ‘organizational learning jungle,’ which is becoming progressively dense and impenetrable.” Mackenzie (1994, p. 251) laments that what the “scientific community
  • 39. devoted to organizational learning has not produced discernable intellectual progress.” Ultimately, organizational learning must provide transformation that links to performance. Most organizations seeking improved per- formance expect changes that will support new outcomes. The study of organizational learning needs an overarching framework under which 6 5orGAnIz AtIonAl le ArnInG theorIes an inquiry into the pivotal issues surrounding organizational change can be organized. Frameworks that support organizational learning, whether their orientation is on individuals, groups, or infrastructure, need to allow for natural evolution within acceptable time frames for the organization. This is the problem of organizational learning the- ory. It lacks a method of producing measurable results that executives can link to performance. While scholars seek outcomes through stra- tegic learning, there must be tangible evidence of individual and orga- nizational performance to ensure future investments in the concepts of learning. Technology, we should remember, represents the
  • 40. oppor- tunity to provide outcomes through strategic learning that addresses transitions and transformations over a specific life cycle. We saw this opportunity occur in the Ravell case study; the information technology (IT) department used organizational learn- ing. Specifically, individual reflective practices were used to provide measurable outcomes for the organization. In this case, the out- comes related to a specific event, the physical move of the business to a different location. Another lesson we can derive (with hindsight) from the Ravell experience is that learning was converted to strategic benefit for the organization. The concept of converting learning to strategic benefit was pioneered by Pietersen (2002). He established a strategic learning cycle composed of four component processes that he identified with the action verbs learn, focus, align, and execute. These are stages in the learning cycle, as follows: 1. Learn: Conduct a situation analysis to generate insights into the competitive environment and into the realities of the company. 2. Focus: Translate insights into a winning proposition that out- lines key priorities for success. 3. Align: Align the organization and energize the people behind
  • 41. the new strategic focus. 4. Execute: Implement strategy and experiment with new con- cepts. Interpret results and continue the cycle. At Ravell, technology assisted in driving the learning cycle because, by its dynamic nature, it mandated the acceleration of the cycle that Pietersen (2002) describes in his stage strategy of implementation. Thus, Ravell required the process Pietersen outlined to occur within 6 6 INFORMATION TECHNOLO GY 6 months, and therein established the opportunity to provide outcomes. It also altered the culture of the organization (i.e., the evolution in cul- ture was tangible because the transformation was concrete). We see from the Ravell case that technology represents the best opportunity to apply organizational learning techniques because the use of it requires forms of evolutionary-related change. Organizations are continually seeking to improve their operations and competi- tive advantage through efficiency and effective processes. As I have discussed in previous chapters, today’s businesses are experiencing technological dynamism (defined as causing accelerated and
  • 42. dynamic transformations), and this is due to the advent of technologically driven processes. That is, organizations are experiencing more pressure to change and compete as a result of the accelerations that technology has brought about. Things happen quicker, and more unpredictably, than before. This situation requires organizations to sense the need for change and execute that change. The solution I propose is to tie orga- nizational theory to technological implementation. Another way of defining this issue is to provide an overarching framework that orga- nizes an inquiry into the issues surrounding organizational change. Another dimension of organizational learning is political. Argyris (1993) and Senge (1990) argue that politics gets “in the way of good learning.” In my view, however, the political dimension is very much part of learning. It seems naï ve to assume that politics can be elimi- nated from the daily commerce of organizational communication. Instead, it needs to be incorporated as a factor in organizational learn- ing theory rather than attempting to disavow or eliminate it, which is not realistic. Ravell also revealed that political factors are simply part
  • 43. of the learning process. Recall that during my initial efforts to create a learning organization there were IT staff members who deliberately refused to cooperate, assuming that they could “outlast” me in my interim tenure as IT director. But politics, of course, is not limited to internal department negotiations; it was also a factor at Ravell with, and among, departments outside IT. These interdepartmental rela- tionships applied especially to line managers, who became essential advocates for establishing and sustaining necessary forms of learning at the organizational level. But, not all line managers responded with the same enthusiasm, and a number of them did not display a sense of authentically caring about facilitating synergies across departments. 6 7orGAnIz AtIonAl le ArnInG theorIes The irrepressible existence of politics in social organizations, however, must not in itself deter us from implementing organizational learn- ing practices; it simply means that that we must factor it in as part of the equation. At Ravell, I had to work within the constraints of both internal and external politics. Nevertheless, in the end I
  • 44. was able to accomplish the creation of a learning organization. Another way one might look at the road bumps of politics is to assume that they will temporarily delay or slow the implementation of organizational learning initiatives. But, let us make no mistake about the potentially disruptive nature of politics because, as we know, in its extreme cases of inflexibility, it can be damaging. I have always equated politics with the dilemma of blood cholesterol. We know that there are two types of cholesterol: “good” cholesterol and “bad” cholesterol. We all know that bad cholesterol in your blood can cause heart disease, among other life-threatening conditions. However, good cholesterol is essential to the body. My point is simple; the general word politics can have damaging perceptions. When most people discuss the topic of cholesterol, they focus on the bad type, not the good. Such is the same with politics—that is, most individuals dis- cuss the bad type, which often corresponds with their personal expe- riences. My colleague Professor Lyle Yorks, at Columbia University, often lectures on the importance of politics and its positive aspects for establishing strategic advocacy, defined as the ability to
  • 45. establish per- sonal and functional influence through cultivating alliances through defining opportunities for the adding value to either the top or bottom line (Langer & Yorks, 2013). Thus, politics can add value for indi- viduals by allowing them to initiate and influence relationships and conversations with other leaders. This, then, is “good” politics! North American cultural norms account for much of what goes into organizational learning theory, such as individualism, an empha- sis on rationality, and the importance of explicit, empirical informa- tion. IT, on the other hand, has a broadening, globalizing effect on organizational learning because of the sheer increase in the number of multicultural organizations created through the expansion of global firms. Thus, technology also affects the social aspects of organizational learning, particularly as it relates to the cultural evolution of commu- nities. Furthermore, technology has shown us that what works in one culture may not work in another. Dana Deasy, the former CIO of the 6 8 INFORMATION TECHNOLO GY Americas region/sector for Siemens AG, experienced the
  • 46. difficulties and challenges of introducing technology standards on a global scale. He quickly learned that what worked in North America did not oper- ate with the same expectations in Asia or South America. I discuss Siemens AG as a case study in Chapter 8. It is my contention, however, that technology can be used as an intervention that can actually increase organizational learning. In effect, the implementation of organizational learning has lacked and has needed concrete systemic processes that show results. A solution to this need can be found, as I have found it, in the incorporation of IT itself into the process of true organizational learning. The prob- lem with IT is that we keep trying to simplify it—trying to reduce its complexity. However, dealing with the what, when, and how of working with technology is complex. Organizations need a kind of mechanism that can provide a way to absorb and learn all of the com- plex pieces of technology. It is my position that organizational change often follows learn- ing, which to some extent should be expected. What controls whether change is radical or evolutionary depends on the basis on which new processes are created (Argyris & Schö n, 1996; Senge, 1990;
  • 47. Swieringa & Wierdsma, 1992). Indeed, at Ravell the learning fol- lowed the Argyris and Schö n approach: that radical change occurs when there are major events that support the need for accelerated change. In other words, critical events become catalysts that promote change, through reflection. On the other hand, there can be non- event-related learning, that is not so much radical in nature, as it is evolutionary. Thus, evolutionary learning is characterized as an ongo- ing process that slowly establishes the need for change over time. This evolutionary learning process compares to what Senge (1990, p. 15) describes as “learning in wholes as opposed to pieces.” This concept of learning is different from an event-driven perspec- tive, and it supports the natural tendency that groups and organiza- tions have to protect themselves from open confrontation and critique. However, technology provides an interesting variable in this regard. It is generally accepted as an agent of change that must be addressed by the organization. I believe that this agency can be seized as an opportunity to promote such change because it establishes a reason why organizations need to deal with the inevitable transitions brought
  • 48. 6 9orGAnIz AtIonAl le ArnInG theorIes about by technology. Furthermore, as Huysman (1999) points out, the history of organizational learning has not often created measurable improvement, particularly because implementing the theories has not always been efficient or effective. Much of the impetus for implement- ing a new technology, however, is based on the premise that its use will result in such benefits. Therefore, technology provides compelling reasons for why organizational learning is important: to understand how to deal with agents of change, and to provide ongoing changes in the processes that improve competitive advantage. There is another intrinsic issue here. Uses of technology have not always resulted in efficient and effective outcomes, particularly as they relate to a firm’s expected ROI. In fact, IT projects often cost more than expected and tend to be delivered late. Indeed, research performed by the Gartner Group and CIO Magazine (Koch, 1999) reports that 54% of IT projects are late and that 22% are never com- pleted. In May 2009, McGraw reported similar trends, so industry
  • 49. performance has not materially improved. This is certainly a disturb- ing statistic for a dynamic variable of change that promises outcomes of improved efficiency and effectiveness. The question then is why is this occurring? Many scholars might consider the answer to this ques- tion as complex. It is my claim, however, based on my own research, that the lack of organizational learning, both within IT and within other departments, poses, perhaps, the most significant barrier to the success of these projects in terms of timeliness and completion. Langer (2001b) suggests that the inability of IT organizations to understand how to deal with larger communities within the organization and to establish realistic and measurable outcomes are relevant both to many of the core values of organizational learning and to its importance in attaining results. What better opportunity is there to combine the strengths and weaknesses of each of IT and organizational learning? Perhaps what is most interesting—and, in many ways, lacking within the literature on organizational learning—is the actual way individuals learn. To address organizational learning, I believe it is imperative to address the learning styles of individuals within the
  • 50. organization. One fundamental consideration to take into account is that of individual turnover within departments. Thus, methods to measure or understand organizational learning must incorporate the individual; how the individual learns, and what occurs when 70 INFORMATION TECHNOLO GY individuals change positions or leave, as opposed to solely focusing on the event-driven aspect of evolutionary learning. There are two sociological positions about how individual learning occurs. The first suggests that individual action derives from determining influences in the social system, and the other suggests that it emanates from individual action. The former proposition supports the concept that learning occurs at the organizational, or group level, and the lat- ter supports it at the individual level of action and experience. The “system” argument focuses on learning within the organization as a whole and claims that individual action functions within its boundar- ies. The “individual” argument claims that learning emanates from the individual first and affects the system as a result of outcomes from individual actions. Determining a balance between individual
  • 51. and organizational learning is an issue debated by scholars and an impor- tant one that this book must address. Why is this issue relevant to the topic of IT and organizational learning? Simply put, understanding the nature of evolving technolo- gies requires that learning—and subsequent learning outcomes—will be heavily affected by the processes in which it is delivered. Therefore, without understanding the dynamics of how individuals and organi- zations learn, new technologies may be difficult to assimilate because of a lack of process that can determine how they can be best used in the business. What is most important to recognize is the way in which responsive organizational dynamism (ROD) needs both the system and individual approaches. Huysman (1999) suggests (and I agree) that organizational versus individual belief systems are not mutually exclusive pairs but dualities. In this way, organizational processes are not seen as just top-down or bottom-up affairs, but as accumulations of history, assimilated in organizational memory, which structures and positions the agency or capacity for learning. In a similar way, organizational learning can be seen as occurring through the actions
  • 52. of individuals, even when they are constrained by institutional forces. The strategic integration component of ROD lends itself to the system model of learning to the extent that it almost mandates change— change that, if not addressed, will inevitably affect the competitive advantage of the organization. On the other hand, the cultural assim- ilation component of ROD is also involved because of its effect on individual behavior. Thus, the ROD model needs to be expanded to 71orGAnIz AtIonAl le ArnInG theorIes show the relationship between individual and organizational learning as shown in Figure 4.1. An essential challenge to technology comes from the fact that organizations are not sure about how to handle its overall potential. Thus, in a paradoxical way, this quandary provides a springboard to learning by utilizing organizational learning theories and concepts to create new knowledge, by learning from experience, and ultimately by linking technology to learning and performance. This perspective can be promoted from within the organization because chief executives are generally open to investing in learning as long as core
  • 53. business principles are not violated. This position is supported by my research with chief executives that I discussed in Chapter 2. Organizational dynamism Acceleration of events that require different infrastructures and organizational processes Requires Strategic integration Cultural assimilation Organization structures (system) Individual actions Renegotiation of relationship Organizational learning techniques Symptoms and implications
  • 54. Technology Figure 4.1 ROD and organizational learning. 72 INFORMATION TECHNOLO GY Organizational learning can also assist in the adoption of technologies by providing a mechanism to help individuals manage change. This notion is consistent with Aldrich (2001), who observes that many organizations reject technology-driven changes or “pio- neering ventures,” which he called competence-destroying ventures because they threaten existing norms and processes. Organizations would do well to understand the value of technology, particularly for those who adopt it early (early adopters), and how it can lead to com- petitive advantages. Thus, organizations that position themselves to evolve, to learn, and to create new knowledge are better prepared to foster the handling, absorption, and acceptance of technology- driven change than those that are not. Another way to view this ethic is to recognize that organizations need to be “ready” to deal with change— change that is accelerated by technology innovations. Although Aldrich (2001) notes that organizational learning has not been
  • 55. tied to performance and success, I believe it will be the technology revolu- tion that establishes the catalyst that can tie organizational learning to performance. The following sections of this chapter expand on the core concept that the success of ROD is dependent on the uses of organizational learning techniques. In each section, I correlate this concept to many of the organizational learning theories and show how they can be tailored and used to provide important outcomes that assist the pro- motion of both technological innovation and organizational learning. Learning Organizations Business strategists have realized that the ability of an organization to learn faster, or “better,” than its competitors may indeed be the key to long-term business success (Collis, 1994; Dodgson, 1993; Grant, 1996; Jones, 1975). A learning organization is defined as a form of organization that enables, in an active sense, the learning of its mem- bers in such a way that it creates positive outcomes, such as innovation, efficiency, improved alignment with the environment, and competi-
  • 56. tive advantage. As such, a learning organization is one that acquires knowledge from within. Its evolution, then, is primarily driven by itself without the need for interference from outside forces. In this sense, it is a self-perpetuating and self-evolving system of individual 73orGAnIz AtIonAl le ArnInG theorIes and organizational transformations integrated into the daily processes of the organization. It should be, in effect, a part of normal organiza- tional behavior. The focus of organizational learning is not so much on the process of learning but more on the conditions that allow suc- cessful outcomes to flourish. Learning organization literature draws from organizational learning theory, particularly as it relates to inter- ventions based on outcomes. This provides an alternative to social approaches. In reviewing these descriptions of what a learning organization does, and why it is important, we can begin to see that technology may be one of the few agents that can actually show what learning organi- zations purport to do. Indeed, Ravell created an evolving population
  • 57. that became capable of dealing with environmental changes brought on by technological innovation. The adaptation of these changes created those positive outcomes and improved efficiencies. Without organizational learning, specifically the creation of a learning organi- zation, many innovations brought about by technology could produce chaos and instability. Organizations generally tend to suffer from, and spend too much time reflecting on, their past dilemmas. However, given the recent phenomenon of rapid changes in technology, orga- nizations can no longer afford the luxury of claiming that there is simply too much else to do to be constantly worrying about technol- ogy. Indeed, Lounamaa and March (1987) state that organizations can no longer support the claim that too-frequent changes will inhibit learning. The fact is that such changes must be taken as evolutionary, and as a part of the daily challenges facing any organization. Because a learning organization is one that creates structure and strategies, it is positioned to facilitate the learning of all its members, during the ongoing infiltration of technology-driven agents of change. Boland et al. (1994) show that information systems based on multimedia technologies may enhance the appreciation of diverse
  • 58. interpretations within organizations and, as such, support learning organizations. Since learning organizations are deliberately created to facilitate the learning of their members, understanding the urgency of technologi- cal changes can provide the stimulus to support planned learning. Many of the techniques used in the Ravell case study were based on the use of learning organizational techniques, many of which were pioneered by Argyris and Schö n (1996). Their work focuses on using 74 INFORMATION TECHNOLO GY “action science” methods to create and maintain learning organiza- tions. A key component of action science is the use of reflective prac- tices—including what is commonly known among researchers and practitioners as reflection in action and reflection on action. Reflection with action is the term I use as a rubric for these various methods, involving reflection in relation to activity. Reflection has received a number of definitions, from different sources in the literature. Depending on the emphasis, whether on theory or practice, defini-
  • 59. tions vary from philosophical articulation (Dewey, 1933; Habermas, 1998), to practice-based formulations, such as Kolb’s (1984b) use of reflection in the experiential learning cycle. Specifically, reflection with action carries the resonance of Schö n’s (1983) twin constructs: reflection on action and reflection in action, which emphasize reflec- tion in retrospect, and reflection to determine which actions to take in the present or immediate future, respectively. Dewey (1933) and Hullfish and Smith (1978) also suggest that the use of reflection sup- ports an implied purpose: individuals reflect for a purpose that leads to the processing of a useful outcome. This formulation suggests the possibility of reflection that is future oriented—what we might call “reflection to action.” These are methodological orientations covered by the rubric. Reflective practices are integral to ROD because so many technology-based projects are event driven and require individu- als to reflect before, during, and after actions. Most important to this process is that these reflections are individually driven and that technology projects tend to accelerate the need for rapid decisions. In other words, there are more dynamic decisions to be made in
  • 60. less time. Without operating in the kind of formation that is a learning organization, IT departments cannot maintain the requisite infra- structure to develop products timely on time and support business units—something that clearly is not happening if we look at the existing lateness of IT projects. With respect to the role of reflec- tion in general, the process can be individual or organizational. While groups can reflect, it is in being reflective that individuals bring about “an orientation to their everyday lives,” according to Moon (1999). “For others reflection comes about when conditions in the learning environment are appropriate” (p. 186). However, IT departments have long suffered from not having the conditions 75orGAnIz AtIonAl le ArnInG theorIes to support such an individual learning environment. This is why implementing a learning organization is so appealing as a remedy for a chronic problem. Communities of Practice Communities of practice are based on the assumption that learning starts with engagement in social practice and that this practice is the
  • 61. fundamental construct by which individuals learn (Wenger, 1998). Thus, communities of practice are formed to get things done by using a shared way of pursuing interest. For individuals, this means that learning is … Assignment 1 Textbook:Information Systems for Business and Beyond Please answer the following From Chapter 5 – study questions 1-9, Exercise 1 From Chapter 6 – study questions 1-10, Exercise 6, & 7 All the above questions should be submitted in one Word document Please understand that Plagiarism will not be tolerated and will result in a zero grade. Submission Requirements Font: Times New Roman, size 12, double-space Citation Style: APA Length: At-least 4 pages, make sure not to limit your work to 4 pages, but answer all the questions. If you can do it 3 pages work for me as long as you answered all the questions. References: Please use citations and references where appropriate No Plagiarism Assignment 2 Textbook:Information Technology and Organizational Learning Please answer the Following From Chapter 4 – Review the section on Linear Development in Learning Approaches. Discuss how learning changes over time impact organizational culture. What is the impact of this cultural change on the success of IT projects? From Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections. Note the
  • 62. various roles in the organization and note the similarities and differences within each role. Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization. Submission Requirements Font: Times New Roman, size 12, double-space Length: At one page for each chapter (total pages should be 2) Citation Style: APA References: Please use citations and references where appropriate No Plagiarism The above submission should adhere to APA formatting standards. Remember the page length does not include the APA cover page or any references. Please understand that Plagiarism will not be tolerated and will result in a zero grade.