SlideShare a Scribd company logo
1 of 28
Part II. Data and Network Infrastructure




                                         C hapter 4
                                         Network Management
                                         and Mobility



                  M a n a g e m e n t I n fo r m a t i o n S y s te m s
                  EIMBA




Copyright 2012 John Wiley & Sons, Inc.
                                                                                    4-1
Chapter 4 Outline

4.1 Business Networks

4.2 Wireless Broadband Networks

4.3 Network Management and Portals

4.4 Collaboration

4.5 Green, Legal, and Ethical Issues



Copyright 2012 John Wiley & Sons, Inc.
                                         4-2
Chapter 4 Learning Objectives

    Describe networks, standards, and mobility.
    Discuss network and collaboration technologies.
    Understand 4G and other mobile networks.
    Describe group work technologies.
    Evaluate green, social, and ethical issues related to
     the use and operations of networks.


Copyright 2012 John Wiley & Sons, Inc.
                                                         4-3
For Class Discussion & Debate
World's First 4G WiMAX Rail Network

Scenario for Brainstorming & Discussion (see book for full text)
a) Discuss potential consequences of the 4G WiMAX/Wi-Fi Rail Network.
   What constraints have been eliminated?
b) Assume that other cities have implemented similar systems and that
   commuters own mobiles with the latest mobile OS. Brainstorm some far-
   reaching impacts of such a networked transportation system in the U.S.
c) Identify several risks or negative unintended consequences. Discuss your
   estimate of their costs--both financial and non-financial ones.
d) What impact might this network have on other transportation methods?
   Would those changes be helpful or harmful to the environment?
e) How do all taxpayers benefit from this tax-supported network?


Copyright 2012 John Wiley & Sons, Inc.
                                                                              4-4
Debate (see book for full text)

a)       Identify 4 business-related risks that you face as a user who relies on the
         DOT network; and how those risks might impact you or your job.

b)       Assume that each risk actually happened. Debate the following:
         Who is responsible or is no one responsible of the consequences of each
         one? Take the position that it’s:
     •       no one’s fault (“technology crashes happen”)
     •       the DOT’s fault as the provider, or
     •        the user’s fault
             That is, when things go wrong with the network, who gets the blame
             and who suffers the consequences?



 Copyright 2012 John Wiley & Sons, Inc.
                                                                                   4-5
4.1 Business Networks

Business networks support 4 basic functions:
      1. mobility

      2. collaboration

      3. relationships

      4. Search

             Common to all network functions are traffic and the
             circuits that transmit the traffic.


Copyright 2012 John Wiley & Sons, Inc.
                                                                   4-6
Network basics




       Figure 4.2 A signal is transmitted from a sender/source to a
       receiver/destination via circuit or packet switching.




Copyright 2012 John Wiley & Sons, Inc.
                                                                      4-7
Switching: transmission of the signal
    Circuit switching: Circuit switching is older technology that
     was used for telephone calls. Plain old telephone service
     (POTS) and most wired telephone calls are transmitted, at
     least in part, over a dedicated circuit.

    Packet switching: The path of the signal is digital, and is
     neither dedicated nor exclusive. A file is broken into smaller
     blocks, called packets.


                           Figure 4.3 Wireless routers use
                              antennae to transmit signals

Copyright 2012 John Wiley & Sons, Inc.
                                                                      4-8
Network Terminology
    Bandwidth: Throughput capacity or speed of a network.
    Protocol: Standards that govern how networked devices
     exchange information.
    TCP/IP: Transmission control protocol/Internet Protocol) are a
     suite of Internet protocols.
    Broadband: Short for broad bandwidth.
       • Fixed-line broadband: Cable or DSL Internet connections.
       • Mobile broadband: Wireless high-speed Internet access through a
         portable modem, phone, or other device.




Copyright 2012 John Wiley & Sons, Inc.
                                                                           4-9
3G and 4G networks
  3G: Short for third generation of cellular telecommunications
    technology.
  4G: Short for fourth generation. 4G mobile network standards
    enable faster data transfer rates.

       Users can get 4G wireless connectivity through one of two
       standards:
        1. WiMAX
        2. LTE (Long-Term Evolution)



Copyright 2012 John Wiley & Sons, Inc.
                                                                   4-10
4.2 Wireless Broadband Networks

    Enterprises are moving away from unsystematic adoption
     of mobile devices and infrastructure to a strategic build-
     out of mobile capabilities.
       • But identifying strategic technologies and avoiding
         wasted investments is difficult.
    Mobile infrastructure consists of
     technology, software, support, security measures, and
     devices to manage and deliver wireless communications.




Copyright 2012 John Wiley & Sons, Inc.
                                                                  4-11
Figure 4.4
 How Wi-Fi works
 Wi-Fi allows computers to
 share a network wirelessly
 without connecting to a
 commercial network.




Copyright 2012 John Wiley & Sons, Inc.   4-12
WiMAX: a broadband
                                              wireless metropolitan
                                              area network (MAN)
                                              access standard that
                                              can deliver voice and
                                              data at distances of
Figure 4.5 WiMAX/Wi-Fi network architecture   30 miles



                                                            4-13
4.3 Networks Management and Portals

    When the network goes down or access is blocked, so does
     the ability to operate or function.
    Damages when a company cannot operate or fulfill orders include:
       • lost sales and productivity
       • Inability to send and receive payments
       • inability to process payroll and inventory
    Network infrastructure alone does not improve business
     performance. It’s how network capabilities combine with other IT
     to support employees, connect remote locations, service
     customers, and coordinate with supply chain partners.


Copyright 2012 John Wiley & Sons, Inc.
                                                                    4-14
Figure 4.6 Model
                                         of
                                         Network, Collabo
                                         ration, and
                                         Performance
                                         Relationship


Copyright 2012 John Wiley & Sons, Inc.
                                                     4-15
IT at Work 4.1

    Check page 102




Copyright 2012 John Wiley & Sons, Inc.
                                         16
TCP/IP Networks

    The Internet protocol suite consists of the IP (Internet
     Protocol) and TCP (Transport Control Protocol), or TCP/IP.

    In preparation for transmission, data are digitized into packets
     and sent via packet-switched networks, local area networks
     (LAN), or wide area networks (WAN).

    Voice over IP (VoIP), or IP telephony, involves an analog-to-
     digital conversion. Voice and data transmissions travel over
     telephone wires in packets.



Copyright 2012 John Wiley & Sons, Inc.
                                                                  4-17
Internet Application Categories

    Discovery or search. Discovery involves browsing, finding, and
     retrieving information.
    Communication. Developments in Internet-based and
     wireless communication such as podcasting, RSS, and micro-
     blogging transform business communications, marketing
     channels, and supply chain management
    Collaboration. Tools and technologies are available, ranging
     from online meetings with screen sharing to
     videoconferencing and group support systems.


Copyright 2012 John Wiley & Sons, Inc.
                                                                4-18
Figure 4.9 Overview of enterprise search.


Copyright 2012 John Wiley & Sons, Inc.
                                                                        4-19
Network Computing Infrastructures

    Intranets: a network serving the internal informational needs
     of a company.

    Extranets: private, company-owned network that uses IP
     technology to securely share part of a business’s information
     or operations with suppliers, vendors, partners, customers, or
     other businesses.
    Extranets can use virtual private networks (VPNs). VPNs are
     created using specialized software and hardware to
     encrypt/send/decrypt transmissions over the Internet.


Copyright 2012 John Wiley & Sons, Inc.
                                                                4-20
Figure 4.7 Virtual Private Network (VPN)
Copyright 2012 John Wiley & Sons, Inc.
                                                         4-21
4.4 Collaboration

Messaging and collaboration tools include:
 older communications media such as e-
  mail, videoconferencing, fax, and IM
 newer media such as
  blogs, podcasts, RSS, wikis, VoIP, Web
  meetings, and torrents (for sharing very large
  files)


Copyright 2012 John Wiley & Sons, Inc.
                                               4-22
Group Decision Processes

Benefits of working in groups:
    Groups tend to be better than individuals at understanding problems.
    Group members have their egos embedded in the decision, and so they
     will be committed to the solution.
    A group has more information (knowledge) than any one member. Groups
     can leverage this knowledge to create new knowledge.
    Groups are better than individuals at catching errors.


     Despite the benefits of collaborative work, groups are not
     always successful.



Copyright 2012 John Wiley & Sons, Inc.
                                                                      4-23
Collaboration Support Technologies

    Portals, intranets, extranets, and shared workspaces are
     examples.
    Web 2.0 or Enterprise 2.0 technologies such as
     wikis, blogs and microblogs, provide more options to
     promote and support enterprise collaboration.




Copyright 2012 John Wiley & Sons, Inc.
                                                                4-24
IT at Work 4.4

    Check page 112




Copyright 2012 John Wiley & Sons, Inc.
                                         25
4.5 Green, Legal, and Ethical Issues

    Managers need to consider ethical and social issues, such as
     quality of working life.

    Workers will experience both positive and negative impacts
     from being linked to a 24/7 workplace environment, working
     in computer-contrived virtual teams, and being connected to
     handhelds whose impact on health can be damaging.




Copyright 2012 John Wiley & Sons, Inc.
                                                                4-26
Risks and Ethical Issues

    Driving while distracted

    Health

    Personal time

    RF emissions and SAR
       • specific absorption rate, or SAR, is a way of measuring the quantity of
         radio frequency (RF) energy that is absorbed by the body.

    Life out of control



Copyright 2012 John Wiley & Sons, Inc.
                                                                             4-27
Chapter 4 Link Library
•      Google Wave http://wave.google.com/ video wave.google.com/about.html#video
•      Twitter network status http://status.twitter.com/
•      Azulstar http://azulstar.com/
•      Clear 4G WiMAX http://clear.com
•      International CTIA Wireless Tradeshows http://ctiawireless.com/
•      Cisco http://cisco.com
•      Microsoft SharePoint 2010 http://sharepoint.microsoft.com/Pages/Default.aspx
•      Cellular Telecommunications Industry Association http://ctia.org/
•      WiMAX Forum http://wimaxforum.org
•      Packet switching flash demo
       http://pbs.org/opb/nerds2.0.1/geek_glossary/packet_switching_flash.html
•      Cell phone radiation levels (SAR) http://reviews.cnet.com/2719-6602_7-291-
       2.html?tag=
•      Kaiser Permanente HealthConnect video http://youtube.com/kaiserpermanenteorg
    Copyright 2012 John Wiley & Sons, Inc.
                                                                                      4-28

More Related Content

What's hot

Essential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeEssential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeUnified Communications Online
 
The uc journey_10_18
The uc journey_10_18The uc journey_10_18
The uc journey_10_18arif muhamad
 
Huddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddleHQ
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemIron Mountain
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMChristopher Wynder
 
Digital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdoxDigital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdoxChristopher Wynder
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for EmployeesLeo de Sousa
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge ManagementMeenakshi Paul
 
Compliance With Data Security Policies
Compliance With Data Security PoliciesCompliance With Data Security Policies
Compliance With Data Security PoliciesHongyang Wang
 
Web Conferencing for SMBs
Web Conferencing for SMBs Web Conferencing for SMBs
Web Conferencing for SMBs ReadyTalk
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2olambel
 
eCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMIeCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMIBahman Moghimi
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2Donald Jennings
 

What's hot (20)

Big Data in Context
Big Data in ContextBig Data in Context
Big Data in Context
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 
Essential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeEssential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscape
 
The uc journey_10_18
The uc journey_10_18The uc journey_10_18
The uc journey_10_18
 
Huddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File Sync
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECM
 
Digital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdoxDigital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdox
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge Management
 
IBS Assessment 1
IBS Assessment 1IBS Assessment 1
IBS Assessment 1
 
Enterprise 2.0 General
Enterprise 2.0 GeneralEnterprise 2.0 General
Enterprise 2.0 General
 
MIS chap # 4.......
MIS chap # 4.......MIS chap # 4.......
MIS chap # 4.......
 
Compliance With Data Security Policies
Compliance With Data Security PoliciesCompliance With Data Security Policies
Compliance With Data Security Policies
 
Web Conferencing for SMBs
Web Conferencing for SMBs Web Conferencing for SMBs
Web Conferencing for SMBs
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
eCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMIeCommerce session 3 MOGHIMI
eCommerce session 3 MOGHIMI
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 
Ccs16
Ccs16Ccs16
Ccs16
 

Viewers also liked

Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)MShuibMJ
 
Strategic Management and Information Technology Outsourcing
Strategic Management and Information Technology OutsourcingStrategic Management and Information Technology Outsourcing
Strategic Management and Information Technology OutsourcingFarooq Omar
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programshaider ali
 
1st know the features & functions of information systems
1st know the features & functions of information systems1st know the features & functions of information systems
1st know the features & functions of information systemsBronte666
 
GreenTrac
GreenTracGreenTrac
GreenTracalfer0
 
Semillas Que Germinan
Semillas Que GerminanSemillas Que Germinan
Semillas Que Germinanchucho1943
 
INTERACTIVE INTELLIGENCE Expocontact11
INTERACTIVE INTELLIGENCE Expocontact11INTERACTIVE INTELLIGENCE Expocontact11
INTERACTIVE INTELLIGENCE Expocontact11expocontact
 
LA CIUDAD MODERNA EN LA POÉTICA DE OLIVERIO GIRONDO
LA CIUDAD MODERNA EN LA POÉTICA DE OLIVERIO GIRONDOLA CIUDAD MODERNA EN LA POÉTICA DE OLIVERIO GIRONDO
LA CIUDAD MODERNA EN LA POÉTICA DE OLIVERIO GIRONDOAcadémica USACH, UCSH y UNAB
 
Michael Levin - MatrixNet Applications at Yandex
Michael Levin - MatrixNet Applications at YandexMichael Levin - MatrixNet Applications at Yandex
Michael Levin - MatrixNet Applications at YandexMachine Learning Prague
 
Edificio Oficinas de Peyber
Edificio Oficinas de PeyberEdificio Oficinas de Peyber
Edificio Oficinas de Peybergrupo Peyber
 
Persönliches Wissensmanagement mit Semantischen Technologien
Persönliches Wissensmanagement mit Semantischen TechnologienPersönliches Wissensmanagement mit Semantischen Technologien
Persönliches Wissensmanagement mit Semantischen TechnologienMax Völkel
 
Nec2011 cap.7-construccion con madera-021412
Nec2011 cap.7-construccion con madera-021412Nec2011 cap.7-construccion con madera-021412
Nec2011 cap.7-construccion con madera-021412maupq
 

Viewers also liked (20)

Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Information technology for management (6th edition)
Information technology for management (6th edition)Information technology for management (6th edition)
Information technology for management (6th edition)
 
Strategic Management and Information Technology Outsourcing
Strategic Management and Information Technology OutsourcingStrategic Management and Information Technology Outsourcing
Strategic Management and Information Technology Outsourcing
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programs
 
1st know the features & functions of information systems
1st know the features & functions of information systems1st know the features & functions of information systems
1st know the features & functions of information systems
 
GreenTrac
GreenTracGreenTrac
GreenTrac
 
09 (2008)
09 (2008)09 (2008)
09 (2008)
 
English10 bestcommu
English10 bestcommuEnglish10 bestcommu
English10 bestcommu
 
ESTUDIO DE MERCADO - PARTE III
ESTUDIO DE MERCADO - PARTE IIIESTUDIO DE MERCADO - PARTE III
ESTUDIO DE MERCADO - PARTE III
 
Mie kocok cirebon
Mie kocok cirebonMie kocok cirebon
Mie kocok cirebon
 
Semillas Que Germinan
Semillas Que GerminanSemillas Que Germinan
Semillas Que Germinan
 
INTERACTIVE INTELLIGENCE Expocontact11
INTERACTIVE INTELLIGENCE Expocontact11INTERACTIVE INTELLIGENCE Expocontact11
INTERACTIVE INTELLIGENCE Expocontact11
 
LA CIUDAD MODERNA EN LA POÉTICA DE OLIVERIO GIRONDO
LA CIUDAD MODERNA EN LA POÉTICA DE OLIVERIO GIRONDOLA CIUDAD MODERNA EN LA POÉTICA DE OLIVERIO GIRONDO
LA CIUDAD MODERNA EN LA POÉTICA DE OLIVERIO GIRONDO
 
Michael Levin - MatrixNet Applications at Yandex
Michael Levin - MatrixNet Applications at YandexMichael Levin - MatrixNet Applications at Yandex
Michael Levin - MatrixNet Applications at Yandex
 
Intro ch 01_a
Intro ch 01_aIntro ch 01_a
Intro ch 01_a
 
Edificio Oficinas de Peyber
Edificio Oficinas de PeyberEdificio Oficinas de Peyber
Edificio Oficinas de Peyber
 
Persönliches Wissensmanagement mit Semantischen Technologien
Persönliches Wissensmanagement mit Semantischen TechnologienPersönliches Wissensmanagement mit Semantischen Technologien
Persönliches Wissensmanagement mit Semantischen Technologien
 
Decor arte
Decor arteDecor arte
Decor arte
 
Curso SMTP avanzado
Curso SMTP avanzadoCurso SMTP avanzado
Curso SMTP avanzado
 
Nec2011 cap.7-construccion con madera-021412
Nec2011 cap.7-construccion con madera-021412Nec2011 cap.7-construccion con madera-021412
Nec2011 cap.7-construccion con madera-021412
 

Similar to Chapter 04 it-8ed-volonino

101CHAPTER 4Networks, Collaborative Technology,
101CHAPTER 4Networks, Collaborative Technology, 101CHAPTER 4Networks, Collaborative Technology,
101CHAPTER 4Networks, Collaborative Technology, SantosConleyha
 
101CHAPTER 4Networks, Collaborative Technology,
101CHAPTER 4Networks, Collaborative Technology, 101CHAPTER 4Networks, Collaborative Technology,
101CHAPTER 4Networks, Collaborative Technology, BenitoSumpter862
 
Review of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE NetworkReview of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE Networkijsrd.com
 
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docxalinainglis
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesIOSR Journals
 
4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networksPraveen Kumar
 
4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networkseXplanoTech
 
Investor presentation december 2011
Investor presentation december 2011Investor presentation december 2011
Investor presentation december 2011Satyawan Jangra
 
Chapter 4Networks for EfficientOperations andSustainabilit.docx
Chapter 4Networks for EfficientOperations andSustainabilit.docxChapter 4Networks for EfficientOperations andSustainabilit.docx
Chapter 4Networks for EfficientOperations andSustainabilit.docxchristinemaritza
 
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFIA CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFIJose Katab
 
It for management on demand strategies for performance, growth,
It for management on demand strategies for performance, growth,It for management on demand strategies for performance, growth,
It for management on demand strategies for performance, growth,ssuserd93c47
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksAerohive Networks
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access NetworksArchitecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access NetworksCisco Service Provider
 
Taking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadTaking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadVideoBeet.TV
 
Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Leng Kimlieng
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communicationMuhd Airil
 

Similar to Chapter 04 it-8ed-volonino (20)

101CHAPTER 4Networks, Collaborative Technology,
101CHAPTER 4Networks, Collaborative Technology, 101CHAPTER 4Networks, Collaborative Technology,
101CHAPTER 4Networks, Collaborative Technology,
 
101CHAPTER 4Networks, Collaborative Technology,
101CHAPTER 4Networks, Collaborative Technology, 101CHAPTER 4Networks, Collaborative Technology,
101CHAPTER 4Networks, Collaborative Technology,
 
Review of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE NetworkReview of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE Network
 
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
6.Copyright © 2016 Pearson Education, Inc. publishing as .docx
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
 
4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks
 
4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks4.5G: Integration of LTE and Wi-Fi networks
4.5G: Integration of LTE and Wi-Fi networks
 
It 241 Week 1 Cp Essay
It 241 Week 1 Cp EssayIt 241 Week 1 Cp Essay
It 241 Week 1 Cp Essay
 
Investor presentation december 2011
Investor presentation december 2011Investor presentation december 2011
Investor presentation december 2011
 
Chapter 4Networks for EfficientOperations andSustainabilit.docx
Chapter 4Networks for EfficientOperations andSustainabilit.docxChapter 4Networks for EfficientOperations andSustainabilit.docx
Chapter 4Networks for EfficientOperations andSustainabilit.docx
 
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFIA CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
A CLOSE ASSESSMENT AND ANALYSIS OF PUBLIC WIFI
 
It for management on demand strategies for performance, growth,
It for management on demand strategies for performance, growth,It for management on demand strategies for performance, growth,
It for management on demand strategies for performance, growth,
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access NetworksArchitecture for Mobile Data Offload over Wi-Fi Access Networks
Architecture for Mobile Data Offload over Wi-Fi Access Networks
 
Taking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadTaking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond Offload
 
Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...
 
Week 6
Week 6Week 6
Week 6
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Chapter 04 it-8ed-volonino

  • 1. Part II. Data and Network Infrastructure C hapter 4 Network Management and Mobility M a n a g e m e n t I n fo r m a t i o n S y s te m s EIMBA Copyright 2012 John Wiley & Sons, Inc. 4-1
  • 2. Chapter 4 Outline 4.1 Business Networks 4.2 Wireless Broadband Networks 4.3 Network Management and Portals 4.4 Collaboration 4.5 Green, Legal, and Ethical Issues Copyright 2012 John Wiley & Sons, Inc. 4-2
  • 3. Chapter 4 Learning Objectives  Describe networks, standards, and mobility.  Discuss network and collaboration technologies.  Understand 4G and other mobile networks.  Describe group work technologies.  Evaluate green, social, and ethical issues related to the use and operations of networks. Copyright 2012 John Wiley & Sons, Inc. 4-3
  • 4. For Class Discussion & Debate World's First 4G WiMAX Rail Network Scenario for Brainstorming & Discussion (see book for full text) a) Discuss potential consequences of the 4G WiMAX/Wi-Fi Rail Network. What constraints have been eliminated? b) Assume that other cities have implemented similar systems and that commuters own mobiles with the latest mobile OS. Brainstorm some far- reaching impacts of such a networked transportation system in the U.S. c) Identify several risks or negative unintended consequences. Discuss your estimate of their costs--both financial and non-financial ones. d) What impact might this network have on other transportation methods? Would those changes be helpful or harmful to the environment? e) How do all taxpayers benefit from this tax-supported network? Copyright 2012 John Wiley & Sons, Inc. 4-4
  • 5. Debate (see book for full text) a) Identify 4 business-related risks that you face as a user who relies on the DOT network; and how those risks might impact you or your job. b) Assume that each risk actually happened. Debate the following: Who is responsible or is no one responsible of the consequences of each one? Take the position that it’s: • no one’s fault (“technology crashes happen”) • the DOT’s fault as the provider, or • the user’s fault That is, when things go wrong with the network, who gets the blame and who suffers the consequences? Copyright 2012 John Wiley & Sons, Inc. 4-5
  • 6. 4.1 Business Networks Business networks support 4 basic functions: 1. mobility 2. collaboration 3. relationships 4. Search Common to all network functions are traffic and the circuits that transmit the traffic. Copyright 2012 John Wiley & Sons, Inc. 4-6
  • 7. Network basics Figure 4.2 A signal is transmitted from a sender/source to a receiver/destination via circuit or packet switching. Copyright 2012 John Wiley & Sons, Inc. 4-7
  • 8. Switching: transmission of the signal  Circuit switching: Circuit switching is older technology that was used for telephone calls. Plain old telephone service (POTS) and most wired telephone calls are transmitted, at least in part, over a dedicated circuit.  Packet switching: The path of the signal is digital, and is neither dedicated nor exclusive. A file is broken into smaller blocks, called packets. Figure 4.3 Wireless routers use antennae to transmit signals Copyright 2012 John Wiley & Sons, Inc. 4-8
  • 9. Network Terminology  Bandwidth: Throughput capacity or speed of a network.  Protocol: Standards that govern how networked devices exchange information.  TCP/IP: Transmission control protocol/Internet Protocol) are a suite of Internet protocols.  Broadband: Short for broad bandwidth. • Fixed-line broadband: Cable or DSL Internet connections. • Mobile broadband: Wireless high-speed Internet access through a portable modem, phone, or other device. Copyright 2012 John Wiley & Sons, Inc. 4-9
  • 10. 3G and 4G networks 3G: Short for third generation of cellular telecommunications technology. 4G: Short for fourth generation. 4G mobile network standards enable faster data transfer rates. Users can get 4G wireless connectivity through one of two standards: 1. WiMAX 2. LTE (Long-Term Evolution) Copyright 2012 John Wiley & Sons, Inc. 4-10
  • 11. 4.2 Wireless Broadband Networks  Enterprises are moving away from unsystematic adoption of mobile devices and infrastructure to a strategic build- out of mobile capabilities. • But identifying strategic technologies and avoiding wasted investments is difficult.  Mobile infrastructure consists of technology, software, support, security measures, and devices to manage and deliver wireless communications. Copyright 2012 John Wiley & Sons, Inc. 4-11
  • 12. Figure 4.4 How Wi-Fi works Wi-Fi allows computers to share a network wirelessly without connecting to a commercial network. Copyright 2012 John Wiley & Sons, Inc. 4-12
  • 13. WiMAX: a broadband wireless metropolitan area network (MAN) access standard that can deliver voice and data at distances of Figure 4.5 WiMAX/Wi-Fi network architecture 30 miles 4-13
  • 14. 4.3 Networks Management and Portals  When the network goes down or access is blocked, so does the ability to operate or function.  Damages when a company cannot operate or fulfill orders include: • lost sales and productivity • Inability to send and receive payments • inability to process payroll and inventory  Network infrastructure alone does not improve business performance. It’s how network capabilities combine with other IT to support employees, connect remote locations, service customers, and coordinate with supply chain partners. Copyright 2012 John Wiley & Sons, Inc. 4-14
  • 15. Figure 4.6 Model of Network, Collabo ration, and Performance Relationship Copyright 2012 John Wiley & Sons, Inc. 4-15
  • 16. IT at Work 4.1  Check page 102 Copyright 2012 John Wiley & Sons, Inc. 16
  • 17. TCP/IP Networks  The Internet protocol suite consists of the IP (Internet Protocol) and TCP (Transport Control Protocol), or TCP/IP.  In preparation for transmission, data are digitized into packets and sent via packet-switched networks, local area networks (LAN), or wide area networks (WAN).  Voice over IP (VoIP), or IP telephony, involves an analog-to- digital conversion. Voice and data transmissions travel over telephone wires in packets. Copyright 2012 John Wiley & Sons, Inc. 4-17
  • 18. Internet Application Categories  Discovery or search. Discovery involves browsing, finding, and retrieving information.  Communication. Developments in Internet-based and wireless communication such as podcasting, RSS, and micro- blogging transform business communications, marketing channels, and supply chain management  Collaboration. Tools and technologies are available, ranging from online meetings with screen sharing to videoconferencing and group support systems. Copyright 2012 John Wiley & Sons, Inc. 4-18
  • 19. Figure 4.9 Overview of enterprise search. Copyright 2012 John Wiley & Sons, Inc. 4-19
  • 20. Network Computing Infrastructures  Intranets: a network serving the internal informational needs of a company.  Extranets: private, company-owned network that uses IP technology to securely share part of a business’s information or operations with suppliers, vendors, partners, customers, or other businesses.  Extranets can use virtual private networks (VPNs). VPNs are created using specialized software and hardware to encrypt/send/decrypt transmissions over the Internet. Copyright 2012 John Wiley & Sons, Inc. 4-20
  • 21. Figure 4.7 Virtual Private Network (VPN) Copyright 2012 John Wiley & Sons, Inc. 4-21
  • 22. 4.4 Collaboration Messaging and collaboration tools include:  older communications media such as e- mail, videoconferencing, fax, and IM  newer media such as blogs, podcasts, RSS, wikis, VoIP, Web meetings, and torrents (for sharing very large files) Copyright 2012 John Wiley & Sons, Inc. 4-22
  • 23. Group Decision Processes Benefits of working in groups:  Groups tend to be better than individuals at understanding problems.  Group members have their egos embedded in the decision, and so they will be committed to the solution.  A group has more information (knowledge) than any one member. Groups can leverage this knowledge to create new knowledge.  Groups are better than individuals at catching errors. Despite the benefits of collaborative work, groups are not always successful. Copyright 2012 John Wiley & Sons, Inc. 4-23
  • 24. Collaboration Support Technologies  Portals, intranets, extranets, and shared workspaces are examples.  Web 2.0 or Enterprise 2.0 technologies such as wikis, blogs and microblogs, provide more options to promote and support enterprise collaboration. Copyright 2012 John Wiley & Sons, Inc. 4-24
  • 25. IT at Work 4.4  Check page 112 Copyright 2012 John Wiley & Sons, Inc. 25
  • 26. 4.5 Green, Legal, and Ethical Issues  Managers need to consider ethical and social issues, such as quality of working life.  Workers will experience both positive and negative impacts from being linked to a 24/7 workplace environment, working in computer-contrived virtual teams, and being connected to handhelds whose impact on health can be damaging. Copyright 2012 John Wiley & Sons, Inc. 4-26
  • 27. Risks and Ethical Issues  Driving while distracted  Health  Personal time  RF emissions and SAR • specific absorption rate, or SAR, is a way of measuring the quantity of radio frequency (RF) energy that is absorbed by the body.  Life out of control Copyright 2012 John Wiley & Sons, Inc. 4-27
  • 28. Chapter 4 Link Library • Google Wave http://wave.google.com/ video wave.google.com/about.html#video • Twitter network status http://status.twitter.com/ • Azulstar http://azulstar.com/ • Clear 4G WiMAX http://clear.com • International CTIA Wireless Tradeshows http://ctiawireless.com/ • Cisco http://cisco.com • Microsoft SharePoint 2010 http://sharepoint.microsoft.com/Pages/Default.aspx • Cellular Telecommunications Industry Association http://ctia.org/ • WiMAX Forum http://wimaxforum.org • Packet switching flash demo http://pbs.org/opb/nerds2.0.1/geek_glossary/packet_switching_flash.html • Cell phone radiation levels (SAR) http://reviews.cnet.com/2719-6602_7-291- 2.html?tag= • Kaiser Permanente HealthConnect video http://youtube.com/kaiserpermanenteorg Copyright 2012 John Wiley & Sons, Inc. 4-28