BSAD 141 Ch. 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Networking, Wireless and Mobility

- Asset Tracking/Discovery - Public Space/Mall Traffic Monitoring - Smart Vending Machines - Smart Traffic Machines - Smart Traffic Lights - Amusement Park Kid Tracking

Modem

- a device that enables a computer to transmit and receive data

Packet

- a single unit of binary data routed through a network -> directly impacts network performance and reliability by subdividing an electronic message into smaller more manageable packets

Wireless WAN

- a wide area network that uses radio signals to transmit and receive data

What is the biggest benefit of VoIP?

- low cost -> because it relies on the Internet connection, however, service can be affected if the bandwidth isn't appropriate or Internet access is not available

Regional service providers

- offer Internet service by connecting to NSPs, but they also can connect directly to each other

Line-of-sight option

- offers a fixed antenna that points at the WiMAX tower from a rooftop or pole -> this option is much faster than non-line-of-sight service, and the distance between the WiMAX tower and antenna can be as great as 30 miles

Digital subscriber line

- provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines -> consumers typically obtain DSL Internet access from the same company that provides their wired local telephone access, such as AT&T or Century Link -> thus, a customer's telephone provider is also its ISP, and the telephone line carries both data and telephone signals using a DSL modem -> DSL Internet services are used primarily in homes and small businesses

Wi-Fi operates at considerably higher frequencies than cell phones use, which allows greater bandwidth

- the bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as 802.11, for carrying out wireless local area network communication

Network Categories

- the general idea of a network is to allow multiple devices to communicate at the highest achievable speeds and, very importantly, to reduce the cost of connecting - how a particular network achieves these goals depends in part on how it is physically constructed and connected - networks are categorized based on geographic span: local area networks, metropolitan area networks, and wide area networks

Bit rate

- the number of bits transferred or received per unit of time

War chalking

- the practices of tagging pavement with codes displaying where Wi-Fi access is available -> the codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured

Cartography

- the science and art of making an illustrated map or chart

Websites with heavy traffic often have several computers working together to share the load of requests

- this offers load balancing and fault tolerance, so when requests are made to a popular site such as www.facebook.com, they will not overload a single computer and the site doesn't go down if one computer fails - a single computer can also have several host names - for instance, if a company is hosting several websites on a single server, much as an ISP works with hosting

Semi-passive RFID tags

- use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader

Automatic vehicle location

- uses GPS tracking to track vehicles -> AVL systems use a GPS receiver in the vehicle that links to a control center -> Garmin is one of the more popular manufacturers of GPS tracking systems, offering vehicle tracking, phone and laptop integration, and hiker navigation for water and air

What is one of the challenges associated with network convergence?

- using the many different tools efficiently and productively - knowing which communication channel - PC, text message, videoconference - to use with each business participant can be a challenge

What are the four wireless communication network categories?

1) Personal Area Networks (PANs) 2) Wireless Local Area Networks (WLANs) 3) Wireless Wide Area Networks (WWANs) 4) Wireless Metropolitan Area Networks (WMANs)

Cell Phone Generations

- 1G -> the original analog cell phone network (Speed = 9.6 Kbps) - 2G-2.5G -> digital cell phone service (Speed = 10 Kbps - 144 Kbps) - 3G-3.5G -> broadband Internet services over cellular network (Speed = 144 Kbps - 11 Mbps) - 4G -> very high-speed access, anywhere, anytime, to anything digital - audio, video, text (Speed = 2 - 300 Mbps)

Support of multiple devices

- PCs and televisions can access IPTV services

Protecting Against Theft

- a company may face significant exposure from stolen IDs, passwords, encryption keys, and confidential information if the device falls into the wrong hands, especially if the theft isn't discovered or reported immediately and the company doesn't have time to revoke access

Cell phone

- a device for voice and data, communicating wirelessly through a collection of stationary ground-based sites called base stations, each of which is linked to its nearest neighbor stations -> base station coverage areas are about 10 square miles are are called cells - the first cell phone was demonstrated in 1973 by Motorola, but it took 10 years for the technology to become commercially available - cellular systems were originally designed to provide voice services to mobile customers and thus were designed to interconnect cells to the public telephone network -> there are more cell phones than landline phones in many countries today, and it's no longer uncommon for cell phones to be the only phones people have

RFID accelerometer

- a device that measures the acceleration (the rate of change in velocity) of an item and is used to track truck speeds or taxi cab speeds

Broadband

- a high-speed Internet connection that is always connected -> high-speed in this case refers to any bandwidth greater than 2 Mbps

Wireless fidelity (Wi-Fi)

- a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves -> Wi-Fi has a maximum range of about 1,000 feet in open areas such as a city park and 250 to 400 feet in closed areas such as an office building

Streamlining

- a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred -> not limited to cellular usage; all wireless and even wired networks can take advantage of this method -> the most obvious advantage is speed, a direct benefit for mobile and wireless devices since they are still not as fast as their wired counterparts

Wireless MAN

- a metropolitan area network that uses radio signals to transmit and receive data -> not widely available (at least in the U.S.)

Intranet

- a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the supports of business processes -> this network is protected by security measures such as passwords, encryption, and firewalls, and thus only authorized users can access it -> Intranets provide a central location for all kinds of company-related information such as benefits, schedules, strategic directions, and employee directories

Geocoin

- a round coin-sized object, is uniquely numbered and hidden in geocache -> they can also be shaped to match a theme such as the state of Colorado or a birthday party hat -> often decorative or commemorative, making them collectible and highly valuable for technology adventures

Instant access to customer profiles, account history, and current order status significantly improves the quality of interactions with customers, suppliers, and business partners

- a salesperson can check inventories, generate quotes, take orders, and resolve problems all at the customer's site - field workers can identify problems with online manuals and diagnostic tools - decision making is always improved by access to accurate and current information

File transfer protocol

- a simple network protocol that allows the transfer of files between two computers on the Internet -> to transfer files with FTP, the FTP client program initiates a connection to a remote computer running FTP "server" software -> after completing the connection the client can choose to send and/or receive files electronically -> network access technologies use a standard Internet protocol called transmission control protocol/Internet protocol

Satellite

- a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area -> when satellite systems first came into consideration in the 1990s, the goal was to provide wireless voice and data coverage for the entire planet, without the need for mobile phones to roam between many different provider networks -> but by the time satellite networks were ready for commercial use, they had already been overtaken by cellular systems -> the devices used for satellite communication range from handheld units to mobile base stations to fixed satellite dish receivers -> the peak data transmission speeds range from 2.4 Kbps to 2 Mbps -> for the everyday mobile professional, satellite communication may not provide a compelling benefit, but for people requiring voice and data access from remote locations or guaranteed coverage in nonremote locations, satellite technology is a viable solution - conventional communication satellites move in stationary orbits approximately 22,000 miles above Earth

Digital divide

- a world wide gap giving advantage to those with access to technology

Edge matching (warping, rubber sheeting)

- occurs when paper maps are laid edge to edge and items that run across maps don't match are reconfigured to match -> it's a critical component of creating a GIS database because map misalignments occur frequently for many reasons, including survey error and cartographic errors

Dial-up access

- on-demand access using a modem and regular telephone line -> bandwidth is up to 56 Kbps -> cheap but slow compared with other technologies

Several techniques can secure wireless networks from unauthorized access whether used separately or in combination

- one method is authenticating Wi-Fi access points -> every time someone uses an unsecured website via a public Wi-Fi access point, his or her log-on name and password are sent over the open airwaves, with a high risk that someone might "eavesdrop" or capture log-on names, passwords, credit card numbers, and other vital information

Network Access Technologies

- performance is the ultimate goal of any computer, computer system, or network -> directly related to the network's speed of data transfer and capacity to handle transmission - a network that doesn't offer adequate performance simply will not get the job done for those who rely on it -> luckily, networks can be upgraded and expanded if performance is inadequate

High-speed Internet cable connections

- provide Internet access using a cable television company's infrastructure and a special cable modem - unlike DSL, high=speed Internet cable is a shared service, which means everyone in a certain radius, such as a neighborhood, shares the available bandwidth -> therefore, if several users are simultaneously downloading a video file, the actual transfer rate for each will be significantly lower than if only one person were doing so -> on average, the available bandwidth using cable can range from 512 Kbps to 50 Mbps for downloading and 786 Kbps for uploading

Personal Area Networks

- provides communication for devices owned by a single user that work over a short distance - used to transfer files, including email, calendar appointments, digital photos, and music - can provide communication between a wireless headset and a cell phone or between a computer and a wireless mouse or keyboard - generally cover a range of less than 10 meters (about 30 feet)

Transmission control protocol/Internet protocol

- provides the technical foundation for the public Internet as well as for large numbers of private networks -> one of the primary reasons for developing TCP/IP was to allow diverse or differing networks to connect and communicate with each other, essentially allowing LANs, WANs, and MANs to grow with each new connection - the TCP part verifies the correct delivery of data because data can become corrupt when traveling over a network -> it ensures the size of the data packet is the same throughout its transmission and can even retransmit data until delivered correctly - the IP part verifies the data are sent to the correct IP address, numbers represented by four strings of numbers ranging from 0 to 255 separated by periods

Social, Ethical, and Political Issues

- providing network access to those who want or need it helps to level the playing field and removes the digital divide -> organizations trying to bridge the divide include the Boston Digital Bridge Foundation, which concentrates on local schoolchildren and their parents, helping to make them knowledgeable about computers, programs, and the Internet -> other organizations provide inexpensive laptops and Internet access in low-income areas in developing countries

Latitude

- represents a north-south measurement of position

What is one flaw in TCP/IP?

- the complexity of IP addresses -> this is why we use a domain name system (www.apple.com)

Peer-to-peer

- a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server

RFID reader (RFID interrogator)

- a transmitter/receiver that reads the contents of RFID tags in the area

Challenges of a Connected World

- by eliminating time and distance, networks make it possible to communicate in ways not previously imaginable - even though networks provide many business advantages, they also create increased challenges in security and social, ethical, and political issues

Packet header

- lists the destination along with the length of the message data (for example, in IP packets the destination is the IP address)

Access point

- the computer or network device that serves as an interface between devices and the network -> each computer initially connects to the access point and then to other computers on the network

Personalization

- users can choose not only what they want to watch, but also when they want to watch it

Low bandwidth

- IPTV conserves bandwidth because the provider sends only a single channel

Addressing privacy concerns with RFID and LBS

- RFID already has the capability to determine the distance of a tag from the reader location - it isn't difficult to imagine that retailers could determine the location of individuals within the store and target specific advertisements to them based upon past purchases and shopping and behavior patterns -> many consumers would consider gathering such information intrusive enough, but the possibility that it could be sold to other retailers might lead consumers to refuse to give retailers any information

Some cellular companies are evaluating WiMAX as a means of increasing bandwidth for a variety of data-intensive applications such as those used by smartphones

- Sprint Nextel and Clearwire are building a nationwide WiMAX network in the U.S.

Geocache

- a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find

Geocoding

- a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category) -> GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data

Secure hypertext transfer protocol (SHTTP or HTTPS)

- a combination of HTTP and SSL to provide encryption and secure identification of an Internet server -> HTTPS protects against interception of communications, transferring credit card information safely and securely with special encryption techniques -> when a user enters a web address using https:// the browser will encrypt the message -> however, the server receiving the message must be configured to receive HTTPS messages -> in summary, each company needs to create a network security policy that specifies aspects of data integrity availability and confidentiality or privacy as well as accountability and authorization

Worldwide Interoperability for Microwave Access (WiMAX)

- a communications technology aimed at providing high-speed wireless data over metropolitan area networks -> operates like Wi-Fi, only over greater distances and with higher bandwidths -> a WiMAX tower serves as an access point and can connect to the Internet or another tower -> a single tower can provide up to 3,000 square miles of coverage, so only a few are needed to cover an entire city -> WiMAX can support data communications at a rate of 70 Mbps (In NYC, for example, one or two WiMAX access points around the city might meet the heavy demand more cheaply than hundreds of Wi-Fi access points) -> WiMAX can also cover remote or rural areas where cabling is limited or nonexistent, and where it is too expensive or physically difficult to install wires for the relatively few users -> can provide both line-of-sight and non-line-of-sight service

Security

- a company first has to ensure proper identification of users and authorization of network access - outside suppliers might be allowed to access production plans via the company's extranet, for example, but they must not be able to see other information such as financial records - the company should also preserve the integrity of its data; only qualified users should be allowed to change and update data, and only well-specified data - security problems intensify on the Internet where companies need to guard against fraud, invalid purchases, and misappropriation of credit card information

Metropolitan area network

- a large computer network usually spanning a city - most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN

Wireless LANs

- a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet

Global Positioning System (GIS)

- a satellite-based navigation system providing extremely accurate position, time, and speed information -> a GPS receiver can be a separate unit connected to a mobile device using cable or wireless technology such as Bluetooth, or it can be included in devices such as mobile phones or vehicle navigation systems - emergency response systems use GPS to track each of their vehicles and so dispatch those closest to the scene of an accident - if a vehicle is missing, its GPS locator can help locate it

Secure sockets layer

- a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private -> to create an SSL connection, a web server requires an SSL Certificate

Protocol

- a standard that specifies the format of data as well as the rules to be followed during transmission -> computers using the same protocol can communicate easily, providing accessibility, scalability, and connectability between networks

Cable modem (or broadband modem)

- a type of digital modem used with high-speed cable Internet service -> cable modems connect a home computer (or network of home computers) to residential cable TV service, while DSL modems connect to residential public telephone service - typically, broadband or high-speed Internet service has an average transfer rate 10 times faster than conventional dial-up service

IP address

- a unique number that identifies where computers are located on the network -> appear in the form of xxx.xxx.xxx.xxx, though each grouping can be as short as a single digit

Traceroute

- a utility application that monitors the network path of packet data sent to a remote computer -> traceroute programs send a series of test messages over the network (using the name or IP address) until the last message finally reaches its destination -> when finished, traceroute displays the path from the initial computer to the destination computer

Bluetooth

- a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices -> the name is borrowed from Harald Bluetooth, a king in Denmark more than 1,000 years ago -> Bluetooth eliminates the need for wires, docking stations, or cradles, as well as all the special attachments that typically accompany personal computing devices -> operates at speeds up to 1 Mbps within a range of 33 feet or less -> devices that are Bluetooth-enabled communicate directly with each other in pairs, like a handshake -> not just for technology devices (an array of Bluetooth-equipped appliances, such as a television set, a stove, and a thermostat, can be controlled from a cell phone - all from a remote location)

Wi-Fi Protected Access

- a wireless security protocol to protect Wi-Fi networks -> it's an improvement on the original Wi-Fi security standard, Wired Equivalent Privacy, and provides more sophisticated data encryption and user authentication -> anyone who wants to use an access point must know the WPA encryption key to access the Wi-Fi connection

Companies that deal in transportation combine GISs with database and GPS technology

- airlines and shipping companies can plot routes with up-to-the-second information about the location of all their transport vehicles - hospitals can locate their medical staff with GIS and sensors that pick up transmissions from ID badges - automobiles have GPSs linked to GIS maps that display the car's location and driving directions on a dashboard screen

Dynamic host configuration protocol

- allows dynamic IP address allocation so users don't have to have a preconfigured IP address to use the network -> DHCP allows a computer to access and locate information about a computer on the server, enabling users to locate and renew their IP address -> ISPs usually use DHCP to allow customers to join the Internet with minimum effort -> DHCP assigns unique IP addresses to devices, then releases and renews these addresses as devices leave and return to the network

Telecommuting (virtual workforce)

- allows users to work from remote locations, such as home or a hotel, using high-speed Internet to access business applications and data

SSL Certificate

- an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company -> typically, an SSL Certificate will contain a domain name, the company name and address, and the expiration date of the certificate and other details -> Verisign is the leading Internet Certification Authority that issues SSL Certificates -> when a browser connects to a secure site, it retrieves the site's SSL Certificate, makes sure it has not expired, and confirms a Certification Authority has issued it -> if the certificate fails on any one of these validation measures, the browser will display a warning to the end user that the site is not secure -> if a website is using SSL, a lock icon appears in the lower right-hand corner of the user's web browser

RFID tag

- an electronic identification device that is made up of a chip and antenna

Whether through voice, email, or text messaging, the quality and frequency of information exchange increased with wireless access

- an emergency doctor can be notified of lab test results immediately upon completion - a service worker and appropriate information can be rerouted to a higher-priority assignment - a salesperson can submit updates right after a sales call

Wired equivalent privacy

- an encryption algorithm designed to protect wireless transmission data -> if using a Wi-Fi connection, WEP encrypts the data using a key that converts the data into a non-human readable form -> the purpose of WEP was to provide wireless networks with the equivalent level of security as wired networks -> unfortunately, the underlying technology behind WEP has been demonstrated to be relatively insecure compared to newer protocols such as WPA

Extranet

- an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers -> having a common area where these parties can share information with employees about, for instance, order and invoice processing can be a major competitive advantage in product development, cost control, marketing, distribution, and supplier relations -> extranets enable customers, suppliers, consultants, subcontractors, business prospects, and others to access selected intranet websites that allow the sharing of information -> consultants and contractors can facilitate the design of new products or services -> suppliers can ensure that the raw materials necessary for the company to function are in stock and can be delivered in a timely fashion -> customers can access ordering and payment functions and check order status -> the extranet links the company to the outside world in a way that improves its operations

Preventing viruses on a mobile device

- any device that can access the Internet or receive email is at risk of catching a virus and passing it on to other devices - because of the memory implications of most mobile devices, antivirus software has typically been hosted on a PC or laptop to perform virus scanning - the first known mobile phone virus, named Cabir, appeared several years ago and infected only a small number of Bluetooth-enabled phones that carried out no malicious action; the virus was created by a group of malware developers to prove it could be done -> the developers sent Cabir to anti-virus researchers, so they could begin to develop a solution to a problem that promises to get a lot worse -> at present, mobile phone viruses don't do much damage, but if protective measures aren't taken, they could be as devastating as their computer counterparts - the best way to protect against mobile phone viruses is the same way users protect themselves from computer viruses - never open anything that seems suspicious

Location-based services

- applications that use location information to provide a service -> designed to give mobile users instant access to personalized local content and range from 911 applications to buddy finders to games to location-based advertising - many LBS applications complement GPS and GIS< such as: -> emergency services -> mapping -> tracking assets -> weather information -> navigation -> vehicle location

Another method is to turn Bluetooth discoverable mode off

- by setting the Bluetooth option to "hidden," other devices can't detect it and send it the virus - in addition, install some type of security software on the mobile device - many of the mobile phone manufacturers, such as Nokia, have developed security software for their mobile phones that detect and remove a virus as well as protect it from getting certain viruses in the first place

Networking with a LAN, WAN, or MAN allows employees to share data quickly and easily and to use applications such as databases and collaboration tools that rely on sharing

- by sharing data, networks have made business processes more efficient - for example, as soon as an order is placed, anyone in the company who needs to view it - whether in marketing, purchasing, manufacturing, shipping, or billing - can do so

An increasing number of digital devices, including most laptops, netbooks, tablets such as the iPad, and even printers are incorporating Wi-Fi technology into their design

- cell phones are incorporating Wi-Fi so they can automatically switch from the cell network to a faster Wi-Fi network where available for data communications - BlackBerrys and iPhones can connect to an access point for data communications such as email and web browsing, but not for voice unless they use the services of Skype or another VoIp

Virtual private network

- companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet

Local area network

- connects a group of computers in close proximity, such as in an office building, school, or home - LANs allow sharing of files, printers, games, and other resources - also often connects to other LANs, and to wide area networks

Another way to understand TCP/IP

- consider a letter that needs to go from the University of Denver to Apple's headquarters in Cupertino, California - TCP makes sure the envelope is delivered and does not get lost along the way - IP acts as the sending and receiving labels, telling the letter carrier where to deliver the envelope and who it was from - the Postal Service mainly uses street addresses and zip codes to get letters to their destinations, which is really what IP does with its addressing method -> unlike the Postal Service, which allows multiple people to share the same physical address, each device using an IP address to connect to the Internet must have a unique address or else it could not detect which individual device a request should be sent to

War driving

- deliberately searching for Wi-Fi signals while driving by in a vehicle -> many individuals who participate in war driving simply map where Wi-Fi networks are available -> other individuals have a more malicious intent and use war driving to hack or break into these networks -> war driving has been a controversial practice since its inception and has raised the awareness of the importance of wireless network security

Hotspots

- designated locations where Wi-Fi access points are publicly available -> found in places such as restaurants, airports, and hotels - places where business professionals tend to gather -> they are extremely valuable for those business professionals who travel extensively and need access to business applications -> by positioning hotspots at strategic locations throughout a building, campus, or city, network administrators can keep Wi-Fi users continuously connected to a network or the Internet, no matter where they roam

LBS policies should specify that:

- direct marketing purposes are permitted only with the business or service a user has a contract with - electronic messages can't hide the identity of the sender - solicitation is allowed only if the user has given prior consent - the location service must tell the user about the type, duration, and purpose of the data they are collecting - the user must be given the opportunity to reject any direct marketing opportunities - for mobile service providers, an unwelcome push can lead to increased customer care cost

Internet Protocol TV

- distributes digital video content using IP across the Internet and private IP networks -> traditional television sends all program signals simultaneously to the television, allowing the user to select the program by selecting a channel -> with IPTV, the user selects a channel and the service provider sends only that single program to the television -> like cable TV< IPTV uses a box that acts like a modem to send and receive the content

Passive RFID tags

- don't have a power source -> Passive RFID tags draw power from the RFID reader, which sends out electromagnetic waves that induce a current in the tag's antenna

Providing Opportunities

- ebusiness can enhance the opportunities of manufacturers that buy parts from a variety of suppliers - using networks, they can order parts electronically when needed, reducing the need for large inventories and enhancing efficiency - networks allow companies to sell to consumers via the Internet too, offering books, clothing, airline tickets, and more - most midsize and larger companies also have a marketing presence on the web and provide extensive online information about their products and services - the Internet has lowered entry barriers for start-ups and small companies, which can now immediately tap potential customers online without hiring an expensive marketing company

Wireless access point

- enables devices to connect to a wireless network to communicate with each other -> WAPs with multiple-in/multiple-out technology have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices

Advantages of Wireless Networks

- enhances mobility - provides immediate data access - increases location and monitoring capability - improves workflow - provides mobile business opportunities - provides alternative to wiring

Business Operations and Management

- ex. developing custom applications like order processing, inventory control, and sales management - employees within the company can access and run such applications using web browsers from anywhere on the network whenever needed

Web Publishing

- ex. newsletters, technical documentations, and product catalogs can be published in a variety of ways, including web pages, email, and as part of organizational business applications

Communications and Collaboration

- ex. using a browser to send and receive email, voice mail, documents, and web pages to communicate with others in the organization, as well as externally through the Internet

Extranets provide business value in several ways

- first, by relying on web browsers they make customer and supplier access to company resources easy and fast - second, they enable a company to customize interactive web-enabled services for the intended audience, to build and strengthen strategic relationships with customers and suppliers - finally, extranets can allow and improve collaboration with customers and other business partners

Several steps are being taken to address these privacy concerns

- for example, one proposal would require all RFID-tagged products to be clearly labeled -> this would act as an alert mechanism to which items are being tracked - another measure being considered is "Kill Codes," which would turn off all RFID tags when someone comes into contact with them - another measure is "RSA Blocker Tags," which try to address privacy concerns while maintaining the integrity of the product -> only the store's authorized reader can track items with these tags; customers can't be tracked outside the store in which they made a purchase

Active RFID tags

- have their own transmitter and a power source (typically a battery) -> the power source runs the microchip's circuitry and broadcasts a signal to the reader

What is one of the most valuable characteristics of TCP/IP?

- how scalable its protocols have proven to be as the Internet has grown from a small network with just a few machines to a huge internetwork with millions of devices -> while some changes have been required periodically to support this growth, the core of TCP/IP is the same as it was more then 25 years ago

When a user has issues with her PC, she tries to fix it herself

- however, when a user's mobile phone is not working, she usually contacts the service provider - as a result, subscribers receiving unsolicited messages through LBS would contact their mobile service providers with complaints

Spatial data (geospatial data or geographic information)

- identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more -> spatial data can be mapped and is stored as coordinates and topology

Another social issue with networking occurs with newsgroups or blogs where like-minded people can exchange messages

- if the topics are technical in nature or sports related such as cycling, few issues arise - problems can begin when social media feature topics people can be sensitive about, such as politics, religion, or sex, or when someone posts an offensive message to someone else - different countries have different and even conflicting laws about Internet use, but because the Internet knows no physical boundaries, communication is hard to regulate, even if anyone could - some people believe network operators should be responsible for the content they carry, just as newspapers and magazines are - operators, however, feel that like the post office or phone companies, they can't be expected to police what users say

Standard packet formats

- include a packet header, packet body containing the original message, and packet footer

Wi-Fi infrastructure

- includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal -> most WLANs use a Wi-Fi infrastructure in which a wireless device, often a laptop, communicates through an access point or base station by means of, for instance wireless fidelity

Interactivity with users

- interactive applications and programs are supported by IPTV's two-way communication path

While LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure, they differ in many dimensions

- it is easy to establish a network between two computers in the same room or building, but much more difficult if they are in different states or even countries - this means someone looking to build or support a WAN either pays more or gets less performance, or both - Ethernet is the most common connection type for wired networking and is available in speeds from 10 mbps all the way up to 10,000 Mbps (10 Gbit) - the most common wire used for Ethernet networking is Cat5 (category 5) and the connectors used are RJ45, slightly larger than the RJ11 connectors used by phones, but the same shape

DSL's disadvantages

- it works over a limited physical distance - remains unavailable in many areas while the local telephone infrastructure doesn't support DSL technology

GIS map automation

- links business assets to a centralized system where they can be tracked and monitored over time

A newer satellite medium, the low-orbit satellite, travels much closer to Earth and is able to pick up signals from weak transmitters

- low-orbit satellites also consume less power and cost less to launch than conventional satellites - with satellite networks, businesspeople almost anywhere in the world have access to full communication capabilities, including voice, videoconferencing, and Internet access

Benefits of Business Mobility

- mobile and wireless development has come a long way -> consider Dr Pepper/Seven-Up Inc., of Plano Texas, which monitors the operation of its antenna-equipped vending machines via wireless technology -> the company collects inventory, sales, and "machine-health" data and polls the machines daily; managers and salespeople can access the stored information via its intranet -> Dr Pepper/Seven-Up Inc. understands the business value of the data, both for daily operations and for data-mining purposes -> the information collected is helpful for deciding where to place new vending machines, such as in front of a Target store or a high-traffic supermarket

Provides immediate data access

- mobility allows activities to be performed where needed; however, providing immediate data access offers the value -> wireless networks can support a wide variety of immediate data access options, from collecting usage data using Wi-Fi or RFID technologies when driving past a water meter to having full Internet access on a laptop or other mobile device -> a mobile worker can submit a status report or credit card scan or be notified about a new assignment -> when up-to-the-second data are required, such as for stock transactions and credit card authorizations, wireless technology is the only mobile option -> employees can "pull" data by linking to the source and requesting the desired information, or "push" it by sending an alert to a user's device or automatically refreshing data

Protecting Wireless Connections

- network intrusions can occur if access codes or passwords are stored on a device that is lost or stolen -> however, any time a wireless network connects to a wired one, the wireless network can serve as a conduit for a hacker to gain entry into an otherwise secure wired network -> this risk is especially high if the wireless network is not sufficiently secured in its own right

Overview of a Connected World

- networks enable telecommunications or the exchange of information (voice, text, data, etc.) - the telecommunication industry has morphed from a government-regulated monopoly to a deregulated market where many suppliers ferociously compete - competing telecommunication companies offer local and global telephone services, satellite service, mobile radio, cable television, cellular phone services, and Internet access - businesses everywhere are increasingly using networks to communicate and collaborate with customers, partners, suppliers, and employees

Reducing travel

- networks provide the means for videoconferencing - using this technology, employees at distant locations can meet without spending time and money on travel, while seeing and hearing each other as if they were in the same location - nor do all employees have to come to the office; some can telecommute using Internet connections for both data and voice and, thanks to intranets and extranets, maintain the same access to information as they do at work - telecommuting has been greatly enhanced by VPNs, videoconferencing, and VoIP

Google Earth combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device

- not only does this provide useful business benefits, but it also allows for many educational opportunities

Asset tracking

- occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention -> allows a company to focus on its supply chain, reduce theft, identify the last known user of assets, and automate maintenance routines - active and semi-passive tags are useful for tracking high-value goods that need to be scanned over long ranges, such as railway cars on a truck - the cost of active and semi-passive RFID tags is significant; hence, low-cost items physically use passive RFID tags

Enhances mobility

- one of the greatest advantages provided by wireless networks - it allows activities that were formerly tied to physical locations to be performed almost anywhere - companies can bring employees, information, and computing resources to a job location instead of forcing the job to be located at the company's site -> consider how mobile phones alone have changed the way most companies operate -> executives and sales professionals can conduct business wherever they are, eliminating downtime during travel and speeding their response to customers - mobility means more face-to-face contact with customers and business partners - even people with internal jobs, such as custodians and emergency room doctors keep moving throughout the day - instead of returning periodically to their offices or other fixed locations for information access or doing without, they can rely on wireless technology to bring that access to them, where and when they need it - mobility gives a company the power to place the right resources in the right place at the right time -> it allows for the redistribution of operations to gain efficiencies or react to changing conditions (For example, a mobile checkout stand allows additional checkouts to be set up during holiday rushes and store sales events)

Power-on passwords

- passwords implemented at the hardware level that must be entered before gaining access to the computer - are the first line of defense against unauthorized use -> companies should activate these passwords before giving their workforce the devices -> they should also prohibit storing passwords on devices and periodically monitor compliance with the policy -> companies need to consider encrypting and password-protecting data stored on the device, including any flash drives or other mobile storage devices -> in addition, some device management tools can send messages to a device to lock it or destroy its contents, which can be an attractive security feature

National service providers

- private companies that own and maintain the worldwide backbone that supports the Internet -> these include Sprint, Verizon, AT&T, and more

Repeater

- receives and repeats a signal to extend its attenuation or range

Wireless

- refers to any type of operation accomplished without the use of a hard-wired connection -> there are many environments in which the network devices are wireless but not mobile, such as wireless home or office networks with stationary PCs and printers -> some forms of mobility don't require a wireless connection; for instance, a worker can use a wired laptop at home, shut down the laptop, drive to work, and attach the laptop to the company's wired network

Longitude

- represents an east/west measurement of position

Packet footer

- represents the end of the packet or transmission end -> the packet header and packet footer contain error-checking information to ensure the entire message is sent and received -> the receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets and footers in the correct sequence

Attenuation

- represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference of physical obstructions such as walls

The Institute of Electrical and Electronics Engineers

- researches and institutes electrical standards for communication and other technologies

Sharing resources

- resource sharing makes all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user - sharing physical resources also supports a sustainable MIS infrastructure, allowing companies to be agile, efficient, and responsible at the same time - cloud computing and virtualization consolidate information as well as systems that enhance the use of shared resources - by using shared resources, cloud computing and virtualization allow for collective computing power, storage, and software, in an on-demand basis - perhaps even more important than sharing physical resources is sharing data - most companies, regardless of size, depend not just on their customer records, inventories, accounts receivable, financial statements, and tax information, but also on their ability to share these, especially with operations in remote locations

Proxy

- software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons

Domain names are essentially rented, with renewable rights, from a domain name registrar, such as godaddy.com

- some registrars only register domain names, while others provide hosting services for a fee - ICANN (Internet Corporation for Assigning Names and Numbers) is a nonprofit governance and standards organization that certifies all domain name registrars throughout the world - with the certification, each registrar is authorized to register domain names, such as .com, .edu, or .org

Wide area network

- spans a large geographic area such as a state, province, or country - Ex. Internet -> WANs are essential for carrying out the day-to-day activities of many companies and government organizations, allowing them to transmit and receive information among their employees, customers, suppliers, business partners, and other organizations across cities, regions, and countries and around the world - WANs often connect multiple smaller networks, such as local area networks or metropolitan area networks

Internet service provider

- specializes in providing management, support, and maintenance to a network -> various services provided and available bandwidth rates -> link to RSPs and, if they are geographically close, to other ISPs -> some also connect directly to NSPs, thereby sidestepping the hierarchy -> individuals and companies use local ISPs to connect to the Internet, and large companies tend to connect directly using an RSP -> major ISPs in the U.S. include AOL, AT&T, Comcast, and others -> the further up the hierarchy, the faster the connections and the greater the bandwidth

Geographic Information Systems (GIS)

- stores, views, and analyzes geographic data creating, multidimensional charts or maps -> for example, GIs are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica -> GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps - a GIS accesses, manipulates, and analyzes spatial data - can provide information and insight to both mobile users and people at fixed locations

A RFID system is comprised of one of more RFID tags, one or more RID readers, two or more antennas, RFID application software, and a computer system or server

- tags can be applied to books or clothing items as part of an adhesive bar-code label - readers can be stand-alone devices, such as for self-checkout in a grocery store -> the reader sends a wireless request that is received by all tags in the area that have been programmed to listen to wireless signals -> tags receive the signal via their antennas and respond by transmitting their stored data (the tag can hold many types of data, including a product number and installation instructions) (the reader receives a signal from the tag using its antenna, interprets the information sent, and transfers the data to the associated computer)

Broadband over power line

- technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems -> works by transmitting data over electrical lines using signaling frequencies higher than the electrical (or voice in the case of DSL) signals -> allows computer data to be sent back and forth across the network with no disruption to power output in the home -> unfortunately, limitations such as interference and availability have affected BPL's popularity

Social issues can even affect the government and its use of networks to snoop on citizens

- the FBI has installed a system at many ISPs to scan all incoming and outgoing email for nuggets of interest - the system was originally called Carnivore but bad publicity caused it to be renamed DCS1000 - while the name is much more generic, its goal is the same - locate information on illegal activities by spying on millions of people - a common conception associated with networking technologies is "Big Brother is watching!" - people are wary of how much information is available on the Internet and how easily it can fall into the wrong hands

Network Providers

- the Internet is a hierarchical structure linking different levels of service providers, whose millions of devices, LANs, WANs, and MANs supply all the interconnections - National service providers -> regional service providers -> internet service providers

VoIP services include fixed-price unlimited local and long-distance calling plans, plus a range of interesting features, such as:

- the ability to have more than one phone number, including numbers with different area codes - integrating email and voice mail so users can listen to their voice mail using their computer - the ability to receive personal or business calls via computer, no matter where the user is physically located

Network convergence

- the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures -> almost any type of information can be converted into digital form and exchanged over a network -> network convergence then allows the weaving together of voice, data, and video -> the benefits of network convergence allow for multiple services (Internet access, VoIP, IPTV), multiple devices, but one network, one vendor, and one bill

Unified communications

- the integration of communication channels into a single service -> UC integrates communication channels allowing participants to communicate using the method that is most convenient for them -> UC merges instant messaging, videoconferencing, email, voice mail, and VoIP -> this can decrease the communication costs for a business while enhancing the way individuals communicate and collaborate

Bandwidth

- the maximum amount of data that can pass from one point to another in a unit of time (measured in terms of bit rate or data rate) -> similar to water traveling through a hose -> if the hose is large, water can flow through it quickly -> data differs from a hose in that it must travel great distances, especially on a WAN, and not all areas of the network have the same bandwidth -> a network essentially has many different hoses of unequal capacity connected together, which will restrict the flow of data when one is smaller than the others -> therefore, the speed of transmission of a network is determined by the speed of its smallest bandwidth

The satellites broadcast signals constantly, while the receiver measures the time it takes for the signals to reach it

- the measurement, which uses the speed of the signal to determine the distance, is taken from three distinct satellites to provide precise location information - the time measurements depend on high-powered clocks on each satellite and must be precise, because an error of one-thousandth of a second can result in a location variation of more than 200 miles - GPS can produce very accurate results, typically within 5 to 50 feet of the actual location

Another alternative to DSL or high-speed Internet cable is dedicated communications lines leased from AT&T or another provider

- the most common are T1 lines, a type of data connection able to transmit a digital signal at 1.544 Mbps - although this speed might not seem impressive, and T1 lines are more expensive than DSL or cable, they offer far greater reliability because each is composed of 24 channels, creating 24 separate connections through one line - if a company has three separate plants that experience a high volume of data traffic, it might make sense to lease lines for reliability of service - if a company always needs high bandwidth access to communicate with customers, partners, or suppliers, a T2 line may be the most cost-effective method

IEEE 802.11n (or Wireless-N)

- the newest standard for wireless networking -> compared with earlier standards such as 802.11b, Wireless-N offers faster speeds, more flexibility, and greater range -> the organization denotes different versions of the standard - for example, Wireless-G and Wireless-N - by a lowercase letter at the end of this number

Bit

- the smallest element of data and has a value of either 0 or 1 - transmitting data

Mobile

- the technology can travel with the user, for instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference -> information collected while on the road can be synchronized with a PC or company server

Estimated time of arrival (ETA)

- the time of day of an expected arrival at a certain destination and is typically used for navigation applications

Estimated time enroute (ETE)

- the time remaining before reaching a destination using the present speed and is typically used for navigation applications

In a Wi-Fi network, the user's laptop or other Wi-Fi-enabled device has a wireless adapter that translates data into a radio signal and transmits it to the wireless access point

- the wireless access point, which consists of a transmitter with an antenna that is often built into the hardware, receives the signal and decodes it - the access point then sends the information to the Internet over a wired broadband connection - when receiving data, the wireless access point takes the information from the Internet, translates it into a radio signal, and sends it to the computer's wireless adapter - if too many people try to use the Wi-Fi network at one time, they can experience interference or dropped connections - most laptop computers come with built-in wireless transmitters and software to enable computers to automatically discover the existence of a Wi-Fi network

Cell phones have morphed into smartphones that offer more advanced computing ability and connectivity than basic cell phones

- they allow for web browsing, emailing, listening to music, watching video, computing, keeping track of contacts, and more - examples are Apple iPhone and RIM BlackBerry - cell phones and smartphones need a provider to offer services, much as computer users need an ISP to connect to the Internet - the most popular mobile phone providers in the U.S. are AT&T, Sprint, T-Mobile, and Verizon - they offer different cell phones, features, coverage areas, and services - one of the newer services is third generation, or 3G, services that bring wireless broadband to mobile phones -> the 3G networks let users surf web pages, enjoy streaming music, watch video-on-demand programming, download and play 3-D games, and participate in social media and teleconferencing

LBS can track and monitor objects muck like RFID

- tracking vulnerable individuals and company assets is beneficial - but the dark side of LBS risks the invasion of privacy and security caused by indiscreet location tracking -> for example, if a company is using LBS to know where each employee is on duty, it must not observe their positions when they are off duty - advertising at random to users in a specific area may violate privacy if mobile users in the area don't want to receive these advertisements - criminals might also take advantage of illegal location tracking - and because LBS are based on message exchange in a wireless network, there are always security risks because location information could be stolen, lost, or modified - security mechanisms must eliminate or minimize the potential for attacks against LBS entities and reduce exposure of the user's identity and location - one way to solve the location privacy problem is to provide strong privacy practices that counterbalance the invisible nature of location collection in the wireless world

Networking access points

- traffic exchange points in the routing hierarchy of the Internet that connects NSPs -> they typically have regional or national coverage and connect to only a few NSPs -> thus, to reach a large portion of the global Internet, a NAP needs to route traffic through one of the NSPs to which it is connected

Provides mobile business opportunities

- unlike ebusiness, mbusiness offers the advantages of making a purchase via the Internet an anywhere, anytime experience -> it provides consumers with the ability to obtain information and order goods and services quickly and easily using a mobile device

Skype is a perfect example of IP applied to telephone use

- unlike typical VoIP systems that use a client and server infrastructure, Skype uses a peer-to-peer network - Skype's user directory is distributed among the users in its network, allowing scalability without a complex and expensive centralized infrastructure

Chipless RFID tags

- use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip -> examples of the innovative use of RFID include: 1) RFID chips injected under the skin of animals using a syringe can help ranchers meet regulations, track wild animals for ecological studies, and return lost pets to their owners 2) Retail stores use RFID to track and monitor inventory (Hospitals and pharmaceutical companies meet government regulations and standards with RFID) (Even local libraries are using RFID to control theft and speed up the checkout process) 3) Walmart and other large retailers use RFID to maintain inventory, stop shoplifting, and speed customer checkout process

VoIP (Voice over IP)

- uses IP technology to transmit telephone calls -> providing an opportunity to bring about significant change in the way people communicate using the telephone -> VoIP service providers - specialists as well as traditional telephone and cable companies and some ISPs - allow users to call anyone with a telephone number, whether local, long distance, cellular, or international - in the U.S., the Federal Communications Commission requires compliance among VoIP service providers comparable to those for traditional telephone providers such as support for local number portability, services for the disabled, and law enforcement for surveillance, along with regulatory and other fees

Non-line-of-sight service

- uses a small antenna on a mobile device that connects to a WiMAX tower less than six miles away where transmissions are disrupted by physical obstructions -> this form of service is similar to Wi-Fi but has much broader coverage area and higher bandwidths

RFID

- uses electronic tags and labels to identify objects wirelessly over short distances -> it holds the promise of replacing existing identification technologies such as the bar code -> RFID wirelessly exchanges information between a tagged object and a reader/writer

Provides alternative to wiring

- wireless networks provide an attractive alternative where physical constraints or convenience make wired solutions costly or impractical - tracing existing wires or adding new lines becomes increasingly cumbersome and difficult -> in other cases, building design or aesthetic considerations make wired networks unattractive - in manufacturing facilities or production lines with moving equipment or complex setups, wireless connections are simpler to implement and safer for workers - the higher per unit cost of a wireless solution may be more than offset by its advantages over physical lines - WLANs allow MIS employees to relocate equipment at will, attractive for trade shows, temporary offices, and seasonal selling areas -> in conference rooms, WLANs enable attendees to bring laptops or other Wi-Fi-enabled devices for Internet access - finally, wireless technology allows voice and data connections with ships at sea, passengers in airliners, and travelers in remote locations -> in developing countries, it's a means to bypass the effort and expense of installing and maintaining telephone lines across inhospitable terrain

Business Applications of Wireless Networks

- wireless technologies have also aided the creation of new applications - some build upon and improve existing capabilities -> UPS, for example, is combining several types of wireless network technologies from Bluetooth to WWANs and deploying scanners and wearable data-collection terminals to automate and standardize package management and tracking across all its delivery centers

Increases location and monitoring capability

- wireless technology offers the opportunity to redesign and simplify those processes to be faster, cheaper, and more responsive, and to eliminate redundant activities, integrate activities and services, and redistribute tasks -> for example, when mobile workers capture data on paper forms and clerical workers enter it into computer systems, the process is costly, time-consuming, and error-prone -> using a wireless device for the original data capture eliminates the need to reenter the data, increases the data accuracy, and provides immediate access to results -> rental car staff members now use wireless devices to quickly and easily check and enter mileage, fuel levels, and damage for returning cars -> drivers receive faster service and staff can focus on providing value-added services

With the power of a network, business professionals can share data and resources around the globe

- with the power of a wireless network, business professionals can take advantage of mobility allowing them to work from anywhere, at any time, using many different devices - watching people work in airports, restaurants, stores, trains, and more is common, and soon even remote villages in Africa, South America, and Asia will have access to the Internet along with all the power that comes with wireless networking

What are the three types of intranet uses?

1) Business Operations and Management 2) Communications and Collaboration 3) Web Publishing

What two categories can WWAN technologies be divided into?

1) Cellular communication systems 2) Satellite communication systems

What are the two main ways that LANs, WANs, and MANs differ?

1) Cost 2) Performance

A few mbusiness offerings include:

1) Digital purchases -> the most suitable purchase for a mobile user is for products that can be downloaded and used immediately such as music and (electronic) books 2) Location-based services -> the ability for merchants to capture and react to a user's current location and requirements can be a powerful tool for selling products and services 3) Mobile banking and payments -> using a mobile device can provide access to personal bank accounts to view account history and execute transactions -> in addition, a mobile device can be used for making payments, essentially acting as digital cash -> for example, someone can order and pay for a Starbucks latte using a mobile device and app 4) Mobile shopping -> most forms of shopping may be impractical using mobile devices; however, some forms of purchases lend themselves to mbusiness -> for example, having the ability to purchase movie tickets for a show playing the same evening can be quite valuable -> mobile devices can also be used for comparison shopping -> before making a purchase, a shopper in a retail store may want to first see what the current price of a product is from another vendor to ensure he is getting a good price

What are the two most prevalent types of broadband access?

1) Digital subscriber lines 2) High-speed Internet cable connections

DSL has two major advantages over dial-up:

1) It can transmit and receive data much faster 2) Because they have an "always on" connection to their ISP, users can simultaneously talk on the phone and access the Internet

What are the two drawbacks of dial-up?

1) It is slow, providing a maximum rate of 56 Kbps 2) Dial-up modem access ties up the telephone line so the user can't receive and make phone calls while online

What are the five networking elements that create a connected world?

1) Network Categories (LAN, MAN, WAN) 2) Network Convergence (VoIP, UC, IPTV) 3) Network Protocols (TCP/IP, DNS, DHCP) 4) Network Providers (ISP, NSP, RSP) 5) Network Access Technologies (DSL, Cable Modem, Broadband)

What are the four challenges of using wireless networks?

1) Protecting against theft -> ex. mobile devices are more vulnerable to theft due to their small size 2) Protecting wireless connections -> ex. Wi-Fi connections need to enforce data encryption 3) Preventing viruses on mobile devices -> ex. mobile devices are not immune to viruses and need to be protected 4) Addressing privacy concerns with RFID and LBS -> ex. both RFID and LBS have the ability to share where someone is, which can cause privacy concerns

What are the three types of Wireless Business Applications?

1) Radio-Frequency Identification (RFID) 2) Global Positioning Systems (GPS) 3) Geographic Information Systems (GIS)

What are two methods for encryption network traffic on the web?

1) Secure sockets layer 2) Secure hypertext transfer protocol

What are the three main advantages that a network offers for a business?

1) Sharing resources 2) Providing opportunities 3) Reducing travel

What are two ways to use VoIP for telephone calls?

1) Through a web interface that allows users to make calls from their computer 2) Through a phone attached to a VoIP adapter that links directly to the Internet through a broadband modem

Some common GIS uses include:

1) finding what is nearby -> giving a specific location, the GIS finds sources within a defined radius -> these might be entertainment venues, restaurants, etc. -> users can also use GIS to locate vendors that sell a specific item they want and get the results as a map of the surrounding area or an address 2) routing information -> once users have an idea where they want to go, GIS can provide directions to get there using either a map or step-by-step instructions -> routing information can be especially helpful when combined with search services 3) sending information alerts -> users may want to be notified when information relevant to them becomes available near their location -> a commuter might want to know that a section of the highway has traffic congestion, or a shopper might want to be notified when a favorite store is having a sale on a certain item 4) mapping densities -> GIS can map population and event densities based on a standard area unit, such as square miles, making it easy to see distributions and concentrations -> police can map crime incidents to determine where additional patrolling is required, and stores can map customer orders to identify ideal delivery routes 5) mapping quantities -> users can map quantities to find out where the most or least of a feature may be -> for example, someone interested in opening a specialty coffee shop can determine how many others are already in the area, and city planners can determine where to build more parks


Ensembles d'études connexes

Law and Legal Environment Exam 1

View Set

08 Intermediate: File I/O in C Programming

View Set

Managerial Accounting- Chapter 19

View Set

Political Science Final- Multiple Choice

View Set

Quiz: High Renaissance and Mannerism

View Set

Implementing chapter 17 Practice questions

View Set

Positive Crankcase Ventilation Valve and Secondary Air-Injection Systems Chapter 27 Part One

View Set

1.2 Fixed Income - Debt Securities

View Set