MIS 180 - Ch. 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

cell phone generations

1G: the original analog cell phone network, speed = 9.6Kbps 2G-2.5G: digital cell phone service, speed = 10 Kbps-144 Kbps 3G-3.5G: broadband Internet services over cellular network, speed = 144 Kbps - 11 Mbps 4G: very high speed access, anywhere, anytime, to anything digital - audio, video, text, speed = 2-300 Mbps

standard packet format

includes a packet header, packet body containing the original message, and packet footer

estimated time of arrival (ETA)

the time of day of an expected arrival at a certain destination; typically used for navigation applications

estimated time enroute (ETE)

the time remaining before reaching a destination using the present speed; typically used for navigation applications

Several techniques can secure wireless networks from unauthorized access whether used separately or in combination One method is authenticating Wi-Fi access points

Because Wi-Fi communications are broadcast, anyone within listening distance can intercept communications Everytime someone uses an unsecured website via a public Wi-Fi access point, his or her logon name and password are sent over the open airwaves with a high risk that someone might eavesdrop or capture logon names, passwords, credit card numbers, and other vital information other techniques are WEP which is not effective and WPA

regional service providers (RSPs)

One step down in the hierarchy is Regional service providers (RSPs): offer internet service by connecting to NSPs, but they also can connect directly to each other

secure sockets layer (SSL)

Secure sockets layer (SSL): a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remains private Millions of websites use SSL to protect their online transactions with their customers To create an SSL connection, a web server requires an SSL Certificate:

multiple-in/multiple-out (MIMO) technology

WAPS with multiple-in/multiple-out (MIMO) technology: have multiple transmitters and receivers allow sending and receiving greater amounts of data than traditional networking devices

bandwidth

We measure network performance in terms of bandwidth: the maximum amount of data that can pass from one point to another in a unit of time Bandwidth is similar to water traveling through a hose If the hose is large, water can flow through it quickly Data differs from a hose in that it must travel great distances, especially on a WAN, and not all areas of the network have the same bandwidth A network essentially has many different hoses of unequal capacity connected together, which will restrict the flow of data when one is smaller than the others Therefore, the speed of transmission of a network is determined by the speed of its smallest bandwidth

high-speed internet cable connection

While dial-up and DSL use local telephone infrastructure, High-speed internet cable connection: provides Internet access using a cable television company's infrastructure and a special cable modem Unlike DSL, high-speed internet cable is a shared service, which means everyone in a certain radius, such as a neighborhood, shares the available bandwidth Therefore, if several users are simultaneously downloading a video file, the actual transfer rate for each will be significantly lower than if only one person were doing so On average, the available bandwidth using cable can range from 512 Kbps to 50 Mbps for downloading and 786 Kbps for uploading The two most prevalent types of broadband access are digital subscriber lines and high-speed Internet cable connections

geocache

a GPS technology adventure game that posts on the internet the longitude and latitude location of an item for users to find GPD users find the geocache and typically sign a guest book or take an item and leave an item for the next adventure players to find Caches are often places in locations that are interesting or challenging for people to discover

Location-based services (LBS)

applications that use location information to provide a service GPS and GIS both utilize LBS LBS is designed to give mobile users instant access to personalized local content and range from 911 applications to buddy finders ("let me know when my friend is within 1,000 feet") to games (treasure hunts) to location-based advertising ("Visit the Starbucks on the corner and get $1.00 off a latte.") Many LBS applications complement GPS and GIS such as Emergency services, Field service management, Find-it services, mapping, navigation, tracking assets, traffic information, vehicle location, weather information, wireless advertising Just as Facebook and Twitter helped fuel the Web 2.0 revolution, applications such as Foursquare, Gowalla, and Loopt are bringing attention to LBS Each application is a mobile phone service that helps social media users find their friend's location Facebook and Twitter have added location-based services to complement their application

spatial data (geospatial data or geographic information)

identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more Spatial data can be mapped and is stored on coordinates and topology A GIS accesses, manipulates, and analyzes spatial data

geocoding

in spatial databases is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category) GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data

GIS map automation

links business assets to a centralized systems where they can be tracked and monitored over time

radio-frequency identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances It holds the promise of replacing existing identification technologies such as the bar code RFID wirelessly exchanges information between a tagged object and a reader/writer An RFID system is comprised of one or more RFID tags, one or more RFID readers, two or more antennas (one on the tag and one on each reader), RFID application software, and a computer system or server Examples of the innovative uses of RFID include: RFID chips injected under the skin of animals using a syringe can help ranchers meet regulations, track wild animals for ecological studies, and return lost pets to their owners Retail stores use RFID to track and monitor inventory. Hospitals and pharmaceutical companies meet government regulations and standards with RFID. Even local libraries are using RFID to control theft and speed up the checkout process Car manufacturers install RFID antitheft systems. Toll roads use RFID to collect payments from passing cars Hospitals track patients', doctors', and nurses' locations to facilitate emergency situations and ensure safety. RFID also tracks equipment location to ensure quick response times during an emergency American Express and MasterCard use RFID for automatic payments Walmart and other large retailers use RFID to maintain inventory, stop shoplifting, and speed customer checkout process

bluetooth

wireless PAN technology that transmits signals over short distances between cell phones, computer, and other devices The name is borrowed from Harald Bluetooth, a king in Denmark more than 1,000 years ago Bluetooth eliminates the need for wires, docking stations, or cradles, as well as the special attachments that typically accompany personal computing devices Bluetooth operates at speeds up to 1 Mbps within a range of 33 feet or less Devices that are Bluetooth-enables communicate directly with each other in pairs, like a handshake Up to 8 can be paired simultaneously And bluetooth is not just for technology devices An array of bluetooth-equipped appliances, such as a television set, a stove, and a thermostat, can be controlled from a cell phone, all from a remote location

cell phones

Although mobile communications have been around for generations, including the walkie-talkies of the 1940s and mobile radio phones of the 1950s, it was not until 1983 that cellular telephony became available commercially A cell phone is a device for voice and data, communicating wirelessly through a collection of stationary ground-based sites called base stations, each of which is liked to its nearest neighbor stations Base station coverage areas are about 10 square miles and are called cells Each cell is typically sized at about 10 square miles Each cell has a base station that consists of an antennae or tower to relay signals The first cell phone was demonstrated in 1973 by Motorola (it weighed almost 2 pounds), but it took 10 years for the technology to become commercially available The Motorola Dyna-TAC marketed in 1983 weighed one pound and cost about $4,000 Cellular systems were originally designed to provide voice services to mobile customers and thus were designed to interconnect cells to the public telephone network Increasingly, they provide data services and Internet connectivity There are more cell phones than landline phones in many countries today and it is no longer uncommon for cell phones to be the only phones people have

internet protocol TV (IPTV)

An exciting and new convergence is occurring in the area of television with Internet Protocol TV (IPTV): which distributes digital video content using IP across the Internet and private IP networks Comcast provides an example of a private IP network that also acts as a cable TV provider Traditional television sends all program signals simultaneously to the television, allowing the user to select the program by selecting a channel With IPTV, the user selects a channel and the service provider sends only that single program to the television Like cable TV, IPTV uses a box that acts like a modem to send and receive the content HDTV - IPTV Set-Top Box - Internet -IPTV Service Provider - World TV Broadcasts Goes both ways A few IPTV features include Support of multiple devices: PCs and televisions can access IPTV services Interactivity with users: Interactive applications and programs are supported by IPTV's two-way communication path Low bandwidth: IPTV conserves bandwidth because the provider sends only a single channel Personalization: Users can choose not only what they want to watch, but also when they want to watch it

dedicated communications lines

Another alternative to DSL or high-speed Internet cable is dedicated communications lines leased from AT&T or another provider The most common are T1 lines, a type of data connection able to transmit a digital signal at 1.544 Mbps Although this speed might not seem impressive and T1 lines are more expensive than DSL or cable, they offer far greater reliability because each is composed of 24 channels, creating 24 separate plants through one line. If a company has three separate plants that experience a high volume of data traffic, it might make sense to lease lines for reliability of service A company must match its needs with Internet access methods If it always needs high bandwidth access to communicate with customers, partners, or supplies, a T1 line may be the most cost-effective method

internet service provider (ISP)

Another level down is an Internet Service Provider (ISP), which specializes in providing management, support, and maintenance to a network ISPs vary services provided and available bandwidth rates ISPs link to RSPs, and, if they are geographically close, to other ISPs Some also connect directly to NSPs, thereby sidestepping the hierarchy Individuals and companies use local ISPs to connect to the Internet and large companies tend to connect directly using an RSP Major ISPs in the United States include AOl, AT&T, Comcast, Earthlink, and NetZero

national service producers (NSPs)

At the top of the hierarchy are National service producers (NSPs): private companies that own and maintain the worldwide backbone that supports the Internet These include Sprint, Verizon, MCI (previously UUNet/WorldCom), AT&T, NTT, Level3, Century Link, and Cable & Wireless Worldwide Network access points (NAPs) are traffic exchange points in the routing hierarchy of the Internet that connects NSPs They Typically have regional or national coverage and connect to only a few NSPs Thus, to reach a large portion of the global Internet, a NAP needs to route traffic through one of the NSPs to which it is connected

Transmission Control Protocol/internet protocol (TCP/IP)

Network access technologies use a standard Internet protocol called Transmission control protocol/internet protocol (TCP/IP): provides the technical foundation for the public Internet as well as for large numbers of private networks One of the primary reasons for developing TCP/IP was to allow diverse or differing networks to connect and communicate with each other, essentially allowing LANs, WANs, and MANs to grow with each new connection TCP verifies the correct delivery of data because data can become corrupt when traveling over a network TCP ensures the size of the data packet is the same throughout its transmission and can even retransmit data until delivered correctly IP verifies the data are sent to the correct IP address, numbers represented by four strings of numbers ranging from 0 to 255 separated by periods Another way to understand TCP/IP: consider a letter that needs to go from the University of Denver to Apple's headquarters in Cupertino, California TCP makes sure the envelope is delivered and does not get lost along the way IP acts as the sending and receiving labels, telling the letter carrier where to deliver to the envelope and whom it was from The Postal Service mainly uses street addresses and zip codes to get letters to their destinations, which is really what IP does with its addressing method However, unlike the Postal Service, which allows multiple people to share the same physical address, each device using an IP address to connect to the Internet must have a unique address or else it could not detect which individual device a request should be sent to One of the most valuable characteristics of TCP/IP is how scalable its protocols have proven to be as the Internet has grown from a small network with just a few machines to a huge internet-work with millions of devices While some changes have been required periodically to support this growth, the core of TCP/IP is the same as it was more than 25 years ago

worldwide interoperability for microwave access (WiMAX)

One WMAN with the potential for success is Worldwide Interoperability for Microwave Access (WiMAX): a communications technology aimed at providing high-speed wireless data over metropolitan area networks In many respects, WiMAX operates like Wi-Fi, only over greater distances and with higher bandwidths A WiMAX tower serves as an access point and can connect to the Internet or another tower A single tower can provide up to 3,000 square miles of coverage, so only a few are needed to cover an entire city WiMax can support data communications at a rate of 70 Mbps In NYC, one or two WiMAX access points around the city might meet the heavy demand more cheaply than hundreds of Wi-Fi access points WiMAX can also cover remote or rural areas where cabling is limited or nonexistent, and where it is too expensive or physically difficult to install wires for the relatively few users WiMAX can provide both line-of-sight service and non-line-of-sight service A non-line-of-sight service uses a small antenna on a mobile device that connects to a Wi-MAX tower less than 6 miles away where transmissions are disrupted by physical obstructions This form of service is similar to Wi-Fi but has much broader coverage area and higher bandwidths A line-of-sight option offers a fixed antenna that points at the WiMAX tower from a rooftop or pole This option is much faster than non-line-of-sight service, and the distance between the WiMax tower and antenna can be as great as 30 miles The WiMAX tower connects to ISP which connects to the Internet in both cases Some cellular companies are evaluating WiMAX as a means of increasing bandwidth for a variety of data-intensive applications such as those used by smartphones Sprint Nextel and Clearwire are building a nationwide WiMAX network in the US WiMAX-capable gaming devices, laptops, camera, and even cell-phones are being manufactured by companies including Intel, Motorola, Nokia and Samsung

benefits and challenges of a connected world

Resource sharing makes all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user Sharing physical resources also supports a sustainable MIS infrastructure, allowing companies to be agile, efficient, and responsible at the same time Cloud computing and virtualization consolidate information as well as systems that enhance the use of shared resources By using shared resources, cloud computing and virtualization allow for collective computing power, storage, and software, in an on-demand basis Perhaps even more important than sharing physical resources is sharing data Most companies, regardless of size, depend not just on their customer records, inventories, accounts receivable, financial statements, and tax information, but also on their ability to share these, especially with operations in remote locations Networking with a LAN, WAN, or MAN allows employees to share data quickly and easily and to use applications such as databases and collaboration tools that rely on sharing By sharing data, networks have made business processes more efficient For example, as soon as an order is placed, anyone in the company who needs to view it, whether in marketing, purchasing, manufacturing, shipping, or billing can do so Intranets and extranets let firms share their corporate information securely

SSL Certificate

To create an SSL connection, a web server requires an SSL Certificate: an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company Typically a SSL certificate will constrain a domain name, the company name and address, and the expiration date of the certificate and other details Verisign is the leading Internet Certification Authority that issues SSL Certificates When a browser connects to a secure site, it retrieves the site's SSL Certificate, makes sure it has not expired, and confirms a Certification Authority has issued it If the certificate fails on any one of these validation measures, the browser will display a warning to the end user that the site is not secure If a website is using SSL, a lock icon appears in the lower right-hand corner of the user's web browser

Secure hypertext transfer protocol (SHTTP or HTTPS)

a combination of HTTP and SSL to provide encryption and secure identification of an Internet server HTTPS protects against interception of communications, transferring credit card information safely and securely with special encryption techniques When a user enters a web address using https:// the browser will encrypt the message However, the server receiving the message must be configured to receive HTTPS messages In summary, each company needs to create a network security policy that specifies aspects of data integrity availability and confidentiality or privacy as well as accountability and authorization With a variety of security methods, such as SSL and SHTTP, a company can protect its most important asset, its data

peer-to-peer (P2P) network

a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server Unlike typical VoIP systems that use a client and server infrastructure, Skype uses a peer-to-peer network Skype's user directory is distributed among the users in its network, allowing scalability without a complex and expensive centralized infrastructure Peer-to-peer networks became an overnight sensation years ago through a service called Napster that distributed digital music illegally Skype has found a way to use this resource to provide value to its users

modem

a device that enables a computer to transmit and receive data A connection with a traditional telephone line and a modem, which most residential users had in the 1990s, is called dial-up access Today, many users in underdeveloped countries and in rural areas in developed countries still use dial-up It has two drawbacks: First, it is slow, providing a maximum rate of 56 Kbps (at 56 Kbps it takes 8 min to download a three-minute song and more than a day to download a two hour movie Second, dial-up modem access ties up the telephone line so the user cannot receive and make phone calls while online The good news its this is not as big an issue as it once was as many people have cell phones and no longer require the telephone line for making phone calls

RFID accelerometer

a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxicab speeds

broadband

a high-speed Internet connection that is always connected Once the most common connection method worldwide, dialup is quickly being replaced with broadband High Speed in this case refers to any bandwidth greater than 2 Mbps Not long ago, broadband speeds were available only at a premium price to support large companies' high traffic networks Today, inexpensive access is available for home use and small companies The two most prevalent types of broadband access are digital subscriber lines and high-speed Internet cable connections

Metropolitan area network (MAN)

a large computer network usually spanning a city Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN For example it connects East and West Campus

wireless LAN (WLAN)

a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet

cable modem (or broadband modem)

a type of digital modem used with high-speed cable Internet service Cable modems connect a home computer (or network of home computers) to residential cable TV service, while DSL modems connect to residential public telephone service The ISP typically supplies the cable and DSL modems Cisco Systems is one of the largest companies producing computer networking products and services, including the Linksys brand of networking components Typically broadband or high-speed Internet service has an average transfer rate 10 times faster than conventional dial-up service

wireless fidelity (Wi-Fi)

a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves Wi-Fi has a maximum range of about 1,000 feet in open areas such as a city park and 250-400 feet in closed areas such as an office building In a Wi-Fi network, the user's laptop or other Wi-Fi enabled device has a wireless adapter that translates data into a radio signal and transmits it to the wireless access point The wireless access point which consists of a transmitter with an antenna that is often built into the hardware, receives the signal and decodes it The access point then sends the information to the Internet over a wired broadband connections When receiving data, the wireless access point takes the information from the Internet, translates it into a radio signal, and sends it to the computer's wireless adaptor If too many people try to use the Wi-Fi network at one time, they ca experience interference or dropped connections Most laptop computers come with built-in wireless transmitters and software to enable computers to automatically discover the existence of a Wi-Fi network Wi-Fi operates at considerably higher frequencies than cell phones use, which allows greater bandwidth The bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as 802.11, for carrying out wireless local area network communication An increasing number of digital devices, including most laptops, netbooks, tablets such as the iPad and even printers are incorporating Wi-Fi technology into their design Cell phones are incorporating Wi-Fi so they can automatically switch from the cell network to a faster Wi-Fi network where available for data communications BlackBerrys and iPhones can connect to an access point for data communications such as email and web browsing, but not for voice unless they use the services of Skype of another VoIP

streaming

a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred Streaming is not limited to cellular usage; all wireless and even wired networks can take advantage of this method The most obvious advantage is speed, a direct benefit for mobile and wireless devices since they are still not as fast as their wired counterparts

wireless MAN (WMAN)

a metropolitan area network that uses radio signals to transmit and receive data WMAN techngologies have not been highly successful to date, mainly because they are not widely available, at least in the US

intranet

a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business process Intranet Uses: Business Operations and Management: Example: developing custom applications like order processing, inventory control, and sales management. Employees within the company can access and run such applications using web browsers from anywhere on the network whenever needed Communications and Collaboration: Example using a browser to send and receive email, voice mail, documents, and web pages to communicate with others within the organization, as well as externally through the Internet Web Publishing: Example: newsletters, technical documentations, and product catalogs can be published in a variety of ways, including web pages, email, and as part of organizations business applications This network is protected by security measures such as passwords, encryption, and firewalls and thus only authorized users can access it Intranets provide a central location for all kinds of company related information such as benefits, schedules, strategic directions, and employee directories

geocoin

a round coin-sized object that is uniquely numbered and hidden in geocache Geocoins can also be shaped to match a theme such as the state of Colorado or a birthday party hat Geocoins are often decorative or commemorative, making them collective and highly valuable for technology adventures

IP address

a unique number that identifies where computers are located on the network IP addresses appear in the for of xxx.xxx.xxx.xxx, though each grouping can be as short as a single digit For example, the IP address of www.apple.com is 97.17.237.15

wireless WAN (WWAN)

a wide area network that uses radio signals to transmit and receive data WWAN technologies can be divided into two categories: cellular communication systems and satellite communication systems The other wireless WAN technology is a satellite communication system

Global Positioning System (GPS)

a satellite-based navigation system providing extremely accurate position, time, and speed information The US Department of Defense developed the technology in the early 1970s and later made it available to the public GPS uses 24 global satellites that orbit Earth, sending signals to a receive that can communicate with three or four satellites at a time A GPS receiver can be a separate unit connected to a mobile device using cable or wireless technology such as Bluetooth, or it can be included in devices such as mobile phones or vehicle navigation systems The satellites broadcast signals constantly, while the receiver measures the time it takes for the signals to reach it This measurement, which uses the speed of the signal to determine the distance, is taken from three distinct satellites to provide precise information The time measurements depend on high-powered clocks on each satellite and must be precise, because an error of one-thousandth of a second can result in a location variation of more than 200 miles GPS can produce very accurate results, typically within 5 to 50 feet of the actual location (military versions have higher accuracy) GPS also provides latitude, longitude, and elevation information GPS applications are in every kind of company vehicle these days from police cars to bulldozers, from dump trucks to mayoral limousines Emergency response systems use GPS to track each of their vehicles and so dispatch those closest to the scene of an accident If a vehicle is missing, its GPS locator can help locate it

3G (Third-generation)

a service that brings wireless broadband to mobile phones The 3G networks let users surf webpages, enjoy streaming music, watch video-on-demand programming, download and play 3-D games, and participate in social media and teleconferencing

file transfer protocol (FTP)

a simple network protocol that allows the transfer of files between two computer on the Internet To transfer files with FTP, the FTP client program initiates a connection to a remote computer running FTP "server" software After completing the connection, the client can choose to send and/or receive files electronically

packet

a single unit of binary data routed through a network Packets directly impact network performance and reliability by subdividing an electronic massage into smaller, more manageable packets

satellite

a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area When satellite systems first came into consideration in the 1990s, the goal was to provide wireless voice and data coverage for the entire planet, without the need for mobile phones to roam between many different provider networks But by the time satellite networks were ready for commercial use, they had already been overtaken by cellular systems The devices used for satellite communication range from handheld units to mobile base stations to fixed satellite dish receivers The peak data transmission speeds range from 2.4 Kbps to 2 Mbps For the everyday mobile professional, satellite communication may not provide a compelling benefit, but for people requiring voice and data access from remote locations or guaranteed coverage in nonremote locations, satellite technology is a viable solution Conventional communication satellites move in stationary orbits approximately 22,000 miles above Earth A newer satellite medium, the low-orbit satellite, travels much closer to Earth and is able to pick up signals from weak transmitters Low-orbit satellites also consume less power and cost less to launch than conventional satellites With satellite networks, businesspeople almost anywhere in the world have access to full communication capabilities, including voice, videoconferencing, and Internet access Satellites connect to fixed locations like a home, portable communications like laptop and phone, and even vehicles like trucks and cars

protocol

a standard that specifies the format of data as well as the rules to be followed during transmission Computers using the same protocol can communicate easily, providing accessibility, scalability, and connectability between networks

RFID reader (RFID interrogator)

a transmitter/receiver that reads the contents of RFID tags in the area Readers can be stand-alone devices, such as for self-checkout in a grocery store, integrated with a mobile device for portable use, or built in as in printers The reader sends a wireless request that is received by all tags in the area that have been programmed to listen to wireless signals Tags receive the signal via their antenna and respond by transmitting their stored data The tag can hold many types of data, including a product number, installation instructions, and history of activity (such as the date the item was shipped) The reader receives a signal from the tag using its antenna, interprets the information sent, and transfers the data to the associated computer system or server

trace route

a utility application that monitors the network path of packet data sent to a remote computer Traceroute programs send a series of test messages over the network (using the name or IP address) until the last message finally reaches its destination When finished, traceroute displays the path from the initial computer to the destination computer

Wi-Fi protected access (WPA)

a wireless security protocol to protect Wi-Fi networks WLANs that use Wi-Fi have a built-in security mechanism called WPA It is an improvement on the original Wi-Fi security standard, wired equivalent privacy (WEP), and provides more sophisticated data encryption and user authentication Anyone who wants to use an access point must know the WPA encryption key to access the Wi-Fi connection

digital divide

a worldwide gap giving advantage to those with access to technology Only a small fraction of the world's population has access to the Internet, and some people who have had access in the past have lost it due to changes in their circumstances such as unemployment or poverty Providing network access to those who want or need it helps to level the playing field and removes the digital divide Organizations trying to bridge the divide include the Boston Digital Bridge Foundation, which concentrates on local schoolchildren and their parents, helping to make them knowledgeable about computers, programs, and the Internet Other organizations provide inexpensive laptops and Internet access to low-income areas in developing countries

mobile application management (MAM)

administers and delivers applications to corporate and personal smartphones and tablets MAM software assists with software delivery, licensing, and maintenance and can limit how sensitive data can be shared among apps An important features of MAM is that is provides corporate network administrators with the ability to wipe corporate mobile apple from an end user's device remotely

dynamic host configuration protocol (DHCP)

allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network DHCP allows computers to access and locate information about a computer on the server, enabling users to locate and renew their IP address ISPs usually use DHCP to allow customers to join the Internet with minimum effort DHCP assigns unique IP addresses to devices, then releases and renews these addresses as devices leave and return to the network

voice over LTE

allows mobile voice calls to made over broadband networks, creating-under the right network conditions-clearer audio and fewer dropped calls One easy way to think of VoLTE is as, essentially, a VoIP call on your mobile phone The functionality is still the same, but the data transfers in a faster and more efficient manner

telecommuting (virtual workplace)

allows users to work from remote locations such as a home or hotel, using high-speed Internet to access business applications and data

RFID tag

an electronic identification device that is made up of a chip and antenna Tags, often smaller than a grain of rice, can be applied to books or clothing items as part of an adhesive bar-code label, or included in items such as ID cards of packing labels

wired equivalent privacy (WEP)

an encryption algorithm designed to protect wireless transmission data If you are using a Wi-Fi connection, WEP encrypts the data by using a key that converts the data to a nonhuman readable form The purpose of WEP was to provide wireless networks with the equivalent level of security as wired networks Unfortunately, the technology behind WEP has been demonstrated to be relatively insecure compared to newer protocols such as WPA

extranet

an extension of an intranet that is only available to authorized outsiders, such as customers, partners, and suppliers Having a common area where these parties can share information with employees about, for instance, order an invoice processing can be a major competitive advantage in product development, cost control, marketing, distribution, and supplier relations Extranets enable customers, suppliers, consultants, subcontractors, business prospects, and others to access selected intranet websites and other company network resources that allow the sharing of information Consultants and contractors can facilitate the design of new products or services Supplies can ensure that the raw materials necessary for the company to function are in stock and can be delivered in a timely fashion Customers can access ordering and payment functions and check order status The extranet links the company to the outside world in a way that improves its operations Extranets provide business value in several ways First, by relying on web browsers they make customer and supplier access to company resources easy and fast Second, they enable a company to customize interactive web-enabled services for the intended audience, to build and strengthen strategic relationships with customers and suppliers Finally, extranets can allow and improve collaboration with customers and other business partners Intranets and extranets let firms share their corporate information securely

institute of electrical and electronic engineers (IEEE)

an organization that researches and institutes electrical standards for communication and other technologies

Two methods for encrypting network traffic on the web

are secure sockets layer and secure hypertext transfer protocol

virtual private network (VPN)

companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet A VPN acts like a "tunnel" connecting customer using a VPN and supplier using a VPN to the Internet to the company server

Local area network (LAN):

connects a group of computers in close proximity, such as in an office building, school, or home LAN's allow sharing of files, printers, games, and other resources Example: city library

domain name system (DNS)

converts IP address into domains, or identifying labels that use a variety of recognizable naming conventions If there is one flaw in TCP/IP, it is the complexity of IP addresses This is why we use a DNS Therefore, instead of trying to remember 97.17.237.15, users can simply specify a domain name to access a computer or website, such as www.apple.com The most common internet Domains: .biz: reserved for businesses .com: reserved for commercial organizations and businesses .edu: reserved for accredited postsecondary institutions .gov: reserved for US government agencies .info: open to any person or entity, but intended for information providers .mil: reserved for US military .net: open to any person or entity .org: reserved for nonprofit organizations The list of domain names is expected to expand in the coming years to include entities such as .pro (for accountants, lawyers and physicians), .aero (for the air-transport industry), and .museum (for museums) The creation of an .xxx domain was recently approved for pornographic content Countries also have domain names such as .au (Australia), .fr (France), and .sp (Spain) Websites with heavy traffic often have several computers working together to share the load of requests This offers load balancing and fault tolerance, so when requests are made to a popular site as www.facebook.com, they will not overload a single computer and the site does not go down if one computer fails A single computer can also have several host names, for instance, if a company is hosting several websites on a single serve, much as an ISP works with hosting Domain names are essentially rented, with renewable rights, from a domain name registrar such as godaddy.com Some registrars only register domain names, while others provide hosting service for a fee ICANN (Internet Corporation for Assigning Names and Numbers) is a nonprofit governance and standards organization that certifies all domain name registrars throughout the world With th certification, each registrar is authorized to register domain names, such as .com, .edu. or .org

war driving

deliberately searching for Wi-Fi signals from a vehicle Many individuals who participate in war driving simply map where Wi-Fi networks are available Other individuals have a more malicious intent and use war driving to hack or break into these networks War driving has been a controversial practice since its inception and has raised the awareness of the importance of wireless network security

hotspot

designated locations where Wi-Fi access points are publicly available, areas around access points where users can connect to the Internet Hotspots are found in places such as restaurants, airports, and hotels, places where business professionals tend to gather Hotspots are extremely valuable for those business professionals who travel extensively and need access to business applications By positioning hotspots at strategic locations throughout a building, campus, or city, network administrators can keep Wi-Fi users continuously connected to a network or the Internet, no matter where they roam

social issues with networking

digital divide Another social issue with networking occurs with newsgroups or blogs where like-minded people can exchange messages If the topics are technical in nature or sports related such as cycling, few issues arise Problems can begin when social media feature topics people can be sensitive about, such as politics, religion, or sex, or when someone posts an offensive message to someone else Different countries have different and even conflicting laws about Internet, use, but because the Internet knows no physical boundaries, communication is hard to regulate, even if anyone could Some people believe network operators should be responsible for the content they carry, just as newspapers and magazines are Operators, however, feel that like the post office or phone companies, they cannot be expected to police what users say If they censored messages, how would they avoid violating users' right to free speech Many employers read and censor employee emails and limit employee access to distracting entertainment such as YouTube and social networks such as Facebook Social issues can even affect the government and its use of networks to snoop on citizens The FBI has installed a system at many ISPs to scan all incoming and outgoing email for nuggets of interest The system was originally called Carnivore but bad publicity caused it to be renamed DCS1000 While the name is much more generic, its goal is the same: locate information on illegal activities by spying on millions of people A common conception associated with networking technologies is "Big Brother is watching!" People are wary of how much information is available on the Internet and how easily it can fall into the wrong hands

passive RFID tags

do not have a power source Passive RFID tags draw power from the RFID reader, which sends out electromagnetic waves that induce a current in the tag's antenna The cost of active and semi-passive RFID tags is significant; hence, low-cost items typically use passive RFID tags

wireless access point (WAP)

enables devices to connect to a wireless network to communicate with each other

active RFID tags

have their own transmitter and a power source (typically a battery) The power source runs the microchip's circuitry and broadcasts a signal to the reader (similar to the way a cell phone transmits a signal to a base station) Active and semi-passive tags are useful for tracking high-value goods that need to be scanned over long ranges, such as railway cars on a track The cost of active and semi-passive RFID tags is significant; hence, low-cost items typically use passive RFID tags

types of Internet Access

he bandwidths in this figure represent average speeds: actual speeds vary depending upon the service provider and other factors such as the type of cabling and speed of the computer Dial-up: on demand access using a modern and regular telephone line Bandwidth: up to 56 Kbps Comments: cheap but slow compared with other technologies DSL: always-on connection. Special modem needed Bandwidth: Download: 1 Mbps to 2Mbps Upload: 128 Kbps to 1 Mbps Comments: makes use of the existing local telephone infrastructure Cable: always-on connection. Special cable modem and cable line required Bandwidth: Download: 512 Kbps to 50 Mbps Upload: 786 Kbps Comments: it is a shared resource with other users in the area T1: leased lines for high bandwidth Bandwidth: 1.544 Mbps Comments: more expensive than dial-up, DSL, or cable

Wi-Fi infrastructure

includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send a Wi-Fi signal Most WLANs use a Wi-Fi infrastructure in which a wireless device, often a laptop, communicates through an access point or base station by means of, for instance, wireless fidelity

packet header

lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data The packet header and packet foot contain error checking information to ensure the entire message is sent and received The receiving device reassembles the individual packets into the original by stripping off the headers and footers and then piecing together the packets in the correct sequence

mobile

means the technology can travel with the user, for instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference Information collected while on the road can be synchronized with a PC or company server

semi-passive RFID tags

nclude a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader Active and semi-passive tags are useful for tracking high-value goods that need to be scanned over long ranges, such as railway cars on a track The cost of active and semi-passive RFID tags is significant; hence, low-cost items typically use passive RFID tags

asset tracking

occurs when a company places active or semi passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention Asset tracking allows a company to focus on its supply chain, reduce theft, identify the last known user of assets, and automate maintenance routines

edge matching (warping, rubber sheeting)

occurs when paper maps are laid edge to edge, and items that run across maps but do not match are reconfigured to match Edge matching is a critical component of creating a GIS database because map mis-alignments occur frequently for many reasons, including survey error and cartographic errors

cartography

the science and art of making an illustrated map or chart

smartphones

offer more advanced computing ability and connectivity than basic cell phones They allow for web browsing, emailing, listening to music, watching video, computing, keeping track of contacts, sending text messages, and taking and sending photos Example: Apple iPhone and RIM Blackberry Cell phones and smartphones, or mobile phones as they are collectively called, need a provider to offer services, much as computer users need an ISP to connect to the Internet The most popular mobile phone providers in the US are AT&T, Sprint, T-Mobile, and Verizon They offer different cell phones, features, coverage areas, and services One of the services is third generation or 3g

Wide area network (WAN)

pans a large geographic area such as a state, province, or country Perhaps the best example is the Internet WANs are essential for carrying out the day to day activities of many companies and government organizations, allowing them to transmit and receive information among their employees, customers, suppliers, business partners, and other organizations across cities, regions, and countries around the world WANs often connect multiple smaller networks, such as local area networks or metropolitan area networks Can connect many cities and countries A cloud image often represents the Internet or some large network environment

personal area network (PAN)

provide communication over a short distance that is intended for use with devices that are owned and operated by a single user Provides communication for devices owned by a single user that work over a short distance PAN's are used to transfer files, including email, calendar appointments, digital photos, and music A PAN can provide communication between a wireless headset and a cell phone or between a computer and a wireless mouse or keyboard Personal area networks generally cover a range of less than 10 meters (about 30 feet)

digital subscriber line (DSL)

provides high-speed digital data transmission over standard telephone lines using broadband modem technology allowing both Internet and telephone services to work over the same phone lines Consumers typically obtain DSL Internet access from the same company that provides their wired local telephone access, such as AT&T or Century Link Thus, a customer's telephone provider is also its ISP and the telephone line carries both data and telephone signals using a DSL modem DSL Internet services are used primarily in homes and small businesses\ DSL has two major advantages over dial-up First, it can transmit and receive data much faster - in the ` to 2 Mbps range for downloading and 128 Kbps to 1 Mbps for uploading (most high-speed connections are designed to download faster than they upload, because most users download more - including viewing web pages - than they upload) The second major advantage is that because they have an "always on" connection to their ISP, users can simultaneously talk on the phone and access the Internet DSL's disadvantages are that it works over a limited physical distance and remains unavailable in many areas where the local telephone infrastructure does not support DSL technology The two most prevalent types of broadband access are digital subscriber lines and high-speed Internet cable connections

broadband over power line (BPL)

technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems BPL works by transmitting data over electrical lines using signaling frequencies higher than the electrical (or voice in the case of DSL) signals BPL allows computer data to be sent back and forth across the network with no disruption to power output in the home Many homeowners are surprised to learn that their electrical system can serve as a home network running speeds between 1 and 3 Mbps with full Internet access Unfortunately, limitations such as interference and availability have affected BPL's popularity

bit (short for binary digit)

the smallest element of data and has a value of either 0 or 1

business applications of wireless networks

rCompanies of all types and sizes have relied on wireless technology for years Shipping and trucking companies developed some of the earliest wireless applications to help track vehicles and valuable cargo, optimize the logistics of their global operations, perfect their delivery capabilities, and reduce theft and damage Government agencies such as the National Aeronautics and Space administration and the Department of defence have relied on satellite technologies for decades to track the movement of troops, weaponry, and military assets, to receive and broadcast data, and to communicate over great distances Wireless technologies have also aided the creation of new applications Some build upon and improve existing capabilities UPS, for example, is combining several types of wireless network technologies from Bluetooth to WWANs and deploying scanners and wearable data collection terminals to automate and standardize package management and tracking across all its delivery centers Wireless Business Applications: Radio-Frequency Identification (FID) Global Positioning Systems (GPS) Geographic Information Systems (GIS)

network access points (NAPs)

re traffic exchange points in the routing hierarchy of the Internet that connects NSPs They Typically have regional or national coverage and connect to only a few NSPs Thus, to reach a large portion of the global Internet, a NAP needs to route traffic through one of the NSPs to which it is connected

repeater

receives and repeats a signal to extend its attenuation or range

wireless

refers to any type of operation accomplished without the use of a hard-wired connection There are many environments in which the network devices are wireless but not mobile such as wireless home or office networks with stationary PCs and printers Some forms of mobility do not require a wireless connection; for instance, a worker can use a wired laptop at home, shut down the laptop, drive to work, and attach the laptop to the company's wired network In many networked environments today, users are both wireless and mobile; for example, a mobile user commuting to work on a train can maintain a VoIP call and multiple TCP/IP connections at the same time

mobile device management (MDM)

remotely controls smartphones and tablets, ensuring data security one out of two ways an organization can manage IT consumerization MIS departments implement MDM by requiring passcodes on organizational smartphones to ensure data encryption and, in the event of a lost smartphone, that all data on the device can be deleted remotely MDM tools can also enforce policies, track inventory, and perform real-time monitoring and reporting One problem with MDM is that the full-device approach can be too heavy-handed in an era when employees, not their employers, own their smartphones and tables Users may wonder, "If I only use my phone to check email at night, why do I have to enter my work password every time I want to use my phone" or "if i lost my phone, why does my IT department want to wipe pictures of my dog remotely?"

latitude

represents a north/south measurement of position

longitude

represents an east/west measurement of position

packet footer

represents the end of the packet or transmission end

attenuation

represents the loss of a network, signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls

proxy

software that prevents direct communication between a sending and receiving computer and is used to monitor packers for security reasons

geographic information system (GIS)

stores, views, and analyzes geographic data, creating multidimensional charts or maps GPS provides the foundation for geographic information systems For example, GIs are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps A GIS accesses, manipulates, and analyzes spatial data Companies that deal in transportation combined GISs with database and GPS technology Airlines and shipping companies can plot routes with up-to-the-second information about the location of all their transport vehicles Hospitals can locate their medical staff with GIS and sensors that pick up transmissions from ID badges Automobiles have GPS linked to GIS maps that display the car's location and driving directions on a dashboard screen GM offers the OnStar system, which sends a continuous stream of information to the OnStar center about the car's exact location Some mobile phone providers combine GPS and GIS capabilities so they can locate users within a geographical area about the size of a tennis court to assist emergency services such as 911 Farmers can use GIS to map and analyze fields, telling them where to apply the proper amounts of seed, fertilizer, and herbicides A GIS can find the closets gas station or bank or determine the best way to get to a particular location But it is also good at finding patterns, such as finding the most feasible location to hold a conference according to where the majority of a company's customers live and work GIS can present this information in a visually effective way Some common GIS uses include: Finding what is nearby. Given a specific location, the GIS finds sources within a defined radius. These might be entertainment venues, medical facilities, restaurants, or gas stations. Users can also use GIS to locate vendors that sell a specific item they want and get the results as a ap of the surrounding area or an address Routing information. Once users have an idea where they want to go, GIS can provide directions to get there using either a map or step-by-step instructions. Routing information can be especially helpful when combined with search services Sending information alerts: users may want to be notified when information relevant to them becomes available near their location. A commuter might want to know that a section of the highway has traffic congestion, or a shopper might want to be notified when a favorite store is having a sale on a certain time Mapping densities: GIS can map population and event densities based on a standard area unit, such as square miles, making it easy to see distributions and concentrations. Police can map crime incidents to determine where additional patrolling is required, and stores can map customer orders to identity ideal delivery routes Mapping quantities: users can map quantities to find out where the most or least of a feature may be. For example, someone interested in opening a specialty coffee shop can determine how many others are already in the area and city planners can determine where to build more parks A GIS can provide information and insight to both mobile users and people at fixed locations Google Earth combines satellite imagery, geographic data, and Google's search capabilities to create a virtual globe that users can download to a computer or mobile device Not only does this provide useful business benefits, but it also allows for many educational opportunities Instead of just talking about the Grand Canyon, an instructor can use Google Earth to view that region

IT consumerization

the blending of personal and business use of technology devices and applications Today's workforce grew up with the Internet and its members do not differentiate between corporate and personal technology Employees want to use the same technology they have at home in the office This blending of personal and business technology is having a significant impact on corporate MIS departments, which traditionally choose all of the technology for the organization Today, MIS departments must determine how to protect their networks and manage technology that they did not authorize or recommend Two ways an organizations can manage IT consumerization is through mobile device management and mobile application management

access point (AP)

the computer or network device that serves as an interface between devices and the network Each computer initially connects to the access point and then to other computers on the network

network convergence

the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures In part due to the explosive use of the Internet and connectivity of TCP/IP, there is a convergence of network devices, applications, and services Consumers, companies, educational institutions, and government agencies extensively engage in texting, web surfing, video conference applications, online gaming, and ebusiness Almost any type of information can be converted into digital form and exchanged over a network Network convergence then allows the weaving together of voice, data, and video The benefits of network convergence allow for multiple services, multiple devices, but one network, one vendor, and one bill One of the challenges associated with network convergence is using the many different tools efficiently and productively Knowing which communication channel-PC, text message, videoconference, to use with each business participant can be a challenge

unified communications (UC)

the integration of communication channels into a single service UC integrates communication channels allowing participants to communicate using the method that is most convenient for them UC merges instant messaging, videoconferencing, email, voice mail, and VoIP This can decrease the communication costs for a business while enhancing the way individuals communicate and collaborate

IEEE 802.11n (or Wireless-N)

the newest standard for wireless networking Compared with earlier standards such as 802.11b, Wireless-N offers faster speeds, more flexibility, and greater range The organization denotes different versions of the standards, for example, Wireless-G and Wireless-N, by a lowercase letter at the end of this number Wi-Fi Standards and Bandwidths: 802.11a has a bandwidth of 54 Mbps 802.11b has a bandwidth of 11Mbps 802.11g has a bandwidth of 54 Mbps 802.11n has a bandwidth of 140 Mbps

bit rate (or data rate)

the number of bits transferred or received per unit of time Bandwidth is measured in terms of bit rate Bandwidth Speeds in terms of bit rates (Bandwidth is typically given in bits per second (bps) and bytes per second (Bps) - these two terms are not interchangeable Bandwidth: Kilobits (Kbps) 1 Kbps=1,000bps Example: traditional modem = 56 Kbps Megabits (Mbps) 1 Mbps=1,000Kpbs Example: Traditional Ethernet-10 Mbps Fast Ethernet=100 Mbps Gigabits (Gbps) 1 Gbps=1,000Mbps Example: Gigabit Ethernet=1,000 Mbps

war chalking

the practice of tagging pavement with codes displaying where Wi-Fi access is available The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured

Key difference between LANs, WANs, and Mans

they all provide users with an accessible and reliable network infrastructure but they differ in many dimensions Two of the most important are cost and performance It is easy to establish a network between two computers in the same room or building, but much more difficult if they are in different states or even countries This means someone looking to build or support a WAN either pays more or gets less performance, or both Ethernet is the most common connection type for wired networking and is available in speeds from 10 Mbps all the way up to 10,000 Mbps (10 Gbit) The most common wire used for Ethernet networking is Cat 5 (Category 5) and the connectors used are RJ45, slightly larger than the RJ11 connectors used by phones, but the same shape

chipless RFID tags

use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip

automatic vehicle location (AVL)

uses GPS tracking to track vehicles AVL systems use a GPS receiver in the vehicle that links to a control center Garmin is one of the more popular manufacturers of GPS tracking systems, offering vehicle tracking, phone and laptop integration, and hiker navigation for water and air

voice over IP (VoIP)

uses IP technology to transmit telephone calls One area experiencing huge growth in network convergence is the use of the Internet for voice transmission For the first time in more than 100 years, VoIP is providing an opportunity to bring about significant change in the way people communicate using the telephone VoIP service providers, specialists as well as traditional telephone and cable companies and some ISPs, allow users to call anyone with a telephone number, whether local, long distance, cellular, or international Two ways to use VoIP for telephone calls are through a web interface that allows users to make calls from their computer and through a phone attached to a VoIP adapter that links directly to the Internet through a broadband modem Network convergence: The Benefits of Network Convergence Multiple Services: Internet Access, VoIP, IPTV One Provider: one bill, one point of contact, one customer support center VoIP services include fixed-price unlimited local and long-distance calling plans (at least within the United States and Canada), plus a range of interesting features, such as: The ability to have more than one phone number, including numbers with different area codes Integrating email and voicemail so users can listen to their voicemail using their computer The ability to receive personal or business calls via computer, no matter where the user is physically located VoIP-enabled phones bypass the need for an adapter The biggest benefit of VoIP is its low cost Because it relies on the Internet connection, however, service can be affected if bandwidth is not appropriate or Internet access is not available Skype is a perfect example of IP applied to telephone use Unlike typical VoIP systems that use a client and server infrastructure, Skype uses a peer-to-peer network As the popularity of VoIP grows, governments are becoming more interested in regulating it as they do traditional telephone services In the US, the Federal Communications Commission requires compliance among VoIP service providers comparable to those for traditional telephone providers such as support for local number portability, services for the disabled, and law enforcement for surveillance, along with regulatory and other fees


Ensembles d'études connexes

Biblical foundations of social justice

View Set