BUS 305 Exam 3 (Ch 7 only)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Wide area networks (WANs) span broad geographical distances—entire regions, states, continents, or the entire globe. The most universal and powerful WAN is the Internet. Computers connect to a WAN through public networks, such as the telephone system or private cable systems, or through leased lines or satellites.

A metropolitan area network (MAN) is a network that spans a metropolitan area, usually a city and its major suburbs. Its geographic scope falls between a WAN and a LAN.

Together, the address is called a uniform resource locator (URL)

A web server is software for locating and managing stored web pages. It locates the web pages a user requests on the computer where they are stored and delivers the web pages to the user's computer.

broadband connections provided by telephone and cable TV companies running at 1 to 15 million bits per second.

If you had to connect the computers for two or more employees in the same office, you would need a computer network. In its simplest form, a network consists of two or more connected computers.

Packet switching is a method of slicing digital messages into parcels called packets, sending the packets along different communication paths as they become available and then reassembling the packets once they arrive at their destinations

In circuit-switched networks, such as the telephone system, a complete point- to-point circuit is assembled, and then communication can proceed. These dedicated circuit-switching techniques were expensive and wasted available communications capacity—the circuit was maintained regardless of whether any data were being sent

Client/server computing has largely replaced centralized mainframe computing in which nearly all the processing takes place on a central large mainframe computer.

Internet is the largest implementation of client/server computing.

Application layer. The Application layer enables client application programs to access the other layers and defines the protocols that applications use to exchange data. One of these application protocols is the Hypertext Transfer Protocol (HTTP), which is used to transfer web page files. 2. Transport layer. The Transport layer is responsible for providing the Application layer with communication and packet services. This layer includes TCP and other protocols.

Internet layer. The Internet layer is responsible for addressing, routing, and packaging data packets called IP datagrams. The Internet Protocol is one of the protocols used in this layer. 4. Network Interface layer. At the bottom of the reference model, the Network Interface layer is responsible for placing packets on and receiving them from the network medium, which could be any networking technology.

The old addressing system is being replaced by a new version of the IP addressing schema called IPv6 (Internet Protocol version 6), which contains 128-bit addresses (2 to the power of 128), or more than a quadrillion possible unique addresses.

Internet2 is an advanced networking consortium representing more than 500 U.S. universities, private businesses, and government agencies working with 66,000 institutions across the United States and international networking partners from more than 100 countries. T

The number of cycles per second that can be sent through that medium is measured in hertz—one hertz is equal to one cycle of the medium.

The range of frequencies that can be accommodated on a particular telecommunications channel is called its bandwidth. The bandwidth is the difference between the highest and lowest frequencies that can be accommodated on a single channel. The greater the range of frequencies, the greater the bandwidth and the greater the channel's transmission capacity.

A local area network (LAN) is designed to connect personal computers and other digital devices within a half-mile or 500-meter radius. LANs typically connect a few computers in a small office, all the computers in one building, or all the computers in several buildings in close proximity. LANs also are used to link to long-distance wide area networks (WANs, described later in this section) and other networks around the world, using the Internet.

The server determines who gets access to what and in which sequence. The router connects the LAN to other networks, which could be the Internet, or another corporate network, so that the LAN can exchange information with networks external to it. The most common LAN operating systems are Windows, Linux, and Novell.

Networks use different kinds of physical transmission media, including twisted pair wire, coaxial cable, fiber-optic cable, and media for wireless transmission. Each has advantages and limitations. A wide range of speeds is possible for any given medium, depending on the software and hardware configuration.

The total amount of digital information that can be transmitted through any telecommunications medium is measured in bits per second (bps). One signal change, or cycle, is required to transmit one or several bits; therefore, the transmission capacity of each type of telecommunications medium is a function of its frequency.

Microblogging, used in Twitter, is a type of blogging that fea- tures short posts of 140 characters or fewer.

The totality of blog-related websites is often referred to as the blogosphere.

Social search is an effort to provide fewer, more relevant, and trustworthy search results based on a person's network of social contacts.

The visual web refers to websites such as Pinterest, where pictures replace text documents, where users search pictures, and where pictures of products replace display ads for products.

Email enables messages to be exchanged from computer to computer, with capabilities for routing messages to multiple recipients, forwarding messages, and attaching text documents or multimedia files to messages.

Chat systems now support voice and video chat as well as written conversations.

Contemporary digital networks and the Internet are based on three key technologies: client/server computing, the use of packet switching, and the development of widely used communications standards (the most important of which is Transmission Control Protocol/Internet Protocol, or TCP/IP) for linking disparate networks and computer

Client/server computing, introduced in Chapter 5, is a distributed computing model in which some of the processing power is located within small, inexpensive client computers and resides literally on desktops or laptops or in handheld devices. These powerful clients are linked to one another through a network that is controlled by a network server computer. The server sets the rules of communication for the network and provides every client with an address so others can find it on the network.

Bluetooth is the popular name for the 802.15 wireless networking standard, which is useful for creating small personal area networks (PANs). It links up to eight devices within a 10-meter area using low-power, radio-based communication and can trans- mit up to 722 Kbps in the 2.4-GHz band.

Wi-Fi. The first of these standards to be widely adopted was 802.11b, which can transmit up to 11 Mbps in the unlicensed 2.4-GHz band and has an effective distance of 30 to 50 meters. The 802.11g standard can transmit up to 54 Mbps in the 2.4-GHz range. 802.11n is capable of transmitting over 100 Mbps. Today's PCs and net- books have built-in support for Wi-Fi, as do the iPhone, iPad, and other smartphones.

Hotspots are locations with one or more access points providing wireless Internet access and are often in public places. Some hotspots are free or do not require any additional software to use; others may require activation and the establishment of a user account by providing a credit card number over the web.

WiMax, which stands for Worldwide Interoperability for Microwave Access, is the popular term for IEEE Standard 802.16. It has a wireless access range of up to 31 miles and transmis- sion speed of up to 75 Mbps.

Even closer in time is a pervasive web that controls everything from a city's traf- fic lights and water usage, to the lights in your living room, to your car's rear view mirror, not to mention managing your calendar and appointments. This is referred to as the Internet of Things and is based on billions of Internet-connected sensors throughout our physical world.

The App Internet is another element in the future web. The growth of apps within the mobile platform is astounding.

Social networking sites enable users to build communities of friends and pro- fessional colleagues. Members typically create a profile—a web page for posting photos, videos, audio files, and text—and then share these profiles with others on the service identified as their friends or contacts.

The key features of Web 3.0 are more tools for individuals to make sense out of the 600 billion pages on the Internet, or the millions of apps available for smartphones and a visual, even three-dimensional (3D) Web where you can walk through pages in a 3D environment

Smartphones such as the iPhone, Android phones, and BlackBerry combine the functionality of a cell phone with that of a mobile laptop computer with Wi-Fi capability. This makes it possible to combine music, video, Internet access, and telephone service in one device. A large part of the Internet is becoming a mobile, access-anywhere, broadband service for the delivery of video, music, and web search.

3G networks, with transmission speeds ranging from 144 Kbps for mobile users in, say, a car, to more than 2 Mbps for stationary users, offer fair transmission speeds for email, browsing the web, and online shopping but are too slow for videos. 4G networks have much higher speeds: 100 megabits/second down- load and 50 megabits upload speed, with more than enough capacity for watching high-definition video on your smartphone.

Domain Name System (DNS) converts domain names to IP addresses. The domain name is the English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet.

At the top of the DNS hierarchy is the root domain. The child domain of the root is called a top-level domain, and the child domain of a top-level domain is called a second-level domain. Top-level domains are two- and three-character names you are familiar with from surfing the web, for example, .com, .edu, .gov, and the various country codes such as .ca for Canada or .it for Italy. Second-level domains have two parts, designating a top-level name and a second-level name—such as buy.com, nyu.edu, or amazon.ca. A host name at the bottom of the hierarchy designates a specific computer on either the Internet or a private network.

Firms in the past used two fundamentally different types of networks: telephone networks and computer networks. Telephone networks historically handled voice communication, and computer networks handled data traffic.

Both voice and data communication networks have also become more powerful (faster), more portable (smaller and mobile), and less expensive.

In packet-switched networks, messages are first broken down into small fixed bundles of data called packets. The packets include information for directing the packet to the right address and for checking transmission errors along with the data. The packets are transmitted over various communications channels by using routers, each packet traveling independently.

Different components in a network communicate with each other only by adhering to a common set of rules called protocols. A protocol is a set of rules and procedures governing transmission of information between two points in a network.

An Internet service provider (ISP) is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.

Digital subscriber line (DSL) technologies operate over existing telephone lines to carry voice, data, and video at transmission rates ranging from 385 Kbps all the way up to 40 Mbps, depending on usage patterns and distance.

a simple network: a client computer and a dedicated server computer, network interfaces, a connection medium, network operating system software, and either a hub or a switch.

Each computer on the network contains a network interface device to link the computer to the network. The connection medium for linking network components can be a telephone wire, coaxial cable, or radio signal in the case of cell phone and wireless local area networks (Wi-Fi networks

The network operating system (NOS) routes and manages communications on the network and coordinates network resources. It can reside on every computer in the network or primarily on a dedicated server computer for all the applications on the network. A server is a computer on a network that performs important network functions for client computers, such as displaying web pages, storing data, and storing the network operating system (hence controlling the network).

Hubs are simple devices that connect network components, sending a packet of data to all other connected devices. A switch has more intelligence than a hub and can filter and forward data to a specified destination on the network.

website is a collection of web pages linked to a home page.

Hypertext Transfer Protocol (HTTP). HTTP is the communications standard that transfers pages on the web.

Alternatively, LANs may use a peer-to-peer architecture. A peer-to-peer network treats all processors equally and is used primarily in small networks with 10 or fewer users. The various computers on the network can exchange data by direct access and can share peripheral devices without going through a separate server.

Larger LANs have many clients and multiple servers, with separate servers for specific services such as storing and managing files and databases (file servers or database servers), managing printers (print servers), storing and managing email (mail servers), or storing and managing web pages (web servers

A digital signal is a discrete, binary waveform rather than a continuous waveform. Digital signals communicate information as strings of two discrete states: one bits and zero bits, which are represented as on-off electrical pulses. Computers use digital signals and require a modem to convert these digital signals into analog signals that can be sent over (or received from) telephone lines, cable lines, or wireless media that use analog signals (see Figure 7.5)

Modem stands for modulator-demodulator. Cable modems connect your computer to the Internet by using a cable network. DSL modems connect your computer to the Internet using a telephone company's landline network. Wireless modems perform the same function as traditional modems, connecting your computer to a wireless network that could be a cell phone network or a Wi-Fi network.

The network infrastructure for a large corporation consists of a large number of these small local area networks linked to other local area networks and to firmwide corporate networks. A number of powerful servers support a corporate website, a corporate intranet, and perhaps an extranet. Some of these servers link to other large computers supporting back-end systems.

One of the major problems facing corporations today is how to integrate all the different communication networks and channels into a coherent system that enables information to flow from one part of the corporation to another and from one system to another.

The most common web server in use today is Apache HTTP Server

Search engines attempt to solve the problem of finding useful information on the web nearly instantly and, arguably, they are the killer app of the Internet era. Today's search engines can sift through HTML files; files of Microsoft Office applications; PDF files; and audio, video, and image files. There are hundreds of search engines in the world, but the vast majority of search results come from Google, Yahoo!, and Microsoft's Bing

Shopping bots use intelligent agent software for search- ing the Internet for shopping information.

Search engines have become major advertising platforms and shopping tools by offering what is now called search engine marketing.

A router is a communications processor that routes packets of data through different networks, ensuring that the data sent gets to the correct address.

Software-defined networking (SDN) is a new networking approach in which many of these control functions are managed by one central program, which can run on inexpensive commodity servers that are separate from the network devices themselves.

Cable Internet connections provided by cable television vendors use digital cable coaxial lines to deliver high- speed Internet access to homes and businesses. They can provide high-speed access to the Internet of up to 50 Mbps, although most providers offer service ranging from 1 Mbps to 6 Mbps. Where DSL and cable services are unavailable, it is possible to access the Internet via satellite, although some satellite Internet connections have slower upload speeds than other broadband services.

T1 lines offer guaranteed delivery at 1.54 Mbps, and T3 lines offer delivery at 45 Mbps.

corporate networks are increasingly using a single, common, worldwide standard called Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP was developed during the early 1970s to support U.S. Department of Defense Advanced Research Projects Agency (DARPA) efforts to help scientists transmit data among different types of computers over long distances.

TCP/IP uses a suite of protocols, the main ones being TCP and IP. TCP refers to the Transmission Control Protocol, which handles the movement of data between computers. TCP establishes a connection between the computers, sequences the transfer of packets, and acknowledges the packets sent. IP refers to the Internet Protocol (IP), which is responsible for the delivery of packets and includes the disassembling and reassembling of packets during transmission.

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. Data sent from one computer to the other passes downward through all four layers, starting with the sending computer's Application layer and passing through the Network Interface layer. After the data reach the recipient host computer, they travel up the layers and are reassembled into a format the receiving computer can use. If the receiving computer finds a damaged packet, it asks the sending computer to retransmit it. This process is reversed when the receiving computer responds.

There are two ways to communicate a message in a network: an analog signal or a digital signal. An analog signal is represented by a continuous waveform that passes through a communications medium and has been used for voice communication.

Search engine optimiza- tion (SEO) is the process of improving the quality and volume of web traffic to a website by employing a series of techniques that help a website achieve a higher ranking with the major search engines when certain keywords and phrases are put into the search field. One technique is to make sure that the keywords used in the website description match the keywords likely to be used as search terms by pro- spective customers

Today's websites don't just contain static content—they enable people to collabo- rate, share information, and create new services and content online. These second- generation interactive Internet-based services are referred to as Web 2.0.

VoIP can reduce communication and network management costs by 20 to 30 percent.

Unified communications integrates disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience by which users can seamlessly switch back and forth between different communication modes. Presence technology shows whether a person is available to receive a call

Instant messaging is a type of chat service that enables participants to create their own private chat channels

Voice over IP (VoIP) technology delivers voice information in digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks

The Internet is based on the TCP/IP networking protocol suite described earlier in this chapter. Every computer on the Internet is assigned a unique Internet Protocol (IP) address, which currently is a 32-bit number represented by four strings of numbers ranging from 0 to 255 separated by periods.

When a user sends a message to another user on the Internet, the message is first decomposed into packets using the TCP protocol. Each packet contains its destination address. The packets are then sent from the client to the network server and from there on to as many other servers as necessary to arrive at a specific computer with

RSS, which stands for Really Simple Syndication or Rich Site Summary, pulls specified content from websites and feeds it automatically to users' computers. RSS reader software gathers mate- rial from the websites or blogs that you tell it to scan and brings new information from those sites to you.

Wikis, in contrast, are collab- orative websites on which visitors can add, delete, or modify content, including the work of previous authors.

Radio frequency identification (RFID) systems provide a powerful technology for tracking the movement of goods throughout the supply chain. RFID systems use tiny tags with embedded microchips containing data about an item and its location to transmit radio signals over a short distance to RFID readers. The RFID readers then pass the data over a network to a computer for processing. Unlike bar codes, RFID tags do not need line-of-sight contact to be read.

Wireless sensor networks (WSNs) are networks of interconnected wireless devices that are embedded in the physical environment to provide measurements of many points over large spaces. These devices have built-in processing, storage, and radio frequency sensors and antennas. They are linked into an interconnected network that routes the data they capture to a computer for analysis.

Web 2.0 has four defining features: interactivity, real-time user control, social participation (sharing), and user-generated content. The technologies and services behind these features include cloud computing, software mashups and apps, blogs, RSS, wikis, and social networks.Web 2.0 has four defining features: interactivity, real-time user control, social participation (sharing), and user-generated content. The technologies and services behind these features include cloud computing, software mashups and apps, blogs, RSS, wikis, and social networks.

blog, the popular term for a weblog, is a personal website that typically contains a series of chronological entries (newest to oldest) by its author and links to related web pages. The blog may include a blogroll (a collection of links to other blogs) and trackbacks (a list of entries in other blogs that refer to a post on the first blog).

search engines capable of understanding what we are really looking for. Called semantic search, the goal is to build a search engine that could really understand human language and behavior.

predictive search part of most search results. This part of the search algorithm guesses what you are looking for and suggests search terms as you type your search words.

A virtual private network (VPN) is a secure, encrypted, private network that has been configured within a public network to take advantage of the economies of scale and management facilities of large networks, such as the Internet (see Figure 7.10). A VPN provides your firm with secure, encrypted communications at a much lower cost than the same capabilities offered by traditional non-Internet providers that use their private networks to secure communications. VPNs also provide a network infrastructure for combining voice and data networks.

tunneling, packets of data are encrypted and wrapped inside IP packets. By adding this wrapper around a network message to hide its content, business firms create a private connection that travels through the public Internet.


Set pelajaran terkait

Gr 6 Science - Water & Atmosphere 3.1 & 3.2

View Set

Unit 6 Progress Check: MCQ, Unit 5 WHAP

View Set

Assessment of Musculoskeletal Function Ch 39 (Brunner & Suddarth's) NCLEX

View Set

Strategic Management (Exam 1) Ch 3

View Set

Week 2 - Chapter 24: Asepsis and Infection Control

View Set

CHP 12: Small Business Accounting: Projecting and Evaluating Performance

View Set

chapter 4 quiz: taxes, retirement plans, and Social Security

View Set