Week 6

89
Chapter 3.1.4 (week 6) Telecommunications and Networks McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All rights reserved.

Transcript of Week 6

Page 1: Week 6

Chapter

3.1.4 (week 6)Telecommunications

and Networks

McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 2: Week 6

Learning Objectives

• Understand the concept of a network

• Apply Metcalfe’s law in understanding the value of a network

• Identify major developments and trends in the industries, technologies, and business applications of telecommunications and Internet technologies

• Provide examples of the business value of Internet, intranet, and extranet applications

6-2

Page 3: Week 6

Learning Objectives

• Identify the basic components, functions, and types of telecommunications networks used in business

• Explain the functions of major components of telecommunications network hardware, software, media, and services

• Explain the concept of client/server networking

6-3

Page 4: Week 6

Learning Objectives

• Understand the two forms of peer-to-peer networking

• Explain the difference between digital and analog signals

6-4

Page 5: Week 6

Case 1: Starbucks and Others• Wi-Fi hot spots emerged several years ago because of

the fast-growing popularity of laptops.• Wi-Fi enabled coffee shops quickly supplanted the

older style cybercafes, which relied on the expensive purchase and upkeep of PCs.

• Public Wi-Fi access is at crossroad with recent moves towards free and advertising-based provision of this service by Starbucks and others.

• As pressure mounts to make more Wi-Fi hot spots free, some companies are turning to Web advertising to offset costs or make money.

• Like television, Wi-Fi is increasingly given away in exchange for ads.

6-5

Page 6: Week 6

Case Study Questions1. Do you agree with the plans by Starbucks to

offer time limited free Wi-Fi to customers? Part of the idea is to push the Starbucks card and reap other business benefits from doing so. Do you think free Wi-Fi would be enough to instill that kind of loyalty? Based on the experiences of the other coffee houses reported above, do you think free access was a critical factor in developing a loyal customer base?

6-6

Page 7: Week 6

Case Study Questions2. Part of the reason for Starbucks’s move had to do with

increased competition from chains like McDonald’s for the morning breakfast crowd. However, Starbucks and McDonald’s hardly seem to be targeting the same public. Do you think that free wireless access by such a competitor would have moved a significant portion of Starbucks’s customers away? Why or why not?

3. The case notes some companies that offer free Wi-Fi in exchange for viewing advertisements or answering questions for market research studies. Would you be willing to do so in order to get free wireless access, say, at an airport? Would your answer change if you were using a corporate laptop versus your own, because of security concerns?

6-7

Page 8: Week 6

Network Concepts

• A network is an interconnected or interrelated chain, group, or system

• The number of possible connections on a network is N(N–1) or N2 –N– N = number of nodes (points of connection)

– Example: 10 computers on a network = 10(10–1) = 10x9 = 90 possible connections

6-8

Page 9: Week 6

Metcalfe’s Law• The usefulness, or utility, of a network equals

the square of the number of users– The more users on a network, the more useful

it becomes

• Until critical mass is reached, a change in technology only affects the technology– Once critical mass is attained, social, political, and

economic systems change– Example: The Internet is growing exponentially. We

can expect more value, for less cost, virtually every time we log on.

6-9

Page 10: Week 6

Telecommunication Trends

6-10

Page 11: Week 6

Telecommunications-Based Services

6-11

Page 12: Week 6

Internet Networking Technologies• Internet networking technologies are being

used as technology platform– Web browser suites– HTML Web page editors– Network management software– Firewalls

• Being applied in Internet, intranet, and extranet applications

• Reinforces previous move toward client/server networks based on open-systems architecture

6-12

Page 13: Week 6

Open Systems

• Open systems use common standards for hardware, software, applications, and networks– Internet networking technologies are a common standard

for open systems

• Connectivity– Open systems provide greater connectivity

and network interoperability– Middleware may be needed to help diverse systems work

together

6-13

Page 14: Week 6

Middleware• Middleware– A general term for any programming that mediates

between two separate programs– Allows a particular database to access other

databases without custom programming

• Commonly known as the “plumbing” of an information system – It routes data and information between back-end

data sources and end user applications– An essential component of any IT infrastructure

6-14

Page 15: Week 6

Digital Network Technologies• Telecommunications are being revolutionized

by switch from analog to digital– Analog: voice-oriented transmission– Digital: discrete pulse transmission

• Benefits– Higher transmission speeds– Moves larger amounts of information– Greater economy and much lower error rates– Transmits multiple types of communications (data,

voice, video) on the same circuits

6-15

Page 16: Week 6

Wireless Technologies• Fiber-optic– Uses pulses of laser-generated light– Reduced size and installation effort– Vastly greater communication capacity– Faster transmission speeds– Freedom from electrical interference

• Satellite Transmission– Can move massive quantities of data, audio,

and video over global networks– Especially useful in isolated areas

6-16

Page 17: Week 6

Business Application Trends• Telecommunications networks now play

a vital and pervasive role in Web-enabled…– E-business processes

– Electronic commerce

– Enterprise collaboration

– Other applications that support operations, management, and strategic objectives

6-17

Page 18: Week 6

Internet2

• Next generation of the Internet– High-performance

– Different infrastructure than the current Internet

– Will not replace the current Internet

– In use at over 200 universities, scientific institutions, communications corporations

– May never become totally open

– Users are connected via Abilene, a backbone that supports throughput of 10 Gbps

– Infinite bandwidth

6-18

Page 19: Week 6

Value of Telecommunications Networks

6-19

Page 20: Week 6

The Internet Revolution

• The Internet has become a global information superhighway– Millions of smaller, private networks operating independent of, or in

harmony with, each other

– 10 servers in 1991 to over 46 million today

– Sustained growth in excess of 1 million servers per month

– No central computer system

– No governing body

– Based on common standards

6-20

Page 21: Week 6

Internet Service Providers

• ISP– A company that specializes in providing easy access to the

Internet

– For a monthly fee, provides software, user name, password, and Internet access

• ISPs themselves are connected to one another through network access points– One ISP can easily connect to another to obtain addresses

of websites or user nodes

6-21

Page 22: Week 6

Internet Applications

• Most popular Internet applications and uses– E-mail

– Instant messaging

– Browsing the Web

– Newsgroups

– Chat rooms

– Publish opinions, subject matter, creative work

– Buy and sell

– Downloading (data, software, reports, pictures, music, videos)

6-22

Page 23: Week 6

Business Use of the Internet

6-23

Page 24: Week 6

Business Value of the Internet

6-24

Page 25: Week 6

The Role of Intranets• Many companies have sophisticated and

widespread intranets, offering…– Detailed data retrieval– Collaboration– Personalized customer profiles– Links to the Internet

• Intranets use Internet technologies– Web browsers and servers– TCP/IP network protocols– HTML publishing and databases

6-25

Page 26: Week 6

Intranets

• Intranets are protected by…– Passwords

– Encryption

– Firewalls

• Customers, suppliers, and other business partners can access an intranet via extranet links

6-26

Page 27: Week 6

Business Value of Intranets

• Intranets support

– Communications and collaboration

– Business operations and management

– Web publishing

– Intranet portal management

6-27

Page 28: Week 6

Intranets as Information Portals

6-28

Page 29: Week 6

Extranets

• Network links that use Internet technologies to connect the intranet of a business to the intranets of another

• Virtual Private Networks– Direct private network links, or private secure Internet

links between companies

• Unsecured Extranet– Link between a company and others via the Internet,

relying on encryption of sensitive data and firewall security systems

6-29

Page 30: Week 6

Extranet Connectivity

6-30

Page 31: Week 6

Business Value of Extranets• Web browser technology makes customer and

supplier access to intranets easier and faster

• Another way to build and strengthen strategic relationships

• Enables and improves collaboration between a business, customers, and partners

• Facilitates online, interactive product development and marketing

6-31

Page 32: Week 6

Telecommunications Network Alternatives

• Telecommunications is a highly technical, rapidly changing field– Most business professionals don’t need

detailed technical knowledge

– However, understanding basic components and their characteristics is necessary

– Can help you make informed decisions about telecommunications alternatives

6-32

Page 33: Week 6

Case 2: Metric & MultistandardComponents Corporation

• A secure network foundation can improve a small company’s operational efficiency, secure sensitive data, contain costs, and enhance employee connectivity and customer responsiveness.– It allows customers to securely track their orders in real time over the

Web– It empowers customer-service agents with detailed account

information to answer their customer’s enquiry– It can provide easy, inexpensive videoconferencing for remote

workers, vendors, and customers.

6-33

Page 34: Week 6

Case Study Questions

1. What were the most important factors contributing to MMCC’s success with its new, secure, self-managed network? Explain the reasons for your choices.

2. What are some of the business benefits and challenges of self-managed and externally managed networks?

3. Which type of network management would you advise small-to-medium business firms to use? Explain the reasons for your recommendation.

6-34

Page 35: Week 6

Telecommunications Network Model

• A telecommunications network is any arrangement where– A sender transmits a message

– To a receiver

– Over a channel

– Consisting of some sort of medium

6-35

Page 36: Week 6

Telecommunications Network Model

6-36

Page 37: Week 6

Telecommunications Network Components

• Terminals– Any input/output device that uses networks

to transmit or receive data

• Telecommunications processors– Devices that support data transmission, reception

• Telecommunications channels– Media over which data are transmitted, received

• Computers– All sizes and types

6-37

Page 38: Week 6

Telecommunications Network Components

• Telecommunications control software– Controls telecommunications activities

– Manages the functions of telecommunications networks

• Includes network management programs of all kinds– Telecommunications monitors (mainframes)

– Network operating systems (network servers)

– Web browsers (microcomputers)

6-38

Page 39: Week 6

Network Component Alternatives

6-39

Page 40: Week 6

Types of Communications Networks

• Primary types of communications networks– Wide Area

– Local Area

– Virtual Private

– Client/Server

– Peer-to-peer

6-40

Page 41: Week 6

Wide Area Network (WAN)• Telecommunication network that covers a

large geographic area

6-41

Page 42: Week 6

Local Area Network (LAN)• Connects computers within a limited physical area,

such as an office, classroom, or building

6-42

Page 43: Week 6

Virtual Private Networks (VPN)

• Used to establish secure intranets and extranets– The Internet is the main backbone network

– Relies on network firewalls, encryption, and other security features to build a “pipe” through the Internet

– Creates a private network without the high cost of a separate proprietary connection

6-43

Page 44: Week 6

Virtual Private Network

6-44

Page 45: Week 6

Client/Server Networks• Clients– End user personal computers or networked

computers

• Servers– Used to manage the networks

• Processing– Shared between the clients and servers– Sometimes called a two-tier architecture

• Larger computer systems are being replaced with multiple client/server networks

6-45

Page 46: Week 6

Client/Server Network

6-46

Page 47: Week 6

Network Computing• Networks are the central computing resource

of the organization– Thin clients provide a browser-based user interface

for processing applets

• Thin clients include– Network computers

– Net PCs

– Other low-cost network devices or information appliances

6-47

Page 48: Week 6

Network Computing• Application and database servers provide

– The operating system– Application software– Applets– Databases– Database management software

• Sometimes called a three-tier client/server model because it consists of– Thin clients– Application servers– Database servers

6-48

Page 49: Week 6

Network Computing

6-49

Page 50: Week 6

Peer-to-Peer Networks• Central Server Architecture– P2P file-sharing software connects all PCs

to a central server

– When a PC requests a file, the server searches all active peers on the network

– The server sends the requesting PC a list of links to all active peers who have the file

– Clicking a link connects the two PCs and automatically transfers the file to the requesting PC

6-50

Page 51: Week 6

Peer-to-Peer Networks

• Pure Peer-to-Peer Architecture– No central directory or server

– File-sharing software connects one PC to another online user

– When you request a file, the software searches every online user and sends you a list of active file names

– Clicking a link automatically transfers the file from that user’s hard drive to yours

6-51

Page 52: Week 6

Central Server Peer-to-Peer Networks

• Advantages– Can better protect the integrity and

security of the content and users of the network

• Disadvantages– Directory server can be slowed or

overwhelmed by too many users or technical problems

6-52

Page 53: Week 6

Peer-to-Peer Network Diagrams

6-53

Page 54: Week 6

Digital and Analog Signals• Analog or digital refers to the method used to

convert information into an electrical signal– Analog: an electrical current is generated that

is proportional to the quantity being observed

– Digital: the quantity being observed is expressed as a number• Analog: if the temperature is 83 degrees, a measuring

device would generate 8.3 volts

• Digital: a measurement of 83 degrees would be displayed as the number 83

6-54

Page 55: Week 6

Telecommunications Media

• Twisted-Pair Wire– Ordinary telephone

wire

– Copper wire is twisted into pairs

6-55

Page 56: Week 6

Telecommunications Media

• Coaxial Cable– Sturdy copper or

aluminum wire wrappedwith spacers to insulateand protect it

6-56

Page 57: Week 6

Telecommunications Media

• Fiber-Optic Cable– One or more hair-thin

filaments of glass fiber wrapped in a protective jacket

6-57

Page 58: Week 6

The Problem of “The Last Mile”

• Network providers use fiber optic cable as a communications backbone– Houses connected to the backbone are wired

with twisted pair

– Users don’t benefit from the faster, better technology

6-58

Page 59: Week 6

Wireless Technologies• Terrestrial Microwave– Earthbound microwave systems transmit

high-speed radio signals– Follows a line-of-sight path between relay systems

spaced about 30 miles apart

• Communications Satellites– Serve as relay stations– Use microwave radio signals– Earth stations beam signals to the satellites– Not suitable for interactive, real-time processing

6-59

Page 60: Week 6

Wireless Technologies• Cellular and PCS Telephone and Pager

Systems– Geographic areas are divided into cells

– Each cell has a low-power transmitter or radio relay antenna

– Computers and other communications processors coordinate and control the transmissions to and from mobile users

6-60

Page 61: Week 6

Wireless Technologies

• Wireless LANS– Uses wireless radio-wave technology to

connect PCs within an office or a building

– Can be high-frequency, similar to digital cellular, or low frequency (spread spectrum)

• Bluetooth– Short-range wireless technology

– Connects PCs to devices, such as a printer

– Fairly low cost to implement

6-61

Page 62: Week 6

Wireless Technologies• Other Wireless Systems

– Cellular phones– Mobile radio– PDAs

• Telecommunications networks now play vital and pervasive roles in– Web-enabled e-business processes– Electronic commerce– Enterprise collaboration– Other applications that support business operations,

management, and strategic objectives

6-62

Page 63: Week 6

The Wireless Web• Wireless Internet access is growing as Web-

enabled information appliances proliferate– Smart telephones, pagers, PDAs– All are very thin clients in wireless networks

6-63

Page 64: Week 6

Telecommunications Processors

• Modems– The most common type of communications

processor

– Converts a digital signal to an analog frequency that can be transmitted over phone lines, then back into a digital signal• Modulation and demodulation

6-64

Page 65: Week 6

Comparing Technologies

6-65

Page 66: Week 6

Inter-Network Processors

• Switch… makes connections between telecommunications circuits in a network

• Router… intelligent communications processor that interconnects networks based on different protocols

• Hub… a port-switching communications processor

• Gateway… connects networks with different communications architectures

6-66

Page 67: Week 6

Communications Processors

6-67

Page 68: Week 6

Communications Processors• Multiplexer… allows a single communications

channel to carry simultaneous data transmissions from many terminals– In time division multiplexing (TDM), the

multiplexer divides the time each terminal can use the high-speed into short time slots

• Multiplexers increase the number of transmissions possible– Does not increase the number of physical data

channels

6-68

Page 69: Week 6

Telecommunications Software

• May reside in PCs, servers, mainframes, and communications processors– Vital part of all telecommunications networks

– Used to manage network performance

– WANs often use telecommunications monitors or teleprocessing monitors

– Other networks use operating system software

– Middleware helps diverse networks communicate with each other

6-69

Page 70: Week 6

Network Management Functions

• Traffic Management– Manage network resources and traffic to

avoid congestion and optimize service levels

• Security– Provide authentication, encryption, firewall, auditing, and

enforcement

• Network Monitoring– Troubleshoot and watch over the network, alerting

administrators of potential problems

6-70

Page 71: Week 6

Network Management Functions

• Capacity Planning– Survey network resources, traffic patterns, and

users’ needs

– Determine the best way to accommodate the needs of the network as it grows and changes

6-71

Page 72: Week 6

Network Topologies• Topology– The structure of a network

• Star Network– Ties end user computers to a central computer

• Ring Network– Ties local computer processors together in a ring on

a relatively equal basis

• Bus Network– Local processors share the same communications

channel

6-72

Page 73: Week 6

Network Topologies

• Mesh Network– Uses direct communications lines to connect some or all of

the computers in the ring to each other

• Switch– A message-switching computer that handles

data communication between autonomous local computers

6-73

Page 74: Week 6

Network Topologies

6-74

Page 75: Week 6

Network Architectures and Protocols

• Protocol– A standard set of rules and procedures for the control of

communications in a network

• Handshaking– The process of exchanging predetermined

signals and characters

– Establishes a telecommunications session between terminals and computers

6-75

Page 76: Week 6

Network Architectures and Protocols

• Network Architecture– Master plan of standard protocols, hardware,

software, and interfaces between end users and computer systems

– Goal is to promote an open, simple, flexible, and efficient telecommunications environment

6-76

Page 77: Week 6

OSI and TCP/IP Models• Open Systems Interconnection (OSI) Model– A seven-layer model that serves as a standard

model for network architectures– Model for how messages should be transmitted

between two points in a network– Each layer adds functions

• Transmission Control Protocol/Internet Protocol (TCP/IP)– A five-layer telecommunications protocol used by

the Internet

6-77

Page 78: Week 6

OSI and TCP/IP Models

6-78

Page 79: Week 6

Voice Over IP

• Internet Telephony– Using an Internet connection to pass voice

data using IP instead of a telephone network

– Often referred to as voice over IP or VoIP

– Works like a regular phone, but skips long-distance charges

– Runs over standard network infrastructure

– Requires a well-configured network to work smoothly

6-79

Page 80: Week 6

Bandwidth• Bandwidth– The frequency range of a telecommunications

channel that determines the maximum transmission rate

– Speed and capacity typically measured in bits per second (bps)

– Sometimes call baud rate

• Transmission Rates– Narrow-band = low speed

– Broadband = high speed

6-80

Page 81: Week 6

Transmission Speeds

6-81

Page 82: Week 6

Switching Alternatives

• Circuit Switching– Switch opens a circuit to establish a link

between a sender and a receiver

– It remains open until the communication session is completed

• Packet Switching– Breaks messages into groups called packets

– Transmits packets separately

6-82

Page 83: Week 6

Network Interoperability• Ensures that anyone anywhere on one

network can communicate with anyone anywhere on another network– From a telecommunications perspective, no

need to speak a common language

• Telecommunications would be possible without– Complete accessibility

– Transparency

– Seamless interoperability across all networks

6-83

Page 84: Week 6

Case 3: SAIC, Hewlett-Packard, GE, and Others

• HP experimenting with wireless networked sensors– Reinventing how companies manage the flow

of goods– Wireless sensor devices (motes) combine a circuit board with

networking and application software– Powered by a pair of AA batteries

• Mesh networking– Each device wakes for a fraction of a second to transmit information to

its nearest neighbor

6-84

Page 85: Week 6

• Other uses– Ground-sensor networks can detect illegal crossings of

people or vehicles

– Monitoring of industrial plants and ships

– Remotely adjusting lighting and heat

– Testing soil for pollutants

– Detecting chemical storage leaks

– Monitoring vibration levels

– Analyzing traffic patterns

Case 3: SAIC, Hewlett-Packard, GE, and Others

6-85

Page 86: Week 6

Case Study Questions1. What are some of the business benefits

associated with using wireless networks to collect and transmit data?

2. What are some of the challenges being faced in this use of wireless technologies? What solutions can you offer?

3. The use of wireless networking as described in the case is both innovative and functional. What other business uses can you envision for this approach?

6-86

Page 87: Week 6

Case 4: Best Buy, MedStar Health, and Unifi

• Biggest problems

– Lack of application software

– Reduced functionality of software that exists

– Requires middleware to synchronize data between back-end systems and the devices

– Applications don’t always meet worker’s needs

6-87

Page 88: Week 6

Case Study Questions

1. What are the business advantages and limitations of the Best Buy Geek Squad’s use of their wireless Pocket PC mobile devices? How have they overcome the limitations?

2. What are the software development challenges of wireless mobile devices? How are MedStar Health and Unifi meeting those challenges?

6-88

Page 89: Week 6

Case Study Questions

3. Why don’t the companies in this case use some of the thousands of software packages available for their wireless mobile devices? What are the advantages and limitations of this approach?

6-89