Top Banner
Case 2/p128 Case 2/p128
58
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Lecture 6_telecomm_aggarwal.PPT

Case 2/p128Case 2/p128

Page 2: Lecture 6_telecomm_aggarwal.PPT

1. What are the business benefits 1. What are the business benefits of adopting open-source of adopting open-source

software?software?

Benefits include: Benefits include: reduced cost of purchase, reduced cost of purchase, less chance of obsolescence, less chance of obsolescence, broader access to technical support, broader access to technical support, lower cost of upgrade.lower cost of upgrade.

Page 3: Lecture 6_telecomm_aggarwal.PPT

2. What are the risks associated with open-2. What are the risks associated with open-source software? How can these risks be source software? How can these risks be addressed?addressed?

Risks include: Risks include:

1.1. potential abandonment of standard, potential abandonment of standard,

2.2. loss of liability shift to software vendor, loss of liability shift to software vendor,

3.3. lack of quality technical support.lack of quality technical support.

Page 4: Lecture 6_telecomm_aggarwal.PPT

3. Do you see open-source software eventually replacing 3. Do you see open-source software eventually replacing the current proprietary software model? the current proprietary software model?

Page 5: Lecture 6_telecomm_aggarwal.PPT

BLOGBLOG (web+log) (web+log)source: http://en.wikipedia.org/wiki/Blog#Types_of_blogssource: http://en.wikipedia.org/wiki/Blog#Types_of_blogs

A A blogblog is a user-generated website where is a user-generated website where entries are made in journal style and entries are made in journal style and displayed in a reverse chronological order.displayed in a reverse chronological order.

Blogs often provide commentary or news on Blogs often provide commentary or news on a particular subject, such as food, politics, or a particular subject, such as food, politics, or local news; some function as more personal local news; some function as more personal online diariesonline diaries

Youtube type of a video weblogYoutube type of a video weblog

Page 6: Lecture 6_telecomm_aggarwal.PPT

MyspaceMyspacesource: http://en.wikipedia.org/wiki/MySpacesource: http://en.wikipedia.org/wiki/MySpace

MySpaceMySpace is a social networking website is a social networking website offering an interactive, user-submitted offering an interactive, user-submitted network of friends, personal profiles, blogs, network of friends, personal profiles, blogs, groups, photos, music and videos. MySpace groups, photos, music and videos. MySpace also features an internal search engine and also features an internal search engine and an internal e-mail system an internal e-mail system

Page 7: Lecture 6_telecomm_aggarwal.PPT

Drawing money from an ATMDrawing money from an ATM

Page 8: Lecture 6_telecomm_aggarwal.PPT

Telecommunications Telecommunications and Networkingand Networking

Page 9: Lecture 6_telecomm_aggarwal.PPT

Learning ObjectivesLearning Objectives

1.1. Understand the concept of a network.Understand the concept of a network.

2.2. Apply Metcalfe’s law in understanding the value Apply Metcalfe’s law in understanding the value of a network.of a network.

3.3. Identify several major developments and trends Identify several major developments and trends in the industries, technologies, and business in the industries, technologies, and business applications of telecommunications and Internet applications of telecommunications and Internet technologies.technologies.

4.4. Examples of the business value of Internet, Examples of the business value of Internet, intranet, and extranet applications.intranet, and extranet applications.

Page 10: Lecture 6_telecomm_aggarwal.PPT

Learning ObjectivesLearning Objectives

5.5. Identify the basic components, functions, and types Identify the basic components, functions, and types of telecommunications networks used in business.of telecommunications networks used in business.

6.6. Explain the functions of major components of Explain the functions of major components of telecommunications network hardware, software, telecommunications network hardware, software, media, and services.media, and services.

7.7. Explain the concept of client/server networking.Explain the concept of client/server networking.

8.8. Understand the two forms of peer-to-peer Understand the two forms of peer-to-peer networking.networking.

9.9. Explain the difference between digital and analog Explain the difference between digital and analog signals.signals.

Page 11: Lecture 6_telecomm_aggarwal.PPT

Learning ObjectivesLearning Objectives

10.10.Identify the various transmission media Identify the various transmission media and topologies used in telecommunications and topologies used in telecommunications networks.networks.

11.11.Understand the fundamentals of wireless Understand the fundamentals of wireless network technologies.network technologies.

12.12.Explain the concepts behind TCP/IP.Explain the concepts behind TCP/IP.

13.13.Understand the seven layers of the OSI Understand the seven layers of the OSI network model.network model.

Page 12: Lecture 6_telecomm_aggarwal.PPT

Network ConceptsNetwork Concepts

NetworkNetwork– An interconnected chain, group or systemAn interconnected chain, group or system

Number of possible connections on a network Number of possible connections on a network is N * (N-1)/2is N * (N-1)/2– Where N = number of nodes (points of Where N = number of nodes (points of

connections on the network)connections on the network)– Example, if there are 10 computers on a network, Example, if there are 10 computers on a network,

there are 10 * 9/2 = 45 possible connections there are 10 * 9/2 = 45 possible connections

Page 13: Lecture 6_telecomm_aggarwal.PPT

TelecommunicationsTelecommunications

TelecommunicationsTelecommunications– Exchange of information in any form (voice, Exchange of information in any form (voice,

data, text, images, audio, video) over networksdata, text, images, audio, video) over networks

Page 14: Lecture 6_telecomm_aggarwal.PPT

Basic conceptsBasic concepts Communication protocols (TCP/IP)Communication protocols (TCP/IP) Data transmission methodsData transmission methods

– AsynchronousAsynchronous

– SynchronousSynchronous

ConnectingConnecting– Modem Modem

– Hardwired and remoteHardwired and remote

Data transmission channels (bps)Data transmission channels (bps)– narrow bands: 5-30narrow bands: 5-30

– voice bands: 1,000-9,600voice bands: 1,000-9,600

– broad bands: 100,000broad bands: 100,000

Types of communication linesTypes of communication lines– simplexsimplex

– half-duplexhalf-duplex

– duplexduplex

Page 15: Lecture 6_telecomm_aggarwal.PPT

NetworksNetworks ConceptConcept

– "a group of interconnected computers, workstations, or computer devices "a group of interconnected computers, workstations, or computer devices (such as printers and data storage systems).”(such as printers and data storage systems).”

Network topologyNetwork topology

– busbus– starstar

– ringring

Local-area networksLocal-area networks– bus: bus: Ethernet, Ethernet, carrier sense multiple access (CSMA)carrier sense multiple access (CSMA)– ring: token passing methodring: token passing method

Distributed data processingDistributed data processing– "interconnects sites of one organization not only for communication of data "interconnects sites of one organization not only for communication of data

and messages but also for and messages but also for

the sharing of resources."the sharing of resources."

Page 16: Lecture 6_telecomm_aggarwal.PPT

Open SystemsOpen Systems

Information systems that use common standards for Information systems that use common standards for hardware, software, applications and networkshardware, software, applications and networks

Internet networking technologies are a common standard for Internet networking technologies are a common standard for open systemsopen systems

ConnectivityConnectivity: : – Ability of networked computers to easily access and Ability of networked computers to easily access and

communicate with each other and share informationcommunicate with each other and share information InteroperabilityInteroperability::

– The ability of an open system to enable end user applications The ability of an open system to enable end user applications to be accomplished using different varieties of computer to be accomplished using different varieties of computer systems, software packages, and databases provided by a systems, software packages, and databases provided by a variety of interconnected networksvariety of interconnected networks

Page 17: Lecture 6_telecomm_aggarwal.PPT

MiddlewareMiddleware

Any programming that serves to “glue Any programming that serves to “glue together” two separate programstogether” two separate programs

Page 18: Lecture 6_telecomm_aggarwal.PPT

Internet2Internet2

Next generation of the InternetNext generation of the Internet High-performance networkHigh-performance network In use at 200 universities, scientific In use at 200 universities, scientific

institutions, communications corporationsinstitutions, communications corporations

Page 19: Lecture 6_telecomm_aggarwal.PPT

Internet Service ProviderInternet Service Provider

ISPISP– A company that specializes in providing easy A company that specializes in providing easy

access to the Internetaccess to the Internet– For a monthly fee, you get software, user name, For a monthly fee, you get software, user name,

password and accesspassword and access

ISPs are connect to one another through ISPs are connect to one another through network access pointsnetwork access points

Page 20: Lecture 6_telecomm_aggarwal.PPT

An Intranet Also look at fig 6.8An Intranet Also look at fig 6.8

A network inside an organizationA network inside an organization– That uses Internet technologies (such as Web That uses Internet technologies (such as Web

browsers and servers, TCP/IP protocols, HTML, browsers and servers, TCP/IP protocols, HTML, etc.)etc.)

– To provide an Internet-like environment within To provide an Internet-like environment within the organizationthe organization

– For information sharing, communications, For information sharing, communications, collaboration and support of business processescollaboration and support of business processes

– Protected by security measures Protected by security measures – Can be accessed by authorized users through the InternetCan be accessed by authorized users through the Internet

Page 21: Lecture 6_telecomm_aggarwal.PPT

Extranet (also look at fig 6.9)Extranet (also look at fig 6.9)

Network links that use Internet technologiesNetwork links that use Internet technologies– To connect the Intranet of a businessTo connect the Intranet of a business– With the Intranets of its customers, suppliers or With the Intranets of its customers, suppliers or

other business partnersother business partners

Page 22: Lecture 6_telecomm_aggarwal.PPT

GPSGPS

1.1. The global positioning system (GPS) is a major The global positioning system (GPS) is a major technological achievement that has broad-reaching technological achievement that has broad-reaching implications for business. Using the Internet,implications for business. Using the Internet,

– Can find other innovative uses for GPS.Can find other innovative uses for GPS.– Good places to start familiarizing yourself with Good places to start familiarizing yourself with

current accomplishments arecurrent accomplishments are The GPSWorld site atThe GPSWorld site at http://www.gpsworld.com/gpsworld/ http://www.gpsworld.com/gpsworld/ The GPS Overview at The GPS Overview at

http://www.colorado.edu/geography/gcraft/notes/gps/ghttp://www.colorado.edu/geography/gcraft/notes/gps/gps_f.htmlps_f.html

Page 23: Lecture 6_telecomm_aggarwal.PPT

Telecommunications networkTelecommunications network

Any arrangement where a sender transmits Any arrangement where a sender transmits a message to a receiver over a channel a message to a receiver over a channel consisting of some type of mediumconsisting of some type of medium

Page 24: Lecture 6_telecomm_aggarwal.PPT

Types of NetworksTypes of Networks

WANWAN LANLAN VPNVPN C/SC/S

Page 25: Lecture 6_telecomm_aggarwal.PPT

VPNVPN

Basically, a VPN is a private network that uses a Basically, a VPN is a private network that uses a public network (usually the Internet) to connect public network (usually the Internet) to connect remote sites or users together. Instead of using a remote sites or users together. Instead of using a dedicated, real-world connection such as leased dedicated, real-world connection such as leased line, a VPN uses "virtual" connections line, a VPN uses "virtual" connections routedrouted through the Internet from the company's private through the Internet from the company's private network to the remote site or employee. network to the remote site or employee.

Source: computer.Howstuffworks.comSource: computer.Howstuffworks.com

Page 26: Lecture 6_telecomm_aggarwal.PPT

VPNVPN

Image courtesy Cisco Systems, Inc.

A typical VPN might have a main LAN at the corporate headquarters of a company, other LANs at remote offices or

facilities and individual users connecting from out in the field.

Page 27: Lecture 6_telecomm_aggarwal.PPT

Internetwork ProcessorsInternetwork Processors

SwitchSwitch – makes connections between – makes connections between telecommunications circuits in a networktelecommunications circuits in a network

RouterRouter – intelligent communications processor – intelligent communications processor that interconnects networks based on different that interconnects networks based on different protocolsprotocols

HubHub – a port switching communications – a port switching communications processorprocessor

GatewayGateway – connects networks using different – connects networks using different communications architecturescommunications architectures

Page 28: Lecture 6_telecomm_aggarwal.PPT

ROUTERSROUTERS

Routers are specialized computers that send Routers are specialized computers that send your messages and those of every other your messages and those of every other Internet user speeding to their destinations Internet user speeding to their destinations along thousands of pathways. along thousands of pathways.

Fujitsu GeoStream R980 industrial strength routerFujitsu GeoStream R980 industrial strength router

Page 29: Lecture 6_telecomm_aggarwal.PPT

ROUTERSROUTERS

configuration tableconfiguration table. A configuration table is a collection of . A configuration table is a collection of information, including: information, including:

Information on which connections lead to particular groups of Information on which connections lead to particular groups of addresses addresses

Priorities for connections to be used Priorities for connections to be used Rules for handling both routine and special cases of traffic Rules for handling both routine and special cases of traffic

A router, then, has two separate but related jobs: A router, then, has two separate but related jobs: The router ensures that information doesn't go where it's not The router ensures that information doesn't go where it's not

needed. This is crucial for keeping large volumes of data from needed. This is crucial for keeping large volumes of data from clogging the connections of "innocent bystanders." clogging the connections of "innocent bystanders."

The router makes sure that information does make it to the The router makes sure that information does make it to the intended destination. intended destination.

Computer.howstuffworks.comComputer.howstuffworks.com

Page 30: Lecture 6_telecomm_aggarwal.PPT

Distributed data processingDistributed data processingTSS - Time Sharing Systems

CSS - Client Server Systems

PC

MAINFRAME

PC PC PC

Page 31: Lecture 6_telecomm_aggarwal.PPT

Client/Server networksClient/Server networks

ClientsClients: End user personal computers : End user personal computers or networked computersor networked computers

Interconnected by LANsInterconnected by LANs ServersServers: manage networks: manage networks Processing shared between clients and Processing shared between clients and

serversservers

Page 32: Lecture 6_telecomm_aggarwal.PPT

CSS architectureCSS architecture

PC PC PC PC

L A N

FileServer

PrintServer

Communica- tions Server

RemoteServer

Page 33: Lecture 6_telecomm_aggarwal.PPT

Peer-to-peer networks (p 209)Peer-to-peer networks (p 209)

Networks that connect from one PC to another PCNetworks that connect from one PC to another PC

Peer-to-peer networking enables or enhances the Peer-to-peer networking enables or enhances the following scenarios:following scenarios:

Real-time communications (RTC)Real-time communications (RTC) CollaborationCollaboration Content distributionContent distribution Distributed processingDistributed processing Improved Internet technologiesImproved Internet technologies

Source: www.microsoft.comSource: www.microsoft.com

Page 34: Lecture 6_telecomm_aggarwal.PPT

Wireless TechnologiesWireless Technologies

Terrestrial microwaveTerrestrial microwave– Earthbound microwave systems that transmit Earthbound microwave systems that transmit

high-speed radio signals in a line-of-sight pathhigh-speed radio signals in a line-of-sight path– Between relay systems spaced approximately Between relay systems spaced approximately

30-miles apart30-miles apart

Communications satellitesCommunications satellites– Satellite serves as relay stations for Satellite serves as relay stations for

communications signalscommunications signals– Uses microwave radio signalsUses microwave radio signals

Page 35: Lecture 6_telecomm_aggarwal.PPT

Wireless TechnologiesWireless Technologies

Cellular and PCS telephone and pager systemsCellular and PCS telephone and pager systems– Divide the geographic area into small areas or cellsDivide the geographic area into small areas or cells– Each cell has transmitter or radio relay antenna to send Each cell has transmitter or radio relay antenna to send

message from one cell to anothermessage from one cell to another

Wireless LANsWireless LANs– Radio signals within an office or buildingRadio signals within an office or building– Connect PCs to networksConnect PCs to networks

BluetoothBluetooth– Short-range wireless technologyShort-range wireless technology– To connect PC to peripherals such as printer To connect PC to peripherals such as printer

Page 36: Lecture 6_telecomm_aggarwal.PPT

BluetoothBluetooth

Bluetooth is a standard developed by a group of Bluetooth is a standard developed by a group of electronics manufacturers that allows any sort of electronics manufacturers that allows any sort of electronic equipment -- from computers and electronic equipment -- from computers and cell phonescell phones to to keyboardskeyboards and headphones -- to and headphones -- to make its own connections, without wires, cables or make its own connections, without wires, cables or any direct action from a user. any direct action from a user.

Bluetooth can connect up to Bluetooth can connect up to eight deviceseight devices

simultaneously. With all of those devices simultaneously. With all of those devices

in the same 10-meter (32-foot) radius in the same 10-meter (32-foot) radius

Page 37: Lecture 6_telecomm_aggarwal.PPT

http://www.dell.com/content/topics/http://www.dell.com/content/topics/topic.aspx/global/shared/corp/media/en/topic.aspx/global/shared/corp/media/en/studio_dell?studio_dell?c=us&l=en&s=corp&targetNetwork=2&targetc=us&l=en&s=corp&targetNetwork=2&targetChannel=4&targetMedia=32Channel=4&targetMedia=32

Page 38: Lecture 6_telecomm_aggarwal.PPT

Steps in wireless networkSteps in wireless networksource: www.dell.comsource: www.dell.com

Page 39: Lecture 6_telecomm_aggarwal.PPT

Cell PhonesCell Phonessource: howstuffworks.comsource: howstuffworks.com

GSM (CDMA) vs TDMAGSM (CDMA) vs TDMATDMA (time division multiple access) assigns each call a certain TDMA (time division multiple access) assigns each call a certain

portion of time on a designated frequency. portion of time on a designated frequency.

Works on either the 800-MHz or 1900-MHz frequency bands.Works on either the 800-MHz or 1900-MHz frequency bands.

CDMA (code division multiple access) gives a unique code to each CDMA (code division multiple access) gives a unique code to each call and spreads it over the available frequencies.call and spreads it over the available frequencies.

GSM operates in the 900-MHz and 1800-MHz bands in Europe and Asia GSM operates in the 900-MHz and 1800-MHz bands in Europe and Asia and in the 850-MHz and 1900-MHz (sometimes referred to as 1.9-and in the 850-MHz and 1900-MHz (sometimes referred to as 1.9-GHz) band in the United States GHz) band in the United States

Cell vs MobileCell vs Mobile

Page 40: Lecture 6_telecomm_aggarwal.PPT

Band/ModeBand/Mode

Multiple bandMultiple band - A phone that has multiple-band capability - A phone that has multiple-band capability can can switch frequenciesswitch frequencies. For example, a dual-band TDMA . For example, a dual-band TDMA phone could use TDMA services in either an 800-MHz or a phone could use TDMA services in either an 800-MHz or a 1900-MHz system. A quad-band GSM phone could use 1900-MHz system. A quad-band GSM phone could use GSM service in the 850-MHz, 900-MHz, 1800-MHz or GSM service in the 850-MHz, 900-MHz, 1800-MHz or 1900-MHz band. 1900-MHz band.

Multiple modeMultiple mode - In cell phones, "mode" refers to the - In cell phones, "mode" refers to the type of type of transmission technologytransmission technology used. So, a phone that used. So, a phone that supported AMPS and TDMA could switch back and forth as supported AMPS and TDMA could switch back and forth as needed. It's important that one of the modes is AMPS -- needed. It's important that one of the modes is AMPS -- this gives you analog service if you are in an area that this gives you analog service if you are in an area that doesn't have digital support. doesn't have digital support.

Page 41: Lecture 6_telecomm_aggarwal.PPT

EDI ConceptsEDI Concepts

EDI is a mechanism for electronic tradingEDI is a mechanism for electronic trading EDI replaces paper flow with online transactionsEDI replaces paper flow with online transactions EDI architectureEDI architecture

EDI is for trading partnersEDI is for trading partners Implementation plan is a key factorImplementation plan is a key factor Obstacles:Obstacles:

– lack of transaction standardizationlack of transaction standardization– high start-up costshigh start-up costs

EDI third-party suppliersEDI third-party suppliers– AT&T, Control Data, EDS, GE, Western Union, IBM, Martin Marietta Data AT&T, Control Data, EDS, GE, Western Union, IBM, Martin Marietta Data

Systems, etc.Systems, etc.

Page 42: Lecture 6_telecomm_aggarwal.PPT

EDI architectureEDI architectureTrading Partner 1 Trading Partner 2

systemtransactions

systemtransactions

standard

transactions

Acq

uisi

tion

Syst

em

Tra

nsac

tion

Con

vert

er

Tra

nsac

tion

Con

vert

er

Ord

er E

ntry

Sys

tem

ORDER ORDER

CONFIRMATIONCONFIRMATION

Page 43: Lecture 6_telecomm_aggarwal.PPT

Network Topologies (p 219)Network Topologies (p 219)

TopologyTopology: structure of a network: structure of a network

StarStar: ties end user computers to a central : ties end user computers to a central computercomputer

RingRing: ties local computer processors : ties local computer processors together in a ring on a relatively equal basistogether in a ring on a relatively equal basis

BusBus: local processors share the same : local processors share the same communications channelcommunications channel

Page 44: Lecture 6_telecomm_aggarwal.PPT

Network Architectures & Network Architectures & ProtocolsProtocols

ProtocolProtocol: standard set of rules and : standard set of rules and procedures for the control of procedures for the control of communications in a networkcommunications in a network

Network Architecture: Network Architecture: – Master plan of standard protocols, hardware, Master plan of standard protocols, hardware,

software and interfaces between end users and software and interfaces between end users and computer systemscomputer systems

– Goal of promoting an open, simple, flexible, and Goal of promoting an open, simple, flexible, and efficient telecommunications environmentefficient telecommunications environment

Page 45: Lecture 6_telecomm_aggarwal.PPT

OSI & TCP/IP Models (p 221)OSI & TCP/IP Models (p 221)

Open Systems Interconnection (OSI)Open Systems Interconnection (OSI) Model Model– A seven-layer model that serves as a standard model A seven-layer model that serves as a standard model

for network architecturesfor network architectures– Model for how messages should be transmitted Model for how messages should be transmitted

between two points in a networkbetween two points in a network– Each layer adds functionsEach layer adds functions

Transmission Control Protocol / Internet Protocol Transmission Control Protocol / Internet Protocol (TCP/IP)(TCP/IP)– A five layer telecommunications protocol used by the A five layer telecommunications protocol used by the

InternetInternet

Page 46: Lecture 6_telecomm_aggarwal.PPT

IPIP

Internet protocolInternet protocol Each system connected to the internet is identified by a 32-bit IP addressEach system connected to the internet is identified by a 32-bit IP address Four numbers separated by a decimalFour numbers separated by a decimalEach represented by octal (8 bits; hence 0-255)Each represented by octal (8 bits; hence 0-255) Ex: 168.212.226.204Ex: 168.212.226.204

Binary format:Binary format:10101000.11010100.11100010.1100110010101000.11010100.11100010.11001100

A new protocol IPv6 allows for 128 bit IP addressesA new protocol IPv6 allows for 128 bit IP addresses

to look up an IP address : http://www.kloth.net/services/nslookup.php to look up an IP address : http://www.kloth.net/services/nslookup.php 

to find info: to find info: 

http://www.geobytes.com/IpLocator.htmhttp://www.geobytes.com/IpLocator.htm

Page 47: Lecture 6_telecomm_aggarwal.PPT

Basic Communications ModelBasic Communications ModelStandards are needed at all LayersStandards are needed at all Layers

User Layer

Application Layer

Computer (Transport) Layer

Transmission Layer

Page 48: Lecture 6_telecomm_aggarwal.PPT

Internet TelephonyInternet Telephony

Using an Internet connection to pass voice Using an Internet connection to pass voice data using IP data using IP

Voice over IP (VoIP)Voice over IP (VoIP) Skips standard long-distance phone chargesSkips standard long-distance phone charges

Page 49: Lecture 6_telecomm_aggarwal.PPT

VOIP (source www.fcc.gov)VOIP (source www.fcc.gov)

Page 50: Lecture 6_telecomm_aggarwal.PPT

BandwidthBandwidth

BandwidthBandwidth– Frequency range of a telecommunications Frequency range of a telecommunications

channelchannel– Determines transmission rateDetermines transmission rate– Classified in bits per second (bps)Classified in bits per second (bps)

Transmission Rates:Transmission Rates:– Narrow-bandNarrow-band – low-speed – low-speed– BroadbandBroadband – high-speed – high-speed

Page 51: Lecture 6_telecomm_aggarwal.PPT

WiFiWiFi

WIreless FIdelity (WiFi)-- used generically when referring of WIreless FIdelity (WiFi)-- used generically when referring of any type of 802.11 any type of 802.11

""Wi-FiWi-Fi Certified" (a registered trademark) by the Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are Alliance are interoperable interoperable with each other, with each other, even if they are from different manufacturers. A user with a even if they are from different manufacturers. A user with a "Wi-Fi Certified" product can use any "Wi-Fi Certified" product can use any brand of access point with any other brand of client brand of access point with any other brand of client hardware that also is certifiedhardware that also is certified

http://www.webopedia.com/TERM/W/Wi_Fi.htmlhttp://www.webopedia.com/TERM/W/Wi_Fi.html

Page 53: Lecture 6_telecomm_aggarwal.PPT

RWC 1: SAIC, Hewlett-Packard, GE, and Others: RWC 1: SAIC, Hewlett-Packard, GE, and Others: Wireless, Wireless EverywhereWireless, Wireless Everywhere

What are some of the business benefits What are some of the business benefits

associated with using wireless networks to associated with using wireless networks to

collect and transmit data?collect and transmit data?

Benefits would include”Benefits would include” Superfast wireless connections to the Web.Superfast wireless connections to the Web. Cost is about one-fourth of existing costs for Cost is about one-fourth of existing costs for

connection to the Web.connection to the Web. Productivity gains such as a 45% gain at UPS.Productivity gains such as a 45% gain at UPS.

Page 54: Lecture 6_telecomm_aggarwal.PPT

What are some of the challenges being faced in this useWhat are some of the challenges being faced in this useof wireless technologies? What solutions can you of wireless technologies? What solutions can you offer?offer?

Having everyone online in a meeting can be toxic to Having everyone online in a meeting can be toxic to productivity. “No laptop” policies for important meetings.productivity. “No laptop” policies for important meetings.

Enormous pressure within companies to provide Wi-Fi in all Enormous pressure within companies to provide Wi-Fi in all areas of the company. Which employees have compelling areas of the company. Which employees have compelling needs for Wi-Fi accessneeds for Wi-Fi access

Cost exceeds the benefit to be gained by providing Wi-Fi Cost exceeds the benefit to be gained by providing Wi-Fi such as in a manufacturing plant that would require such as in a manufacturing plant that would require numerous additional access points than usual.numerous additional access points than usual.

Security of information available via the Wi-Fi system. Security of information available via the Wi-Fi system. Delay implementation until security assurances are met. Delay implementation until security assurances are met.

Page 55: Lecture 6_telecomm_aggarwal.PPT

The use of wireless networking as The use of wireless networking as described in the case is both innovative and described in the case is both innovative and useful. What other business uses can you useful. What other business uses can you envision for this approach?envision for this approach?

Page 56: Lecture 6_telecomm_aggarwal.PPT

RWC 2: Maryland and Colorado: Serving RWC 2: Maryland and Colorado: Serving Its Citizens Without Using WiresIts Citizens Without Using Wires

1.1. What is the business value of advanced mobile technologies to What is the business value of advanced mobile technologies to Maryland’s emergency management services?Maryland’s emergency management services?

Direct agentsDirect agents toward places where their presence is required toward places where their presence is required

Give Give notice of impending natural disastersnotice of impending natural disasters with forecasts and with forecasts and instructions on how to proceed.instructions on how to proceed.

Improve information gatheringImprove information gathering on the extent and magnitude of on the extent and magnitude of devastation.devastation.

Reduce the amount of manual data-entryReduce the amount of manual data-entry, leading to improved , leading to improved response times and reduction of errors (i.e. address is automatically response times and reduction of errors (i.e. address is automatically captured and pop-up menus limit possible answers).captured and pop-up menus limit possible answers).

Page 57: Lecture 6_telecomm_aggarwal.PPT

In what other government services could In what other government services could GPS serve to provide business value? GPS serve to provide business value? Give some examples.Give some examples.

States’ National Guards, to monitor and direct personnel in States’ National Guards, to monitor and direct personnel in case of an emergency.case of an emergency.

Emergency Services, to direct ambulances, firefighters, Emergency Services, to direct ambulances, firefighters, etc.etc.

Department of Treasury / Federal Reserve, to track the Department of Treasury / Federal Reserve, to track the location of armored trucks both for regular traffic and in location of armored trucks both for regular traffic and in case of a hijacking.case of a hijacking.

The military in general, given that it has one of the largest The military in general, given that it has one of the largest manpower and logistics network in the country.manpower and logistics network in the country.

Page 58: Lecture 6_telecomm_aggarwal.PPT

Are there disadvantages or risks associated with Are there disadvantages or risks associated with the deployment of GPS systems to monitor the deployment of GPS systems to monitor the location of people? Explain. the location of people? Explain.

Invasions of privacyInvasions of privacy

Limitation on the freedom of movementLimitation on the freedom of movement

Could allow not only the government but Could allow not only the government but also private individuals to monitor other also private individuals to monitor other people’s movements.people’s movements.