0% found this document useful (0 votes)
205 views

Types of Network

The document discusses six key concepts related to managing and implementing IT solutions: 1. Three types of networks - Local Area Network (LAN), Wide Area Network (WAN), and Metropolitan Area Network (MAN). 2. Wireless and mobile technologies implemented in business settings, including examples of Wireless LAN (Wi-Fi) and Wireless WAN (cellular data). 3. The differences between intranets and extranets, where intranets are private internal networks and extranets extend intranets to authorized external users securely. 4. Current web trends and their impact on businesses, touching on the evolution from Web 1.0 to 2.0 to 3.0.

Uploaded by

Prahar Neupane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
205 views

Types of Network

The document discusses six key concepts related to managing and implementing IT solutions: 1. Three types of networks - Local Area Network (LAN), Wide Area Network (WAN), and Metropolitan Area Network (MAN). 2. Wireless and mobile technologies implemented in business settings, including examples of Wireless LAN (Wi-Fi) and Wireless WAN (cellular data). 3. The differences between intranets and extranets, where intranets are private internal networks and extranets extend intranets to authorized external users securely. 4. Current web trends and their impact on businesses, touching on the evolution from Web 1.0 to 2.0 to 3.0.

Uploaded by

Prahar Neupane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

P age |1

WK 4 CLA 1

Managing and Implementing IT Solutions for the six different concepts

Prahar Neupane

Presidential Business School

Westcliff University

BSIT 315: Information Technology Essentials

Professor Himalaya Kakshapati

May 27, 2021


P age |2

Abstract
Information technology (IT) is defined as the use of computer and internet to store or

retrieve any data or information. We use Information technology to achieve the goals of the

Information systems. Information system is designed to collect data, process the collected data,

and deliver timely, relevant, and useful information that can be used for making decisions in any

business organizations or industrial purpose. So, to successfully implement and manage IT in

these organizational levels, we have got to learn about these following six concepts:

1. Three types of networks

2. Wireless and mobile technologies implemented in a business setting

3. Compare and contrast Intranets and extranets

4. Current web trends and their impact on business

5. The ethical implications of current IT solutions implemented by companies

6. The major categories of e-commerce

Keywords: Networks, Wireless technologies, mobile networks, intranets, extranets, web trends,

ethics, IT, e-commerce.


P age |3

Contents
Topics Page

1. Three types of networks 3-5

2. Wireless and mobile technologies implemented in a business setting 6-7

3. Compare and contrast Intranets and extranets 8-9

4. Current web trends and their impact on business 10

5. The ethical implications of current IT solutions implemented by companies 11-12

6. The major categories of e-commerce 13-15

7. Conclusion 16

8. Reference 17-18
P age |4

1. Three types of Network

1.1 Local Area Network (LAN): Local Area Network is a computer network that connects

computers in a close proximity. It can cover a limited area like, a building, a campus, or a

company. It is owned by a single party. It’s speed ranges from 100 Mbps to 10 Gbps. In

LAN Coaxial cables and phone lines are basically used to convey network signals. (Jawahar

Babu, K.V.S.N., & Munikumar, S., 2012). The normal Wi-Fi of our home is the basic

example of LAN.

1.2 Wide Area Network (WAN): Wide Area Network is a computer network that connects

computers in a wide area span like, several cities, states and countries. It is owned by more

than one party. It’s speed ranges from 28.8 Kbps to 155 Mbps. This network is basically

used in the business entities by the international brands regardless of the international

borders. (Jawahar Babu, K.V.S.N., & Munikumar, S., 2012). This fully relies upon wireless

transmission of signals.

1.3 Metropolitan Area Network (MAN): Metropolitan Area Network is a computer network

designed to connect computers within a metropolitan area and handle data communications

for multiple organizations in a specific city or a nearby city. It is owned by one to several

parties. It’s speed ranges from 34 Mbps to 155 Mbps. This type of network uses fiber-

optical cables. This is basically used by government for the public purpose in a specific

city area. (Jawahar Babu, K.V.S.N., & Munikumar, S., 2012).

Network is an important part of IT. The implementation of any type of network in IT

sector helps to access the internet. For example: LAN provides a network access to a office in a

building. One can easily access install this type of Network and it is very fast in comparison to
P age |5

other types of networks. Intranet is also a type of LAN. Moreover, a connection between some

expensive devices like printer with all the computers is also an example of LAN. To talk about

example of the WAN, 3G or 4G network is a very applicable example. The example of MAN

is Cable TV network or a DSL network.


P age |6

2. Implementation of Wireless and Mobile technologies in business setting

Wireless technology refers to the technology that runs under wireless network. A wireless

network operates without wire instead of traditional wired connection. On the other hand, Mobile

technology uses mobile network that operates on a radio frequency (RF). It consists of radio cells

with fixed transmitter which is also called cell site.

Wireless environment consists of a portable computer that uses small antennas to

communicate with the radio towers in the nearest area. Satellites in the orbit of Earth near the

device picks up the signals from portable network devices.

Wireless technology is divided into two types:

1. Wireless LAN (WLAN)

WLAN is the upgraded and alternative version of wired LAN. It is operated by a single

owner and is capable of covering a small limited area. For example: Wi-Fi in our home.

2. Wireless WAN (WWAN)

WWAN is a bigger form of WLAN. It covers a broader area than WLAN. WWAN

includes the devices like Cellular digital packet data (CDPD), paging networks, personal

communication system (PCS), satellite networks, microwave networks, packet radio networks,

and broadband personal communication system (PCS). (MIS, 8th Edition)

Implementation of Wireless and mobile technologies in IT field is also very essential.

Wireless technologies provide a huge advantage like mobility, flexibility, and easy installation.

Examples of Wireless LAN is (Wireless Fidelity) Wi-Fi connection.


P age |7

Example of Wireless WAN is cellular data.

These wireless technologies and mobile technologies can help a lot in business setting. For

example, A company in UK named Jocial is a affiliated marketing company which offers money

to its users to post about different items. So, a user from Nepal can also participate and work in

that company using WWAN.


P age |8

3. Comparing and Contrasting Intranets and Extranets

Intranets refers to a private network that enables staffs and employees in an enterprise to

securely share knowledge and information easily within an organization. The information

available on the company’s intranet is unavailable to public. (D. Piraino, 1997) Intranet provides

fast and easy access to information and different programs within the organization while

maintaining integrity of the information and secure access to the information (D. Piraino, 1997).

Extranets refers to a private network that uses internet technology and public

telecommunication system to share part of a business’s information or operations over a secure

system with partners, customers, suppliers or other businesses. (D. Piraino, 1997). In other

words, extranet is an extended intranet that is extended to authorized users even outside of the

organization. We can expect extranet as an advancement of cryptographic technology, digital

signatures, digital certificates and compression techniques allows intranet to expand to public

network in a secure network. (D. Piraino, 1997).

So, basically Intranets are the secured network within an organization whereas the

extranet is the larger intranet which provides the secure connection between intranets of the

organization in different places.

The Intranets and Extranets have got some similarities too. They consist of the same

basic three components: Computer network, Client software, and Server software.

An example of Intranet network is the connection inside a bank. The bank consists of

many confidential data and which may get leaked and billions of money might get stolen if the

public internet is used. So, they have their own network called intranet which has a firewall and
P age |9

restricts the unauthorized user. Only the officers of that bank can access the information which

creates a high security.

Likewise, extranet is the extended intranet. For example; It creates secure network

between one branch of bank to another branch or also sometimes with other partner banks. It has

a bit more authorization for a greater number of users and also some customers who uses the

related services like visa cards between two banks.


P a g e | 10

4. Current Web trends and their impact on business

Web trends are the evolution of web development in the World wide web. There are three

generations of web evolution i.e., Web 1.0, Web 2.0, and Web 3.0. Web 1.0 is a traditional web

application and are static pages. They are written in HTML. It can only be viewed by the users,

so it is one way only. Web 2.0 is a more interactive and collaborative trend than Web 1.0. It is

also called participative social web. It uses AJAX and JavaScript frameworks. It contains the

social media dialogue where user can communicate with the producers. Web 3.0 is a Semantic

Web. It refers to the evolution of web utilization and interaction including altering the web into

database [7]. It is based on Artificial Intelligence and uses ontological language like OWL to

produce domain- specific ontologies that machines can use to make the conclusion about

information [7].

Web 2.0 is the current web trend. But we are slowly moving to the Web 3.0. Web 3.0 is

based on the Artificial Intelligence so, business organization can benefit from that. For example,

Google assistant is a Web 3.0 and now a days google search engine is also a Web 3.0. User can

search for Apple in the search engine, based upon AI and past search history, a technological

person may get results of Apple company at the first priority whereas a normal person or a

agricultural background person may get a result of a fruit apple as a priority.


P a g e | 11

5. The ethical implications of current IT solutions implemented by companies

Information Technology is an industry of computer-based information system and

computer hardware. In the 21st century, Information Technology is the top most industry. No

any sector is untouched by this industry. IT has taken everything upon itself because IT has made

everything much easier.

Ethical implication in IT companies is essential to maintain the moral value of the IT

field. Ethics refers to the moral principle and cannot be set as a law because it may vary from a

condition to another condition. So, there are some of the ethical implementations in IT sector

like;

• Do not use a computer to harm other people.

• Do not interfere with other people’s computer work.

• Do not seek on other’s files.

• Do not use computer to steal.

• Do not use computer to bear false witness.

• Do not use pirated software.

• Do not use other’s computer resources without authentication.

• Do not plagiarize without credit and citation

• Always think about the social consequences of the programs and software which you

make.

• Do not disrespect others.

Implication of these ethics in different companies can be found. The most


P a g e | 12

common organization like any school or university always buys an original licensed software

from the providers instead of using cracked and pirated software.


P a g e | 13

6. Major Categories of e-commerce


E-commerce is the process of buying and selling goods and services over the internet. E-

commerce is built on traditional commerce by adding the flexibility of network and availability

of internet. Nowadays, buying and selling of products has become much easier due to e-

commerce as a customer doesn’t need to go to the marts, rather they order the products and it

arrives on their door.

Categories of E-commerce:

There are three major bases upon which nine categories of e-commerce are formed.

Consumer, Business and Government are the major bases. The nine major categories based on

them are:

6.1 Business-to-Consumer E-commerce (B2C)

In this category, the products are directly sold to the consumers. Amazon, daraz, etc. are

its examples. It is very convenient to the public and is growing very quickly.

6.2 Business-to-Business E-commerce (B2B)

In this category, electronic transaction takes place between two businesses. It is one of

the fastest growing categories as this makes business between two companies far from each

other, possible. Example: Walmart makes this possible for e-commerce between Johnson &

Johnson and Procter & Gamble. It includes Electronic Data Interchange (EDI) and Electronic

Funds Transfer (EFT).

6.3 Consumer-to-Consumer E-commerce (C2C)


P a g e | 14

In this category, the products are directly sold from a consumer to another consumer

through internet. This involves mainly the second-hand products. eBay, OLX, etc. are some of

the platforms for C2C E-commerce.

6.4 Consumer-to-Business E-commerce (C2B)

This category involves people selling products to the businesses. This involves online

surveys and crowdsourcing the information to their website for a certain price.

6.5 Government and Non business E-commerce

This e-commerce category is used by the government. It is also called E-governance.

Department of defense, internal and revenue service and department of Treasury mainly uses e-

commerce.

6.6 Government-to-Citizen E-commerce (G2C)

In this category, governmental services like downloading of Tax payment forms, voter

registration forms or any other forms which are required to download by the citizens is there.

6.7 Government-to-Business E-commerce (G2B)

This category involves sales of federal assets and license application and renewals of

companies.

6.8 Government-to-Government E-commerce (G2G)

This category involves the diplomatic relation between two countries. Example: Helping

in Disaster or crisis by a government to another.

6.9 Government-to-Employee E-commerce (G2E)


P a g e | 15

This category involves the e-commerce between government and the employee. E-

training is the example of the (G2E) E-commerce.


P a g e | 16

7. Conclusion
To conclude, with these 6 concepts we can ultimately manage and implement IT solution

in any IT business companies. The three types of networks provide the base for the internet and

network communication. The LAN, MAN and WAN are the types of networks which we learnt.

Likewise, the wireless and mobile technologies are implemented in business setting as

businessman can easily use wireless internet connection to buy communicate with different

business clients by virtual medium from another place. Moreover, Intranets and Extranets are

detailly explained. It is essential to create a secure network within some sensitive organizations

like bank. Then, we talked about web trends and the evolution from Web 1.0 to Web 3.0.

Furthermore, the IT ethics and implementation in companies is discussed. At last, we discussed

about nine different categories of e-commerce.


P a g e | 17

8. References

1. Jawahar Babu, K.V.S.N., & Munikumar, S. (2012). Fundamentals of Computer

Networks. International Journal of Social Science & Interdisciplinary Research, 1(11), 159-

168. Retrieved May 26, 2021, from

http://indianresearchjournals.com/pdf/IJSSIR/2012/November/17.pdf

2. Setiawan, H., & Firdaus. (2013). The most possible scheme of joint service detection for the

next wireless communication technologies. Telkomnika, 11(1), 155-166.

https://www.proquest.com/scholarly-journals/most-possible-scheme-joint-service-

detection-next/docview/1459331770/se-2?accountid=158986

3. Piraino, D. (1997). The use of intranets and extranets in radiology. Journal of digital

imaging, 10(Suppl 1), 26. Retrieved May 27, 2021, from

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3452851/pdf/10278_2009_Article_BF03168

647.pdf

4. Ravinder Talwar (2019). Information Technology and Ethical Issues. International Journal of

Computer Applications 178(8):34-35.

5. MIS 8th Edition by Hossein Bidgoli, Data Communication: Delivering Information Anywhere

and Anytime

6. MIS 8th Edition by Hossein Bidgoli, The Internet, Intranets, and Extranets
P a g e | 18

7. MIS 8th Edition by Hossein Bidgoli, E-Commerce

6. France, S. L., Shi, Y., & Kazandjian, B. (2020). Web Trends: A valuable tool for business

research. Journal of Business Research. Retrieved May 27, 2021, from

https://www.researchgate.net/profile/Stephen-

France/publication/346479209_Web_Trends_A_valuable_tool_for_business_research/links/5

fc6eaa145851568d132333f/Web-Trends-A-valuable-tool-for-business-research.pdf

7. Web 1.0, Web 2.0 and Web 3.0 with their difference. GeeksforGeeks (2018)

https://www.geeksforgeeks.org/web-1-0-web-2-0-and-web-3-0-with-their-difference/

8. Jetton, K. (2013). E-Commerce. Counterpoints, 391, 221-232. Retrieved May 31, 2021, from

http://www.jstor.org/stable/42981448

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy