Telecommunications and Networks

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 38

Chapter 6

Telecommunications
and Networks
James A. O'Brien, and George Marakas.
Management Information Systems with MISource
2007, 8th ed.  Boston, MA: McGraw-Hill, Inc.,
2007.  ISBN: 13 9780073323091
Metcalfe’s Law
 The usefulness, or utility, of a network equals the
square of the number of users
 The more users on a network, the more useful
it becomes
 Until critical mass is reached, a change in
technology only affects the technology
 Once critical mass is attained, social, political,
and economic systems change
 Example: The Internet is growing exponentially.
We can expect more value, for less cost,
virtually every time we log on.
Chapter 6 Telecommunications and Networks 2
Telecommunication Trends

Chapter 6 Telecommunications and Networks 3


Telecommunications-Based
Services

Chapter 6 Telecommunications and Networks 4


Internet Networking Technologies
 Internet networking technologies are being
used as technology platform
 Web browser suites
 HTML Web page editors
 Network management software
 Firewalls
 Being applied in Internet, intranet, and
extranet applications
 Reinforces previous move toward client/server
networks based on open-systems architecture

Chapter 6 Telecommunications and Networks 5


Open Systems
 Open systems use common standards for
hardware, software, applications, and networks
 Internet networking technologies are a
common standard for open systems
 Connectivity
 Open systems provide greater connectivity
and network interoperability
 Middleware may be needed to help diverse
systems work together

Chapter 6 Telecommunications and Networks 6


Middleware
 Middleware
 A general term for any programming that
mediates between two separate programs
 Allows a particular database to access other
databases without custom programming
 Commonly known as the “plumbing” of an
information system
 It routes data and information between back-
end data sources and end user applications
 An essential component of any IT
infrastructure
Chapter 6 Telecommunications and Networks 7
Digital Network Technologies
 Telecommunications are being revolutionized by
switch from analog to digital
 Analog: voice-oriented transmission
 Digital: discrete pulse transmission
 Benefits
 Higher transmission speeds
 Moves larger amounts of information
 Greater economy and much lower error rates
 Transmits multiple types of communications
(data, voice, video) on the same circuits

Chapter 6 Telecommunications and Networks 8


Wireless Technologies
 Fiber-optic
 Uses pulses of laser-generated light
 Reduced size and installation effort
 Vastly greater communication capacity
 Faster transmission speeds
 Freedom from electrical interference
 Satellite Transmission
 Can move massive quantities of data, audio,
and video over global networks
 Especially useful in isolated areas

Chapter 6 Telecommunications and Networks 9


Business Application Trends
 Telecommunications networks now play a vital
and pervasive role in Web-enabled…
 E-business processes
 Electronic commerce
 Enterprise collaboration
 Other applications that support operations,
management, and strategic objectives

Chapter 6 Telecommunications and Networks 10


Value of Telecommunications
Networks

Chapter 6 Telecommunications and Networks 11


Internet Applications
 Most popular Internet applications and uses
 E-mail
 Instant messaging
 Browsing the Web
 Newsgroups
 Chat rooms
 Publish opinions, subject matter, creative work
 Buy and sell
 Downloading (data, software, reports, pictures,
music, videos)

Chapter 6 Telecommunications and Networks 12


Business Use of the Internet

Chapter 6 Telecommunications and Networks 13


Business Value of the Internet

Chapter 6 Telecommunications and Networks 14


The Role of Intranets
 Many companies have sophisticated and
widespread intranets, offering…
 Detailed data retrieval
 Collaboration
 Personalized customer profiles
 Links to the Internet
 Intranets use Internet technologies
 Web browsers and servers
 TCP/IP network protocols
 HTML publishing and databases

Chapter 6 Telecommunications and Networks 15


Intranets
 Intranets are protected by…
 Passwords
 Encryption
 Firewalls
 Customers, suppliers, and other business
partners can access an intranet via extranet
links

Chapter 6 Telecommunications and Networks 16


Intranets as Information Portals

Chapter 6 Telecommunications and Networks 17


Extranets
 Network links that use Internet technologies to
connect the intranet of a business to the
intranets of another
 Virtual Private Networks
 Direct private network links, or private secure
Internet links between companies
 Unsecured Extranet
 Link between a company and others via the
Internet, relying on encryption of sensitive
data and firewall security systems

Chapter 6 Telecommunications and Networks 18


Extranet Connectivity

Chapter 6 Telecommunications and Networks 19


Business Value of Extranets
 Web browser technology makes customer and
supplier access to intranets easier and faster
 Another way to build and strengthen strategic
relationships
 Enables and improves collaboration between a
business, customers, and partners
 Facilitates online, interactive product development
and marketing

Chapter 6 Telecommunications and Networks 20


Telecommunications Network Model
 A telecommunications network is any
arrangement where
 A sender transmits a message
 To a receiver
 Over a channel
 Consisting of some sort of medium

Chapter 6 Telecommunications and Networks 21


Types of Communications
Networks
 Primary types of communications networks
 Wide Area
 Local Area
 Virtual Private
 Client/Server
 Peer-to-peer

Chapter 6 Telecommunications and Networks 22


Wide Area Network (WAN)
 Telecommunication network that covers a large
geographic area

Chapter 6 Telecommunications and Networks 23


Local Area Network (LAN)
 Connects
computers
within a limited
physical area,
such as an
office,
classroom, or
building

Chapter 6 Telecommunications and Networks 24


Virtual Private Networks (VPN)
 Used to establish secure intranets and extranets
 The Internet is the main backbone network
 Relies on network firewalls, encryption, and
other security features to build a “pipe”
through the Internet
 Creates a private network without the high
cost of a separate proprietary connection

Chapter 6 Telecommunications and Networks 25


Virtual Private Network

Chapter 6 Telecommunications and Networks 26


Client/Server Networks
 Clients
 End user personal computers or networked
computers
 Servers
 Used to manage the networks
 Processing
 Shared between the clients and servers
 Sometimes called a two-tier architecture
 Larger computer systems are being replaced with
multiple client/server networks

Chapter 6 Telecommunications and Networks 27


Client/Server Network

Chapter 6 Telecommunications and Networks 28


Network Computing

Chapter 6 Telecommunications and Networks 29


Central Server Peer-to-Peer
Networks
 Advantages
 Can better protect the integrity and security
of the content and users of the network
 Disadvantages
 Directory server can be slowed or
overwhelmed by too many users or technical
problems

Chapter 6 Telecommunications and Networks 30


Peer-to-Peer Network Diagrams

Chapter 6 Telecommunications and Networks 31


Telecommunications Media
 Twisted-Pair Wire
 Ordinary telephone wire
 Copper wire is twisted
into pairs
 Coaxial Cable
 Sturdy copper or
aluminum wire wrapped
with spacers to insulate
and protect it
 Fiber-Optic Cable
 One or more hair-thin
filaments of glass
fiber wrapped in a
protective jacket
Chapter 6 Telecommunications and Networks 32
Comparing Technologies

Chapter 6 Telecommunications and Networks 33


Communications Processors

Chapter 6 Telecommunications and Networks 34


Network Topologies
 Topology - The structure of a network
 Star Network - Ties end user computers to a central
computer
 Ring Network - Ties local computer processors together in
a ring on a relatively equal basis
 Bus Network - Local processors share the same
communications channel
 Mesh Network - Uses direct communications lines to
connect some or all of the computers in the ring to
each other
 Switch - A message-switching computer that handles
data communication between autonomous
local computers
Chapter 6 Telecommunications and Networks 35
Network Topologies

Chapter 6 Telecommunications and Networks 36


Voice Over IP
 Internet Telephony
 Using an Internet connection to pass voice
data using IP instead of a telephone network
 Often referred to as voice over IP or VoIP
 Works like a regular phone, but skips long-
distance charges
 Runs over standard network infrastructure
 Requires a well-configured network to work
smoothly

Chapter 6 Telecommunications and Networks 37


Transmission Speeds

Chapter 6 Telecommunications and Networks 38

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy