0% found this document useful (0 votes)
31 views41 pages

Learning Unit 5 - Chapter 5

Lecture Slides/Notes.

Uploaded by

sibusisoqagana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views41 pages

Learning Unit 5 - Chapter 5

Lecture Slides/Notes.

Uploaded by

sibusisoqagana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

Business Analysis

Integrating Wireless Technology in


Business
(Learning Unit 5 – Chapter 16)
CHAPTER SIXTEEN: OVERVIEW
BUSINESS APPLICATIONS OF WIRELESS
TECHNOLOGIES.
MOBILITY: THE BUSINESS VALUE OF A
WIRELESS WORLD.

© McGraw Hill 2
LEARNING OUTCOMES
1. Identify the benefits of wireless networks.
2. Describe the different wireless network categories.
3. Identify the challenges of wireless networks.
4. Explain mobile enterprise management and its importance
to a business.
5. Explain the three primary business applications of
wireless technology.

© McGraw Hill 3
OVERVIEW OF A CONNECTED
WORLD
• Local area network (LAN) -
Connects a group of computers in
close proximity, such as in an
office building, school, or home.
• Wide area network (WAN) -
Spans a large geographic area
such as a state, province, or
country. Example is the internet.
• Metropolitan area network
(MAN) - A large computer network
usually spanning a city. Examples
universities, large companies.

© McGraw Hill 4
OVERVIEW OF A CONNECTED
WORLD
The terms mobile and wireless are
often used synonymously, but
actually denote two different
technologies
• Mobile means the technology (devices)
that can travel with the user, but it is not
necessarily in real-time

• Wireless gives users a live (Internet)


connection via satellite or radio
transmitters

© McGraw Hill 5
WIRELESS NETWORKS 1

• We measure network performance


in terms of:
• Bandwidth - The maximum amount of
data that can pass from one point to
another in a unit of time.
• Bit – (Short for binary bit) The smallest
element of data and has a value of
either 0 or 1.
• Bit rate - The number of bits
transferred or received per unit of time.

© McGraw Hill 6
WIRELESS NETWORKS 2

Bandwidt
Abbreviation Bits per Second (bps) Example
h
Traditional modem
Kilobit Kb 1 Kbps = 1,000 bps
= 56 Kbps
Traditional Ethernet
= 10 Mbps
Megabit Mb 1 Mbps = 1,000 Kbps
Fast Ethernet = 100
Mbps
Gigabit Ethernet =
Gigabit Gb 1 Gbps = 1,000 Mbps
1,000 Mbps

© McGraw Hill 7
WIRELESS NETWORKS 3

• Wireless fidelity (Wi-Fi) - A means


by which portable devices can
connect wirelessly to a local area
network, using access points that
send and receive data via radio
waves.
• Wi-Fi infrastructure - Includes the
inner workings of a Wi-Fi service or
utility, including the signal
transmitters, towers, or poles and
additional equipment required to
send out a Wi-Fi signal.

© McGraw Hill 8
WIRELESS NETWORKS 4

Protocol Frequency Max Speed


802.11a 5.0 GHz 54 Mbps
802.11b 2.4 GHz 11 Mbps
802.11g 2.4 GHz 54 Mbps
802.11n 2.4 GHz or 5.0 GHz 600 Mbps
802.11ac 5.0 GHz 6 G bps

© McGraw Hill 9
5G AND WI-FI 6 5

• Radio access network (RAN) - A


technology that connects individual
devices to other parts of a network
through radio connections.
• 5G - The fifth-generation wireless
broadband technology based on the
802.11ac standard engineered to
greatly increase the speed and
responsiveness of wireless networks.
• Wi-Fi 6 - The next generation of Wi-Fi
expected to operate at 9.6 Gbps. It
will deliver an improved experience to
address device and application needs
in a range of customer and enterprise
environment.
© McGraw Hill 10
WIRELESS NETWORKS 6

Wireless network benefits:


• Reduce costs.
• Improve customer service.
• Offers real-time diagnostics.
• Enhances mobility.
• Supports real-time data.
• Promotes remote work.
• Improved security.

© McGraw Hill 11
WIRELESS NETWORK CATEGORIES
Wireless network types:
• Personal area networks (PAN) - Provide communication over a
short distance that is intended for use with devices that are
owned and operated by a single user.
• Wireless LAN (WLAN) - A local area network that uses radio
signals to transmit and receive data over distances of a few
hundred feet.
• Wireless MAN (WMAN) - A metropolitan area network that uses
radio signals to transmit and receive data.
• Wireless WAN (WWAN) - A wide area network that uses radio
signals to transmit and receive data.

© McGraw Hill 12
PERSONAL AREA NETWORK
• Personal area networks (PAN) – can provide
communication between a wireless headset and a cell
phone and a wireless mouse or a keyboard.
• Bluetooth - Wireless PAN technology that transmits
signals over short distances between cell phones,
computers, and other devices. Operates at 1Mbps within a
range of 33 feet (range of 10 meters) or less.

© McGraw Hill 13
WIRELESS LAN 1

• Wireless LAN (WLAN) - A local area network that uses


radio signals to transmit and receive data over distances of
a few hundred feet.
• Wireless fidelity (Wi-Fi) - A means by which portable
devices can connect wirelessly to a local area network,
using access points that send and receive data via radio
waves.

© McGraw Hill 14
WIRELESS LAN 2

• Access point – The computer or


network device that serves an as
interface between devices and the
network.
• Wireless access point – Enables
devices to connect to a wireless
network to communicate with each
other.
• Multiple-in/multiple-out technology
– Multiple transmitters and receivers
allowing them to send and receive
greater amounts of data than
traditional networking devices.

© McGraw Hill 15
WIRELESS MAN 1

• Wireless MAN (WMAN) - A metropolitan area network that


uses radio signals to transmit and receive data.

© McGraw Hill 16
WIRELESS MAN 2

• Worldwide
Interoperability for
Microwave Access
(WiMAX) - A
communications
technology aimed at
providing high-speed
wireless data over
metropolitan area
networks.

© McGraw Hill 17
WIRELESS WAN 1

• Wireless WAN (WWAN) - A wide area network that uses


radio signals to transmit and receive data.
• WWAN technologies can be divided into two categories:
• Cellular communications systems

• Satellite communications system

Access the text alternative for slide images.

© McGraw Hill 18
WIRELESS WAN - CELLULAR 2

• Cellular systems were originally designed to provide


voice services to mobile customers and thus were
designed to interconnect cells to the public telephone
network. Increasingly they provide data services and
internet connectivity.
• Smart phone - Offer more advanced
computing ability and connectivity than basic
cell phones.
• 3G - A service that brings wireless broadband
to mobile phones.
• Streaming – A method of sending audio and
video files over the Internet, in such a way
that a user can view the file while it is being
transferred.
© McGraw Hill 19
WIRELESS WAN - SATELLITE
• Satellite - A space station that orbits the Earth receiving
and transmitting signals from Earth-based stations over a
wide area.

Access the text alternative for slide images.

© McGraw Hill 20
PROTECTING WIRELESS NETWORKS
• Network intrusion can occur if access codes, or
passwords are stored on a device that is lost or
stolen. Two methods for encrypting network traffic
on the web are SSL and SHTTP or HTTPS:
• Secure sockets layer (SSL) – is a standard
)

security technology for establishing an encrypted


link between a web server and a browser,
ensuring that all data passed between them
remain private.
• To create an SSL connection, a web server requires
and SSL certificate – an electronic document that
confirms the identity of a website or server and
verifies that a public key belongs to a trustworthy
individual or company.
© McGraw Hill 21
PROTECTING WIRELESS Networks
• Secure hypertext transfer protocol (SHTTP or
HTTPS) - A combination of HTTP and SSL to
provide encryption and secure identification of an
Internet server.
• HTTPS protects against interception of
communications, transferring credit card
information safely and securely with special
encryption technique.

© McGraw Hill 22
PROTECTING WIRELESS CONNECTIONS

• War driving - Deliberately searching for Wi-Fi signals while


driving by in a vehicle.
• War chalking - The practice of tagging pavement with codes
displaying where Wi-Fi access is available.

Two technologies securing Wi-Fi networks include:


• Wired equivalent privacy (WEP) - An encryption algorithm
designed to protect wireless transmission data.
• Wi-Fi protected access (WPA) – is a wireless security
protocol to protect Wi-Fi networks. It is an improvement on
the original Wi-Fi security standard, WEP.

© McGraw Hill 23
CHALLENGES OF A CONNECTED
• Networks create a diverse globally connected world
eliminating time and distance, which makes it possible to
communicate in ways not previously imaginable.
• Even though networks provide many business advantages,
they also create increased challenges in security, social,
ethical, and political issues.

© McGraw Hill 24
DIGITAL DIVIDE
• Digital divide - A worldwide gap
giving advantage to those with
access to technology.

© McGraw Hill 25
MOBILE ENTERPRISE
MANAGEMENT 1

• IT consumerization - The blending of personal and


business use of technology devices and applications.
• Pervasive computing - The growing trend of embedding
computer capabilities into everyday objects to make them
effectively communicate and perform useful tasks in a way
that minimizes the end user‘s need to interact with
computers as computers. E.g apple watch, self driving
cars, etc

© McGraw Hill 26
MOBILE ENTERPRISE
MANAGEMENT 2

• Enterprise mobility management (EMM) - An enterprise


wide security strategy to enforce corporate e-policies while
enabling employee use of mobile devices such as smart
phones and tablets.
• Common areas of EMM.

© McGraw Hill 27
MOBILE DEVICE MANAGEMENT
Mobile device management (M D
M) - A security strategy comprised
of products and services that offer
remote support for mobile devices,
such as smart phones, laptops, and
tablets.

Three M D M Policies:
• Bring Your Own Device.
• Choose Your Own Device.
• Company-Issued, Personally-
Enabled.

Access the text alternative for slide images.

© McGraw Hill 28
MOBILE APPLICATION
MANAGEMENT
• Mobile application management (MAM) - A security
strategy that administers and enforces corporate e-policies
for applications on mobile devices.
• Mobile application development - The set of processes
and procedures involved in writing software for use on
wireless devices.
• Figure 16.12 highlights the common characteristics of
MAM

Access the text alternative for slide images.

© McGraw Hill 29
MOBILE INFORMATION
MANAGEMENT 1

• Mobile information management (M


I M) -A security strategy that involves
keeping sensitive data encrypted and
allowing only approved applications to
access or transmit it.
• Fast data - The application of big data
analytics to smaller data sets in near
real or real time in order to solve a
problem or create business value.
• Figure 16.13: Mobile Information
management characteristics

Access the text alternative for slide images.

© McGraw Hill 30
MOBILE INFORMATION
MANAGEMENT 2

• There are three key security considerations to keep in


mind as you enter the wireless world:

© McGraw Hill 31
BUSINESS APPLICATIONS OF
WIRELESS TECHNOLOGIES
• Areas experiencing tremendous growth using wireless
technologies include:

Access the text alternative for slide images.

© McGraw Hill 32
RADIO FREQUENCY IDENTIFICATION
(RFID) 1

• Radio frequency identification (RFID) - Uses electronic


tags and labels to identify objects wirelessly over short
distances.
• It holds the promise of replacing the existing identification
technologies such as the bar code.
• RFID wirelessly exchanges information between tagged
object and reader/writer

Access the text alternative for slide images.

© McGraw Hill 33
RADIO FREQUENCY IDENTIFICATION
(RFID) 2

• RFID tag - An electronic identification device that is made


up of a chip and antenna.
• RFID reader (RFID interrogator) - A transmitter/receiver
that reads the contents of RFID tags in the area.
• Passive RFID tag - Does not have a power source.
• Active RFID tag - Contains a transmitter and a power
source (typically a battery).

© McGraw Hill 34
RADIO FREQUENCY IDENTIFICATION
(RFID) 3

• Semi passive RFID tag - Uses a battery to run the microchip’s


circuitry, but communicate by drawing power from the R FID
reader.
• Asset tracking - Occurs when a company places active or
semi-passive RFID tags on expensive products or assets to
gather data on the items’ location with little or no manual
intervention.
• RFID accelerometer - A device that measures the acceleration
(the rate of change of velocity) of an item and is used to track
truck speeds or taxi cab speeds.
• Chipless RFID tag - Uses plastic or conductive polymers
instead of silicon-based microchips, allowing them to be washed
or exposed to water without damaging the chip.

© McGraw Hill 35
GLOBAL POSITIONING SYSTEM
• Global positioning system (GPS)
- A satellite-based navigation
system providing extremely
accurate position, time, and speed
information.
• Automatic vehicle location (AVL)
– Uses GPS tracking to track
vehicles.
• Latitude - Represents a
north/south measurement of
position.
• Longitude - Represents an
east/west measurement of position.
© McGraw Hill 36
GEOGRAPHIC INFORMATION
SYSTEMS (GIS)
• Geographic information system (GIS) - Consists of
hardware, software, and data that provide location
information for display on a multidimensional map.
• A GIS stores, views, and analyze geographic data creating
multidimensional charts or maps

© McGraw Hill 37
GEOGRAPHIC INFORMATION
SYSTEMS
• GIS USES
• Finding what is nearby
• Routing information
• Sending Information alerts
• Mapping densities
• Mapping quantities

• GIS AND GPS both utilizes Location based services


• Location based services (LBS) - Applications that use
location information to provide a service.

© McGraw Hill 38
GEOGRAPHIC INFORMATION
SYSTEMS
• GIS USES

© McGraw Hill 39
LEARNING OUTCOME REVIEW
• Now that you have finished the chapter please review the
learning outcomes in your text.

© McGraw Hill 40
End of Main Content

Because learning changes everything. ®

www.mheducation.com

Copyright 2022 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy