SlideShare a Scribd company logo
1 of 45
Telecommunications, the
Internet, and Wireless
Technology
Learning Objectives
1 What are the principal components of telecommunications networks and key
networking technologies?
2 What are the different types of networks?
3 How do the Internet and Internet technology work, and how do they support
communication and e-business?
4 What are the principal technologies and standards for wireless networking,
communication, and Internet access?
5 How will MIS help my career?
Video Cases
• Case 1: Telepresence Moves out of the Boardroom and into the Field
• Case 2: Virtual Collaboration with IBM Sametime
Networking and Communication Trends
• Convergence
• Telephone networks and computer networks converging into single digital
network using Internet standards
• Broadband wireless
• Voice, data communication are increasingly taking place over broadband
wireless platforms
What Is a Computer Network?
• Two or more connected computers
• Major components in simple network
• Client and server computers
• Network interfaces (NICs)
• Connection medium
• Network operating system (NOS)
• Hubs, switches, routers
• Software-defined networking (SDN)
• Functions of switches and routers managed by central program
Components of a Simple Computer Network
Networks in Large Companies
• Hundreds of local area networks (LANs) linked to firm-wide corporate
network
• Various powerful servers
• Website, corporate intranet, extranet
• Backend systems
• Mobile wireless LANs (Wi-Fi networks)
• Videoconferencing system
• Telephone network, wireless cell phones
Corporate
Network
Infrastructure
Key Digital Networking Technologies (1 of 3)
• Client/server computing
• Distributed computing model
• Clients linked through network controlled by network
server computer
• Server sets rules of communication for network and
provides every client with an address so others can find it
on the network
• Has largely replaced centralized mainframe computing
• The Internet: largest implementation of client/server
computing
Key Digital Networking Technologies (2 of 3)
• Packet switching
• Method of slicing digital messages into parcels (packets), sending
packets along different communication paths as they become
available, and then reassembling packets at destination
• Previous circuit-switched networks required assembly of complete
point-to-point circuit
• Packet switching more efficient use of network’s communications
capacity
Packet-Switched Networks and Packet
Communications
Key Digital Networking Technologies (3 of 3)
• TCP/IP and connectivity
• Protocols: rules that govern transmission of information between two
points
• Transmission Control Protocol/Internet Protocol (TCP/IP)
• Common worldwide standard that is basis for the Internet
• Department of Defense reference model for TCP/IP
• Four layers
• Application layer
• Transport layer
• Internet layer
• Network interface layer
The Transmission Control Protocol/Internet Protocol
(TCP/IP) Reference Model
Types of Networks
• Signals: Digital versus analog
• Modem: translates digital signals into analog form (and vice versa)
• Types of networks
• Local area networks (LANs)
• Ethernet
• Client/server vs. peer-to-peer
• Wide area networks (WANs)
• Metropolitan area networks (MANs)
• Campus area networks (CANs)
• Personal Area Network (PAN)
• Wireless Local Area Network (WLAN)
• Storage / System Area Network (SAN)
Functions of the Modem
Transmission Media and Transmission Speed
• Physical transmission media
• Twisted pair wire (CAT5)
• Coaxial cable
• Fiber optics cable
• Wireless transmission media and devices
• Satellites
• Cellular systems
• Transmission speed
• Bits per second (bps)
• Bandwidth
Speed of Transmission
What Is the Internet?
•The Internet
• World’s most extensive network
• Internet service providers (ISPs)
• Provide connections
• Types of Internet connections
• Dial-up: 56.6 Kbps
• Digital subscriber line (DSL/FIOS): 385 Kbps–40 Mbps
• Cable Internet connections: 1–50 Mbps
• Satellite
• T1/T3 lines: 1.54–45 Mbps
Internet Addressing and Architecture
• Each device on Internet assigned Internet Protocol (IP)
address
• 32-bit number, e.g. 207.46.250.119
• The Domain Name System (DNS)
• Converts IP addresses to domain names
• Hierarchical structure
• Top-level domains
The Domain Name System
Internet Network Architecture
The Future Internet: IPv6 and Internet 2
• IPv6
• New addressing scheme for IP numbers
• Will provide more than a quadrillion new addresses
• Internet2
• Advanced networking consortium
• Universities, businesses, government agencies, other institutions
• Developed high-capacity 100 Gbps testing network
• Testing leading-edge new technologies for Internet
Internet Services and Communication Tools (1
of 2)
•Internet services
• E-mail
• Chatting and instant messaging
• Newsgroups
• Telnet
• File Transfer Protocol (FTP)
• World Wide Web
•Voice over IP (VoIP)
• Digital voice communication using IP, packet switching
Client/Server Computing on the Internet
Internet Services and Communication Tools (2 of
2)
• Unified communications
• Communications systems that integrate voice, data, e-
mail, conferencing
• Virtual private network (VPN)
• Secure, encrypted, private network run over Internet
• PPTP
• Tunneling
How Voice over IP Works
Interactive Session: Management: Monitoring
Employees on Networks: Unethical or Good
Business?
• Class discussion
•1. Should managers monitor employee e-mail and
Internet usage? Why or why not?
•2. Describe an effective e-mail and web use policy
for a company.
•3. Should managers inform employees that their
web behavior is being monitored? Or should
managers monitor secretly? Why or why not?
A Virtual Private Network Using the Internet
The Web
• Hypertext
• Hypertext Markup Language (HTML)
• Hypertext Transfer Protocol (HTTP):
• Uniform resource locator (URL):
• http://mybigdataanalytics.in/upcoming-technologies-with-ai-in-2019
• Software for locating and managing web pages
Top Web Search Engines
How Google Works
Web 3.0 and the Future Web
• More tools to make sense of trillions of pages on the Internet
• Pervasive web
• Internet of Things
• Internet of People
• App Internet
• Increased cloud computing and SaaS
• Ubiquitous mobile connectivity
• Greater seamlessness of web as a whole
Cellular Systems
• Competing standards
• CDMA: United States only
• GSM: Rest of world, Airtel, Vodafone etc.
• Third-generation (3G) networks
• 144 Kbps
• Suitable for e-mail access, web browsing
• Fourth-generation (4G) networks
• Up to 100 Mbps
• Suitable for Internet video
• LTE and WiMax
Wireless Computer Networks and Internet
Access (1 of 2)
• Bluetooth (802.15)
• Links up to 8 devices in 10-m area using low-power, radio-based
communication
• Useful for personal networking (PANs)
• Wi-Fi (802.11)
• Set of standards: 802.11
• Used for wireless LAN and wireless Internet access
• Use access points: device with radio receiver/transmitter for connecting
wireless devices to a wired LAN
Wireless Computer Networks and Internet
Access (2 of 2)
• Wi-Fi (cont.)
• Hotspots: one or more access points in public place to provide maximum
wireless coverage for a specific area
• Weak security features
• WiMax (802.16)
• Wireless access range of 31 miles
• Require WiMax antennas
A Bluetooth Network (PAN)
An 802.11 Wireless LAN
Radio Frequency Identification (RFID)
• Use tiny tags with microchips containing data about an item and
location
• Tag antennas to transmit radio signals over short distances to special
RFID readers
• Common uses:
• Automated toll-collection
• Tracking goods in a supply chain
• Reduction in cost of tags making RFID viable for many firms
How RFID Works
Wireless Sensor Networks (WSNs)
• Networks of hundreds or thousands of interconnected wireless
devices
• Used to monitor building security, detect hazardous substances in air,
monitor environmental changes, traffic, or military activity
• Devices have built-in processing, storage, and radio frequency sensors
and antennas
• Require low-power, long-lasting batteries and ability to endure in the
field without maintenance
• Major sources of “Big Data” and fueling “Internet of Things”
A Wireless Sensor Network
1. Introduction to Networking
https://www.slideshare.net/kamalgulati7/introduction-to-networking-83618362
2. Basic of Networking
https://www.slideshare.net/kamalgulati7/basic-of-networking
3. Network Topologies in Simple (Logical, Physical and Types)
https://www.slideshare.net/kamalgulati7/network-topologies-in-simple-logical-physical-and-types
4. Information Networks - (Covered all the Important Topics)
https://www.slideshare.net/kamalgulati7/information-networks-covered-all-the-important-topics
5. IP Address
https://www.slideshare.net/kamalgulati7/ip-address-83618365
6. The Internet & WWW - Basic Understanding
https://www.slideshare.net/kamalgulati7/the-internet-www-basic-understanding
7. Transmission Media for Networking
https://www.slideshare.net/kamalgulati7/transmission-media-for-networking
8. Types of Networks
https://www.slideshare.net/kamalgulati7/types-of-networks-83618383
9. Cloud Computing in Laymen terms
https://www.slideshare.net/kamalgulati7/cloud-computing-in-laymen-terms
10. Cloud Computing & Distributed Computing
https://www.slideshare.net/kamalgulati7/cloud-computing-distributed-computing
Interactive Session: Organizations: Net Neutrality:
The Battle Continues
• What is net neutrality? Why has the Internet operated under net neutrality
up to this point?
• Who’s in favor of net neutrality? Who’s opposed? Why?
• What would be the impact on individual users, businesses, and
government if Internet providers switched to a tiered service model for
transmission over landlines as well as wireless?
• It has been said that net neutrality is the most important issue facing the
Internet since the advent of the Internet. Discuss the implications of this
statement.
• Are you in favor of legislation enforcing network neutrality? Why or why
not?
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology

More Related Content

What's hot

IT Inftractructures - Evolution of IT Inftractructure
IT Inftractructures - Evolution of IT InftractructureIT Inftractructures - Evolution of IT Inftractructure
IT Inftractructures - Evolution of IT InftractructureMahmoud Al ahmad
 
Business with Information Technology
Business with Information TechnologyBusiness with Information Technology
Business with Information TechnologyRafiqul Alam Khan
 
Managing information technology
Managing information technologyManaging information technology
Managing information technologyPrafull Johri
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesSukanya Ben
 
E-commerce and M-commerce
E-commerce and M-commerceE-commerce and M-commerce
E-commerce and M-commerceganesh_channa
 
Use of Technology in business
Use of Technology in businessUse of Technology in business
Use of Technology in businessShreejan Acharya
 
Integration of Social Media and Mobile Websites & Apps
Integration of Social Media and Mobile Websites & AppsIntegration of Social Media and Mobile Websites & Apps
Integration of Social Media and Mobile Websites & AppsHenri Makembe
 
Data governance Program PowerPoint Presentation Slides
Data governance Program PowerPoint Presentation Slides Data governance Program PowerPoint Presentation Slides
Data governance Program PowerPoint Presentation Slides SlideTeam
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Information Systems in Global Business Today
Information Systems in Global Business TodayInformation Systems in Global Business Today
Information Systems in Global Business Todaytvto1381
 
E Commerce Product Management Powerpoint Presentation Slides
E Commerce Product Management Powerpoint Presentation SlidesE Commerce Product Management Powerpoint Presentation Slides
E Commerce Product Management Powerpoint Presentation SlidesSlideTeam
 
Enterprise Systems: SCM, CRM, & ERP
Enterprise Systems: SCM, CRM, & ERPEnterprise Systems: SCM, CRM, & ERP
Enterprise Systems: SCM, CRM, & ERPUMaine
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importanceuniversity of education,Lahore
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]mmuser2014
 
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEMMis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEMpankaj pandey
 

What's hot (20)

IT Inftractructures - Evolution of IT Inftractructure
IT Inftractructures - Evolution of IT InftractructureIT Inftractructures - Evolution of IT Inftractructure
IT Inftractructures - Evolution of IT Inftractructure
 
Business with Information Technology
Business with Information TechnologyBusiness with Information Technology
Business with Information Technology
 
Managing information technology
Managing information technologyManaging information technology
Managing information technology
 
Chapter 5 data resource management
Chapter 5  data resource managementChapter 5  data resource management
Chapter 5 data resource management
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
E-commerce and M-commerce
E-commerce and M-commerceE-commerce and M-commerce
E-commerce and M-commerce
 
Use of Technology in business
Use of Technology in businessUse of Technology in business
Use of Technology in business
 
Integration of Social Media and Mobile Websites & Apps
Integration of Social Media and Mobile Websites & AppsIntegration of Social Media and Mobile Websites & Apps
Integration of Social Media and Mobile Websites & Apps
 
Data governance Program PowerPoint Presentation Slides
Data governance Program PowerPoint Presentation Slides Data governance Program PowerPoint Presentation Slides
Data governance Program PowerPoint Presentation Slides
 
Iot and ethics
Iot and ethicsIot and ethics
Iot and ethics
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Information Systems in Global Business Today
Information Systems in Global Business TodayInformation Systems in Global Business Today
Information Systems in Global Business Today
 
E Commerce Product Management Powerpoint Presentation Slides
E Commerce Product Management Powerpoint Presentation SlidesE Commerce Product Management Powerpoint Presentation Slides
E Commerce Product Management Powerpoint Presentation Slides
 
Mis
MisMis
Mis
 
Enterprise Systems: SCM, CRM, & ERP
Enterprise Systems: SCM, CRM, & ERPEnterprise Systems: SCM, CRM, & ERP
Enterprise Systems: SCM, CRM, & ERP
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importance
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
 
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEMMis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
 
E business
E businessE business
E business
 

Similar to Telecommunications, the internet, and wireless technology

Internet comm. all protocol - Unitedworld School of Business
Internet comm. all protocol - Unitedworld School of BusinessInternet comm. all protocol - Unitedworld School of Business
Internet comm. all protocol - Unitedworld School of BusinessArnab Roy Chowdhury
 
Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Leng Kimlieng
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxNANDIKHATHARANIKUMAR1
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptxKavinD11
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptxrocky781582
 
Computer network
Computer networkComputer network
Computer networkRahul Das
 
ITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptxITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptxMohammadAsim91
 
Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Amit Fogla
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
Telecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyTelecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyPiyushHooda
 
Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Sour Summer
 
Introduction of Computer Network
Introduction of Computer NetworkIntroduction of Computer Network
Introduction of Computer Networkchouhanankit03
 

Similar to Telecommunications, the internet, and wireless technology (20)

Internet comm. all protocol
Internet comm. all protocol  Internet comm. all protocol
Internet comm. all protocol
 
Internet comm. all protocol - Unitedworld School of Business
Internet comm. all protocol - Unitedworld School of BusinessInternet comm. all protocol - Unitedworld School of Business
Internet comm. all protocol - Unitedworld School of Business
 
Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...Management information system chapter 7 telecommuniications the internet and ...
Management information system chapter 7 telecommuniications the internet and ...
 
Lesson 3 - Networking
Lesson 3 - NetworkingLesson 3 - Networking
Lesson 3 - Networking
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Chap006
Chap006Chap006
Chap006
 
Computer network
Computer networkComputer network
Computer network
 
ITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptxITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptx
 
Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Mis jaiswal-chapter-03
Mis jaiswal-chapter-03
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Chapter1.pdf
Chapter1.pdfChapter1.pdf
Chapter1.pdf
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Telecommunication and networks
Telecommunication  and networksTelecommunication  and networks
Telecommunication and networks
 
Telecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyTelecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless Technology
 
Chapter1
Chapter1Chapter1
Chapter1
 
Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01
 
Introduction of Computer Network
Introduction of Computer NetworkIntroduction of Computer Network
Introduction of Computer Network
 

More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU

More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU (20)

All About DBMS - Interview Question and Answers
All About DBMS - Interview Question and AnswersAll About DBMS - Interview Question and Answers
All About DBMS - Interview Question and Answers
 
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Concept of Governance - Management of Operational Risk for IT Officers/Execut...Concept of Governance - Management of Operational Risk for IT Officers/Execut...
Concept of Governance - Management of Operational Risk for IT Officers/Execut...
 
Emerging Technologies in IT
Emerging Technologies in ITEmerging Technologies in IT
Emerging Technologies in IT
 
Introduction to DBMS - Notes in Layman...
Introduction to DBMS - Notes in Layman...Introduction to DBMS - Notes in Layman...
Introduction to DBMS - Notes in Layman...
 
Fundamentals of DBMS
Fundamentals of DBMSFundamentals of DBMS
Fundamentals of DBMS
 
CASE (Computer Aided Software Design)
CASE (Computer Aided Software Design)CASE (Computer Aided Software Design)
CASE (Computer Aided Software Design)
 
SOFTWARE RELIABILITY AND QUALITY ASSURANCE
SOFTWARE RELIABILITY AND QUALITY ASSURANCESOFTWARE RELIABILITY AND QUALITY ASSURANCE
SOFTWARE RELIABILITY AND QUALITY ASSURANCE
 
Software Testing (Contd..) SDLC Model
Software Testing (Contd..) SDLC ModelSoftware Testing (Contd..) SDLC Model
Software Testing (Contd..) SDLC Model
 
Software Testing - SDLC Model
Software Testing - SDLC ModelSoftware Testing - SDLC Model
Software Testing - SDLC Model
 
Coding - SDLC Model
Coding - SDLC ModelCoding - SDLC Model
Coding - SDLC Model
 
Software Design - SDLC Model
Software Design - SDLC ModelSoftware Design - SDLC Model
Software Design - SDLC Model
 
Models of SDLC (Contd..) & Feasibility Study
Models of SDLC (Contd..)  & Feasibility StudyModels of SDLC (Contd..)  & Feasibility Study
Models of SDLC (Contd..) & Feasibility Study
 
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
Models of SDLC (Software Development Life Cycle / Program Development Life Cy...
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKETCLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
 
Application Software
Application SoftwareApplication Software
Application Software
 
Application Software – Horizontal & Vertical Software
Application Software – Horizontal & Vertical SoftwareApplication Software – Horizontal & Vertical Software
Application Software – Horizontal & Vertical Software
 
Software: Systems and Application Software
Software:  Systems and Application SoftwareSoftware:  Systems and Application Software
Software: Systems and Application Software
 
Programming Languages
Programming LanguagesProgramming Languages
Programming Languages
 
Number Codes and Registers
Number Codes and RegistersNumber Codes and Registers
Number Codes and Registers
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Telecommunications, the internet, and wireless technology

  • 2. Learning Objectives 1 What are the principal components of telecommunications networks and key networking technologies? 2 What are the different types of networks? 3 How do the Internet and Internet technology work, and how do they support communication and e-business? 4 What are the principal technologies and standards for wireless networking, communication, and Internet access? 5 How will MIS help my career?
  • 3. Video Cases • Case 1: Telepresence Moves out of the Boardroom and into the Field • Case 2: Virtual Collaboration with IBM Sametime
  • 4. Networking and Communication Trends • Convergence • Telephone networks and computer networks converging into single digital network using Internet standards • Broadband wireless • Voice, data communication are increasingly taking place over broadband wireless platforms
  • 5. What Is a Computer Network? • Two or more connected computers • Major components in simple network • Client and server computers • Network interfaces (NICs) • Connection medium • Network operating system (NOS) • Hubs, switches, routers • Software-defined networking (SDN) • Functions of switches and routers managed by central program
  • 6. Components of a Simple Computer Network
  • 7. Networks in Large Companies • Hundreds of local area networks (LANs) linked to firm-wide corporate network • Various powerful servers • Website, corporate intranet, extranet • Backend systems • Mobile wireless LANs (Wi-Fi networks) • Videoconferencing system • Telephone network, wireless cell phones
  • 9. Key Digital Networking Technologies (1 of 3) • Client/server computing • Distributed computing model • Clients linked through network controlled by network server computer • Server sets rules of communication for network and provides every client with an address so others can find it on the network • Has largely replaced centralized mainframe computing • The Internet: largest implementation of client/server computing
  • 10. Key Digital Networking Technologies (2 of 3) • Packet switching • Method of slicing digital messages into parcels (packets), sending packets along different communication paths as they become available, and then reassembling packets at destination • Previous circuit-switched networks required assembly of complete point-to-point circuit • Packet switching more efficient use of network’s communications capacity
  • 11. Packet-Switched Networks and Packet Communications
  • 12. Key Digital Networking Technologies (3 of 3) • TCP/IP and connectivity • Protocols: rules that govern transmission of information between two points • Transmission Control Protocol/Internet Protocol (TCP/IP) • Common worldwide standard that is basis for the Internet • Department of Defense reference model for TCP/IP • Four layers • Application layer • Transport layer • Internet layer • Network interface layer
  • 13. The Transmission Control Protocol/Internet Protocol (TCP/IP) Reference Model
  • 14. Types of Networks • Signals: Digital versus analog • Modem: translates digital signals into analog form (and vice versa) • Types of networks • Local area networks (LANs) • Ethernet • Client/server vs. peer-to-peer • Wide area networks (WANs) • Metropolitan area networks (MANs) • Campus area networks (CANs) • Personal Area Network (PAN) • Wireless Local Area Network (WLAN) • Storage / System Area Network (SAN)
  • 16. Transmission Media and Transmission Speed • Physical transmission media • Twisted pair wire (CAT5) • Coaxial cable • Fiber optics cable • Wireless transmission media and devices • Satellites • Cellular systems • Transmission speed • Bits per second (bps) • Bandwidth
  • 18. What Is the Internet? •The Internet • World’s most extensive network • Internet service providers (ISPs) • Provide connections • Types of Internet connections • Dial-up: 56.6 Kbps • Digital subscriber line (DSL/FIOS): 385 Kbps–40 Mbps • Cable Internet connections: 1–50 Mbps • Satellite • T1/T3 lines: 1.54–45 Mbps
  • 19. Internet Addressing and Architecture • Each device on Internet assigned Internet Protocol (IP) address • 32-bit number, e.g. 207.46.250.119 • The Domain Name System (DNS) • Converts IP addresses to domain names • Hierarchical structure • Top-level domains
  • 20. The Domain Name System
  • 22. The Future Internet: IPv6 and Internet 2 • IPv6 • New addressing scheme for IP numbers • Will provide more than a quadrillion new addresses • Internet2 • Advanced networking consortium • Universities, businesses, government agencies, other institutions • Developed high-capacity 100 Gbps testing network • Testing leading-edge new technologies for Internet
  • 23. Internet Services and Communication Tools (1 of 2) •Internet services • E-mail • Chatting and instant messaging • Newsgroups • Telnet • File Transfer Protocol (FTP) • World Wide Web •Voice over IP (VoIP) • Digital voice communication using IP, packet switching
  • 25. Internet Services and Communication Tools (2 of 2) • Unified communications • Communications systems that integrate voice, data, e- mail, conferencing • Virtual private network (VPN) • Secure, encrypted, private network run over Internet • PPTP • Tunneling
  • 26. How Voice over IP Works
  • 27. Interactive Session: Management: Monitoring Employees on Networks: Unethical or Good Business? • Class discussion •1. Should managers monitor employee e-mail and Internet usage? Why or why not? •2. Describe an effective e-mail and web use policy for a company. •3. Should managers inform employees that their web behavior is being monitored? Or should managers monitor secretly? Why or why not?
  • 28. A Virtual Private Network Using the Internet
  • 29. The Web • Hypertext • Hypertext Markup Language (HTML) • Hypertext Transfer Protocol (HTTP): • Uniform resource locator (URL): • http://mybigdataanalytics.in/upcoming-technologies-with-ai-in-2019 • Software for locating and managing web pages
  • 30. Top Web Search Engines
  • 32. Web 3.0 and the Future Web • More tools to make sense of trillions of pages on the Internet • Pervasive web • Internet of Things • Internet of People • App Internet • Increased cloud computing and SaaS • Ubiquitous mobile connectivity • Greater seamlessness of web as a whole
  • 33. Cellular Systems • Competing standards • CDMA: United States only • GSM: Rest of world, Airtel, Vodafone etc. • Third-generation (3G) networks • 144 Kbps • Suitable for e-mail access, web browsing • Fourth-generation (4G) networks • Up to 100 Mbps • Suitable for Internet video • LTE and WiMax
  • 34. Wireless Computer Networks and Internet Access (1 of 2) • Bluetooth (802.15) • Links up to 8 devices in 10-m area using low-power, radio-based communication • Useful for personal networking (PANs) • Wi-Fi (802.11) • Set of standards: 802.11 • Used for wireless LAN and wireless Internet access • Use access points: device with radio receiver/transmitter for connecting wireless devices to a wired LAN
  • 35. Wireless Computer Networks and Internet Access (2 of 2) • Wi-Fi (cont.) • Hotspots: one or more access points in public place to provide maximum wireless coverage for a specific area • Weak security features • WiMax (802.16) • Wireless access range of 31 miles • Require WiMax antennas
  • 38. Radio Frequency Identification (RFID) • Use tiny tags with microchips containing data about an item and location • Tag antennas to transmit radio signals over short distances to special RFID readers • Common uses: • Automated toll-collection • Tracking goods in a supply chain • Reduction in cost of tags making RFID viable for many firms
  • 40. Wireless Sensor Networks (WSNs) • Networks of hundreds or thousands of interconnected wireless devices • Used to monitor building security, detect hazardous substances in air, monitor environmental changes, traffic, or military activity • Devices have built-in processing, storage, and radio frequency sensors and antennas • Require low-power, long-lasting batteries and ability to endure in the field without maintenance • Major sources of “Big Data” and fueling “Internet of Things”
  • 41. A Wireless Sensor Network
  • 42. 1. Introduction to Networking https://www.slideshare.net/kamalgulati7/introduction-to-networking-83618362 2. Basic of Networking https://www.slideshare.net/kamalgulati7/basic-of-networking 3. Network Topologies in Simple (Logical, Physical and Types) https://www.slideshare.net/kamalgulati7/network-topologies-in-simple-logical-physical-and-types 4. Information Networks - (Covered all the Important Topics) https://www.slideshare.net/kamalgulati7/information-networks-covered-all-the-important-topics 5. IP Address https://www.slideshare.net/kamalgulati7/ip-address-83618365 6. The Internet & WWW - Basic Understanding https://www.slideshare.net/kamalgulati7/the-internet-www-basic-understanding 7. Transmission Media for Networking https://www.slideshare.net/kamalgulati7/transmission-media-for-networking 8. Types of Networks https://www.slideshare.net/kamalgulati7/types-of-networks-83618383 9. Cloud Computing in Laymen terms https://www.slideshare.net/kamalgulati7/cloud-computing-in-laymen-terms 10. Cloud Computing & Distributed Computing https://www.slideshare.net/kamalgulati7/cloud-computing-distributed-computing
  • 43. Interactive Session: Organizations: Net Neutrality: The Battle Continues • What is net neutrality? Why has the Internet operated under net neutrality up to this point? • Who’s in favor of net neutrality? Who’s opposed? Why? • What would be the impact on individual users, businesses, and government if Internet providers switched to a tiered service model for transmission over landlines as well as wireless? • It has been said that net neutrality is the most important issue facing the Internet since the advent of the Internet. Discuss the implications of this statement. • Are you in favor of legislation enforcing network neutrality? Why or why not?

Editor's Notes

  1. recent developments in networking technologies. example of convergence (Merging). How fast is broadband today? How many of your students have broadband? http://www.speedtest.net/ https://fast.com/ Note that in 2000, typical Internet access speeds were 56 kbps over a telephone line, costing 5/- per kilobit, whereas today broadband speeds are 10 to 50 Mbps, costing 20/- per day (or 10 paise per gigabit). Mbps stands for Megabits per second. MBps stands Megabytes per second. https://www.attplans.com/resources/difference-mbps-and-mbps/ Are students aware of how fast their Internet connections are at home, school, or work? Ask students if they know the speed of their cell phone’s Internet connection. The point here is to try and raise awareness of telecommunications systems among students.
  2. Describe the function of an NIC. What is a connection medium? - how the computers are linked together (fiber, radio waves - wireless LAN , microwave, UTP - LAN) Describe the purpose of a hub, switch, and router.
  3. A simple computer network consisting of computers, a network operating system (NOS) residing on a dedicated server computer, cable (wiring) connecting the devices, switches, and a router. Although the NOS is shown as part of the server, note that, depending on the type of software, an NOS may also be designed to reside on client computers (these are called peer-to-peer networks). Describe home computer network? Describe the elements of the network.
  4. To find in the network of a large company that has many locations and thousands of employees (illustrated on the next slide). what is meant by “backend systems.” Note that many firms are dispensing with traditional landline telephone networks and using Internet telephones that run on existing internal data networks and the Internet.
  5. Today’s corporate network infrastructure is a collection of many networks from the public switched telephone network, to the Internet, to corporate local area networks linking workgroups, departments, or office floors. The difference between the wireless LAN, which allows wireless access within the office, and the mobile Wi-Fi network, which allows Internet access to employees outside of offices. The advantage of telephone-based wireless systems is that they do not require a Wi-Fi hotspot to work, and in fact can connect users to the entire globe through their telephone networks. Cable networks—major competitors of telephone company Internet providers—have recently developed a mobile option. Optimum Cable (Hathway) has installed neighborhood Wi-Fi hot spots, allowing cable subscribers wireless access to the Internet.
  6. The main technologies in use today for networks: client/server computing, packet switching, and TCP/IP. what advantages client/server computing has over centralized mainframe computing.
  7. The discussion of the three main networking technologies today, looking at the second, packet switching. Note that circuit-switched (Real Time LIVE TV) networks were expensive and wasted available communications capacity—the circuit had to be maintained whether data was being sent or not. TCP vs UDP TCP (connection-oriented) –Packet Switching guarantees the recipient will receive the packets, reliability , no data is lost or corrupted in transit. Eg: FTP, Internet etc User Datagram Protocol- UDP (connectionless) Circuit Switching, packets are just sent to the recipient. UDP is used when speed is desirable and error correction is not necessary. For example, UDP is frequently used for live broadcasts and online games. Circuit/Packet Switching operates on Layer 3, the network layer. TCP/UDP operates on Layer 4, the transport layer It is also important to note that packet switching enables packets to follow many different paths. What is the advantage of this capability? If one path is blocked due to an accident or power failure, the data will automatically be shifted by routers to open paths. However, in truly massive outages like the September 11, 2001 attack on the World Trade Center, nearby metropolitan servers were knocked out, and for a period of several days, Internet access was limited in the New York Metropolitan area. The notion that packet switching networks would survive a nuclear attack is highly unlikely.
  8. Data are grouped into small packets, which are transmitted independently over various communications channels and reassembled at their final destination. Packet switching works, showing a message being split into three packets, sent along different routes, and then reassembled at the destination. Note that each packet contains a packet number, message number, and destination.
  9. Note that in a network, there are typically many different types of hardware and software components that need to work together to transmit and receive information. Different components in a network communicate with one another only by adhering to a common set of rules called protocols. In the past, many diverse proprietary and incompatible protocols often forced business firms to purchase computing and communications equipment from a single vendor. But today, corporate networks are increasingly using a single, common, worldwide standard called Transmission Control Protocol/ Internet Protocol (TCP/IP). TCP/IP actually is a suite of protocols, the main ones of which are TCP and IP. Ask students what these two main protocols are responsible for.
  10. When computer A sends a message to computer B is that the data that computer A creates is transferred within that computer from the application layer to subsequent layers in sequence. In this process it is split into packets, and information is added at each stage, ultimately translating the packets into a form that can be transferred over the network interface. After traveling over the network interface, the packets are reassembled at the recipient computer, from the network interface layer up, ultimately for use by the application layer.
  11. Differences are between digital and analog signals. Distinguish between LANs, CANs, WANs, and MANs, and what are the different range of operation. Note that a network can be defined by the way the clients interact (client/server versus peer-to-peer), the type of physical medium to carry signals (Ethernet, Fast Ethernet, etc.), and the way in which computers are connected and send signals to each other (topology).
  12. A modem is a device that translates digital signals into analog form (and vice versa) so that computers can transmit data over analog networks such as telephone and cable networks. Digital signals can be sent to other computers over analog cables such as telephone and cable lines that are analog. Note that digital signals are representations of the two binary digits, 0 and 1, and are represented logically as on and off electrical pulses (in reality as different voltages). what MODEM stands for. modulator-demodulator
  13. to define bandwidth (it is the difference between the highest and lowest frequencies that can be accommodated on a single channel). The bandwidth is the difference between the highest and lowest frequencies that can be accommodated on a single channel. The greater the range of frequencies, the greater the bandwidth and the greater the channel’s transmission capacity.
  14. The world’s largest implementation of client/server computing. use dial-up (telephone/modem)? Do any use satellite? Note that T lines are leased, dedicated lines suitable for businesses or government agencies requiring high-speed guaranteed service levels. IP Address, Physical Address, DNS, Gateway, Logical IP Address, WAN IP, https://www.whatismyip.com/, https://www.showmyipaddress.com/
  15. Domain Name System is a hierarchical system with a root domain, top-level domains, second-level domains, and host computers at the third level. This graphic describes how the domain name system works. Note that the “root” domain is the period that is used before the top-level domain, such as .edu or .com. Give students an example Internet address, such as myserver.myspace.com and ask them what the top-, second-, and third-level domains are.
  16. The Internet backbone connects to regional networks, which in turn provide access to Internet service providers, large firms, and government institutions. Network access points (NAPs) and metropolitan area exchanges (MAEs) are hubs where the backbone intersects regional and local networks and where backbone owners connect with one another. This graphic illustrates the architecture of the Internet. Note that MAEs (metropolitan area exchanges) are hubs where the backbone intersects regional and local networks and where backbone networks connect with one another.
  17. Client computers running web browsers and other software can access an array of services on servers over the Internet. These services may all run on a single server or on multiple specialized servers. This graphic looks at the services that an Internet server computer can offer: Websites (HTTP), email (SMTP), file transfer (FTP), newsgroups (NNTP).
  18. A VoIP phone call digitizes and breaks up a voice message into data packets that may travel along different routes before being reassembled at the final destination. A processor nearest the call’s destination, called a gateway, arranges the packets in the proper order and directs them to the telephone number of the receiver or the IP address of the receiving computer. This graphic shows how VoIP works. The voice messages are digitized and transported over the Internet in the same packet-switching method as traditional Internet data. Gateways are simply computers (network devices) that maintain the interface with the Internet in a firm.
  19. Course on ITIL - (IT Infrastructure Library®).
  20. This VPN is a private network of computers linked using a secure tunnel connection over the Internet. It protects data transmitted over the public Internet by encoding the data and wrapping them within the Internet protocol. By adding a wrapper around a network message to hide its content, organizations can create a secure private connection that travels through the public Internet. The rectangles A, B, C, and D represent different computers on the VPN. In a process called tunneling, packets of data are encrypted and wrapped inside IP packets
  21. https://www.submarinecablemap.com/