You are on page 1of 22

Business Driven Information Systems

4th Edition Paige Baltzan Solutions


Manual
Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/business-driven-information-systems-4th-edition-paige-baltzan-solutions-manu
al/
NETWORKS: MOBILE 7
BUSINESS CHAPTER

Networks and telecommunications are the transmission of signals over a distance for the purpose of
communication. In modern times, this process almost always involves the sending of electromagnetic waves by
electronic transmitters but in earlier years it may have involved the use of smoke signals, drums or semaphore.
Today, network and telecommunication is widespread and devices that assist the process such as the television,
radio and telephone are common in many parts of the world. There is also a vast array of networks that connect
these devices, including computer networks, public telephone networks, radio networks and television networks.
Computer communication across the Internet, such as email and instant messaging, is just one of many examples
of telecommunication.

SECTION 7.1: CONNECTIVITY: THE BUSINESS VALUE OF A NETWORKED WORLD


• Overview of a Connected World
• Benefits of a Connected World
• Challenges of a Connected World

SECTION 7.2: MOBILITY: THE BUSINESS VALUE OF A WIRELESS WORLD


• Wireless Network Categories
• Business Applications of Wireless Networks
• Benefits of Business Mobility
• Challenges of BusinessMobility

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 1 of 21
S E C T IO N 7 . 1
N E T W OR K S : M O B IL E B U S I N E S S

Wireless technologies are transforming how we live, work, and play. Handheld devices are continuing to offer
additional functionality and cellular networks are advancing rapidly in their increased speed and throughput
abilities. These enabling technologies are fueling widespread adoption and creation of new and innovative ways to
perform business.

OPENING CASE – Additional Information


Ironman
So you've qualified for Kona. Wouldn't it be nice to check out the racecourse say, once a week for the six months
leading up to the race? No, we're not talking about moving to Kona - although that would be a nice treat - now you
can do just that without leaving your own home. Ditto for checking out the Ford Ironman Arizona or Ford Ironman
Coeur d'Alene course, too.

Thanks to CompuTrainer's new Interactive Bike Course Videos you can get an unbelievably realistic riding
experience. Add to that the ability to monitor your heart rate, watts and pedaling efficiency and you will have no
excuses once it comes to race day.

The new interactive software goes much further than providing an entertaining way to spend your time on the
trainer. Some of the world’s best triathletes use a CompuTrainer at least once a week, year round, because of the
training and monitoring benefits it provides. Lisa Bentley even carries her CompuTrainer over to Hawaii in October
so she can maintain her regular workouts right up to the Ford Ironman World Championship.
http://www.racermateinc.com/computrainer.asp

LEARNING OUTCOMES
1: Explain the five different networking elements creating a connected world.
• Network categories: Networks are categorized based on geographic span: local area networks, wide area
networks, and metropolitan area networks. Network providers: At the top of the hierarchy are national service
providers (NSPs), private companies that own and maintain the worldwide backbone that supports the
Internet. Regional service providers (RSPs) offer Internet service by connecting to NSPs, but they also can
connect directly to each other. Another level down are the Internet service providers (ISPs); recall from
Chapter 3 that an ISP provides access to the Internet for a monthly fee.
• Network access technologies: A modem is a device that enables a computer to transmit and receive data.
Broadband is a high-speed Internet connection that is always connected. Digital subscriber line (DSL) allows
high-speed digital data transmission over standard telephone lines. Internet cable connections provide Internet
access using a cable television company’s infrastructure and a special cable modem. A T1 line is a type of
data connection able to transmit a digital signal at 1.544 Mpbs.
• Network protocols: A protocol is a standard that specifies the format of data as well as the rules to be followed
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 2 of 21
during transmission. Network access technologies use a standard Internet protocol called transmission control
protocol/Internet protocol (TCP/IP); it provides the technical foundation for the public Internet as well as for
large numbers of private networks.
• Network convergence: Network convergence is the efficient coexistence of telephone, video, and data
communication within a single network, offering convenience and flexibility not possible with separate
infrastructures. Voice over IP (VoIP) uses IP technology to transmit telephone calls. Internet protocol TV
(IPTV) distributes digital video content using IP across the Internet and private IP networks.

Learning Outcome 7.2: Identify the benefits and challenges of a connected world.
Before networks, transferring data between computers was time-consuming and laborintensive. People had to
physically copy data from machine to machine using a disk. Networks offer many advantages for a business
including:
• Sharing resources
• Providing opportunities
• Reducing travel

Networks have created a diverse, yet globally connected world. By eliminating time and distance, networks make it
possible to communicate in ways not previously imaginable. Even though networks provide many business
advantages, they also create increased challenges in (1) security and (2) social, ethical, and political issues.

CLASSROOM OPENER
HowStuffWorks
Start the class by asking students who understands how the Internet works? How does email go from the
University of Denver to Boston University? Or how does a web page go from client to server back to client?
Go to http://computer.howstuffworks.com/internet-infrastructure.htm for an overview of how the Internet
infrastructure works. There are some great diagrams and easy to understand explanations.

CLASSROOM EXERCISE
Cell Phones and Airplanes
Break your students into groups and ask them to research the Internet to find the reasons why people are required
to turn off their cell phones when they are on an airplane. There are two reasons why cell phones are not allowed
on an airplane:
1. The Federal Communication Commission (FCC) bans the use of cell phones on airplanes because they could
wreak havoc with cell phone systems on the ground. Signals from your cell phone, when you use it on or near
the ground, reach just a few cell phone nodes near you and the node that is getting the strongest signal picks
up your call. If you move, while driving your car or walking, the next node picks up the call. From the air,
however, your phone's signal could reach miles, hitting many nodes at once, all with equal strength. Plus, you
are moving at several hundred miles an hour. Cell phone systems were not designed to handle that.
2. The Federal Aviation Administration, for its part, supports the FCC ban for its own reasons. They fear cell
phones may interfere with navigation and other aircraft systems.

Incident reports submitted by airline crews also demonstrate the potential for trouble. NASA's Aviation Safety
Reporting System's "Passenger Electronic Devises Database Report Set" -- which could be subtitled "passengers
behaving badly" -- contains several reports of incidents involving passengers whose "personal electronic devices"
seemed to create disturbances in aircrafts' electronic systems.

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 3 of 21
CLASSROOM EXERCISE
The History of Nokia
Ask your students if they know how Nokia started out in business? Chances are none of them will guess a “wood
pulp mill”. Here is the timeline:
• 1865 - Fredrik Idestam establishes a wood pulp mill on the banks of the Tammerkoski Rapids. The event is
generally considered the starting point for Nokia's history. The small wood pulp mill quickly grew into a well-
established paper industry.
• 1871 - Idestam renames his company Nokia Ab. The product range was initially extended from wood pulp to
paper and sulphite cellulose, to be followed by electricity generation in 1902.
• 1898 - Eduard Polón establishes the Finnish Rubber Works. During its early years, the factory produced
shoes, boots and overshoes, as well as industrial hoses and belts.
• 1912 - Arvid Wickström establishes Suomen Punomotehdas Oy. The company was the first Finnish company
to manufacture electrical wires and cables.
• 1933 - Nokia's first car tire, with a summer tread, is launched.
• 1987 - The first NMT (Nordic Mobile Telephony, Finnish telecommunications authorities) portable phone,
Mobira Cityman is launched. Prior to this, mobile phones were in practice installed permanently in cars. Nokia
becomes the third-largest manufacturer or TV sets in Europe. After the acquisition of Oceanic SA and
Standard Elektrik Lorenz (SEL), TVs were Nokia's main business for a while.
• 1992 - Nokia announces its first GSM (Global System for Mobile Communications) mobile, model 1011. The
phone's user interface and its design form the basis of future models.
• 1993 - Nokia adopts the motto "Connecting People". The motto illustrates Nokia's contribution to creating
wireless connections between people.
• 1994 - Nokia announces the 2100 mobile phone series. In 1994, the goal was to sell 500,000 units. Nokia sold
20 million.
• 1998 - Nokia becomes the world leader in mobile phones. One of the cornerstones of Nokia's success in this
field was the company's early investments in digital GSM technology.
• 1999 - Nokia announces the 7110 model. The phone is the first Nokia mobile to use WAP (Wireless
Application Protocol). The WAP browser of Nokia 7110 provides the user with immediate access to the content
of Internet pages using a mobile phone.
• 2000 - Nokia 9210 Communicator marks the start of the color screen era for Nokia mobile phones. The
versatile device is designed for the business user, and it is compatible with most office software suites.
• 2002 - Nokia announces its first phone with a built-in camera. Nokia 7650 is also the first Nokia phone to use
the Series 60 software platform.
• 2002 - Nokia launches its first 3G phone, the Nokia 6650.
• 2003 - Mobile gaming goes multiplayer with the N-Gage from Nokia.
• 2005 - Nokia introduces the next generation of multimedia devices, the Nokia Nseries.
• 2005 - Nokia sells its billionth phone – a Nokia 1100 – in Nigeria. Global mobile phone subscriptions pass 2
billion.
• 2007 - Nokia recognized as 5th most valued brand in the world. Nokia Siemens Networks commences
operations. Nokia launches Ovi, its new internet services brand.
• 2008 - Nokia's three mobile device business groups and the supporting horizontal groups are replaced by an
integrated business segment, Devices & Services.

CORE MATERIAL
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 4 of 21
The core chapter material is covered in detail in the PowerPoint slides. Each slide contains detailed teaching notes
including exercises, class activities, questions, and examples. Please review the PowerPoint slides for detailed
notes on how to teach and enhance the core chapter material.

VIDEO MATERIALS TO ACCOMPANY APPLY YOUR KNOWLEDGE BOXED ELEMENTS


Use these videos to jump-start a case discussion and get your students thinking about how they are going to apply
the concepts they are learning in real-business and real-world situations.

BUSINESS DRIVEN DISCUSSION – NET NEUTRALITY


Public Knowledge Net Neutrality - Video
http://www.publicknowledge.org/node/307

BUSINESS DRIVEN MIS – CARS HACKED


How Thieves are Planning on Hacking into Your Car
http://autos.aol.com/article/hacking-into-your-car/

Hacking Wi-Fi - Video


http://www.youtube.com/watch?v=aZeud1V2II0

BUSINESS DRIVEN ETHICS AND SECURITY – GEOBLOGGING FOR CHIMPANZEES


Jane Goodall Chimpanzee GeoBlog - Video
http://www.gearthblog.com/blog/archives/2006/03/goodall_chimpan.html

BUSINESS DRIVEN GLOBALIZATION – FIGHTING POVERTY WITH MOBILE PHONES


Iqbal Quadir says mobiles fight poverty - Video
http://www.ted.com/talks/iqbal_quadir_says_mobiles_fight_poverty.html

BUSINESS DRIVEN INNOVATION – CRASH PAD


Clemon University Tests iTiger – Video
http://www.youtube.com/watch?v=5By5Z7_lXv0

BUSINESS DRIVEN DEBATE – GOOGLE TV


Introducing Google TV - Video
http://www.youtube.com/watch?v=diTpeYoqAhc

What is Google TV - Video


http://www.youtube.com/watch?v=vS0la9SmqWA

BUSINESS DRIVEN START-UP – VIVU VIDEOCONFERENCING


ViVu Video
http://vivu.tv/vivuweb/

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 5 of 21
S E C T IO N 7 . 2
M O B I L I T Y : T H E B U SI N E S S VA L U E O F A
WIRELESS WORLD

Wireless technologies are transforming how we live, work, and play. Handheld devices are continuing to offer
additional functionality and cellular networks are advancing rapidly in their increased speed and throughput
abilities. These enabling technologies are fueling widespread adoption and creation of new and innovative ways to
perform business.

LEARNING OUTCOMES
Learning Outcome 7.3: Explain the different wireless network categories.
There are four types of wireless networks—PAN, WLAN, WMAN, and WWAN. A PAN provides communication
over a short distance that is intended for use with devices that are owned and operated by a single user. A WLAN
is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet. A
WMAN is a metropolitan area network that uses radio signals to transmit and receive data, and a WWAN is a wide
area network that uses radio signals to transmit and receive data.

Learning Outcome 7.4: Explain the different wireless network business applications.
Mobile and wireless business applications and services are using satellite technologies. These technologies are
GPS, GIS, and LBS. GPS is a satellite-based navigation system providing extremely accurate position, time, and
speed information. GIS is location information that can be shown on a map. LBS are applications that use location
information to provide a service used by both GPS and GIS.

Learning Outcome 7.5: Identify the benefits and challenges of business mobility.
A wireless network can enhance mobility, provide immediate data access, increase location and monitoring
capabilities, provide mobile commerce opportunities, improve work flow, and provide an alternative to wiring.

There are several challenges of wireless networks including protecting against theft, protecting wireless
connections, preventing viruses on mobile devices, and addressing privacy concerns with RFID and LBS. Any
mobile device is vulnerable to loss no matter how big or small it is. The company may face significant exposure
from stolen IDs, passwords, encryption keys, and confidential information if the device falls into the wrong hands,
especially if the theft is not discovered or reported immediately and the company does not have time to revoke
access. Network intrusions can occur if access codes or passwords are stored on a device that is lost or stolen.
However, any time a wireless network connects to a wired one, the wireless network can serve as a conduit for a
hacker to gain entry into an otherwise secure wired network.
The potential for contracting viruses on mobile devices is becoming a reality. The need for virus protection at the
device level is critical. Any device that can access the Internet or receive email is at risk of catching a virus and
passing it on to other devices. As technology advances, the potential for privacy infringement does as well. RFID

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 6 of 21
already has the capability to determine the distance of a tag from the reader location. LBS can track and monitor
objects much like RFID. LBS risks the invasion of privacy and security caused by indiscreet location tracking.

CLASSROOM OPENER
Great Business Decisions: Akito Morita Invents the Sony Walkman
Akito Morita noticed that young people like listening to music wherever they went. He decided to find a way for
people to listen to music while they walked, ran, danced, or jogged. From this Morita designed the Walkman. The
first Sony Walkman was introduced in 1980 and was an instant success. Many of Sony’s successes are based on
innovation. The company has an instinctive ability to find and pursue market opportunities.
• In 1949, the company developed the magnetic recording tape
• In 1950, the company sold the first tape recorder in Japan
• In 1957, the company produced a pocket-size radio
• In 1960, Sony produced the first transistor TV in the world

CLASSROOM ACTIVITY
Nokia Wants to Track Your Location
The company is developing devices that'll track your position or any items that you own--everywhere you go.
Nokia's concept tech is basically an expansion on the assisted-GPS tech that's increasingly embedded in devices
like cellphones. Nokia plans a hybrid system that will combine RFID tags, Bluetooth and near-field communications
in small keychain-sized devices that communicate with a central hub--perhaps an advanced smartphone.

http://www.fastcompany.com/blog/kit-eaton/technomix/nokia-wants-track-your-location-everywhere

Show your students the video attached to this article. Then ask what security and ethical issues does this pose?

CLASSROOM VIDEO
VIDEOS: The Future of Cell Phones According to NTT
Ask your students "What will cell phones look like and be used for in the next 5 years?" You will get a variety of
ideas... then show them this... http://www.mobilemag.com/content/100/340/C12251/

CLASSROOM DISCUSSION
Google Pays for Android Support
Google's $500 million stake in the new Clearwire could give it a major platform for its wireless OS. The next step in
Google's ambitious wireless strategy became clear as the search giant agreed to sink $500 million into the
revitalization of struggling wireless Internet provider Clearwire. Google is looking for support for its Android mobile
operating system.

Google, along with Intel, Comcast, Time Warner Cable and Bright House Networks, is investing $3.2 billion for the
union of Sprint Nextel's and Clearwire's wireless broadband businesses into a new wireless communications
company. The new Clearwire will work to create the first nationwide mobile WiMAX network, aiming to bring
speedy wireless Internet access to the country's consumers, businesses, schools, and government agencies.

WiMAX pipes data much faster than today's 3G wireless networks, which can suffer from high latency. This speed
improvement will allow users to consume multimedia and other bandwidth-intensive content from laptops, smart
phones and consumer electronics devices.

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 7 of 21
Clearwire earlier this year said it would begin migrating its current customers to Gmail and Google Calendar and
will use AdSense for Search to provide Google search capabilities on future Clearwire portal applications.

Most significantly, Clearwire has agreed to support Google's Android operating system software in its future voice
and data devices that it provides to its retail customers. Android needs a major launching pad and footprint if it is
going to succeed as an alternative to Symbian, Microsoft's Windows Mobile, the iPhone and other operating
systems. Google also agreed to work with Clearwire on an open Internet business protocol for mobile broadband
devices.

In an expanded relationship with Sprint, Google will become the default provider of Web and local search services,
which will be enabled with location information. Sprint will preload Google Maps for mobile, Gmail and YouTube on
select mobile phones. Now Google has a significant stake in a next-generation wireless Internet company that
could give Verizon and AT&T a run for their mobile money.
The new Clearwire expects to cover 120 million to 140 million people in the United States by the end of 2010. If
those people are using Android devices, Google will indeed become a force in the market, albeit still behind
Symbian and Windows Mobile.

CLASSROOM EXERCISE
Wireless Classrooms
Break your students into groups and ask them to develop a completely mobile and wireless class for the future.
Ask them to take into consideration the following:
• How would lectures be given?
• How would questions be asked and answered?
• How would assignments be given and collected?
• How would group projects be performed?
• How would students separate work and nonwork time?
• How would exams be administered?
• Would this type of class be better or worse than a traditional class?

CLASSROOM EXERCISE
Wireless Advertising
Present this information to your students…

Vindigo.com (vindigo.com) has a large database of customers willing to accept promotional materials on their
wireless devices. This is known as permission marketing. The users download special software on their
smartphones or PDAs that allows Vindigo.com to deliver timely, accurate information about places to go and things
to do in their area. Along with every listing, the company can deliver a customized message to the users at a time
and place where it is of most interest to them and they are most likely to act on it.

The company targets ads by city (New York, San Francisco, Los Angeles, etc.) and channel (Eat, Shop, or Play).
Vindigo.com tracks which ads a user sees and selects, and even allows a user to request information from an
advertiser via email. Vindigo.com determines a user's location through GPS or by asking which neighborhoods
they want to be matched with. For example, if you own an Italian restaurant chain, you can use Vindigo.com to
send a message to anyone looking for Italian food within a few blocks of one of your locations. You can give them
directions to that restaurant and even offer them the list of specials on the menu and discounts.

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 8 of 21
MyAvantGo.Com (avantgo.com) has over 2,500 content channels and over 7 million registered users. The content
is delivered to smartphone and PDA users. MyAvantgo offers an m-business channel and direct promotions to
deliver advertising from some of the world's top brands including American Airlines, Chevy Trucks, the Golf Chan-
nel, CNN, the New York Times, and Yahoo.

Hoping to become the king of location-based web domains, Go2Online (go2online.com) helps mobile travelers find
everything from lodging (choose go2hotels) to Jiffy Lube stations (choose go2oilchanges). Partnering with Sprint,
NexTel, Verizon, and BellSouth, Go2 makes its services available to smartphone and PDA users. Entering
"JiffyLube" or hundreds of other brand names into the Go2 system will bring up the nearest location where a
shopper can find that product or service.

Break your students into groups and ask them to address the following questions:
• The number of ads pushed to an individual should be limited. Why?
• What security issues should vendors and users be aware of?
• What ethical issues does wireless advertising cause?
• Would you be willing to listen to a 10-second commercial if you got free airtime?

CORE MATERIAL
The core chapter material is covered in detail in the PowerPoint slides. Each slide contains detailed teaching notes
including exercises, class activities, questions, and examples. Please review the PowerPoint slides for detailed
notes on how to teach and enhance the core chapter material.

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 9 of 21
C H A PT E R S E V E N
CLOSING MATERIAL

OPENING CASE QUESTIONS


THE IRONMAN

1. Knowledge: List the ways WTC is using networks to improve its competitive advantage in the
professional sports broadcasting industry.
WTC deployed a WiMAX wireless network across the course. The company used radio frequency
identification (RFID) technology to track each athlete’s progress, and used the WiMAX network’s high
bandwidth and geographic reach to transmit high-quality video and stream it over the Internet in near real time.
Home viewers and event spectators could view the video and monitor the athletes’ progress by logging on to
Ironmanlive.com. wi-fi hotspots and an Internet cafe provided convenience access. Staff used wireless
technologies to plan and manage the event, enhancing their productivity and the athletes’ well-being.
WTC uses a variety of wireless technologies, namely RFID, wi-fi, and WiMAX. The company used radio
frequency identification (RFID) technology to track each athlete’s progress, and used the WiMAX network’s
high bandwidth and geographic reach to transmit high-quality video and stream it over the Internet in near real
time. Home viewers and event spectators could view the video and monitor the athletes’ progress by logging
on to Ironmanlive.com. Wi-fi hotspots and an Internet cafe provided convenience access. Staff used wireless
technologies to plan and manage the event, enhancing their productivity and the athletes’ well-being.

2. Comprehension: Describe the different types of networks WTC is using.


WTC uses LAN, MAN and WAN architectures supported by wired and wireless technologies.

3. Application: Apply the concepts of TCP/IP to how the Ironman World Championships are broadcast
from Ironmanlive.com .
TCP (Transmission Control Protocol) consists of a set of rules, the protocol, that are used with the Internet
Protocol, the IP, to send data “in a form of message units” between computers over the Internet. Therefore,
TCP/IP makes sure that the information being broadcast is sent and received from the devices (or people) that
request it.

4. Analysis: Analyze the various wireless technologies that WTC could use in promoting the Ironman
World Championships.
There are a number of different technologies changing the way businesses operate. Student answers to this
question will vary depending on their three technology choices.
• Wireless local area network (wLAN): uses radio waves rather than wires to transmit information across a
local area network.
• Cellular phones and pagers: provide connectivity for portable and mobile applications, both personal and
business.
• Cordless computer peripherals: connect wirelessly to a computer, such as a cordless mouse, keyboard,
and printer.
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 10 of 21
• Satellite television: allows viewers in almost any location to select from hundreds of channels.
• WiMAX wireless broadband: enables wireless networks to extend as far as 30 miles and transfer
information, voice, and video at faster speeds than cable. It is perfect for Internet service providers (ISPs)
that want to expand into sparsely populated areas, where the cost of bringing in cable wiring or DSL is
too high.
• Security sensor: alerts customers to break-ins and errant pop flies. Its dual sensors record vibration and
acoustic disturbances—a shattered window—to help avoid false alarms.

In many sporting events, being tethered to technology is not always accessible. Having access to wireless
technologies allows diversity in venue and various event conditions.

5. Synthesis: Develop a use for LBS that the WTC could benefit from.
TWC could use VoIP for business application integration and mobility. Although not stated in the case, TWC
should be using both a VPN and VAN for a secure and reliable IT infrastructure along with the use and
protection of a firewall.

6. Evaluate: Assess the security dilemmas that WTC faces in using the various forms of wireless
technology.
The main ethical and security dilemmas WTC face are:
• Encryption of data sent via wireless devices
• Authorization and authentication to use data services
• Privacy infringement with the use of RFID tags

CLOSING CASE ONE QUESTIONS


Wireless Bikes
1. What advantages does a wireless network provide Denver B-cycle?
A wireless network can enhance mobility, provide immediate data access, increase location and monitoring
capabilities, provide mobile commerce opportunities, improve work flow, and provide an alternative to wiring.
By implementing wireless network, the company is able to realize the benefits of new wireless technology
without compromising their network security. By providing its customers with better access to information: real-
time field reporting, database queries, and bi-directional communication, customers can easily find any bike in
the city. In addition to time savings, there will also be a significant improvement in the flow of information. With
real-time communication across any available wireless network connection, requests can be filed immediately.
The company can be more productive and accurate in their work, which in turn creates a more efficient and
effective company.

2. What challenges does a wireless network create for Denver B-cycle?


There are several challenges of wireless networks including protecting against theft, protecting wireless
connections, preventing viruses on mobile devices, and addressing privacy concerns with RFID and LBS. Any
mobile device is vulnerable to loss no matter how big or small it is. The company may face significant
exposure from stolen IDs, passwords, encryption keys, and confidential information if the device falls into the
wrong hands, especially if the theft is not discovered or reported immediately and the company does not have
time to revoke access. Network intrusions can occur if access codes or passwords are stored on a device that
is lost or stolen. However, any time a wireless network connects to a wired one, the wireless network can
serve as a conduit for a hacker to gain entry into an otherwise secure wired network.

The potential for contracting viruses on mobile devices is becoming a reality. The need for virus protection at
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 11 of 21
the device level is critical. Any device that can access the Internet or receive email is at risk of catching a virus
and passing it on to other devices. As technology advances, the potential for privacy infringement does as
well. RFID already has the capability to determine the distance of a tag from the reader location. LBS can track
and monitor objects much like RFID. LBS risks the invasion of privacy and security caused by indiscreet
location tracking. The main security risks the company should be aware of is someone intercepting their data
transmissions. A few precautions the police department can take include:
• Encryption of data sent via wireless devices
• Authorization and authentication to use data services
• Enable, use, and routinely test the inherent security features, such as authentication and encryption
methods that are available in wireless technologies.
• Firewalls and other appropriate protection mechanisms should also be employed.

3. What information not described in the case can Denver B-cycle use with RFID and LBS data?
• RFID could be used to tag all equipment.
• RFID could be used to tag people who are renting bikes
• RFID could be used for tracking equipment.
• A WiMAX network could function as a backhaul connecting all of the fiber-ready towers to one another.
• WiMAX, which can produce a wireless cloud connectivity to the entire city using just a few base stations.
• Deploy WiMAX network citywide and run all communications applications over it.
• Using LBS applications with an integrated web and mobile based solution, will enable its employees and
customers to quickly and easily access data right from their bike including maps, where am I, and
directions.

4. How could Denver B-cycle use other wired or wireless network technologies to gain a competitive
advantage?
The wireless technology increases efficiencies and productivity with better, real-time access to information.
The technology is designed to help companies provide better customer service by increasing their ability to
securely access customer and equipment records, payment data, and maps anywhere in the city. The
possibilities for wireless technology are endless. As computers are combined with various forms of hand-held
devices, it won’t be long before wireless networks are as ubiquitous as refrigerators and dishwashers. In the
long run, wireless networks will be cheaper since no structural changes will need to be made to the building’s
walls, ceilings, or floors. If they want to add equipment, they simply add another node to the network. The
company won’t have to cut holes, run wires, or alter the physical structure at all.

Companies should use RFID to:


• Continuously track bike location
• Track the location of customers and employees throughout the city
• Track the location of expensive and critical repair equipment
• Restrict access to equipment

CLOSING CASE TWO


Google Latitude
1. What are the privacy and security issues with using Google Latitude?
With an RFID tag attached to each package the company could monitor, in real time, every products exact
location. It could also monitor such things as humidity, temperature, shifts, and other factors that cause issues
in its supply chain by damaging goods during shipping. The main risk is someone intercepting data
transmissions. A few precautions include:
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 12 of 21
• Encryption of data sent via wireless devices
• Authorization and authentication to use data services
• Enable, use, and routinely test the inherent security features, such as authentication and encryption
methods that are available in wireless technologies.
• Firewalls and other appropriate protection mechanisms should also be employed.

2. If users can lie about the location, is this a very effective tool?
No!

3. What are the advantages of using LBS?


GPS and GIS both utilize location-based services (LBS), applications that use location information to provide a
service. LBS is designed to give mobile users instant access to personalized local content and range from 911
applications to buddy finders (“Let me know when my friend is within 1,000 feet”) to games (treasure hunts) to
location-based advertising (“Visit the Starbucks on the corner and get $1.00 off a latte”). Many LBS
applications complement GPS and GIS, such as:
• Emergency services
• Field service management
• Find-it services
• Mapping
• Navigation
• Tracking assets
• Traffic information
• Vehicle location
• Weather information
• Wireless advertising

4. If you wanted to use Google Latitude, what could you do to protect your privacy from someone you do
not want to be able to locate you?
These would be features included with Google Latitude that allow you to “hide” from certain individuals that
you did not want to know where you were currently located.

CRITICAL BUSINESS THINKING


Instructor Note: There are few right or wrong answers in the business world. There are really only efficient and
inefficient, and effective and ineffective business decisions. If there were always right answers businesses would
never fail. These questions were created to challenge your students to apply the materials they have learned to
real business situations. For this reason, the authors cannot provide you with one version of a correct answer.
When grading your students’ answers, be sure to focus on their justification or support for their specific answers. A
good way to grade these questions is to compare your student’s answers against each other.

1. BUILDING NATIONWIDE BROADBAND


Project Purpose: To understand the government’s role in broadband.
Potential Solution: To kick start this activity ask your students to view the following website:
National Broadband – Connecting America: http://www.broadband.gov/plan/

The National Broadband Plan lays out a bold roadmap to America's future. These initiatives will stimulate
economic growth, spur job creation, and boost our capabilities in education, healthcare, homeland security and
more.
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 13 of 21
Explore the Plan below and learn more about how affordable, high-speed broadband access will help America
lead in the 21st century.

2. FOURSQUARE CHEATING
Project Purpose: To demonstrate how LBS services can be hacked.

Potential Solution: You can tell Foursquare you’re at pretty much any location you want it to believe right
from your home. The benefits of cheating at this game are great, because you may earn some free stuff from
the places you claim to have been.

• Visit the Foursquare Mobile site.


• Click Check in.
• Enter the name of the place where you want to be, then click the Check-in button.
• It searches the locations. Click the location you wish to use.
• Congratulations! You’ve cheated on Foursquare.

http://gametipcenter.com/how-to-cheat-at-foursquare

3. PANDORA MAKES USER’S MUSIC PUBLIC


Project Purpose: To understand the value of securing data.
Potential Solution: Student views of this particular situation will vary. Some students will view this as highly
unethical while others will view it as public data. Ask your students to determine why someone would want to
know what a person is listening too? How could a marketing or sales firm use this information to their
advantage? How would your students feel if everyone in the classroom could see what music or TV shows
they were watching in the last week?

4. WIRELESS NETWORK VULNERABILITY


Project Purpose: To demonstrate the value of securing networks
Potential Solution: This is a great exercise as many of your students probably have home networks. Start
this activity with a video.
• ABC News Wireless http://www.youtube.com/watch?v=qP1BOZqrp5g
• Hacking Wireless Computers http://www.metacafe.com/watch/234608/hacking_wireless_computers/

5. SELECTING AN ISP
Project Purpose: To begin to understand how vulnerable all computer networks are and the security features
needed to protect them.
Potential Solution: There are a variety of answers here. Students should separate their responses according
to software and hardware:
Software
• Virus protection software is crucial to network security. These software programs scan all data
entering a network from any outside source for known viruses and warn of any viruses encountered to
avoid corrupting network software. Updates for virus software are made available through the vendor,
usually on a subscription basis.
Hardware

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 14 of 21
• Protection against unauthorized access from outside a network is usually provided through some sort
of firewall service. Firewalls are either computers or routers that are set up to provide a secured
“doorway” through which users can access the Internet and Internet users can access web data.
Firewall services can be configured to meet specific security needs. They can be set up to screen
Internet users trying to access a network, and to allow only certain authorized employees to access
the Internet from within a network.
• In addition, many firewalls now feature remote authorization for employees using a remote (off-site)
Internet connection to access restricted network resources. Other non-Internet applications for firewall
services include protecting mainframes or subnetworks from general access within an organization
and ensuring confidentiality of data transmitted across networks.

5. WIRELESS FITNESS
Project Purpose: To implement a wireless network.
Potential Solution: There are a number of advantages to implementing a wireless network such as using a
PDA to find information while walking around the club. Customers could connect to the wireless network with
their own laptops to check email and perform work while at the club. Wireless iPods are on the market and
customers could download songs and podcasts while working out. The numbers of advantages of a wireless
network are endless. However, the club should also be aware of the security issues associated with a wireless
network.

6. THE END OF THE ALL-YOU-CAN-EAT WIRELESS DATA PLAN


Project Purpose: To perform a data provider analysis.
Potential Solution: Yes, this makes great business sense as millions of new wireless data users explode onto
the market. The network is very scalable and the fees might disappear depending on demand and usage.

7. COULD THE DOMAIN NAME SYSTEM BE HACKED?


Project Purpose: To explain domain names
Potential Solution: The DNS can be protected by using a host of technology tools to ensure security.

8. SHIPMENT ROUTES
Project Purpose: Understanding the power of location based services.
Potential Solution: This exercise may take some outside research, but encourage students to think on their
own to answer this. Some responses might include - GPS satellite location systems or RFID smart tagging.
GPS satellite-based tracking systems seem to be the most reasonable since RFID requires large capital
investment and standard data models that support different vendors' tags.

GPS and GIS both utilize location-based services (LBS), applications that use location information to provide a
service. LBS is designed to give mobile users instant access to personalized local content and range from 911
applications to buddy finders (“Let me know when my friend is within 1,000 feet”) to games (treasure hunts) to
location-based advertising (“Visit the Starbucks on the corner and get $1.00 off a latte”). Many LBS
applications complement GPS and GIS, such as:
• Emergency services
• Field service management
• Find-it services
• Mapping
• Navigation
• Tracking assets
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 15 of 21
• Traffic information
• Vehicle location
• Weather information
• Wireless advertising

9. GOOGLE COLLECTED PUBLIC WI-FI DATA… BY MISTAKE


Project Purpose: Demonstrate how even the best companies can make MIS mistakes.
Potential Solution: Students answers will vary depending on each student’s view of personal privacy.

APPLY YOUR KNOWLEDGE BUSINESS PROJECTS


Instructor Note: There are few right or wrong answers in the business world. There are really only efficient and
inefficient, and effective and ineffective business decisions. If there were always right answers businesses would
never fail. These questions were created to challenge your students to apply the materials they have learned to
real business situations. For this reason, the authors cannot provide you with one version of a correct answer.
When grading your students’ answers, be sure to focus on their justification or support for their specific answers. A
good way to grade these questions is to compare your student’s answers against each other.

AYK I: GOGO GADGETS


Will we be able to access applications and data anywhere, at anytime, updating data in real-time, securely,
efficiently, effectively, affordably? Will we see the end of messy wires protruding from computers, printers,
modems, scanners, projectors and other peripherals? Will we be able to walk up to a wireless printer at an Airport,
turn on our Pocket PC, tablet or laptop and print that proposal or presentation we need, perfectly formatted,
regardless of the operating system or application we are running and printer drivers we may have in our device?
Will we be able to create a mobile version of our existing SAP, Siebel, Oracle or SQL-based application, without
fuss, without it costing a fortune, and run it over a 1XRTT or GPRS network, securely, dependably? Will we be
able to make and receive phone calls, or manage our email and calendar from a hand-held device, using voice
over Wireless LAN or unified messaging technology while connected to a wi-fi network at an Airport, convention
center, or coffee shop? All interesting questions to think about as the wireless frontier starts to mature.

1. A few new wireless devices might include:


• Wireless technology as well as smaller and cheaper sensors to track people’s vital signs on a daily, even
hourly, basis. The data can then be automatically uploaded to a database accessible via the Internet.
• The Bluetooth wireless technology that allows people to use a hands-free earpiece while making a mobile
telephone call could soon alert the emergency services when someone has a heart attack.
• Wireless hardware/software that allows a user to create and manage home automation systems,
controlling lights, appliances, thermostats, lawn sprinklers and other devices.
• Wireless devices that allow mobile search services and apps that you speak (rather than type) search
terms and filter results based on proximity (on the assumption that you're likely searching for something
nearby).
• Mobile tv devices
2. Companies are discovering the value in having information workers do their jobs outside of the office. Work is
no longer tied to a set, physical location. Communicating with others and accessing and working with
information while away from the desk is improving the productivity of all types of professionals from
consultants, sales representatives, and installation technicians to physicians, administrators, and store
managers. According to research conducted by Gartner, "mobile workforce enablement is a top 3 technology
priority for CIOs.”

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 16 of 21
Most mobile adoption has been driven by individual departments and point-specific solutions that assist, for
example, sales and field service employees. As mobile technologies become more reliable and wireless
standards develop, companies are growing more interested in deploying integrated, organization-wide
solutions that will drive positive business results and measurable ROI for the entire business. Mobility is
becoming an integral part of their technology infrastructure and processes.
This increasing demand has led to rapid growth in mobile software, ranging from more secure mobile email,
mobile instant messaging (IM), and mobilized corporate applications like customer relationship management
(CRM) programs. When it comes to hardware, mobility has seen great adoption via mobile personal
computers, as 75 percent of organizations now support wirelessly enabled mobile PCs. To provide effective
technology and productivity tools for mobile and dispersed workers, companies need to deploy, maintain, and
support mobile PCs and devices while maintaining a high level of security. By providing a more secure and
seamless way to exchange information, Microsoft mobile solutions can help employees be as productive
outside of the office as they are when they are at their desks.
Mobility adoption can start with people accessing email on handheld devices, such as personal digital
assistants (PDAs), or editing documents on a mobile PC while on the go, but companies are realizing it does
not stop there. Mobile connectivity helps remote workers more securely access vital data and intellectual
property (IP) assets. Mobility is opening frontiers in communication, corporate information access, data
synchronization, document collaboration and sharing, the network, user settings across hardware, and more.

Today, doctors send prescriptions electronically to pharmacies from their mobile PCs or handheld devices,
insurance companies manage claims through electronic forms instead of paper-based processes, and
services are conducted using devices that upload customer information from the field. Mobility is helping to
improve business productivity and processes, and companies are learning how to create a competitive
advantage by helping to give their workforce the ability to:
• Save time and increase productivity by quickly and easily accessing information when workers are away
from the office, to capture ideas and thoughts from anywhere.
• Respond better to customer requests with access to email and vital business information when workers
are away from the office.
• Automatically synchronize files when their mobile PCs, Windows Mobile powered Smartphones, and
PDAs connect to the corporate network.
• Improve sales cycles and forge closer relationships with customers and partners through anytime,
anywhere access to information that can help them improve responsiveness, complete a sale, or simplify a
process for partners.

AYK II: WAP


Wireless Internet access is quickly gaining popularity among people seeking high-speed Internet connections
when they are away from their home or office. The signal from a typical wireless access point (WAP) only extends
for about 300 feet in any direction, so the user must find a “hot spot” to be able to access the Internet while on the
road. Sometimes hot spots are available for free or for a small fee.

Student answers to this question will vary. There are numerous ways to keep connected while traveling. Here are
a few potential answers:
1. Students can use www.wifinder.com and www.jiwire.com to determine which commercial hot spots would be
the most appropriate for their sales force and the commercial network service that these hot spots use.
2. Students can research the websites of two or three commercial networks that seem most appropriate to
discover more about pricing and services. (Hint: T-Mobile is one example). Verizon and Comcast also offer
high-speed mobile Internet access for businesses.

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 17 of 21
3. Students can research www.wififreespot.com to deter mine how many free public hot spots are available in
these cities. Are there enough for your company to rely on them or should you use a commercial wi-fi system.
If so, which one?
4. Students can research www.fon.com to see alternative methods of using home broadband connections to stay
connected.
5. Students can also look at purchasing wireless access cards for PCs.

AYK III: SECURING YOUR HOME WIRELESS NETWORKS


These days wireless networking products are so ubiquitous and inexpensive that anyone can easily build a
wireless network with less than $100 worth of equipment. However, wireless networks are exactly that–wireless -
they do not stop at walls. In fact, wireless networks often carry signals more than 300 feet from the wireless router.
Living in an apartment, dorm, condominium, or house means that you might have dozens of neighbors who can
access your wireless network.
It is one thing to let a neighbor borrow a lawn mower, but it is another thing to allow a neighbor to access a home
wireless network. There are several good reasons for not sharing a home wireless network including:
• Slow down Internet performance
• Allow others to view files on your computers and spread dangerous software such as viruses
• Allow others to monitor the websites you visit, read your email and instant messages as they travel across the
network, and copy your usernames and passwords
• Allow others to send spam or perform illegal activities with your Internet connection

First off students should create a requirements document to define what the system is supposed to do as well as
adequately identify and analyze the needs of users, existing systems, potential RF interference, and so on.
In general, students need to define the types of applications that users will need. For example, enable the use of
email and web browsing as a basic service. As options, you could include the use of VPNs and video
conferencing.

The following are suggestions for defining requirements that pertain specifically to public WLANs:
• Keep the user interface as open as possible - With public WLANs, be sure the solution interfaces with the
widest possible number of users. This maximizes the number of subscribers. Most WLAN users today have
802.11b radio NICs, but plan ahead and insist on access points that support both 802.11b/g and 802.11a.
• Provide adequate authentication mechanisms - To regulate access to the network, the system needs to
include a process that requires users to subscribe and log in. RADIUS is the most common authentication
database in use today, but be sure to require authentication elements that provide a level of security
consistent with application requirements.
• Consider implementing local advertisements - A public WLAN can provide a mechanism to deliver
advertisements to subscribers similar to other online services. In fact, you can provide a free subscription to
users for basic Internet access, and drive ads to them with hopes that they'll purchase enough from the ads to
offset the cost of system. Keep the advertising to a minimum, though, especially when users are paying for
services.

A good design involves the application of technologies and products to bring about a system that satisfies
requirements. For example, you'll need to determine the optimum location of access points and find out whether
there is any significant RF interference that will impact performance.

When configuring a public WLAN, here are some specific tips:

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 18 of 21
• Turn WEP off - Despite all of the controversy, WEP (wired equivalent privacy) does provide some security, but
WEP's definitely not practical to use in a public WLAN because of key distribution problems. As a result use
alternative, dynamic forms of security that are available on typical user devices (e.g., EAP-TLS) to satisfy the
open systems requirement of public WLANs.
• Broadcast SSIDs - The SSID (service set identifier) is an obstacle to public WLAN users because in many
cases the user must configure their SSID to match the one that the local public WLAN uses. Windows XP
sniffs the SSID (if the access point broadcasts the SSID) and automatically configures the radio NIC without
end user intervention. As a result, be sure to enable SSID broadcasting when configuring the access point. To
avoid hanging signs up in your facility indicating the SSID and instructing users on how to configure their radio
NICs, offer (but do not require) smart client software that performs the SSID sniffing and card configuration for
users having older Windows operating systems.

Include DHCP services - As users roam to different hotspots, their user device will need an IP (Internet protocol)
address that corresponds to the local network. To enable roaming with as few end user actions as necessary,
establish dynamic host configuration protocol (DHCP) services to automatically assign IP addresses to visiting
users. Most versions of Windows operating systems by default activate DHCP, so users probably will not have to
do anything.

AYK IV: WEATHER BOTS


Understanding the uses of GPS and GIS can be used in all sorts of devices, in many different industries, for
multiple purposes. You want to compete, and win first prize, in the PennVention next year. Create a product, using
a GPS or GIS, that is not currently in the market today that you will present at the fourth annual PennVention.

Student answers to this question will vary. GPS and GIS can be used in a variety of ways to track and locate
people, automobiles, or items (such as the weather bots). A few examples include:
• Website where you can use GIS to track running that can tell athletes how far they ran (or skiers, mountain
climbers, boats, jet skis, bikers, hikers, etc. )
• Onstar products for automobiles
• GPS products for PDAs that can tell you directions or locations
• GPS tools tracking tools for children, pets, computer equipments, cars, art work, and anything of value
• Use GIS and GPS to locate teachers and children in public schools, doctors and nurses in hospitals,
employees in office campus, or students on a college campus.
• Excellent for Pizza Delivery to find the location and to track the delivery person

Students can use their imaginations and come up with any number of products for this assignment.

AYK V: FREE WI-FI IN AFRICA


Here is another exercise that students should find interesting. The most obvious choice would be to use VoIP.
Since VoIP runs over the Internet, the infrastructure is already available. This issue that students should be
concerned with is reliability. Conventional phones are connected directly to telephone company phone lines, which
in the event of a power failure are kept functioning by backup generators or batteries located at the telephone
exchange. However, household VoIP hardware uses broadband modems and other equipment powered by
household electricity, which may be subject to outages in the absence of a uninterruptible power supply or
generator. VoIP phones infrastructure are built upon routers. If there is a down router in your transmission link,
your call will be automatically redirected on a different path to reach your call destination. If the first router is down
in your infrastructure between you and your end call destination, your will receive a failed connection. Voice travels
over the internet in almost the same manner as data does in packets. So when you talk over an IP network your
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 19 of 21
conversion is broken up into small packets. The voice and data packets travel over the same network with a fixed
bandwidth. The routers on the networks push the data packets across as fast as possible. When the volume of
traffic is high it will slow the network down, therefore diminishing the quality and reliability. The voice transmission
will sound like you are on a push to talk network. To increase the reliability of VoIP phones the VoIP provider
needs to increase dedicated and redundant connectivity via T-1 access and backup DSL, with automatic failover at
each location.

Something else students might mention is quality of service. Some broadband connections may have less than
desirable quality. Where IP packets are lost or delayed at any point in the network between VoIP users, there will
be a momentary drop-out of voice. This is more noticeable in highly congested networks and/or where there are
long distances and/or interworking between end points. Technology has improved the reliability and voice quality
over time and will continue to improve VoIP performance as time goes on.

AYK VI: NEVER RUN WITH YOUR IPOD


Wireless technologies are transforming how we live, work, and play. Handheld devices are continuing to offer
additional functionality and cellular networks are advancing rapidly in their increased speed and throughput
abilities. These enabling technologies are fueling widespread adoption and creation of new and innovative ways to
perform business. There are four types of wireless networks—PAN, WLAN, WMAN, and WWAN. A PAN provides
communication over a short distance that is intended for use with devices that are owned and operated by a single
user. A WLAN is a local area network that uses radio signals to transmit and receive data over distances of a few
hundred feet. A WMAN is a metropolitan area network that uses radio signals to transmit and receive data, and a
WWAN is a wide area network that uses radio signals to transmit and receive data.

Mobile and wireless business applications and services are using satellite technologies. These technologies are
GPS, GIS, and LBS. GPS is a satellite-based navigation system providing extremely accurate position, time, and
speed information. GIS is location information that can be shown on a map. LBS are applications that use location
information to provide a service used by both GPS and GIS.

There are several challenges of wireless networks including protecting against theft, protecting wireless
connections, preventing viruses on mobile devices, and addressing privacy concerns with RFID and LBS. Any
mobile device is vulnerable to loss no matter how big or small it is. The company may face significant exposure
from stolen IDs, passwords, encryption keys, and confidential information if the device falls into the wrong hands,
especially if the theft is not discovered or reported immediately and the company does not have time to revoke
access. Network intrusions can occur if access codes or passwords are stored on a device that is lost or stolen.
However, any time a wireless network connects to a wired one, the wireless network can serve as a conduit for a
hacker to gain entry into an otherwise secure wired network.

The potential for contracting viruses on mobile devices is becoming a reality. The need for virus protection at the
device level is critical. Any device that can access the Internet or receive email is at risk of catching a virus and
passing it on to other devices. As technology advances, the potential for privacy infringement does as well. RFID
already has the capability to determine the distance of a tag from the reader location. LBS can track and monitor
objects much like RFID. LBS risks the invasion of privacy and security caused by indiscreet location tracking.

AYK V: DING-A-LING TOOK MY $400


Taking the time to review and research the many different plans, as well as understanding the fine print associated
with each plan, can save an individual and a business big money. There are a number of websites your students
can visit including:

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 20 of 21
Cell Phone Plans : Full Report We've split our coverage of cell phone plans into two reports. This report compares
traditional cell phone plans, which usually require a two-year contract. You may also want to consider a pay-as-
you-go prepaid wireless plan. Once considered a last resort for people with bad credit, prepaid wireless plans have
evolved into a good option for anybody, experts say. We cover these plans briefly in the Prepaid Cell Phones
section of this report, or see our separate report on prepaid wireless for more information.
• http://www.consumersearch.com/cell-phone-plans/review

AYK VI: 911 MCNUGGETS


A wireless network can enhance mobility, provide immediate data access, increase location and monitoring
capabilities, provide mobile commerce opportunities, improve work flow, and provide an alternative to wiring. But it
can also help some individuals make bad decisions quicker. In the past a person would have to take the time to
find a phone and this could include driving home. By the time the person found the phone they would have had
the time to cool down and not make the mistake of calling too quickly. Perhaps all of the wireless networks are
helping some of us to make decisions too fast.

AYK VII: WIRELESS NETWORKS AND STREETLAMPS


Researchers at Harvard University and BBN Technologies have designed CitySense, a wireless network capable
of reporting real-time sensor data across the entire city of Cambridge, Mass. CitySense is unique because it solves
a constraint on previous wireless networks–battery life. The network mounts each node on a municipal streetlamp,
where it draws power from city electricity. Researchers plan to install 100 sensors on streetlamps throughout
Cambridge by 2011, using a grant from the National Science Foundation. Each node will include an embedded PC
running the Linux OS, an 802.11 Wi-Fi interface and weather sensors.

One of the challenges in the design was how the network would allow remote nodes to communicate with the
central server at Harvard and BBN. CitySense will do that by letting each node form a mesh with its neighbors,
exchanging data through multiple-hop links. This strategy allows a node to download software or upload sensor
data to a distant server hub using a small radio with only a 1-kilometer range.

You are responsible for deploying a CitySense network around your city. What goals would you have for the
system besides monitoring urban weather and pollution? What other benefits could a CitySense network provide?
How could local businesses and citizens benefit from the network? What legal and ethical concerns should you
understand prior to deploying the network? What can you do to protect your network and your city from these
issues? A CitySense network could offer any number of additional benefits including:
• Digital video surveillance for preventing crime
• Wireless network access for individuals that the city could charge to generate additional revenue for the city
(such as FON.com)
• 911 help, if someone with a PDA can access the network they could call 911 for emergencies
• Upload all kinds of statistics beyond weather and pollution including humidity, pollen, toxins, gas, smoke, etc.

© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in
any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 7-Page 21 of 21

You might also like