Professional Documents
Culture Documents
Telecommunications,
the Internet, and
Wireless Technology
KELOMPOK 7
Our Team 01
M. TOLHA RAMADHANI 041811333003
• Firms in the past used two fundamentally different types of networks: telephone networks and
computer networks.
• Telephone networks historically handled voice communication, and computer networks handled
data traffic.
• Telephone companies built telephone networks throughout the twentieth century by using voice
transmission technologies (hardware and software), and these companies almost always operated
as regulated monopolies throughout the world.
• Computer companies originally built computer networks to transmit data between computers in
different locations.
What is a Computer Network?
• As a firm grows, its small networks can be tied together into a corporate-wide networking
infrastructure.
• The network infrastructure for a large corporation consists of a large number of these small
local area networks linked to other local area networks and to firmwide corporate networks.
• A number of powerful servers support a corporate website, a corporate intranet, and perhaps
an extranet. Some of these servers link to other large computers supporting backend systems.
• Today’s corporate network
infrastructure is a collection of
many networks from the public
switched telephone network, to
the Internet, to corporate local
area networks linking
workgroups, departments, or
office floors.
Key Digital Networking Technologies
• Every computer on the Internet is assigned a • Because it would be incredibly difficult for
unique Internet Protocol (IP) address, which Internet users to remember strings of 12
currently is a 32-bit number represented by numbers, the Domain Name System (DNS)
four strings of numbers ranging from 0 to 255 converts domain names to IP addresses.
separated by periods. For instance, the IP The domain name is the English-like name
address of www.microsoft.com is that corresponds to
207.46.250.119.
Internet Architecture and Governance
• Providers
• Cable providers
• Unified communications
• PPTP
• Tunneling
• Web 2.0
– Second-generation services
– Enabling collaboration, sharing information, and
creating new services online
– Features
• Interactivity
• Real-time user control
• Social participation (sharing)
• User-generated content
– Web 2.0 services and tools
• Blogs: chronological, informal Web sites created by individuals
– RSS (Really Simple Syndication): syndicates Web content so aggregator software
can pull content for use in another setting or viewing later
– Blogosphere
– Microblogging
• Wikis: collaborative Web sites where visitors can add, delete, or modify
content on the site
• Social networking sites: enable users to build communities of friends
and share information
• Web 3.0: The “Semantic Web”
– A collaborative effort led by W3C to add layer of
meaning to the existing Web
– Goal is to reduce human effort in searching for and
processing information
– Making Web more “intelligent” and intuitive
– Increased communication and synchronization with
computing devices, communities
– “Web of things”
– Increased cloud computing, mobile computing
7.4
What are the principal technologies and
standards for wireless networking,
communication, and Internet access?
• Cellular systems • Wireless computer networks
– Competing standards and Internet access
• CDMA: United States only – Bluetooth (802.15)
• GSM: Rest of world, AT&T, T-Mobile • Links up to 8 devices in 10-m area using
low-power, radio-based communication
– Third-generation (3G) networks
• Useful for personal networking (PANs)
• 144 Kbps
– Wi-Fi (802.11)
• Suitable for e-mail access, Web
• Set of standards: 802.11
browsing • Used for wireless LAN and wireless
– Fourth-generation (4G) networks Internet access
• Up to 100 Mbps • Use access points: device with radio
receiver/transmitter for connecting
• Suitable for Internet video wireless devices to a wired LAN
An 802.11 Wireless LAN
RFID uses low-powered radio transmitters to read data stored in a tag at distances
ranging from 1 inch to 100 feet. The reader captures the data from the tag and sends them
over a network to a host computer for processing.
THANK YOU
Insert the Subtitle of Your Presentation