{"id":51,"date":"2018-06-08T19:12:40","date_gmt":"2018-06-08T19:12:40","guid":{"rendered":"http:\/\/opentextbook.site\/informationsystems\/chapter\/chapter-5-networking-and-communication\/"},"modified":"2018-06-08T21:57:19","modified_gmt":"2018-06-08T21:57:19","slug":"chapter-5-networking-and-communication","status":"publish","type":"chapter","link":"https:\/\/opentextbook.site\/informationsystems\/chapter\/chapter-5-networking-and-communication\/","title":{"rendered":"Chapter 5: Networking and Communication"},"content":{"raw":"<h1>Learning Objectives<\/h1>\r\nUpon successful completion of this chapter, you will be able to:\r\n<ul>\r\n \t<li>understand the history and development of networking technologies;<\/li>\r\n \t<li>define the key terms associated with networking technologies;<\/li>\r\n \t<li>understand the importance of broadband technologies; and<\/li>\r\n \t<li>describe organizational networking.<\/li>\r\n<\/ul>\r\n<h1>Introduction<\/h1>\r\nIn the early days of computing, computers were seen as devices for making calculations, storing data, and automating business processes. However, as the devices evolved, it became apparent that many of the functions of telecommunications could be integrated into the computer. During the 1980s, many organizations began combining their once-separate telecommunications and information-systems departments into an information technology, or IT, department. This ability for computers to communicate with one another and, maybe more importantly, to facilitate communication between individuals and groups, has been an important factor in the growth of computing over the past several decades.\r\n\r\nComputer networking really began in the 1960s with the birth of the Internet, as we'll see below. However, while the Internet and web were evolving, corporate networking was also taking shape in the form of local area networks and client-server computing. In the 1990s, when the Internet came of age, Internet technologies began to pervade all areas of the organization. Now, with the Internet a global phenomenon, it would be unthinkable to have a computer that did not include communications capabilities. This chapter will review the different technologies that have been put in place to enable this communications revolution.\r\n<h1>A Brief History of the Internet<\/h1>\r\n<h2>In the Beginning: ARPANET<\/h2>\r\nThe story of the Internet, and networking in general, can be traced back to the late 1950s. The US was in the depths of the Cold War with the USSR, and each nation closely watched the other to determine which would gain a military or intelligence advantage. In 1957, the Soviets surprised the US with <a href=\"http:\/\/history.nasa.gov\/sputnik\/\" target=\"_blank\" rel=\"noopener\">the launch of Sputnik<\/a>, propelling us into the space age. In response to Sputnik, the US Government created the Advanced Research Projects Agency (ARPA), whose initial role was to ensure that the US was not surprised again. It was from ARPA, now called DARPA (Defense\u00a0Advanced Research Projects Agency), that the Internet first sprang.\r\n\r\nARPA was the center of computing research in the 1960s, but there was just one problem: many of the computers could not talk to each other. In 1968, ARPA sent out a request for proposals for a communication technology that would allow different computers located around the country to be integrated together into one network. Twelve companies responded to the request, and a company named Bolt, Beranek, and Newman (BBN) <a href=\"http:\/\/bbn.com\/about\/timeline\/arpanet\" target=\"_blank\" rel=\"noopener\">won the contract<\/a>. They began work right away and were able to complete the job just one year later: in September, 1969, the ARPANET was turned on. The first four nodes were at UCLA, Stanford, MIT, and the University of Utah.\r\n<h2>The Internet and the World Wide Web<\/h2>\r\nOver the next decade, the ARPANET grew and gained popularity. During this time, other networks also came into existence. Different organizations were connected to different networks. This led to a problem: the networks could not talk to each other. Each network used its own proprietary language, or protocol\u00a0(see sidebar for the definition of <em>protocol<\/em>), to send information back and forth. This problem was solved by the invention of transmission control protocol\/Internet protocol (TCP\/IP).\u00a0<span style=\"color: #000000;\">TCP\/IP <\/span>was designed to allow networks running on different protocols to have an intermediary protocol that would allow them to communicate. So as long as your network supported TCP\/IP, you could communicate with all of the other networks running TCP\/IP. TCP\/IP quickly became the standard protocol and allowed networks to communicate with each other. It is from this breakthrough that we first got the term <em>Internet<\/em>, which simply means \"an interconnected network of networks.\"\r\n\r\n<hr \/>\r\n\r\n<h2>Sidebar: An Internet Vocabulary Lesson<\/h2>\r\nNetworking communication is full of some very technical concepts based on some simple principles. Learn the terms below and you'll be able to hold your own in a conversation about the Internet.\r\n<ul>\r\n \t<li><em>Packet<\/em>: The fundamental unit of data transmitted over the Internet. When a device intends to send a message to another device (for example, your PC sends a request to YouTube to open a video), it breaks the message down into smaller pieces, called packets. Each packet has the sender's address, the destination address, a sequence number, and a piece of the overall message to be sent.<\/li>\r\n \t<li><em>Hub<\/em>:<em>\u00a0<\/em>A\u00a0simple network device that connects other devices to the network and sends packets to all the devices connected to it.<\/li>\r\n \t<li><span style=\"color: #000000;\"><em>Bridge<\/em>: A network device that connects<\/span> two networks together and only allows packets through that are needed.<\/li>\r\n \t<li><span style=\"color: #000000;\"><em>Switch<\/em>:<em>\u00a0A<\/em>\u00a0network device that connects<\/span> multiple devices together and filters packets based on their destination within the connected devices. <span style=\"color: #000000;\">\r\n<\/span><\/li>\r\n \t<li><em>Router<\/em>: A device that receives and analyzes packets and then routes them towards their destination. In some cases, a router will send a packet to another router; in other cases, it will send it directly to its destination.<\/li>\r\n \t<li><em>IP Address<\/em>: Every device that communicates on the Internet, whether it be a personal computer, a tablet, a smartphone, or anything else, is assigned a unique identifying number called an IP (Internet Protocol) address. Historically, the IP-address standard used has been IPv4 (version 4), which has the format of four numbers between 0 and 255 separated by a period. For example, the domain Saylor.org has the IP address of\u00a0107.23.196.166. The IPv4 standard has a limit of\u00a04,294,967,296 possible addresses.\u00a0As the use of the Internet has proliferated, the number of IP addresses needed has grown to the point where the use of IPv4 addresses will be exhausted. This has led to the new IPv6 standard, which is currently being phased in. The IPv6 standard is formatted as eight groups of four hexadecimal digits, such as 2001:0db8:85a3:0042:1000:8a2e:0370:7334. The IPv6 standard has a limit of 3.4\u00d710<sup>38 <\/sup>possible addresses. For more detail about the new IPv6 standard, see <a href=\"https:\/\/en.wikipedia.org\/wiki\/IPv6\" target=\"_blank\" rel=\"noopener\">this Wikipedia article<\/a>.<\/li>\r\n \t<li><em>Domain name<\/em>: If you had to try to remember the IP address of every web server you wanted to access, the Internet would not be nearly as easy to use. A domain name is a human-friendly name for a device on the Internet. These names generally consist of a descriptive text followed by the top-level domain (TLD). For example, Wikepedia's domain name is wikipedia.org; <span style=\"color: #000000;\"><em>wikipedia<\/em> describes the organization and <em>.<\/em><em>org<\/em> is the top-level domain. In this case, the <em>.org<\/em> TLD is designed for nonprofit organizations. Other well-known TLDs include <em>.com<\/em>, <em>.net<\/em>, and <em>.gov<\/em><\/span>. For a complete list and description of domain names, see <a href=\"http:\/\/en.wikipedia.org\/wiki\/Domain_name\" target=\"_blank\" rel=\"noopener\">this Wikipedia article<\/a>.<\/li>\r\n \t<li><em>DNS<\/em>: DNS stands for \"domain name <span style=\"color: #000000;\">system,\" <\/span>which acts as the directory on the Internet. When a request to access a device with a domain name is given, a DNS server is queried. It returns the IP address of the device requested, allowing for proper routing.<\/li>\r\n \t<li><em>Packet-switching<\/em>: When a packet is sent from one device out over the Internet, it does not follow a straight path to its destination. Instead, it is passed from one router to another across the Internet until it is reaches its destination. In fact, sometimes two packets from the same message will take different routes! Sometimes, packets will arrive at their destination out of order. When this happens, the receiving device <span style=\"color: #000000;\">restores them to<\/span> their proper order. For more details on packet-switching, see\u00a0<a href=\"http:\/\/www.pbs.org\/opb\/nerds2.0.1\/geek_glossary\/packet_switching_flash.html\" target=\"_blank\" rel=\"noopener\">this interactive web page<\/a>.<\/li>\r\n \t<li><em>Protocol<\/em>:<em>\u00a0<\/em>In computer networking, a protocol is the set of rules that allow two (or more) devices to exchange information back and forth across the network.<\/li>\r\n<\/ul>\r\n\r\n<hr \/>\r\n\r\n&nbsp;\r\n\r\n[caption id=\"attachment_896\" align=\"alignnone\" width=\"600\"]<a href=\"http:\/\/internetcensus2012.bitbucket.org\/images\/geovideo.gif\"><img class=\"size-full wp-image-896\" alt=\"Worldwide Internet Use over 24 hour period (click to go to site of origin). Image courtesy of the Internet Census 2012 project. Public domain.\" src=\"http:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/geovideo_lowres.gif\" width=\"600\" height=\"337\" \/><\/a> Worldwide Internet use over 24-hour period (click to go to site of origin). (Public Domain. Courtesy of the Internet Census 2012 project.)[\/caption]\r\n\r\nAs we moved into the 1980s, computers were added to the Internet at an increasing rate.\u00a0These computers were primarily from government, academic, and research organizations. Much to the surprise of the engineers, the early popularity of the Internet was driven by the use of electronic mail (see sidebar below).\r\n\r\nUsing the Internet in these early days was not easy. In order to access information on another server, you had to know how to type in the commands necessary to access it, as well as know the name of that device. That all changed in 1990, when Tim Berners-Lee introduced his World Wide Web project, which provided an easy way to navigate the Internet through the use of linked text (hypertext). The World Wide Web gained even more steam with the release of the Mosaic browser in 1993, which allowed graphics and text to be combined together as a way to present information and navigate the Internet. The Mosaic browser took off in popularity and was soon\u00a0superseded\u00a0by Netscape Navigator, the first commercial <span style=\"color: #000000;\">web browser<\/span>, in 1994.\u00a0The Internet and the World Wide Web were now poised for growth. The chart below shows the growth in users from the early days until now.\r\n\r\n[caption id=\"attachment_672\" align=\"alignnone\" width=\"300\"]<a href=\"https:\/\/bus206.pressbooks.com\/wp-content\/uploads\/sites\/10536\/2013\/05\/InternetGrowth.png\"><img class=\"size-medium wp-image-46\" alt=\"InternetGrowth\" src=\"http:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/InternetGrowth-300x204.png\" width=\"300\" height=\"204\" \/><\/a> Growth of internet usage, 1995\u20132012 (click to enlarge). Data taken from InternetWorldStats.com.[\/caption]\r\n<h2>The Dot-Com Bubble<\/h2>\r\nIn the 1980s and early 1990s, the Internet was being managed by the National Science Foundation (NSF). The NSF had restricted commercial ventures on the Internet, which meant that no one could buy or sell anything online. In 1991, the NSF transferred its role to three other organizations, thus getting the US government out of <span style=\"color: #000000;\">direct control over<\/span> the Internet and essentially opening up commerce online.\r\n\r\nThis new commercialization of the Internet led to what is now known as the dot-com bubble. A frenzy of investment in new dot-com companies took place in the late 1990s, running up the stock market to new highs on a daily basis. This investment bubble was driven by the fact that investors knew that online commerce would change everything. Unfortunately, many of these new companies had poor business models and ended up with little to show for all of the funds that were invested in them. In 2000 and 2001, the bubble burst and many of these new companies <span style=\"color: #000000;\">went out of business<\/span>. Many companies also survived, including the still-thriving Amazon (started in 1994) and eBay (1995). After the dot-com bubble burst, a new reality became clear: in order to succeed online, e-business companies would need to develop real business models and show that they could survive financially using this new technology.\r\n<h2>Web 2.0<\/h2>\r\nIn the first few years of the World Wide Web, creating and putting up a website required a specific set of knowledge: you had to know how to set up a server on the World Wide Web, how to get a domain name, how to write web pages in HTML, and how to troubleshoot various technical issues as they came up. Someone who did these jobs for a website became known as a webmaster.\r\n\r\nAs the web gained in popularity, it became more and more apparent that those who did not have the skills to be a webmaster still wanted to create online content and have their own piece of the web. This need was met with new technologies that provided a website framework for those who wanted to put content online.\u00a0<a href=\"http:\/\/blogger.com\" target=\"_blank\" rel=\"noopener\">Blogger<\/a> and <a href=\"http:\/\/wikipedia.com\" target=\"_blank\" rel=\"noopener\">Wikipedia<\/a> are examples of these early <span style=\"color: #000000;\">Web 2.0<\/span> applications, which allowed anyone with something to say a place to go and say it, without the need for understanding HTML or web-server technology.\r\n\r\nStarting in the early 2000s, Web 2.0 applications began a second bubble of optimism and investment. It seemed that everyone wanted their own blog or photo-sharing site. Here are some of the companies that came of age during this time: MySpace (2003), Photobucket (2003), Flickr (2004), Facebook (2004), WordPress (2005), Tumblr (2006), and Twitter (2006). The ultimate indication that Web 2.0 had taken hold was when <em>Time<\/em> magazine named \"You\" its \"Person of the Year\" in 2006.\r\n\r\n<hr \/>\r\n\r\n<h2>Sidebar: E-mail Is the \"Killer\" App for the Internet<\/h2>\r\nWhen the personal computer was created, it was a great little toy for technology hobbyists and armchair programmers. As soon as the spreadsheet was invented, however, businesses took notice, and the rest is history. The spreadsheet was the killer app for the personal computer: people bought PCs just so they could run spreadsheets.\r\n\r\nThe Internet was originally designed as a way for scientists and researchers to share information and computing power among themselves. However, as soon as electronic mail was invented, it began driving demand for the Internet. This wasn't what the developers had in mind, but it turned out that people connecting to people was the killer app for the Internet.\r\n\r\nWe are seeing this again today with <span style=\"color: #000000;\">social networks, specifically Facebook<\/span>. Many who weren't convinced to have an online presence now feel left out without a Facebook account. The connections made between people using Web 2.0 applications like Facebook on their personal computer or smartphone is driving growth yet again.\r\n\r\n<hr \/>\r\n\r\n<h2>Sidebar: The Internet and the World Wide Web Are Not the Same Thing<\/h2>\r\n<span style=\"color: #000000;\">Many times, the terms \"Internet\" and \"World Wide Web,\" or even just \"the web,\" are used interchangeably. But really,<\/span> they are\u00a0<em>not<\/em>\u00a0the same thing at all! The Internet is an interconnected network of networks. Many services run across the Internet: electronic mail, voice and video, file transfers, and, yes, the World Wide Web.\r\n\r\nThe World Wide Web is simply one piece of the Internet. It is made up of web servers that have HTML pages that are being viewed on devices with web browsers. It is really that simple.\r\n\r\n<hr \/>\r\n\r\n<h2><span style=\"color: #000000;\">The Growth of Broadband<\/span><\/h2>\r\nIn the early days of the Internet, most access was done via a modem over an analog telephone line. A modem (short for \"modulator-demodulator\") was connected to the incoming phone line and a computer in order to connect you to a network. Speeds were measured in bits-per-second (bps), with speeds growing from 1200 bps to 56,000 bps over the years. Connection to the Internet via these modems is called <em>dial-up<\/em> access. Dial-up was very inconvenient because it tied up the phone line. As the web became more and more interactive, dial-up also hindered usage, as users wanted to transfer more and more data. As a point of reference, downloading a typical 3.5 mb song would take 24 minutes at 1200 bps and 2 minutes at 28,800 bps.\r\n\r\nA <em>broadband<\/em> connection is defined as one that has speeds of at least 256,000 bps, though most connections today are much faster, measured in millions of bits per second (megabits or mbps) or even billions (gigabits). For the home user, a broadband connection is usually accomplished via the cable television lines or phone lines (DSL). Both cable and DSL have similar prices and speeds, though each individual may find that one is better than the other for their specific area. Speeds for cable and DSL can vary during different times of the day or week, depending upon how much data traffic is being used. In more remote areas, where cable and phone companies do not provide access, home Internet connections can be made via satellite. The average home broadband speed is anywhere between 3 mbps and 30 mbps. At 10 mbps, downloading a typical 3.5 mb song would take less than a second.\u00a0For businesses who require more bandwidth and reliability, telecommunications companies can provide other options, such as T1 and T3 lines.\r\n\r\n[caption id=\"attachment_1377\" align=\"alignnone\" width=\"420\"]<a href=\"http:\/\/pewinternet.org\/Commentary\/2012\/May\/~\/media\/Infographics\/Report%20Infographics\/2013\/23%20-%20Broadband\/FT_13.08.29_BroadbandUse_420px%20%281%29.png?w=420&amp;h=530&amp;as=1\"><img class=\"size-full wp-image-1377\" alt=\"Growth of Broadband Use (Source: Pew Internet and American Life Project Surveys)\" src=\"http:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/FT_13.08.29_BroadbandUse_420px-1.png\" width=\"420\" height=\"530\" \/><\/a> Growth of broadband use (Source: Pew Internet and American Life Project Surveys)[\/caption]\r\n\r\nBroadband access is important because it impacts how the Internet is used. When a community has access to broadband, it allows them to interact more online and increases the usage of digital tools overall. Access to broadband is now considered a basic human right by the United Nations, <a href=\"http:\/\/www.un.org\/apps\/news\/story.asp?Cr=broadband&amp;NewsID=40191#.UZlTSyvSOPU\" target=\"_blank\" rel=\"noopener\">as declared in their 2011 statement<\/a>: <span style=\"color: #000000;\">\r\n<\/span>\r\n<p style=\"padding-left: 30px;\">\u201cBroadband technologies are fundamentally transforming the way we live,\u201d the Broadband Commission for Digital Development, set up last year by the UN Educational Scientific and Cultural Organization (<a href=\"http:\/\/www.unesco.org\/new\/en\/unesco\/\">UNESCO<\/a>) and the UN International Telecommunications Union (<a href=\"http:\/\/www.itu.int\/\">ITU<\/a>), said in issuing \u201c<a href=\"http:\/\/www.broadbandcommission.org\/Documents\/Broadband_Challenge.pdf\">The Broadband Challenge<\/a>\u201d at a leadership summit in Geneva.<\/p>\r\n<p style=\"padding-left: 30px;\">\u201cIt is vital that no one be excluded from the new global knowledge societies we are building. We believe that communication is not just a human need \u2013 it is a right.\u201d[footnote]\"UN sets goal of bringing broadband to half developing world\u2019s people by 2015.\", UN News Center website, http:\/\/www.un.org\/apps\/news\/story.asp?Cr=broadband&amp;NewsID=40191#.Ut7JOmTTk1J[\/footnote]<\/p>\r\n\r\n<h2>Wireless Networking<\/h2>\r\nToday we are used to being able to access the Internet wherever we go. Our smartphones can access the Internet; Starbucks provides wireless \"hotspots\" for our laptops or iPads. These wireless technologies have made Internet access more convenient and have made devices such as tablets and laptops much more functional. Let's examine a few of these wireless technologies.\r\n<h3>Wi-Fi<\/h3>\r\nWi-Fi is a technology that takes an Internet signal and converts it into radio waves. These radio waves can be picked up\u00a0within a radius of approximately 65 feet\u00a0by devices with a wireless adapter. Several Wi-Fi specifications have been developed over the years, starting with 802.11b (1999), followed by the 802.11g specification in 2003 and 802.11n in 2009. Each new specification improved the speed and range of Wi-Fi, allowing for more uses. One of the primary places where Wi-Fi is being used is in the home. Home users are purchasing Wi-Fi routers, connecting them to their broadband connections, and then connecting multiple devices via Wi-Fi.\r\n<h3>Mobile Network<\/h3>\r\nAs the cellphone has evolved into the smartphone, the desire for Internet access on these devices has led to data networks being included as part of the mobile phone network. While Internet connections were technically available earlier, it was really with the release of the 3G networks in 2001 (2002 in the US) that smartphones and other cellular devices could access data from the Internet. This new capability drove the market for new and more powerful smartphones, such as the iPhone, introduced in 2007. In 2011, wireless carriers began offering 4G data speeds, giving the cellular networks the same speeds that customers were used to getting via their home connection.\r\n\r\n&nbsp;\r\n\r\n<hr \/>\r\n\r\n<h2>Sidebar: Why Doesn't My Cellphone Work When I Travel Abroad?<\/h2>\r\nAs mobile phone technologies have evolved, providers in different countries have chosen different communication standards for their mobile phone networks. In the US, both of the two competing standards exist: GSM (used by AT&amp;T and T-Mobile) and CDMA (used by the other major carriers). Each standard has its pros and cons, but the bottom line is that phones using one standard cannot easily switch to the other. In the US, this is not a big deal because mobile networks exist to support both standards. But when you travel to other countries, you will find that most of them use GSM networks, with the one big exception being Japan, which has standardized on CDMA. It is possible for a mobile phone using one type of network to switch to the other type of network by switching out the SIM card, which controls your access to the mobile network. However, this will not work in all cases. If you are traveling abroad, it is always best to consult with your mobile provider to determine the best way to access a mobile network.\r\n\r\n<hr \/>\r\n\r\n<h2>Bluetooth<\/h2>\r\n<a href=\"https:\/\/bus206.pressbooks.com\/wp-content\/uploads\/sites\/10536\/2013\/05\/Bluetooth-logo.png\"><img class=\"wp-image-685 alignleft\" style=\"margin: 3px;\" alt=\"Bluetooth-logo\" src=\"http:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/Bluetooth-logo.png\" height=\"125\" \/><\/a>\r\n\r\nWhile Bluetooth is not generally used to connect a device to the Internet, it is an important wireless technology that has enabled many functionalities that are used every day. When created in 1994 by Ericsson, it was intended to replace wired connections between devices. Today, it is the standard method for connecting nearby devices wirelessly. Bluetooth has a range of approximately 300 feet and consumes very little power, making it an excellent choice for a variety of purposes. Some applications of Bluetooth include: connecting a printer to a personal computer, connecting a mobile phone and headset, connecting a wireless keyboard and mouse to a computer, and connecting a remote for a presentation made on a personal computer.\r\n<h1>VoIP<\/h1>\r\n[caption id=\"attachment_891\" align=\"alignnone\" width=\"300\"]<a href=\"https:\/\/bus206.pressbooks.com\/wp-content\/uploads\/sites\/10536\/2013\/06\/Voip-typical.gif\"><img class=\"size-full wp-image-891\" alt=\"A typical VoIP communication. Image courtesy of BroadVoice.\" src=\"http:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/Voip-typical.gif\" width=\"300\" height=\"302\" \/><\/a> A typical VoIP communication. Image courtesy of BroadVoice.[\/caption]\r\n\r\nA growing class of data being transferred over the Internet is voice data. A protocol called v<span style=\"color: #000000;\">oice over IP<\/span>, or VoIP, enables sounds to be converted to a digital format for transmission over the Internet and then re-created at the other end. By using many existing technologies and software, voice communication over the Internet is now available to anyone with a browser (think Skype, Google Hangouts). Beyond this, many companies are now offering VoIP-based telephone service for business and home use.\r\n\r\n&nbsp;\r\n<h1>Organizational Networking<\/h1>\r\n<h2>LAN and WAN<\/h2>\r\n[caption id=\"attachment_689\" align=\"alignleft\" width=\"300\"]<a href=\"https:\/\/bus206.pressbooks.com\/wp-content\/uploads\/sites\/10536\/2013\/05\/Intranet-Extranet-Diagram1.png\"><img class=\"wp-image-689\" style=\"margin: 3px;\" alt=\"Intranet Extranet Diagram\" src=\"http:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/Intranet-Extranet-Diagram1.png\" width=\"300\" height=\"270\" \/><\/a> Scope of business networks[\/caption]\r\n\r\nWhile the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.\r\n\r\nAn LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).\r\n<h2>Client-Server<\/h2>\r\nThe personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.<span style=\"color: #000000;\">\r\n<\/span>\r\n\r\n&nbsp;\r\n<h2>Intranet<\/h2>\r\nJust as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as \"not found\" if an employee tried to access them from outside the company's network.\r\n<h2>Extranet<\/h2>\r\nSometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an <em>extranet<\/em>, which is a part of the company's network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers' inventory levels.\r\n\r\nSometimes, an organization will need to allow someone\u00a0who is not located physically within its internal network\u00a0to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in <span style=\"color: #000000;\">the chapter 6 (on information security)<\/span>.\r\n\r\n<hr \/>\r\n\r\n<h2>Sidebar: Microsoft's SharePoint Powers the Intranet<\/h2>\r\nAs organizations begin to see the power of collaboration between their employees, they often look for solutions that will allow them to leverage their intranet to enable more collaboration. Since most companies use Microsoft products for much of their computing, it is only natural that they have looked to Microsoft to provide a solution. This solution is Microsoft's SharePoint.\r\n\r\nSharePoint provides a communication and collaboration platform that integrates seamlessly with Microsoft's Office suite of applications. Using SharePoint, employees can share a document and edit it together \u2013 no more e-mailing that Word document to everyone for review. Projects and documents can be managed collaboratively across the organization. Corporate documents are indexed and made available for search. No more asking around for that procedures document \u2013 now you just search for it in SharePoint.\u00a0For organizations looking to add a social networking component to their intranet, Microsoft offers Yammer, which can be used by itself or integrated into SharePoint.\r\n\r\n<hr \/>\r\n\r\n<h1>Cloud Computing<\/h1>\r\nWe covered cloud computing in chapter 3, but it should also be mentioned here. The universal availability of the Internet combined with increases in processing power and data-storage capacity have made cloud computing a viable option for many companies. Using cloud computing, companies or individuals can contract to store data on storage devices somewhere on the Internet. Applications can be \"rented\" as needed, giving a company the ability to quickly deploy new applications. You can read about cloud computing in more detail in chapter 3.\r\n\r\n<hr \/>\r\n\r\n<h2>Sidebar: Metcalfe's Law<\/h2>\r\nJust as Moore's Law describes how computing power is increasing over time, Metcalfe's Law describes the power of networking. Specifically, Metcalfe's Law states that the value of a telecommunications network\u00a0is proportional to the square of the number of connected users of the system. Think about it this way: If none of your friends were on Facebook, would you spend much time there? If no one else at your school or place of work had e-mail, would it be very useful to you? Metcalfe's Law tries to quantify this value.\r\n\r\n<hr \/>\r\n\r\n<h1>Summary<\/h1>\r\nThe networking revolution has completely changed how the computer is used. Today, no one would imagine using a computer that was not connected to one or more networks. The development of the Internet and World Wide Web, combined with wireless access, has made information available at our fingertips. The Web 2.0 revolution has made us all authors of web content. As networking technology has matured, the use of Internet technologies has become a standard for every type of organization. The use of intranets and extranets has allowed organizations to deploy functionality to employees and business partners alike, increasing efficiencies and improving communications. Cloud computing has truly made information available everywhere and has serious implications for the role of the IT department.\r\n\r\n<hr \/>\r\n\r\n<h1>Study Questions<\/h1>\r\n<ol>\r\n \t<li>What were the first four locations hooked up to the Internet (ARPANET)?<\/li>\r\n \t<li>What does the term <em>packet<\/em> mean?<\/li>\r\n \t<li>Which came first, the Internet or the World Wide Web?<\/li>\r\n \t<li>What was revolutionary about Web 2.0?<\/li>\r\n \t<li>What was the so-called killer app for the Internet?<\/li>\r\n \t<li>What makes a connection a <em>broadband<\/em> connection?<\/li>\r\n \t<li>What does the term VoIP mean?<\/li>\r\n \t<li>What is an LAN?<\/li>\r\n \t<li>What is the difference between an intranet and an extranet?<\/li>\r\n \t<li>What is Metcalfe's Law?<\/li>\r\n<\/ol>\r\n<h1>Exercises<\/h1>\r\n<ol>\r\n \t<li>What is the IP address of your computer? How did you find out? What is the IP address of google.com? How did you find out? Did you get IPv4 or IPv6 addresses?<\/li>\r\n \t<li>What is the difference between the Internet and the World Wide Web? Create at least three statements that identify the differences between the two.<\/li>\r\n \t<li>Who are the broadband providers in your area? What are the prices and speeds offered?<\/li>\r\n \t<li>Pretend you are planning a trip to three foreign countries in the next month. Consult your wireless carrier to determine if your mobile phone would work properly in those countries. What would the costs be? What alternatives do you have if it would not work?<\/li>\r\n<\/ol>","rendered":"<h1>Learning Objectives<\/h1>\n<p>Upon successful completion of this chapter, you will be able to:<\/p>\n<ul>\n<li>understand the history and development of networking technologies;<\/li>\n<li>define the key terms associated with networking technologies;<\/li>\n<li>understand the importance of broadband technologies; and<\/li>\n<li>describe organizational networking.<\/li>\n<\/ul>\n<h1>Introduction<\/h1>\n<p>In the early days of computing, computers were seen as devices for making calculations, storing data, and automating business processes. However, as the devices evolved, it became apparent that many of the functions of telecommunications could be integrated into the computer. During the 1980s, many organizations began combining their once-separate telecommunications and information-systems departments into an information technology, or IT, department. This ability for computers to communicate with one another and, maybe more importantly, to facilitate communication between individuals and groups, has been an important factor in the growth of computing over the past several decades.<\/p>\n<p>Computer networking really began in the 1960s with the birth of the Internet, as we&#8217;ll see below. However, while the Internet and web were evolving, corporate networking was also taking shape in the form of local area networks and client-server computing. In the 1990s, when the Internet came of age, Internet technologies began to pervade all areas of the organization. Now, with the Internet a global phenomenon, it would be unthinkable to have a computer that did not include communications capabilities. This chapter will review the different technologies that have been put in place to enable this communications revolution.<\/p>\n<h1>A Brief History of the Internet<\/h1>\n<h2>In the Beginning: ARPANET<\/h2>\n<p>The story of the Internet, and networking in general, can be traced back to the late 1950s. The US was in the depths of the Cold War with the USSR, and each nation closely watched the other to determine which would gain a military or intelligence advantage. In 1957, the Soviets surprised the US with <a href=\"http:\/\/history.nasa.gov\/sputnik\/\" target=\"_blank\" rel=\"noopener\">the launch of Sputnik<\/a>, propelling us into the space age. In response to Sputnik, the US Government created the Advanced Research Projects Agency (ARPA), whose initial role was to ensure that the US was not surprised again. It was from ARPA, now called DARPA (Defense\u00a0Advanced Research Projects Agency), that the Internet first sprang.<\/p>\n<p>ARPA was the center of computing research in the 1960s, but there was just one problem: many of the computers could not talk to each other. In 1968, ARPA sent out a request for proposals for a communication technology that would allow different computers located around the country to be integrated together into one network. Twelve companies responded to the request, and a company named Bolt, Beranek, and Newman (BBN) <a href=\"http:\/\/bbn.com\/about\/timeline\/arpanet\" target=\"_blank\" rel=\"noopener\">won the contract<\/a>. They began work right away and were able to complete the job just one year later: in September, 1969, the ARPANET was turned on. The first four nodes were at UCLA, Stanford, MIT, and the University of Utah.<\/p>\n<h2>The Internet and the World Wide Web<\/h2>\n<p>Over the next decade, the ARPANET grew and gained popularity. During this time, other networks also came into existence. Different organizations were connected to different networks. This led to a problem: the networks could not talk to each other. Each network used its own proprietary language, or protocol\u00a0(see sidebar for the definition of <em>protocol<\/em>), to send information back and forth. This problem was solved by the invention of transmission control protocol\/Internet protocol (TCP\/IP).\u00a0<span style=\"color: #000000;\">TCP\/IP <\/span>was designed to allow networks running on different protocols to have an intermediary protocol that would allow them to communicate. So as long as your network supported TCP\/IP, you could communicate with all of the other networks running TCP\/IP. TCP\/IP quickly became the standard protocol and allowed networks to communicate with each other. It is from this breakthrough that we first got the term <em>Internet<\/em>, which simply means &#8220;an interconnected network of networks.&#8221;<\/p>\n<hr \/>\n<h2>Sidebar: An Internet Vocabulary Lesson<\/h2>\n<p>Networking communication is full of some very technical concepts based on some simple principles. Learn the terms below and you&#8217;ll be able to hold your own in a conversation about the Internet.<\/p>\n<ul>\n<li><em>Packet<\/em>: The fundamental unit of data transmitted over the Internet. When a device intends to send a message to another device (for example, your PC sends a request to YouTube to open a video), it breaks the message down into smaller pieces, called packets. Each packet has the sender&#8217;s address, the destination address, a sequence number, and a piece of the overall message to be sent.<\/li>\n<li><em>Hub<\/em>:<em>\u00a0<\/em>A\u00a0simple network device that connects other devices to the network and sends packets to all the devices connected to it.<\/li>\n<li><span style=\"color: #000000;\"><em>Bridge<\/em>: A network device that connects<\/span> two networks together and only allows packets through that are needed.<\/li>\n<li><span style=\"color: #000000;\"><em>Switch<\/em>:<em>\u00a0A<\/em>\u00a0network device that connects<\/span> multiple devices together and filters packets based on their destination within the connected devices. <span style=\"color: #000000;\"><br \/>\n<\/span><\/li>\n<li><em>Router<\/em>: A device that receives and analyzes packets and then routes them towards their destination. In some cases, a router will send a packet to another router; in other cases, it will send it directly to its destination.<\/li>\n<li><em>IP Address<\/em>: Every device that communicates on the Internet, whether it be a personal computer, a tablet, a smartphone, or anything else, is assigned a unique identifying number called an IP (Internet Protocol) address. Historically, the IP-address standard used has been IPv4 (version 4), which has the format of four numbers between 0 and 255 separated by a period. For example, the domain Saylor.org has the IP address of\u00a0107.23.196.166. The IPv4 standard has a limit of\u00a04,294,967,296 possible addresses.\u00a0As the use of the Internet has proliferated, the number of IP addresses needed has grown to the point where the use of IPv4 addresses will be exhausted. This has led to the new IPv6 standard, which is currently being phased in. The IPv6 standard is formatted as eight groups of four hexadecimal digits, such as 2001:0db8:85a3:0042:1000:8a2e:0370:7334. The IPv6 standard has a limit of 3.4\u00d710<sup>38 <\/sup>possible addresses. For more detail about the new IPv6 standard, see <a href=\"https:\/\/en.wikipedia.org\/wiki\/IPv6\" target=\"_blank\" rel=\"noopener\">this Wikipedia article<\/a>.<\/li>\n<li><em>Domain name<\/em>: If you had to try to remember the IP address of every web server you wanted to access, the Internet would not be nearly as easy to use. A domain name is a human-friendly name for a device on the Internet. These names generally consist of a descriptive text followed by the top-level domain (TLD). For example, Wikepedia&#8217;s domain name is wikipedia.org; <span style=\"color: #000000;\"><em>wikipedia<\/em> describes the organization and <em>.<\/em><em>org<\/em> is the top-level domain. In this case, the <em>.org<\/em> TLD is designed for nonprofit organizations. Other well-known TLDs include <em>.com<\/em>, <em>.net<\/em>, and <em>.gov<\/em><\/span>. For a complete list and description of domain names, see <a href=\"http:\/\/en.wikipedia.org\/wiki\/Domain_name\" target=\"_blank\" rel=\"noopener\">this Wikipedia article<\/a>.<\/li>\n<li><em>DNS<\/em>: DNS stands for &#8220;domain name <span style=\"color: #000000;\">system,&#8221; <\/span>which acts as the directory on the Internet. When a request to access a device with a domain name is given, a DNS server is queried. It returns the IP address of the device requested, allowing for proper routing.<\/li>\n<li><em>Packet-switching<\/em>: When a packet is sent from one device out over the Internet, it does not follow a straight path to its destination. Instead, it is passed from one router to another across the Internet until it is reaches its destination. In fact, sometimes two packets from the same message will take different routes! Sometimes, packets will arrive at their destination out of order. When this happens, the receiving device <span style=\"color: #000000;\">restores them to<\/span> their proper order. For more details on packet-switching, see\u00a0<a href=\"http:\/\/www.pbs.org\/opb\/nerds2.0.1\/geek_glossary\/packet_switching_flash.html\" target=\"_blank\" rel=\"noopener\">this interactive web page<\/a>.<\/li>\n<li><em>Protocol<\/em>:<em>\u00a0<\/em>In computer networking, a protocol is the set of rules that allow two (or more) devices to exchange information back and forth across the network.<\/li>\n<\/ul>\n<hr \/>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_896\" aria-describedby=\"caption-attachment-896\" style=\"width: 600px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/internetcensus2012.bitbucket.org\/images\/geovideo.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-896\" alt=\"Worldwide Internet Use over 24 hour period (click to go to site of origin). Image courtesy of the Internet Census 2012 project. Public domain.\" src=\"https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/geovideo_lowres.gif\" width=\"600\" height=\"337\" \/><\/a><figcaption id=\"caption-attachment-896\" class=\"wp-caption-text\">Worldwide Internet use over 24-hour period (click to go to site of origin). (Public Domain. Courtesy of the Internet Census 2012 project.)<\/figcaption><\/figure>\n<p>As we moved into the 1980s, computers were added to the Internet at an increasing rate.\u00a0These computers were primarily from government, academic, and research organizations. Much to the surprise of the engineers, the early popularity of the Internet was driven by the use of electronic mail (see sidebar below).<\/p>\n<p>Using the Internet in these early days was not easy. In order to access information on another server, you had to know how to type in the commands necessary to access it, as well as know the name of that device. That all changed in 1990, when Tim Berners-Lee introduced his World Wide Web project, which provided an easy way to navigate the Internet through the use of linked text (hypertext). The World Wide Web gained even more steam with the release of the Mosaic browser in 1993, which allowed graphics and text to be combined together as a way to present information and navigate the Internet. The Mosaic browser took off in popularity and was soon\u00a0superseded\u00a0by Netscape Navigator, the first commercial <span style=\"color: #000000;\">web browser<\/span>, in 1994.\u00a0The Internet and the World Wide Web were now poised for growth. The chart below shows the growth in users from the early days until now.<\/p>\n<figure id=\"attachment_672\" aria-describedby=\"caption-attachment-672\" style=\"width: 300px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/bus206.pressbooks.com\/wp-content\/uploads\/sites\/10536\/2013\/05\/InternetGrowth.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-46\" alt=\"InternetGrowth\" src=\"https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/InternetGrowth-300x204.png\" width=\"300\" height=\"204\" srcset=\"https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/InternetGrowth-300x204.png 300w, https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/InternetGrowth-768x523.png 768w, https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/InternetGrowth-1024x697.png 1024w, https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/InternetGrowth-65x44.png 65w, https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/InternetGrowth-225x153.png 225w, https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/InternetGrowth-350x238.png 350w, https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/InternetGrowth.png 1408w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-672\" class=\"wp-caption-text\">Growth of internet usage, 1995\u20132012 (click to enlarge). Data taken from InternetWorldStats.com.<\/figcaption><\/figure>\n<h2>The Dot-Com Bubble<\/h2>\n<p>In the 1980s and early 1990s, the Internet was being managed by the National Science Foundation (NSF). The NSF had restricted commercial ventures on the Internet, which meant that no one could buy or sell anything online. In 1991, the NSF transferred its role to three other organizations, thus getting the US government out of <span style=\"color: #000000;\">direct control over<\/span> the Internet and essentially opening up commerce online.<\/p>\n<p>This new commercialization of the Internet led to what is now known as the dot-com bubble. A frenzy of investment in new dot-com companies took place in the late 1990s, running up the stock market to new highs on a daily basis. This investment bubble was driven by the fact that investors knew that online commerce would change everything. Unfortunately, many of these new companies had poor business models and ended up with little to show for all of the funds that were invested in them. In 2000 and 2001, the bubble burst and many of these new companies <span style=\"color: #000000;\">went out of business<\/span>. Many companies also survived, including the still-thriving Amazon (started in 1994) and eBay (1995). After the dot-com bubble burst, a new reality became clear: in order to succeed online, e-business companies would need to develop real business models and show that they could survive financially using this new technology.<\/p>\n<h2>Web 2.0<\/h2>\n<p>In the first few years of the World Wide Web, creating and putting up a website required a specific set of knowledge: you had to know how to set up a server on the World Wide Web, how to get a domain name, how to write web pages in HTML, and how to troubleshoot various technical issues as they came up. Someone who did these jobs for a website became known as a webmaster.<\/p>\n<p>As the web gained in popularity, it became more and more apparent that those who did not have the skills to be a webmaster still wanted to create online content and have their own piece of the web. This need was met with new technologies that provided a website framework for those who wanted to put content online.\u00a0<a href=\"http:\/\/blogger.com\" target=\"_blank\" rel=\"noopener\">Blogger<\/a> and <a href=\"http:\/\/wikipedia.com\" target=\"_blank\" rel=\"noopener\">Wikipedia<\/a> are examples of these early <span style=\"color: #000000;\">Web 2.0<\/span> applications, which allowed anyone with something to say a place to go and say it, without the need for understanding HTML or web-server technology.<\/p>\n<p>Starting in the early 2000s, Web 2.0 applications began a second bubble of optimism and investment. It seemed that everyone wanted their own blog or photo-sharing site. Here are some of the companies that came of age during this time: MySpace (2003), Photobucket (2003), Flickr (2004), Facebook (2004), WordPress (2005), Tumblr (2006), and Twitter (2006). The ultimate indication that Web 2.0 had taken hold was when <em>Time<\/em> magazine named &#8220;You&#8221; its &#8220;Person of the Year&#8221; in 2006.<\/p>\n<hr \/>\n<h2>Sidebar: E-mail Is the &#8220;Killer&#8221; App for the Internet<\/h2>\n<p>When the personal computer was created, it was a great little toy for technology hobbyists and armchair programmers. As soon as the spreadsheet was invented, however, businesses took notice, and the rest is history. The spreadsheet was the killer app for the personal computer: people bought PCs just so they could run spreadsheets.<\/p>\n<p>The Internet was originally designed as a way for scientists and researchers to share information and computing power among themselves. However, as soon as electronic mail was invented, it began driving demand for the Internet. This wasn&#8217;t what the developers had in mind, but it turned out that people connecting to people was the killer app for the Internet.<\/p>\n<p>We are seeing this again today with <span style=\"color: #000000;\">social networks, specifically Facebook<\/span>. Many who weren&#8217;t convinced to have an online presence now feel left out without a Facebook account. The connections made between people using Web 2.0 applications like Facebook on their personal computer or smartphone is driving growth yet again.<\/p>\n<hr \/>\n<h2>Sidebar: The Internet and the World Wide Web Are Not the Same Thing<\/h2>\n<p><span style=\"color: #000000;\">Many times, the terms &#8220;Internet&#8221; and &#8220;World Wide Web,&#8221; or even just &#8220;the web,&#8221; are used interchangeably. But really,<\/span> they are\u00a0<em>not<\/em>\u00a0the same thing at all! The Internet is an interconnected network of networks. Many services run across the Internet: electronic mail, voice and video, file transfers, and, yes, the World Wide Web.<\/p>\n<p>The World Wide Web is simply one piece of the Internet. It is made up of web servers that have HTML pages that are being viewed on devices with web browsers. It is really that simple.<\/p>\n<hr \/>\n<h2><span style=\"color: #000000;\">The Growth of Broadband<\/span><\/h2>\n<p>In the early days of the Internet, most access was done via a modem over an analog telephone line. A modem (short for &#8220;modulator-demodulator&#8221;) was connected to the incoming phone line and a computer in order to connect you to a network. Speeds were measured in bits-per-second (bps), with speeds growing from 1200 bps to 56,000 bps over the years. Connection to the Internet via these modems is called <em>dial-up<\/em> access. Dial-up was very inconvenient because it tied up the phone line. As the web became more and more interactive, dial-up also hindered usage, as users wanted to transfer more and more data. As a point of reference, downloading a typical 3.5 mb song would take 24 minutes at 1200 bps and 2 minutes at 28,800 bps.<\/p>\n<p>A <em>broadband<\/em> connection is defined as one that has speeds of at least 256,000 bps, though most connections today are much faster, measured in millions of bits per second (megabits or mbps) or even billions (gigabits). For the home user, a broadband connection is usually accomplished via the cable television lines or phone lines (DSL). Both cable and DSL have similar prices and speeds, though each individual may find that one is better than the other for their specific area. Speeds for cable and DSL can vary during different times of the day or week, depending upon how much data traffic is being used. In more remote areas, where cable and phone companies do not provide access, home Internet connections can be made via satellite. The average home broadband speed is anywhere between 3 mbps and 30 mbps. At 10 mbps, downloading a typical 3.5 mb song would take less than a second.\u00a0For businesses who require more bandwidth and reliability, telecommunications companies can provide other options, such as T1 and T3 lines.<\/p>\n<figure id=\"attachment_1377\" aria-describedby=\"caption-attachment-1377\" style=\"width: 420px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/pewinternet.org\/Commentary\/2012\/May\/~\/media\/Infographics\/Report%20Infographics\/2013\/23%20-%20Broadband\/FT_13.08.29_BroadbandUse_420px%20%281%29.png?w=420&amp;h=530&amp;as=1\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1377\" alt=\"Growth of Broadband Use (Source: Pew Internet and American Life Project Surveys)\" src=\"https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/FT_13.08.29_BroadbandUse_420px-1.png\" width=\"420\" height=\"530\" \/><\/a><figcaption id=\"caption-attachment-1377\" class=\"wp-caption-text\">Growth of broadband use (Source: Pew Internet and American Life Project Surveys)<\/figcaption><\/figure>\n<p>Broadband access is important because it impacts how the Internet is used. When a community has access to broadband, it allows them to interact more online and increases the usage of digital tools overall. Access to broadband is now considered a basic human right by the United Nations, <a href=\"http:\/\/www.un.org\/apps\/news\/story.asp?Cr=broadband&amp;NewsID=40191#.UZlTSyvSOPU\" target=\"_blank\" rel=\"noopener\">as declared in their 2011 statement<\/a>: <span style=\"color: #000000;\"><br \/>\n<\/span><\/p>\n<p style=\"padding-left: 30px;\">\u201cBroadband technologies are fundamentally transforming the way we live,\u201d the Broadband Commission for Digital Development, set up last year by the UN Educational Scientific and Cultural Organization (<a href=\"http:\/\/www.unesco.org\/new\/en\/unesco\/\">UNESCO<\/a>) and the UN International Telecommunications Union (<a href=\"http:\/\/www.itu.int\/\">ITU<\/a>), said in issuing \u201c<a href=\"http:\/\/www.broadbandcommission.org\/Documents\/Broadband_Challenge.pdf\">The Broadband Challenge<\/a>\u201d at a leadership summit in Geneva.<\/p>\n<p style=\"padding-left: 30px;\">\u201cIt is vital that no one be excluded from the new global knowledge societies we are building. We believe that communication is not just a human need \u2013 it is a right.\u201d<a class=\"footnote\" title=\"&quot;UN sets goal of bringing broadband to half developing world\u2019s people by 2015.&quot;, UN News Center website, http:\/\/www.un.org\/apps\/news\/story.asp?Cr=broadband&amp;NewsID=40191#.Ut7JOmTTk1J\" id=\"return-footnote-51-1\" href=\"#footnote-51-1\" aria-label=\"Footnote 1\"><sup class=\"footnote\">[1]<\/sup><\/a><\/p>\n<h2>Wireless Networking<\/h2>\n<p>Today we are used to being able to access the Internet wherever we go. Our smartphones can access the Internet; Starbucks provides wireless &#8220;hotspots&#8221; for our laptops or iPads. These wireless technologies have made Internet access more convenient and have made devices such as tablets and laptops much more functional. Let&#8217;s examine a few of these wireless technologies.<\/p>\n<h3>Wi-Fi<\/h3>\n<p>Wi-Fi is a technology that takes an Internet signal and converts it into radio waves. These radio waves can be picked up\u00a0within a radius of approximately 65 feet\u00a0by devices with a wireless adapter. Several Wi-Fi specifications have been developed over the years, starting with 802.11b (1999), followed by the 802.11g specification in 2003 and 802.11n in 2009. Each new specification improved the speed and range of Wi-Fi, allowing for more uses. One of the primary places where Wi-Fi is being used is in the home. Home users are purchasing Wi-Fi routers, connecting them to their broadband connections, and then connecting multiple devices via Wi-Fi.<\/p>\n<h3>Mobile Network<\/h3>\n<p>As the cellphone has evolved into the smartphone, the desire for Internet access on these devices has led to data networks being included as part of the mobile phone network. While Internet connections were technically available earlier, it was really with the release of the 3G networks in 2001 (2002 in the US) that smartphones and other cellular devices could access data from the Internet. This new capability drove the market for new and more powerful smartphones, such as the iPhone, introduced in 2007. In 2011, wireless carriers began offering 4G data speeds, giving the cellular networks the same speeds that customers were used to getting via their home connection.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h2>Sidebar: Why Doesn&#8217;t My Cellphone Work When I Travel Abroad?<\/h2>\n<p>As mobile phone technologies have evolved, providers in different countries have chosen different communication standards for their mobile phone networks. In the US, both of the two competing standards exist: GSM (used by AT&amp;T and T-Mobile) and CDMA (used by the other major carriers). Each standard has its pros and cons, but the bottom line is that phones using one standard cannot easily switch to the other. In the US, this is not a big deal because mobile networks exist to support both standards. But when you travel to other countries, you will find that most of them use GSM networks, with the one big exception being Japan, which has standardized on CDMA. It is possible for a mobile phone using one type of network to switch to the other type of network by switching out the SIM card, which controls your access to the mobile network. However, this will not work in all cases. If you are traveling abroad, it is always best to consult with your mobile provider to determine the best way to access a mobile network.<\/p>\n<hr \/>\n<h2>Bluetooth<\/h2>\n<p><a href=\"https:\/\/bus206.pressbooks.com\/wp-content\/uploads\/sites\/10536\/2013\/05\/Bluetooth-logo.png\"><img decoding=\"async\" class=\"wp-image-685 alignleft\" style=\"margin: 3px;\" alt=\"Bluetooth-logo\" src=\"https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/Bluetooth-logo.png\" height=\"125\" \/><\/a><\/p>\n<p>While Bluetooth is not generally used to connect a device to the Internet, it is an important wireless technology that has enabled many functionalities that are used every day. When created in 1994 by Ericsson, it was intended to replace wired connections between devices. Today, it is the standard method for connecting nearby devices wirelessly. Bluetooth has a range of approximately 300 feet and consumes very little power, making it an excellent choice for a variety of purposes. Some applications of Bluetooth include: connecting a printer to a personal computer, connecting a mobile phone and headset, connecting a wireless keyboard and mouse to a computer, and connecting a remote for a presentation made on a personal computer.<\/p>\n<h1>VoIP<\/h1>\n<figure id=\"attachment_891\" aria-describedby=\"caption-attachment-891\" style=\"width: 300px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/bus206.pressbooks.com\/wp-content\/uploads\/sites\/10536\/2013\/06\/Voip-typical.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-891\" alt=\"A typical VoIP communication. Image courtesy of BroadVoice.\" src=\"https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/Voip-typical.gif\" width=\"300\" height=\"302\" \/><\/a><figcaption id=\"caption-attachment-891\" class=\"wp-caption-text\">A typical VoIP communication. Image courtesy of BroadVoice.<\/figcaption><\/figure>\n<p>A growing class of data being transferred over the Internet is voice data. A protocol called v<span style=\"color: #000000;\">oice over IP<\/span>, or VoIP, enables sounds to be converted to a digital format for transmission over the Internet and then re-created at the other end. By using many existing technologies and software, voice communication over the Internet is now available to anyone with a browser (think Skype, Google Hangouts). Beyond this, many companies are now offering VoIP-based telephone service for business and home use.<\/p>\n<p>&nbsp;<\/p>\n<h1>Organizational Networking<\/h1>\n<h2>LAN and WAN<\/h2>\n<figure id=\"attachment_689\" aria-describedby=\"caption-attachment-689\" style=\"width: 300px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/bus206.pressbooks.com\/wp-content\/uploads\/sites\/10536\/2013\/05\/Intranet-Extranet-Diagram1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-689\" style=\"margin: 3px;\" alt=\"Intranet Extranet Diagram\" src=\"https:\/\/opentextbook.site\/informationsystems\/wp-content\/uploads\/sites\/2\/2018\/06\/Intranet-Extranet-Diagram1.png\" width=\"300\" height=\"270\" \/><\/a><figcaption id=\"caption-attachment-689\" class=\"wp-caption-text\">Scope of business networks<\/figcaption><\/figure>\n<p>While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.<\/p>\n<p>An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).<\/p>\n<h2>Client-Server<\/h2>\n<p>The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.<span style=\"color: #000000;\"><br \/>\n<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>Intranet<\/h2>\n<p>Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as &#8220;not found&#8221; if an employee tried to access them from outside the company&#8217;s network.<\/p>\n<h2>Extranet<\/h2>\n<p>Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an <em>extranet<\/em>, which is a part of the company&#8217;s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers&#8217; inventory levels.<\/p>\n<p>Sometimes, an organization will need to allow someone\u00a0who is not located physically within its internal network\u00a0to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in <span style=\"color: #000000;\">the chapter 6 (on information security)<\/span>.<\/p>\n<hr \/>\n<h2>Sidebar: Microsoft&#8217;s SharePoint Powers the Intranet<\/h2>\n<p>As organizations begin to see the power of collaboration between their employees, they often look for solutions that will allow them to leverage their intranet to enable more collaboration. Since most companies use Microsoft products for much of their computing, it is only natural that they have looked to Microsoft to provide a solution. This solution is Microsoft&#8217;s SharePoint.<\/p>\n<p>SharePoint provides a communication and collaboration platform that integrates seamlessly with Microsoft&#8217;s Office suite of applications. Using SharePoint, employees can share a document and edit it together \u2013 no more e-mailing that Word document to everyone for review. Projects and documents can be managed collaboratively across the organization. Corporate documents are indexed and made available for search. No more asking around for that procedures document \u2013 now you just search for it in SharePoint.\u00a0For organizations looking to add a social networking component to their intranet, Microsoft offers Yammer, which can be used by itself or integrated into SharePoint.<\/p>\n<hr \/>\n<h1>Cloud Computing<\/h1>\n<p>We covered cloud computing in chapter 3, but it should also be mentioned here. The universal availability of the Internet combined with increases in processing power and data-storage capacity have made cloud computing a viable option for many companies. Using cloud computing, companies or individuals can contract to store data on storage devices somewhere on the Internet. Applications can be &#8220;rented&#8221; as needed, giving a company the ability to quickly deploy new applications. You can read about cloud computing in more detail in chapter 3.<\/p>\n<hr \/>\n<h2>Sidebar: Metcalfe&#8217;s Law<\/h2>\n<p>Just as Moore&#8217;s Law describes how computing power is increasing over time, Metcalfe&#8217;s Law describes the power of networking. Specifically, Metcalfe&#8217;s Law states that the value of a telecommunications network\u00a0is proportional to the square of the number of connected users of the system. Think about it this way: If none of your friends were on Facebook, would you spend much time there? If no one else at your school or place of work had e-mail, would it be very useful to you? Metcalfe&#8217;s Law tries to quantify this value.<\/p>\n<hr \/>\n<h1>Summary<\/h1>\n<p>The networking revolution has completely changed how the computer is used. Today, no one would imagine using a computer that was not connected to one or more networks. The development of the Internet and World Wide Web, combined with wireless access, has made information available at our fingertips. The Web 2.0 revolution has made us all authors of web content. As networking technology has matured, the use of Internet technologies has become a standard for every type of organization. The use of intranets and extranets has allowed organizations to deploy functionality to employees and business partners alike, increasing efficiencies and improving communications. Cloud computing has truly made information available everywhere and has serious implications for the role of the IT department.<\/p>\n<hr \/>\n<h1>Study Questions<\/h1>\n<ol>\n<li>What were the first four locations hooked up to the Internet (ARPANET)?<\/li>\n<li>What does the term <em>packet<\/em> mean?<\/li>\n<li>Which came first, the Internet or the World Wide Web?<\/li>\n<li>What was revolutionary about Web 2.0?<\/li>\n<li>What was the so-called killer app for the Internet?<\/li>\n<li>What makes a connection a <em>broadband<\/em> connection?<\/li>\n<li>What does the term VoIP mean?<\/li>\n<li>What is an LAN?<\/li>\n<li>What is the difference between an intranet and an extranet?<\/li>\n<li>What is Metcalfe&#8217;s Law?<\/li>\n<\/ol>\n<h1>Exercises<\/h1>\n<ol>\n<li>What is the IP address of your computer? How did you find out? What is the IP address of google.com? How did you find out? Did you get IPv4 or IPv6 addresses?<\/li>\n<li>What is the difference between the Internet and the World Wide Web? Create at least three statements that identify the differences between the two.<\/li>\n<li>Who are the broadband providers in your area? What are the prices and speeds offered?<\/li>\n<li>Pretend you are planning a trip to three foreign countries in the next month. Consult your wireless carrier to determine if your mobile phone would work properly in those countries. What would the costs be? What alternatives do you have if it would not work?<\/li>\n<\/ol>\n<hr class=\"before-footnotes\" \/><div class=\"footnotes\"><ol><li id=\"footnote-51-1\">\"UN sets goal of bringing broadband to half developing world\u2019s people by 2015.\", UN News Center website, <a href=\"http:\/\/www.un.org\/apps\/news\/story.asp?Cr=broadband&#038;NewsID=40191#.Ut7JOmTTk1J\" rel=\"nofollow\">http:\/\/www.un.org\/apps\/news\/story.asp?Cr=broadband&#038;NewsID=40191#.Ut7JOmTTk1J<\/a> <a href=\"#return-footnote-51-1\" class=\"return-footnote\" aria-label=\"Return to footnote 1\">&crarr;<\/a><\/li><\/ol><\/div>","protected":false},"author":1,"menu_order":5,"template":"","meta":{"pb_show_title":"on","pb_short_title":"Ch.5: Networking","pb_subtitle":"","pb_authors":["dave-bourgeois"],"pb_section_license":""},"chapter-type":[52],"contributor":[66],"license":[],"class_list":["post-51","chapter","type-chapter","status-publish","hentry","chapter-type-standard","contributor-dave-bourgeois"],"part":14,"_links":{"self":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/chapters\/51","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":1,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/chapters\/51\/revisions"}],"predecessor-version":[{"id":96,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/chapters\/51\/revisions\/96"}],"part":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/parts\/14"}],"metadata":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/chapters\/51\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/media?parent=51"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/chapter-type?post=51"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/contributor?post=51"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/license?post=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}