11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.
-
Upload
paul-bridges -
Category
Documents
-
view
218 -
download
0
Transcript of 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.
![Page 1: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/1.jpg)
11
Chapter 5Business Networks & Telecommunications
p189 – 203:
1.VPN
2. Switching
3. Protocols
![Page 2: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/2.jpg)
2
Revision:
What is makes up the Telecommunications Network Model?
What are the two categories of media? Name the different media? What is the difference between a digital and
analog signal? List the 4 different types of networks? What type of network is on slide 4?
2
![Page 3: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/3.jpg)
3
Telecommunications NW Model:
A telecommunications network is any arrangement where
– A sender transmits a message
– To a receiver
– Over a channel
– Consisting of some sort of medium
3
![Page 4: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/4.jpg)
4
What type of network?
4
![Page 5: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/5.jpg)
5
Different Media:
Wired (or …….) and Wireless (…………) See next slides
5
![Page 6: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/6.jpg)
6 6-6
Telecommunications Media
Twisted-Pair Wire
– Ordinary telephone wire
– Copper wire is twisted into pairs
![Page 7: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/7.jpg)
7 6-7
Telecommunications Media
Coaxial Cable
– Sturdy copper oraluminum wire wrappedwith spacers to insulateand protect it
![Page 8: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/8.jpg)
8 6-8
Telecommunications Media
Fiber-Optic Cable
– One or more hair-thinfilaments of glass fiber wrapped in a protective jacket
![Page 9: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/9.jpg)
9
Analog versus Digital
Analog or digital refers to the method used to convert information into an electrical signal
– Analog: an electrical current is generated that is proportional to the quantity being observed
– Digital: the quantity being observed is expressed as a number
9
![Page 10: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/10.jpg)
10
Digital Network Technologies
Telecommunications are being revolutionized by switch from analog to digital
– Analog: voice-oriented transmission
– Digital: discrete pulse transmission Benefits
– Higher transmission speeds
– Moves larger amounts of information
– Greater economy and much lower error rates
– Transmits multiple types of communications (data, voice, video) on the same circuits
10
![Page 11: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/11.jpg)
11
Virtual Private Network:
A network is private, when only authorized users can access the network.
So instead leasing lines and services from an ISP, a company can use the internet by isolating a part of it for private use: creating a “tunnel” through the internet or any public network.
This is done by implementing sophisticated security measures. See next slide.
11
![Page 12: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/12.jpg)
12
![Page 13: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/13.jpg)
13
![Page 14: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/14.jpg)
14
VPN (cont.)
Used to establish secure intranets and extranets
– The Internet is the main backbone network
– Relies on network firewalls, encryption, and other security features to build a “pipe” through the Internet
– Creates a private network without the high cost of a separate proprietary connection
14
![Page 15: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/15.jpg)
15
VPN (p188)
Intranet: Extranet:
15
![Page 16: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/16.jpg)
16
Switching Techniques
How can computers or nodes link to each other on the network:– Circuit switching: dedicated channel (path or circuit)
established for duration of transmission– Packet switching: message broken into packets
Packet: group of bits transmitted together
16
![Page 17: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/17.jpg)
17
Switching Techniques (continued)
17
![Page 18: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/18.jpg)
18
Switching Tech. (cont.)
Frame relay: high-speed packet-switching protocol used in WANs– Variable-sized packets routed quickly– Better ratio of data bits to non-data bits
Multi-protocol label switching: enhances services like VoIP. – Still broken into packages, but all will use the same
path on the network
18
![Page 19: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/19.jpg)
19
Protocols
Protocol: set of rules governing communication between computers
Protocol is like human language and basic understanding
Some protocols designed for WANs, LANs, and wireless communications
Most important set of protocols called TCP/IP
19
![Page 20: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/20.jpg)
20
TCP/IP
TCP/IP: Transmission Control Protocol/Internet Protocol – Ensures packets arrive accurately– Ensures delivery of packets from node to node,
respectively Internet backbone: highest speed channels Host: computer connect directly to backbone IP number: unique identification for device DNS: Domain Name Service maintains character-based
names of IP numbers
20
![Page 21: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/21.jpg)
What is your PC’s IP Address?
Start > All Programs > Accessories
Command Prompt > ENTER Type: ipconfig So, what is your IP address
21
![Page 22: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/22.jpg)
Let’s check for GOOGLE!!
Still in command prompt: Type: ping google.com If you are having connectivity problems, you
can use the ping command to check the destination IP address you want to reach and record the results. The ping command displays whether the destination responded and how long it took to receive a reply.
22
![Page 23: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/23.jpg)
Google.com
OPEN the browser and type in the address the ip address of google and ENTER
What is the DNS service doing?
23
![Page 24: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/24.jpg)
24
TCP/IP (continued)
Static IP number: permanent number assigned to device
Dynamic IP number: temporary IP number assigned for duration of connection
24
![Page 25: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/25.jpg)
25
IP or URL Address:
The Uniform Resource Locator is an address that points to a specific resource on the Web
http://www.stanford.edu/jengk/useless.html– http:// protocol for Web pages– www.standford.edu is the Domain name: it
identifies the computer that stores the Web pages– Jengk/ is the directory path; identifies where the
page is store on the computer– Useless.html is the document name or web page
25
![Page 26: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/26.jpg)
26
Ethernet
Ethernet: LAN protocol using coaxial cable, also known as IEEE 802.3
Gigabit Ethernet: faster Ethernet connections Devices on network contend with other devices
for transmission time CSMA/CD protocol ensures no collisions in
transmission
26
![Page 27: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/27.jpg)
27
![Page 28: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/28.jpg)
28
![Page 29: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/29.jpg)
Know more about bands:
See: http://www.disa.mil/jsc/speccht.html
29
![Page 30: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/30.jpg)
30
Wireless Protocols
IEEE 802.11: known as Wi-Fi (wireless fidelity)– Supports wireless communication within 100 metres
of router with speed of 11 Mbps: 802.11b– 802.11g Max speed 54 Mbps all in range 2.4-2.5 GHz
Access point: Wi-Fi router connects to AP that connects to the Internet.
Access point (hotspot): allows Internet access within range of equipment
Encryption: ability to scramble and code messages– Use keys shared between sender and receiver30
![Page 31: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/31.jpg)
31
Wireless Protocol (cont.):
IEEE 802.15 Bluetooth: allows devices to communicate within 10 metres
Examples: Wireless keyboards and mice, microphones for mobile phones.
31
![Page 32: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/32.jpg)
32
Wireless Protocols (continued)
Worldwide Interoperability for Microwave Access (WIMAX): increases range and speed of wireless communication IEEE 802.16– 110 km, speed of 100 Mbps– Works with metropolitan area networks
Mobile Broadband Wireless Access (MBWA): similar to cell phone communications– Compatible with IP services– Compatible with Wi-Fi and Bluetooth
32
![Page 33: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/33.jpg)
33
Wireless Protocols (continued)
33
![Page 34: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/34.jpg)
34
Generations in Mobile Communications
Generations of mobile communication technologies are determined by capabilities and transmission speed:
– 1G, First generation analog and circuit switching– 2G, Second generation used digital voice encoding– 2.5G, Speed 144 Kbps, packet switching and limited Internet
access– 3G, speeds up to1 Mbps, support video, Internet access– 4G, digital, packet switching, bandwidths up to 100 Mbps and
tighter security.– Future:
34
![Page 35: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/35.jpg)
35
Internet Networking Services
Variety of options to choose from when subscribing to network services
Downstream: speed of receiving from network
Upstream: speed of transmitting to network
35
![Page 36: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/36.jpg)
36
Cable
Internet links provided by television cable firms
Cable connected to Internet server At residence, cable split into TV set and
computer Cable shared by all subscribers
36
![Page 37: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/37.jpg)
37
Digital Subscriber Line (DSL)
Digital subscriber line (DSL): data remains digital through entire transmission; 8Mbps
Uses telephone lines connected to DSL bridge/modem
Several types of DSL– Asymmetric (ADSL) allows different upstream and
downstream rates– SDSL for short distances
37
![Page 38: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/38.jpg)
38
Satellite
Satellite services use microwaves Service provider installs dish antenna, used
as communications satellite Speeds up to 45 Mbps GPS free satellite service
38
![Page 39: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/39.jpg)
39
Fixed Wireless
Fixed wireless: point-to-point transmission between two stationary devices
Wireless Internet service provider (WISP)– Provides fixed wireless service
Highly modular and scalable
39
![Page 40: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/40.jpg)
40
Optical Carrier
Optical carrier using optical fibre.– Expensive– High connection speeds
Uses basic unit of 51.84 Mbps Used by
– ISPs– Search engines – Content-rich Web sites
40
![Page 41: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/41.jpg)
41
Broadband over Power Lines (BPL)
Broadband over Power Lines (BPL): uses electric power lines to carry digital signals
Used by utility companies – Monitor power consumption– Detect power failure– Track power outages
41
![Page 42: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/42.jpg)
42
The Future of Networking Technologies:
Broadband Telephoning: VoIP Radio Frequency Identification: RFID Converging Technologies:
42
![Page 43: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/43.jpg)
Broadband Telephoning:
Voice over Internet Protocol: uses Internet connection to conduct telephone conversations using VoIP.
Regular telephone companies charge according to number of minutes a call last
ISP charge customers a flat monthly connection fee for connection to Internet
Three different topologies:
43
![Page 44: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/44.jpg)
Technologies:
PC-to-PC PC-to-Phone Phone-to-Phone
44
![Page 45: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/45.jpg)
PC-to-PC:
In this model, both caller and receiver must have Internet phone equipment (VoIP) to talk to each other.
The call is routed through an ISP such as Netcom.
Both caller and receiver must have their computers on to complete calls
45
![Page 46: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/46.jpg)
PC-to-Phone
These calls are routed like a normal telephone call, except:– The PC must have Internet phone equipment
A call is dialed to the ISP, routed back through the internet backbone
And then sent back to the voive phone network
46
![Page 47: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/47.jpg)
Phone-to-Phone
One caller would dial a code, similar to a long-distance code
The ISP gateway will rout the call through the Internet and
Then converts it the signal back to the voice phone network upon reaching its connection.
47
![Page 48: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/48.jpg)
Advantages/Disadvantages
P202, 203 VoIP becomes portable
48
![Page 49: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/49.jpg)
49
Radio Frequency Identification
RFID tags tiny and need little power Objects are embedded with tags that contain
a transponder:– It’s a radio ‘transmitter-receiver’ that is activated
for transmission by a signal that is transmitted to it– The tag has a digital memory with a unique EPC
49
![Page 50: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/50.jpg)
RFID:
The interrogator– An Arial– Transceiver– Decoder
Emits a signal activating the RFID tag so that the interrogator can READ/WRITE data to it
Readers decode data stored in tag’s memory and data passed to host computer
50
![Page 51: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/51.jpg)
RFID:
How do companies apply this technology to the supply chain?
51
![Page 52: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/52.jpg)
52
Future Uses of RFID
52
![Page 53: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/53.jpg)
53
Converging Technologies
WebTV technologies allows one to add a set-top box to a TV set, so that one can access also the World Wide Web: connecting to the Internet– So TV technology and Web technology converges
in WebTV
Cell phones can act as Web phones Wireless technologies combined in same
device enhance functionality53
![Page 54: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/54.jpg)
54
Summary
Telecommunications is communication over distance
Telecommunications technology has changed the business environment
Different media have different bandwidths Networks are classified according to reach
and complexity Network can be turned into a virtual private
network (VPN)54
![Page 55: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/55.jpg)
55
Summary (continued)
Two ways to switch a communication line: packet switching and circuit switching
Network protocols are sets of rules to which all devices on network must adhere
The Internet adheres to the TCP/IP protocol Wireless technologies make it easy and affordable to
create wireless LANs Organizations and individuals have variety of choices
when subscribing to networking services
55
![Page 56: 11 Chapter 5 Business Networks & Telecommunications p189 – 203: 1.VPN 2. Switching 3. Protocols.](https://reader030.fdocuments.in/reader030/viewer/2022032707/56649e1b5503460f94b090bd/html5/thumbnails/56.jpg)
56
Summary (continued)
As Internet links become faster, Internet telephoning is gaining in popularity
Wireless technologies support the increasingly popular RFID technologies
Much like hardware, telecommunications technologies are merging
Increasing numbers of employees now telecommute
56