The Internet of Things (IoT) is becoming increasingly popular in both business and everyday life. Explain what the Internet of
The Internet of Things (IoT) is becoming increasingly popular in both business and everyday life.
- Explain what the Internet of Things (IoT) is and provide a brief history, in your own words, of the IoT.
- Discuss the potential impact that IoT can have on how people live.
- Select a company and explain how the organization has benefited from the IoT. Detail specific examples of how the company benefited.
- How has the IoT been impacted by the pandemic? Explain specific examples.
Your well-written report should be 4-5 pages in length, not including the title and reference pages. To make it easier to read and therefore grade, make sure you clearly delineate each section of your answer so it can be matched with the relevant question. Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references as appropriate. Review the grading rubric to see how you will be graded for this assignment. CT Assignment Rubric CT Assignment Rubric – Alternative Formats
Collaborative Technologies and the Internet of Things (IoT) (105 points)The Internet of Things (IoT) is becoming increasingly popular in both business and everyday life.
· Explain what the Internet of Things (IoT) is and provide a brief history, in your own words, of the IoT.
· Discuss the potential impact that IoT can have on how people live.
· Select a company and explain how the organization has benefited from the IoT. Detail specific examples of how the company benefited.
· How has the IoT been impacted by the pandemic? Explain specific examples.
Your well-written report should be 4-5 pages in length, not including the title and reference pages. To make it easier to read and therefore grade, make sure you clearly delineate each section of your answer so it can be matched with the relevant question. Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references as appropriate. Review the grading rubric to see how you will be graded for this assignment. CT Assignment Rubric CT Assignment Rubric – Alternative Formats
For Your Success
This week, consider the ways in which networks support you at home, at work, and at school. How do you use network technologies to get information, communicate, and collaborate? How do these make it easier?
1. Differentiate between various network types and functions.
2. Examine protocols and network capabilities, and why a business manager should understand these.
3. Articulate the importance and impact of mobile networks on business.
4. Analyze the business uses of collaborative technologies and the Internet of Things.
Readings
Required:
Chapter 4: Networks, Collaborative Technology, and the Internet of Things in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability
Dustdar, S., Nepal, S., & Joshi, J. (2019). Introduction to the Special Section on Advances in Internet-based Collaborative Technologies . ACM Transactions on Internet Technology (TOIT) – Special Section on Advances in Internet-Based Collaborative Technologies, 19(3), 1–4.https://doi.org/10.1145/3361071
Aljeraisy, A., Barati, M., Rana, O., & Perera, C. (2021). Privacy laws and privacy by design schemes for the Internet of Things: A developer’s perspective . ACM Computing Surveys, 54(5), 102.
Wang, C., Kuo, J., Yang, D., & Chen, W. (2020). Collaborative social internet of things in mobile edge networks . IEEE Internet of Things Journal, 7(12), 11473–11491.
Recommended:
,
IT for Management: On-Demand Strategies for Performance, Growth, and Sustainability
Eleventh Edition
Turban, Pollard, Wood
Chapter 4
Networks, Collaborative Technology, and The Internet of Things
Learning Objectives (1 of 4)
2
Copyright ©2018 John Wiley & Sons, Inc.
Network Fundamentals Defined
A computer network is a set of computers connected together for the purpose of sharing recourses.
3
Copyright ©2018 John Wiley & Sons, Inc.
Common Network Types
Acronym | Type | Characteristics | Example |
LAN | Local Area Network | Short distance connection | Office School Home |
WAN | Wide Area Network | Spans large physical distance | Internet Large company |
WLAN | Wireless LAN | LAN based on Wi-Fi technology | Internet Large company |
4
Copyright ©2018 John Wiley & Sons, Inc.
Intranets, Extranets, and Virtual Private Networks
Intranets are used within a company for data access, sharing, and collaboration.
Extranets are private, company-owned networks that can be logged into remotely via the Internet.
Virtual Private Networks (VPNs) are used where security of transmissions is a concern, because they encrypt the packets before they are transferred over the network.
5
Copyright ©2018 John Wiley & Sons, Inc.
Virtual Private Networks
A virtual tunnel routed through the Internet with software and hardware encryption.
6
Copyright ©2018 John Wiley & Sons, Inc.
6
Network Terminology
Modem: a device that modulates/demodulates signal for transportation
Modulation and Coding: Techniques used by modem to adapt the signal to the media
Signal: Binary information we want to send.
Signal Frequency Spectrum: All the frequency components of a signal
Media Bandwidth: Limit in range of frequency signals
Capacity Bandwidth: Maximum bits per second that can be transmitted
7
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.4 Basic functions of business networks
8
Copyright ©2018 John Wiley & Sons, Inc.
Quality of Service (QoS)
Latent-sensitivity: data such as real-time voice and high-quality video.
Prioritized Traffic: data and apps that are time-delay-sensitive or latency-sensitive apps.
Throttle Traffic: gives latency-sensitive apps priority, other types of traffic need to be held back (throttled).
Traffic Shaping: the ability to prioritize and throttle network traffic.
9
Copyright ©2018 John Wiley & Sons, Inc.
The Net Neutrality Debate
Net neutrality is the principle that Internet Service Providers (ISPs) and their regulators treat all Internet traffic the same way.
Traffic shaping prioritizes the flow of traffic by delaying the flow of less important network traffic.
In 2010, the FCC ruled in favor of “net semi-neutrality”, not explicitly forbidding paid prioritization.
The FCC under the current administration may take further steps to roll back net neutrality rulings, which could favor the cable companies over consumers.
10
Copyright ©2018 John Wiley & Sons, Inc.
Network Fundamentals
Name different types of networks.
What is meant by “bandwidth”?
What is the difference between an intranet and an extranet?
How does a virtual private network (VPN) provide security?
What is the purpose of a modem?
Describe the basic functions of business networks.
How do investments in network infrastructure impact an organization?
Name the two tiers of traffic to which Quality-of-Service is applied.
11
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Responses:
1. The different types of networks are LAN, WAN. WLAN, MAN. SAN, CAN, PAN.
2. Bandwidth is the communication capacity of a network. Bandwidth is the amount of data that passes through a network connection over time as measured in bits per second (bps). For an analogy to bandwidth, consider a pipe used to transport water. The larger the diameter of the pipe, the greater the throughput (volume) of water that flows through it and the faster water is transferred through it.
3. Intranets are used within a company for data access, sharing, and collaboration.
An extranet is a private, company-owned network that can be accessed remotely via the Internet. It connects two or more companies, suppliers, vendors, partners, or customers, so they can securely share information.
4. Virtual private networks (VPNs) encrypt the data packets before they are transferred over the network and decrypt at the receiving end.
5. A modem is a device designed to adapt/modify the information signals in a way that can be transport-ed by the media. The word modem is composed of two terms: Modulator and Demodulator, the Modulator adapts the information signal in order to be transported by the media and the Demodulator does the inverse process at reception.
6. Business networks support basic functions including: communication, mobility, collaboration, relationships, and search.
Communication: Provides sufficient capacity for human and machine generated transmissions, such as being able to talk, text, tweet, fax, send messages, etc.
Mobility: Provides secure, trusted, and reliable access from any mobile device anywhere at satisfactory download (DL) and upload (UL) speeds.
Collaboration: Supports teamwork activities that may be synchronous or asynchronous; brain storming; and knowledge and document sharing.
Relationships: Manages interaction with customers, supply chain partners, shareholders, employees, regulatory agencies, etc.
Search: Able to locate data, contracts, documents, spreadsheets, and other knowledge within an organization easily and efficiently.
7. Investments in network infrastructure, including data networks, IP addresses, routers, and switches are
business decisions because of their impact on productivity, security, user experiences, and customer service.
8. QoS technologies can be applied to create two tiers of traffic:
• Prioritize traffic: Data and apps that are time-delay-sensitive or latency-sensitive apps, such as voice and video, are given priority on the network.
• Throttle traffic: In order to give latency-sensitive apps priority, other types of traffic need to be held back (throttled).
11
Learning Objectives (2 of 4)
12
Copyright ©2018 John Wiley & Sons, Inc.
Internet Protocols, APIs, and Network Capabilities
Internet Protocol (IP) is the basic technology that makes global communication possible. Each devise attached to a network has a unique IP address that enables it to send and receive files made up of packets.
13
Copyright ©2018 John Wiley & Sons, Inc.
IP Addresses and Packets
Figure 4.5: IPv4 addresses have four groups of four alphanumeric characters, which allows for 232 or roughly 4.3 billion unique IP address. IPv6 addresses have eight groups of alphanumeric characters, which allows for 2128 , or 340 trillion, trillion addresses. IPv6 offers also enhanced quality of service that is needed by the latest in video, interactive games, and e-commerce.
14
Copyright ©2018 John Wiley & Sons, Inc.
14
Broadband Technology: 3G/4G/5G
3G networks support multimedia and broadband services over a wider distance and at faster speeds than prior generation networks. They use large satellite connections to telecommunication towers.
4G networks are digital, or IP, networks that enable even faster data transfer rates. 4G delivers average realistic download rates of 3 Mbps or higher (as opposed to theoretical rates, which are higher).
5G networks, the coming generation of broadband technology. 5G will dramatically increase the speed at which data is transferred across the network.
15
Copyright ©2018 John Wiley & Sons, Inc.
Network Technology Standards
WiMAX
IEEE 802.16
30-mile range
70 Megabits per second (Mbps)
Line-of-site not required
Same principles as Wi-Fi (using radio signals)
Long-Term Evolution (LTE)
GSM deployed by Verizon, AT&T, and T-Mobile
100 Mbps downlink, 50 Mbps uplink
16
Copyright ©2018 John Wiley & Sons, Inc.
Circuit vs. Packet Switching
Circuit switching
Older technology that originated with telephone calls
Inefficient for digital transmission
Packet Switching
Transfers data or voice
Files are broken into packets, numbered sequentially, routed individually to their destinations
When received at the destination, the packets are reassembled into their proper sequences
17
Copyright ©2018 John Wiley & Sons, Inc.
Application Programming Interfaces and Operating Systems
Application Program Interface (API) consists of a set of functions, commands, and protocols used by programmers for OS-interactivity without having to write a program from scratch.
Can be automated for simplified usability
Amazon
18
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.7 API value chain in business.
19
Copyright ©2018 John Wiley & Sons, Inc.
Internet Protocols (IP), APIs, and Network Capabilities
Why has IPv6 become increasingly important?
What is the difference between IPv4 and IPv6?
What is the purpose of an IP address?
What are the benefits of using an API?
What is the difference between 4G and 5G?
What is the most current network standard?
What benefits will the upcoming 5G network standard offer businesses?
What is the difference between circuit switching and packet switching?
20
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
IPv4 can support roughly 4.3 billion unique IP address. IPv6 can support 340 trillion, trillion, trillion addresses. IPv6 offers also enhanced quality of service that is needed by the latest in video, interactive games, and e-commerce. In April 2014 ARIN, the group that oversees Internet addresses, reported that IPv4 addresses were running out—making it urgent that enterprises move to the newer IPv6
IP Version 4 (IPv4) has been Internet protocol for over three decades, but has reached the limits of its 32-bit address design. IP Version 6 (IPv6) is the most recent version of the Internet Protocol. IPv6 is replacing IPv4 because of IPv4’s limitations in number of IP addresses it can generate. IPv6 has a 128-bit address and allows 7.9 x 1028 times as many addresses as IPv4, which provides about 4.3 billion addresses.
3. Every device that communicates with a network must have a unique identifying IP address. An IP address is comparable to a telephone number or home address.
4. For programmers: The benefits of APIs are that they simplify the programmer’s job and ensure that all programs using the same API use that resource in the same manner. APIs are the common method for accessing information, websites, and databases.
Business benefits of APIs include:
APIs are channels to new customers and markets: APIs enable partners to use business assets to extend the reach of a company’s products or services to customers and markets they might not reach easily.
APIs promote innovation: Through an API, people who are committed to a challenge or problem can solve it themselves.
APIs are a better way to organize IT: APIs promote innovation by allowing everyone in a company to use each other’s assets without delay.
APIs create a path to lots of Apps: Apps are going to be a crucial channel in the next 10 years. Apps are powered by APIs. Developers use APIs and combinations of APIs to create new user experiences.
5. 4G delivers average download rates of 3Mbps or higher. In contrast, today's 3G networks typically deliver average download speeds about one-tenth of that rate. Even though individual networks, ranging from 2G to 3G, started separately with their own purposes, soon they will be converted to the 4G network. 4G is based purely on the packet-based Internet Protocol (IP) – unlike current 2G and 3G networks that have a circuit-switched subsystem. Users can get 4G wireless connectivity through one of the following standards:
1. WiMAX is based on the IEEE 802.16 standard and the metropolitan area network (MAN) access standard.
2. LTE (Long-Term Evolution) is a GSM-based technology that is deployed by Verizon, AT&T, and T-Mobile. LTE has download data rates of 100 Mbps and upload data rates of 50 Mbps.
5G networks are the coming generation of broadband technology. 5G builds on the foundation created by 4G. 5G will dramatically increase the speed at which data is transferred across the network.
6. Although 5G isn’t expected until 2020 and many organizations are already investing in the infrastructure required to run this new mobile wireless standard.
7. 5G mobile networks will offer huge gains in both speed and capacity over existing 4G networks−along with opportunities at the operations and strategic levels. In the short term, the 5G infrastructure build-out will create new jobs. In the longer term, 5G will create entirely new markets and economic opportunities driven by superior mobile capabilities in industries ranging from health care to automotive.
8. The two types of switching are:
Circuit switching: A circuit is a dedicated connection between a source and a destination. Circuit switching is older technology that was used for telephone calls. The distinguishing characteristic is that the circuit cannot be used by any other call until the session (connection) is ended. It is inefficient for digital transmission.
Packet switching: Packet switching transfers data or voice in packets. Files are broken into packets, numbered sequentially, and routed individually to their destination. When received at the destination, the packets are reassembled into their proper sequence.
The astute student may realize: The path of the signal is digital, and is neither dedicated nor exclusive. That is, the networks are shared. When packets are transmitted over a shared network, such as the Internet, they may follow different paths to the destination, where they are reassembled into the original message once all of them have arrived.
20
Learning Objectives (3 of 4)
21
Copyright ©2018 John Wiley & Sons, Inc.
Figure 4.8 Four drivers of global mobile traffic through 2020
22
Copyright ©2018 John Wiley & Sons, Inc.
Mobile Data Traffic Milestone by 2020
23
Copyright ©2018 John Wiley & Sons, Inc.
Wireless Networks and Mobile Infrastructure
Mobile Networks
Bluetooth: short-range wireless communication technology allowing device pairing
Wi-Fi: standard way to wirelessly connect computing devices through routers commonly connected to the Internet
WiMax: transmits voice, data, and video over high-frequency radio signals designed as alternative to cable and DSL
24
Copyright ©2018 John Wiley & Sons, Inc.
Data Networks, IP Addresses, and APIs: A mashup of GPS and Bluetooth
General term referring to the integration of two or more technologies such as Bluetooth and Wi-Fi
Provide intelligence
Inter-Automobile collision avoidance
Sudden braking
Can automatically call emergency services
25
Copyright ©2018 John Wiley & Sons, Inc.
Data Networks, IP Addresses, and APIs: Near-Field Communication (NFC)
Enables two devices within close proximity to establish a communication channel and transfer data using radio waves
More secure than other wireless technologies
Examples:
Apple iWatch
Digital tickets providing access to concerts
Transmit public transport payment through phones
26
Copyright ©2018 John Wiley & Sons, Inc.
Four Important Factors When Choosing a Mobile Network
27
Copyright ©2018 John Wiley & Sons, Inc.
Mobile Networks
What factors are contributing to mobility?
Why is mobile global traffic increasing?
What accounts for the increase in mobile traffic?
Give some examples of VoIP networks.
How is NFC different from RFID?
What are the two components of a wireless network infrastructure?
What is Near Field Communication and how is it used in business?
What factors should be considered when evaluating a mobile network?
28
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
1.Answers may vary. Factors contributing to mobility can include the following:
New wireless technologies such as WiMAX-Wireless Broadband and standards such as 8.11n
High-speed wireless networks such as 4G
Multitasking mobile devices
More robust mobile OSs and their applications
Increased competitive pressure as others start adopting mobile technology for strategic applications
2. Organizations are recognizing the strategic value of mobile technology. So, organizations are moving away from ad hoc adoption of mobile devices and network infrastructure to a more strategic planning build-out of their mobile capabilities. As technologies that make up the mobile infrastructure evolve, identifying strategic technologies and avoiding wasted investments require more extensive planning and forecasting.
3. In its most recent Visual Networking Index Forecast (VNI), Cisco reported that mobile data traffic has grown 400 million times over the past 15 years. They also predict that by 2020 monthly global mobile data traffic will be 30.6 exabytes; number of mobile-connected devices will exceed 11.6 billion (exceeding the world’s project population of 7.8 billion) and smartphones will account for 81% of total mobile traffic. This includes a major increase in machine-to-machine communications and the number of wearable technology devices.
4. Examples of high-capacity networks are wireless mobile, satellite, wireless sensor, and VoIP (voice over Internet Protocol) such as Skype.
5. NFC enables two devices within close proximity to establish a communication channel and transfer data through radio waves. NFC is location-aware technologies that are more secure than other wireless technologies like Bluetooth and Wi-Fi. Unlike RFID, NFC is a two-way communication tool.
6. The two components of wireless infrastructures are wireless LANs and WiMAX.
7. Answers may vary. Location-aware NFC technology, such as smartphones, can be used to make purchases in restaurants, resorts, hotels, theme parks and theaters, at gas stations, and on buses and trains. They also can provide consumers with content to complement their current activity, such as recipe or idea videos when shopping at a supermarket having proper NFC tag-equipped units.
8. When evaluating mobile network solutions, four factors to consider are:
1. Simple: Easy to deploy, manage and use.
2. Connected: Always makes the best connection possible.
3. Intelligent: Works behind the scenes, easily integrating with other systems.
4. Trusted: Enables secure and reliable communications.
28
Learning Objectives (4 of 4)
29
Copyright ©2018 John Wiley & Sons, Inc.
Collaborative Technologies: Virtual Collaboration–Benefits
Information sharing between retailers and suppliers (Example: Walmart and Proctor & Gamble)
Retailer-supplier collaboration (Example: Asda Corp.)
Lower transportation and inventory costs and reduced stockouts (Example: Unilever’s Transportation Business Center)
Reduction of product development time (Example: Caterpillar, Inc.)
30
Copyright ©2018 John Wiley & Sons, Inc.
Collaborative Technologies: Group Work
Group Work and Dynamics can be quite complex
Group workers can be located in different places or work at different times
Group members may work for the same or different organizations
Data, information, or knowledge may be located in many sources that may be external to the organization
31
Copyright ©2018 John Wiley & Sons, Inc.
Collaborative Technologies: Brainstorming in the Cloud
Companies are now using cloud-based online brainstorming applications
Avoids travel expenses if members are geographically dispersed
No restriction to number of sessions
Examples
Evernote—features function to synchronize user’s notes
iMindmap Online—relies on mind mapping and other structured approaches to help streamline work processes
32
Copyright ©2018 John Wiley & Sons, Inc.
The Internet of Things (IoT)
Internet of Things (IoT) is the network of physical objects or “things” embedded with electronics, software, sensors, and network connectivity, that enables these objects to collect and exchange data.
Objects we interact with send signals to and from each other, collecting data
IoT collects that data from millions of sensors embedded in everything from cars, to refrigerators, to space capsules
Half of U.S. manufacturers report they are currently using IoT technology to collect machine data (Industry Week study, 2016)
A smaller percentage (44%) are colleting data from sensors embedded in their products
33
Copyright ©2018 John Wiley & Sons, Inc.
Advantages of IoT
Monitoring performance, quality, and reliability of products and services
Gaining insight into potential new products and service
Support sales
Better understand product use
Remote troubleshooting of products
Deliver revenue-generating post-sales services
More efficiently deliver post-sales services
34
Copyright ©2018 John Wiley & Sons, Inc.
34
Disadvantages of IoT
Network security
Data privacy
Data analysis capabilities
Data collection capabilities
Realistic efficiency opportunities
Realistic new revenue opportunities
Cost
35
Copyright ©2018 John Wiley & Sons, Inc.
35
Collaboration Technologies and the Internet of Things (IoT)
Why is group work challenging?
What might limit the use of in-person brainstorming?
How can online brainstorming tools overcome those limits?
List ways in which virtual collaboration can be used in business.
What devices do you have that take advantage of the IoT? Describe how they impact the way that you live and work.
What is driving the rise of IoT?
What is the main concern that organizations have about the IoT?
Do you think the advantages outweigh the disadvantages of the IoT? Explain.
36
Copyright ©2018 John Wiley & Sons, Inc.
Suggested Answers:
1. Group work involves processes that can be quite complex depending on the following factors:
Group members may be located in different places or work at different times.
Group members may work for the same or for different organizations.
Some of the needed data, information, or knowledge may be located in many sources, several of which are external to the organization.
Despite the long history and benefits of collaborative work, groups are not always successful.
2. Answers may vary. In-person brainstorming can be limited by travel expense if members are geographically dispersed. Other limiting factors, such as schedules, time zones, and available resources, such as an available meeting place, may limit in-person brainstorming.
3. Online brainstorming tools can be accessed virtually from anywhere Internet access is available. Many of these tools allow users to post comments on their own time rather than having to meet at a particular time, however, virtual meetings may be necessary as well.
4. Virtual Collaboration can be used in business to share information between retailers and their suppliers, lower transportation and inventory cists, and reduce product development time.
5. Everyday items such as cellphones, coffee markers, washing machines, lamps and headphones all use the IoT. (Answers may vary on the impact)
6. Several things have created the ‘perfect storm’ for the creation and growth of the IoT. These include more widely available broadband Internet, lower cost of connecting, development of more devices with wi-fi capabilities and embedded sensors, and the overwhelming popularity of the smartphone.
7. Network security and data privacy are manufacturers’ top concerns about IoT technology. With billions of devices connected together there are a multitude of end-points where security breaches can occur and individuals or organizations can be hacked.
8. Answers may vary.
36
Copyright
Copyright © 2018 John Wiley & Sons, Inc.
All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.
37
Copyright 

Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
All Rights Reserved Terms and Conditions
College pals.com Privacy Policy 2010-2018