Chapter 10: End-of-Chapter Questions

 

The modern performs the coding and decoding in a datacom network. It is required except when a telephone is used as a terminal.

 

I.    The firm owns all of the circuitry for a LAN, and the devices communicating with each other are typically close together such as in the same room or building. Circuitry for a MAN is owned by the firm, but the distance covered may be as large as thirty miles. MANs are generally much closer, such as the network for a campus. WANs may cover any distance and utilize communications circuitry owned by common carriers.

 

2.    The Internet is a collection of networks that are joined together to permit access and use anywhere in the world. An intranet uses Internet protocols to facilitate communication within the firm. An extranet is an intranet that is expanded to include selected users outside the firm.

 

3.    POS terminals are used to keep a retailer’s database current and provide feedback to sales clerks to enable them to complete the transaction. POS terminals also have an external focus, linking with such environmental elements as customers. Data collection terminals keep a manufacturer’s database current and have an internal focus.

 

4.    Likely transmission speeds for a LAN are 10 to 100 Mbps. For a MAN they are 100 Mbps, and for a WAN they are between 9600 bps and 1 Mbps.

 

5.   Data transmission using the public telephone system is slower than computer-to-computer connection because of the telephone protocols. Telephone circuitry is often of relatively poor quality, unsuitable for high-speed data transmission.

 

6.    The token in a Token-Ring network is used to designate one computer in the network as the one that currently controls communications.

 

7.    Ethernet computers are used in a LAN, and typically are physically close together.

 

8.    Distributed processing is a form of decentralized processing, enabling the processing of data by widely dispersed computer resources. Client/server, on the other hand, is a combination of centralized and decentralized processing. The server processes data in a centralized manner, and the clients do so in a decentralized manner.

 

9.    Network plannmg consists of capacity planning, staff planning, and performance monitoring.

 

10.  IBM has aimed its SNA at users of large computers and has aimed its Token Ring protocol at users of small computers. By segmenting the market in this way, IBM retains a competitive edge in the large computer market.

 

11.  A data transmission crash is when two or more computers try to use a network at the same time. In an Ethernet    network, when a crash occurs, the sending computer does not receive confirmation that the message was received safely. The sending computer simply resends until the confirmation is received.

 

12.  A hub is more secure than a switch because access is restricted to only those computers that are physically connected to it. A switch and a router are devices that connect many LANs and do not rely on physical connection for security.

 

13.  A bridge simply connects two LANs. A router is more sophisticated and can connect many LANs.

 

14.  A circuit is a path through a network that is always open. Packets enable pieces of the total data to be communicated to follow different routes to the destination computer. The packet routes are determined by packet switching protocols.

 

15.  A virtual private network provides a secure, fast, and inexpensive communications line by means of a collection of Internet lines and tunneling software that establish intermediary telephone equipment locations.

 

 

Topics for Discussion

 

I.    Since you are in charge of operations for a small organization with less than 15 employees, you probably would not spend too much time in staff planning. But since Internet sales produce more than $4 million in revenues, you would engage in capacity planning to ensure that the data volumes can be handled, and in performance monitoring, to ensure that your e-commerce customers receive the level of service that they need.

 

2.   An increase in the number of preferred vendors imposes demands that private lines cannot easily meet. Secure data communications can be established using an extranet or a virtual private network.

 

3.   The determination of whether to use a LAN, MAN, or WAN is based on the distance to be covered by the network. Since all employees are located in the same building, a LAN would be used. Its speed, and those of a MAN, could handle the large volume transmissions.

 

4.   Data communications capabilities have transformed all CBIS subsystems (MS, MIS, DSS, knowledge-based systems, and virtual office) from solutions with a narrow, central focus to those with no geographical limitations. Data communications technology has enabled the CBIS to support business organizations as they expand their operations to a global scope. The importance of data communications in the CBIS can only be expected to increase.