500 likes | 683 Views
FIT3019 Information Systems Management Topic 5: Managing the Essential Technologies : Telecommunications & Information Resources. Learning Objectives : Describe the evolving telecommunications scene Describe how the telecommunications industry is being transformed
E N D
FIT3019 Information Systems ManagementTopic 5: Managing the Essential Technologies : Telecommunications & Information Resources Learning Objectives: Describe the evolving telecommunications scene Describe how the telecommunications industry is being transformed Internet: the network of choice The OSI reference model Digital Convergence The Wireless Century Begins Determine what are the factors that cause the transformation in this industry Discuss the role of IS department in managing telecommunications References: McNurlin, B. C. & Sprague R. H., Information Systems Management in Practice, 7th Edition, Chapt. 6 & 7, Section ‘Managing Data’. Study Guide 2, Sections 1.2 & 1.3
FIT3019 Information Systems ManagementTopic 5: Managing the Essential Technologies : Telecommunications & Information Resources Learning Objectives cont…: Describe the 3-level database model Describe the 4 data models Discuss the problems related to corporate data Discuss the role of Data Administration and the use of ERP to manage data References: McNurlin, B. C. & Sprague R. H., Information Systems Management in Practice, 7th Edition, Chapt. 6 & 7, Section ‘Managing Data’. Study Guide 2, Sections 1.2 & 1.3
What is Telecommunications? Telecommunications: - electronically sending information in any form from one place to another. - “Electronic highway system” for the flow of information among • individuals • work groups • Departments • Customer sites • Regional offices • Between enterprises, and • with the outside world. • IS department is responsible for designing, building, and maintaining the information highway(including the selection and enforcing the telecommunication standards). • Users manage the flow of information. • Government divided up the spectrum for different wireless uses.
semaphore semaphore
Changing Infrastructure of Telecommunications New Telecommunication Infrastructure (data-centric network). • Used fiber optic – using light instead of electricity to present information. • Sending digital signals – sent 0 or 1 instead of sine waves. • Aimed at transmitting data. E-mail, digitized voice, music, and any files can be transmitted. • Packet switching: messages are divided into packets and each is sent separately with the address header. • no circuit is created, each packet may take a different path through the network. Old – Public Switched Telephone Network (PSTN) Telecommunication Infrastructure (voice-centric network) • Used twisted-pair copper wire • Analog technology – signals are sent using sine webs. • Voice communications only. • Circuit Switching: a virtual circuit is created between the caller and receiver for communications. No other person can use it during their telephone call. • Although circuit switching is appropriate for delivering high-quality voice communications, it is inefficient because of all the unused space in the circuit when no sound is transmitted.
Changing Infrastructure of Telecommunications cont… New Telecommunication Infrastructure (data-centric network). • Internet: Putting intelligent devices in the network can provide addressing information, i.e., internet. • Network needs store-and-forward routers to route the packets. • Internet can handle all kind of intelligent user devices, including smart phones, PDA, and all manner of wireless devices. Old – Public Switched Telephone Network (PSTN) Telecommunication Infrastructure (voice-centric network) • Recently, PSTN network can be used sent data traffics, but • data traffics are sent in burst and for less than a second. Opening and closing circuits at this rate is not economic. • PSTNs were designed for dumb telephone. So, telephone company need to house intelligent switches to perform other functions like call waiting, call ID, call forwarding, conference calling and so on. Focus of global telecommunications infrastructure is changing from voice to data.
First Telephone Alexander Bell invented telephone in 1876
Transformation in Telecommunications Industries • Old structure: • Government owned public infrastructure. • Monopolies such AT&T in USA, Nippon Telephone and Telegraph (NTT) in Japan, etc. Telecommunication industries has two types of carriers- (Singapore one covers call) • Long distance carriers, i.e., inter-exchange carriers (IXCs). • Use optic fiber & always maintain by government (AT & T, MCI, Sprint) • Local exchange carriers (LECs) or last mile carriers. (baby bell) • Use dial-up line or digital subscriber line (DSL) & maintain by new private competitors The new competitive LECs provides • New types of connectionsto business and homes such as cable modems, optical fiber, wireless, satellite, and faster wire lines. • Businesses direct access to a fiber networks. So, Large firm can handle huge amount of traffics for its active website, ISPs, etc. (+telephone applications) • Computing processing speed is doubling in every 18 months. • Bandwidth of fiber is now doubling capacity in every 4 months.
Internet: the network of choice Internet History 1960:First internet, ARPANET that performs shipment of large scientific and research files. It was funded by U.S. Department of Defense’s Advanced Research Projects Agency. 1993:Internet becomes Worldwide networks for researchers, scientists, academics, and individuals who participated in news groups. • Text only, no graphics. • had e-mail for sending message, maintaining e-mail list, and interacting with news groups. • had FTP for sending files. • Telnet for logging onto another computer. • Gopher for searching and downloading files from databases. 1994: URL based world wide web (www) was invented by Tim Berners-Lee at CERN in Geneva.
Internet: the network of choice cont… • Three attributes of internet Ubiquity:Internet is global. Enterprises, both large and small, have global reach with a browser and global presence with a website. Reliability: Internet was designed to survive computer crashes by allowing alternative routing. People might not access the crashed server, but other nodes that are operating. Scalability:Websites can handle tremendous amounts of traffic, in the tens of millions of hits a day, if properly designed. • Protocols: Internet protocols have become the protocols of choice in corporate networks for internal communications as well as communications with outside world. • Extranets: Business now extending their intranet into extranets – a special part of the intranet for use by trading partners, customers, and suppliers of e-commerce. • VoIP: Recently, enterprises have been investigating use of internet not just for data but also for voice to replace their telephone system. Voice can be converted to packets and routed over the LAN just like other data (cheaper than telephone call). VOIP is not a switched circuit, connection is not guaranteed.
Internet: the network of choice cont… • Digital Convergence • is the intertwining of various forms of media – voice, data and video • Convergence is now occurring because IP has become the network protocol of choice • When all forms of media can be digitized, put into packets and sent over an IP network, they can be managed and manipulated digitally and integrated in highly imaginative ways • IP telephony and video telephony have been the ‘last frontiers’ of convergence – and now they are a reality • IP telephony: The use of Internet to transmit voice to replace their telephone system • IP phone generates a digital signal & Routed over the LAN like any other data in packets • Video telephony: Not video conferencing via a PBX, but rather video over IP • with the appropriate IP infrastructure, video telephony can be, say, launched from an instant-messaging conversation
PABX Function Direct Inward Dialing Auto Attendant. Call transfer Customised Abbreviated dialing (Speed Dialing) Voice mail Call forwarding on absence Call forwarding on busy Music on hold Automatic ring back Night service Automatic call distributor Call waiting Conference call Call accounting
The OSI Reference Model A closed Networkis one that is offered by one supplier and to which only the products of that supplier can be attached. Example: Mainframe and minicomputer manufacturers used this approach for years to lock their customers. An open Networkis based on national or international standards so that the products of many manufacturers can attached to it. Open networks have been favored by suppliers serving the ecosystem, department, work group, and individual level of computing. Today, Proprietary networks are out, and Open network is in. Why? No provider is large enough to serve all of firm’s telecommunications needs. OSI:The International Standards Organization (OSI) and other standards bodies have adopted the 7-layer OSI Reference model for guiding the development of international standards for networks of computers, making suppliers’ products inter-connectable Why is it Reference Model? • It only recommend the functions to be performed in each of the seven layers. • It does not specify detailed standards for each layer. Those details are left-up to the standards bodies in the adopting countries.
The OSI Reference Model Understanding the OSI Reference model is a step towards understanding how telecommunications systems actually work. An Analogyof an executive mailing a paper document to another executive.
The OSI Reference Model cont… Ref: Effy Oz, Management Information Systems, 4th edition. Interface to application. Translates data to and from the language and format used in Layer 7. • Control the dialog for a session and act as a gateway. • Seeing that messages are sent as directed and interrupted if necessary. • Provides data integrity and internet security. Controls flow, ensure reliable packet delivery.
The OSI Reference Model cont… Ref: Effy Oz, Management Information Systems, 4th edition. Put address and route the packets to their destination. • Do error correction. • Make sure no data is lost or garbled. Defines physical connection to networks.
Accelerating Change in Telecommunications Some milestones • In 1995, (boom of Internet) • number of PC sales overtook the number of TV sales. • E-mail outnumbered postal mail for the first time. • The first time, information flow has become so easy and borderless. • Many people speculate that data traffic surpassed voice traffic in 1999 or 2000. • In 1995, computing power got 32 doublings (232 times) compared with the first digital computer invented during 2nd world war. It is now doubling in every 18 months. (applications have to catch up with HW) Bandwidth • is doubling in every 4 months and cost is reducing rapidly. (cheaper CPU) • 40 million miles of optic-fiber cable for information super highway. • problem: bandwidth is limited by the switching speed of transistor because in every 25 miles, optic signal is converted to electric pulses to amplify and regenerate signals. • To download movie like The Matrix, cable modem requires 7 hours, Ethernet requires 1 hours, and optic fiber requires 4 seconds. • 1 millionth of its capacity is now using. (UNDER utilized) Bandwidth is transforming the economy completely , support more application and bigger data throughput.
Wireless Century Begins cont… The goal is to “do everything we can do on wired networks, but without the wire” The problems are • Radio waves are nondeterministic, i.e., (shorter range) you cannot tell if a transmission will reach its intended antenna. (vs. directional antenna) • as people move around, the relationship between transmitter and receiver changes. That is why calls get dropped. • Wireless networks also experience interference, echoes, fading, and power limitations. This limits the use of signals, i.e., Bandwidth. • Cell phones are using radio-waves which is regulated by governments. • Infra-red light are using for in limited cases like remote controlling. (subject to direct line of sight) Full time start
Infra-red light • Subject to direct line of sight
Wireless Century Begins cont… Licensed Versus Unlicensed Frequencies • Some frequencies of the radio spectrum are licensed by governments for specific purposes; others are not • Devices that tap unlicensed frequencies are cheaper • therefore no big $ licensing fees • BUT there is a possibility of collision between signals Wireless technologies for networks that cover different distances • Wireless Personal Area Networks (WPANs) • Provide high-speed connections between devices that are up to 30 feet apart • Wireless Local Area Networks (WLANs) • Provide access to corporate computers in office buildings, retail stores, or hospitals or access to Internet “hot spots” where people congregate • Wireless Metropolitan Area Networks (WMANs) • Provide connections in cities and campuses at distances up to 30 miles • Wireless Wide Area Networks (WWANs) • Provide broadband wireless connections over thousands of miles
Parabolic antenna Wi-Fi / WLAN antenna at 2,4Ghz
Wireless Internet 2.6GHz spectrum radio band - a licensed spectrum
Wireless Century Begins cont… Wireless Long Distance (old days) • The only two wireless technologies are infrared light and radio airwaves • Figure 6-5 shows the bandwidth spectrum, which illustrates where the different technologies lie • Cell (mobile) phones use radio transmitters and receivers • Call is passed from one cell to another – fades out of one and into another • Much of the bandwidths and radio waves are regulated by governments • In the main, GSM has become the mobile telephony standard for all but the Americas • Unlike the computing industry, a number of leading global telecom manufacturers are outside the United States. NTT is in Japan, Ericsson and Nokia are in Scandinavia
Wireless Century Begins cont… Wireless Long Distance cont… • The first cell phones used analog technology and circuit switching, now called first-generation (1G) wireless • 2G cellular. 2G, which predominates today, uses digital technology, though it is still circuit switched • It aims at digital telephony, not data transmission, but 2G phones can carry data • 2G can use a laptop with a wireless modem to communicate • Not always the most ‘reliable’ • 2G can carry messages using short messaging service(SMS) • 2.5G cellularis extending the life of 2G digital technologies (GPRS) • Essentially adds data capacity to a 2G network • The problem with adoption has been pricing
Wireless Century Begins cont… Wireless Long Distance cont… • The goals of 3G are to provide WANs for PCs and multimedia, allowing bandwidth on demand. • CDMA (code division multiple access) is the universal standard for 3G • It faces the same pricing issues at 2.5G – perhaps worse • Court battles over the “leased” spectrum • Costs to deploy not seen as tenable in many circumstances • New entrants are looking for 3G alternatives • One is mobile broadband IP, which could actually provide 4G services (the user paying for different kinds of services) • Wireless mesh networks • Links are radio signals not wires • More flexible but uses a lot of battery power • VSAT (Very Small Aperture Terminal) technology is taking off in some countries because it is seen as the best technology for providing stationary wireless broadband • Provided by DSL, coaxial cable and T carriers
Wireless Century Begins cont… Is Wireless Secured? In favor of Security • Both wired and wireless use the IP protocol • Signals fade fast when they travel through the air. Eavesdroppers need special equipment to pick up radio signals from far away • Data are encrypted before sending Not Secured • Data inside the handheld device is not in encrypted format. Hackers may successful in remote login and collect data • Data sent spread in air, open to all (how can we get 100% secured encryption technique)
Wireless Century Begins cont… Is Wireless Safe? • Microwave frequencies are more dangerous than radio-wave frequencies, because • microwave cause molecule to vibrate faster, causing heat as the molecules rub against each other. • The power limit on cell-phones, wireless modems, and WLANs (3 watts) aims to protect people from this short-term microwave heating phenomenon. • Some studies shows that long-term effects from low-level vibration do not raise body temperature, but damage to DNA, which may cause disease like cancer. • Electromagnetic radiationfrom power lines, electronic appliances, and computers can interfere with the body’s bio-electromagnetic fields, causing an imbalance. These imbalances leave people feeling drained, fatigued, and stressed out. • Although our body can rebalance disruptions caused by occasional exposure to electromagnetic radiation, frequent exposure will lower body’s immunity and causes diseases.
What’s Next? Messaging Is a Killer App • Instant Messaging = Considered by many to be the ‘killer app.’ of wireless • The key attribute of Instant Messaging (IM) is that it provides presence, which means that a person on your buddy list can see when you are using a computer or phone and therefore knows you are “present” and available to receive an IM • Newer technologies will allow messaging to become even more personal • Photo messaging, Video messaging, Video phones Coming: An Internet of Things • Wireless communications not just for people, but machine-to-machine Internet is coming (Likely to use Wi-Fi) • RFID (Radio Frequency Identification): Like the barcode & involves small tags affixed to objects that provide information about the object • Communication systems will be a mix of wired and wireless, which is one of the many challenges for CIOs
The Role of IS department in Telecommunications IS Department has three roles • Create the telecommunications architecture: The challenges of telecommunications architecture are- • Connectivity:connectivity means allowing users to communicate up, down, across, and out of an organization. • Interoperability:the capability of different computers (PCs, laptop, handheld devices), using different operating systems (Linux, windows, MVS) and on different networks, to work together on tasks – exchanging information in standard ways without any changes in functionality and without physical invention. • Operate the network • Many companies are outsourcing this work to specialized network management companies, because • the area is complex • there are few network specialists to go around; and • network infrastructures are costly investments. • Stay current with the technology • Testing new technologies is essential for IS department to go ahead.
What are Information Resources? Data consists of facts without meaning or intent. Data Information is data in context, which means the data has been given an explicit meaning in a specific context. Content:the term arose with the emergence of www. Contents includes information presented electronically in a variety of media: charts, text, voice, sound, graphics, animation, photographs, diagrams, and video. Information Knowledge Knowledge is information with direction or intent, where intent is derived from strategies or objectives.
IS departments Responsibilities Managing Corporate database:is a major responsibility of IS organizations. • Managing data becomes complex. Data is housed in a variety of “database models”, e.g., hierarchical, relational, etc. • Production database support transaction processing of air-line reservations, customer orders, and such. • Data Warehousehouse gigantic amounts of historic data to be analyzed with data mining techniques to support decision making for such applications as CRM. Managing Information: Information is unstructured and not easy to index for retrieval purposes. Managing Knowledge: becomes a key to exploiting the “intellectual assets” of organizations. • Explicit Knowledge: houses in a file or process. • Tacit Knowledge: houses in people head and hard to make explicit. (difficult to record like human touch, care and concern)
The Three-Level Database Model Level 1: External, Conceptual, or Local Level (business view) • Contains the various “user views” of corporate data. Each application program has its own view. • Does not contain • How data is physically stored? • What data is used by other applications? Level 2: Logical or “enterprise data” level • Encompasses all of an organization’s relevant data under the control of data administrators. • Data and relationships at this level are represented by the DBMS. • Does not contain “how data is physically stored?” i.e., does not contain data implementation. Level 3: Physical or storage level • Specifies the way data is physically stored. Data implementation generally use pointers, tag fields, etc.
Four Data Models Hierarchical Model: Structures data so that each element is subordinate to another in a strict hierarchical manner. • Maintains parent-child relationship, where each data item can have only one parent. Network Model: Allows each data item to have more than one parent. Relational Model: where data is stored in tables. Each row of the table, called a tuple, represents an individual entity and each column represents an attribute of the entities. • Various kinds of relational operations like select, project, join, product, intersection, difference, union and division can be performed on data. • Not efficient like hierarchical or network models, but more flexible as people can create relationships among data on the fly. • Become the database technology of choice in today’s systems.
Four Data Modelscont… Object Model: Expands the view of data by storing and managing objects, each of which consists of data, methods for performing work on data, attributes describing data, and relationships between this object with others. • Can store any type of data like spreadsheet, video clips, music etc. • Retain traditional DBMS features like end-user tools, high level query languages, concurrency control, recovery, and ability to efficiently handle huge amount of data. Include two important concepts: Object Management:management of complex kind of data like multimedia and procedures. Rule Management:management of large number of complex rules for reasoning and maintaining integrity constraints between data. • Can manage world-wide file systems by permitting access to some portions of their databases while restricting other portion reliably by authenticating users.
Getting Corporate Data into Shape Inconsistent Data Definitions Problem: • Different databases has different names, time-frames, or data type, format • So. Data definitions are incompatible from application-to-application, department-to-department, site-to-site, and division-to-division. Reason: Incorrect sources (old data or violation of normalization, cheapest source or politically expedient source. (wrong business rules) Result: Different files with different names for same data, same name for different data, etc. Example: Account number, AcctNum, AcctNumb, Acct#, A/CNum, etc. Use of DBMS reduces the problem of inconsistent and redundant data in organization to some extend. Broader definition of the data administration role: • General role: administering databases and the software that manages them. • Extended role: Determine what data is being used outside the organizational unit that creates it. Whenever data crosses organizational boundaries, its definition and format need to be standardized under the data definition function. Effective use of data dictionary: Data dictionaries are the main tools by which data administrators control standard data definitions. All definitions are entered into the dictionary and data administrators can monitor all new definitions to check whether corporate wide standard is followed or not. How to solve the problem?
Enterprise Resource Planning To bring order to the data mess, data administration has four main functions (enforce normalization) • Clean up the data definitions. • Control shared data • Manage data administration • Maintain data quality • Late implementation (why) many companies really did not take these four jobs seriously until the mid 1990s. When they needed consistent data to install a company-wide ERP package. (growing importance of database marketing, e-supply chain and customer service) • ERP provided the means to consolidate data to give management a corporate-wide view of operations. • advantages: Once a decision is made it can be implemented quickly and across the entire corporation. • Disadvantage: Reduce flexibility because divisions of a company need to move in connect with each other.
Summary • This Lecture • Managing the Essential Technologies : Telecommunications & Information Resources • Next Lecture • Managing the essential technologies : Information Resources & Operations