服务承诺
资金托管
原创保证
实力保障
24小时客服
使命必达
51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展
积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈Dirt_Bike
2013-11-13 来源: 类别: 更多范文
Major Internet services include e-mail, newsgroups, chatting, instant messaging, Telnet, FTP and the World Wide Web.
Businesses today could not survive without their computer and telecommunications networks. You need to communicate rapidly with your customers, suppliers, and employees. Networking and the Internet are now nearly synonymous with doing business. Implemented a mobile wireless local area network (LAN) using Internet standards to provide integrated voice and data coverage across the entire hotel. Implemented a mobile wireless local area network (LAN) using Internet standards to provide integrated voice and data coverage across the entire hotel. The new wireless network enables these employees to communicate via wireless handhelds or notebook PCs wherever they are working. HRO estimates this technology has saved 60 hours per year per staff member or a total of 4800 hours annually. This time savings from increased employee productivity can be spent on more personal attention to guests and face-to-face customer service. provided by contemporary networking technology. HRO used Internet and wireless networking technology to provide staff and guests with voice and data communication capabilities, as well as wireless Internet access, anywhere in the hotel. HRO’s outdated networking and voice technology made it difficult to provide this experience.
The network we have just described might be suitable for a small business. But what
about large companies with many different locations and thousands of employees' As a
firm grows, and collects hundreds of small local area networks (LANs), these networks
can be tied together into a corporate-wide networking infrastructure. The network infrastructure
for a large corporation consists of a large number of these small local area networks
linked to other local area networks and to firmwide corporate networks. A number
of powerful servers support a corporate Web site, a corporate intranet, and perhaps an
extranet. Some of these servers link to other large computers supporting backend
systems. using cell phones; mobile employees linking to the company Web site or internal company
networks using mobile wireless local area networks (Wi-Fi networks); and a videoconferencing
system to support managers across the world.
T1 and T3 are international telephone standards for digital communication. They are leased, dedicated lines suitable for businesses or government agencies requiring high-speed guaranteed service levels. T1 lines offer guaranteed delivery at 1.54 Mbps, and T3 lines offer delivery at 45 Mbps
TABLE 6.3
Major Internet
Services
Capability Functions Supported
E-mail Person-to-person messaging; document sharing
Chatting and instant messaging Interactive conversations
Newsgroups Discussion groups on electronic bulletin boards
Telnet Logging on to one computer system and doing work on
another
File Transfer Protocol (FTP) Transferring files from computer to computer
World Wide Web Retrieving, formatting, and displaying information (including
text, audio, graphics, and video) using hypertext links
Voice over IP (VoIP) technology delivers voice information in digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks (see Figure 6-11). Calls that would ordinarily be transmitted over public telephone networks would travel over the corporate network based on the Internet Protocol, or the public Internet. Voice calls can be made and received with a desktop computer equipped with a microphone and speakers or with a VoIP-enabled telephone. Although there are up-front investments required for an IP phone system, VoIP can
reduce communication and network management costs by 20 to 30 percent. For example,
VoIP saves Virgin Entertainment Group $700,000 per year in long-distance bills (Hoover,
2006).
Virtual Private Networks You would want to be able to e-mail each other and communicate with the home office without any chance that outsider. In the past, one answer to this problem was to work with large private networking firms who offered secure, private, dedicated networks to
customers. But this was an expensive solution. A much less expensive solution is to create a
virtual private network within the public Internet.
A virtual private network (VPN) is a secure, encrypted, private network that has been
configured within a public network to take advantage of the economies of scale and
management facilities of large networks, such as the Internet (see Figure 6-12). A VPN
provides your firm with secure, encrypted communications at a much lower cost than the
same capabilities offered by traditional non-Internet providers who use their private networks to secure communications. VPNs also provide a network infrastructure for combining voice and data networks.
use RSS to keep up with your favorite blogs without constantly checking them for updates. RSS, which stands for Rich Site Summary or Really Simple Syndication, syndicates Web site content so that it can be used in another setting. RSS technology pulls specified content from Web sites and feeds it automatically to users’ computers, where it can be stored for later viewing. Blogs allow visitors to add comments to the original content, but they do not allow visitors to change the original posted material.
Wikis, in contrast, are collaborative Web sites where visitors can add, delete, or modify content on the site, including the work of previous authors.
Organizations use Internet networking standards and Web technology to create private networks called intranets an intranet is an internal organizational network that provides access to data across the enterprise. It uses the existing company network infrastructure along with Internet connectivity standards and software developed for the World Wide Web. Intranets create networked applications that can run on many different kinds of computers throughout the organization, including mobile handheld computers and wireless remote access devices. an intranet is private and is protected from public visits by firewalls—security systems with specialized software to prevent outsiders
from entering private networks A simple intranet can be created by linking a client computer
with a Web browser to a computer with Web server software using a TCP/IP network with software to keep unwanted visitors out.
Extranets
A firm creates an extranet to allow authorized vendors and customers to have limited access
to its internal intranet. For example, authorized buyers could link to a portion of a company’s intranet from the public Internet to obtain information about the costs and features of the company’s products. The company uses firewalls to ensure that access to its internal data is limited and remains secure; firewalls also authenticate users, making sure that only authorized users access the site. Both intranets and extranets reduce operational costs by providing the connectivity to coordinate disparate business processes within the firm and to link electronically to customers and suppliers. Extranets often are employed for collaborating with other companies for supply chain management, product design and development, and training efforts.
Bluetooth to transmit the delivery data captured by their handheld Power Pad computers to cellular transmitters, which forward the data to corporate computers; drivers no longer need to spend time docking their handheld units physically in the transmitters, and Bluetooth has saved FedEx $20 million per year.
Radio frequency identification (RFID) systems provide a powerful technology for tracking the movement of goods throughout the supply chain. RFID systems use tiny tags with embedded microchips containing data about an item and its location to transmit radio signals over a short distance to special RFID readers. The RFID readers then pass the data over a network to a computer for processing. Unlike bar codes, RFID tags do not need line-of-sight contact to be read.
The RFID tag is electronically programmed with information that can uniquely identify an item plus other information about the item, such as its location, where and when it was made, or its status during production. Embedded in the tag is a microchip for storing the data. The rest of the tag is an antenna that transmits data to the reader. In inventory control and supply chain management, RFID systems capture and manage more detailed information about items in warehouses or in production than bar coding systems. If a large number of items are shipped together, RFID systems track each pallet, lot, or even unit item in the shipment. This technology may help companies improve receiving and storage operations by enhancing their ability to “see” exactly what stock is stored in warehouses or on retail store shelves. The cost of RFID tags used to be too high for widespread use, but now it is approaching 10 cents per passive tag in the United States. As the price decreases, RFID is starting to become cost-effective for some applications

