Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Which wireline communication has the highest security

20/11/2021 Client: muhammad11 Deadline: 2 Day

Reflection Essay

Telecommunications and Networking
CHAPTER OUTLINE LEARNING OBJECTIVES
6.1 What Is a Computer Network? 6.1 Compare and contrast the major types of networks.

6.2 Network Fundamentals 6.2 Describe the wireline communications media and transmission

technologies.

6.3 The Internet and the World Wide Web 6.3 Describe the most common methods for accessing the Internet.

6.4 Network Applications: Discovery 6.4 Explain the impact that discovery network applications have had on

business and everyday life.

6.5 Network Applications: 6.5 Explain the impact that communication network applications have Communication had on business and everyday life.

6.6 Network Applications: Collaboration 6.6 Explain the impact that collaboration network applications have

had on business and everyday life.

6.7 Network Applications: Educational 6.7 Explain the impact that educational network applications have had

on business and everyday life.

Opening Case

Can Slack Really Replace E-mail?

E-mail has presented a productivity problem for employees for some time. Over 200 billion e-mail messages are sent and received every day. Employees receive some 122 e-mails per day. Dealing with those e-mails consumes 23 percent of the average employee’s work­ day. In response, an increasing number of organizations are finding that limiting, or even eliminating, e-mail actually increases employee productivity.

MIS

Slack ( www.slack.com ) may provide one answer to the prob­ lems with e-mail. Launched in 2013, Slack is a cloud-based team com­ munication and collaboration software program that helps company

employees communicate in real time. Slack allows different parts of a business to set up different channels for discussions. One channel might be for the information technology group, another for the mar­ keting group, and so on. Anytime someone wants to alert you about something, he or she tags your name to a message. You can follow your colleagues’ exchanges in real time, or you can return to that conversa­ tion later.

Slack offers many features, including chat rooms (called chan­ nels) organized by topic, private groups, and direct messaging. All content inside Slack is searchable, including files, comments, conver­ sations, and people. Channels enable team members to communi­ cate without the use of e-mail or texting. They are open to everyone

CHAPTER 6

158

Introduction 159

in the chat by invitation only. Private channels allow for private conversation between smaller subsets of an original group. Direct messages allow users to send private messages to a specific user rather than to a group of people. Slack is also developing a do-not­ disturb feature. People will not be interrupted by messages between, for example, the hours of 10 P.M. and 8 A.M. If someone sends a mes­ sage to another person during this time, that message will not appear in that colleague’s Slack account until his or her do-not-disturb hours have ended.

Another useful feature of Slack is the Slackbot, a personal soft­ ware assistant that helps users in several ways. Slackbots can:

· Help you complete your account profile and add new apps.

· Answer questions about Slack.

· Answer other questions, such as when a meeting is scheduled or what is for lunch in the company cafeteria.

· Add customized, automatic responses to messages.

· Monitor your e-mail inbox (most companies still use e-mail along with Slack).

Slack has partnered with IBM to develop the next iteration of Slackbot. Slackbot will utilize Watson Conversation, a software tool that helps bots interact through natural language. For example, at the New York Times, Slackbots predict for the newspaper’s editors what stories will perform best with readers on social media.

Slack is growing very rapidly. Since the service appeared, more than 4 million people have become daily users who spend an average of 10 hours each weekday accessing the application. Seventy-seven of the Fortune 100 companies use Slack, as do many technology compa­ nies, including Airbnb, Stripe, Spotify, Salesforce, and BuzzFeed. Com­ panies pay $6.67 to $12.50 per month per user.

Companies use Slack in a variety of ways. For example, at the Weaver Street Market ( www.weaverstreetmarket.coop ), a North Carolina community-owned natural foods grocery, workers use Slack to find out the latest on strawberry shipments, for example. At Hendrick Automotive ( www.hendrickauto.com ), the largest privately held automotive dealership group in the United States, Slack enables employees in Canada and Turkey to stay connected to colleagues at company headquarters in Charlotte, North Carolina.

In June 2016, Slack announced that it was partnering with 12 companies to introduce “message buttons.” The idea is that key func­ tions from outside apps—like using Kayak to search for a flight—can be accomplished from within Slack, with the click of a button. With these message buttons, Slack is competing directly with Facebook, the mar­ ket leader in this technology.

Perhaps as a response to message buttons and perhaps as a re­ sponse to Slack’s rapid growth, in October 2016 Facebook launched its business chat product called Workplace by Facebook. Furthermore, in November 2016 Microsoft launched a rival workplace messaging ser­ vice called Teams.

Slack does present challenges. Consider Slack’s searchable ar­ chive: Most office workers worry that Slack records their every com­ ment and conversation. That process can create problems as workers leave a record of comments that they may regret.

Slack helps text-based communication replace face-to-face in­ teraction. In her book, Reclaiming Conversation: The Power of Talk in a Digital Age, Sherry Turkle cautions against the dangers of this transfor­ mation. She notes that research has found that empathy is lost when we emphasize connectivity over conversation.

Instead of an overflowing e-mail inbox, users can suffer from no­ tification overload. Also, the transition to Slack can cause problems for older employees, who might feel more comfortable with traditional communications channels such as e-mail, telephones, or talking face to face.

Although Slack was designed for organizational communication, people are using Slack to form new communities around common in­ terests. Slack is not as invasive as a Facebook group, where users have to go to a different website. Therefore, while using Slack at work, em­ ployees may be participating in community discussions that are not work-related.

Sources: Compiled from H. Taylor, “Flattered by Microsoft’s Launch of ‘Slack Killer,’” CNBC, November 15, 2016; A. Balakrishnan, “Microsoft Announces Slack Rival, Teams,” CNBC, November 2, 2016; T. Warren, “Slack Shows It’s Worried about Microsoft Teams with a Full-Page Newspaper Ad,” The Verge, November 2, 2016; R. Hackett, “IBM Watson Lends Brains to Slack’s Chatbot,” Fortune, October 26, 2016; R. Hof, “If You Can’t Beat Slack, Here’s How Your Startup Can Join It,” Forbes, August 15, 2016; A. LaFrance, “Slack, the Facebook Slayer,” The Atlantic, June 21, 2016; C. Locke, “Finally, Slack Is Living Up to Its Name,” Wired, June 9, 2016; R. Greenfield, “Slack Consultants Are Bringing

the Chat App to Corporate America,” Bloomberg.com , May 31, 2016; L. Gomes, “10 Breakthrough Technologies 2016: Slack,” MIT Technology Review, 2016;

S. Jacobs, “Email Killer,” Time, November 9, 2015; J. Novet, “Slack Launches User Groups, Hits 1.7M Daily Active Users and 470K Paid Seats,” Venture Beat, October 29, 2015; www.slack.com, accessed November 16, 2016; www.slack

.com, accessed November 15, 2016.

Questions

1. Is it possible for an organization to completely eliminate e-mail through the use of Slack? Why or why not? Support your answer.

2. Why does Slack appear to be more effective for organizational communications than e-mail?

Introduction

In addition to networks being essential in your personal lives, there are three fundamental points about network computing you need to know. First, in modern organizations computers do not work in isolation. Rather, they constantly exchange data with one another. Second, this exchange of data—facilitated by telecommunications technologies—provides companies with a number of very significant advantages. Third, this exchange can take place over any distance and over networks of any size.

Without networks, the computer on your desk would be merely another productivity- enhancement tool, just as the typewriter once was. The power of networks, however, turns

your computer into an amazingly effective tool for accessing information from thousands of sources, thereby making both you and your organization more productive. Regardless of the type of organization (profit/not-for-profit, large/small, global/local) or industry (manufactur­ ing, financial services, healthcare), networks in general, and the Internet in particular, have transformed—and will continue to transform—the way we do business.

Networks support new and innovative ways of doing business, from marketing to supply chain management to customer service to human resources management. In particular, the Internet and private intranets—a network located within a single organization that uses Inter­ net software and TCP/IP protocols—have an enormous impact on our lives, both professionally and personally.

For all organizations regardless of their size, having a telecommunications and networking system is no longer just a source of competitive advantage. Rather, it is necessary for survival.

Computer networks are essential to modern organizations for many reasons. First, net­ worked computer systems enable organizations to become more flexible so that they can adapt to rapidly changing business conditions. Second, networks allow companies to share hardware, computer applications, and data across the organization and among different orga­ nizations. Third, networks make it possible for geographically dispersed employees and work­ groups to share documents, ideas, and creative insights. This sharing encourages teamwork, innovation, and more efficient and effective interactions. Networks are also a critical link be­ tween businesses, their business partners, and their customers.

Clearly, networks are essential tools for modern businesses. But why do you need to be fa­ miliar with networks? The simple fact is that if you operate your own business or work in a busi­ ness, you cannot function without networks. You will need to communicate rapidly with your customers, business partners, suppliers, employees, and colleagues (see the chapter-opening case). Until about 1990, you would have used the postal service or the telephone system with voice or fax capabilities for business communication. Today, however, the pace of business is much faster—almost real time. To keep up with this incredibly fast pace, you will need to use computers, e-mail (see the chapter-opening case), the Internet, smartphones, and other mo­ bile devices. Furthermore, all of these technologies will be connected through networks to en­ able you to communicate, collaborate, and compete on a global scale.

Networking and the Internet are the foundations for commerce in the twenty-first century. Recall that one important objective of this book is to help you become an informed user of information systems. Knowledge of networking is an essential component of modern business literacy. In fact, as you see in IT’s About Business 6.1, a robust telecommunications infrastruc­ ture is essential for entire nations as well.

You begin this chapter by learning what a computer network is and by identifying the various types of networks. You then study network fundamentals, and you next turn your attention to the basics of the Internet and the World Wide Web. You conclude by examining the many network applications available to individuals and organizations—that is, what networks help you do.

What Is a Computer Network?
6.1

A computer network is a system that connects computers and other devices (e.g., printers) through communications media so that data and information can be transmitted among them. Voice and data communication networks are continually becoming faster—that is, their band­ width is increasing—and cheaper. Bandwidth refers to the transmission capacity of a network; it is stated in bits per second. Bandwidth ranges from narrowband (relatively low transmission capacity) to broadband (relatively high network capacity).

The telecommunications industry itself has difficulty defining the term broadband. The Federal Communications Commission’s (FCC) new rules define broadband as the transmission capacity of a communications medium (discussed later in this chapter) faster than 25 megabits per second (Mbps) for download (transmission speed for material coming to you from an Inter­ net server, such as a movie streamed from Netflix) and 4 Mbps for upload (transmission speed for material that you upload to an Internet server such as a Facebook post or YouTube video).

160 CHAPTER 6 Telecommunications and Networking

What Is a Computer Network? 161

IT’s About Business 6.1
The Least Connected Country on Earth
MIS

Eritrea, a nation of six million people, is located in eastern Africa, surrounded by Sudan, Ethiopia, and Djibouti. The country has been ruled by a dictatorship since it achieved independence in 1993. Since 2009, Reporters Without Borders ( www.rsf.org ) has placed Eritrea at the bottom of its press freedom index.

Eritrea is also the world’s most isolated country when it comes to telecommunications access, according to the United Nations In­ ternational Telecommunication Union (ITU; www.itu.int ). Eritre­ ans are allowed to place international phone calls and to use the Internet. However, according to the ITU, only 1 out of 100 Eritreans have a landline, and only 7 in 100 have a cell phone. Both of these proportions are among the lowest around the globe.

The country’s only telecommunications provider, Eritrea Telecommunication Services (EriTel; www.eritel.com.er ), is controlled by the government. Customers must receive approval from local authorities to own a cell phone, and it costs 200 na­ kfa ($13.29) to request permission. Citizens who are performing mandatory military service aren’t given permission to have a cell phone. To activate their phone, customers pay EriTel the equiva­ lent of $33.60. When they add minutes to their phone, that costs a minimum of $3.65 every time. Because the average Eritrean earns roughly $500 a year, this expense is prohibitive to most.

Robert Van Buskirk, a Fulbright scholar from the United States, launched Eritrea’s first informal e-mail service in the mid-1990s. He used international phone calls to send data messages between a computer at the University of Asmara—Eritrea’s capital city—and a computer in California. For a short time, he singlehandedly oper­ ated the entire country’s e-mail service.

As of September 2016, less than 1 percent of Eritreans are on­ line, according to the ITU. Access is available in just a few places. Internet connections are also almost exclusively through dial-up modem, and they are extremely slow. Eritrea was also the last African nation to establish a satellite connection to the Internet. Furthermore, the country is one of only two African coastal nations with no fiber-optic network. Only about 150 landline broadband connections exist, and only a smattering of homes have Internet access, mostly dial-up connections costing about $200 a month.

Eritreans can get public Internet access in about 100 Internet cafes throughout the country. There is often a wait to use one of

about 10 computers in each cafe. Users pay roughly $1.34 to be online for an hour, which costs about the same as seven loaves of bread. Some Internet cafés show American movies and TV shows in the evenings and charge customers to watch.

In October 2016, the government ordered Internet service providers to maintain detailed information on their customers. Other than that, there seems to be little censorship of the Internet. One likely reason is that high costs and long download times have marginalized the use of the Internet as a protest vehicle. Another possible reason is that the country is experiencing severe economic difficulties, and the government may recognize that strengthening the country’s telecommunications would help improve the econ­ omy. The government also wants to improve tourism. This goal would require a greatly improved telecommunications infrastruc­ ture as well.

Sources: Compiled from A. Harnet, “Eritrea Orders Internet Service Providers to Keep Detailed Records of Their Customers,” Eritrea­

beligerance.com , October 6, 2016; B. Bruton, “It’s Bad in Eritrea, But Not That Bad,” New York Times, June 23, 2016; “Areas the Eritrean

Government Should Improve Upon,” Madote.com , February 2, 2016; “Eritrea—Telecoms, Mobile, and Broadband—Statistics and Analy­ ses,” budde.com.au , June 4, 2015; Y. Abselom, “Eritrea Blossoming

Beautifully at 24,” Geeska Afrika Online, May 10, 2015; “Sadly, Eritrea Remains at Tail of All World Indexes,” harnnet.org , January 12, 2015; “Eritrea Telecommunication Report 2015,” Business Monitor Interna­

tional, December 24, 2014; “Eritrea: Stronger Private Sector, Qualified Workforce, International Integration Needed, Says AFDB,” Caperi.com , October 8, 2014; C. Winter and B. Haile, “The World . . . Eritrea,”

Bloomberg BusinessWeek, June 30–July 6, 2014; C. Winter, “Eritrea’s Communications Disconnect,” Bloomberg Business Week, June 26, 2014; R. Atkinson and L. Stewart, “The Economic Benefits of Infor­

mation and Communications Technology,” Information Technology & Innovation Foundation, May 14, 2013.

Questions

1. Describe the impacts of a lack of telecommunications infra­ structure on Eritrea.

2. Besides improving the economy, what other areas of Eritre­ an life would be impacted by a greatly improved telecom­ munications infrastructure?

3. Can the government of Eritrea allow an improved telecom­ munications infrastructure while maintaining strict control over communications and information? Why or why not? Support your answer.

Interestingly, some FCC commissioners feel that the definition of broadband should be 100 Mbps for download. The definition of broadband remains fluid, however, and it will undoubt­ edly continue to change to reflect greater transmission capacities in the future.

You are likely familiar with certain types of broadband connections such as digital sub­ scriber line (DSL) and cable to your homes and dorms. DSL and cable fall within the range of transmission capacity mentioned here and are thus defined as broadband connections.

The various types of computer networks range from small to worldwide. They include (from smallest to largest) personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), and the ultimate WAN, the Internet. PANs are short-range networks—typically a few meters—that are used for communication among de­ vices close to one person. They can be wired or wireless. (You will learn about wireless PANs in

Chapter 8.) MANs are relatively large computer networks that cover a metropolitan area. MANs fall between LANs and WANs in size. WANs typically cover large geographical areas; in some cases, they can span the entire planet and reach from Earth to Mars and beyond.

Local Area Networks

Regardless of their size, networks represent a compromise among three objectives: speed, dis­ tance, and cost. Organizations typically must select two of the three. To cover long distances, organizations can have fast communication if they are willing to pay for it, or cheap commu­ nication if they are willing to accept slower speeds. A third possible combination of the three trade-offs is fast, cheap communication with distance limitations. This is the idea behind local area networks.

A local area network (LAN) connects two or more devices in a limited geographical re­ gion, usually within the same building, so that every device on the network can communicate with every other device. Most LANs today use Ethernet (discussed later in this chapter). Fig­ ure 6.1 illustrates an Ethernet LAN that consists of four computers, a server, and a printer, all of which connect through a shared cable. Every device in the LAN has a network interface card (NIC) that allows the device to physically connect to the LAN’s communications medium. This medium is typically unshielded twisted-pair wire (UTP).

Although it is not required, many LANs have a file server or network server. The server typically contains various software and data for the network. It also houses the LAN’s network operating system, which manages the server and routes and manages communications on the network.

Wide Area Networks
When businesses have to transmit and receive data beyond the confines of the LAN, they use wide area networks. The term wide area network did not even exist until local area net­ works appeared. Before that time, what we call a wide area network today was simply called a “network.”

A wide area network (WAN) is a network that covers a large geographical area. WANs typically connect multiple LANs. They are generally provided by common carri­ ers such as telephone companies and the international networks of global communi­ cations services providers. Examples of these providers include AT&T ( www.att.com ) in

FIGURE 6.1 Ethernet local area.

the United States, Deutsche Telekom in Germany ( www

.telekom.com ), and NTT Communications ( www.ntt.com ) in Japan.

WANs have large capacities, and they typically combine multiple channels (e.g., fiber-optic cables, microwave, and satellite). WANs also contain routers—a communications processor that routes messages from a LAN to the Internet, across several connected LANs, or across a WAN such as the Internet. The Internet is an example of a WAN.

Enterprise Networks
Organizations today have multiple LANs and may have multi­ ple WANs. All of these networks are interconnected to form an enterprise network. Figure 6.2 displays a model of enterprise computing. Note that the enterprise network in the figure has a backbone network. Corporate backbone networks are

FIGURE 6.2 Enterprise network.

high-speed central networks to which multiple smaller networks (such as LANs and smaller WANs) connect. The LANs are called embedded LANs because they connect to the backbone WAN.

Unfortunately, traditional networks can be rigid and lack the flexibility to keep pace with increasing business networking requirements. The reason for this problem is that the functions of traditional networks are distributed across physical routers and devices (i.e., hardware). This process means that to implement changes, each network device must be configured individu­ ally. In some cases, devices must be configured manually. Software-defined networks (SDN) are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.

With SDN, decisions controlling how network traffic flows across network devices are man­ aged centrally by software. The software dynamically adjusts data flows to meet business and application needs.

Think of traditional networks as the road system of a city in 1920. Data packets are the cars that travel through the city. A traffic officer (physical network devices) controls each inter­ section and directs traffic by recognizing the turn signals, and size and shape of the vehicles passing through the intersection. The officers can direct only the traffic at their intersection. They do not know the overall traffic volume in the city nor do they know traffic movement across the city. Therefore, it is difficult to control the city’s traffic patterns as a whole and to manage peak-hour traffic. When problems occur, the city must communicate with each indi­ vidual officer by radio.

Now think of SDN as the road system of a modern city. Each traffic officer is replaced by a traffic light and a set of electronic vehicle counters, which are connected to central monitoring and control software. As such, the city’s traffic can be instantly and centrally controlled. The control software can direct traffic differently at various times of the day (say, rush hours). The software monitors traffic flow and automatically changes the traffic lights to help traffic flow through the city with minimal disruption.

Before you go on. . .
1. What are the primary business reasons for using networks?

2. What are the differences between LANs and WANs?

3. Describe an enterprise network.

Network Fundamentals
6.2

In this section, you will learn the basics of how networks actually operate. You begin by study­ ing wireline communications media, which enable computers in a network to transmit and re­ ceive data. You conclude this section by looking at network protocols and types of network processing.

Today, computer networks communicate through digital signals, which are discrete pulses that are either on or off, representing a series of bits (0s and 1s). This quality allows digital sig­ nals to convey information in a binary form that can be interpreted by computers.

The U.S. public telephone system (called the plain old telephone system or POTS) was orig­ inally designed as an analog network to carry voice signals or sounds in an analog wave format. For this type of circuit to carry digital information, that information must be converted into an analog wave pattern by a dial-up modem. Dial-up modems are almost extinct in most parts of the developed world today.

Cable modems are modems that operate over coaxial cable—for example, cable TV. They offer broadband access to the Internet or corporate intranets. Cable modem speeds vary widely. Most providers offer bandwidth between 1 and 6 million bits per second (Mbps) for downloads (from the Internet to a computer) and between 128 and 768 thousand bits per second (Kbps) for uploads. Cable modem services share bandwidth among subscribers in a locality. That is, the same cable line connects to many households. Therefore, when large numbers of neighbors access the Internet at the same time, cable speeds can decrease significantly.

DSL modems operate on the same lines as voice telephones and dial-up modems. DSL mo­ dems always maintain a connection, so an Internet connection is immediately available.

Communications Media and Channels
Communicating data from one location to another requires some form of pathway or medium. A communications channel is such a pathway. It is comprised of two types of media: cable (twisted-pair wire, coaxial cable, or fiber-optic cable) and broadcast (microwave, satellite, ra­ dio, or infrared).

Wireline media or cable media use physical wires or cables to transmit data and infor­ mation. Twisted-pair wire and coaxial cables are made of copper, and fiber-optic cable is made of glass. The alternative is communication over broadcast media or wireless media. The key to mobile communications in today’s rapidly moving society is data transmissions over elec­ tromagnetic media—the “airwaves.” In this section, you will study the three wireline channels. Table 6.1 summarizes the advantages and disadvantages of each of these channels. You will become familiar with wireless media in Chapter 8.

Advantages and Disadvantages of Wireline Communications Channels

TABLE 6.1

Channel

Advantages

Disadvantages

Twisted-pair wire

Inexpensive Widely available

Easy to work with

Slow (low bandwidth) Subject to interference

Easily tapped (low security)

Coaxial cable

Higher bandwidth than twisted-pair

Less susceptible to electromagnetic interference

Relatively expensive and inflexible Easily tapped (low to medium security)

Somewhat difficult to work with

Fiber-optic cable

Very high bandwidth

Relatively inexpensive Difficult to tap (good security)

Difficult to work with (difficult to splice)

166 CHAPTER 6 Telecommunications and Networking

Network Fundamentals 165

Twisted-Pair Wire. The most prevalent form of communications wiring— twisted-pair wire—is used for almost all business telephone wiring. As the name suggests, it consists of strands of copper wire twisted in pairs (see Figure 6.3). Twisted-pair wire is relatively inexpensive to purchase, widely available, and easy to work with. However, it also has some significant disadvantages. Specifically, it is relatively slow for transmitting data, it is subject to interference from other electrical sources, and it can be easily tapped by unintended recipients to gain unauthorized access to data.

Coaxial Cable. Coaxial cable (Figure 6.4) consists of insulated copper wire. Compared with twisted-pair wire, it is much less susceptible to electri­ cal interference, and it can carry much more data. For these reasons, it is com­ monly used to carry high-speed data traffic as well as television signals (thus the

FIGURE 6.3 Twisted-pair wire.

© deepspacedave/iStockphoto

term cable TV). However, coaxial cable is more expensive and more difficult to work with than twisted-pair wire. It is also somewhat inflexible.

Fiber Optics. Fiber-optic cable (Figure 6.5) consists of thousands of very thin filaments of glass fibers that transmit information through pulses of light generated by lasers. The fiber- optic cable is surrounded by cladding, a coating that prevents the light from leaking out of the fiber.

Fiber-optic cables are significantly smaller and lighter than traditional cable media. They also can transmit far more data, and they provide greater security from interference and

FIGURE 6.4 Two views of coaxial cable.

FIGURE 6.5 Two views of fiber-optic cable.

tapping. Fiber-optic cable is typically used as the backbone for a network, whereas twisted- pair wire and coaxial cable connect the backbone to individual devices on the network. In 2016, FASTER, the aptly named 5,600-mile undersea fiber optic cable connecting Japan and the United States became operational. FASTER transmits data at 60 terabits per second across the Pacific Ocean.

Network Protocols
Computing devices that are connected to the network must access and share the network to transmit and receive data. These devices are often referred to as nodes of the network. They work together by adhering to a common set of rules and procedures—known as a protocol— that enable them to communicate with one another. The two major protocols are the Ethernet and Transmission Control Protocol/Internet Protocol.

Ethernet. A common LAN protocol is Ethernet. Many organizations use 100-gigabit Ether­ net, through which the network provides data transmission speeds of 100 gigabits (100 billion bits) per second. The 400-gigabit Ethernet is projected to be in service in 2017.

Transmission Control Protocol/Internet Protocol. The Transmission Con­ trol Protocol/Internet Protocol (TCP/IP) is the protocol of the Internet. TCP/IP uses a suite of protocols, the main ones being the Transmission Control Protocol (TCP) and the Internet Protocol (IP). The TCP performs three basic functions: (1) It manages the movement of data packets (see further on) between computers by establishing a connection between the com­ puters, (2) it sequences the transfer of packets, and (3) it acknowledges the packets that have been transmitted. The Internet Protocol (IP) is responsible for disassembling, delivering, and reassembling the data during transmission.

Before data are transmitted over the Internet, they are divided into small, fixed bundles called packets. The transmission technology that breaks up blocks of text into packets is called packet switching. Each packet carries the information that will help it reach its destination—the sender’s IP address, the intended recipient’s IP address, the number of packets in the message, and the sequence number of the particular packet within the message. Each packet travels independently across the network and can be routed through different paths in the network. When the packets reach their destination, they are reassembled into the original message.

It is important to note that packet-switching networks are reliable and fault tolerant. For example, if a path in the network is very busy or is broken, packets can be dynamically (“on the fly”) rerouted around that path. Also, if one or more packets do not get to the receiving com­ puter, then only those packets need to be re-sent.

Why do organizations use packet switching? The main reason is to achieve reliable end-to­ end message transmission over sometimes-unreliable networks that may have short-acting or long-acting problems.

The packets use the TCP/IP protocol to carry their data. TCP/IP functions in four layers (see Figure 6.6). The application layer enables client application programs to access the other layers, and it defines the protocols that applications use to exchange data. One of these appli­ cation protocols is the Hypertext Transfer Protocol (HTTP), which defines how messages are formulated and how they are interpreted by their receivers. (We discuss hypertext in Section 6.3.) The transport layer provides the application layer with communication and packet ser­ vices. This layer includes TCP and other protocols. The Internet layer is responsible for address­ ing, routing, and packaging data packets. The IP is one of the protocols in this layer. Finally, the network interface layer places packets on, and receives them from, the network medium, which can be any networking technology.

Two computers using TCP/IP can communicate even if they use different hardware and software. Data sent from one computer to another proceed downward through all four layers, beginning with the sending computer’s application layer and going through its network inter­ face layer. After the data reach the receiving computer, they travel up the layers.

FIGURE 6.6 The four layers of the TCP/IP reference model.

TCP/IP enables users to send data across sometimes-unreliable networks with the assur­ ance that the data will arrive in uncorrupted form. TCP/IP is very popular with business orga­ nizations because of its reliability and the ease with which it can support intranets and related functions.

Let’s look at an example of packet switching across the Internet. Figure 6.7 illustrates a message being sent from New York City to Los Angeles over a packet-switching network. Note that the different colored packets travel by different routes to reach their destination in Los Angeles, where they are reassembled into the complete message.

Types of Network Processing
Organizations typically use multiple computer systems across the firm. Distributed processing divides processing work among two or more computers. This process enables computers in dif­ ferent locations to communicate with one another through telecommunications links. A com­ mon type of distributed processing is client/server processing. A special type of client/server processing is peer-to-peer processing.

Client/Server Computing. Client/server computing links two or more comput­ ers in an arrangement in which some machines, called servers, provide computing services for user PCs, called clients. Usually, an organization performs the bulk of its processing or

FIGURE 6.7 Packet switching.

application/data storage on suitably powerful servers that can be accessed by less powerful client machines. The client requests applications, data, or processing from the server, which acts on these requests by “serving” the desired commodity.

Client/server computing leads to the ideas of “fat” clients and “thin” clients. As discussed in Technology Guide 1, fat clients have large storage and processing power and therefore can run local programs (such as Microsoft Office) if the network goes down. In contrast, thin clients may have no local storage and only limited processing power. Thus, they must depend on the network to run applications. For this reason, they are of little value when the network is not functioning.

Peer-to-Peer Processing. Peer-to-peer (P2P) processing is a type of client/server distributed processing in which each computer acts as both a client and a server. Each com­ puter can access (as assigned for security or integrity purposes) all files on all other computers. There are three basic types of peer-to-peer processing. The first type accesses unused CPU power among networked computers. An application of this type is SETI@home ( http:// setiathome.ssl.berkeley.edu ). These applications are from open-source projects, and they can

be downloaded at no cost.

The second form of peer-to-peer is real-time, person-to-person collaboration, such as Microsoft SharePoint Workspace ( http://office.microsoft.com/en-us/sharepoint-workspace).

This product provides P2P collaborative applications that use buddy lists to establish a connection and allow real-time collaboration within the application.

The third peer-to-peer category is advanced search and file sharing. This category is char­ acterized by natural language searches of millions of peer systems. It enables users to discover other users, not just data and web pages. One example of this category is BitTorrent.

BitTorrent ( www.bittorrent.com ) is an open-source, free, peer-to-peer file-sharing applica­ tion that simplifies the problem of sharing large files by dividing them into tiny pieces, or “tor­ rents.” BitTorrent addresses two of the biggest problems of file sharing: (1) downloading bogs down when many people access a file at once, and (2) some people leech, meaning they down­ load content but refuse to share it. BitTorrent eliminates the bottleneck by enabling all users to share little pieces of a file at the same time—a process called swarming. The program prevents leeching because users must upload a file while they download it. Thus, the more popular the content, the more efficiently it travels over a network.

Before you go on. . .
1. Compare and contrast the three wireline communications channels.

2. Describe the various technologies that enable users to send high-volume data over any network.

3. Describe the Ethernet and TCP/IP protocols.

The Internet and the World Wide Web
6.3

The Internet (“the Net”) is a global WAN that connects approximately 1 million organizational computer networks in more than 200 countries on all continents. It has become so widespread that it features in the daily routine of some 5 billion people.

The computers and organizational nodes on the Internet can be of different types and makes. They are connected to one another by data communications lines of different speeds. The primary network connections and telecommunications lines that link the nodes are re­ ferred to as the Internet backbone. For the Internet, the backbone is a fiber-optic network that is operated primarily by large telecommunications companies.

As a network of networks, the Internet enables people to access data in other organi­ zations and to communicate, collaborate, and exchange information seamlessly around the world, quickly and inexpensively. Thus, the Internet has become a necessity for modern businesses.

The Internet grew out of an experimental project of the Advanced Research Project Agency (ARPA) of the U.S. Department of Defense. The project began in 1969 as the ARPAnet. Its purpose was to test the feasibility of a WAN over which researchers, educators, military personnel, and government agencies could share data, exchange messages, and transfer files.

Today, Internet technologies are being used both within and among organizations. An in­ tranet is a network that uses Internet protocols so that users can take advantage of familiar applications and work habits. Intranets support discovery (easy and inexpensive browsing and search), communication, and collaboration inside an organization.

In contrast, an extranet connects parts of the intranets of different organizations. It also enables business partners to communicate securely over the Internet using virtual private net­ works (VPNs) (explained in Chapter 4). Extranets offer limited accessibility to the intranets of participating companies, as well as necessary interorganizational communications. They are widely used in the areas of business-to-business (B2B) electronic commerce (see Chapter 7) and supply chain management (SCM) (see Chapter 11).

No central agency manages the Internet. Instead, the costs of its operation are shared among hundreds of thousands of nodes. Thus, the cost for any one organization is small. Or­ ganizations must pay a small fee if they wish to register their names, and they need to install their own hardware and software to operate their internal networks. The organizations are obliged to move any data or information that enter their organizational network, regardless of the source, to their destination, at no charge to the senders. The senders, of course, pay the telephone bills for using either the backbone or regular telephone lines.

Accessing the Internet
You can access the Internet in several ways. From your place of work or your university, you can use your organization’s LAN. A campus or company backbone connects all of the various LANs and servers in the organization to the Internet. You can also log on to the Internet from your home or on the road, using either wireline or wireless connections.

Connecting through an Online Service. You can also access the Internet by opening an account with an Internet service provider. An Internet service provider (ISP) is a company that provides Internet connections for a fee. Large ISPs include Comcast ( www

.comcast.com ), AT&T ( www.att.com ), Time Warner Cable ( www.timewarnercable.com ), and Verizon ( www.verizon.com ).

ISPs connect to one another through network access points (NAPs). NAPs are exchange points for Internet traffic. They determine how traffic is routed. NAPs are key components of the Internet backbone. Figure 6.8 displays a schematic of the Internet. The white links at the top of the figure represent the Internet backbone; the white dots where the white links meet are the NAPs.

Connecting through Other Means. There have been several attempts to make access to the Internet cheaper, faster, and easier. For example, terminals known as Internet ki­ osks have been located in such public places as libraries and airports (and even in convenience stores in some countries) for use by people who do not have their own computers. Accessing the Internet from smartphones and tablets is common, and fiber-to-the-home (FTTH) is grow­ ing rapidly. FTTH involves connecting fiber-optic cable directly to individual homes. Table 6.2 summarizes the various means of connecting to the Internet. Satellite connections and Google Fiber are worth noting in more detail.

Connecting through satellite. See our discussion in Section 8.1.

170 CHAPTER 6 Telecommunications and Networking

The Internet and the World Wide Web 169

FIGURE 6.8 Internet (backbone in white).

© mstay/iStockphoto

TABLE 6.2

Internet Connection Methods

Service

Description

Dial-up

Still used in the United States where broadband is not available

DSL

Broadband access through telephone companies

Cable modem

Access over your cable TV coaxial cable. Can have degraded performance if many of your neighbors are accessing the Internet at once

Satellite

Access where cable and DSL are not available

Wireless

Very convenient, and WiMAX will increase the use of broadband wireless

Fiber-to-the-home (FTTH)

Expensive and usually placed only in new housing developments

Connecting through other means. See Google Project Loon and Facebook solar- powered drones in Section 8.1.

Google Fiber (FTTH). Google Fiber is a service that provides fiber-to-the-home. In No­ vember 2016, Google Fiber provided broadband Internet and cable television to approximately 453,000 customers in eight U.S. cities. As you see in IT’s About Business 6.2, Google has faced stiff competition in deploying the service, with a surprising outcome.

Addresses on the Internet. Each computer on the Internet has an assigned address, called the Internet Protocol (IP) address, that distinguishes it from all other computers. The IP address consists of sets of numbers, in four parts, separated by dots. For example, the IP ad­ dress of one computer might be 135.62.128.91. You can access a website by typing this number in the address bar of your browser.

Currently, there are two IP addressing schemes. The first scheme, IPv4, is the most widely used. IP addresses using IPv4 consist of 32 bits, meaning that there are 232 possibilities for IP addresses, or 4,294,967,295 distinct addresses. Note that the IP address in the preceding para­ graph (135.62.128.91) is an IPv4 address. At the time that IPv4 was developed, there were not as many computers that needed addresses as there are today. Therefore, a new IP addressing scheme has been developed, IPv6, because we have run out of available IPv4 addresses.

IP addresses using IPv6 consist of 128 bits, meaning that there are 2128 possibilities for dis­ tinct IP addresses, which is an unimaginably large number. IPv6, which is replacing IPv4, will accommodate the rapidly increasing number of devices that need IP addresses, such as smart- phones and devices that constitute the Internet of Things (see Section 8.4).

172 CHAPTER 6 Telecommunications and Networking

The Internet and the World Wide Web 171

IT’s About Business 6.2
The Rise and Fall of Google Fiber
MIS

Cable distribution giants such as Verizon ( www.verizon.com ), Time Warner Cable ( www.timewarnercable.com ), and Comcast ( www.comcast.com ) enjoy healthy profit margins on their Internet services. None of these companies, however, appears to have had plans to extend fiber-to-the-home services to additional geographi­ cal areas. Rather, their business goal was to sign up more people in their existing service areas. They have adopted this strategy because focusing on existing service areas adds the most revenue without increasing the companies’ capital costs. Essentially, there are no compelling business incentives for the established cable companies to expand their service offerings. This policy is unfortunate because most Americans have no choice but to do business with their local cable company. To compound this problem, few outside companies have the money to compete with the existing, cash-heavy telecom­ munications companies that control existing cable networks.

In direct competition with cable Internet providers, Google began installing and operating ultrafast fiber-optic cable service, known as Google Fiber ( http://fiber.google.com ), in U.S. cities. Goo­ gle Fiber was first deployed to homes in Kansas City (Kansas and Mis­ souri). By May 2016, Google Fiber was operating in eight U.S. cities.

Google Fiber competitors responded. In February 2016, AT&T announced that its GigaPower service ( www.att.com/internet/ gigapower.html ) was available to residents in Kansas City. Just like Google Fiber, GigaPower offered download speeds of 1 gigabit per second (1 Gbps) and cost $70 per month. For $120 per month, AT&T offered 1 Gbps Internet service along with a free television package. AT&T also began offering GigaPower in Austin, Texas, an­ other Google Fiber city. Interestingly, customers had to pay $29 per month more to opt out of AT&T’s Internet Preferences program, or AT&T would have tracked everything they did and then sold that information to third-party providers.

Another cable company joined the competition. Just months after Charlotte, North Carolina, was announced as a potential city for Google Fiber, Time Warner Cable announced that the cable company was increasing download speeds up to 300 megabits per second at no charge.

In early 2016, Louisville, Kentucky’s Metro Council voted to permit Google (or any other Internet Service Provider) to set up its equipment on utility poles owned by third parties, including AT&T. In response, AT&T, Charter Communications, and Frontier Commu­ nications launched a lawsuit against the city. The cable providers argued that they should not have to piggyback Google’s equipment on poles that they own and maintain. Using existing poles would

be the fastest, easiest, and cheapest way to launch Google Fiber in Louisville.

Google could bury its fiber optic cables. That process would address the issues in the lawsuit and build a service more resilient to bad weather and natural disasters. However, the process would be much more expensive and time-consuming. In November 2016, the lawsuit had not yet been settled or come to trial.

In a startling turn of events in August 2016, Google placed its Google Fiber project on hold. First, it seemed that Google thought that laying fiber was too expensive to be a viable business model. Second, Google was involved in legal battles with large Internet service providers over access to their telephone poles. Most im­ portantly, very fast Wi-Fi transmitters can be mounted on the tops of tall buildings to beam Internet access directly to users far more cheaply than laying fiber optic cable.

In June 2016, Google announced that it would buy Webpass ( www.webpass.net ), which provides gigabit residential Internet access through wireless technology. In November 2016, it appeared that the next two cities scheduled for Google Fiber—San Jose, Cal­ ifornia, and Portland, Oregon—would instead receive gigabit Inter­ net wirelessly.

Sources: Compiled from C. Forrest, “Why Google Fiber Failed: 5 Reasons,” TechRepublic, December 20, 2016; S. Fiegerman, “Google Puts the Brakes on Fiber and Plans for Layoffs,” CNN Money, October 26, 2016; J. Brodkin, “Google Fiber Division Cuts Staff by 9%, ‘Pauses’ Fiber Plans in 11 Cities,” Ars Technica, October 25, 2016; D. Wakabayashi, “Google Curbs Expansion of Fiber Optic Network, Cutting Jobs,” New York Times, October 25, 2016;

J. Brodkin, “Charter, Like AT&T, Sues Louisville to Stall Google Fiber,” Ars Technica, October 5, 2016; M. Reilly, “Google Fiber Stalls as the Industry Gears Up for Ultrafast Wireless,” MIT Technology Review, August 15, 2016;

D. Morris, “Frontier Lines Up Against Google Fiber in AT&T Fight over Utility Pole Access,” Fortune, July 2, 2016; T.C. Sottek, “Comcast Is Afraid of Google Fiber,” The Verge, March 17, 2016; D. Patterson, “Google and AT&T: Fighting Fiber with Fiber,” TechRepublic, March 4, 2016; C. Forest, “AT&T Goes to War with Google Fiber in Louisville: Why Ma Bell Could Win and What It Could Mean,” TechRepublic, March 1, 2016; A. Burlacu, “Google Fiber Wins Another Round in Battle with Time Warner Cable and AT&T,” Tech Times, February 18, 2016; http://fiber.google.com , accessed November 15, 2016.

Questions

1. Describe the competitive reactions of the cable companies to Google Fiber.

2. When the cable companies matched Google Fiber’s cost and speed at no extra charge, do you think they had a public re­ lations problem? Why or why not? Support your answer.

3. Discuss how this case illustrates the difficulty in keeping up with rapid advances in information technology.

IP addresses must be unique so that computers on the Internet know where to find one an­ other. The Internet Corporation for Assigned Names and Numbers (ICANN) ( www.icann.org ) co­ ordinates these unique addresses throughout the world. Without that coordination, we would not have one global Internet.

Because the numeric IP addresses are difficult to remember, most computers have names as well. ICANN accredits certain companies called registrars to register these names, which are derived from a system called the domain name system (DNS). Domain names consist of multi­ ple parts, separated by dots, that are read from right to left. For example, consider the domain

name business.auburn.edu . The rightmost part (or zone) of an Internet name is its top-level domain (TLD). The letters edu in business.auburn.edu indicate that this is an educational site. The following are popular U.S. TLDs:

com commercial sites

edu educational sites

mil military government sites

gov civilian government sites

org organizations

To conclude our domain name example, auburn is the name of the organization (Auburn University), and business is the name of the particular machine (server) within the organization to which the message is being sent.

A TLD is the domain at the highest level in the hierarchical Domain Name System of the Internet. The top-level domain names are located in the root zone (rightmost zone) of the name. Management of most TLDs is delegated to responsible organizations by ICANN. ICANN operates the Internet Assigned Numbers Authority (IANA), which is in charge of maintaining the DNS root zone. Today, IANA distinguishes the following groups of TLDs:

· Country-code top-level domains (ccTLD): Two-letter domains established for countries or territories. For example, de stands for Germany, it for Italy, and ru for Russia.

· Internationalized country code top-level domains (IDN ccTLD): These are ccTLDs in non- Latin character sets (e.g., Arabic or Chinese).

· Generic top-level domains (gTLD): Top-level domains with three or more characters. gTLDs initially consisted of .gov, .edu, .com, .mil, .org, and .net. In late 2000, ICANN introduced

.aero, .biz, .coop, .info, .museum, .name, and .pro.

The U.S. National Telecommunications & Information Administration (NTIA), a part of the U.S. Commerce Department, announced that it would turn over control of the Internet Domain Name System to the California-based nonprofit, Internet Corporation for Assigned Names and Numbers on October 1, 2016. Until September 30, 2016, ICANN was contracted by the Department of Com­ merce to administer the Internet Assigned Numbers Authority (IANA) under oversight of the NTIA. IANA manages changes to the top-level domains of the DNS, which is maintained by Verisign.

After October 1, 2016, ICANN will be doing its work on behalf of an international “multi­ stakeholder community” composed predominantly of technology companies. The U.S. govern­ ment states that if the U.S. does not turn these functions over to ICANN, such a move could lend weight to arguments from nations such as China and Russia that Internet governance should be nationalized or turned over to the United Nations.

The Future of the Internet
Researchers assert that if Internet bandwidth is not improved rapidly, then within a few years the Internet will be able to function only at a much-reduced speed. The Internet is sometimes too slow for data-intensive applications such as full-motion video files (movies) and large med­ ical files (X-rays). The Internet is also unreliable and is not secure. As a result, Internet2 has been developed by many U.S. universities collaborating with industry and government. Internet2 develops and deploys advanced network applications such as remote medical diagnosis, digi­ tal libraries, distance education, online simulation, and virtual laboratories. It is designed to be fast, always on, everywhere, natural, intelligent, easy, and trusted. Note that Internet2 is not a separate physical network from the Internet. For more details, see www.internet2.edu .

The World Wide Web
Many people equate the Internet with the World Wide Web. However, they are not the same thing. The Internet functions as a transport mechanism, whereas the World Wide Web is an

application that uses those transport functions. Other applications, such as e-mail, also run on the Internet.

The World Wide Web (The Web, WWW, or W3) is a system of universally accepted stan­ dards for storing, retrieving, formatting, and displaying information through a client/server architecture. The web handles all types of digital information, including text, hypermedia, graphics, and sound. It uses graphical user interfaces (GUIs) (explained in Technology Guide 2), so it is very easy to navigate.

Hypertext is the underlying concept defining the structure of the World Wide Web. Hy­ pertext is the text displayed on a computer display or other electronic device with references, called hyperlinks, to other text that the reader can immediately access, or where text can be revealed progressively at additional levels of details. A hyperlink is a connection from a hyper­ text file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen, or by touching the screen.

Organizations that wish to offer information through the web must establish a home page, which is a text and graphical screen display that usually welcomes the user and provides basic information on the organization that has established the page. In most cases, the home page will lead users to other pages. All the pages of a particular company or individual are collec­ tively known as a website. Most web pages provide a way to contact the organization or the individual. The person in charge of an organization’s website is its webmaster. (Note: webmas­ ter is a gender-neutral title.)

To access a website, the user must specify a uniform resource locator (URL), which points to the address of a specific resource on the web. For example, the URL for Microsoft is http://www.microsoft.com. Recall that HTTP stands for hypertext transport protocol. The remain­ ing letters in this URL— www.microsoft.com —indicate the domain name that identifies the web server that stores the website.

Users access the web primarily through software applications called “browsers.” Brows­ ers provide a graphical front end that enables users to point and click their way across the web, a process called surfing. Web browsers became a means of universal access because they deliver the same interface on any operating system on which they run. As of November 2016, Google Chrome was the leading browser, with 49 percent of users worldwide. Microsoft Edge’s share fell to 37 percent of users worldwide.

Before you go on. . .
1. Describe the various ways that you can connect to the Internet.

2. Identify each part of an Internet address.

3. Describe the difference between the Internet and the World Wide Web.

4. What are the functions of browsers?

Network Applications: Discovery
6.4

Now that you have a working knowledge of what networks are and how you can access them, the key question is: How do businesses use networks to improve their operations? In the next four sections of this chapter, we explore four network applications: discovery, communication, collaboration, and education. These applications, however, are merely a sampling of the many network applications currently available to users. Even if these applications formed an exhaus­ tive list today, they would not do so tomorrow when something new will be developed. Fur­ thermore, placing network applications in categories is difficult because there will always be borderline cases. For example, telecommuting combines communication and collaboration.

The Internet enables users to access, or discover information, located in databases all over the world. By browsing and searching data sources on the web, users can apply the Internet’s

174 CHAPTER 6 Telecommunications and Networking

Network Applications: Discovery 173

discovery capability to areas ranging from education to government services to entertainment to commerce. Although having access to all this information is a great benefit, it is critically im­ portant to realize that there is no quality assurance for information on the web. The web is truly democratic in that anyone can post information to it. Therefore, the fundamental rule about information on the web is “User beware!”

Think about discovery in 1960. How did you find information? You probably had to go to the library to check out a physical book. Contrast that process with how you would discover that information today. In fact, the overall trends in discovery have been:

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Instant Assignment Writer
Premium Solutions
Financial Assignments
Best Coursework Help
Write My Coursework
A+GRADE HELPER
Writer Writer Name Offer Chat
Instant Assignment Writer

ONLINE

Instant Assignment Writer

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$22 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$50 Chat With Writer
Financial Assignments

ONLINE

Financial Assignments

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$34 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$27 Chat With Writer
Write My Coursework

ONLINE

Write My Coursework

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$30 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$39 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

AMERICAN HISTORY (WRITING ASSIGNMENT) - Opposite of still life - Grand canyon university children's functional health pattern assessment - Values of plate element slenderness limits - Thesis Draft - Acc 202 final project presentation to investors - The art of composing printed material from letterforms is called - Healthcare Financial Management FINAL PROJECT - Serenity nail salon trudeau beaute - Presentation on social work - Compare and contrast 2 page essay on criminal law definition of "burglary" - Bsbmkg501 assessment 1 - Excel document edit - DISCUSSION - Unable to configure flowset flowset busy - Experiment 1 classification of bones - Epiphany prayer service catholic - Brian tracy self discipline youtube - Cc-7 - Nunthorpe academy staff email - Annual holding cost formula - Http www plagiarism org plag_article_citation_styles html - Sentinel lymph node biopsy icd 10 pcs - Iowa test of basic skills - Hey - Generator rotor earth fault - Summary 2 - How does beowulf kill the dragon - Muscles of the shoulder region - Head to toe pumpkin peel 30 - Bloomberg market concepts economic indicators & currencies - Case study - Inclusions and Exclusions of Gross Income - Larkin hospital nursing school - Case Study Analysis - 100 word discusion questions on the below topic follow instructions due today at 3:00 pm - Corporate finance chapter 12 solutions - I will not be commanded sons of anarchy song lyrics - Brian thomas hot rod - Chap. 6 Q HR - Ucsd political science faculty - What is the unknown metal identified as in this lab - Captive product pricing example - Meeting logistics checklist template - Evidence Based Capstone Project - Zara clothing annual report 2017 - This question - Self service banner web - Twg services limited direct debit - The gatekeeper a case study in the selection of news - Waren sports supply accounts receivable aged trial balance 2017 - Film critical intro thinking about film pkg - 8-1 Discussion: Integrating Multiple Networks - JUSTIFICATIONS AS DEFENSES - Titration gizmo answer key activity a - My last duchess critical analysis - The discretionary assistance fund - Http www learner org courses envsci interactives carbon - Does either configuration violate the pauli exclusion principle - Assignment OE - Borderlands 2 mother lover rewards - Snhu acc 202 final project presentation - Buzan mind map software - Does siemens own bosch - Conduction loss in diode - JUSTIFICATIONS AS DEFENSES - What are the major differences between public and private investigations - City of smithville project answers - How to make the best out of a bad situation - Prime factors in index form - Due in 20 hours - The book thief images - What is short run in economics - Slavery expanded with the growth of _____ - Elimination Complexities - What was khufu's greatest accomplishment - Persuasive speech outline on donating to charity - #4 Project review - Statement of intention for persuasive essay - American pharoah stallion register - Melbourne solar system trail - Author's purpose worksheet 5 answers - Ass2 2 - My choice children's homes - What effect does leasing have on a firm's balance sheet - Regression Exercise in Python - Government and politics grade boundaries - In the jilting of granny weatherall who is cornelia - Earthwear clothiers suppliers - Questions - Rmit interview questions - Why does the rydberg equation only work for hydrogen - Top executives - Ufo passage on teas test - Test of problem solving 3 - Http www yourleadershiplegacy com assessment html - Verbose data in informatica - Poem 7 syllables per line - University of greenwich application deadline - Planning is a function that involves