table of contents - cengage · 2015. 4. 15. · chapter 10 free resources communicating digital...

39
Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 1 Table of Contents Tap or click any topic below to view its content. TABLE OF CONTENTS.............................................................................................................................................. 1 DISCLAIMER ........................................................................................................................................................... 3 SHARING HARDWARE, DATA, AND INFORMATION ................................................................................................ 4 HIGH-TECH TALK: STAR, BUS, AND RING NETWORK TOPOLOGIES.......................................................................... 5 STAR NETWORK ............................................................................................................................................................. 5 BUS NETWORK .............................................................................................................................................................. 5 RING NETWORK ............................................................................................................................................................. 6 FILE SHARING PROGRAMS ..................................................................................................................................... 8 MINI FEATURE 10-1: MOBILE COMMUNICATIONS ................................................................................................. 9 COMMUNICATIONS PACKAGES ..........................................................................................................................................9 Calling ...................................................................................................................................................................9 Messaging ............................................................................................................................................................. 9 Data ......................................................................................................................................................................9 MESSAGING APPS .......................................................................................................................................................... 9 Text/Picture/Video Messaging Apps ................................................................................................................... 10 Internet Messaging .............................................................................................................................................10 Voice and Video Calling.......................................................................................................................................11 ETHICS & ISSUES 10-2: DO THE BENEFITS OF TELEMEDICINE OUTWEIGH THE RISKS? ........................................... 12 Websites about Telemedicine ............................................................................................................................. 12 HIGH-TECH TALK: OSI REFERENCE MODEL ........................................................................................................... 13 TECHNOLOGY INNOVATOR: ROBERT METCALFE .................................................................................................. 16 SECURE IT 10-1: MONITORING NETWORK TRAFFIC .............................................................................................. 17 Websites about Monitoring Network Traffic ......................................................................................................17 FINDING LOCATIONS BASED ON IP ADDRESSES ................................................................................................... 18 802.11 STANDARDS ............................................................................................................................................. 19 LTE ....................................................................................................................................................................... 20 TECHNOLOGY INNOVATOR: AT&T ....................................................................................................................... 21 TECHNOLOGY INNOVATOR: VERIZON .................................................................................................................. 22 MINI FEATURE 10-2: BLUETOOTH TECHNOLOGY .................................................................................................. 23 BLUETOOTH-ENABLED OR BLUETOOTH-ENHANCED DEVICES.................................................................................................23 BLUETOOTH TECHNOLOGY IS STANDARDIZED GLOBALLY ......................................................................................................23 SECURE IT 10-2: PREVENTING BLUEBUGGING ...................................................................................................... 25 Websites about Preventing Bluebugging ............................................................................................................25 RFID TAGS ............................................................................................................................................................ 26

Upload: others

Post on 13-Mar-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 1

Table of Contents Tap or click any topic below to view its content.

TABLE OF CONTENTS .............................................................................................................................................. 1

DISCLAIMER ........................................................................................................................................................... 3

SHARING HARDWARE, DATA, AND INFORMATION ................................................................................................ 4

HIGH-TECH TALK: STAR, BUS, AND RING NETWORK TOPOLOGIES .......................................................................... 5

STAR NETWORK ............................................................................................................................................................. 5 BUS NETWORK .............................................................................................................................................................. 5 RING NETWORK ............................................................................................................................................................. 6

FILE SHARING PROGRAMS ..................................................................................................................................... 8

MINI FEATURE 10-1: MOBILE COMMUNICATIONS ................................................................................................. 9

COMMUNICATIONS PACKAGES .......................................................................................................................................... 9 Calling ................................................................................................................................................................... 9 Messaging ............................................................................................................................................................. 9 Data ...................................................................................................................................................................... 9

MESSAGING APPS .......................................................................................................................................................... 9 Text/Picture/Video Messaging Apps ................................................................................................................... 10 Internet Messaging ............................................................................................................................................. 10 Voice and Video Calling ....................................................................................................................................... 11

ETHICS & ISSUES 10-2: DO THE BENEFITS OF TELEMEDICINE OUTWEIGH THE RISKS? ........................................... 12

Websites about Telemedicine ............................................................................................................................. 12

HIGH-TECH TALK: OSI REFERENCE MODEL ........................................................................................................... 13

TECHNOLOGY INNOVATOR: ROBERT METCALFE .................................................................................................. 16

SECURE IT 10-1: MONITORING NETWORK TRAFFIC .............................................................................................. 17

Websites about Monitoring Network Traffic ...................................................................................................... 17

FINDING LOCATIONS BASED ON IP ADDRESSES ................................................................................................... 18

802.11 STANDARDS ............................................................................................................................................. 19

LTE ....................................................................................................................................................................... 20

TECHNOLOGY INNOVATOR: AT&T ....................................................................................................................... 21

TECHNOLOGY INNOVATOR: VERIZON .................................................................................................................. 22

MINI FEATURE 10-2: BLUETOOTH TECHNOLOGY .................................................................................................. 23

BLUETOOTH-ENABLED OR BLUETOOTH-ENHANCED DEVICES ................................................................................................. 23 BLUETOOTH TECHNOLOGY IS STANDARDIZED GLOBALLY ...................................................................................................... 23

SECURE IT 10-2: PREVENTING BLUEBUGGING ...................................................................................................... 25

Websites about Preventing Bluebugging ............................................................................................................ 25

RFID TAGS ............................................................................................................................................................ 26

Page 2: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 2

NFC TECHNOLOGY ............................................................................................................................................... 27

HOW TO: 10-3: STRENGTHEN YOUR WIRELESS SIGNAL ........................................................................................ 28

TECHNOLOGY INNOVATOR: CISCO ....................................................................................................................... 29

SECURE IT 10-3: DETECTING AN INTRUDER ACCESSING YOUR WIRELESS HOME NETWORK ................................. 30

Websites about Detecting Wireless Home Network Intruders ............................................................................ 30

MINI FEATURE 10-3: PLANNING AND DESIGNING YOUR HOME NETWORK .......................................................... 31

FACTORS AFFECTING WIRELESS HOME NETWORK SPEEDS AND RANGES ................................................................................. 31

HOW TO 10-4: CREATE A HOME NETWORK ......................................................................................................... 32

Websites about Creating a Home Network ........................................................................................................ 32

ETHICS & ISSUES 10-3: SHOULD ISPS BE ALLOWED TO CAP YOUR INTERNET USAGE? .......................................... 33

Websites about Data Capping ............................................................................................................................ 33

TECHNOLOGY TREND: WIRELESS CHARGING ........................................................................................................ 34

SECURE IT 10-4: FAKE CELL TOWERS ARE TRACKING DEVICES .............................................................................. 36

Websites about Fake Cell Towers ....................................................................................................................... 36

ETHICS & ISSUES 10-4: SHOULD PHONE COMPANIES BE ALLOWED TO FORCE CUSTOMERS TO SWITCH FROM

LANDLINES TO MOBILE PHONES? ........................................................................................................................ 37

Websites about Phone Companies and Landlines ............................................................................................... 37

TECHNOLOGY TREND: GEOCACHING .................................................................................................................... 38

TECHNOLOGY @ WORK: AGRICULTURE ............................................................................................................... 39

Websites about Technology in Agriculture ......................................................................................................... 39

Page 3: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 3

Disclaimer Cengage Learning and the Shelly Cashman authoring team do not support and are not responsible for

the content of material in third-party or external web/Internet sites. Opinions expressed at third-party

or external web/Internet sites do not necessarily reflect that of Cengage Learning or the Shelly Cashman

authoring team.

The Free Resources include links to web addresses at dscov.com. Web addresses with this domain will

redirect to the actual websites or resources listed and are provided as abbreviated links for students

who wish to type them into a browser.

Tap or click here to return to the Table of Contents.

Page 4: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 4

Sharing Hardware, Data, and Information Many operating systems allow you to share files, folders, and printers with other users on the same

network. File, folder, and hardware sharing can be convenient in a networked environment, but it also

can introduce security concerns if these features are enabled and you do not protect them. For example,

unscrupulous people on the network might attempt to gain access to files and folders on your computer

without your knowledge or permission.

The following steps guide you through the process of managing sharing settings.

1. When you share files, folders, and hardware devices from a computer, other users on the network

need to know the computer’s name so that they can access the shared resources. Access the operating

system’s control panel, settings, or system preferences and then tap or click the option to display the

computer’s name. Record the name so that you can communicate it to those who may need to access

the shared resources.

2. Tap or click the option to display sharing settings.

3. Browse the various sharing options. Enable the sharing settings you intend to use, and disable those

you do not plan to use.

4. If you are sharing files or folders, select the files and folders you want to share. If you have multiple

user accounts configured on the computer, select who can access the files and folders and whether they

can view their contents or view and edit them.

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

File, folder, and hardware sharing can introduce security concerns if these features are enabled and you

do not protect them.

True

False

Tap or click here to return to the Table of Contents.

Page 5: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 5

High-Tech Talk: Star, Bus, and Ring Network Topologies A network topology refers to the layout of the computers and devices in a communications network.

Three basic network topologies are star, bus, and ring. Most networks, including the Internet, use

combinations of these basic topologies. Thus, you should be familiar with the layout of communications

in these topologies.

Star Network On a star network, all of the computers and devices (nodes) on the network connect to a central device,

thus forming a star (Figure 1). All data that transfers from one node to another passes through the

central device, which can be a hub or a switch. Star networks are fairly easy to install and maintain.

Nodes can be added to and removed from the network with little or no disruption to the network. If one

node fails, only that node is affected (as long as that node is not providing services to other nodes on

the network). The other nodes continue to operate normally. If the central device fails, however, the

entire network is inoperable until the device is repaired. Most large star networks, therefore, keep a

duplicate of the central devices available in case the primary one fails.

Figure 1: A star network contains a single, central device through which all computers and devices on the network communicate.

Bus Network A bus network consists of a single central cable to which all computers and other devices connect

(Figure 2). The bus is the physical cable that connects the computers and other devices. The bus in a bus

network transmits data, instructions, and information in both directions. When a sending device

Page 6: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 6

transmits data, the address of the receiving device is included with the transmission so that the data is

routed to the appropriate receiving device.

Bus networks are inexpensive and easy to install. One advantage of the bus and star networks is that

computers and other devices can be attached and detached at any point on the bus without disturbing

the rest of the network.

Another advantage is that failure of one device usually does not affect the rest of the bus network. The

greatest risk to a bus network is that the bus itself might become inoperable. If that happens, the

network remains inoperative until the bus is back in working order.

Figure 2: Devices on a bus network share a single data path.

Ring Network On a ring network, a cable forms a closed loop (ring) with all computers and devices arranged along the

ring (Figure 3). Data transmitted on a ring network travels from device to device around the entire ring,

in one direction. If a computer or device on a ring network fails, the entire network potentially could

stop functioning. A ring network can span a larger distance than a bus network, but it is more difficult to

install. The ring topology primarily is used for LANs, but it also is used in WANs.

Figure 3: On a ring network, all connected devices form a continuous loop.

Page 7: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 7

If you have or were to create a home network, which network topology would be easiest for you

install and maintain?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Two advantages of a ring network are that computers and devices can be attached and detached

without disturbing the network and that the rest of the network generally is not affected if one device

fails.

True

False

Tap or click here to return to the Table of Contents.

Page 8: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 8

File Sharing Programs The following list identifies popular file sharing programs. You can find additional information by

entering the list items as search text.

Ares

BearShare

BitTorrent

eMule

FrostWire

Shareaza

Discover More: To display search results about file sharing programs in a new browser window or tab,

tap or click this link: dscov.com/16/10r2. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 9: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 9

Mini Feature 10-1: Mobile Communications A communications package is necessary to make calls, send or receive messages, or access the Internet

from smartphones and devices over a provider's network. Many users also install apps on their devices

for sending and receiving messages over the Internet. The following sections discuss communications

packages and messaging apps.

Communications Packages Mobile users often choose a communications package based on three services: calling, messaging, and

data. Subscribers need to specify the level of service they require from their calling, messaging, and data

plans. While some providers offer unlimited service for some or all of these, it is important to select a

communications package that meets your needs.

Calling Calling plans allow users to purchase a number of minutes per month available to make or receive

phone calls. Many mobile service providers offer a number of minutes per month to be used for

business or daytime hours and a larger number of minutes to be used for calls that take place during

nights and weekends.

Messaging A text messaging plan determines the number of text, or SMS, messages that a user can send and

receive. Users may select a plan with a small fee per message, or they may pay a monthly charge for a

limited or unlimited number of text messages. Many users opt for the higher fee for unlimited

messaging plans, as the number of messages sent and received can add up quickly. As an alternative,

some users choose third-party apps to exchange free text messages.

Data Subscribing to a data plan allows you to access Internet resources from your smartphone or tablet. You

need a data plan if you want to use your mobile device to browse the web, access online social

networks, check email, stream audio or video, or manage or view your files on the cloud from anywhere,

without having to rely on a Wi-Fi connection.

Pricing for data plans is based on the amount (in gigabytes) of data the plan permits you to transfer in a

month or the number of devices sharing the plan. Some providers offer unlimited data, while others

charge based on the amount of data transferred. If you purchase a smartphone, some providers require

you to subscribe to a data plan on their network. Unlimited data plans generally provide unlimited data

for a single device. Some providers allow users of limited data plans to "roll over" their unused data,

making additional quantities of data not transferred during one month available for future use.

Messaging Apps Many users also install third-party apps for exchanging text, picture, and video messages with their

mobile devices.

Page 10: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 10

Text/Picture/Video Messaging Apps The following list identifies names of popular messaging apps and services that allow users to send or

receive free text messages. Some require an account on an online social network. Some may display

advertising with each message sent or received. You can find additional information by entering the list

items as search text, or look for them in the app store for your device.

Facebook Messenger

Google Hangouts

iMessage

Kik

Text Free

Text Now

WhatsApp (free for the first year, small annual fee thereafter)

Internet Messaging Internet messaging allows users to exchange messages via the Internet and is a popular alternative to

sending text, or SMS, messages that require a mobile messaging plan. In addition to chatting online,

some services also offer voice or video calling and file sharing capabilities.

The following list identifies popular apps and services that allow users to send and receive Internet

messages using a messaging app or website on computers or mobile devices. You can find additional

information by entering the name of the list item as search text.

AOL Instant Messenger

Facebook Messenger

Google Hangouts

Skype

Yahoo! Instant Messenger

Users who have accounts on multiple Internet messaging services need to sign in to each service to send

and receive messages using that service. To simplify the process of running and signing in to a dedicated

app for each service, aggregator apps allow users to provide their account information to individual

messaging services with a single app. The aggregator app signs in to each of the user’s accounts on

various Internet messaging services and manages messages sent or received through each service.

The following list identifies popular Internet messaging aggregator apps or websites. You can find

additional information by entering the name of the list item as search text.

AIM

Adium.im (MacOS only)

Digsby

Nimbuzz

Pidgin

Page 11: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 11

Trillian.im

Voice and Video Calling VoIP services enable users to make audio or video calls using their computers and mobile devices. Some

VoIP services also allow users to hold multi-person calls, share screens, and exchange files.

The following list identifies popular VoIP services. You can find additional information by entering the

name of the list item as search text.

FaceTime

Google Hangouts

Messages (Mac OS only)

Skype

Yahoo! IM

Consider the activities discussed in this mini feature. Which mobile service providers, apps, and

services do you use the most? Which apps do you use to exchange text messages?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

If you have an unlimited data plan for your smartphone, you can send any number of text, or SMS,

messages using your text messaging plan at no additional cost.

True

False

Tap or click here to return to the Table of Contents.

Page 12: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 12

Ethics & Issues 10-2: Do the Benefits of Telemedicine Outweigh the

Risks? The resources listed in the table below contain more information about telemedicine. As an alternative

to tapping, clicking, or entering the web address, you can find desired information by entering search

text from the table’s Website Name or Description column.

Websites about Telemedicine

Website Name Description Web Address

Fox News Video titled “Virtual healthcare a big benefit to some, wrong choice for others”

dscov.com/16/10e2a

Modern Healthcare Article titled “Mayo Clinic partners with kiosk maker in virtual visits pilot”

dscov.com/16/10e2b

Tap or click here to return to the Table of Contents.

Page 13: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 13

High-Tech Talk: OSI Reference Model Every message sent over a network — even the simplest email message — must be divided into discrete

packages of data and routed via transmission media, such as phone lines. While traveling from the

sending computer or mobile device to the receiving computer or mobile device, each data package can

take a different path over the network. How do these messages get to their destination, intact and

accurate?

The Open Systems Interconnection (OSI) reference model, a communications standard developed by the

International Organization for Standardization (ISO), offers an answer. The OSI reference model

describes the flow of data in a network through seven layers, from the user’s application to the physical

transmission media.

A simple way to understand the OSI reference model is to think of it as an elevator (Figure 4). On the

sending end, data enters at the top floor (the application layer) and travels to the bottom floor (the

physical layer). Each layer communicates with the layers immediately above and below it. When a layer

receives data, it performs specific functions, adds control information to the data, and passes it to the

next layer. The control information contains error-checking, routing, and other information needed to

ensure proper transmission along the network.

Figure 4: The seven layers of the OSI reference model.

Page 14: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 14

The application layer, which is the top layer, serves as the interface between the user and the

network. Using application software, such as an email program, a user can type a message and

specify a recipient. The app then prepares the message for delivery by converting the message

data into bits and attaching a header identifying the sending and receiving computers or mobile

devices.

The presentation layer translates the converted message data into a language the receiving

computer or mobile device can process (from ASCII to EBCDIC, for example) and also may

compress or encrypt the data. Finally, the layer attaches another header specifying the

language, compression, and encryption schemes.

The session layer establishes and maintains communications sessions. A session is the period

between establishment of a connection, transmission of the data, and termination of the

connection.

The transport layer, also called the end-to-end layer, ensures that data arrives correctly and in

proper sequence. The transport layer divides the data into segments and creates a checksum, a

mathematical sum based on the data, and puts this information in the transport header. The

checksum later is used to determine if the data was scrambled during transmission.

The network layer routes the message from sender to receiver. This layer splits the data

segments from the transport layer into smaller groups of bits called packets. Next, it adds a

header containing the packet sequence, the receiving computer or mobile device address, and

routing information. The network layer also manages network problems by rerouting packets to

avoid network congestion.

The data link layer supervises the transmission of the message to the next network node by

specifying the network technology (such as Ethernet or token ring) and grouping data

accordingly. The data link layer also calculates the checksum and keeps a copy of each packet

until it receives confirmation that the packet arrived undamaged at the next node.

The physical layer encodes the packets into a signal recognized by the medium that will carry

them — such as an analog signal to be sent over a phone line — and sends the packets along

that medium to the receiving computer or mobile device.

At the receiving computer or mobile device, the process is reversed and the data moves back through

the seven layers from the physical layer to the application layer, which identifies the recipient, converts

the bits into readable data, removes some of the error-checking and control information from the data,

and directs it to the appropriate application. A modified 5-layer model is used for data sent using the

Transmission Control Protocol (TCP) and/or the Internet Protocol (IP). This model includes the physical,

data link, network, transport, and application layers. The next time you send an email message to a

friend, consider the network communications processes described by the OSI reference model, which

ensure that your message travels safely over many networks to your friend’s computer or mobile device.

In what ways might the OSI model assist those who work in the networking field?

Page 15: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 15

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

The network layer supervises the transmission of the message to the next network node by specifying

the network technology (such as Ethernet or token ring) and grouping data accordingly.

True

False

Tap or click here to return to the Table of Contents.

Page 16: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 16

Technology Innovator: Robert Metcalfe Robert Metcalfe promised to eat his words if his prediction of the Internet’s collapse in 1996 was wrong.

During his keynote speech at the WWW International Conference in 1997, he placed the paper

containing his prediction in a blender, mixed it with liquid, and drank the pulp.

Metcalfe certainly has been correct in predicting many other aspects of the Internet, however, primarily

the vision that his Ethernet invention would one day connect millions of computers worldwide.

Metcalfe’s fascination with linking computers developed while he was in college. At Harvard’s Project

MAC, he connected the university’s computers to ARPANET. Then, at Xerox’s Palo Alto Research Center

(PARC), he coinvented Ethernet in 1973.

Xerox managers did not see how Ethernet fit with the company’s primary business of photocopying, so

he left the company in 1979 to found 3Com Corporation and make Ethernet the standard for computer

communications. After his retirement from 3Com, he became a general partner in Polaris Venture

Partners, a venture capital firm that invests in the early stages of information technology and life

sciences companies. Since 2011 he has been teaching electrical engineering and holds the title of

Professor of Innovation and Murchison Fellow of Free Enterprise at the University of Texas at Austin.

Why would Metcalfe predict that the Internet would fail? What did he prove by literally eating his

words?

Answer the following question by tapping or clicking the best response, which will open a browser

window or tab that reveals whether your selection is correct or incorrect. Close the window or tab when

you are finished viewing it.

Robert Metcalfe is credited with establishing which network standard while at 3Com?

a. ARPANET

b. Ethernet

c. TCP/IP

d. Wi-Fi

Tap or click here to return to the Table of Contents.

Page 17: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 17

Secure IT 10-1: Monitoring Network Traffic The resources listed in the table below contain more information about packet sniffer software

monitors. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the table’s Website Name or Description column.

Websites about Monitoring Network Traffic

Website Name Description Web Address

about tech Article titled “Introduction to Packet Sniffing”

dscov.com/16/10s1a

Spam Laws Article titled “What is a Packet Sniffer and How Does It Work?”

dscov.com/16/10s1b

wikiHow Article titled “How to Sniff Packets” dscov.com/16/10s1c

Tap or click here to return to the Table of Contents.

Page 18: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 18

Finding Locations Based on IP Addresses The following list identifies popular websites that allow users to enter an IP address to determine a

computer or device’s location. You can find additional information by entering the list items as search

text.

Geobytes

infoSNIPER

IP Location

IP Tracker

IPAddress.com

IP-Lookup

Melissa Data

What Is My IP Address

Discover More: To display search results about IP address locators in a new browser window or tab, tap

or click this link: dscov.com/16/10r3. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 19: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 19

802.11 Standards The table below describes the various 802.11 standards. You can find additional information by entering

search text from the table’s Name column.

Name Description

802.11 The first WLAN standard created in 1997 by IEEE; maximum network bandwidth 2 Mbps; no longer in use

802.11a Created in 1999; maximum network bandwidth 54 Mbps; uses a regulated frequency spectrum; not compatible with 802.11b

802.11b Created in 1999; maximum network bandwidth 11 Mbps; home appliances sometimes interfered because the 802.11b technology used unregulated radio waves; not compatible with 802.11a

802.11ab Hybrid of 802.11a and 802.11b; connected devices cannot use both at the same time

802.11g WLAN products started supporting this standard in 2002 and 2003; maximum bandwidth speed 54 Mbps; broader range; backward compatible with 802.11b

802.11n Created in 2009; maximum bandwidth speed 300 Mbps; uses MIMO (Multiple In, Multiple Out) technology to increase range

802.11ac Maximum bandwidth speeds of 7 Gbps; backward compatible with previous versions; wider range

802.11ad Created in 2012; maximum bandwidth speeds of 7 Gbps

802.11af Also called White-Fi or Super Wi-Fi; uses open television white space frequencies; potential for long ranges, such as rural broadband; bandwidth speeds up to 568 Mbps

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

802.11a is the fastest Wi-Fi standard.

True

False

Tap or click here to return to the Table of Contents.

Page 20: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 20

LTE The latest enhancement to LTE, called LTE-Advanced or LTE-A, can provide bandwidth speeds up to 300

Mbps. Many LTE providers produce these faster speeds through carrier aggregation, which creates

wider channels by joining separate frequency bands together. LTE-A is both backward and forward

compatible, meaning that LTE devices will operate on an LTE-A network, and LTE-A devices will operate

on an LTE network. To experience the advantages of the LTE-A network, however, users will need an

LTE-A device.

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

LTE devices will not operate on an LTE-A network.

True

False

Tap or click here to return to the Table of Contents.

Page 21: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 21

Technology Innovator: AT&T One of the world’s largest communications companies has roots tracing back to Alexander Graham Bell’s

telephone invention in 1876. At that time, Bell secured the first patent for a working telephone and then

demonstrated his product to the public, scientists, and nobility. Just 10 years later, more than 150,000

people in the United States owned a telephone, and Bell Telephone Company was created to coordinate

this communications channel. The company later evolved into American Telephone & Telegraph

Company (AT&T) and became the world’s largest telephone company.

For most of the 20th century, AT&T held a monopoly on local and long distance telephone service. In

1982, however, the U.S. Department of Justice ordered AT&T to relinquish its local telephone

component and split this part of the business into seven regional “Baby Bells.” One of these new

companies, Southwestern Bell Corporation (SBC), was extremely successful in the global

telecommunications industry, eventually acquiring AT&T and other companies. SBC rebranded itself as

AT&T, acquired Cingular Wireless, and claimed its place as a leader in wired and wireless telephone

service, broadband Internet, U-verse television and Internet service, and more.

The company is in negotiations to acquire DIRECTV and to supply service to all 2016 Audi vehicles

equipped with Audi connect option. In 2014, the company was awarded, on average, one patent per

day, many of them for Internet of Things development. Its 4G LTE network covers 99 percent of

Americans, and service is expected to extend to Latin American with the company’s acquisition of

Iusacell, Mexico’s wireless company.

Have you used any AT&T networking services? If so, have your experiences been favorable or

unfavorable, and why did you choose this company over any of its competitors?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Southwestern Bell Corporation (SBC) acquired AT&T and other communications corporations and

subsequently evolved into one of the world’s largest telecommunications companies today.

True

False

Tap or click here to return to the Table of Contents.

Page 22: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 22

Technology Innovator: Verizon One of the largest mergers in United States’ history occurred when Bell Atlantic acquired GTE in 2000.

The company was renamed Verizon Communications, a combination of the words Veritas, the Roman

goddess of truth, and horizon.

The company’s wireless division was the first in the United States to offer the 4G LTE network; on its first

day of service, more than 110 million customers in 39 major markets could access this product. Its two

other units offer local phone and nationwide long distance service, broadband Internet services,

networking, security services, and Verizon Cloud, which provides cloud data storage.

The company’s global fiber-optic network serves more than 150 countries on 6 continents, and its

United States network, FiOS, was the first in the country to offer Internet, television, and phone service.

Verizon is the only telecommunications company that has been named repeatedly to Working Mother

magazine’s 100 Best Companies for Working Mothers list. Recently, it was ranked first in Fortune’s list of

the World’s Most Admired Companies. Verizon Wireless also boasts the highest customer loyalty,

profitability, and cost efficiency.

Do you subscribe to any Verizon services? If so, has your experience been favorable or unfavorable?

Why did you select Verizon instead of one of this company’s competitors?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Verizon was the first company in the United States to offer Internet, television, and phone service on its

FiOS network.

True

False

Tap or click here to return to the Table of Contents.

Page 23: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 23

Mini Feature 10-2: Bluetooth Technology The following sections discuss Bluetooth devices and standards.

Bluetooth-Enabled or Bluetooth-Enhanced Devices The following list identifies examples of devices that use Bluetooth. You can find additional information

by entering the text, bluetooth enabled, along with the appropriate list item, as search text.

Car stereos

Digital cameras

Gaming consoles

Handheld computers

Headsets

Media players

Modems

Printers

Smartphones

Tablets

Watches

Bluetooth Technology Is Standardized Globally Bluetooth technology is monitored by the Bluetooth Special Interest Group (SIG), which defines and

approves changes to Bluetooth standards. Although the SIG does not manufacture Bluetooth technology

products, its 20,000 members include telecommunications and technology manufacturers.

The following list identifies a few of the Bluetooth SIG members. You can find additional information by

entering the text, bluetooth, along with the appropriate list item, as search text.

Ericsson Technology Licensing

Intel

Lenovo

Microsoft

Motorola

Nokia

Toshiba

Have you used a Bluetooth device? If so, for what purpose? How was your experience? Can you think

of other benefits or risks to using Bluetooth?

Page 24: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 24

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

The SIG manufactures Bluetooth devices.

True

False

Tap or click here to return to the Table of Contents.

Page 25: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 25

Secure IT 10-2: Preventing Bluebugging The resources listed in the table below contain more information about security risks associated with

using Bluetooth technology. As an alternative to tapping, clicking, or entering the web address, you can

find desired information by entering search text from the table’s Website Name or Description column.

Websites about Preventing Bluebugging

Website Name Description Web Address

Better Business Bureau Article titled “Use Bluetooth? Protect Yourself from Hacking Scams”

dscov.com/16/10s2a

eHow Article titled “How to Prevent Bluebugging” dscov.com/16/10s2b

Gosafeonline.sg – Cyber Security Awareness Alliance

Article titled “The Bluetooth Security Issues”

dscov.com/16/10s2c

Tap or click here to return to the Table of Contents.

Page 26: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 26

RFID Tags RFID tags are either passive or active. An active RFID tag contains a battery that runs the chip’s circuitry

and broadcasts a signal to the RFID reader. A passive RFID tag does not contain a battery and, thus,

cannot send a signal until the reader activates the tag’s antenna by sending out electromagnetic waves.

Because passive RFID tags contain no battery, these can be small enough to be embedded in skin.

RFID chips commonly are implanted in animals to identify and track them. This may be for livestock

control or for laboratory purposes. Also, some people implant RFID tags in their pets to help locate a lost

pet. Although uses in people are controversial, implants can be used for identification, tracking, and

security, such as restricting access to buildings or computers.

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Passive RFID tags are small enough to be embedded in skin.

True

False

Tap or click here to return to the Table of Contents.

Page 27: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 27

NFC Technology Four common applications of NFC technology include the following:

Touch and go: provides access control for events or transportation

Touch and confirm: acknowledges an activity such as a mobile payment where users enter a

password and/or accept the transaction to confirm the payment

Touch and connect: links two NFC-enabled devices to allow data transfer, for example, to share

music, images, or contacts

Touch and explore: allows users to learn about various services offered or obtain additional

information

Discover More: To display search results about NFC devices in a new browser window or tab, tap or click

this link: dscov.com/16/10r7. Close the window or tab when you are finished viewing it.

Tap or click here to return to the Table of Contents.

Page 28: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 28

How To: 10-3: Strengthen Your Wireless Signal If the wireless network’s range is inadequate, consider purchasing a signal booster (also sometimes

referred to as a signal amplifier). A signal booster connects to the wireless router or wireless access

point at the location where the antenna would connect. If an antenna already is connected to the

wireless router or wireless access point, remove the antenna before connecting the signal booster.

Before purchasing a signal booster, record the manufacturer and model number for the wireless router

or wireless access point to make sure the signal booster you purchase is compatible with the wireless

router or wireless access point to which you want to connect.

A range extender, also referred to as a network extender or wireless repeater, also can increase the

strength of wireless signals in locations where they might be weak or nonexistent. A range extender,

which should be compatible with the wireless router or wireless access point to which you want to

connect it, should be within range of the wireless signal and configured to connect to the wireless

network. If a computer or mobile device is outside the range of the wireless router or wireless access

point’s signal, it can connect instead to the wireless signal transmitted from the range extender. If you

are attempting to extend the wireless signal throughout a large house, consider positioning the wireless

router or wireless access point in a central location and then using one or more range extenders to

reach the extremities of the house. Some range extenders also have Ethernet ports, enabling you to

connect wired devices such as desktops. In this scenario, the desktop communicates with the range

extender using the wired connection and then the signal is transmitted wirelessly from the range

extender to the wireless router or access point. Range extenders typically need only to plug into an

electrical outlet.

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Range extenders and signal boosters can work with any type of wireless router.

True

False

Tap or click here to return to the Table of Contents.

Page 29: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 29

Technology Innovator: Cisco Green networking practices have given Cisco Systems top ranking on the Vendor Matrix, a research tool

used to assess companies’ innovation and implementation of environmentally sound initiatives. Low

power consumption, green power supplies and switching tools, and sound recycling efforts are part of

the reason for Cisco’s high marks and for the company’s success.

Cisco manufactures a broad line of networking equipment for transporting data within a building, across

a campus, and across the globe. A group of computer scientists at Stanford University founded Cisco in

1984. From the start, the company focused on communicating over networks. Today, Cisco’s Internet

Protocol-based (IP) networking equipment is the basis of the Internet and most private networks. The

company is partnering with businesses to create new opportunities for Internet of Things and to power

cloud management systems.

More than 4 million students around the world have received certification credentials through the

company’s Cisco Networking Academy. Cisco certifications include Cisco Certified Entry Networking

Technician (CCENT), Cisco Certified Network Associate (CCNA), and Cisco Certified Network Professional

(CCNP). The certifications and training focus on building, designing, and maintaining networks.

Have you used any Cisco networking products? If so, have your experiences been favorable or

unfavorable? What are the benefits of earning a Cisco certification?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Cisco certifications measure proficiencies in building, designing, and maintaining networks.

True

False

Tap or click here to return to the Table of Contents.

Page 30: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 30

Secure IT 10-3: Detecting an Intruder Accessing Your Wireless Home

Network The resources listed in the table below contain more information about detecting an intruder accessing

your wireless home network. As an alternative to tapping, clicking, or entering the web address, you can

find desired information by entering search text from the table’s Website Name or Description column.

Websites about Detecting Wireless Home Network Intruders

Website Name Description Web Address

eHow Article titled “How to Detect a Wireless Intruder”

dscov.com/16/10s3a

HowStuffWorks Article titled “How to Secure Your Home Network”

dscov.com/16/10s3b

Spam Laws Article titled “Stop Network Intruders” dscov.com/16/10s3c

Tap or click here to return to the Table of Contents.

Page 31: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 31

Mini Feature 10-3: Planning and Designing Your Home Network The following section discusses factors affecting wireless home network speeds and ranges.

Factors Affecting Wireless Home Network Speeds and Ranges The speed and range of your home wireless network can vary based on a variety of issues. The following

list identifies a few factors that may affect the speed and/or range of your home network.

Distance from the router

Interference from other devices, such as microwaves or phones

Number of devices online

Physical barriers, such as walls or large objects that block the wireless signals

Speed of the ISP

Which version of the IEEE 802.11 standard your network uses, such as 802.11a (54 Mbit/second)

or 802.11n (600 Mbit/second)

Have you ever set up a wireless network? If so, what additional obstacles did you encounter? Have

you ever tried to improve your network speed or range? If so, what measures did you take?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

The version of the IEEE 802.11 standard your network uses can affect the network speed or range.

True

False

Tap or click here to return to the Table of Contents.

Page 32: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 32

How To 10-4: Create a Home Network The resources listed in the table below contain more information about creating a home network. As an

alternative to tapping, clicking, or entering the web address, you can find desired information by

entering search text from the table’s Website Name or Description column.

Websites about Creating a Home Network

Website Name Description Web Address

About.com Article titled “Home Networking Tutorial” dscov.com/16/10h4a

CNET Article titled “Home network explained, part 2: Optimizing your Wi-Fi network”

dscov.com/16/10h4b

PCMag Article titled “How To Set Up A Home Network In 5 Simple Steps”

dscov.com/16/10h4c

Tap or click here to return to the Table of Contents.

Page 33: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 33

Ethics & Issues 10-3: Should ISPs Be Allowed to Cap Your Internet

Usage? The resources listed in the table below contain more information about data capping. As an alternative

to tapping, clicking, or entering the web address, you can find desired information by entering search

text from the table’s Website Name or Description column.

Websites about Data Capping

Website Name Description Web Address

CNET Video titled “7 things Net neutrality won't do”

dscov.com/16/10e3a

Computerworld Article titled “Update: FTC sues AT&T for throttling bandwidth of 'unlimited' data customers”

dscov.com/16/10e3b

USA Today Article titled “What is net neutrality and what does it mean for me?”

dscov.com/16/10e3c

Tap or click here to return to the Table of Contents.

Page 34: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 34

Technology Trend: Wireless Charging Your need to search for an outlet or the cord to recharge your smartphone or mobile device may soon

be ending. Wireless technology being introduced in a variety of venues may solve the inconveniences

involved when battery power is waning.

Although a single wireless charging standard is not established yet, two trade groups have developed

competing technologies that many companies are adopting. The Wireless Power Consortium (WPC) is

supporting Qi (pronounced “chee”) chargers, which allow the device to be placed nearly two inches

away from the transmitter. LG, Philips, Samsung, Sony, and other companies already have developed

more than 500 Qi-compatible products. In addition, Toyota has adopted the Qi standard in its Toyota

Avalon, Camry, Lexus NX, and Scion xB vehicles.

The other wireless charging standard is a joint venture between the Power Matters Alliance and the

Alliance for Wireless Power (A4WP). Google and Starbucks have adopted this technology, and Starbucks

plans to place approximately one dozen wireless chargers manufactured by Powermat in each of its U.S.

company-owned stores in major markets. In these commercial settings, consumers simply will place

their smartphones on a mat located on or under the counter (Figure 5) and be required to receive an

advertisement in return for having the convenience of charging their devices.

Figure 5: Wireless technology charges some smartphones when the device is placed on a charging pad.

Cadillac and Audi are early adopters of the wireless charging technology with a safety incentive included

as a bonus. Drivers will place their smartphones or mobile devices in a charging box behind a display

screen and will not be able to access them during the charging process until the vehicle is parked.

Toyota vehicles equipped with the Qi chargers standard will not require the devices to be locked while

the vehicle is in motion.

To charge, a smartphone or mobile device needs a receiver that acquires the charge from a transmitter

coil. This receiver already is included in some products, and Samsung has offered replacement wireless

charging backs for some of its smartphones. If your device is not supported, then you will need to buy a

case that contains the receiver.

Would you be interested in adopting wireless charging technology, even if it means purchasing a new

case for your smartphone or an entirely new product? Why or why not? Would you purchase a vehicle

specifically because it has this charging option?

Page 35: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 35

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

Toyota, Cadillac, and Audi are introducing wireless charging technology in several of their models.

True

False

Tap or click here to return to the Table of Contents.

Page 36: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 36

Secure IT 10-4: Fake Cell Towers Are Tracking Devices The resources listed in the table below contain more information about issues related to fake cell

towers. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the table’s Website Name or Description column.

Websites about Fake Cell Towers

Website Name Description Web Address

Business Insider Article titled “Everything We Know About The Mysterious Fake Cell Towers Across The US That Could Be Tapping Your Phone”

dscov.com/16/10s4a

Engadget Article titled “Fake cellphone towers hiding in plain sight, intercepting your phone calls”

dscov.com/16/10s4b

Popular Science Article discusses how interceptors across the United States can eavesdrop on calls and intercept text messages.

dscov.com/16/10s4c

Tap or click here to return to the Table of Contents.

Page 37: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 37

Ethics & Issues 10-4: Should Phone Companies Be Allowed to Force

Customers to Switch from Landlines to Mobile Phones? The resources listed in the table below contain more information about phone companies and landlines.

As an alternative to tapping, clicking, or entering the web address, you can find desired information by

entering search text from the table’s Website Name or Description column.

Websites about Phone Companies and Landlines

Website Name Description Web Address

Daily Tech Article discussing the White House request that the FCC classify the Internet as a common carrier.

dscov.com/16/10e4a

Forbes Article titled “The End of the Wired Telephone Network is Coming...But Not Soon Enough”

dscov.com/16/10e4b

The Wall Street Journal Article titled “AT&T's Plan For the Future: No Landlines, Less Regulation”

dscov.com/16/10e4c

Tap or click here to return to the Table of Contents.

Page 38: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 38

Technology Trend: Geocaching A cache, in computer terms, stores frequently used instructions and data in memory. In the adventure

realm, a cache stores the prize that is part of a high-tech treasure hunt. Geocaching, which refers to

“geo” for geography and “cache” for a concealed treasure, is a form of outdoor recreation, discovery,

and fun. The only requirements are a smartphone or GPS, Internet access, and a sense of adventure.

Participants hide a small container, called a cache, that has a logbook and a writing instrument and

usually small novelty trinkets such as a coin, button, or toy. The container also may have a Trackable,

which is a tag etched with a code and can be moved from one location to another. The owners then

navigate to a website, such as geocaching.com, and post details of the container’s location using

latitudinal and longitudinal coordinates. Geocachers then use their smartphone or GPS device to find

the container, note their discovery in the logbook, and write about their adventure on the website or an

online social network. Popular geocaching apps include CacheSense, c:geo, , Geo Bucket, Geocaching by

Groundspeak, Looking 4 Cache, and Neongeo.

The first cache with GPS coordinates was documented in 2000. Today, more than 10 million people are

registered geocachers worldwide. The 2.5 million cache locations range from under water to mountain

peaks. GeoTours are growing in popularity, such as following the 110-mile Minnesota Paul Bunyan State

Trail with 100 geocaches and the Star-Spangled Banner tour sponsored by the National Park Service in

the Washington, D.C., area. Cachers generally follow the Geocacher’s Creed, which encourages ethical

behavior and preservation of natural resources.

Have you tried geocaching, or do you know anyone who has participated in this activity? If you have

not, would you like to attempt to find a geocache? According to geocaching.com, how many geocaches

are located near you?

Indicate whether the following statement is true or false by tapping or clicking your response, which

will open a browser window or tab that reveals whether your selection is correct or incorrect. Close the

window or tab when you are finished viewing it.

The millions of geocachers around the world bury their containers and then receive monetary

compensation when that treasure is located.

True

False

Tap or click here to return to the Table of Contents.

Page 39: Table of Contents - Cengage · 2015. 4. 15. · Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices Discovering Computers 2016 Page 5

Chapter 10 Free Resources COMMUNICATING DIGITAL CONTENT: Wired and Wireless Networks and Devices

Discovering Computers 2016 Page 39

Technology @ Work: Agriculture The resources listed in the table below contain more information about how the agriculture industry

uses technology. As an alternative to tapping, clicking, or entering the web address, you can find desired

information by entering search text from the table’s Website Name or Description column.

Websites about Technology in Agriculture

Website Name Description Web Address

Business Insider Article titled “15 Emerging Agriculture Technologies That Will Change The World”

dscov.com/16/10w1a

CropLife Article titled “Top 5 Trends in Agriculture Technology”

dscov.com/16/10w1b

Iowa Pathways Article titled “The Science and Technology of Agriculture”

dscov.com/16/10w1c

Tap or click here to return to the Table of Contents.