Across all types and sizes of organizations, the Internet and networks have changed the way that business is conducted. Twenty years ago, computers were glorified typewriters that could not communicate with one another. If we wanted to communicate we used the telephone. Today computers constantly exchange data with each other over distance and time to provide companies with a number of significant advantages. The convergence of access technologies, cloud, 5G networks, multitasking mobile operating systems, and collaboration platforms continues to change the nature of work, the way we do business, how machines interact, and other things not yet imagined. In this chapter you will learn about the different types of networks, how they affect the way that businesses communicate with customers, vendors, and other businesses, and how the largest network, the Internet, is enabling massive automatic data collection efforts from “things” rather than from people.
Today’s managers need to understand the technical side of computer networks to make intelligent investment decisions that impact operations and competitive position. Enterprises run on networks—wired and mobile—and depend upon their ability to interface with other networks and applications. Computer networks are changing significantly in their capacity and capabilities.
Computers on a network are called nodes. The connection between computers can be done via cabling, most commonly through Ethernet, or wirelessly through radio waves. Connected computers share resources, such as the Internet, printers, file servers, and other devices. The multipurpose connections enabled by a network allow a single computer to do more than if it were not connected to other devices. The most well-known network is the Internet.
Computer networks are typically categorized by their scope. Common types of networks are shown in Table 4.2. Of these, LAN and WAN are the two primary and best-known categories of networks.
TABLE 4.2 Types of Networks
Acronym | Type | Characteristics | Example |
LAN | Local Area Network | Connects network devices over a relatively short distance Owned, controlled, and managed by one individual or organization |
Office building School Home |
WAN | Wide Area Network | Spans a large physical distance Geographically dispersed collection of LANs Owned and managed by multiple entities |
Internet Large company |
WLAN | Wireless Local Area Network | LAN based on Wi-Fi wireless network technology | Internet Large company |
MAN | Metropolitan Area Network | Spans a physical area larger than a LAN but smaller than a WAN Owned and operated by a single entity, e.g., government agency, large company |
City Network of suburban fire stations |
SAN | Storage Area Network Server Area Network |
Connects servers to data storage devices | High-performance database |
CAN | Campus Area Network Cluster Area Network |
Spans multiple LANs but smaller than a MAN | University Local business campus |
PAN | Personal Area Network | Spans a small physical space, typically 35 feet or less Connects personal IT devices of a single individual |
Laptop, smartphone, and portable printer connected together |
Intranets are used within a company for data access, sharing, and collaboration. They are portals or gateways that provide easy and inexpensive browsing and search capabilities. Colleges and universities rely on intranets to provide services to students and faculty. Using screen sharing and other groupware tools, intranets can support team work.
An extranet is a private, company-owned network that can be logged into remotely via the Internet. Typical users are suppliers, vendors, partners, or customers. Basically, an extranet is a network that connects two or more companies so they can securely share information. Since authorized users remotely access content from a central server, extranets can drastically reduce storage space on individual hard drives.
A major concern is the security of the transmissions that could be intercepted or compromised. One solution is to use virtual private networks (VPNs), which encrypt the packets before they are transferred over the network. VPNs consist of encryption software and hardware that encrypt, send, and decrypt transmissions, as shown in Figure 4.2. In effect, instead of using a leased line to create a dedicated, physical connection, a company can invest in VPN technology to create virtual connections routed through the Internet from the company’s private network to the remote site or employee. Extranets can be expensive to implement and maintain because of hardware, software, and employee training costs if hosted internally rather than by an application service provider (ASP).
To be able to evaluate the different types of networks and the factors that determine their functionality, you need to be familiar with the following network terminology:
The mission of a modem/DSU-CSU is to adapt the information signal so that it can move through the media without significant attenuation. Typically “significant attenuation” means that the signal has not lost more than half of its original power.
Generally speaking, the media bandwidth (in hertz) can be defined as the range of frequencies (i.e., fmax − fmin) at which the signal has not lost more than 50% of its power. Upon coding-modulation techniques, it is possible to pack many binary symbols in one hertz (many binary symbols per second), for example, it is possible to pack 5 bits in each hertz of the signal. So if the bandwidth is 200,000 hertz then up to 1,000,000 bits/s (2000,000 hertz *5 bits/hertz) can be transmitted.
A different modulation/coding technique (i.e., for the same signal and the same media) might pack 10 bits per every hertz of bandwidth and up to 2 Mbits/s (200,000 hertz *10 bits/hertz = 2 Mbits/s). The media bandwidth provided should be capable of transporting this coded-modulated signal without significant attenuation.
Figure 4.5 describes the basic business functions supported business networks: communication, mobility, collaboration, relationships, and search. These functions depend on network switches and routers—devices that transmit data packets from their source to their destination based on IP addresses. A switch acts as a controller, enabling networked devices to talk to each other efficiently. For example, switches connect computers, printers, and servers within an office building. Switches create a network. Routers connect networks. A router links computers to the Internet, so users can share the connection. Routers act like a dispatcher, choosing the best paths for packets to travel.
Investments in network infrastructure, including data networks, IP addresses, routers, and switches are business decisions because of their impact on productivity, security, user experiences, and customer service.
An important management decision is the network’s quality of service (QoS), especially for delay-sensitive data such as real-time voice and high-quality video. The higher the required QoS, the more expensive the technologies needed to manage organizational networks. Bandwidth-intensive apps are important to business processes, but they also strain network capabilities and resources. Regardless of the type of traffic, networks must provide secure, predictable, measurable, and sometimes guaranteed services for certain types of traffic. For example, QoS technologies can be applied to create two tiers of traffic:
The ability to prioritize and throttle network traffic is referred to as traffic shaping and forms the core of the hotly debated Net neutrality issue, which is discussed in IT at Work 4.1.
Net neutrality is a principle that Internet service providers (ISPs) and their regulators treat all Internet traffic the same way. It’s essentially equal opportunity for Internet speeds and access to website—no unfair fast or slow lanes and no blocking of anything that’s legal on your phone, computer, or table.
The basic technology that makes global communication possible is a network protocol commonly known as an Internet Protocol (IP). Each device attached to a network has a unique IP address that enables it to send and receive files. Files are broken down into blocks known as packets in order to be transmitted over a network to their destination’s IP address. Initially, networks used IP Version 4 (IPv4). In April 2014 ARIN, the group that oversees Internet addresses, reported that IPv4 addresses were running out—making it urgent that enterprises move to the newer IP Version 6 (IPv6) (Figure 4.6).
The IPv6 Internet protocol has features that are not present in IPv4. For example, IPv6 simplifies aspects of how addresses are assigned, how networks are renumbered and places responsibility for packet fragmentation when packets are processed in routers. The IPv6 protocol does not offer direct interoperability with IPv4, instead it creates a parallel, independent network. Fortunately, several transition mechanisms, such as NAT64 and 6rd, have been developed to allow IPv6 hosts to communicate with IPv4 servers.
Network protocols serve the following three basic functions:
The capacity and capabilities of data networks provide opportunities for more automated operations and new business strategies. M2M communications over wireless and wired networks automate operations, for instance, by triggering action such as sending a message or closing a valve. The speed at which data can be sent depends on several factors, including capacity, server usage, computer usage, noise, and the amount of network traffic. Transfer rate or speed is an instantaneous measurement.
Over the past 20 years, networks have evolved from 3G networks designed for voice and data to 4G and 5G networks that support broadband Internet connectivity. In its 2016 report, SNS Research, a major market analysis and consulting firm, announced its forecast of 5G network contribution to the world economy. Experts predict that by 2020, “LTE and 5G infrastructure investments are expected to account for a market worth $32 billion” (PRNewswire, 2016).
3G networks support multimedia and broadband services over a wider distance and at faster speeds than prior generation networks. 3G networks have far greater ranges than 1G and 2G networks since they use large satellite connections to telecommunication towers.
4G networks are digital, or IP, networks that enable even faster data transfer rates. 4G delivers average realistic download rates of 3 Mbps or higher (as opposed to theoretical rates, which are much higher). In contrast, today’s 3G networks typically deliver average download speeds about one-tenth of that rate.
5G networks—the coming generation of broadband technology. 5G builds on the foundation created by 4G. 5G will dramatically increase the speed at which data is transferred across the network.
Unlike its predecessors, 2G and 3G that have a circuit-switched subsystem, 4G is based purely on the packet-based IP. Users can obtain 4G wireless connectivity through one of the following standards:
Improved network performance, which is measured by its data transfer capacity, provides fantastic opportunities for mobility, mobile commerce, collaboration, supply chain management, remote work, and other productivity gains.
5G mobile networks will offer huge gains in both speed and capacity over existing 4G networks—along with opportunities at the operations and strategic levels. In the short term, the 5G infrastructure build-out will create new jobs. In the longer term, 5G will create entirely new markets and economic opportunities driven by superior mobile capabilities in industries ranging from health care to automotive.
5G networks are designed to support the escalation in mobile data consumption, with users demanding higher data speeds and traffic volumes expected to increase by hundreds or even thousands of times over the next 10 years. It is likely that 5G networks will have to deliver baseline data speeds of 100 Mbit/s and peak speeds of up to 10 Gbit/s. 5G will make it easier to send texts, make calls, and download and upload Ultra HD and 3D videos. 5G operates with a 5-Ghz signal and is set to offer speeds of up to 1 gigabyte per second for tens of thousands of connections or tens of megabytes per second for tens of thousands of connections.
The move to 5G is being driven by the significant increase in the number of devices to be supported. Mobile networks will no longer be concerned primarily with person-to-person communications, as the Internet of Things (IoT) creates billions of new devices for remote sensing, telemetry, and control applications which will lead to huge numbers of machine-to-machine and person-to-machine interactions. Although 5G isn’t expected until 2020, many organizations are already investing in the infrastructure required to run this new mobile wireless standard.
All generations of networks are based on switching. Prior to 4G, networks included circuit switching, which is slower than packet switching. 4G was first to be fully packet switched, which significantly improved performance. The two basic types of switching are as follows:
Wireless networks use packet switching and wireless routers whose antennae transmit and receive packets. At some point, wireless routers are connected by cables to wired networks. The first real network to run on packet-switching technology was ARPAnet described in Tech Note 4.1.
When software developers create applications, they must write and compile the code for a specific operating system (OS). Figure 4.7 lists the common OSs. Each OS communicates with hardware in its own unique way; each OS has a specific API that programmers must use. Video game consoles and other hardware devices also have application program interfaces (APIs) that run software programs.
An API consists of a set of functions, commands, and protocols used by programmers to build software for an OS. The API allows programmers to use predefined functions or reusable codes to interact with an OS without having to write a software program from scratch. APIs simplify the programmer’s job.
APIs are the common method for accessing information, websites, and databases. They were created as gateways to popular apps such as Twitter, Facebook, and Amazon and enterprise apps provided by SAP, Oracle, NetSuite, and many other vendors.
The current trend is toward automatically created APIs that are making innovative IT developments possible. Here are two examples of the benefits of automated APIs:
APIs deliver more than half of all the traffic to major companies like Twitter and eBay. APIs are used to access business assets, such as customer information or a product or service, as shown in Figure 4.8. IT developers use APIs to quickly and easily connect diverse data and services to each other. APIs from Google, Twitter, Amazon, Facebook, Accuweather, Sears, and E*Trade are used to create many thousands of applications. For example, Google Maps API is a collection of APIs used by developers to create customized Google Maps that can be accessed on a Web browser or mobile devices. Tech Note 4.2 describes a new API that Amazon developed for its Internet assistant, Alexa.
In the 21st-century global economy, advanced wireless networks are a foundation on which global economic activity takes place. Current 4G and 5G networks and technologies provide that foundation for moving entire economies. For any nation to stay competitive and prosperous, it is imperative that investment and upgrades in these technologies continue to advance to satisfy demand. Cisco forecasts that the average global mobile connection speed will more than double from the current 1.4 to 3 Mbps and 5G networks are promising speeds that will be 100 times faster than current speeds. The factors that are driving global mobile traffic are shown in Figure 4.9.
Select the caption to view an interactive version of this figure online.
In its most recent Visual Networking Index Forecast (VNI), Cisco reported that mobile data traffic has grown 400 million times over the past 15 years. They also predict that by 2020 monthly global mobile data traffic will be 30.6 Exabytes; number of mobile-connected devices will exceed 11.6 billion (exceeding the world’s projected population of 7.8 billion) and smartphones will account for 81% of total mobile traffic. This includes a major increase in machine-to-machine communications and the number of wearable technology devices.
Smartphone users are expected to rise from the 2.6 billion reported in 2014 to 6.1 billion in 2020 and 80% of these new smartphone users will be located in Asia Pacific, the Middle East, and Africa. Much of that traffic will be driven by billions of devices talking to other devices wirelessly and consumers’ growing demand for more and more videos.
According to the Cisco Visual Networking Index (VNI): Forecast and Methodology 2015–2020. (Cisco 2016), annual global IP traffic will reach 2.3 Zettabytes or 194 Exabytes per month and smartphone traffic will exceed PC traffic by 2020. Figure 4.10 lists the milestones that mobile data traffic will reach by 2020.
This increase in mobile networks capacity and use is increasing the demand for high-capacity mobile networks. The four drivers of the increase in global mobile traffic demand are shown in Figure 4.10. Demand for high-capacity networks is growing at unprecedented rates. Examples of high-capacity networks are wireless mobile, satellite, wireless sensor, and VoIP (voice over Internet Protocol) such as Skype. Voice over IP (VoIP) networks carry voice calls by converting voice (analog signals) to digital signals that are sent as packets. With VoIP, voice and data transmissions travel in packets over telephone wires. VoIP has grown to become one of the most used and least costly ways to communicate. Improved productivity, flexibility, and advanced features make VoIP an appealing technology.
Enterprises are moving away from the ad hoc adoption of mobile devices and network infrastructure to a more strategic planning build-out of their mobile capabilities. As technologies that make up the mobile infrastructure evolve, identifying strategic technologies and avoiding wasted investments require more extensive planning and forecasting. Factors to consider are the network demands of multitasking mobile devices, more robust mobile OSs, and their applications. Mobile infrastructure consists of the integration of technology, software, support, standards, security measures, and devices for the management and delivery of wireless communications, including the following.
Bluetooth is a short-range—up to 100 meters or 328 feet—wireless communications technology found in billions of devices, such as smartphones, computers, medical devices, and home entertainment products. When two Bluetooth-enabled devices connect to each other, this is called pairing.
Wi-Fi is the standard way computers connect to wireless networks. Nearly all computers have built-in Wi-Fi chips that allow users to find and connect to wireless routers. The router must be connected to the Internet in order to provide Internet access to connected devices.
Wi-Fi technology allows devices to share a network or Internet connection without the need to connect to a commercial network. Wi-Fi networks beam packets over short distances using part of the radio spectrum, or they can extend over larger areas, such as municipal Wi-Fi networks. However, municipal networks are not common because of their huge costs. See Figure 4.11 for an overview of how Wi-Fi works.
There are three general types of mobile networks: wide area networks (WANs), WiMAX, and local area networks (LANs). WANs for mobile computing are known as wireless wide area networks (WWANs). The range of a WWAN depends on the transmission media and the wireless generation, which determines which services are available. The two components of wireless infrastructures are wireless LANs and WiMAX.
Wireless LANs use high-frequency radio waves to communicate between computers, devices, or other nodes on the network. A wireless LAN typically extends an existing wired LAN by attaching a wireless AP to a wired network.
Wireless broadband WiMAX transmits voice, data, and video over high-frequency radio signals to businesses, homes, and mobile devices. It was designed to bypass traditional telephone lines and is an alternative to cable and DSL. WiMAX is based on the IEEE 802.16 set of standards and the metropolitan area network (MAN) access standard. Its range is 20–30 miles and it does not require a clear line of sight to function. Figure 4.12 shows the components of a WiMAX/Wi-Fi network.
The mashup of GPS positioning and short-range wireless technologies, such as Bluetooth and Wi-Fi, can provide unprecedented intelligence. These technologies create opportunities for companies to develop solutions that make a consumer’s life better. They could, for example, revolutionize traffic and road safety. Intelligent transport systems being developed by car manufacturers allow cars to communicate with each other and send alerts about sudden braking and will even allow for remote driving in the future. In the event of a collision, the car’s system could automatically call emergency services. The technology can also apply the brakes automatically if it was determined that two cars were getting too close to each other or alert the driver to a car that is in their blind spot in the next lane.
Advancements in networks, devices, and RFID sensor networks are changing enterprise information infrastructures and business environments dramatically. The preceding examples and network standards illustrate the declining need for a physical computer, as other devices provide access to data, people, or services at anytime, anywhere in the world, on high-capacity networks.
If you’ve used AirDrop on your smartphone you’ve engaged in near-field communication. NFC is a location-aware technology that is more secure than other wireless technologies like Bluetooth and Wi-Fi. And, unlike RFID, NFC is a two-way communication tool. An NFC tag contains small microchips with tiny aerials which can store a small amount of information for transfer to another near-field communication (NFC) device, such as a mobile phone.
Location-aware NFC technology can be used to transfer photos and files, make purchases in restaurants, resorts, hotels, theme parks and theaters, at gas stations, and on buses and trains. Here are some examples of NFC applications and their potential business value.
Another interesting near-field application is described in IT at Work 4.2 when technology was used as an incentive in a marketing campaign by Warner Music.
Bluetooth and Wi-Fi seem similar to near-field communication on the surface. All three allow wireless communication and data exchange between digital devices like smartphones. The difference is that near-field communication utilizes electromagnetic radio fields while technologies such as Bluetooth and Wi-Fi focus on radio transmissions instead.
When you are choosing a mobile network solution, it’s important to carefully consider the four factors shown in Figure 4.13.
Select the caption to view an interactive version of this figure online.
Now more than ever, business gets done through information sharing and collaborative planning. Business performance depends on broadband data networks for communication, mobility, and collaboration. For example, after Ford Motor Company began relying on UPS Logistics Group’s data networks to track millions of cars and trucks and to analyze any potential problems before they occur, Ford realized a $1 billion reduction in vehicle inventory and $125 million reduction in inventory carrying costs annually.
More and more people need to work together and share documents over time and distance. Teams make most of the complex decisions in organizations and many teams are geographically dispersed. This makes it difficult for organizational decision-making when team members are geographically spread out and working in different time zones.
Messaging and collaboration tools include older communications media such as e-mail, videoconferencing, fax, and texts—and blogs, Skype, Web meetings, and social media. Yammer is an enterprise social network that helps employees collaborate across departments, locations, and business apps. These private social sites are used by more than 400,000 enterprises worldwide. Yammer functions as a communication and problem-solving tool and is rapidly replacing e-mail. You will read about Yammer in detail in Chapter 7.
Leading businesses are moving quickly to realize the benefits of virtual collaboration. Several examples appear below.
One of the most publicized examples of information sharing exists between Procter & Gamble (P&G) and Walmart. Walmart provides P&G with access to sales information on every item Walmart buys from P&G. The information is collected by P&G on a daily basis from every Walmart store, and P&G uses that information to manage the inventory replenishment for Walmart.
Supermarket chain Asda (www.asda.com) has rolled out Web-based electronic data interchange (EDI) technology to 650 suppliers. Web EDI technology is based on the AS2 standard, an internationally accepted HTTP-based protocol used to send real-time data in multiple formats securely over the Internet. It promises to improve the efficiency and speed of traditional EDI communications, which route data over third-party, value-added networks (VANs).
Unilever’s 30 contract carriers deliver 250,000 truckloads of shipments annually. Unilever’s Web-based database, the Transportation Business Center (TBC), provides these carriers with site specification requirements when they pick up a shipment at a manufacturing or distribution center or when they deliver goods to retailers. TBC gives carriers all of the vital information they need: contact names and phone numbers, operating hours, the number of dock doors at a location, the height of the dock doors, how to make an appointment to deliver or pick up shipments, pallet configuration, and other special requirements. All mission-critical information that Unilever’s carriers need to make pickups, shipments, and deliveries is now available electronically 24/7.
Caterpillar, Inc. is a multinational heavy-machinery manufacturer. In the traditional mode of operation, cycle time along the supply chain was long because the process involved paper—document transfers among managers, salespeople, and technical staff. To solve the problem, Caterpillar connected its engineering and manufacturing divisions with its active suppliers, distributors, overseas factories, and customers through an extranet-based global collaboration system. By means of the collaboration system, a request for a customized tractor component, for example, can be transmitted from a customer to a Caterpillar dealer and on to designers and suppliers, all in a very short time. Customers also can use the extranet to retrieve and modify detailed order information while the vehicle is still on the assembly line.
Managers and staff continuously make decisions as they develop and manufacture products, plan social media marketing strategies, make financial and IT investments, determine how to meet compliance mandates, design software, and so on. By design or default, group processes emerge, referred to as group dynamics, and those processes can be productive or dysfunctional.
Group work can be quite complex depending on the following factors:
Despite the long history and benefits of collaborative work, groups are not always successful.
Brainstorming ideas is no longer limited to a room full of people offering their ideas that are written on a whiteboard or posters. Companies are choosing an alternative—online brainstorming applications, many of them cloud-based. An advantage is the avoidance of travel expenses if members are geographically dispersed, which often restricts how many sessions a company can afford to hold. The following are two examples of online brainstorming apps:
The Internet of Things has the potential to impact how we live and how we work. The IoT is a subset of the Internet which dictates that objects we interact with everyday send and receive signals to and from each other to exchange data about almost everything. The IoT can best be described as a collection technology in that it collects data from millions of data sensors embedded in everything from cars to refrigerators to space capsules. This aggregation of data points through smart meters, sensors, etc. contribute to the “Internet of Things” (IoT).
Analytics, big data, and sensor integrations are revolutionizing how we live and work. A recent study conducted by IndustryWeek (2016), reported that more than half of U.S. manufacturers report they are currently using IoT technology to collect machine data, and a significant but smaller percentage (44%) are collecting data from sensors embedded in their products.
Several things have created the “perfect storm” for the creation and growth of the IoT. These include more widely available broadband Internet, lower cost of connecting, development of more devices with Wi-Fi capabilities and embedded sensors, and the overwhelming popularity of the smartphone. In layperson’s terms, the IoT is the concept of connecting any device that has an on/off switch to the Internet or each other. This includes everything from everyday items such as cellphones, coffee makers, washing machines, lamps, and headphones to airplane jet engines or an oil rig drill, smart traffic signals, smart parking, traffic congestion monitoring, air pollution sensors, potable water monitoring, and river, dam, and reservoir water level monitors. In other words, if it can be connected, it will be connected. Just think of the IoT as a giant network of connected “things” with relationships between people-to-people, people-to-things, and things-to-things.
The primary driver for IoT is the broader adoption and deployment of sensors and smart devices. Some industries have had IoT in place for quite some time, but for others it is an entirely new concept. Lately, IoT has been gaining in popularity and use. The use of the smaller sensors, as compared to the traditional IT infrastructure, enables companies to gain more computing capacity and reduce power consumption for less cost. All in all, it’s a win-win situation.
It has been estimated that the number of network-connected sensors and devices could triple to 21 billion by 2020 (IndustryWeek, 2016).
The heart of IoT resides in the source of the data, that is, the sensors. Sensors generate data about activities, events, and influencing factors that provide visibility into performance and support decision processes across a variety of industries and consumer channels.
With a combination of smart meters, wireless technology, sensors, and software, the smart grid allows utilities to accurately track power grids and cut back on energy use when the availability of electricity is stressed. And consumers gain insight into their power consumption to make more intelligent decisions about how to use energy.
A fully deployed smart grid has the potential of saving between $39.69 and $101.57, and up to 592 pounds of carbon dioxide emissions, per consumer per year in the United States, according to the Smart Grid Consumer Collaborative (SGCC).
On a broader scale, the IoT can be applied to things like “smart cities” that can help reduce waste and improve efficiency. IT at Work 4.3 describes how a town in Spain is using the IoT to improve everyday life for its’ citizens, or is it?
Network security and data privacy are manufacturers’ top concerns about IoT technology. With billions of devices connected together there are a multitude of end-points where security breaches can occur and individuals or organizations can be hacked.
Organizations are struggling with the advantages and disadvantages associated with the IoT and seeking to understand how it will impact their business.
Wireless hospitals and remote patient monitoring, for example, are growing IoT trends. Tracking medical equipment and hospital inventory, such as gurneys, is done with RFID tagging at a number of hospitals. Remote monitoring apps are making health care easier and more comfortable for patients while reaching patients in remote areas.
Organizations can expect to gain from using the IoT in a number of ways, for example, expected benefits from using IoT include the following:
Similarly, there are concerns around using the IoT and the ability to collect and analyze the massive amounts of data that it enables. Main disadvantages that organizations have about the use of IoT include the following:
3G
4G
5G
application program interface (API)
Bluetooth
circuit switching
computer networks
Exabyte
extranet
fixed-line broadband
group dynamics
information and communications technology (ICT)
Internet of Things
Internet Protocol (IP)
Intranet
IP address
IP Version 4 (IPv4)
IP Version 6 (IPv6)
latency-sensitive apps
local area network (LAN)
Long-Term Evolution (LTE)
mashup
near-field communication (NFC)
Net neutrality
Net semi-neutrality
packet
packet switching
protocol
quality of service (QoS)
router
sensors
smart grid
smart city
switch
traffic shaping
transmission control protocol/Internet protocols (TCP/IPs)
virtual private networks (VPNs)
voice over IP (VoIP)
wide area network (WAN)
Wi-Fi
WiMAX
Zettabyte