Free Essay

Cis 500

In: Computers and Technology

Submitted By blcgreen
Words 1202
Pages 5
Wireless Networks
4G Wireless Networks

Britney Green
CIS 500: Information Systems for Decision Making
Professor Frank Lazzara
November 4, 2012

4G Wireless Networks

“Wireless networks use packet switching and wireless networks. Patching switching is when the path of the signal is digital and is neither dedicated nor exclusive. Routers are devices that forward packets from one network to another network. Packets occur when the network breaks a file or e-mail message into smaller blocks of specific size. Wireless routers are actually wired routers with wireless access points (WAP) built in. It provides both wired and wireless at the same time”. (Turban & Volonino, 2011)
Third generation also called 3G; of cellular telecommunications technology supports multimedia and broadband services. Broadband means fast transmission speed. It is faster than the 1G and 2G. The third generation networks have far greater ranges because they use large satellite connections that connect to telecommunication towers. The fourth generation is called 4G. 4G mobile network standards enable faster data transfer rates. (Turban & Volonino) Right now 4G is the latest generation of wireless data technologies. It carries average download rates of 3 Mbps or more. “In contrast, today's 3G networks typically deliver average download speeds about one-tenth of that rate. The 2G and 3G started separately with their own purposes; soon both will be converted to the 4G network” (Turban & Volonino). 4G does not use a circuit-switched subsystem, as do the 2G and 3G networks. 4G operates on the packet-based Internet Protocol. Users can get 4G through WiMax or LTE (long term evolution). WiMax is the Worldwide Interoperability for Microwave Access and is based on the IEEE 802.16 standard. It is being used by Sprint, Comcast, and Time-Warner Cable to deliver wireless broadband. Long-Term Evolution is a Global System for Mobile Communication (GSM) based technology that is used by Verizon, AT&T, and T-Mobile. Turban & Volonino demonstrated the growth of high-capacity networks on table 4.1 (Turban & Volonino). The network standard EDGE (Enhanced Data for Global Evolution) uses 3G and has a capacity of 474 Kbps; it is used by Cingular and T-Mobile. The network standard EV-DO (Evolution Data Only) uses the third generation and has a capacity of 2.4 Mbps; it is used by Verizon and Sprint. Wireless Broadband (WiBro) uses the 4G, and has a capacity of 50 Mbps. WiBro provides handover functionally and 4G networks will integrate wired and wireless networks to enable seamless service anytime, anywhere. It was manufactured and launched in South Korea. WiMax standard network also uses 4G and has a capacity of 70 Mbps that enables delivery from network to user WiBro access, as an alternative to cable and DSL. LTE uses the fourth generation and has a capacity of 277 Mbps. This standard was developed by the 3GPP, the same standards body already responsible for the GSM, GPRS, UMTS, and HSDPA standards. (Turban & Volonino, 2011)
Being that the fourth generation carries more network power than 3G it is obviously known to be faster. It delivers a faster download rate than 3G. The faster access that 4G provides allows users to browse the web, download pictures, stream music and many other features. “According to Huff Post Tech website, 4G will not fix technical problems like coverage gaps or dropped calls, but it could cause other issues. Faster wireless could lead to bigger bills because users will use more data if they have access to 4G network. AT&T has already seen an increase in data usage by users, almost an 8,000 percent increase. AT&T charges an extra ten dollars for ever GB over the limit. While Verzion offers unlimited 4G LTE for around thirty dollars, but not all cities are covered and have access to 4G.” (Lee, 2011)

Users of these wireless networks have “tweeted” how they feel about 3G and 4G networks. I read tweets on twitter and some people feel that 4G is not faster. A user stated, “is it just me or has 3g gone super slow since 4g started? I think its no faster they just slowed 3g down to make it appear so #conspiracy.” Another user said, “What's the point of having a 4g phone that acts like 3G or no G?” Many users use social networks on their mobile devices which run on either 3G or 4G. The fourth generation LTE has an advantage over the third generation only because it is designed to be available faster than the rest. It also is strikes problems when it is not available in areas that do not cover 4G. Overall, all networks and mobile companies are at competition to prove one is better than the other. The National Broadband Plan discusses how it is all competition. It states how years ago World Wide Web did not exist or how Americans had not seen a mobile phone, and broadband networks were available to only a few organizations. Today, technology has changes and is taking over the world. Broadband and others like it rule the creation of a wide variety of items and services. It discusses the three elements of broadband ecosystem, which are network, devices, and applications. Network involves competition with residential broadband markets and competition with mobile companies. Networks have many other factors to deal with besides competing, and this Broadband Plan explains and suggests alternatives for these issues. Devices, now you can chose a device that will allow access to email, stream music, download, etc. but before the only thing a mobile device did was make and receive calls. Along with the features smartphones offer, there are millions of applications to download with the phones. Over the years there has been a huge growth in applications and contents available over broadband networks. (broadband.gov)
According to Verizon Wireless coverage map, they obviously cover more places than AT&T. Verizon is first to build and operate a 4G LTE network, and it is the most advanced wireless network technology available. They are able to cover more places because they have a more advanced technology. Even before 4G LTE, Verizon covered more places, it seems as though they work hard to get their service more worldwide. They make new devices more so than other companies. Their new technology is available in 419 markets to more than 250 million people throughout the United States. Statistics show that more people are subscribers of Verizon than any other company, so they have to have more coverage to keep their subscribers in service. (verizonwireless.com)

Reference Page

Lee, Amy. "3G vs. 4G: What You Should Know Before You Switch." The Huffington Post. TheHuffingtonPost.com, 19 June 2011. Web. 04 Nov. 2012. Retrieved from: http://www.huffingtonpost.com/2011/06/19/4g-network-what-you-should-know_n_879609.html>.
"LTE Information Center." LTE Information Center. N.p., n.d. Web. 05 Nov. 2012. .
“National Broadband Plan - Chapter 4: Broadband Competition and Innovation Policy.” .04 Nov. 2012. Retrieved from: http://www.broadband.gov/plan/4-broadband-competition-and-innovation-policy/>.
Turban, E., & Volonino, L. (2011). Information technology for management: Improving strategic and operational performance. Hoboken, NJ: John Wiley & Son, Inc.
“Twitter” Retrieved from: https://twitter.com/search?q=4g%20or%203g&src=typd

Similar Documents

Free Essay

Cis 500

...Assignment 2: 3G wireless networks and 4G networks sweetie Professor: CLIFTON HOWELL CIS 500 February 03, 2014 INTRODUCTION For one to compare and contrast 3g versus a 4g network, we first have to define what a wireless network is. Radios are considered to be the most popular for wireless technologies. Wireless communication is transferred between multiple points which are not connected to an electrical conductor. Wireless is playing a big part in the cellular network communication field. Literally, on all the channels on TV it’s impossible to go 3 minutes without seeing advertisements from Verizon, AT&T, T-Mobile, and Sprint claiming to be the best network provider. Each cell phone provider promote their own version of 3g and 4g networks. Carriers do this to draw the attention to endorse their services and to bring in new customers. As a result, it makes it very difficult for consumes to make a choice between the competitors. Consumers make their choice between providers based upon the price and coverage which are both vital to most consumers. With all the promotions and dramatic advertising it can be hard to know the truths about each wireless company. In this paper 3G and 4G networks will be compared and contrasted, 4G LTE, 4G WiMAX and 4G WiBro networks and competition will be identified. Lastly, this paper will identify why the competition between the 4G LTE carriers has been so fierce. 3G and 4G Networks Technology has allowed advance speed to...

Words: 1092 - Pages: 5

Free Essay

Cis 500

...Case Study: #1 - The Big Data Challenges Arnechia Washington Professor Durgin CIS500 Info Syst Decision-Making January 26, 2014 Volvo Car Corporation has incorporated the cloud infrastructure into its networks to globalize the company. “With hundreds of sensors and CPUs embedded throughout the car — from the brakes to the central locking system — data is now being captured for use within the vehicle itself, and also, increasingly, for transmission via the cloud back to the manufacturer” (Strader, 2011). Volvo’s data Warehouse has multi-terabytes of data from the hundreds of sensors and CPU’s that are embedded throughout the car as well as data from customer relationship systems. The Cloud platform allows implementing and evaluating real-time information systems to transform data into knowledge. This will give Volvo a competitive advantage over other car companies and allow their offices no matter the location to immediately take advantage of the data that is stored. There are two different cloud infrastructures within their infrastructure: service cloud and vendor hosting. Service cloud is used to support the customers and while their customers are operating the vehicles. This will enhance the car from the information that is gained based on the design and performance level of the car. Vendor hosting is used for the data that is located in separate warehouses. This platform allows the data to be consolidated into one place and reduces the cost to maintain, operate...

Words: 989 - Pages: 4

Premium Essay

Cis 500

...Rahkon A. Ross Dr. Edwin Otto Strayer University CIS 500 Assignment #1: Predictive Policing Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets. Over the last decade, computer and telecommunications technologies have developed at a surprising rate. Increased computing power, advances in data transmission, smart and user-friendly graphic interfaces present law enforcement agencies with unprecedented capacity to collect, store, analyze and share data with stakeholders inside and outside of government. Ultimately, information technology represents a tool to help local law enforcement achieve its broadened and increasingly complex missions. (Reichert, 2001) There are many advantages associated with using information technology in policing. Comparative analysis shows that using information technology (IT) to combat crime has save lot of resources and time in the police department. There are a number of other advantages that can be associated with the use of information technology in the police department. For instance they use of Automated Field Reporting System by the police department has eradicated the use of hand writing of reports at the field by the Police Officers. Officers completed handwritten incident reports in the field and submitted them at the end of a shift to a field supervisor. After reviewing and approving reports, field supervisors would...

Words: 1431 - Pages: 6

Free Essay

Cis 500

...CIS 500 Weeks 6, 7, 8,9,11 Discussion Questions Week 6 * Mobile banking features have added several advantages for customers however; there are security risks that come with them. Determine the security risks with respect to phishing, smishing, vishing, cloning, and a lost or stolen smartphone that have been experienced by the financial services industry as a result of mobile banking. Phishig – Is when malware is downloaded on to a device and it attempts to obtain personal information. It lies in wait and gathers information from apps such as a mobile banking app to gain your login and password. If you bank does not have proper security in place this can lead to your account getting hacked and loss of money. Smishing- This is where fraudulent communication occurs in the form of a text message in order to obtain personal information. Vishing – This is similar to smishing instead of getting information through text it is obtained through phone calls or voicemails. Cloning- The transfer of information from one device to another device including the electronic serial number When a smartphone is lost or stolen this can lead to a compromise to a person’s personal information since it may be on the phone. I bank with Bank of America and use the mobile app to manage my account transfer funds, pay bills, deposit checks and so on. The app does not store the password but it does store the user login. You are unable to just log in to it from a new device or location without verify...

Words: 2846 - Pages: 12

Free Essay

Cis 500

...Law Enforcement Technology Needs Assessment Law Enforcement Technology Needs Assessment: Future Technologies to Address the Operational Needs of Law Enforcement In partnership with the Lockheed Martin Corporation By Christopher S. Koper, Bruce G. Taylor, and Bruce E. Kubu With contributions by Eugene Glover, John Anderson, Paul Snabel, Chuck Wexler, Rachael Bambery, Nathan Ballard, Anthony Bellero, David Prothero, Willie Marsh, Mike Schroeder, Mike Taylor, Greg Maultsby, Donnie Gilley and Dave Kier Police Executive Research Forum 1120 Connecticut Ave., N.W., Suite 930 Washington, D.C. 20036 Jan 16, 2009 Report Outline Section Executive Summary Chapter 1: Overview / Introduction Chapter 2: Technology and Law Enforcement: An Overview of Applications, Impacts, and Needs Chapter 3: The PERF Technology Needs Assessment Survey Chapter 4: The PERF-Lockheed Martin Law Enforcement Future Technologies Workshop Chapter 5: Conclusions and Next Steps Pages 3-9 10-11 12-32 33-47 48-64 65-73 Appendix A: References Appendix B: The PERF Technology Needs Assessment Survey Appendix C: Survey Technology Term Definitions Appendix D: Responding Agencies (PERF Survey) Appendix E: Supplementary Survey Tables Appendix F: List of Workshop Attendees 74-79 80-91 92-98 99-102 103-124 125-127 2 Technology and Law Enforcement: Future Technologies to Address the Operational Needs of Law Enforcement EXECUTIVE SUMMARY Background The effects of technology can be seen...

Words: 37391 - Pages: 150

Premium Essay

Cis 500

...AWS Case Study: Ericsson Ericsson is the world s leading provider of technology and services to telecom operators. Ericsson is the leader in 2G, 3G and 4G mobile technologies, and provides support for networks with over 2 billion subscribers and has the leading position in managed services. The company s portfolio comprises mobile and fixed network infrastructure, telecom services, software, broadband and multimedia solutions for operators, enterprises and the media industry. The Sony Ericsson and ST-Ericsson joint ventures provide consumers with feature-rich personal mobile devices. Ericsson is advancing its vision of being the prime driver in an all-communicating world through innovation, technology, and sustainable business solutions. Working in 175 countries, more than 90,000 employees generated revenue of SEK 203.3 billion (USD 28.2 billion) in 2010. Founded in 1876 with the headquarters in Stockholm, Sweden, Ericsson is listed on NASDAQ OMX, Stockholm and NASDAQ New York. Ericsson uses Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), and RightScale for provisioning and auto-scale functionality. They host in multiple AWS locations with failover between installations, partly based on RightScale features. Ericsson explains that its solution was built primarily using JavaSE, and hosted on Tomcat and MySQL, using HAProxy for load balancing.The company chose Amazon Web Services (AWS) because they felt AWS was the most integrated public cloud...

Words: 357 - Pages: 2

Premium Essay

Cis 500

...Information Technology continues to improve over time. In today’s society, with the help of technology, mobile phones have the capability of acting like a computer and so forth. So with the creation of the program COMPSTAT, there was numerous years of data that was added into the database with new daily information added to predict which areas would have the highest rate of crime based on what has happened in the past (Goode, 2011). Before COMPSTAT, the officers would patrol spots that they thought might be a high area of crime based on their experience in the field (Goode, 2011). This allows the police officers to be able to target the crimes when they are taking place to prevent them from occurring based on the presence of the police officers. This also allows for officers to catch people in the act to be arrested and possibly file more charges against the criminal. This advantage allows for time to be used more wisely to go off of the data that is known for trouble spots to keep the crime down in those areas. The disadvantage of the program would be that if there was not any crime occurring in the area that the officers were sent to that it would be the same as patrolling as they would be wasting time until they were dispatched to take care of something else. With the patrolling of the streets, it more likely that the officers are waiting for a crime to take place and then they pull someone over . With COMPSTAT, it is more like a stakeout where they wait until the crime...

Words: 1361 - Pages: 6

Premium Essay

The Broadway Cafe' Cis 500

...Final Project 1 Final Project The Broadway Cafe' Part I and II CIS 500 Strayer University Elizabeth Bethel Final Project 2 The Broadway cafe is a family inherited coffee shop located in downtown Atlanta, Georgia. The cafe' has been in business for 58 years. The business offers specialized coffees, teas, a full service bakery, homemade sandwiches, soups, and salads. It was once a hotspot but for the past five years business has been declining. Although my grandfather was very adroit at managing the business, Starbucks will be coming to the area. Grandfather had a terrific memory and stored everything such as customers names, family recipes, and soups in his brain. His record keeping system was tracked...

Words: 2450 - Pages: 10

Premium Essay

Cis 500 Assignment 4

...Assignment 4: Data Mining CIS 500 Dr. Besharatian Submitted by: Eric Spurbeck December 7, 2013 Abstract This paper will discuss the process of data mining, how it is used, for what purpose it is used and what information can be gathered from the data, which is compiled from data mining. Assignment 4: Data Mining Webopedia (2013) defines data mining as, "A class of database applications that look for hidden patterns in a group of data that can be used to predict future behavior. For example, data mining software can help retail companies find customers with common interests." This means that large groups of data that is derived by information obtained through customers, customer purchases and customer buying habits. Businesses use this information for a variety of reasons; it is used for purchasing merchandise, tracking how certain merchandise is selling and even customers buying habits. Webopedia goes on to state that "data mining is popular in the science and mathematical fields but also is utilized increasingly by marketers trying to distill useful consumer data from Web sites." Predictive analytics are used to understand customer's behaviors, according to the article Predictive Analytics with Data Mining: How It Works (Siegel, Feb. 2005) it describes how this method has a predictor. This is "a single value measured for each customer" this is based on the customers purchased over a period and sets higher values for the most recent customer purchases. The...

Words: 1808 - Pages: 8

Free Essay

Term Paper Cis 500

...Assignment: 1 Error Handling in an Activity Diagram LaShantel Wilson Strayer University Dr. Richard Brown April 18th 2016 Error handling are routines in a program that responds to errors (Encyclopedia). The measurement of quality in error handling is based on how the system informs the user of such conditions and what alternatives it provides for dealing with them (Encyclopedia). This paper will give a narrative which describes the changes and added error handling pathways in the diagram within this paper. There will be an overview of the errors, an explanation as of the main changes checking are imperative within the process, and overview of possible errors. A diagram will illustrate the updates of two (2) error handling pathways. Error Handling Pathway Ridgeline Mountain Outliners (RMO) is a large retail company that specialize in clothing and related accessories for all types of outdoor and sporting activities (BOOK). One approach to handling errors in received data is for the receiving system to send the data back to the sending system, often with an indication that an error has been detected by the receiving system (GOOGLE). When an enterprise IT system includes a sales system and a financial system, the sales system may send data to the financial system, which is only capable of accepting data that passes particular types of validity checks and other types of data consistency checks. When data received by the financial system does not pass the data consistency...

Words: 408 - Pages: 2

Premium Essay

Cis 500 Term Paper

...Term Paper Keenan Rhines Strayer University Dr. Hammond Elbedour November 26th, 2014 People are moving into a new era of mobile computing, one that promises greater variety in applications, highly improved usability, and speedier networking. The 3G iPhone from Apple is the poster child for this trend, but there are plenty of other developments that point in this direction. In addition to this trend, many mobile applications were designed that perform specific tasks for the mobile user. * Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Nowadays, according to statistic, Ninety-seven percent of all smartphone users use mobile applications. Fifty-eight percent of those smart phone users use location-based applications. The results were raised from surveys done by a nonprofit global information security association called ISACA (previously known as the Information Systems Audit and Control Association). The location-based activities were implemented via applications installed on smartphone. These apps using the users current locations was calculated fifty-nine percent of the time but tagging photos on social media such as Twitter or Facebook was estimated forty-four percent. Besides, several mobile apps that capture geographical information, sim-card information and other personal information to share on social...

Words: 2148 - Pages: 9

Premium Essay

Cis 500 - Predictive Policing

...Predictive Policing By Gus Finklestein Strayer University Abstract Predictive policing is a relatively new crime-fighting technique that can be used to both deter crime and catch criminals red-handed. Combining computer technology together with area- specific crime data, reports are generated forecasting precisely when and where crimes are most likely to occur. Police departments maintain records, data, and or databases which log huge volumes of information on crimes, criminals, suspects, and much more. Inputting that information into a sophisticated computer program designed to predict crime, to within a 500 by 500 foot location, is proving to have some merit. With technological advances, police no longer radio headquarters to retrieve basic information like license plates. In fact, the majority of police possess internet-connected computers in their cruisers, allowing them access to vast amounts of data. Within an organizational context, when police easily communicate and share knowledge across boundaries, and the entire country, the overall efficiency of crime-fighting and crime- solving greatly improves. Take for example an Amber Alert, the name of a missing persons report when a child vanishes. Once an alert is executed, police forces very quickly mobilize and cast a very wide net using all available resources to locate that child. This paper discusses the uses of technology, in particular predictive policing, to advance the efforts...

Words: 1698 - Pages: 7

Premium Essay

Cis 500 - Wireless and Mobile Technologies

...Case Study #2 Wireless and Mobile Technologies CIS 500: Information Systems for Decision-Making Wireless and Mobile Technologies Wireless technologies make use of radio waves, to connect with other devices or networks in order, to transmit/receive data. A wireless technology can be as simple as using a garage door opener or as complex running applications on Enterprise Resource Planning software. Wireless technologies make use of various types of hardware, from Bluetooth™ capable devices (printers, keyboards, earpieces, etc.) to offsite data warehouses to satellites, all of which communicate through networks, via radio waves. Wireless technologies are used by fixed/stationary items such as a desktop computer, as well as various mobile devices, tablets, cell/smart phones, laptops, GPS and others. Mobile technologies are, as the name implies, mobile. These devices are portable and can be used in route, from one place to the next, by accessing and using wireless networks. Mobile technologies are not just hardware but include special platforms in which these devices and the users interface. The combination of the wireless and mobile technologies has opened new methods for businesses to improve productivity.  Wireless and Mobile technologies allow staff members to have real-time communication with the business and operations, from relatively anywhere in the world.  Wireless and Mobile technologies provide a faster connectivity to vendors and customers by...

Words: 1916 - Pages: 8

Premium Essay

Cis 500 Case Study - Cloud Computer

...Case study 2 CIS 500 – Information Systems for Decision Making Abstract Cloud computing is not strange to people at all. People use their iPhone and their iPad App to store their important files. Microsoft 2013 users use the SkyDrive to store their files and they can access anywhere and anytime. Major venders such as Google, Amazon, and Microsoft have provided Cloud Computing services. This paper discusses the Amazon Web Services (AWS) and evaluates the scalability, dependability, manageability, and adaptability of Amazon Elastic Compute Cloud, Amazon Simple Storage Service, and RightScale. Moreover, this paper examines the security concerns for cloud-based services and assesses scalability, reliability, and cost issues. Assess how Ericsson benefitted from Amazon Web Service (AWS) in terms of cost reduction, automated software updates, remote access, and on-demand availability Ericsson is one of the world’s leading providers of technology and services to telecom operators. There are reasons how Ericsson success like that. According to the Amazon Web Services (AWS) Case study, Ericsson uses AWS such as Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), and RightScale for provisioning and auto-scale functionality. AWS give many benefits to Ericsson. For example, Ericsson saves money to invest to build on-premises infrastructure by using AWS. Ericsson also saves the time to build and install the infrastructure. Some of the technical...

Words: 1257 - Pages: 6

Premium Essay

Director

...he problem with Compaq is that they developed too much IT architecture using financial advisory, where R&D and openness keys to development and the culture, while ignoring the environment. Open communication and trust was barricaded and destroyed by ASK (financial IS). The workers were being motivated by fear, much like Geneen in Morgan’s Images Of Organization. From an IT architecture standpoint, numbers based on the finance division depicted the entire company, even the organizational structure. The organizational structure did not align with the IT architecture, and the culture did not align with it either. Morgan stated, “The division of labor characteristic of industrial societies creates a problem of integration, or what may be more accurately described as a problem of integration, or what may be more accurately described as a problem of “cultural management.”” Compaq started as a functional structure, changed into a divisional fairly soon and then back to functional. Culture was strongly emphasized over anything else. CASH stated, “The process encompassed a whole range of ideas, including (1) the rule of inclusion, (2) teamwork, (3) “working the issue,” and (4) consensus building.” The IS system at Compaq did allow the free-flow of information through email named “B-mail.” ASK was used for financial services so that the company could easily track orders, and know where it stood financially. The culture felt monitored by ASK operators since it “becomes responsible for...

Words: 5841 - Pages: 24