1
Module 4: Networks, Collaborative Technology, and the
Internet of Things
1. Network Fundamentals Applied to Business
Networks
A network is useful for businesses in that it allows users to easily share data. A user
can be in a remote office on one side of the globe and access data that is on the
other side of the globe. This is brought about by data communications, which uses
software and hardware to exchange data between a sender and receiver (Bidgoli,
2018). A business manager must understand networks and related technology in
order to make effective decisions on the technologies in which the organization will
invest. Let us start with some of the basics.
There are many types of networks; here are two of the most common:
•
•
Local Area Network (LAN—)A network in which computers and shared devices
are within close proximity, such as the same building or campus.
Wide Area Network (WAN—)A network in which computers and shared
devices are geographically dispersed, such as in a different city or country.
A network topology is the “lay of the LAN.”
Click on the following to learn about some common topologies:
Bus:
The bus topology employs one cable with all of the computers (called nodes) connected by a
smaller coaxial plug. The upside of this topology is that it is relatively cheap and easy to
implement and does not require much cabling. The downside is that if the single cable
breaks, then the whole network goes down. As more devices are connected, the speed of
the network tends to slow down.
Ring:
The ring topology is a cable going from each computer to the other. The advantage
of this topology is that data flows in one direction, which allows for a rapid transfer
of data. The downside is that if the cable or a connected device fails, the entire
network fails. It is more difficult to implement than a bus network, and it is harder to
troubleshoot when there are problems.
Star:
The star is the most commonly used topology. In a star, there is a single cable going from
each connected device to a center device called a hub (or switch). Reliability is a major
advantage of this topology—if a cable or device fails, the rest of the network is not
impacted. It is also easier to troubleshoot than the other topologies. Finally, it is scalable
2
and can also include wireless connections in the configuration. The disadvantage to this
topology is that if the hub or switch fails, the entire network will go down. It is also more
expensive to implement, requiring more cable and hardware.
Decisions on topologies, then, can focus on different aspects such as cost, ease of
implementation, reliability, and speed.
Business managers must analyze the various needs of the business to determine
which topology makes the most sense. They must do the same thing with regard to
which network technologies and network components they should invest in. Turban,
Pollard, and Wood (2018) noted that such investment decisions can impact multiple
areas of the business, including security, productivity, and user experiences.
2. Protocols, Interfaces, and Network Capabilities
A key part of the data exchange in any network is the use of a protocol. Protocols
are “rules that govern data communication, including error detection, message
length, and transmission speed” (Bidgoli, 2018, p. 121). Think of data
communication as a speaking language. Just as there are rules to follow when
speaking a language, there are also rules associated with network communication.
Otherwise, communication between the sender and receiver would never occur.
The most common protocol in use today is the Internet Protocol, better known
as IP. An IP address is a unique number (the “address”) for each device
communicating with a network or the Internet. IP is combined with the Transmission
Control Protocol (TCP) to form TCP/IP. Every device connected to the internet uses
TCP/IP, which allows for global communication and data sharing. TCP/IP is actually a
suite of protocols. Some common ones you may have heard of are FTP, HTTP, or
ICMP (for the PING command). The PING command is used to troubleshoot
networks for connectivity and is a commonly used term in IT.
On a broad level, the network components can be divided into software and
hardware. As we have learned, we need both software and hardware in order for a
computer system to work. In terms of network hardware, the main elements are
routers, switches, and hubs.
A hub is a hardware device to which all of the computer devices (anything with an IP
address) are interconnected. It is the centerpiece in the star topology. Just as the
hubcap on a car tire is the center of a tire, a network hub is the center of the
network.
A switch acts like a hub but is “smart.” When communicating with a hub, a sender
will “ask” all devices if this is the destination address it needs. If there are ten
devices connected, potentially all ten devices will be asked, which is inefficient. A
switch uses a lookup table (much like an index in a database) to locate the
destination device quickly. The business impact is that a switch is more cost effective
than a hub in the long-run, as it increases network throughput—in other words, it
3
increases the rate at which communications are successfully delivered to the
receiver.
A router is a hardware device that uses routing protocols to determine the best way
(or route) for the sender’s data to reach the destination. Common routing protocols
are routing information protocol (RIP) and open shortest path first (OSPF). From a
business perspective, it is important to understand protocol efficiency. For example,
OSPF is more efficient for larger networks while RIP is more efficient for smaller
ones.
When you connect to the internet, not only are you using the Internet Protocol (IP),
you are also using another underlying hardware protocol, called Ethernet. IP needs
Ethernet to work. If you have ever heard of a “hardware address” or “MAC address”,
then Ethernet is in use. Ethernet is used in both wired and wireless networks.
3. Mobile Networks
In order for devices to communicate, there must be something to carry the signal. Wired
technologies use an Ethernet cable to connect to one another. In the case of the star
topology, an Ethernet cable would go from the computer to the hub or switch. Then, the
hub or switch would connect to a router. In a wired technology, the connection between the
computer and the hub/switch is dedicated.
Although connection via a wired network is generally fast, it is not mobile. Wireless
or wireless fidelity (Wi-Fi for short) networks allow for connections from almost
anywhere to an access point. If connecting to a star topology network, for example,
an antenna would be used to actually send the signal through the air rather than
over a cable.
Companies are finding that mobility can greatly increase the efficiency and
productivity of their employees (Elliot, Scornavacca, & Barnes, 2015). Smartphones,
for example, allow employees to connect and communicate at any time. Wireless
computers allow them to work when they are out of the office, whether on the road
or at home. This has also allowed many employees to work remotely all or part of
the time.
Advancements in technology such as Bluetooth, GPS, 4G, and 5G have helped propel
mobilization globally (Editor, n.d.). 5G technology implementation is increasing
globally and promises to “dramatically increase the speed at which data is
transferred across the network” (Turban et al., 2018, p. 110).
The following video will help you better understand the up-and-coming 5G
technology.
https://www.youtube.com/watch?v=wN5Mn5Zfgbo
4
The next generation of wireless networks—5G—promises to deliver faster data speed and
more reliable service. This video shows the results from a survey given to investors and
analysts on the scale of 5G and IoT opportunity.
5G networks will help manage the increasing demands on wireless networks.
There are downsides to wireless that must also be considered. Costs, technical
issues, and security risks have been factors restricting implementation (Elliot et al.,
2015). While wireless fosters mobility, the connection is generally slower since the
bandwidth is shared. In addition, data traveling through the air can be vulnerable to
interception mid-transmission. There is significant risk when connecting to free,
public Wi-Fi. Businesses should have rules in place for employees using such
connections.
4. Collaborative Technologies and the Internet of
Things (IoT)
The original Internet (or Web 1.0) is evolving. With Web 2.0, the trend is toward a
more interactive, collaborative experience for the user (Bidgoli, 2018). We see that
with the rise in popularity of social media sites like Facebook and Twitter. Web 3.0 is
the latest trend, with users and computers interacting with the Internet
using artificial intelligence (AI). Instead of users having to search through web sites,
for example, AI software will help with this tedious task (Bidgoli, 2018). Note that
these different technologies use the same Internet, with some web servers and
applications using Web 1.0 technologies, others using Web 2.0 technologies, and still
others using Web 3.0 technologies.
View the following video on collaboration tools and the emerging technology of AI:
https://www.youtube.com/watch?v=rcZl_vHyEkg&feature=emb_logo
This video analyzes the benefits of adding AI to collaboration tools by specifically looking at
a specific platform called RUUM by SAP.
Let us explore some Web 2.0 collaborative technologies and their possible business
uses; click on each:
Blog:
The term blog is short for binary log or Weblog (Bidgoli, 2018). A blog is a journal of one’s
thoughts and opinions. Companies use blogs as a way of engaging with customers, creating
communities for them, and encouraging conversation around a company and its products or
services (Dobele, Steel, & Cooper, 2015). They can also be used to improve search engine
results and drive more customers to a company’s web site.
5
Wiki:
The term wiki means fast in Hawaiian. A wiki is a web page where the content can
be created and modified by many users—quickly. They provide an easy-to-use tool
for creating, sharing, and integrating information within an organization.
Crowdsourcing:
Crowdsourcing is a collaboration technique that organizations can use to collaborate with
online communities to solve problems, using the collective creativity, actions, and ideas of
large groups (Vreede, Antunes, Vassileva, Gerosa, & Wu, 2016). Some businesses involve
customers to gain their insight and use them as co-creators as a way to address “fastchanging user needs, shorter product life cycles, and an increasingly competitive climate”
(Kohler, 2015, p. 65). Others might invite specific groups to address a business need. For
example, a mortgage lender invited ten technology firms to compete in a crowdsource
challenge to create a new mobile loan operating system for its loan officers (PR Newswire,
2018).
Companies can adopt one or more of these technologies to better compete in the
on-demand economy. For example, a company could use social media and blogs to
connect with consumers and conduct surveys, and a wiki to assist in a collaborative
project involving geographically dispersed employees.
As discussed in an earlier module, the Internet of Everything (IoE) is a development
effort in which everyone is interconnected via various devices using different
connection types. The Internet of Things (IoT) is a subset of IoE in which physical
objects (the “things”) are connected via the Internet. There are a multitude of
business uses for IoE and IoT. IoT devices can collect valuable data to help
businesses improve business processes. These could be smart sensors alerting
municipal officials to leaking pipes in a city’s water system, for example, helping the
city to reduce water loss (Bidgoli, 2018). IoT devices can also improve supply chain
management, automating processes and providing valuable data to decision-makers
as a company’s products move through the supply chain to the customers.
View the following video on IoT and Industrial IoT:
https://www.youtube.com/watch?v=6MN0xRJ3yzE&feature=emb_logo
This video explores the world of IoT with some time spent comparing and contrasting IoT to
IIoT.
References
Bidgoli, H. (2018). MIS8. Boston, MA: Cengage Learning Inc.
6
Dobele, A., Steel, M., & Cooper, T. (2015). Sailing the seven C 's of blog marketing:
Understanding social media and business impact. Marketing Intelligence &
Planning, 33(7), 1087-1102.
Editor. (n.d.). How wireless technology is benefiting industry? Retrieved from
https://www.digitaledge.org/how-wireless-technology-is-benefiting-industry/
Elliott, L., Scornavacca, E., & Barnes, S. J. (2015). Wireless technologies in New Zealand
businesses: A longitudinal assessment. The Journal of Computer Information
Systems, 55(3), 65-71.
Kohler, T. (2015). Crowdsourcing-based business models: How to create and capture
value. California Management Review, 57(4), 63-84.
Turban, E., Pollard, C., & Wood, G. (2018). Information technology for management: On-
demand strategies for performance, growth, and sustainability (11th ed.). Hoboken,
NJ: John Wiley & Sons, Inc.
Vreede, G., Antunes, P., Vassileva, J., Gerosa, M. A., & Wu, K. (2016). Collaboration
technology in teams and organizations: Introduction to the special issue. Information
Systems Frontiers, 18(1), 1-6.
SEU ECOM500
Critical Thinking Writing Rubric - Module 4
Exceeds
Expectation
Content, Research, and Analysis
21-25 Points
Requirements
Includes all of the
required
components, as
specified in the
assignment.
21-25 Points
Content
Demonstrates
substantial and
extensive
knowledge of the
materials, with no
errors or major
omissions.
25-30 Points
Analysis
Provides strong
thought, insight,
and analysis of
concepts and
applications.
13-15 Points
Sources
Sources go above
and beyond
required criteria
and are well
chosen to provide
effective
substance and
perspectives on
the issue under
examination.
Mechanics and Writing
5 Points
Demonstrates
Project is clearly
college-level
organized, well
proficiency in
written, and in
organization,
proper format as
grammar and
outlined in the
style.
assignment.
Strong sentence
and paragraph
structure, contains
no errors in
grammar, spelling,
Meets Expectation
Below Expectation
16-20 Points
Includes most of
the required
components, as
specified in the
assignment.
16-20 Points
Demonstrates
adequate
knowledge of the
materials; may
include some
minor errors or
omissions.
19-24 Points
Provides adequate
thought, insight,
and analysis of
concepts and
applications.
10-12 Points
Sources meet
required criteria
and are adequately
chosen to provide
substance and
perspectives on the
issue under
examination.
11-15 Points
Includes some of
the required
components, as
specified in the
assignment.
11-15 Points
Demonstrates fair
knowledge of the
materials and/or
includes some
major errors or
omissions.
4 Points
Project is fairly well
organized and
written and is in
proper format as
outlined in the
assignment.
Reasonably good
sentence and
paragraph
structure, may
include a few
3 Points
Project is poorly
organized and
written and may
not follow proper
format as outlined
in the assignment.
Inconsistent to
inadequate
sentence and
paragraph
development,
13-18 Points
Provides poor
though, insight,
and analysis of
concepts and
applications.
7-9 Points
Sources meet
required criteria
but are poorly
chosen to provide
substance and
perspectives on the
issue under
examination.
Limited Evidence
6-10 Points
Includes few of the
required
components, as
specified in the
assignment.
6-10 Points
Fails to
demonstrate
knowledge of the
materials and/or
includes many
major errors or
omissions.
7-12 Points
Provides little or no
thought, insight,
and analysis of
concepts and
applications.
4-6 Points
Source selection
and integration of
knowledge from
the course is
clearly deficient.
1-2 Points
Project is not
organized or well
written and is not
in proper format as
outlined in the
assignment. Poor
quality work;
unacceptable in
terms of grammar,
spelling, APA style,
SEU ECOM500
Critical Thinking Writing Rubric - Module 4
APA style, or APA
citations and
references.
Total points possible = 100
minor errors in
grammar, spelling,
APA style, or APA
citations and
references.
and/or includes
numerous or major
errors in grammar,
spelling, APA style
or APA citations
and references.
and APA citations
and references.
IT for Management: On-Demand Strategies for
Performance, Growth, and Sustainability
Eleventh Edition
Turban, Pollard, Wood
Chapter 4
Networks, Collaborative Technology, and
The Internet of Things
Learning Objectives (1 of 4)
Copyright ©2018 John Wiley & Sons, Inc.
2
Network Fundamentals Defined
• A computer network is a set of computers connected
together for the purpose of sharing recourses.
Copyright ©2018 John Wiley & Sons, Inc.
3
Common Network Types
Acronym
Type
Characteristics
Example
LAN
Local Area Network
Short distance
connection
Office
School
Home
WAN
Wide Area Network
Spans large physical
distance
Internet
Large company
WLAN
Wireless LAN
LAN based on Wi-Fi
technology
Internet
Large company
Copyright ©2018 John Wiley & Sons, Inc.
4
Intranets, Extranets, and Virtual Private
Networks
• Intranets are used within a company for data access,
sharing, and collaboration.
• Extranets are private, company-owned networks that
can be logged into remotely via the Internet.
• Virtual Private Networks (VPNs) are used where
security of transmissions is a concern, because they
encrypt the packets before they are transferred over
the network.
Copyright ©2018 John Wiley & Sons, Inc.
5
Virtual Private Networks
A virtual tunnel routed through the Internet with software and hardware
encryption.
Copyright ©2018 John Wiley & Sons, Inc.
6
Network Terminology
• Modem: a device that modulates/demodulates signal
for transportation
• Modulation and Coding: Techniques used by modem to
adapt the signal to the media
• Signal: Binary information we want to send.
• Signal Frequency Spectrum: All the frequency
components of a signal
• Media Bandwidth: Limit in range of frequency signals
• Capacity Bandwidth: Maximum bits per second that
can be transmitted
Copyright ©2018 John Wiley & Sons, Inc.
7
Figure 4.4 Basic functions of business networks
Copyright ©2018 John Wiley & Sons, Inc.
8
Quality of Service (QoS)
• Latent-sensitivity: data such as real-time voice and
high-quality video.
• Prioritized Traffic: data and apps that are time-delaysensitive or latency-sensitive apps.
• Throttle Traffic: gives latency-sensitive apps priority,
other types of traffic need to be held back (throttled).
• Traffic Shaping: the ability to prioritize and throttle
network traffic.
Copyright ©2018 John Wiley & Sons, Inc.
9
The Net Neutrality Debate
• Net neutrality is the principle that Internet Service
Providers (ISPs) and their regulators treat all Internet
traffic the same way.
• Traffic shaping prioritizes the flow of traffic by delaying
the flow of less important network traffic.
• In 2010, the FCC ruled in favor of “net semi-neutrality”,
not explicitly forbidding paid prioritization.
• The FCC under the current administration may take
further steps to roll back net neutrality rulings, which
could favor the cable companies over consumers.
Copyright ©2018 John Wiley & Sons, Inc.
10
Network Fundamentals
1.
2.
3.
4.
5.
6.
7.
Name different types of networks.
What is meant by “bandwidth”?
What is the difference between an intranet and an extranet?
How does a virtual private network (VPN) provide security?
What is the purpose of a modem?
Describe the basic functions of business networks.
How do investments in network infrastructure impact an
organization?
8. Name the two tiers of traffic to which Quality-of-Service is
applied.
Copyright ©2018 John Wiley & Sons, Inc.
11
Learning Objectives (2 of 4)
Copyright ©2018 John Wiley & Sons, Inc.
12
Internet Protocols, APIs, and Network
Capabilities
• Internet Protocol (IP) is the basic technology that
makes global communication possible. Each devise
attached to a network has a unique IP address that
enables it to send and receive files made up of packets.
Copyright ©2018 John Wiley & Sons, Inc.
13
IP Addresses and Packets
Figure 4.5: IPv4 addresses have four groups of four alphanumeric characters,
which allows for 232 or roughly 4.3 billion unique IP address. IPv6 addresses have
eight groups of alphanumeric characters, which allows for 2128 , or 340 trillion,
trillion addresses. IPv6 offers also enhanced quality of service that is needed by
the latest in video, interactive games, and e-commerce.
Copyright ©2018 John Wiley & Sons, Inc.
14
Broadband Technology: 3G/4G/5G
• 3G networks support multimedia and broadband
services over a wider distance and at faster speeds than
prior generation networks. They use large satellite
connections to telecommunication towers.
• 4G networks are digital, or IP, networks that enable
even faster data transfer rates. 4G delivers average
realistic download rates of 3 Mbps or higher (as
opposed to theoretical rates, which are higher).
• 5G networks, the coming generation of broadband
technology. 5G will dramatically increase the speed at
which data is transferred across the network.
Copyright ©2018 John Wiley & Sons, Inc.
15
Network Technology Standards
• WiMAX
IEEE 802.16
o 30-mile range
o 70 Megabits per second (Mbps)
o Line-of-site not required
o Same principles as Wi-Fi (using radio signals)
o
• Long-Term Evolution (LTE)
o
o
GSM deployed by Verizon, AT&T, and T-Mobile
100 Mbps downlink, 50 Mbps uplink
Copyright ©2018 John Wiley & Sons, Inc.
16
Circuit vs. Packet Switching
• Circuit switching
o
o
Older technology that originated with telephone calls
Inefficient for digital transmission
• Packet Switching
o
o
o
Transfers data or voice
Files are broken into packets, numbered sequentially, routed
individually to their destinations
When received at the destination, the packets are
reassembled into their proper sequences
Copyright ©2018 John Wiley & Sons, Inc.
17
Application Programming Interfaces and
Operating Systems
• Application Program Interface (API) consists of a set of
functions, commands, and protocols used by
programmers for OS-interactivity without having to
write a program from scratch.
• Can be automated for simplified usability
o
o
o
Twitter
Facebook
Amazon
Copyright ©2018 John Wiley & Sons, Inc.
18
Figure 4.7 API value chain in business.
Copyright ©2018 John Wiley & Sons, Inc.
19
Internet Protocols (IP), APIs, and
Network Capabilities
1.
2.
3.
4.
5.
6.
7.
Why has IPv6 become increasingly important?
What is the difference between IPv4 and IPv6?
What is the purpose of an IP address?
What are the benefits of using an API?
What is the difference between 4G and 5G?
What is the most current network standard?
What benefits will the upcoming 5G network standard offer
businesses?
8. What is the difference between circuit switching and packet
switching?
Copyright ©2018 John Wiley & Sons, Inc.
20
Learning Objectives (3 of 4)
Copyright ©2018 John Wiley & Sons, Inc.
21
Figure 4.8 Four drivers of global mobile traffic through 2020
Copyright ©2018 John Wiley & Sons, Inc.
22
Mobile Data Traffic Milestone by 2020
Copyright ©2018 John Wiley & Sons, Inc.
23
Wireless Networks and Mobile
Infrastructure
• Mobile Networks
Bluetooth: short-range wireless communication technology
allowing device pairing
o Wi-Fi: standard way to wirelessly connect computing devices
through routers commonly connected to the Internet
o WiMax: transmits voice, data, and video over high-frequency
radio signals designed as alternative to cable and DSL
o
Copyright ©2018 John Wiley & Sons, Inc.
24
Data Networks, IP Addresses, and APIs:
A mashup of GPS and Bluetooth
• General term referring to the integration of two or
more technologies such as Bluetooth and Wi-Fi
o
o
o
o
Provide intelligence
Inter-Automobile collision avoidance
Sudden braking
Can automatically call emergency services
Copyright ©2018 John Wiley & Sons, Inc.
25
Data Networks, IP Addresses, and APIs:
Near-Field Communication (NFC)
• Enables two devices within close proximity to establish
a communication channel and transfer data using radio
waves
• More secure than other wireless technologies
• Examples:
o
o
o
Apple iWatch
Digital tickets providing access to concerts
Transmit public transport payment through phones
Copyright ©2018 John Wiley & Sons, Inc.
26
Four Important Factors When Choosing a Mobile Network
Copyright ©2018 John Wiley & Sons, Inc.
27
Mobile Networks
1.
2.
3.
4.
5.
6.
What factors are contributing to mobility?
Why is mobile global traffic increasing?
What accounts for the increase in mobile traffic?
Give some examples of VoIP networks.
How is NFC different from RFID?
What are the two components of a wireless network
infrastructure?
7. What is Near Field Communication and how is it used in
business?
8. What factors should be considered when evaluating a mobile
network?
Copyright ©2018 John Wiley & Sons, Inc.
28
Learning Objectives (4 of 4)
Copyright ©2018 John Wiley & Sons, Inc.
29
Collaborative Technologies: Virtual
Collaboration--Benefits
• Information sharing between retailers and suppliers
(Example: Walmart and Proctor & Gamble)
• Retailer-supplier collaboration (Example: Asda Corp.)
• Lower transportation and inventory costs and reduced
stockouts (Example: Unilever’s Transportation Business
Center)
• Reduction of product development time (Example:
Caterpillar, Inc.)
Copyright ©2018 John Wiley & Sons, Inc.
30
Collaborative Technologies: Group Work
• Group Work and Dynamics can be quite complex
• Group workers can be located in different places or
work at different times
• Group members may work for the same or different
organizations
• Data, information, or knowledge may be located in
many sources that may be external to the organization
Copyright ©2018 John Wiley & Sons, Inc.
31
Collaborative Technologies:
Brainstorming in the Cloud
• Companies are now using cloud-based online
brainstorming applications
• Avoids travel expenses if members are geographically
dispersed
• No restriction to number of sessions
• Examples
o
o
Evernote—features function to synchronize user’s notes
iMindmap Online—relies on mind mapping and other
structured approaches to help streamline work processes
Copyright ©2018 John Wiley & Sons, Inc.
32
The Internet of Things (IoT)
Internet of Things (IoT) is the network of physical objects or
“things” embedded with electronics, software, sensors, and
network connectivity, that enables these objects to collect and
exchange data.
• Objects we interact with send signals to and from each other,
collecting data
• IoT collects that data from millions of sensors embedded in
everything from cars, to refrigerators, to space capsules
• Half of U.S. manufacturers report they are currently using IoT
technology to collect machine data (Industry Week study,
2016)
• A smaller percentage (44%) are colleting data from sensors
embedded in their products
Copyright ©2018 John Wiley & Sons, Inc.
33
Advantages of IoT
1. Monitoring performance, quality, and reliability of products and
services
2. Gaining insight into potential new products and service
3. Support sales
4. Better understand product use
5. Remote troubleshooting of products
6. Deliver revenue-generating post-sales services
7. More efficiently deliver post-sales services
Copyright ©2018 John Wiley & Sons, Inc.
34
Disadvantages of IoT
1.
2.
3.
4.
5.
6.
7.
Network security
Data privacy
Data analysis capabilities
Data collection capabilities
Realistic efficiency opportunities
Realistic new revenue opportunities
Cost
Copyright ©2018 John Wiley & Sons, Inc.
35
Collaboration Technologies and the Internet
of Things (IoT)
1.
2.
3.
4.
5.
Why is group work challenging?
What might limit the use of in-person brainstorming?
How can online brainstorming tools overcome those limits?
List ways in which virtual collaboration can be used in business.
What devices do you have that take advantage of the IoT?
Describe how they impact the way that you live and work.
6. What is driving the rise of IoT?
7. What is the main concern that organizations have about the IoT?
8. Do you think the advantages outweigh the disadvantages of the
IoT? Explain.
Copyright ©2018 John Wiley & Sons, Inc.
36
Purchase answer to see full
attachment