Chapter IS-6

DATA COMMUNICATIONS AND THE INTERNET

Topics covered:

  • Basics of data communications
  • Network types and components
  • Internet protocols and models
  • Modern networking and cloud technologies

6.1 Why Data Communications Matter in Business

For today’s businesses, nearly every action—from checking email, marketing to customers, and even to sales—depends on data communications. Regardless of its size or whether a company operates locally or globally, its ability to send, receive, and process digital information directly affects productivity, decision-making, and customer satisfaction. Business professionals need to understand how data travels and how communication networks work.

Digital Communication as the Backbone of Modern Business

Businesses rely on digital communication systems to connect employees, customers, and partners in real time. Teams collaborate across cities or continents using shared online platforms. Managers monitor operations from data collected across a network and from databases. Customers place orders through websites and mobile apps that instantly confirm transactions, create the sales order, and even send the purchase list to fulfillment for shipping.

This shift from paper-based and face-to-face communication to digital communication has transformed the way organizations operate. For example:

  • Collaboration: Teams now use platforms like Microsoft Teams, Slack, and Google Workspace to share documents, schedule meetings, and co-edit files simultaneously. This reduces the time spent exchanging emails and improves coordination.
  • E-Commerce: Retailers and service companies depend on reliable Internet connections to process payments, manage inventory, and track shipping. When communication networks go down, so do online sales.
  • Remote Work: Video meetings on Microsoft Teams, Zoom, or Google Meet allow employees to work from home or while traveling, maintaining productivity even when physical offices are closed.

Businesses need robust data communication systems to enhance their agility, efficiency, and competitiveness. Without reliable networks, business processes come to a complete halt.


Understanding the Flow of Digital Information

Data communication is the process of transmitting digital information—text, images, video, or sound—from one device to another through a transport medium. Fiber optic cables, Ethernet, and coaxial cables (used for cable TV) are examples of wired connectivity. However, data can also be sent over wireless signals such as Bluetooth, Wi-Fi, cellular, and even satellite. Every email, cloud upload, or online purchase involves multiple transmissions across networks that route data between servers and users using various types of the transport media listed above.

To understand how communication performance affects business operations, it helps to know three key terms:

Bandwidth: The maximum amount of data that can travel over a network connection per second (measured in bits per second, Mbps, or Gbps).

Business ExampleA company upgrades its Internet service from 100 Mbps to 1 Gbps to handle high-definition video calls and large file transfers more smoothly.

Latency: The time delay between sending and receiving data, usually measured in milliseconds (ms).

Business ExampleA video conference lags when latency is high, causing participants to talk over each other.

Throughput: The actual amount of data successfully transferred per second—affected by bandwidth, latency, and network congestion.

Business ExampleDuring peak hours, a cloud backup might slow down because network throughput drops below expected levels.

In simple terms, bandwidth is the size of the highway, latency is the delay in travel time, and throughput is how many cars actually reach their destination per second. Businesses need to manage all three for efficient communication.


Everyday Examples in the Business Environment

  1. Video Meetings and Streaming:
    Video conferencing relies on consistent bandwidth and low latency to deliver clear images and sound. A marketing team presenting to clients via Zoom or Microsoft Teams needs reliable connectivity—otherwise, communication breaks down and professional credibility suffers.
  2. File Sharing and Cloud Collaboration:
    Employees frequently share large files such as financial spreadsheets, design documents, or presentations. Cloud platforms like Google Drive and OneDrive allow multiple users to view and edit these files in real time. The faster the data can move, the more seamless this teamwork becomes.
  3. Online Orders and Customer Service:
    E-commerce transactions involve multiple data exchanges: a customer submits an order, the system verifies inventory, the payment processor confirms the transaction, and the shipping system updates delivery details. All these steps depend on secure and reliable data communication. A slowdown or failure in any step can lead to lost sales or frustrated customers.
  4. Business Intelligence and Analytics:
    Modern companies depend on dashboards and analytics platforms that pull data from various sources in real time. If communication networks are slow or unstable, decision-making becomes delayed or based on outdated information.

Data communications are not just an IT issue—they are a strategic business resource. Reliable communication networks enable:

  • Faster decision-making
  • Better collaboration among employees and partners
  • Enhanced customer experiences
  • New business models like e-commerce and telework

For future business leaders, understanding how data moves through networks—and how communication quality affects operations—forms the foundation for thriving in an increasingly digital economy.


6.2 – Data Networking Overview

Why Networks Matter in Business

Every time you send an email, check your bank balance, or join a video meeting, you’re using a computer network. Networking is what allows computers, phones, and websites to share data—instantly and globally. For businesses, networks are the invisible highways that move digital information. They connect employees, customers, and systems across departments, buildings, and continents. Without networking, collaboration tools like Microsoft Teams or Google Drive, cloud storage, or online ordering systems wouldn’t exist.

To understand how all this works together, we need to look at a few key ideas: what a network is made of, how devices connect, and how they “speak” to one another.


Core Components of a Network

At the simplest level, every network—no matter how large—relies on a few basic components:

ComponentDescriptionExample
Sender (Source)The device that starts communication.A laptop sending an email.
Receiver (Destination)The device that receives the message.Your coworker’s phone receiving the email.
Transmission MediumThe path that carries the data.Ethernet cables, fiber optics, Wi-Fi or cellular radio waves.
ProtocolThe agreed-upon “language” or set of rules for communication.Like using English in a conversation, computers use the TCP/IP protocol

Think of it like mailing a letter:

  • The sender writes it and addresses the envelope.
  • The post office (the medium) delivers it through various routes.
  • The receiver opens it and reads the message.
  • Both sides must agree on the same format—language, address system, and postal rules—so the letter can be delivered correctly.

Common Network Types

Businesses use different network types depending on size and purpose.

TypeMeaningTypical Use
PAN (Personal Area Network)Connects low power devices to your phone or computer using BluetoothWireless keyboards/mice, earbuds, smart watches, etc.
LAN (Local Area Network)Connects devices in a single building or area.Office networks, schools, or coffee shops.
WLAN (Wireless LAN)A LAN that uses Wi-Fi instead of cables.Home or business Wi-Fi networks.
WAN (Wide Area Network)Connects multiple LANs over large distances.A company’s offices across states or countries.
VPN (Virtual Private Network)Creates a secure “tunnel” through the Internet so remote workers can safely access company systems.Employees working from home.

Example: A retail chain might have a LAN inside each store for cash registers and inventory computers. Those store networks connect to the company’s headquarters through a WAN. Employees who travel can connect back through a VPN.


Key Networking Devices

Networks depend on specialized hardware that manages data flow:

DevicePurposeAnalogy
RouterConnects multiple networks and directs data between them.A traffic officer directing cars at an intersection.
SwitchConnects many devices within a single network and manages data traffic efficiently.A local post office that sorts mail within your town.
FirewallMonitors and controls incoming/outgoing network traffic to block unauthorized access.A security guard checking IDs at the door.
Access Point (AP)Provides wireless connectivity for laptops and mobile devices.A Wi-Fi hotspot that lets you join the network.

Business Tip: In modern offices, routers and firewalls often work together to connect to the Internet while protecting company data. A reliable network setup keeps operations running smoothly and securely.


6.3 – How Networks Talk: Protocols and Models

If devices are the “hardware” of a network, protocols are the “grammar and vocabulary” of digital communication. They define how computers send, receive, and interpret data so that information arrives intact and understandable.


The OSI and TCP/IP Models: Mailing a Digital Package

To simplify the complexity of networking, engineers use reference models that describe how communication happens in layers. The two main ones are:

  • OSI Model (Open Systems Interconnection) – a seven-layer conceptual framework.
  • TCP/IP Model – a simpler, four-layer model used in real-world Internet communication.

Think of sending an online order or package:

Step (OSI Layer)Example ActionAnalogy
1. PhysicalElectrical signals or radio waves carry bits.The delivery truck carrying packages.
2. Data LinkData frames are sent between devices on the same network.The driver ensures packages go to the right street.
3. NetworkAssigns addresses (IP) and finds the best route.GPS navigation choosing a delivery route.
4. TransportEnsures all parts of the message arrive correctly (TCP/UDP).Tracking numbers verifying each box arrived safely.
5–7. Session / Presentation / ApplicationHandle user access, formatting, and applications.Opening the box and reading the message or using the product.

In short: The OSI model describes what happens; the TCP/IP model is how the Internet actually does it.

TCP/IP Model – The Real-World Internet Framework

TCP/IP LayerMain ResponsibilitiesTypical Protocols / TechnologiesExample in Action (Business Context)
Application LayerProvides services directly to end users or applications — formats data for communication and defines how programs exchange information.HTTP/HTTPS, SMTP, IMAP, DNS, FTP, SFTPA customer uses a web browser (HTTP/HTTPS) to place an order on your company’s website, and an order-confirmation email is sent using SMTP.
Transport LayerEnsures reliable (or fast) delivery of data between devices. Breaks data into segments and reassembles them at the destination.TCP (Transmission Control Protocol), UDP (User Datagram Protocol)TCP guarantees every part of a purchase order reaches the accounting system correctly; UDP is used for a live customer-support video chat.
Internet LayerAssigns IP addresses and determines the best path for data to travel across networks — the “routing” level.IP (IPv4/IPv6), ICMP (for error reporting)A packet carrying invoice data travels through several routers to reach the company’s data center using its public IP address.
Network Access Layer (also called Link or Physical Layer)Handles the physical connection and local network addressing — moves bits across the actual hardware medium.Ethernet, Wi-Fi (802.11), ARPThe employee’s laptop connects via office Wi-Fi to the router, which then forwards the data toward the Internet.

When information travels across a network, it doesn’t move as one big stream—it’s broken into small pieces called data packets. Each packet carries part of the original message along with details like the sender and receiver’s IP addresses and identity of the device, the order of the packets, and error-checking information. Think of sending a long document through the mail by dividing it into many numbered envelopes. Each envelope takes its own route to reach the destination, and once they all arrive, the receiving computer puts them back together in the correct order. This packet-based system makes network communication faster, more reliable, and able to handle large amounts of data efficiently—even when millions of devices are sending information at the same time.

The protocols ensure that the data packets are reliably delivered, executed by the receiving computer correctly, and that the data is sent within the computer or device to the correct application.

Common Internet Protocols

ProtocolPurposeExample
HTTP / HTTPS (Hypertext Transfer Protocol / Secure)Transfers web pages between browsers and servers. HTTPS encrypts the data for safety.Visiting a secure website.
DNS (Domain Name System)Converts easy-to-remember web names into IP addresses.Turning “www.una.edu” into the server’s numeric IP.
SMTP / IMAP (Email Protocols)SMTP sends outgoing mail; IMAP retrieves it from the server.Sending and reading business emails.
FTP / SFTP (File Transfer Protocol / Secure)Uploads and downloads files between computers.Sharing product catalogs or website files.

Real-World Example: When you open a browser and go to an online store, your computer uses DNS to find the site, HTTP/HTTPS to load the page, and perhaps SMTP to send you an order confirmation email.


IP Addresses and Routing

Every device on a network has an IP (Internet Protocol) address, similar to a home address. It tells routers where to send data.

  • IPv4 uses numbers like 192.168.1.10 (limited to about 4 billion addresses).
  • IPv6 uses longer strings like 2001:0db8::1, providing almost unlimited addresses for future devices.

Routing is how data finds its way across networks—like choosing the fastest route for a delivery truck. Routers exchange information to determine the best path so that your video call or online transaction reaches the right destination quickly.


Reliability and Security in Business Networks

Not all communication methods are equally reliable. Two key transport protocols handle how data travels:

ProtocolUseReliability
TCP (Transmission Control Protocol)Ensures all packets arrive correctly and in order.Reliable – used for web pages, emails, and business applications.
UDP (User Datagram Protocol)Sends data faster without waiting for confirmation.Faster but less reliable – used for streaming video or live chats.

Businesses often rely on TCP for accuracy but use UDP for speed when a few dropped packets don’t matter.

Security is equally critical. A VPN (Virtual Private Network) encrypts all data traveling over public networks, protecting sensitive business information like financial records or client data. Firewalls, strong passwords, and encryption together ensure confidentiality and trust.


Why This Matters to Business

Behind every online sale, customer service chat, or digital payment is a network making it possible.

  • Retailers depend on secure networks to process credit cards.
  • Banks rely on encrypted communication to protect customer data.
  • Remote employees connect via VPNs to company servers.
  • Cloud services store massive amounts of business information accessible from anywhere.

Understanding these fundamentals helps business professionals communicate effectively with IT staff, evaluate technology decisions, and appreciate the cost and importance of maintaining secure, reliable networks.


6.4 The Internet and Web Technologies

A Short History: From ARPANET to Web 3

The Internet began in the late 1960s as a U.S. government research project called ARPANET, designed to let scientists share data between computers at different universities. At the time, computers were large, expensive, and often incompatible. ARPANET introduced the revolutionary idea of packet switching, allowing data to travel in small chunks through a shared network.

During the 1980s and early 1990s, the Internet expanded beyond research institutions. In 1989, Tim Berners-Lee at CERN invented the World Wide Web, combining three simple ideas that changed everything:

  1. HTML (Hypertext Markup Language) – the format for creating web pages.
  2. HTTP (Hypertext Transfer Protocol) – the communication standard for web browsers and servers.
  3. URLs (Uniform Resource Locators) – unique “addresses” for every page or resource online.

By the mid-1990s, web browsers such as Netscape made the Internet user-friendly, launching the dot-com era. Businesses quickly saw its potential for marketing, e-commerce, and global communication.

Today, we often talk about Web 3, an evolving concept that blends artificial intelligence, blockchain, and decentralized data ownership. While still developing, Web 3 aims to give users more control over their data and identity rather than relying entirely on large centralized companies.


How the Internet Finds Things: DNS, URLs, and Search Engines

The Internet might seem chaotic, but it’s built on an organized addressing system. Every website lives at a numeric IP address—for example, 192.0.2.45. Since numbers are hard to remember for people, the Domain Name System (DNS) acts like the Internet’s phone book, translating easy names such as www.una.edu into their underlying IP addresses.

When you type a web address (URL) into your browser, several steps happen in microseconds:

  1. The browser asks a DNS server to find the IP address for the name.
  2. The request is routed through routers to the correct web server.
  3. The web server sends back the requested page using the HTTP or HTTPS protocol.

Because there are billions of pages online, search engines such as Google, Bing, and DuckDuckGo use automated programs (called crawlers) to index pages. They organize results using algorithms that evaluate relevance, content quality, and user behavior. For businesses, understanding this process—known as Search Engine Optimization (SEO)—is vital for online visibility.


Web Applications and APIs – Connecting Data Across the Internet

Modern websites are no longer just static pages—they are web applications that process data, interact with databases, and integrate with other systems. Examples include online banking, social media platforms, and cloud-based tools like Google Drive or Salesforce.

Behind the scenes, many of these systems exchange data using APIs (Application Programming Interfaces). An API defines how software programs communicate—essentially a contract that says, “If you ask for information in this format, I’ll return it in this structure.”

For example, a travel website might use APIs to:

  • Pull flight data from airlines,
  • Access hotel availability from partner systems, and
  • Display real-time weather information from a third-party service.

APIs make it possible for different organizations to share and reuse data efficiently, which is critical for today’s digital business models.

Business Insight: Understanding web technologies helps managers evaluate new opportunities—whether launching an online store, connecting cloud software, or building a mobile app that uses an existing platform’s API.


6.5 Enterprise Networks: Intranets and Extranets

While the public Internet connects the whole world, most organizations also maintain private networks that manage their internal communication and business partnerships. Two key types are intranets and extranets.


Intranets: The Internal Digital Workplace

An intranet is a private network that operates inside a company. It uses the same web technologies (browsers, servers, and HTML pages) as the public Internet but is only accessible to employees.

Typical intranet uses include:

  • Human Resources: digital forms, benefits enrollment, company policies.
  • Internal Communication: announcements, discussion forums, or newsletters.
  • Document Management: shared files, project updates, and workflow approvals.

For example, an employee might log in to the company intranet to download an HR policy, complete a time sheet, or view the CEO’s latest message.

Modern intranets often integrate cloud collaboration tools such as Microsoft SharePoint, Google Workspace, or Slack, allowing teams to share files, co-edit documents, and schedule meetings seamlessly.

Benefits for business:

  • Reduces paper use and administrative overhead.
  • Improves communication and consistency across departments.
  • Strengthens company culture through shared access to information.

Extranets: Extending the Network to Partners

An extranet goes one step further. It allows approved external partners—such as suppliers, distributors, or large customers—to access selected parts of a company’s internal network. Access is controlled with secure logins, encryption, and firewalls.

FeatureIntranetExtranet
UsersEmployees onlyEmployees + approved outside partners
PurposeInternal communication and operationsCollaboration with vendors, customers, or business partners
AccessInside company or via VPNSecure remote access with authentication
ExampleHR portal, training siteSupplier ordering portal, shipment tracking dashboard

Business Example 1 – Airline Maintenance Networks:
Major airlines give aircraft manufacturers and maintenance providers limited extranet access to maintenance schedules, technical manuals, and parts inventories. This allows partners to coordinate repairs faster and minimize downtime.

Business Example 2 – Retail Vendor Portals:
Retail chains like Walmart or Target maintain extranets where suppliers can track sales, update product availability, and view purchase orders. This real-time data exchange improves inventory accuracy and supply-chain efficiency.


Security and Management Considerations

Both intranets and extranets rely heavily on network security. Companies must authenticate users, encrypt sensitive information, and restrict access based on job roles or partner agreements. Many organizations use Virtual Private Networks (VPNs) to protect these connections when users work remotely.

In summary:

  • The intranet connects people within the company.
  • The extranet connects the company with trusted outsiders.
    Together, they form the digital backbone of modern enterprise collaboration—enabling speed, efficiency, and trust in business communication.

6.6 Cloud Computing and Virtualization

The Shift to the Cloud

A few decades ago, companies ran all their software and stored all their data on local computers or in on-site data centers. This required constant maintenance, expensive servers, and IT staff. Cloud computing changed that by moving those computing resources to the Internet. Today, a business can rent servers, store files, or use entire software systems online—paying only for what it needs.

At its core, cloud computing means delivering computing power, storage, and applications as services over the Internet rather than owning the hardware or building and maintaining the software yourself. Cloud providers also provide the security and keep the hardware and software services secure with firewalls and software patches. This flexibility has transformed how organizations operate, from small startups to global enterprises. It is also a great equalizer allowing a single employee startup to have access to the same quality of services as a multi-billion-dollar corporation. Cloud computing gives even small businesses the same computing power that once required multimillion-dollar data centers—leveling the digital playing field.


Cloud Service Models: IaaS, PaaS, and SaaS

Cloud services come in several “layers,” each serving a different business need:

ModelWhat It ProvidesBusiness Example
IaaS – Infrastructure as a ServiceVirtual servers, storage, and networking. Companies control the software but not the hardware.Amazon Web Services (AWS), Microsoft Azure Virtual Machines.
PaaS – Platform as a ServiceA ready-made environment for developers to build and test apps without managing servers.Google App Engine, AWS Elastic Beanstalk.
SaaS – Software as a ServiceComplete software applications delivered through a browser or app.Microsoft 365, Salesforce, Google Workspace.

Quick Analogy:

  • IaaS = renting the building and bringing your own furniture.
  • PaaS = renting a fully equipped office.
  • SaaS = renting the whole office and staff—it’s ready to use immediately.

Cloud Deployment Types

Different businesses use the cloud in different ways depending on security, control, and cost:

TypeDescriptionTypical Use
Public CloudShared infrastructure owned by a third-party provider; open to multiple customers.Startups or small businesses seeking low cost and easy setup.
Private CloudDedicated to one organization, hosted internally or by a vendor.Banks, hospitals, or government agencies with strict data control.
Hybrid CloudMix of public and private resources for flexibility.Large firms balancing sensitive data storage with scalable workloads.

Business Tip: Many firms use encryption, multifactor authentication, and backups across multiple providers to mitigate risks and security issues, create secure data storage, and to improve system performance.


6.7 Wireless and Mobile Communication (Wi-Fi, 5G, IoT)

Cutting the Cords

Modern business no longer depends on being plugged in. Wireless communication enables mobility, flexibility, and constant connectivity. From Wi-Fi in coffee shops to sensors in delivery trucks, data now travels invisibly through the air instead of wires.


Common Wireless Standards

TechnologyPurposeTypical Business Use
Wi-Fi (Wireless LAN)Connects devices over short to medium range using radio waves.Office networks, airports, retail stores.
BluetoothConnects devices directly over short distances.Wireless headsets, barcode scanners, keyboards.
NFC (Near Field Communication)Enables very short-range communication by tapping devices together.Contactless payments (Apple Pay, Google Pay), employee ID badges.

Wi-Fi provides high-speed Internet access in offices and public spaces; Bluetooth connects personal or workplace devices; and NFC powers mobile transactions and digital ID cards for electronic locks.


The Mobile Network Evolution

The cellular network has evolved from simple voice calls to ultra-fast digital communication and even mobile Wi-Fi hotspots:

GenerationApprox. Speed & FeaturesBusiness Impact
3GFirst reliable mobile Internet.Email and basic browsing on the go.
4G LTEHigh-speed data and streaming.Mobile apps, video calls, cloud access.
5GExtremely fast, low-latency connections.Real-time analytics, remote robotics, telehealth.
6G (future)Expected to integrate AI and satellite networks.Fully intelligent connected systems and immersive experiences.

5G, the current frontier, allows data transfer speeds up to 100 times faster than 4G and response times measured in milliseconds. This unlocks real-time applications that were previously impossible.

Internet of Things (IoT) refers to billions of everyday devices—thermostats, machinery, wearables—connected to the Internet, sharing data that businesses can analyze for insight and efficiency. These devices are low-power and usually specialized data collection devices.


Business Applications: Smart, Connected Operations

Wireless technology powers nearly every aspect of modern business:

  • Smart Offices and Manufacturing: Wireless sensors manage lighting, temperature, and security automatically and provide real-time manufacturing and machinery data back to dashboards for management’s use.
  • Retail and Logistics: Bluetooth tags and IoT (Internet of Things) trackers monitor shipments and inventory in real time.
  • Telehealth: 5G enables high-definition video consultations and remote patient monitoring in rural and low-income areas.
  • Manufacturing: IoT sensors on equipment predict maintenance needs before breakdowns occur.
  • Transportation: GPS and 5G allow connected vehicles to communicate traffic data, their real-time location, and optimized delivery routing.

The Wireless Future

As 5G expands and 6G research continues, the line between physical and digital operations will blur. Businesses will increasingly rely on real-time data, edge computing, and AI-powered devices to make instant decisions.

Key Idea: Wireless and mobile technologies are no longer conveniences—they are the infrastructure of a truly connected economy. Companies that harness them effectively gain speed, insight, and competitive advantage in the digital age.

6.8 E-Commerce and Digital Business Platforms

From Brick-and-Mortar to Digital-First

In today’s business world, nearly every company has an online presence. Whether selling products, providing services, or managing internal operations, digital tools have become central to how business is done. This shift toward digital-first means organizations design their products, marketing, and workflows around online systems from the start—rather than treating them as an afterthought.

The Internet, cloud computing, and mobile technologies together have created a powerful ecosystem where companies, customers, and governments can interact instantly. Understanding how these systems connect is essential for every modern business professional.


Types of E-Commerce

E-commerce simply means conducting business transactions electronically—buying, selling, or exchanging goods and services over the Internet. There are several main types:

TypeStands ForWho’s InvolvedExample
B2CBusiness-to-ConsumerCompanies sell directly to individuals.Amazon, Target.com, Spotify subscriptions.
B2BBusiness-to-BusinessCompanies sell to other businesses.Office Depot supplying a corporation with office materials.
C2CConsumer-to-ConsumerIndividuals buy and sell to each other online.eBay, Facebook Marketplace, Etsy.
G2BGovernment-to-BusinessGovernments provide information or services to businesses.Online tax filings, business licensing portals.

Each type relies on secure online transactions, digital marketing, and data analytics to build trust and efficiency.


Digital Payments: The Engine of Online Commerce

Behind every successful e-commerce platform is a reliable digital payment system. Businesses must offer convenient and secure ways for customers to pay online.

Common payment methods include:

  • Credit and Debit Cards: Still the most widely used for online purchases.
  • Digital Wallets: Services like PayPal, Venmo, and Apple Pay allow customers to store card information securely and check out with one click or tap.
  • Mobile Payments: Smartphones and smartwatches now function as payment devices using NFC (Near Field Communication).
  • Cryptocurrency: Some companies accept Bitcoin or stable coins, though regulation and volatility remain challenges.

Security is crucial in digital payments. Encryption, multifactor authentication, and fraud detection systems protect both consumers and businesses from cybercrime.

Example: When you purchase a product on an online store using Apple Pay, the system uses tokenization—replacing your actual card number with a temporary digital token—to ensure privacy and prevent theft.


Cloud-Based Collaboration Tools

E-commerce doesn’t just mean selling—it also means working digitally. Teams today collaborate in the cloud using shared tools that keep everyone connected, whether they’re in the same office or across continents.

PlatformPrimary UseBusiness Example
Microsoft TeamsVideo calls, chat, and document sharing integrated with Office apps.Project teams holding weekly updates remotely.
SlackInstant messaging, file sharing, and workflow automation for business communication.Startups and marketing agencies managing client communications.
Google Docs / Google WorkspaceCloud-based word processing, spreadsheets, and presentations editable in real time.Students, educators, and companies co-editing reports simultaneously.

These tools reduce email overload and allow real-time updates, comments, and decision-making—key to maintaining productivity in distributed or hybrid work environments.


The “Digital-First” Business Model

A digital-first business operates primarily through online platforms rather than physical locations. This approach emphasizes flexibility, data-driven decisions, and automation.

Key characteristics include:

  • Online Presence: Websites and mobile apps serve as the main customer interface.
  • Cloud Infrastructure: Data and applications run on scalable cloud platforms (like AWS or Google Cloud).
  • Data Analytics: Decisions are informed by customer behavior and transaction data.
  • Automation: Tasks like order fulfillment, billing, and marketing are handled by software systems.

Examples:

  • Amazon built its empire on digital logistics and customer data analytics.
  • Netflix disrupted the entertainment industry by moving video streaming entirely online.
  • Small local businesses now use e-commerce sites, social media, and mobile payments to compete with larger brands.

Why It Matters

Digital business platforms level the playing field. A small business in Alabama can reach global customers as easily as a multinational corporation. Cloud tools allow employees to work together from anywhere, and secure payment systems ensure customers can buy with confidence.

For business professionals, understanding digital commerce is not just about technology—it’s about opportunity. Companies that adopt digital-first strategies can grow faster, serve customers better, and adapt quickly to change.

Key Takeaway:
E-commerce and cloud platforms have transformed how business is done. They are not just tools for selling products—they are the foundation for a global, always-on economy where speed, convenience, and connectivity define success.

Chapter 6 Summary – Data Communications and the Internet

Overview

This chapter introduced the digital backbone of modern business — how data moves, how networks connect organizations, and how cloud and wireless technologies support global commerce. Understanding these fundamentals helps business professionals communicate effectively with IT teams, evaluate digital tools, and make informed decisions about technology investments.


Key Terms

TermDefinition
BandwidthThe maximum rate of data transfer over a network connection.
LatencyThe delay between sending and receiving data.
ThroughputThe actual amount of data transmitted successfully.
ProtocolA set of rules defining how data is formatted and transmitted across a network.
RouterA device that directs data between networks.
FirewallA system that monitors and controls incoming and outgoing network traffic.
DNS (Domain Name System)Converts domain names (like una.edu) into numeric IP addresses.
IP AddressA unique number that identifies each device on a network.
VPN (Virtual Private Network)Encrypts Internet connections to protect data transmitted remotely.
Cloud ComputingDelivery of computing services (storage, software, databases) over the Internet.
IaaS / PaaS / SaaSLayers of cloud service: Infrastructure, Platform, and Software as a Service.
IntranetA private network accessible only to a company’s employees.
ExtranetA controlled network that allows access to partners or suppliers.
IoT (Internet of Things)Physical devices connected to the Internet, collecting and sharing data.
E-CommerceBuying and selling goods or services online.
Digital-First BusinessA company that prioritizes online and cloud-based operations.

Quick Review

  1. How does data travel across a network?
    Through packets that move from sender to receiver using protocols such as TCP/IP.
  2. What are the seven layers of the OSI model?
    Physical, Data Link, Network, Transport, Session, Presentation, and Application.
  3. What’s the difference between LAN and WAN?
    LAN connects local devices within one area; WAN connects multiple LANs over long distances.
  4. How do cloud services differ?
    • IaaS provides infrastructure (servers, storage).
    • PaaS provides platforms for developers.
    • SaaS provides complete applications over the web.
  5. What is 5G, and why is it important?
    Fifth-generation wireless networks offering ultra-fast, low-latency connections that power IoT and real-time applications.
  6. How do businesses use intranets and extranets?
    Intranets manage internal communication; extranets connect securely with outside partners.
  7. What is a digital-first business strategy?
    Building operations, marketing, and sales primarily around online tools and cloud systems.

Real-World Spotlight: DC Coffee — Brewing Success in the Cloud

https://www.conversiondigital.com.au/case-study/dc-coffee

Background:
DC Coffee, a small Melbourne-based specialty roaster founded in 2002, faced slowing sales and fierce competition from large national coffee brands. Without the budget for big-media advertising or multiple storefronts, they needed a cost-effective way to expand their reach and reconnect with customers nationwide.

The Digital Transformation:

  1. Cloud-Based E-commerce:
    DC Coffee launched a modern online store hosted entirely in the cloud. This allowed them to manage inventory, payments, and shipping from anywhere, without maintaining expensive servers.
  2. Targeted Digital Marketing:
    The company invested in Google Shopping, search-engine marketing, and Meta (Facebook/Instagram) ads to reach coffee lovers where they already browse. Cloud-based analytics tools helped them track performance in real time.
  3. Data-Driven Optimization:
    Using reporting dashboards, DC Coffee could see which ads, keywords, and audiences produced the highest returns. They continually adjusted their campaigns—something impossible with traditional print marketing.

Results:

  • More than 5× growth in online purchases within the first campaign cycle.
  • Over 80% reduction in cost per acquisition as marketing efficiency improved.
  • A nationwide online customer base—without adding physical stores.

Key Takeaway:
Cloud computing and digital marketing let small firms like DC Coffee act like large corporations—scaling quickly, collecting meaningful data, and building strong direct-to-consumer relationships. Technology didn’t just support their business—it became the foundation of it.


Discussion Questions

  1. Which specific cloud tools or platforms (e.g., Shopify, Google Ads, Microsoft 365) would you recommend to a local business trying to grow online?
  2. How does data analytics help small companies make smarter marketing decisions?
  3. What risks might DC Coffee face by relying heavily on cloud services and online advertising platforms?
  4. In your view, what makes a business truly “digital-first”?