Chapter 5: Understanding Internetworking Infrastructure
|
|
- Willis Hood
- 8 years ago
- Views:
Transcription
1 Chapter 5: Understanding Internetworking Infrastructure
2 Key questions What are the basic components of Internetw orking Infrastructures? What Business Implications do they bring? The Future?
3 A Graphical Representation of Moore s Law Moore's Law Transistors per Chip Year Adapted by author from Microprocessor Report 9(6), May 1995 and ChipList 9.9.5, by Aad Offerman, July Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-1
4 Basic Components of Internetworking Infrastructures The Technological Elements Local Area networks Hubs, switches and Network Adapters Wide Area Networks Routers Firewalls and other security systems and devices Caching, content acceleration and other specialized devices
5 T h e E v o l u t i o n o f C o r p o r a t e I T I n f r a s t r u c t u r e S o u r c e : A p p l e g a t e, L y n d a M., R o b e r t D. A u s t i n, a n d F. W a r r e n M c F a r l a n, C o r p o r a t e I n f o r m a t i o n S t r a t e g y a n d M a n a g e m e n t. B u r r R i d g e, I L : M c G r a w - H i l l / I r w i n, C h a p t e r 5 F i g u r e 5-2
6 A Graphical Representation of Metcalfe s Law Metcalfe's Law Value of Network Number of Users Connected to the Network Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-3
7 T h e B a n d w i d t h E x p l o s i o n N e t w o r k B a n d w i d t h G r o w t h T r u e v o i c e - o v e r - I P t e l e p h o n y, h i g h r e s o l u t i o n I n t e r n e t t e l e v i s i o n, m u s i c a n d m o v i e s o n d e m a n d, v i r t u a l w o r k p l a c e s, b r o a d b a n d w i r e l e s s L i v e a u d i o a n d v i d e o s t r e a m i n g e v e n t s, d i g i t a l c o m m e r c e, I n t e r n e t r a d i o a n d t e l e v i s i o n, v i o c e c h a t a p p l i c a t i o n s S t r e a m i n g a u d i o a n d v i d e o, a d v a n c e d e - c o m m e r c e, l i v e s t o c k q u o t e s, 1, M B p s M a s s W W W a d o p t i o n, g r a p h i c i n t e n s i v e, i n s t a n t m e s s a g i n g M a s s e - m a i l a d o p t i o n, b a s i c W W W s i t e s L a r g e f i l e t r a n s f e r, e - m a i l F i l e t r a n s f e r I n c r e a s i n g N e t w o r k B a n d w i d t h S o u r c e : A d a p t e d f r o m : h t t p : / / w w w. s t a n f o r d. e d u / ~ y z a r o l i a / C h a l l e n g e s. h t m C h a p t e r 5 F i g u r e 5-4
8 Basic Components of Internetworking Infrastructures (Cont) The Technological Elements of Processing Systems Client Devices and Systems Server Devices and Systems Mainframe Devices and Systems Middleware Infrastructure Management Systems Business Applications
9 A Simple LAN Workstation Laptop Workstation Printer Hub Server Printer Laptop Workstation Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-5
10 An Example of a WAN Remote Backup Frame Relay Network Backup Frame Relay Network Production Plant Frame Relay Provider Network Production Plant Corporate Backup Frame Relay Network Remote Remote Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-6
11 UPER LOWER NORMA D SD SD SD SD SD SD SD SD Servers in a Typical E-Commerce Configuration Qdata Facility Big Iron Qdata Private Network VPN Cust A To Public Internet VPN Cust B Router- Cust A Ethernet Switch DNS Servers Router- Cust B VPN Cust... Internet Router Router- Cust... Network Management VPN ipremier Company ipremier Co Cage Router Firewall Web Accelerator Router to HO Ethernet Switches T1 Web Server Cluster SMTP/POP Server Network Management Database Server DIAGRAM SIMPLIFIED FOR ILLUSTRATION PURPOSES Source : Austin, Robert D.; Leibrock, Larry; Murray, Alan, The ipremier Company: Denial of Service Attack (A), Harvard Business School Case No Chapter 5 Figure 5-7
12 Basic Components of Internetworking Infrastructures (Cont) The Technological Elements of Facilities Building and Physical spaces Network Conduits and connections Power Environmental controls Security
13 A Modern Data Center Source: Allegiance Telecom Chapter 5 Figure 5-8
14 Basic Components of Internetworking Infrastructures (Cont) The Operational Characteristics of Internetworks Open Standards (TCP/IP) Asynchronous Operation Inherent Latency Decentralization Scalability
15 Fundamental Components of Internetworking Infrastructure Netw ork Processing Systems Facilities Core Technologies Fiber optics, cable systems, DSL, satellite, wireless, Internetworking hardware (routers, switches, firewalls), content delivery software, identity and policy management, net monitoring Transaction software (enterprise systems offered by companies such as SAP or Oracle; or more targeted solutions offered by companies such as Trilogy and i2), servers, server appliances, client devices (PCs, handhelds) Corporate data centers, collocation data centers, managed services data centers, data closets Key Management Issues How to select technologies and standards How to select partners How to manage partner relationships How to assure reliability How to maintain security What to keep internal and what to outsource How to deploy, grow, and modify Enterprise system or best-of-breed hybrid? Relationships with legacies How to manage incidents How to recover after a disaster Internal or external management? Choosing a facilities model suited to your company How to assure reliability How to maintain security Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Table 5-1
16 Measuring Network Bandwidth Term Bandwidth bit bits per second or bps Definition The maximum rate at which information can be transmitted along a communication link. Smallest unit of information handled by computers Bandwidth measurement unit Bandwidth Rates Bit equivalent Information Transfer speed 1 kilobit (Kb) 1 thousand bits 1,000 bits/ second 1 megabit (Mb) 1 million bits 1,000,000/ second 1 gigabit (Gb) 1 billion bits 1,000,000,000/ second Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Table 5-2
17 The Rise of Internetworking: Business Implications The emergence of Real Time Infrastructures Broader Exposure to Operational Threats New Models Of Service Delivery Managing Legacies
18 Communication Technology Bandwidths and User Groups Communication Technology Bandwidth a User Groups Telephone Modem 33.6 kbps 56 kbps Individuals and small businesses Integrated Services Digital Network (ISDN) 128 kbps Individuals and small businesses Cable Modem 128 kbps 512 kbps Individuals and small businesses Digital Subscriber Line (DSL) 128 kps 1.5 mbps Individuals and small businesses Ethernet LAN 10 mbps 100 mbps Most businesses and organizations Leased Lines (T1, T3) mbps, 45 mbps Government, universities, medium and large businesses Asynchronous Transfer Mode (ATM)/ Gigabit Ethernet 155 mbps 25.6 gbps Government, universities, and large corporations a We have listed the typical bandwidth performance. Some of the technologies are theoretically capable of higher bandwidths. Additional, some technologies perform at different speeds upstream and downstream. Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Table 5-3
19 W a k e - U p C a l l : D e n i a l o f S e r v i c e A t t a c k s i n F e b r u a r y D a t e T a r g e t C o m p a n y R e s u l t s o f A t t a c k F e b r u a r y 7 Y a h o o O v e r w h e l m i n g s p i k e i n t r a f f i c t h a t l a s t e d 3 h o u r s. N e t w o r k a v a i l a b i l i t y d r o p p e d f r o m 9 8 % t o 0 %. A t t a c k o r i g i n a t e d f r o m 5 0 d i f f e r e n t l o c a t i o n s a n d w a s t i m e d t o o c c u r d u r i n g m i d d l e o f b u s i n e s s d a y. S t o c k w a s d o w n 3. 2 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 %. F e b r u a r y 8 B u y. c o m A t t a c k o c c u r r e d w i t h i n a n h o u r o f t h e c o m p a n y s I n i t i a l P u b l i c O f f e r i n g ( I P O ). S t o c k w a s d o w n a t w e e k s e n d m o r e t h a n 2 0 % f r o m I P O p r i c e. E b a y S t o c k w a s d o w n 7. 3 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 %. C N N. c o m S e r v i c e d i s r u p t e d F e b r u a r y 9 E * T r a d e A t t a c k e d d u r i n g p e a k t r a d i n g h o u r s. S t o c k w a s d o w n 7. 6 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 %. Z D N e t S e r v i c e d i s r u p t e d F e b r u a r y 1 8 F e d e r a l B u r e a u o f I n v e s t i g a t i o n S e r v i c e d i s r u p t e d. ( F B I ) F e b r u a r y 2 4 N a t i o n a l D i s c o u n t B r o k e r s G r o u p A t t a c k e d d u r i n g p e a k t r a d i n g h o u r s. ( N D B ) O p e r a t o r s a c c i d e n t a l l y c r a s h e d s i t e a s t h e y a t t e m p t e d t o d e f e n d a g a i n s t t h e a t t a c k. a O v e r a l l p e r f o r m a n c e o f t h e I n t e r n e t d e g r a d e d b y a s m u c h a s 2 5 % d u r i n g t h e p e a k o f t h e a t t a c k s a s c o m p u t e r s r e - s e n t m e s s a g e s r e p e a t e d l y a n d a u t o m a t i c a l l y, t r y i n g t o r e c o v e r i n t e r r u p t e d t r a n s a c t i o n s. S o u r c e : A d a p t e d f r o m : N e t w o r k W o r l d F u s i o n, w w w. n f u s i o n. c o m, c o m p l i e d b y L e G r a n d E l e b a s h. C h a p t e r 5 T a b l e 5-4
20 The Future Client-Server model became popular LANs, WANs, VANs Less dependence on Mainframe comput ers & MIS Electronic communication/workgroup computing tools support group work See GWUForecast.gwu.edu
21 Organizational Design Challenges The Virtual Corporation From Control to Learning From Autonomy to Collaboration Organizational Structure Authority and Decision Making Operating Processes Management Processes Incentives and rewards Roles/Skills and Expertise Career Development
22 Targeted Opportunities Communicating Organizational Priorities Meaningful Budgets Effective Incentive Systems Solution for Production Adaptation for Change
23 Interorganizational Systems (IOS) Networked information systems used by two or more separate organizations to perform a joint business function Interorganizational systems (IOS) Electronic Data Interchange uses EDI standards Extranets - IOS over the Internet
24 IOS EXAMPLE Kmart has opened its IS to help suppliers better serve customers. The interface has an extensive GUI component and allows 50 to 100 vendors to look at Kmart s merchandising database. For example, the system lets Black and Decker access to any data that Kmart believes helps B&D better serve Kmart and its customers. Kmart implemented this program in exchange for more frequent and smaller deliveries, but also because it was in the best interested of the company, its customers and its suppliers. Why did Kmart implement this IOS? What is the implication for having Kmart decide on what info B&D can access?
25 IOS Risks Forces automation & lock-in to a particular system Government regulations may change Great impacts on organizational structures, systems, & people - loss of control Diminishes organizational boundaries -- requires trust in partners
26 Electronic Data Interchange (EDI) Computer-to-computer exchange of standard business transaction documents between 2 organizations purchase orders invoices bill of lading
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
More informationChapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
More informationTechnical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationThink! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information
Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange
More informationMANAGEMENT INFORMATION SYSTEMS 8/E
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
More informationIntroduction. Network Basics. Workstations. Server. Hub
Introduction If you re planning to use eivf soon, you may want to install a computer network to improve access to your eivf Provider Portal from any PC in your office. This paper provides information you
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More informationBroadband Bonding Network Appliance TRUFFLE BBNA6401
Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable
More informationTelecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
More informationChapter 6. Architecture About Infrastructure. Introduction. Real World Examples
Introduction Chapter 6 Architecture and Managing and Using Information Systems: A Strategic Approach by Keri Pearlson & Carol Saunders What is the architecture of an organization? What is the infrastructure
More informationHow To Get High Speed Internet In Australia
ADSL vs Cable Cable subscribers are connected directly to high speed lines while ADSL subscribers are connected directly to medium speed lines Cable subscribers share the line connecting them to neighbourhood
More informationWireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationBandwidth Primer The basic conditions and terms used to describe information exchange over networks.
The basic conditions and terms used to describe information exchange over networks. 385 Jordan Road Troy, NY 12180 Phone 518.286.7000 518.286.2439 www.learnlinc.com Table of Contents TABLE OF CONTENTS...2
More informationC20.0001 Information Systems for Managers Fall 1999
New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in
More informationInternet Public Network
Internet Public Network Bandwidth Data rate measured in bits (not bytes) per seconds Kbps (Kilobits per seconds) 125 chars/sec Mbps (Megabits per seconds) 1,250 chars/sec Gbps (Gigabits per seconds) 12,500
More informationICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
More information1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class
1.264 Lecture 34 Telecom: Connecting wired LAN, WAN Next class: Green chapter 17. Exercise due before class 1 Exercise Your transportation brokerage company also handles billing for freight shipments,
More informationGlossary of Telco Terms
Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business
More informationBroadband Bonding Network Appliance TRUFFLE BBNA6401
Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable
More informationi. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis
ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information
More informationWAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
More informationNETWORK ADMINISTRATOR
JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under
More informationBasic Computer Networks Configurations
School of Business Eastern Illinois University Basic Computer Networks Configurations (September 2, 2015) Abdou Illia, Fall 2015 Learning Objectives 2 Outline Basic network configurations Name kinds of
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationCMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS. Chapter 5: Network Design and Troubleshooting Scenarios
CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS Chapter 5: Network Design and Troubleshooting Scenarios Objectives Discuss several considerations that must be made when networking computers together, from
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationNETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
More informationIT Components of Interest to Accountants. Importance of IT and Computer Networks to Accountants
Chapter 3: AIS Enhancements Through Information Technology and Networks 1 Importance of IT and Computer Networks to Accountants To use, evaluate, and develop a modern AIS, accountants must be familiar
More informationWAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com
WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
More informationIntroduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
More informationColt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.
Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationNorfolk Community Fiber Optic Network
Norfolk Community Fiber Optic Network It s not only about technology; it s also about relationships! Norfolk s Community Fiber Optic Network Norfolk s Community Fiber Optic Network Overview Connects 12
More informationUnderstand Wide Area Networks (WANs)
Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks
More informationTelecommunications systems (Part 1)
School of Business Eastern Illinois University Telecommunications systems (Part 1) (Week 11, Thursday 11/02/2006) Abdou Illia, Fall 2006 Learning Objectives 2 Describe and compare types of connection to
More informationICT budget and staffing trends in Healthcare
ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936
More informationConnection Services. Hakim S. ADICHE, MSc
Connection Services Hakim S. ADICHE, MSc adiche@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity
More informationChapter 1 Instructor Version
Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic
More informationwww.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern
More informationComputer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
More informationNetworked Supply Chain Management
1 Networked Supply Chain Management Session 2 Agenda Supply-Chain Management Opportunities and Challenges Technology Choices and Solutions Cisco Case Study Emerging Industry Exchanges Next Steps 3 The
More informationThe part of the network that connects customers to the exchange, sometimes called the local loop or the last mile.
Glossary of broadband terms 3G: Refers to the third generation of mobile phone technology following on from 2G. 3G allows for faster access to the internet and allows services including video calls and
More informationPublic Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.
Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote
More informationHow do SMB benefit from using the Small but Secured Aries Server Appliance
How do SMB benefit from using the Small but Secured Aries Server Appliance white paper Internet Needs The Internet revolution is like nothing in the history of mankind. E-mail can be sent from San Francisco
More informationThe Evolution of Ethernet
June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction
More informationThis course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking
Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationLesson 24 Network Fundamentals
Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe
More information1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
More informationChapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
More informationManagement Information Systems
Management Information Systems Basics of the Internet Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) Internet Basics Outline Internet History Internet Structure Switching Methods
More informationSOLANO COUNTY LIBRARY THREE YEAR LIBRARY TECHNOLOGY PLAN 2001-2004
SOLANO COUNTY LIBRARY THREE YEAR LIBRARY TECHNOLOGY PLAN 2001-2004 LIBRARY MISSION STATEMENT AND GOALS Solano County Library offers professional, innovative, cost-effective service by providing library
More informationCHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two
More informationFundamentals of Network Security Graphic Symbols
Fundamentals of Network Security Graphic Symbols Overview Router Figure 1: IOS Router icon and photos A Router is an internetworking device which operates at OSI Layer 3. A Router interconnects network
More informationTechnical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
More informationSAMPLE. Please answer the following questions about connectivity between THIS CAMPUS AND THE INTERNET:
Survey Questions The first nine (9) questions are asked for each campus in the district or charter school. The last three (3) questions are each asked once for the district or charter school as a whole.
More informationAlexander Nikov. 5. IT Infrastructure and Emerging Technologies. Learning Objectives. BART Speeds Up with a New IT Infrastructure
INFO 1400 Information Technology Fundamentals 5. IT Infrastructure and Emerging Technologies Alexander Nikov Learning Objectives 1. Define IT infrastructure and describe its components. 2. Identify and
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationSchools and Libraries Universal Service Support Mechanism Eligible Services List
Schools and Libraries Universal Service Support Mechanism Eligible Services List (WC Docket No. 13-184; CC Docket No. 02-6; GN Docket No. 09-51) The Federal Communications Commission s (FCC s) rules provide
More informationXROADS NETWORKS WHITE PAPER
XROADS NETWORKS WHITE PAPER The Edge Approach When Connectivity Is Critical TM XRoads Redundancy XROADS NETWORKS - WHITE PAPER The Edge Approach When Connectivity Is Critical TM XRoads Redundancy Redundancy
More informationIT Infrastructure and Emerging Technologies
Chapter 3 IT Infrastructure and Emerging Technologies 5.1 2009 by Prentice Hall Chapter 3 IT Infrastructure and Emerging Technologies LEARNING OBJECTIVES Define IT infrastructure and describe its components.
More informationSuccessWare 21 Deployment Options
SuccessWare 21 Deployment Options This document is intended for a business owner or manager responsible for IT purchasing and management decisions. It is not a technical specifications document, but rather
More informationEnterprise Business Products 2014
Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet
More informationFBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts
Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their
More informationBuilding the Business Case For IP VPNs
March 28, 2002 Building the Business Case For IP VPNs Prepared for: Colorado Office 1317 Cherry Street Denver, CO 80220 303.355.1982 Oklahoma Office 1307 South Boulder Avenue Suite 120 Tulsa, OK 74119
More informationNetwork Design and Architecture
Architectures For Convergence Gary Audin Gary Audin is president of Delphi, Inc. consultancy. He has been an independent communications and security consultant for 25 years. Which definition of Convergence
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationA Talari Networks White Paper. Transforming Enterprise WANs with Adaptive Private Networking. A Talari White Paper
ATalariNetworksWhitePaper TransformingEnterpriseWANswith AdaptivePrivateNetworking ATalariWhitePaper 2 TransformingEnterpriseWANwithAdaptivePrivateNetworking Introduction IT departments face pressures
More informationVMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
More informationManaged Services The. The Road to Revenue. Pravin Mahajan pmahajan@cisco.com. Session Number Presentation_ID
Managed Services The The Road to Revenue Pravin Mahajan pmahajan@cisco.com Session Number 1 Agenda Managed Services Introduction Solution Offerings Market to Services Mapping Summary 2 High Business Interest
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationDSL Variations. NEXTEP Broadband White Paper. Broadband Networks Group. Definitions and differences of Digital Subscriber Line variations.
NEXTEP Broadband White Paper DSL Variations Definitions and differences of Digital Subscriber Line variations. A NEXTEP Broadband White Paper May 2001 Broadband Networks Group DSL Variations EXECUTIVE
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More information2/23/2014. Chapter 5. Problem: Costly and unwieldy IT infrastructure; diminishing resources Solutions:
Chapter 5 IT INFRASTRUCTURE AND EMERGING TECHNOLOGIES VIDEO CASES Case 1: ESPN.com: Getting to extreme Scale On the Web Case 2: Salesforce.com: Managing by Smartphone Case 3: Hudson's Bay Company and IBM:
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationVirtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980
More informationWhite Paper. Complementing or Migrating MPLS Networks
White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationIT Infrastructure and Emerging Technologies
Chapter 5 IT Infrastructure and Emerging Technologies 5.1 LEARNING OBJECTIVES 5.2 Define IT infrastructure and describe its components. Identify and describe the stages and technology drivers of IT infrastructure
More informationHow To Understand Information Systems
Management Information Systems Information Systems: Concepts and Management Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) CHAPTER OUTLINE Types of Information Systems Why
More informationChapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1
Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 - How the Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies - DSL
More informationIntroduction to Meg@POP
Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationFatPipe Networks www.fatpipeinc.com
XTREME WHITE PAPERS Overview The growing popularity of wide area networks (WANs), as a means by which companies transact vital information with clients, partners, and colleagues, is indisputable. The business
More informationDeploying Riverbed wide-area data services in a LeftHand iscsi SAN Remote Disaster Recovery Solution
Wide-area data services (WDS) Accelerating Remote Disaster Recovery Reduce Replication Windows and transfer times leveraging your existing WAN Deploying Riverbed wide-area data services in a LeftHand iscsi
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More informationThe Connected 5,000: Making the Transition to Business Ethernet Services
The Connected 5,000: Making the Transition to Business Ethernet Services The Connected 5,000 characterizes enterprises with business critical data networks that are ready to take advantage of Business
More informationChapter 13: Internet Connectivity
Chapter 13: Internet Connectivity Complete CompTIA A+ Guide to PCs, 6e To configure an internal external modem To explain basic handshaking between a DTE device and a DCE device To use Windows tools when
More informationSAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationCommunity Forum Agenda October 2012
Community Forum Agenda October 2012 Topic Welcome CEKC/WSUE LTPT Project Scope Forums Survey Data Results LTPT Next Steps Broadband 101/Map Q&A Websites Mapping Survey Complete Survey Close/Next Steps
More informationThe WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your
More informationChapter 9 Communications and Networks
Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informationCompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
More informationLesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS. Chapter-1L06: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS 1 Telecom Smart Cards, Examples Missiles and Satellites, Computer Networking, Digital Consumer Electronics, and Automotive 2 3 Exemplary Application Areas Also
More informationSecurity Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/
Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
More information300Mbps Wireless N VoIP VDSL/ADSL Modem Router
300Mbps Wireless N VoIP VDSL/ADSL Modem Router TD-VG5612 Highlights Fast Broadband Speeds Up to 100Mbps broadband speeds, ideal for smooth streaming media and online gaming Cost-Effective VoIP Supports
More information