Chapter 5: Understanding Internetworking Infrastructure

Size: px
Start display at page:

Download "Chapter 5: Understanding Internetworking Infrastructure"

Transcription

1 Chapter 5: Understanding Internetworking Infrastructure

2 Key questions What are the basic components of Internetw orking Infrastructures? What Business Implications do they bring? The Future?

3 A Graphical Representation of Moore s Law Moore's Law Transistors per Chip Year Adapted by author from Microprocessor Report 9(6), May 1995 and ChipList 9.9.5, by Aad Offerman, July Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-1

4 Basic Components of Internetworking Infrastructures The Technological Elements Local Area networks Hubs, switches and Network Adapters Wide Area Networks Routers Firewalls and other security systems and devices Caching, content acceleration and other specialized devices

5 T h e E v o l u t i o n o f C o r p o r a t e I T I n f r a s t r u c t u r e S o u r c e : A p p l e g a t e, L y n d a M., R o b e r t D. A u s t i n, a n d F. W a r r e n M c F a r l a n, C o r p o r a t e I n f o r m a t i o n S t r a t e g y a n d M a n a g e m e n t. B u r r R i d g e, I L : M c G r a w - H i l l / I r w i n, C h a p t e r 5 F i g u r e 5-2

6 A Graphical Representation of Metcalfe s Law Metcalfe's Law Value of Network Number of Users Connected to the Network Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-3

7 T h e B a n d w i d t h E x p l o s i o n N e t w o r k B a n d w i d t h G r o w t h T r u e v o i c e - o v e r - I P t e l e p h o n y, h i g h r e s o l u t i o n I n t e r n e t t e l e v i s i o n, m u s i c a n d m o v i e s o n d e m a n d, v i r t u a l w o r k p l a c e s, b r o a d b a n d w i r e l e s s L i v e a u d i o a n d v i d e o s t r e a m i n g e v e n t s, d i g i t a l c o m m e r c e, I n t e r n e t r a d i o a n d t e l e v i s i o n, v i o c e c h a t a p p l i c a t i o n s S t r e a m i n g a u d i o a n d v i d e o, a d v a n c e d e - c o m m e r c e, l i v e s t o c k q u o t e s, 1, M B p s M a s s W W W a d o p t i o n, g r a p h i c i n t e n s i v e, i n s t a n t m e s s a g i n g M a s s e - m a i l a d o p t i o n, b a s i c W W W s i t e s L a r g e f i l e t r a n s f e r, e - m a i l F i l e t r a n s f e r I n c r e a s i n g N e t w o r k B a n d w i d t h S o u r c e : A d a p t e d f r o m : h t t p : / / w w w. s t a n f o r d. e d u / ~ y z a r o l i a / C h a l l e n g e s. h t m C h a p t e r 5 F i g u r e 5-4

8 Basic Components of Internetworking Infrastructures (Cont) The Technological Elements of Processing Systems Client Devices and Systems Server Devices and Systems Mainframe Devices and Systems Middleware Infrastructure Management Systems Business Applications

9 A Simple LAN Workstation Laptop Workstation Printer Hub Server Printer Laptop Workstation Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-5

10 An Example of a WAN Remote Backup Frame Relay Network Backup Frame Relay Network Production Plant Frame Relay Provider Network Production Plant Corporate Backup Frame Relay Network Remote Remote Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-6

11 UPER LOWER NORMA D SD SD SD SD SD SD SD SD Servers in a Typical E-Commerce Configuration Qdata Facility Big Iron Qdata Private Network VPN Cust A To Public Internet VPN Cust B Router- Cust A Ethernet Switch DNS Servers Router- Cust B VPN Cust... Internet Router Router- Cust... Network Management VPN ipremier Company ipremier Co Cage Router Firewall Web Accelerator Router to HO Ethernet Switches T1 Web Server Cluster SMTP/POP Server Network Management Database Server DIAGRAM SIMPLIFIED FOR ILLUSTRATION PURPOSES Source : Austin, Robert D.; Leibrock, Larry; Murray, Alan, The ipremier Company: Denial of Service Attack (A), Harvard Business School Case No Chapter 5 Figure 5-7

12 Basic Components of Internetworking Infrastructures (Cont) The Technological Elements of Facilities Building and Physical spaces Network Conduits and connections Power Environmental controls Security

13 A Modern Data Center Source: Allegiance Telecom Chapter 5 Figure 5-8

14 Basic Components of Internetworking Infrastructures (Cont) The Operational Characteristics of Internetworks Open Standards (TCP/IP) Asynchronous Operation Inherent Latency Decentralization Scalability

15 Fundamental Components of Internetworking Infrastructure Netw ork Processing Systems Facilities Core Technologies Fiber optics, cable systems, DSL, satellite, wireless, Internetworking hardware (routers, switches, firewalls), content delivery software, identity and policy management, net monitoring Transaction software (enterprise systems offered by companies such as SAP or Oracle; or more targeted solutions offered by companies such as Trilogy and i2), servers, server appliances, client devices (PCs, handhelds) Corporate data centers, collocation data centers, managed services data centers, data closets Key Management Issues How to select technologies and standards How to select partners How to manage partner relationships How to assure reliability How to maintain security What to keep internal and what to outsource How to deploy, grow, and modify Enterprise system or best-of-breed hybrid? Relationships with legacies How to manage incidents How to recover after a disaster Internal or external management? Choosing a facilities model suited to your company How to assure reliability How to maintain security Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Table 5-1

16 Measuring Network Bandwidth Term Bandwidth bit bits per second or bps Definition The maximum rate at which information can be transmitted along a communication link. Smallest unit of information handled by computers Bandwidth measurement unit Bandwidth Rates Bit equivalent Information Transfer speed 1 kilobit (Kb) 1 thousand bits 1,000 bits/ second 1 megabit (Mb) 1 million bits 1,000,000/ second 1 gigabit (Gb) 1 billion bits 1,000,000,000/ second Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Table 5-2

17 The Rise of Internetworking: Business Implications The emergence of Real Time Infrastructures Broader Exposure to Operational Threats New Models Of Service Delivery Managing Legacies

18 Communication Technology Bandwidths and User Groups Communication Technology Bandwidth a User Groups Telephone Modem 33.6 kbps 56 kbps Individuals and small businesses Integrated Services Digital Network (ISDN) 128 kbps Individuals and small businesses Cable Modem 128 kbps 512 kbps Individuals and small businesses Digital Subscriber Line (DSL) 128 kps 1.5 mbps Individuals and small businesses Ethernet LAN 10 mbps 100 mbps Most businesses and organizations Leased Lines (T1, T3) mbps, 45 mbps Government, universities, medium and large businesses Asynchronous Transfer Mode (ATM)/ Gigabit Ethernet 155 mbps 25.6 gbps Government, universities, and large corporations a We have listed the typical bandwidth performance. Some of the technologies are theoretically capable of higher bandwidths. Additional, some technologies perform at different speeds upstream and downstream. Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Table 5-3

19 W a k e - U p C a l l : D e n i a l o f S e r v i c e A t t a c k s i n F e b r u a r y D a t e T a r g e t C o m p a n y R e s u l t s o f A t t a c k F e b r u a r y 7 Y a h o o O v e r w h e l m i n g s p i k e i n t r a f f i c t h a t l a s t e d 3 h o u r s. N e t w o r k a v a i l a b i l i t y d r o p p e d f r o m 9 8 % t o 0 %. A t t a c k o r i g i n a t e d f r o m 5 0 d i f f e r e n t l o c a t i o n s a n d w a s t i m e d t o o c c u r d u r i n g m i d d l e o f b u s i n e s s d a y. S t o c k w a s d o w n 3. 2 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 %. F e b r u a r y 8 B u y. c o m A t t a c k o c c u r r e d w i t h i n a n h o u r o f t h e c o m p a n y s I n i t i a l P u b l i c O f f e r i n g ( I P O ). S t o c k w a s d o w n a t w e e k s e n d m o r e t h a n 2 0 % f r o m I P O p r i c e. E b a y S t o c k w a s d o w n 7. 3 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 %. C N N. c o m S e r v i c e d i s r u p t e d F e b r u a r y 9 E * T r a d e A t t a c k e d d u r i n g p e a k t r a d i n g h o u r s. S t o c k w a s d o w n 7. 6 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 %. Z D N e t S e r v i c e d i s r u p t e d F e b r u a r y 1 8 F e d e r a l B u r e a u o f I n v e s t i g a t i o n S e r v i c e d i s r u p t e d. ( F B I ) F e b r u a r y 2 4 N a t i o n a l D i s c o u n t B r o k e r s G r o u p A t t a c k e d d u r i n g p e a k t r a d i n g h o u r s. ( N D B ) O p e r a t o r s a c c i d e n t a l l y c r a s h e d s i t e a s t h e y a t t e m p t e d t o d e f e n d a g a i n s t t h e a t t a c k. a O v e r a l l p e r f o r m a n c e o f t h e I n t e r n e t d e g r a d e d b y a s m u c h a s 2 5 % d u r i n g t h e p e a k o f t h e a t t a c k s a s c o m p u t e r s r e - s e n t m e s s a g e s r e p e a t e d l y a n d a u t o m a t i c a l l y, t r y i n g t o r e c o v e r i n t e r r u p t e d t r a n s a c t i o n s. S o u r c e : A d a p t e d f r o m : N e t w o r k W o r l d F u s i o n, w w w. n f u s i o n. c o m, c o m p l i e d b y L e G r a n d E l e b a s h. C h a p t e r 5 T a b l e 5-4

20 The Future Client-Server model became popular LANs, WANs, VANs Less dependence on Mainframe comput ers & MIS Electronic communication/workgroup computing tools support group work See GWUForecast.gwu.edu

21 Organizational Design Challenges The Virtual Corporation From Control to Learning From Autonomy to Collaboration Organizational Structure Authority and Decision Making Operating Processes Management Processes Incentives and rewards Roles/Skills and Expertise Career Development

22 Targeted Opportunities Communicating Organizational Priorities Meaningful Budgets Effective Incentive Systems Solution for Production Adaptation for Change

23 Interorganizational Systems (IOS) Networked information systems used by two or more separate organizations to perform a joint business function Interorganizational systems (IOS) Electronic Data Interchange uses EDI standards Extranets - IOS over the Internet

24 IOS EXAMPLE Kmart has opened its IS to help suppliers better serve customers. The interface has an extensive GUI component and allows 50 to 100 vendors to look at Kmart s merchandising database. For example, the system lets Black and Decker access to any data that Kmart believes helps B&D better serve Kmart and its customers. Kmart implemented this program in exchange for more frequent and smaller deliveries, but also because it was in the best interested of the company, its customers and its suppliers. Why did Kmart implement this IOS? What is the implication for having Kmart decide on what info B&D can access?

25 IOS Risks Forces automation & lock-in to a particular system Government regulations may change Great impacts on organizational structures, systems, & people - loss of control Diminishes organizational boundaries -- requires trust in partners

26 Electronic Data Interchange (EDI) Computer-to-computer exchange of standard business transaction documents between 2 organizations purchase orders invoices bill of lading

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

Introduction. Network Basics. Workstations. Server. Hub

Introduction. Network Basics. Workstations. Server. Hub Introduction If you re planning to use eivf soon, you may want to install a computer network to improve access to your eivf Provider Portal from any PC in your office. This paper provides information you

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

Broadband Bonding Network Appliance TRUFFLE BBNA6401

Broadband Bonding Network Appliance TRUFFLE BBNA6401 Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Chapter 6. Architecture About Infrastructure. Introduction. Real World Examples

Chapter 6. Architecture About Infrastructure. Introduction. Real World Examples Introduction Chapter 6 Architecture and Managing and Using Information Systems: A Strategic Approach by Keri Pearlson & Carol Saunders What is the architecture of an organization? What is the infrastructure

More information

How To Get High Speed Internet In Australia

How To Get High Speed Internet In Australia ADSL vs Cable Cable subscribers are connected directly to high speed lines while ADSL subscribers are connected directly to medium speed lines Cable subscribers share the line connecting them to neighbourhood

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Bandwidth Primer The basic conditions and terms used to describe information exchange over networks.

Bandwidth Primer The basic conditions and terms used to describe information exchange over networks. The basic conditions and terms used to describe information exchange over networks. 385 Jordan Road Troy, NY 12180 Phone 518.286.7000 518.286.2439 www.learnlinc.com Table of Contents TABLE OF CONTENTS...2

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

Internet Public Network

Internet Public Network Internet Public Network Bandwidth Data rate measured in bits (not bytes) per seconds Kbps (Kilobits per seconds) 125 chars/sec Mbps (Megabits per seconds) 1,250 chars/sec Gbps (Gigabits per seconds) 12,500

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class 1.264 Lecture 34 Telecom: Connecting wired LAN, WAN Next class: Green chapter 17. Exercise due before class 1 Exercise Your transportation brokerage company also handles billing for freight shipments,

More information

Glossary of Telco Terms

Glossary of Telco Terms Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business

More information

Broadband Bonding Network Appliance TRUFFLE BBNA6401

Broadband Bonding Network Appliance TRUFFLE BBNA6401 Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

NETWORK ADMINISTRATOR

NETWORK ADMINISTRATOR JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under

More information

Basic Computer Networks Configurations

Basic Computer Networks Configurations School of Business Eastern Illinois University Basic Computer Networks Configurations (September 2, 2015) Abdou Illia, Fall 2015 Learning Objectives 2 Outline Basic network configurations Name kinds of

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS. Chapter 5: Network Design and Troubleshooting Scenarios

CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS. Chapter 5: Network Design and Troubleshooting Scenarios CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS Chapter 5: Network Design and Troubleshooting Scenarios Objectives Discuss several considerations that must be made when networking computers together, from

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

NETWORKING TECHNOLOGIES

NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.

More information

IT Components of Interest to Accountants. Importance of IT and Computer Networks to Accountants

IT Components of Interest to Accountants. Importance of IT and Computer Networks to Accountants Chapter 3: AIS Enhancements Through Information Technology and Networks 1 Importance of IT and Computer Networks to Accountants To use, evaluate, and develop a modern AIS, accountants must be familiar

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved. Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Norfolk Community Fiber Optic Network

Norfolk Community Fiber Optic Network Norfolk Community Fiber Optic Network It s not only about technology; it s also about relationships! Norfolk s Community Fiber Optic Network Norfolk s Community Fiber Optic Network Overview Connects 12

More information

Understand Wide Area Networks (WANs)

Understand Wide Area Networks (WANs) Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks

More information

Telecommunications systems (Part 1)

Telecommunications systems (Part 1) School of Business Eastern Illinois University Telecommunications systems (Part 1) (Week 11, Thursday 11/02/2006) Abdou Illia, Fall 2006 Learning Objectives 2 Describe and compare types of connection to

More information

ICT budget and staffing trends in Healthcare

ICT budget and staffing trends in Healthcare ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936

More information

Connection Services. Hakim S. ADICHE, MSc

Connection Services. Hakim S. ADICHE, MSc Connection Services Hakim S. ADICHE, MSc adiche@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Networked Supply Chain Management

Networked Supply Chain Management 1 Networked Supply Chain Management Session 2 Agenda Supply-Chain Management Opportunities and Challenges Technology Choices and Solutions Cisco Case Study Emerging Industry Exchanges Next Steps 3 The

More information

The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile.

The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile. Glossary of broadband terms 3G: Refers to the third generation of mobile phone technology following on from 2G. 3G allows for faster access to the internet and allows services including video calls and

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

How do SMB benefit from using the Small but Secured Aries Server Appliance

How do SMB benefit from using the Small but Secured Aries Server Appliance How do SMB benefit from using the Small but Secured Aries Server Appliance white paper Internet Needs The Internet revolution is like nothing in the history of mankind. E-mail can be sent from San Francisco

More information

The Evolution of Ethernet

The Evolution of Ethernet June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

Lesson 24 Network Fundamentals

Lesson 24 Network Fundamentals Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

Management Information Systems

Management Information Systems Management Information Systems Basics of the Internet Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) Internet Basics Outline Internet History Internet Structure Switching Methods

More information

SOLANO COUNTY LIBRARY THREE YEAR LIBRARY TECHNOLOGY PLAN 2001-2004

SOLANO COUNTY LIBRARY THREE YEAR LIBRARY TECHNOLOGY PLAN 2001-2004 SOLANO COUNTY LIBRARY THREE YEAR LIBRARY TECHNOLOGY PLAN 2001-2004 LIBRARY MISSION STATEMENT AND GOALS Solano County Library offers professional, innovative, cost-effective service by providing library

More information

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two

More information

Fundamentals of Network Security Graphic Symbols

Fundamentals of Network Security Graphic Symbols Fundamentals of Network Security Graphic Symbols Overview Router Figure 1: IOS Router icon and photos A Router is an internetworking device which operates at OSI Layer 3. A Router interconnects network

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

SAMPLE. Please answer the following questions about connectivity between THIS CAMPUS AND THE INTERNET:

SAMPLE. Please answer the following questions about connectivity between THIS CAMPUS AND THE INTERNET: Survey Questions The first nine (9) questions are asked for each campus in the district or charter school. The last three (3) questions are each asked once for the district or charter school as a whole.

More information

Alexander Nikov. 5. IT Infrastructure and Emerging Technologies. Learning Objectives. BART Speeds Up with a New IT Infrastructure

Alexander Nikov. 5. IT Infrastructure and Emerging Technologies. Learning Objectives. BART Speeds Up with a New IT Infrastructure INFO 1400 Information Technology Fundamentals 5. IT Infrastructure and Emerging Technologies Alexander Nikov Learning Objectives 1. Define IT infrastructure and describe its components. 2. Identify and

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

Schools and Libraries Universal Service Support Mechanism Eligible Services List

Schools and Libraries Universal Service Support Mechanism Eligible Services List Schools and Libraries Universal Service Support Mechanism Eligible Services List (WC Docket No. 13-184; CC Docket No. 02-6; GN Docket No. 09-51) The Federal Communications Commission s (FCC s) rules provide

More information

XROADS NETWORKS WHITE PAPER

XROADS NETWORKS WHITE PAPER XROADS NETWORKS WHITE PAPER The Edge Approach When Connectivity Is Critical TM XRoads Redundancy XROADS NETWORKS - WHITE PAPER The Edge Approach When Connectivity Is Critical TM XRoads Redundancy Redundancy

More information

IT Infrastructure and Emerging Technologies

IT Infrastructure and Emerging Technologies Chapter 3 IT Infrastructure and Emerging Technologies 5.1 2009 by Prentice Hall Chapter 3 IT Infrastructure and Emerging Technologies LEARNING OBJECTIVES Define IT infrastructure and describe its components.

More information

SuccessWare 21 Deployment Options

SuccessWare 21 Deployment Options SuccessWare 21 Deployment Options This document is intended for a business owner or manager responsible for IT purchasing and management decisions. It is not a technical specifications document, but rather

More information

Enterprise Business Products 2014

Enterprise Business Products 2014 Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

Building the Business Case For IP VPNs

Building the Business Case For IP VPNs March 28, 2002 Building the Business Case For IP VPNs Prepared for: Colorado Office 1317 Cherry Street Denver, CO 80220 303.355.1982 Oklahoma Office 1307 South Boulder Avenue Suite 120 Tulsa, OK 74119

More information

Network Design and Architecture

Network Design and Architecture Architectures For Convergence Gary Audin Gary Audin is president of Delphi, Inc. consultancy. He has been an independent communications and security consultant for 25 years. Which definition of Convergence

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

A Talari Networks White Paper. Transforming Enterprise WANs with Adaptive Private Networking. A Talari White Paper

A Talari Networks White Paper. Transforming Enterprise WANs with Adaptive Private Networking. A Talari White Paper ATalariNetworksWhitePaper TransformingEnterpriseWANswith AdaptivePrivateNetworking ATalariWhitePaper 2 TransformingEnterpriseWANwithAdaptivePrivateNetworking Introduction IT departments face pressures

More information

VMWARE WHITE PAPER 1

VMWARE WHITE PAPER 1 1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the

More information

Managed Services The. The Road to Revenue. Pravin Mahajan pmahajan@cisco.com. Session Number Presentation_ID

Managed Services The. The Road to Revenue. Pravin Mahajan pmahajan@cisco.com. Session Number Presentation_ID Managed Services The The Road to Revenue Pravin Mahajan pmahajan@cisco.com Session Number 1 Agenda Managed Services Introduction Solution Offerings Market to Services Mapping Summary 2 High Business Interest

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

DSL Variations. NEXTEP Broadband White Paper. Broadband Networks Group. Definitions and differences of Digital Subscriber Line variations.

DSL Variations. NEXTEP Broadband White Paper. Broadband Networks Group. Definitions and differences of Digital Subscriber Line variations. NEXTEP Broadband White Paper DSL Variations Definitions and differences of Digital Subscriber Line variations. A NEXTEP Broadband White Paper May 2001 Broadband Networks Group DSL Variations EXECUTIVE

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

2/23/2014. Chapter 5. Problem: Costly and unwieldy IT infrastructure; diminishing resources Solutions:

2/23/2014. Chapter 5. Problem: Costly and unwieldy IT infrastructure; diminishing resources Solutions: Chapter 5 IT INFRASTRUCTURE AND EMERGING TECHNOLOGIES VIDEO CASES Case 1: ESPN.com: Getting to extreme Scale On the Web Case 2: Salesforce.com: Managing by Smartphone Case 3: Hudson's Bay Company and IBM:

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Virtual Private LAN Service (VPLS)

Virtual Private LAN Service (VPLS) Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980

More information

White Paper. Complementing or Migrating MPLS Networks

White Paper. Complementing or Migrating MPLS Networks White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

IT Infrastructure and Emerging Technologies

IT Infrastructure and Emerging Technologies Chapter 5 IT Infrastructure and Emerging Technologies 5.1 LEARNING OBJECTIVES 5.2 Define IT infrastructure and describe its components. Identify and describe the stages and technology drivers of IT infrastructure

More information

How To Understand Information Systems

How To Understand Information Systems Management Information Systems Information Systems: Concepts and Management Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) CHAPTER OUTLINE Types of Information Systems Why

More information

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1 Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 - How the Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies - DSL

More information

Introduction to Meg@POP

Introduction to Meg@POP Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

FatPipe Networks www.fatpipeinc.com

FatPipe Networks www.fatpipeinc.com XTREME WHITE PAPERS Overview The growing popularity of wide area networks (WANs), as a means by which companies transact vital information with clients, partners, and colleagues, is indisputable. The business

More information

Deploying Riverbed wide-area data services in a LeftHand iscsi SAN Remote Disaster Recovery Solution

Deploying Riverbed wide-area data services in a LeftHand iscsi SAN Remote Disaster Recovery Solution Wide-area data services (WDS) Accelerating Remote Disaster Recovery Reduce Replication Windows and transfer times leveraging your existing WAN Deploying Riverbed wide-area data services in a LeftHand iscsi

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

The Connected 5,000: Making the Transition to Business Ethernet Services

The Connected 5,000: Making the Transition to Business Ethernet Services The Connected 5,000: Making the Transition to Business Ethernet Services The Connected 5,000 characterizes enterprises with business critical data networks that are ready to take advantage of Business

More information

Chapter 13: Internet Connectivity

Chapter 13: Internet Connectivity Chapter 13: Internet Connectivity Complete CompTIA A+ Guide to PCs, 6e To configure an internal external modem To explain basic handshaking between a DTE device and a DCE device To use Windows tools when

More information

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Community Forum Agenda October 2012

Community Forum Agenda October 2012 Community Forum Agenda October 2012 Topic Welcome CEKC/WSUE LTPT Project Scope Forums Survey Data Results LTPT Next Steps Broadband 101/Map Q&A Websites Mapping Survey Complete Survey Close/Next Steps

More information

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your

More information

Chapter 9 Communications and Networks

Chapter 9 Communications and Networks Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS. Chapter-1L06: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS. Chapter-1L06: Embedded Systems - , Raj Kamal, Publs.: McGraw-Hill Education Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS 1 Telecom Smart Cards, Examples Missiles and Satellites, Computer Networking, Digital Consumer Electronics, and Automotive 2 3 Exemplary Application Areas Also

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

300Mbps Wireless N VoIP VDSL/ADSL Modem Router

300Mbps Wireless N VoIP VDSL/ADSL Modem Router 300Mbps Wireless N VoIP VDSL/ADSL Modem Router TD-VG5612 Highlights Fast Broadband Speeds Up to 100Mbps broadband speeds, ideal for smooth streaming media and online gaming Cost-Effective VoIP Supports

More information