Provisioning Of Private Line And Frame Relay: Fill & Download for Free

GET FORM

Download the form

How to Edit Your Provisioning Of Private Line And Frame Relay Online Lightning Fast

Follow these steps to get your Provisioning Of Private Line And Frame Relay edited with the smooth experience:

  • Select the Get Form button on this page.
  • You will enter into our PDF editor.
  • Edit your file with our easy-to-use features, like adding date, adding new images, and other tools in the top toolbar.
  • Hit the Download button and download your all-set document for reference in the future.
Get Form

Download the form

We Are Proud of Letting You Edit Provisioning Of Private Line And Frame Relay super easily and quickly

Get Our Best PDF Editor for Provisioning Of Private Line And Frame Relay

Get Form

Download the form

How to Edit Your Provisioning Of Private Line And Frame Relay Online

When you edit your document, you may need to add text, Add the date, and do other editing. CocoDoc makes it very easy to edit your form fast than ever. Let's see how can you do this.

  • Select the Get Form button on this page.
  • You will enter into our free PDF editor web app.
  • Once you enter into our editor, click the tool icon in the top toolbar to edit your form, like highlighting and erasing.
  • To add date, click the Date icon, hold and drag the generated date to the field you need to fill in.
  • Change the default date by deleting the default and inserting a desired date in the box.
  • Click OK to verify your added date and click the Download button when you finish editing.

How to Edit Text for Your Provisioning Of Private Line And Frame Relay with Adobe DC on Windows

Adobe DC on Windows is a popular tool to edit your file on a PC. This is especially useful when you do the task about file edit without network. So, let'get started.

  • Find and open the Adobe DC app on Windows.
  • Find and click the Edit PDF tool.
  • Click the Select a File button and upload a file for editing.
  • Click a text box to modify the text font, size, and other formats.
  • Select File > Save or File > Save As to verify your change to Provisioning Of Private Line And Frame Relay.

How to Edit Your Provisioning Of Private Line And Frame Relay With Adobe Dc on Mac

  • Find the intended file to be edited and Open it with the Adobe DC for Mac.
  • Navigate to and click Edit PDF from the right position.
  • Edit your form as needed by selecting the tool from the top toolbar.
  • Click the Fill & Sign tool and select the Sign icon in the top toolbar to make you own signature.
  • Select File > Save save all editing.

How to Edit your Provisioning Of Private Line And Frame Relay from G Suite with CocoDoc

Like using G Suite for your work to sign a form? You can do PDF editing in Google Drive with CocoDoc, so you can fill out your PDF with a streamlined procedure.

  • Add CocoDoc for Google Drive add-on.
  • In the Drive, browse through a form to be filed and right click it and select Open With.
  • Select the CocoDoc PDF option, and allow your Google account to integrate into CocoDoc in the popup windows.
  • Choose the PDF Editor option to begin your filling process.
  • Click the tool in the top toolbar to edit your Provisioning Of Private Line And Frame Relay on the applicable location, like signing and adding text.
  • Click the Download button in the case you may lost the change.

PDF Editor FAQ

What is mpls in routing?

The key thing to remember about MPLS is that it’s a technique, not a service — so it can be used to deliver anything from IP VPNs to metro Ethernet services, or even to provision optical services. So although carriers build MPLS backbones, the services that users buy may not be called “MPLS”. They could be called anything from “IP VPN” to “metro Ethernet”—or whatever the carriers’ marketing departments dream up next.The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network, each router makes an independent forwarding decision for each packet based solely on the packet’s network-layer header. Thus, every time a packet arrives at a router, the router has to “think through” where to send the packet next.With MPLS, the first time the packet enters a network, it’s assigned to a specific forwarding equivalence class (FEC), indicated by appending a short bit sequence (the label) to the packet. Each router in the network has a table indicating how to handle packets of a specific FEC type, so once the packet has entered the network, routers don’t need to perform header analysis. Instead, subsequent routers use the label as an index into a table that provides them with a new FEC for that packet.This gives the MPLS network the ability to handle packets with particular characteristics (such as coming from particular ports or carrying traffic of particular application types) in a consistent fashion. Packets carrying real-time traffic, such as voice or video, can easily be mapped to low-latency routes across the network — something that’s challenging with conventional routing. The key architectural point with all this is that the labels provide a way to “attach” additional information to each packet — information above and beyond what the routers previously had.Layer 2 or Layer 3?There’s been a lot of confusion over the years about whether MPLS is a Layer 2 or Layer 3 service. But MPLS doesn’t fit neatly into the OSI seven-layer hierarchy. In fact, one of the key benefits of MPLS is that it separates forwarding mechanisms from the underlying data-link service. MPLS can be used to create forwarding tables for ATM or frame relay switches (using the existing ATM or DLCI header) or for plain old IP routers by appending MPLS tags to IP packets.The bottom line is that network operators can use MPLS to deliver a wide variety of services. The two most popular implementations of MPLS are layer 3 BGP/MPLS-VPNs (based on RFC 2547) and Layer 2 (or pseudowire) VPNs.RFC 2547 VPNs have been implemented by most of the major service providers, including AT&T, Verizon, BT and many others. The fundamental characteristics of a 2547 is that traffic is isolated into MPLS-VPNs as it enters the network.Interior routers have no knowledge of IP information beyond the label-only base forwarding decisions on the MPLS label. BGP is used by edge routers to exchange knowledge of VPNs, thus enabling service providers to isolate traffic from multiple customers or even the Internet over a shared backbone.There are several flavors of layer 2 MPLS services, but what they have in common is that a Layer 2 packet (or ATM cell or frame relay frame) is encased in an MPLS header and forwarded through the MPLS core. When it reaches the other side, the packet’s labels are removed, and the packet that arrives at the ultimate destination exactly where it entered the MPLS network. Thus, Layer 2 MPLS services effectively extend services such as Ethernet or frame relay across an IP WAN.What are the different types of MPLS?The version of MPLS that’s generally used to encapsulate connection-oriented frame relay and ATM services is called pseudo Wire Edge to Edge Emulation (PWE3). PWE3 defines point-to-point tunnels across the MPLS backbone, and thus works well for circuit-oriented networking protocols. PWE3 can also be used to support connectionless LAN protocols, but it’s not the preferred solution.For connectionless protocols (primarily Ethernet) there’s a different specification, called virtual private LAN service (VPLS). VPLS addresses some of the specific challenges with extending Ethernet across the metropolitan area or WAN, most notably scalability and availability. Another emerging spec is the ITU’s transport-MPLS (T-MPLS), which is designed to simplify deployment of Ethernet servicesIt’s worth noting that MPLS isn’t the only game in town when it comes to Ethernet services, though. Several vendors —including Nortel, Extreme and Siemens — are promoting an alternative approach called Provider Backbone Transport, or PBT, for metropolitan area Ethernet.PBT is based on using existing IEEE 802.1 VLAN tags to deliver Ethernet services across a provider network. PBT competes head-to-head with T-MPLS, and the jury’s still out on which one will gain the most traction.Finally, a variant of MPLS called Generalized Multiprotocol Label Switching (GMPLS) gives routers the ability intelligently signal the optical layer, enabling providers to establish, change or tear down optical links in real time. Thus, service providers can provision “optical wavelength” services based on MPLS.

What is VPWS in networking?

VPWS (Virtual Private Wire Service) is also called as Virtual Leased Line. It provides Point-to-Point VPN Service and from the Customer point of view, it is like a Leased Line. With VPWS two sites of customer are like directly connected as Point-to-Point.Virtual private wire service (VPWS) Layer 2 VPNs employ Layer 2 services over MPLS to build a topology of point-to-point connections that connect end customer sites in a VPN.These Layer 2 VPNs provide an alternative to private networks that have been provisioned by means of dedicated leased lines or by means of Layer 2 virtual circuits that employ ATM or Frame Relay. The service provisioned with these Layer 2 VPNs is known as VPWS.Traditional VPNs over Layer 2 circuits require the provisioning and maintenance of separate networks for IP and for VPN services. In contrast, VPWS enables the sharing of a provider’s core network infrastructure between IP and Layer 2 VPN services, reducing the cost of providing those services.

Does telecommunications include internet?

Honestly it is not a Yes or No answer as telecom it's a vast spectrum topic, please find below an overview about the telcom industry.Telecommunications, the Internet, and Information System Architecture7.1 Telecommunications Networks and their ScopeThe electronic transmission of information over distances, called telecommunications, has become virtually inseparable from computers: Computers and telecommunications create value together.Components of a Telecommunications NetworkTelecommunicationsare the means of electronic transmission of information over distances. The information may be in the form of voice telephone calls, data, text, images, or video. Today, telecommunications are used to organize more or less remote computer systems into telecommunications networks. These networks themselves are run by computers.A telecommunications network is an arrangement of computing and telecommunications resources for communication of information between distant locations.A telecommunications network includes the following components:1. Terminals for accessing the network2. Computers that process information and are interconnected by the network3. Telecommunications links that form a channel through which information is transmitted from a sending device to a receiving device.4. Telecommunications equipment that facilitates the transmission of information.5. Telecommunications software that controls message transmission over the network.Scope of Telecommunications NetworksTwo principal types of telecommunications networks can be distinguished from the point of view of their geographical scope. They are:1. Local area networks2. Wide area networksLocal area network (LAN): is a privately owned network that interconnects processors, usually microcomputers, within a building or on a campus site that includes several buildings.Characteristics of a LAN:[Figure 7.3][Slide 7-5]a. LANs are the principal tool of workgroup computingb. LANs ensure high-speed communication within a limited area and enables the users to share facilities (peripherals) connected to it.c. Usually include a large-capacity, secondary storage device, where database and applications software are maintained, managed by a microcomputer acting as a file server that delivers data or program files to other computers.d. Facilities (peripherals) may include jukebox optical memory and fast printerse. Frequently, one of the facilities (peripherals) in a LAN is the gateway hardware and software that give the network users access to other networks.f. More group members may connect to the network from remote sites using wireless telecommunications.g. Links and equipment of LANs are owned by the user company, and these networks are generally much faster than WANs.h. LANs are generally composed of a network of microcomputersWide area network (WAN): is a telecommunications network that covers a large geographical area.Characteristics of a WAN:[Figure 7.4][Slide 7-6]a. The information system of an entire organization may be structured as a hierarchy. The WANs system architecture looks very much like an organization chart.b. WANs connect all the divisional minicomputers to the headquarters mainframe with a variety of local microcomputers and terminals located at remote sites connected, in turn, to the minicomputers.c. WANs provide the backbone through which all other nodes (computers and terminals) communicate.d. WANs often use telecommunication links and equipment provided by specialized vendors, calledcommon carriers.e. WANs serve to interconnect multiple LANs and can make specific resources available to a large number of workstations.Metropolitan Area Networks (MAN)- are telecommunications networks that interconnect various local area networks within a metropolitan area, that is, within approximately a 50-mile range.Characteristics of a WAN:[Figure 7.4]a. Purpose of MANs is to interconnect various LANs within a metropolitan area, that is, within approximately a 50 - mile range.b. Generally, the speed of MANs is equal to that of LANs and they use similar technology.Interorganizational Information Systems - are shared by two or more companies.Characteristics of Interorganizational Information Systems: [Figure 7.5]a. These systems help several firms share information in order to coordinate their work, collaborate on common projects, or sell and buy products and services.b. Internet has emerged as a global public network of networksc. Some interorganizational systems are employed in knowledge workd. Can be used to connect a firm's computers to the information systems of its customers, suppliers, and business partners, and are also used to execute business transactions.7.2 Telecommunications LinksTelecommunications links may be implemented with various communication media, with a corresponding variety of characteristics. The main feature of a medium is its potential transmission speed, also known as channel capacity, which for data transmission purposes is expressed in bits per second (bps). An alternative measure of transmission channel capacity is bandwidth - the range of signal frequencies that can be transmitted over the channel.Six potential media are employed to implement telecommunication links:1. Twisted pair2. Coaxial cable3. Fiber Optics cable4. Terrestrial Microwave5. Satellite Transmission6. Radio TransmissionThree of the above transmission media are classified as guided media - in which the signal moves along an enclosed path. Guided media require wiring. They include:1. Twisted pair2. Coaxial cable3. Fiber optic cableThree of the above transmission media are classified as wireless media - the signal is broadcast (radiated in many directions) over the air or space and received through an antenna. They include:1. Terrestrial Microwave2. Satellite Transmission3. Radio TransmissionCharacteristics of Communications Media:Twisted Paira communications medium consisting of a pair of wires.Coaxial Cablea communications medium that consists of a relatively thick central conductor shielded by several layers of insulation and the second conductor just under the cable's shellFiber Opticshigh-capacity communications medium that consists of many strands of pure glass with a data carrying core in the middle, surrounded by a reflective coating and a protective sheath.Terrestrial Microwavelong-distance telecommunications by means of microwave signals travelling on the surface of the earth.Satellite Transmissionform of microwave transmission in which the signal is transmitted by an earth station to a satellite which rebroadcasts the signal to the receiving station.Radio Transmissionwireless communications technology that transmits voice or data over the air using a lower frequency band than microwaves.Note: Transmission speeds keep on rising, particularly in the fiber optics area. We are now moving toward a global infrastructure of gigabit-speed fiber optic links relying on digital transmission. In this multimedia environment, data, text, voice, images, and video will travel at speeds of billions of bits per second.Analog and Digital Communications[Figure 7.8][Slide 7-7]Most of the lines in the telephone systems of the world at present are analog. Signals are transmitted as continuous waves. This is a satisfactory way to transmit voice, but digital data sent by computers (sequences of pulses representing 0s and 1s) must be converted into an analog signal for transmission over an analog line. The analog data must then be converted back into digital before entering the memory of the receiving computer. The conversion of data from digital form into analog for transmission and then back into digital at the receiving end is done by a pair of interface devices called modems (modulator-demodulator).Modem-based telecommunications have created a significant bottleneck in an environment where computer and peripheral speeds have increased dramatically. The solution is end-to-end digitalcommunications, in which signals are sent as streams of on/off pulses. Digital lines are capable of much faster communication and digital circuitry is now cheaper than analog. All the new equipment now installed in telephone networks is indeed digital.Trend: There is a shift toward digital telecommunications is taking place throughout the world. A digital system for telecommunications, called TI carrier, is in wide use in parts of the telephone network.Future: Integrated Services Digital Network (ISDN) - a completely digital telecommunications network standardized by an international committee. Although ISDN services are available in some areas, including most of the US, worldwide ISDN is not expected to become operational until after the year 2000.How to Reduce the Costs of Telecommunications Multiplexing and Signal CompressionWith the geographical distribution of information systems, increased volumes of transmission, and the move to multimedia, the costs of telecommunications are a significant business concern. Two principal methods of reducing these costs are:1. Multiplexing - the sharing of a high-capacity link by a number of transmissions2. Signal Compression - using the link more efficiently by removing redundancies from the signal.MultiplexingCharacteristics of multiplexing:1. There are economies of scale in telecommunications systems: the higher the system capacity, the lower the unit cost of transmissions.2. Many individual transmissions can share a physical channel through a variety of techniques collectively called multiplexing.3. Multiplexing combines several lower-capacity transmissions into a single transmission, which is split at the receiving end.Signal CompressionCharacteristics of signal compression:1. Signal compression is the reduction of the need for channel capacity by removing redundancies from the signal.2. To reduce the transmission needs, we can remove the redundancies at the sender site, transmit the compressed signal, and then restore the signal at the receiving end.3. Compression has an impressive effect on multimedia transmission needs.7.3 Computer NetworksComputer networks differ in scope from relatively slow wide area networks, employed to transmit messages across vast geographic distances, to very fast local area networks that may connect computers located in the same building. System designers may select one of several arrangements for interconnecting network nodes, depending on an organization's requirement. There are several ways to establish a connection between the sender and the receiver of a message.Network TopologiesComputers, switches, and terminals interconnected by network links are collectively called nodes. The purpose of network control is to provide a connection between nodes that need to communicate. The arrangement of nodes and links in a network is called a topology. A variety of arrangements are possible, each with its own advantages and drawbacks. Network topology has to fit the structure of the organizational unit that will use the network, and this topology should also be adapted to the unit's communication traffic patterns and to the way the databases will be stored in order to facilitate access to them.The following topologies are the most widely used:1. Hierarchical Network2. Star Network3. Ring Network4. Bus NetworkHierarchical Network:[Figure 7.4]a. A corporate host computer (often a mainframe), divisional minicomputers or powerful workstations, and workgroup support via micros.b. This topology matches the organizational structure of many firms and is still frequently used in WANs.c. The user workstations may be, in turn, interconnected using one of the LAN topologies.d. Failure of the host does not disable divisional processing, which is a fail-safe feature.e. Cost-effectiveness of micros and the growing importance of groupwork leads some downsizing firms to move away from hierarchical networks to client/server computing.Star Network: [Figure 7.9a]a. In a star network, a hub computer or switch (such as a PBX) interconnects a number of workstations.b. The computer at the hub acts as the network server, providing access to the shared database and software. All communications between the workstations must go through this central mode.c. The star network is rather easy to manage and expand, since in both cases it is largely the single central node that is affected in an expansion of a processing capacity.d. The central node is a locus of vulnerability: it may be overloaded or it may fail, disabling the entire network.Ring Network: [Figure 7.9b]a. Each node in a ring network is connected to two of its neighbours.b. The nodes are usually close to one another; this topology is frequently used in LANs.c. When one node sends a message to another, the message passes through each intermediate node, which restores the signal, as signals deteriorate in transmission.d. If a node fails, the ring is out of service, unless the ring contains two channels transmitting in opposite directions.Bus Network: [Figure 7.9c]a. The nodes on a bus network are connected to a common link such as coaxial cable. This arrangement is used in LANs.b. A failing device does not affect the rest of the network; failure of the bus itself, of course, brings the network down.Switching in NetworksMany users can be connected at the same time to a network of communication channels. Switchingdevices establish connections between nodes that need to communicate over a network. Principal techniques for switching include:1. Circuit Switching2. Packet Switching3. Fast Packet SwitchingCircuit Switching:1. The circuit switching technique is employed in a telephone network.2. Communication links are connected to switching centers, which connect to one node to another on demand.3. The circuit is established for the entire duration of the communication4. Circuit switching is suitable for file transfers and similar longer transmissionsPacket Switching:[Figure 7.10]1. Packet switching is of particular importance for data communication owing to its speed and its superior utilization of communication links when handling Abursty,@ intermittent, traffic. Indeed, data transmission involves short bursts of activity by a computer or a terminal when the data are sent, followed by long periods when there is no transmission.2. Packet switching offers flexibility in connecting to a network. It is used by most of the public data networks provided by value-added carriers.3. In packet switching, messages are divided at the source into fixed-length chunks, called packets, that also include bits identifying the receiver. Typically, a packet contains 128 bytes of data.4. Each packet, can be transmitted independently, with routing determined at each node the packet passes through (as opposed to circuit switching, where the route is predetermined).Fast Packet Switching:Traditional packet switching checks each packet for errors at every node the packet passes through. Modern telecommunications equipment is far more noise-free than that for which packet switching was originally designed. To take advantage of this, two fast packet-switching technologies are being introduced:Frame Relay: Fast packet switching that checks a packet for errors only at the entry and exit nodes of the telecommunications network, thus reducing transmission delay.Cell Relay: (asynchronous transfer mode, or ATM) transfers very short fixed-length packets, called cells, over fast LANs or WANs.7.4 Communications Protocols in Computer NetworksCommunication rules, called protocols, enable dissimilar hardware and software to communicate over a single network.Network Protocols[Figure 7.11][Slide 7-8]Computer networks exist to provide connectivity among a variety of computers and access devices. To ensure orderly communication over a network, all the nodes in the network must follow a set of rules called protocols. These rules are complex. They extend from the electric connection to the network and the format of the message, all the way to the interaction between application programs that run on different nodes.Explain to students that with the globalization of telecommunications, the International Standards Organization (ISO) has developed the OSI model in order to organizing protocols. The open systemapproach opens the field to a broad array of competing vendors, a situation that benefits users to ensure that they are not locked into a closed, proprietary protocol structure of a specific manufacturer.1. Gives both users and vendors flexibility in conforming to a standard.2. Users can select a protocol for any layer of the model, as long as the protocol performs the necessary services and provides the same interface to the adjacent layers.3. If a layer has to be changed, only the hardware or software implementing that layer need be modified.4. A protocol layer in one node interacts with the corresponding layer in another one.Table 7.2 explains the functions of the seven layers of protocol in the OSI model. They include:Layer and its Function1.Physical Provides access to the telecommunications medium and ensures transmission of the bit stream over it2.Data Link Ensures error-free transmission of frames (blocks) of data over a network link3.Network Routes messages (or packets) from source to destination by selecting connecting links4.Transport Provides reliable end-to-end connection between two communicating nodes. When packet switching is used this layer breaks a message into packets5.Session Establishes, maintains, and terminates a connection (session) between two applications running on communicating nodes. A session lasts, for example, from a long-on to a specific application to a log-off.6.Presentation Provides any necessary conversions of the character being sent (encryption/decryption, compression/decompression, or character code conversions). Issue requests for establishing and terminating a session to the session layer7.Application Provides services to communicating application programs; examples include file transfer, running a remote program, allocating a remote peripheral, and ensuring integrity of remote databases.Two protocol sets have gained importance:SNA - IBM's Systems Network Architecture.- its functions are broken down into five layers, basically performing the functions of the five middle OSI levels.TCP/IP - Transmission Control Protocol/Internet Protocol- its functions are broken down into five layers. TCP provides the higher-level services in connecting the communicating applications, while IP ensures the lower-level functions of routing and addressing, guiding the packets over the Internet.Interconnections among NetworksAs communication needs increase, network connectivity becomes a major issue as users want to access a remote computer. Gateways such as routers and bridges help solve the problem.Interconnection between two networks of the same type is accomplished by a relatively simple bridge, implemented in hardware and software. Interconnection between dissimilar networks, for example, a LAN and a WAN, is achieved through a more complex router. A router is a device that accepts messages in the format produced by one of the networks and translates them into the format used by the other.7.5 Local Area NetworksOrganizations small and large use fast local area networks (LANs) to interconnect personal computers, and thus make a basic workgroup tool.Local Area Network: Workplace for a WorkgroupA LAN interconnects computers within a single site, such as an office building, a manufacturing plan, or a corporate or university campus.Characteristics of a LAN include:1. Its scope is commonly measured in feet2. Communication speeds are very high3. Used as a local means of computing and communication among users in larger firms4. Are owned by the organization5. Afford a sense of control and the flexibility to meet the demands of the end usersA LAN gives its users the following capabilities:1. Users can share resources, such as a fast printer or a database2. Users can collaborate by communicating over their LAN. This collaboration may be facilitated by groupware that runs on a LAN3. Users can access other networks within a firm or outside of it via bridges and routersThere are two principal LAN designs:1. Peer-to-peer - peripherals are located at terminals and system administration is largely left up to the users2. Server-based networks - shared resources are placed a dedicated server that manage a given resource on behalf of user workstations sharing the resource (file server, printer server, gateway, optical disk server). Most of the servers are dedicated to their task; using them as workstations degrades the performance of the net.Local Networks Based on Private Branch Exchanges:[Figure 7.12]A company with a large number of telephones (from 50 to over 10,000) often elects to own a computer-based private branch exchange (PBX), an electronic switchboard that interconnects its telephones and provides connections to the public network.Characteristics of a PBX:1. Gives a company control over the usage of its telephone system and offers a variety of features, such as call forwarding or voice messaging.2. Maybe employed as a switch for data communications3. Many newer PBXs use digital technology, eliminating the need for modems, and perform conversions needed to ensure connectivity between various equipment and telecommunications links.4. Easy to connect a new workstation to the net.5. Speeds of PBX-based networks are limited7.6 Client/Server ComputingAn important current development in organizational computing is downsizing - moving from platforms based on mainframes and minicomputers to a microcomputing environment. These architectures are based on the client/server model.Characteristics of client/server computing:1. The processing of a given application is split up among a number of clients - serving individual users - and one or more servers - providing access to databases and doing most of the computing.2. Main objective of a client is to provide a graphical user interface to a user3. Main objective of a server is to provide shared services to clients4. In client/server computing, individual applications are actually written to run on several computer platforms to take advantage of their capabilities5. Client/server computing is difficult to implementMost frequently used models of client/server computing are:1. Two-Tier Architecture2. Three-Tier ArchitectureCharacteristics of Two-Tier Architecture:[Figure 7.13a]1. Client performs presentation services. It displays the GUI and runs the program that determines what happens when the user selects a menu option.2. Server manages the accesses to the database3. Clients send remote procedure calls to activate specific applications logic on a serverCharacteristics of Three-Tier Architecture:[Figure 7.13b]1. An application server runs most of the application logic, with the user workstation responsible for the display at the front end and the database server providing database servers at the back end. Objective is to distribute application so as to reduce the overall hardware costs while minimizing the network trafficIssues of client/server computing:1. Is attractive in terms of their acquisition price as related to their performance2. Is moving computing control out of the data centers and into the end-user areas3. Software is complex, and is expensive to maintain4. Generate significant traffic on the firm's backbone network that connects clients and servers5. Can be performed in LAN and WAN environments7.7 Wide Area NetworksWide area networks are the fundamental infrastructure of organizational computing. These long-distance telecommunications networks employ a variety of equipment so that the expensive links may be used effectively. The offerings of common carriers and of providers of value-added services may be combined with private networks to create an overall organizational network.Telecommunications Equipment for Wide Area Networks[Figure 7.15][Slide 7-9]WANs include equipment that controls message transfer and makes it possible to share the links among a number of transfers.Host ComputerA WAN has a powerful host computer. The host runs a system program, called a telecommunications monitor, which processes incoming messages, passing them to the appropriate application programs, and accepts outgoing messages from the applications in order to transmit them into the network.Front-End ProcessorRelieves the host computer of most of the tasks involved in network control. Under the control of its own software, the front-end processor accepts messages coming from the network and routes outgoing messages to their destinations. It performs the necessary code conversions, encrypts and decrypts secure messages, and performs error checking so that the host deals with Aclean@ messages.Cluster ControllerManages several terminals, connecting them to a single telecommunications link, and performs communication tasks for them, such as screen formatting, code conversion, and error checking. A cluster controller may also allow the terminals to share a high-speed printer and may handle electronic mail among the cluster terminals.MultiplexorCombines the data that terminals send to it over local low-speed links into a single stream. This stream is then transmitted over a high-speed telecommunications channel and is split by another multiplexor on the opposite end of the channel.ConcentratorCombines transmission from several slower terminals that operate in a burst mode into a single transmission stream that requires a link of lower speed than the sum of the speeds of all the terminals combined. A concentrator stores messages from terminals and forwards them when warranted.SwitchesEstablishes connections between nodes that need to communicate.Access TerminalsInclude a variety of dumb terminals, with no processing capacity and intelligent terminals with processing capacity, such as personal computers.Where do Facilities for Wide Area Networks Come From?Some network facilities are owned by user organizations, others can be leased by them, or simply used on a pay-as-you-go basis. Among the typical facilities owned by user firms are workstations, host computers, and front-end processors. The essential providers of telecommunications links and services are common carriers and the vendors of enhanced services on value-added networks. These include:1. Common carriers2. Providers of value-added networks3. Private lines and private networksCommon CarriersAre companies licensed by a country's government to provide telecommunications services to the public. The vast majority of common carriers provide telephone service. These carriers offer the use of a wide-area telecommunications infrastructure, that is, facilities for the transmission of voice and data messages.Common carriers offer a service called virtual private network where a user firm can purchase guaranteed access to facilities with specified capabilities, such as transmission speed and access points.Providers of Value-Added NetworksValue-added vendors lease facilities from the common carriers and provide telecommunications services to their own customers. These vendors add value to the basic infrastructure furnished by the common carrier. The value-added networks (VAN) provided by the vendors furnish services over and above those provided by common carriers.Private Lines and Private NetworksInstead of using a service that has to be shared with others, a firm may lease its own private lines or entire networks from carriers. This can have economic advantages as compared with VAN use, as well as provide faster and more secure communications.7.8 The Internet and Electronic CommerceThe Internet has changed the face of individual and organizational computing. Driven by the possibilities offered by the Internet and the Web, electronic commerce is expanding its reach.Present and Future of the InternetThe Internet is the global network of computer networks without a centralized control that has become the contemporary Ainformation highway.@Characteristics of the Internet:1. It is run in a decentralized fashion by a number of voluntary organizations, the principal of which is the Internet Society.2. It is a medium of communication, a source of information, and a developing means of electronic commerce.3. A major obstacle to its development has become the limited capacity of the links interconnecting the networks.Facilities for Communication and Information AccessThe Internet provides several essential facilities that organizations can use for internal as well as interorganizational information sharing and communication.The principal categories of Internet use include:1. CommunicationElectronic mail (E-mail) facilitates quick exchange of information and ideas, and is the Internet facility in widest use. E-mail can be used for one-to-one communications or to participate in larger communications forums (newsgroups).2. Information Access:The Internet provides access to the largest organized (loosely) repository of information on earth: the collection of electronic documents stored on sites all over the world. The main problem is finding the information. To help with this problem Web search engines have been developed. Examples include Gopher sites, using indexes such as Veronica, or via a WAIS (Wide Area Information Service) keyword search.The World Wide WebThe World Wide Web (or simply, the Web) is an information service available over the Internet, providing access to distributed electronic documents via hyper links.Characteristics of the Web:1. Grew out of the need of scientists who wanted to share information and to collaborate from geographically dispersed locations.2. Is a client/server system. The Web is a collection of electronic sites stored on many thousands of servers all over the world. Each site consists of a home page and often other pages stored with it. Pages contain hyperlinks to related pages, usually stored on other sites.3. Access to the Web is through a client program, known as a browser. The browser sends out for the needed page into the Internet, interprets the formatting directions on the retrieved page, and displays the page accordingly on the screen.4. To access a Web site, you provide the browser with the site's identifier, known as a URL (Uniform Resource Locator).5. A search engine is a Web facility that maintains its own information about the documents available on the Web.Electronic CommerceElectronic commerceis sharing business information, maintaining business relationships, and conducting business transactions by means of telecommunications networks. In simple words, electronic commerce is doing business electronically, replacing most of the paper and telephone work with computer-mediated information and transaction exchange. The Internet, and the Web in particular, are emerging as the principal means for this new way of doing business.Some potential uses include:1. Establishing an electronic site on the Web to promote your business2. On-line marketplaces3. Advertising at frequented Web sites4. Establishing newsgroups5. Job classifiedOne of the biggest drawbacks for the use of the Internet for conducting electronic commerce is the lack of financial security.The framework of electronic commerce is summarized in three levels:1. Infrastructure- the hardware, software, databases, and telecommunications that together deliver such functionality as the Web over the Internet, and support EDI and other forms of messaging over the Internet or over value-added networks.2. Services- messaging and a variety of services enabling the finding and delivery of information, as well as negotiation, transaction business, and settlement.3. Products and structures- direct provision of commercial services to consumers and business partners, intraorganizational information sharing and collaboration, and organization of electronic markets and supply chains.IntranetsUsing the Internet, many firms have implemented internal networks of Web sites, known as intranets. Intranets are set up on corporate LANs and WANs. An Intranet is separated from the public Internet by a facility called firewall. The firewall program runs on the server computer, preventing access to the Intranet from the public Internet, but allowing access to the Internet. Intranet is, in effect, the owner company's private Internet.Intranets have become important business tools for:1. Sharing information and knowledge among a company's employees2. Accessing databases and data warehouses3. Organizing the corporate workflow around electronic documents4. Enabling collaboration7.9 Information System Architecture:[Figure 7.17][Slide 7-10]The high-level design of a blueprint for the organizational information system is known as the information system architecture. This plan must support the present and future computing and communications needs of a business. Today, the architectural blueprint of many organizations rests on internetworking: interconnecting a number of local area networks with a corporate wide area network, or using the Internet connectivity. Fundamental components of an architectural plan must address the following concerns:1. How will the processing power be distributed2. Where will the databases be located3. Network interconnections4. Protocols7.10 Using Telecommunications for Business Process Redesign and to Seek Competitive AdvantageTelecommunications give an organization the capability to move information rapidly between distant locations and to provide the ability for the employees, customers, and suppliers to collaborate from anywhere, combined with the capability to bring processing power to the point of the application. All of this offers a firm important opportunities to restructure its business processes and to capture high competitive ground in the marketplace. Through telecommunications, this value may be:1. An increase in the efficiency of operations2. Improvements in the effectiveness of management3. Innovations in the marketplaceTelecommunications may provide these values through the following impacts:1. Time compression- Telecommunications enable a firm to transmit raw data and information quickly and accurately between remote sites.2. Overcoming geographical dispersion- Telecommunications enable an organization with geographically remote sites to function, to a degree, as though these sites were a single unit. The firm can then reap benefits of scale and scope which would otherwise be unobtainable.3. Restructuring business relationships- Telecommunications make it possible to create systems which restructure the interactions of people within a firm as well as a firm's relationships with its customers. Operational efficiency may be raised by eliminating intermediaries from various business processes

People Trust Us

Its integration with Google is great. I can do everything from my gmail inbox.

Justin Miller