25 research outputs found

    Networking vendor strategy and competition and their impact on enterprise network design and implementation

    Get PDF
    Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (leaves 93-99).While a significant amount of literature exists that discuss platform strategies used by general IT vendors, less of it has to do with corporate networking technology vendors specifically. However, many of the same strategic principles that are used to analyze general IT vendors can also be used to analyze networking vendors. This paper extends the platform model that was developed by Michael Cusumano and Annabel Gawer to networking vendors, outlining the unique strategic aspects that the networking market possesses. The paper then reviews the strategy of the first dominant corporate datacom vendor, IBM, how it achieved its dominance, and how it lost it. The paper then discusses the strategies of various vendors who attempted to replace IBM as the dominant networking platform vendor and how they failed to do so. Finally, the paper discusses Cisco Systems, a vendor who did manage to achieve a level of dominance that parallels IBM's, and how that company has utilized its strategy to achieve and maintain its current dominance. Finally, Cisco's current strategic challenges are discussed. The impact of the strategies of the various vendors on the evolution of corporate networking is also discussed.by Ray Fung.S.M.M.B.A

    Towards a reliable seamless mobility support in heterogeneous IP networks

    Get PDF
    Next Generation networks (3G and beyond) are evolving towards all IP based systems with the aim to provide global coverage. For Mobility in IP based networks, Mobile IPv6 is considered as a standard by both industry and research community, but this mobility protocol has some reliability issues. There are a number of elements that can interrupt the communication between Mobile Node (MN) and Corresponding Node (CN), however the scope of this research is limited to the following issues only: • Reliability of Mobility Protocol • Home Agent Management • Handovers • Path failures between MN and CN First entity that can disrupt Mobile IPv6 based communication is the Mobility Anchor point itself, i.e. Home Agent. Reliability of Home Agent is addressed first because if this mobility agent is not reliable there would be no reliability of mobile communication. Next scenario where mobile communication can get disrupted is created by MN itself and it is due to its mobility. When a MN moves around, at some point it will be out of range of its active base station and at the same time it may enter the coverage area of another base station. In such a situation, the MN should perform a handover, which is a very slow process. This handover delay is reduced by introducing a “make before break” style handover in IP network. Another situation in which the Mobile IPv6 based communication can fail is when there is a path failure between MN and CN. This situation can be addressed by utilizing multiple interfaces of MN at the same time. One such protocol which can utilize multiple interfaces is SHIM6 but it was not designed to work on mobile node. It was designed for core networks but after some modification in the protocol , it can be deployed on mobile nodes. In this thesis, these issues related to reliability of IPv6 based mobile communication have been addressed.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue Mobile Learning at ACU On Your Wish List: The Latest Toys for Your System Virtual Hands-on Learning: The Aesthetic Camera in Second Life Unified Communications-Coming Soon to the University of the Pacific Reality Check on Virtualization Fixed Wireless at NYULMC lnstitutional Excellence Award Bill D. Morris Award ACUTA Ruth A. Michalecki Leadership Award Interviews President\u27s Message From the Executive Directo

    Diseño de una infraestructura de telecomunicaciones municipal

    Get PDF
    Diseño de una infraestructura TIC municipal completa siguiendo una metodología basada en servicios, con el objetivo de dotar al consistorio de una plataforma compatible con los requerimientos de la e-Administración. El diseño abarca la reorganización de los servicios, así como todos los elementos que intervienen; plataforma de servidores, infraestructura de telecomunicaciones y telefonía. Para ello se ha utilizado la última tecnología disponible en el mercado, integrando el conjunto en una solución global y compatible

    High Availability Framework for Mix-Cloud Secure Applications

    Get PDF
    Having one of the services, such as web applications, databases or telephony systems, unavailable because of a single server failure is very annoying, yet very common issue, especially if the service is deployed on-premises. The simplest way to address it is to introduce redundancy to the system. But in this case the amount of physical machines needed will raise, while their efficiency will drop as most of the services do not use 100% of machine's capabilities. The better way to solve the service availability issue is to logically separate the service from the underlying hardware, balancing the load between instances and migrating them between the physical machines in case of failure. This way is much more effective, but it also contains a number of challenges, such as configuration difficulty and inter-service request routing. The HA framework discussed in this thesis was designed to mitigate those issues. The key goal solved by the HA framework is raising the scalability and reliability of the service while keeping the configuration as simple as possible. The framework binds together a number of existing technologies, automatically installs and manages them with the single goal in mind: to provide an automated, easy-to-use, reliable, and scalable High Availability solution. In addition, the framework provides a distributed yet unified point of control over the whole installation, regardless of the physical location of components, including cloud and PaaS deployments. The framework is meant to be used by small-to-medium sized enterprises

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This This The Strategic Accommodation of Change Good Advice: Clean Out Your Closets (and More) Making Decisions to Remove Legacy Cable ADVERTORIAL: Best Practices for lP Telephony lmplementation ADVERTORIAL: VolP Security: Myth or Reality? ln-Room Phones: Nice or Necessary? Voice and Network Department Convergence Making Communications Accessible lnstitutional Excellence Award: Sinclair Community College Interview President\u27s Message From the Executive Director Here\u27s My Advic

    A method for securing online community service: A study of selected Western Australian councils

    Get PDF
    Since the Internet was made publicly accessible, it has become increasingly popular and its deployment has been broad and global thereby facilitating a range of available online services such as Electronic Mail (email), news or bulletins, Internet Relay Chat (IRC) and World Wide Web (WWW). Progressively, other online services such as telephony, video conference, video on demand, Interactive Television (ITV) and Geographic Information System (GIS) have been integrated with the Internet and become publicly available. Presently, Internet broadband communication services incorporating both wired and wireless network technologies has seen the emergence of the concept of a digital community which has been growing and expanding rapidly around the world. Internet and the ever expanding online services to the wider digital community has raised the issue of security of these services during usage. Most local councils throughout Western Australia have resorted to delivering online services such as library, online payments and email accessibility. The provision and usage of these services have inherent security risks. Consequently, this study investigated the concept of a secure digital community in the secure provision and usage of these online services in selected local councils in Western Australia (WA). After an extensive review of existing literature, information security frameworks were derived from the adaptation of various resources, such as the OSSTMM 2.2 Section C: Internet Technology Security benchmark which was used as the main template. In addition, this template was enhanced into a framework model by incorporating other benchmarks such as NIST, CIS, ISSAF as well as other sources of information. These included information security related books, related ICT network and security websites such as CERT, CheckPoint, Cisco, GFI, Juniper, MS, NESSUS and NMAP together with journals and personal interviews. The proposed information security frameworks were developed to enhance the level of security strength of the email and online web systems as well as to increase the level of confidence in the system security within the selected local councils in WA. All the investigative studies were based upon the available selected local councils’ data and the associated analyses of the results as obtained from the testing software. In addition, the interpretive multiple-case study principles were used during the investigation to achieve or fulfil the purpose of this study. The findings from this study were then abstracted for use in a framework and made available for use as a model for possible adaptation and implementation to other similarly structured councils or organisations. As a result, the study confirmed that the proposed information security frameworks have the capability and potential to improve the level of security strength. In addition, the level of satisfaction and confidence of council staff of the selected local councils in WA in the system security would also be increased due to the application of these frameworks. Although these information security frameworks may be recommended as practical and supporting tools for local councils, the findings from this study were specific only to the selected local councils used in this study. Further research using other councils, may be necessary in order for the information security frameworks to be adopted within a wider range of councils or organisations in WA or elsewhere

    Supervisión de la Instalación y Montaje de los Sistemas de Comunicaciones Voz, Data, CCTV y CATV con la Tecnología CAT7A en el Nuevo Hospital San Juan de Dios de la Ciudad de Pisco

    Get PDF
    En este trabajo – informe de experiencia profesional haremos llegar una descripción de los sistemas de comunicación (DATA, VOZ, CCTV Y CATV) instalados en el Hospital San Juan de Dios de la ciudad de Pisco. El sistema consta de una red de Cableado Estructurado Categoría 7A, y de un backbone de Fibra Óptica Multimodo 50/125 um. El Cableado Estructurado que fue implementado fue diseñado conforme a los Estándares ANSI/TIA/EIA e ISO 11801. Estos Estándares definen la estructura del Sistema de Cableado de la siguiente manera: Facilidades de Entrada Cuarto de Equipos Cableado Backbone Cuarto de Telecomunicaciones Cableado Horizontal Área de Trabajo Finalmente se realizará una descripción de las pruebas de certificación de cableado estructurado de fibra óptica y la red de cobre (Cable Categoría 7A). PALABRAS CLAVES Cableado estructurado, fibra óptica, data, voz, cctv y catv
    corecore