898 research outputs found

    Networking vendor strategy and competition and their impact on enterprise network design and implementation

    Get PDF
    Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (leaves 93-99).While a significant amount of literature exists that discuss platform strategies used by general IT vendors, less of it has to do with corporate networking technology vendors specifically. However, many of the same strategic principles that are used to analyze general IT vendors can also be used to analyze networking vendors. This paper extends the platform model that was developed by Michael Cusumano and Annabel Gawer to networking vendors, outlining the unique strategic aspects that the networking market possesses. The paper then reviews the strategy of the first dominant corporate datacom vendor, IBM, how it achieved its dominance, and how it lost it. The paper then discusses the strategies of various vendors who attempted to replace IBM as the dominant networking platform vendor and how they failed to do so. Finally, the paper discusses Cisco Systems, a vendor who did manage to achieve a level of dominance that parallels IBM's, and how that company has utilized its strategy to achieve and maintain its current dominance. Finally, Cisco's current strategic challenges are discussed. The impact of the strategies of the various vendors on the evolution of corporate networking is also discussed.by Ray Fung.S.M.M.B.A

    Designing a Secure and Reliable Network Using EIGRP, VPN, DMZ and IDS/IPS

    Full text link
    Nowadays networking is not something new for us, we have hear about networking applications and problems every day at the present time. We can now easily communicate with each other despite the distance apart, exchange data, audio, video, and information. Network consists of Local Area Network (LAN) and Wide Area Network (WAN). Local Area Network is a computer network that covers only a small area networks, such as campus computer networks, buildings, offices, homes, or schools. While the Wide Area Network is a data communications network that operates beyond the geographic scope of the LAN. Knowing the applications, devices, and protocols before designing the network is very important to build a reliable and safe network. We have designed, build, and simulated a network using EIGRP, VPN, DMZ and IDS/IPS. The result of our simulation shows the network has a good performance, secure, and reliable

    Open Layered Networks: the Growing Importance of Market Coordination

    Get PDF
    Based upon the Internet perspective, this paper will attempt to clarify and revise several ideas about the separation between infrastructure facilities and service offerings in digital communications networks. The key notions that we will focus on in this paper are: i) the bearer service as a technology-independent interface which exports blind network functionality to applications development; ii) the organizational consequences associated with the emergence of a sustainable market of bearer service: a clear movement at the level of industrial structure from traditional hierarchies to more market coordination

    Designing of Wide Area Network with the use of Frame Relay Concept in Real Time Environment: a Proposal

    Get PDF
    Thes e days inter-domain routing protocol, i.e., BGP (Border Gateway Protocol), is getting complicated day by day due to policy mis-configuration by individual autonomous systems. Existing configuration analysis techniques are either manual or tedious, or do not scale beyond a small number of nodes due to the state explosion problem. To aid the diagnosis of mis-configurations in real -world large BGP systems, this paper presents BGP based on Packet Switching Technology and Inter-VLAN where as packet switching technology is WAN technology. Inter - VLAN is a technology to communicate between two ormore VLAN. A company can send or receive any type of data, either text image, video etc. Another important part of network is security. This network would make use of following protocol for security purpose such as PAP, CHAP, ACL, and NAT. The key idea is that, all transmissions are broken into units called packets, each of which contains addressing information that identifies both the source and destination nodes. These packets are then routed through various intermediaries, known as Packet Switching Exchanges(PSEs), until they reach their destination.And there are two parameters associated with a Frame Relay connection are; Committed Information Rate (CIR), Peak Information Rate (PIR) Cisco configuration guidelines, as well as arbitrary user -defined networks. This method improves theapplicability, efficiency, and benefits of the network deployment, it also introduces an infrastructure that enables networking researchers to interact with advanced formal method tool

    Sustaining a Vertically Disintegrated Network through a Bearer Service Market

    Get PDF
    Based upon the Internet perspective, this chapter will attempt to clarify and revise several ideas about the separation between infrastructure facilities and service offerings in digital communications networks. The key notions that we will focus on in this paper are: i) the bearer service as a technology-independent interface which exports blind network functionality to applications development; ii) the sustainability of an independent market for bearer service and the organizational consequences associated with such a market

    Traffic Profiles and Performance Modelling of Heterogeneous Networks

    Get PDF
    This thesis considers the analysis and study of short and long-term traffic patterns of heterogeneous networks. A large number of traffic profiles from different locations and network environments have been determined. The result of the analysis of these patterns has led to a new parameter, namely the 'application signature'. It was found that these signatures manifest themselves in various granularities over time, and are usually unique to an application, permanent virtual circuit (PVC), user or service. The differentiation of the application signatures into different categories creates a foundation for short and long-term management of networks. The thesis therefore looks from the micro and macro perspective on traffic management, covering both aspects. The long-term traffic patterns have been used to develop a novel methodology for network planning and design. As the size and complexity of interconnected systems grow steadily, usually covering different time zones, geographical and political areas, a new methodology has been developed as part of this thesis. A part of the methodology is a new overbooking mechanism, which stands in contrast to existing overbooking methods created by companies like Bell Labs. The new overbooking provides companies with cheaper network design and higher average throughput. In addition, new requirements like risk factors have been incorporated into the methodology, which lay historically outside the design process. A large network service provider has implemented the overbooking mechanism into their network planning process, enabling practical evaluation. The other aspect of the thesis looks at short-term traffic patterns, to analyse how congestion can be controlled. Reoccurring short-term traffic patterns, the application signatures, have been used for this research to develop the "packet train model" further. Through this research a new congestion control mechanism was created to investigate how the application signatures and the "extended packet train model" could be used. To validate the results, a software simulation has been written that executes the proprietary congestion mechanism and the new mechanism for comparison. Application signatures for the TCP/IP protocols have been applied in the simulation and the results are displayed and discussed in the thesis. The findings show the effects that frame relay congestion control mechanisms have on TCP/IP, where the re-sending of segments, buffer allocation, delay and throughput are compared. The results prove that application signatures can be used effectively to enhance existing congestion control mechanisms.AT&T (UK) Ltd, Englan

    An Overview of MPLS Technology: Quality of Service and Traffic Engineering

    Get PDF
    This paper provides an overview of Multi-Protocol Label Switching Technology (MPLS). Distinctive issues are presented as well as Quality of Service (QoS). Traffic Engineering (TE) features are discussed. It also describes current network trends where Internet Protocol (IP) is the predominant technology and points out the advantages of MPLS for data, voice, and video information transport.II Workshop de Arquitecturas, Redes y Sistemas OperativosRed de Universidades con Carreras en Informática (RedUNCI

    Flexible Specialization Path of the Internet

    Get PDF

    IP and ATM integration: A New paradigm in multi-service internetworking

    Get PDF
    ATM is a widespread technology adopted by many to support advanced data communication, in particular efficient Internet services provision. The expected challenges of multimedia communication together with the increasing massive utilization of IP-based applications urgently require redesign of networking solutions in terms of both new functionalities and enhanced performance. However, the networking context is affected by so many changes, and to some extent chaotic growth, that any approach based on a structured and complex top-down architecture is unlikely to be applicable. Instead, an approach based on finding out the best match between realistic service requirements and the pragmatic, intelligent use of technical opportunities made available by the product market seems more appropriate. By following this approach, innovations and improvements can be introduced at different times, not necessarily complying with each other according to a coherent overall design. With the aim of pursuing feasible innovations in the different networking aspects, we look at both IP and ATM internetworking in order to investigating a few of the most crucial topics/ issues related to the IP and ATM integration perspective. This research would also address various means of internetworking the Internet Protocol (IP) and Asynchronous Transfer Mode (ATM) with an objective of identifying the best possible means of delivering Quality of Service (QoS) requirements for multi-service applications, exploiting the meritorious features that IP and ATM have to offer. Although IP and ATM often have been viewed as competitors, their complementary strengths and limitations from a natural alliance that combines the best aspects of both the technologies. For instance, one limitation of ATM networks has been the relatively large gap between the speed of the network paths and the control operations needed to configure those data paths to meet changing user needs. IP\u27s greatest strength, on the other hand, is the inherent flexibility and its capacity to adapt rapidly to changing conditions. These complementary strengths and limitations make it natural to combine IP with ATM to obtain the best that each has to offer. Over time many models and architectures have evolved for IP/ATM internetworking and they have impacted the fundamental thinking in internetworking IP and ATM. These technologies, architectures, models and implementations will be reviewed in greater detail in addressing possible issues in integrating these architectures s in a multi-service, enterprise network. The objective being to make recommendations as to the best means of interworking the two in exploiting the salient features of one another to provide a faster, reliable, scalable, robust, QoS aware network in the most economical manner. How IP will be carried over ATM when a commercial worldwide ATM network is deployed is not addressed and the details of such a network still remain in a state of flux to specify anything concrete. Our research findings culminated with a strong recommendation that the best model to adopt, in light of the impending integrated service requirements of future multi-service environments, is an ATM core with IP at the edges to realize the best of both technologies in delivering QoS guarantees in a seamless manner to any node in the enterprise
    • …
    corecore