262 research outputs found

    Campus Telecommunications Systems: Managing Change

    Get PDF
    The purpose of this book is to provide a broadbased understanding of the rapidly changing environment of campus telecommunications. The anticipated audience for this material is the non-technical university administrator who may not have direct responsibility for telecommunications, but has a need to understand the general environment in which his telecommunications manager functions and the basic concepts of the technology. Five topic areas were selected that best cover the preponderance of issues. No attempt has been made to associate or closely coordinate materials from one chapter\u27s subject to that of any other. Each chapter generally stands alone. In total, however, the five chapters address the topics and issues that most often generate inquiries from university administrators outside the telecommunications department. Introduction 1 The Changing Telecommunications Environment 2 Telecommunications Technology and the Campus 3 Student Services 4 Financing a New Telecommunications System . 5 Selecting a Consultant Glossary Inde

    Networking vendor strategy and competition and their impact on enterprise network design and implementation

    Get PDF
    Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (leaves 93-99).While a significant amount of literature exists that discuss platform strategies used by general IT vendors, less of it has to do with corporate networking technology vendors specifically. However, many of the same strategic principles that are used to analyze general IT vendors can also be used to analyze networking vendors. This paper extends the platform model that was developed by Michael Cusumano and Annabel Gawer to networking vendors, outlining the unique strategic aspects that the networking market possesses. The paper then reviews the strategy of the first dominant corporate datacom vendor, IBM, how it achieved its dominance, and how it lost it. The paper then discusses the strategies of various vendors who attempted to replace IBM as the dominant networking platform vendor and how they failed to do so. Finally, the paper discusses Cisco Systems, a vendor who did manage to achieve a level of dominance that parallels IBM's, and how that company has utilized its strategy to achieve and maintain its current dominance. Finally, Cisco's current strategic challenges are discussed. The impact of the strategies of the various vendors on the evolution of corporate networking is also discussed.by Ray Fung.S.M.M.B.A

    Integrated voice/data through a digital PBX

    Get PDF
    The digital voice/data PBX is finally reaching its anticipated potential and becoming a major factor when considering the total communications picture for many businesses today. The digital PBX has always been the choice for voice communications but has lagged behind the LAN industry when it comes to data transfers. The pendulum has begun to swing with the enhanced data capabilities of third and fourth generation PBXs. The battle for the total communication market is quite fierce between the LAN and PBX vendors now. This research thesis looks at the history, evolution, and architecture of voice/data PBXs. It traces development of PBXs through the present fourth generation architectures. From the first manual switches introduced in the late 1800\u27s through the Strowger switch, step-by-step switching, stored program control, common control, digital switches, dual bus architectures, and finally what is anticipated in the future. A detailed description of the new fourth generation dual bus architectures is presented. Lastly, speculations on the future direction PBX architectures will take is explored. A description of the mechanics of a possible Wave Division PBX is presented based on a fiber optic transport system

    Queueing models for token and slotted ring networks

    Get PDF
    Currently the end-to-end delay characteristics of very high speed local area networks are not well understood. The transmission speed of computer networks is increasing, and local area networks especially are finding increasing use in real time systems. Ring networks operation is generally well understood for both token rings and slotted rings. There is, however, a severe lack of queueing models for high layer operation. There are several factors which contribute to the processing delay of a packet, as opposed to the transmission delay, e.g., packet priority, its length, the user load, the processor load, the use of priority preemption, the use of preemption at packet reception, the number of processors, the number of protocol processing layers, the speed of each processor, and queue length limitations. Currently existing medium access queueing models are extended by adding modeling techniques which will handle exhaustive limited service both with and without priority traffic, and modeling capabilities are extended into the upper layers of the OSI model. Some of the model are parameterized solution methods, since it is shown that certain models do not exist as parameterized solutions, but rather as solution methods

    Future benefits and applications of intelligent on-board processing to VSAT services

    Get PDF
    The trends and roles of VSAT services in the year 2010 time frame are examined based on an overall network and service model for that period. An estimate of the VSAT traffic is then made and the service and general network requirements are identified. In order to accommodate these traffic needs, four satellite VSAT architectures based on the use of fixed or scanning multibeam antennas in conjunction with IF switching or onboard regeneration and baseband processing are suggested. The performance of each of these architectures is assessed and the key enabling technologies are identified

    Automating Hospitality Information: Network Technology and Systems Management

    Get PDF
    The local area network (LAN) interconnecting computer systems and soft- ware can make a significant contribution to the hospitality industry. The author discusses the advantages and disadvantages of such systems

    Analysis of exhaustive limited service for token ring networks

    Get PDF
    Token ring operation is well-understood in the cases of exhaustive, gated, gated limited, and ordinary cyclic service. There is no current data, however, on queueing models for the exhaustive limited service type. This service type differs from the others in that there is a preset maximum (omega) on the number of packets which may be transmitted per token reception, and packets which arrive after token reception may still be transmitted if the preset packet limit has not been reached. Exhaustive limited service is important since it closely approximates a timed token service discipline (the approximation becomes exact if packet lengths are constant). A method for deriving the z-transforms of the distributions of the number of packets present at both token departure and token arrival for a system using exhaustive limited service is presented. This allows for the derivation of a formula for mean queueing delay and queue lengths. The method is theoretically applicable to any omega. Fortunately, as the value of omega becomes large (typically values on the order of omega = 8 are considered large), the exhaustive limited service discipline closely approximates an exhaustive service discipline
    • …
    corecore