Network evolution

Network evolution
The methods for sending and transmitting data across telephone lines have changed over the past few decades. Data networks have evolved over a series of generations. Some of the more significant data network milestones are the mainframe computer, the personal computer, LANs, WANs, the Internet, intranets, and extranets. Many companies incorporate all of these technologies in their corporate data networks. IBM calls this combination of an organization’s networks its “enterprise network.”

Mainframe computer networking

In the beginning, mainframe computers handled all data processing. “Dumb” terminals displayed the results of the mainframe computer’s work. Remote dumb terminals connected with the mainframe across expensive leased telephone lines.

For example, a national hotel chain used a mainframe at its home office to handle reservations. The dumb terminals at each hotel property connected to the mainframe for data processing and to access reservation records. The connection took place across telephone company leased lines. The phone companies “dedicated” the leased lines for the hotel chain’s use only, so they were very costly, but there was no other way for the hotel to do business. It was too expensive to purchase a mainframe for each hotel to do data processing, and each hotel still needed access to the home office’s reservation records.

Personal computers
The greatest distinction between mainframes and PCs is that PCs allow individuals to process their own data without the need to be connected to a mainframe computer. Using a modem, one PC can dial up another PC and share data. So, for example, the hotel chain could scrap its mainframe and use PCs at each location for data processing, but each hotel would still need to connect to the home office to handle reservations. Depending on the amount of traffic, a dial-up modem connection may be more cost effective than dedicated lines, but it would not be as reliable.

LANs
LANs are simply two or more computers connecting to each other in one location. For example, the network used by a small law firm consisting of a server, a printer, and five personal computers is considered a LAN. Figure 1 is an example of a LAN


Figure 1: Typical LAN.


WANs, MANs, and VPNs

A WAN is two or more computing devices in separate locations connecting to each other across telephone lines. Figure 2 shows an example of a typical WAN. WANs connect with dedicated private lines, circuit switching, packet switching, or a combination of these services


Figure 2: WAN.


Most WANs can also be called VPNs. A truly private network means that in addition to owning the computing equipment, the user also owns the phone lines that connect the computers. Some universities and corporate campuses have private networks. Building a physical telecommunications network is very difficult and very expensive; few organizations use private networks. Instead, they have private communications over lines owned by the phone company. This is not a private network; it is a “virtual” private network.

When telecommunications professionals use the term VPN, they are usually referring to large businesses that transmit voice and data across a data network. A metropolitan-area network (MAN) simply refers to a WAN that is contained within one metropolitan area.

The information revolution : Applications

The last 20 years can be viewed as a sort of information revolution. Like the Industrial Revolution that radically changed the world a century ago, the computer age has also ushered in a new era. Computers have impacted business, industry, employment trends, and consumer behavior. Numerous jobs are now obsolete due to computers, and an increasing number of people spend their working hours sitting at a computer workstation. And, like the Industrial Revolution, the information revolution has produced numerous consumer benefits.

While the end user is happily sending and receiving data, behind the scenes, the telephone companies are investing millions of dollars building up these networks. They, in turn, bill their customers for all this data traffic. In 2000, telecom carriers billed their data networking customers more than $7 billion.

Applications
Commercial use of data networking falls into two categories: front-office applications and back-office applications. A dime store’s customers walk in the front door and its suppliers walk in the back door. Data networking applications are essentially the same. The front office handles customers, while the back office handles suppliers. Front-office applications concentrate on customer relationship management and include:

- Customer service;

- Point of sale systems;

- Call centers;

- Sales;

- E-commerce;

- Shipping.

Back-office applications concentrate on internal company business and external supplier relationships such as:

- Accounts payable;

- Inventory control;

- Accounts receivable;

- Logistics;

- Engineering;

- Manufacturing;

- General ledger accounting;

- Research and development;

- Human resources;

- Supply chain.

Distinguishing between front- and back-office applications is important to a network’s stability and security. Front-office applications are more “mission critical” to the success of the business. Consequently, the data network that handles front-office applications should be less prone to glitches, downtime, and security breaches.

Back-office applications also need to be secure and reliable, but the business suffers more when front-office applications crash, so they have priority. Just like the five-and-dime store, a company loses more business when its front door is broken than if its back door is broken.

More?