The Wellmont Health System migrated from an aging ATM backbone to a new Gigabit Ethernet infrastructure using CWDM technology to address bandwidth and reliability issues. Wellmont built the new infrastructure by laying dark fiber and installing Cisco networking equipment. This included running Gigabit Ethernet over leased fiber from Sprint and using CWDM to transmit additional network traffic over the fiber. The new infrastructure provides improved bandwidth for applications like medical imaging, as well as increased redundancy and reliability. It positions Wellmont's network to support future growth and applications for the next 5-6 years.
The Abstracted Network for Industrial InternetMeshDynamics
Widespread adoption of TCI/IP protocols over the last two decades appears on the surface to have created a lingua franca for computer networking. And with the emergence of IPv6 removing the addressing restrictions of earlier versions, it would appear that now every device in the world may easily be connected with a common protocol.
But three emerging factors are requiring a fresh look at this worldview. The first is the coming wave of sensors, actuators, and devices making up the Internet of Things (IOT). Although not yet widely recognized, it is beginning to be understood that a majority of these devices will be too small, too cheap, too dumb, and too copious to run the hegemonic IPv6 protocol. Instead, much simpler protocols will predominate (see below), which must somehow be incorporated into the IP networks of Enterprises and the Internet.
At the other end of the scale from these tiny devices are huge Enterprise networks, increasing movingly to the cloud for computing and communication resources. An important requirement of these Enterprises is the capacity to manage, control, and tune their networks using a variety of Software Defined Networking (SDN) technologies and protocols. These depend on computing resource at the edges of the network to manage the interactions.
The third element is a conundrum presented by the first two: Enterprises will be struggling with the need to bring vast numbers of simple IOT devices into their networks. Though many of these devices will lack computing and protocol smarts, the requirement will still remain to manage everything via SDN. Along with this, many legacy Machine-to-Machine (M2M) networks (such as those on the factory floor) present the same challenges as the IOT: simple and/or proprietary protocols operating in operational silos today that Enterprises desire to manage and tune with SDN techniques.
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.This is because the essential network infrastructures in these cases could be destroyed causing a large number of systems to stop working. In that cases, the victims need a heterogeneous communications network in which they can communicate, without a doubt, by using different wireless access technologies, i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous work, is considered. The performance of the system has been validated by a set of experiments in a real testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate is as small as 0.2 per cent.
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support or the presence of a physical broadcast medium, various Application Level Multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting Edge Device Any-casting technology that lies between the IP-multicasting and the Application Layer Multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
Computer networks have experienced an explosive growth over the past few years, which has lead to some severe congestion problems. Reliable protocols like TCP works well in wired networks where loss occurs mostly because of congestion. However, in wireless networks, loss occurs because of bit rates and handoffs too. TCP responds all losses by congestion control and avoidance algorithms, which results in degradation of TCP’s End-To-End performance in wireless networks. This paper discusses different issues and problems regarding use of TCP in wireless networks and provides comprehensive survey of various schemes to improve performance of TCP in Wireless Networks.
Services and applications’ infrastructure for agile optical networksTal Lavian Ph.D.
Huge advancements in optical devices, components and networking.
The underline of the Internet is optical – How can we take advantage of this?
How can the applications take advantage of this?
Agile Optical Network is starting to appear. What services and interfaces we’ll need between the optical control and the applications?
What are the applications?
The Internet architecture was built on some 15-20 years old assumptions. Are some modifications needed?
Is packet switching good for all? In some cases, is circuit switching better? (move TeraBytes of SAN date, P2P, Streaming)
End-to-End Argument – Is is valid for all cases?
What cases not? What instead?
The current Internet architecture is based on L3. What is needed in order to offer services in L1-L2?
Computation vs. Bandwidth 10X in 5 years
The Abstracted Network for Industrial InternetMeshDynamics
Widespread adoption of TCI/IP protocols over the last two decades appears on the surface to have created a lingua franca for computer networking. And with the emergence of IPv6 removing the addressing restrictions of earlier versions, it would appear that now every device in the world may easily be connected with a common protocol.
But three emerging factors are requiring a fresh look at this worldview. The first is the coming wave of sensors, actuators, and devices making up the Internet of Things (IOT). Although not yet widely recognized, it is beginning to be understood that a majority of these devices will be too small, too cheap, too dumb, and too copious to run the hegemonic IPv6 protocol. Instead, much simpler protocols will predominate (see below), which must somehow be incorporated into the IP networks of Enterprises and the Internet.
At the other end of the scale from these tiny devices are huge Enterprise networks, increasing movingly to the cloud for computing and communication resources. An important requirement of these Enterprises is the capacity to manage, control, and tune their networks using a variety of Software Defined Networking (SDN) technologies and protocols. These depend on computing resource at the edges of the network to manage the interactions.
The third element is a conundrum presented by the first two: Enterprises will be struggling with the need to bring vast numbers of simple IOT devices into their networks. Though many of these devices will lack computing and protocol smarts, the requirement will still remain to manage everything via SDN. Along with this, many legacy Machine-to-Machine (M2M) networks (such as those on the factory floor) present the same challenges as the IOT: simple and/or proprietary protocols operating in operational silos today that Enterprises desire to manage and tune with SDN techniques.
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.This is because the essential network infrastructures in these cases could be destroyed causing a large number of systems to stop working. In that cases, the victims need a heterogeneous communications network in which they can communicate, without a doubt, by using different wireless access technologies, i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous work, is considered. The performance of the system has been validated by a set of experiments in a real testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate is as small as 0.2 per cent.
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support or the presence of a physical broadcast medium, various Application Level Multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting Edge Device Any-casting technology that lies between the IP-multicasting and the Application Layer Multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
Computer networks have experienced an explosive growth over the past few years, which has lead to some severe congestion problems. Reliable protocols like TCP works well in wired networks where loss occurs mostly because of congestion. However, in wireless networks, loss occurs because of bit rates and handoffs too. TCP responds all losses by congestion control and avoidance algorithms, which results in degradation of TCP’s End-To-End performance in wireless networks. This paper discusses different issues and problems regarding use of TCP in wireless networks and provides comprehensive survey of various schemes to improve performance of TCP in Wireless Networks.
Services and applications’ infrastructure for agile optical networksTal Lavian Ph.D.
Huge advancements in optical devices, components and networking.
The underline of the Internet is optical – How can we take advantage of this?
How can the applications take advantage of this?
Agile Optical Network is starting to appear. What services and interfaces we’ll need between the optical control and the applications?
What are the applications?
The Internet architecture was built on some 15-20 years old assumptions. Are some modifications needed?
Is packet switching good for all? In some cases, is circuit switching better? (move TeraBytes of SAN date, P2P, Streaming)
End-to-End Argument – Is is valid for all cases?
What cases not? What instead?
The current Internet architecture is based on L3. What is needed in order to offer services in L1-L2?
Computation vs. Bandwidth 10X in 5 years
A distributed three hop routing protocol to increase the capacity of hybrid w...LeMeniz Infotech
A distributed three hop routing protocol to increase the capacity of hybrid wireless networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Ethernet has taken the lead as the preferred platform for connecting to the cloud, but not all Ethernet cloud connections (CloudE) are created equal. Providers and users alike are calling for the industry to establish standards of excellence, and the Cloud Ethernet Forum is responding. Read about CloudE 1.0 and what its standards of excellence could mean for CloudE.
A distributed three hop routing protocol to increase theKamal Spring
Hybrid wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased attention due to their ultra-high performance. An efficient data routing protocol is important in such networks for high network capacity and scalability. However, most routing protocols for these networks simply combine the ad-hoc transmission mode with the cellular transmission mode, which inherits the drawbacks of ad-hoc transmission. This paper presents a Distributed Three-hop Routing protocol (DTR) for hybrid wireless networks. To take full advantage of the widespread base stations, DTR divides a message data stream into segments and transmits the segments in a distributed manner. It makes full spatial reuse of a system via its high speed ad-hoc interface and alleviates mobile gateway congestion via its cellular interface. Furthermore, sending segments to a number of base stations simultaneously increases throughput and makes full use of widespread base stations. In addition, DTR significantly reduces overhead due to short path lengths and the elimination of route discovery and maintenance. DTR also has a congestion control algorithm to avoid overloading base stations. Theoretical analysis and simulation results show the superiority of DTR in comparison with other routing protocols in terms of throughput capacity, scalability and mobility resilience. The results also show the effectiveness of the congestion control algorithm in balancing the load between base stations.
Cisco Case Study "Wellmont Health System Prepares for More Physician Order En...Darren Ramsey
The 10-Gbps server connections will help to ensure that critical patient and healthcare
applications won’t slow down as network traffic increases,” Ramsey says. “Application responsiveness is critical, because delays in accessing medical images or patient history, for example, have the potential to affect patient outcomes.
Intelligent Load Shedding Using TCP/IP for Smart Gridsijsrd.com
computerized power management system with fast and optimal communication network overcomes all major discrepancies of undue or inadequate load relief that were present in old conventional systems. This paper presents the basic perception and methodology of modern and true intelligent load shedding scheme in micro grids topology by employing TCP/IP protocol for fast and intelligent switching. The network understudy performs load management and power distribution intelligently in a unified network. Generated power is efficiently distributed among local loads through fast communication system of server in the form of source and clients in the form of loads through TCP/IP. The efficient use of information between server and clients enables to astutely control the load shedding in a power system of micro grids system. The processing time of above stated system comes out to be 10 ms faster than others which ensure very less delay as compared to conventional methods. The Micro Grids system operating through TCP/IP control has been implemented in MATLAB/SIMULINK and results have been verified.
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
A capillary network is a local network that uses short-range radio-access technologies to provide local connectivity to things and devices. By leveraging the key capabilities of cellular networks – ubiquity, integrated security, network management and advanced backhaul connectivity – capillary networks will become a key enabler of the Networked Society.
Sheet1YearM 12-14M 15-17M 18-20M 21-24M 25-24M 35-49M 50-64M 65 or OlderF 12-14F 15-17F 18-20F 21-24F 25-24F 35-49F 50-64F 65 or Older2012503294214582313483329238762630101809245804710906725979523371827874133599967253377189145393312755120135295112032141862442623286538136280115131636968528541928656327945730961060386661121463768866639
Sheet2
Sheet3
Research Title:Cable Modem
Introduction:
Cable TV providers provide sports news, presentations, entertainment and real-time music. Videos are embedded in cable TV in a market environment where the video is set to replace data and text in many cases. Religion, food, travel, medicine and weather are specialized television shows. Cable TV has all of them. The ability to combine these offers with one-stream offers will not be replaced. The Internet is good for playback and user-generated content, but the cable TV ad package has obvious benefits for viewers.
Cable-based industry-based advertising is accepted by viewers as a trade-off with a significantly higher cost of direct purchase, providing a sustainable cable TV business model. Cable TV has great value because people can watch channels that they may not see as part of the package.
It aggregates video content in a way that does not work in the music industry. People want to create their own music packages, but the video is much more complex. Assembling in the way that the cable television industry provides is very sophisticated and does not resemble the music industry at all. What a good show for one year is not good the next day. The ability to turn back and forth gives people the ability to change viewing habits, without the rhythm of individual download options is of great value to users.
The cable television network has evolved to support digital video and bi-directional services such as high-speed data, video-on-demand and telephone. Around the world there is a trend for cable operators to increase their investments in their networks.
Cable modem business is operated by industry dynamics related to expanding information and entertainment services at home. Trends increase wireless connectivity to access video and data over the Internet by using a variety of digital devices at home.
The Internet is the only network protocol to move forward. When cable providers build more high-bandwidth video capabilities, they will build on Internet protocols. The pace of service delivery continues to increase. Continue a variety of devices consumed in the increase. This change increases the bandwidth and demand consumption of cable modem products.
Cable operators demand advanced networking technologies and software solutions. The increase in the volume and complexity of signals transmitted over broadband networks as a result of the transition to a full digital network on demand, requires cable operators to deploy new technologies. Transport technologies rely on IP.
This allows cable operators to pay for video, audio and data effectively over a shared network.
Watch the first 10 minutes of the video below and then answer the que.pdfdeepakarora871
Watch the first 10 minutes of the video below and then answer the questions that follow.
https://d2m81 yxg6b9itc.cloudfront.net/flex- insidethe internet/processed/1969-02-06-
BasicOperationOfMTS- small.7db4fb40447611 e4bf68d70a95093c06 The Michigan terminal
system using a modem and a POTS connection. What are the advantages of this over a leased
line installation? What is the difference between connectionless and connection-oriented
networking?
Solution
4. The Michigan Terminal System:
The Michigan Terminal System (MTS) is one of the first time-sharing computer operating
systems. Developed in 1967 at the University of Michigan for use on IBM S/360-67, S/370 and
compatible mainframe computers, it was developed and used by a consortium of eight
universities in the United States, Canada, and the United Kingdom over a period of 33 years
(1967 to 1999).
The software developed by the staff of the University of Michigan\'s academic Computing
Center for the operation of the IBM S/360-67, S/370, and compatible computers can be described
as a multiprogramming, multiprocessing, virtual memory, time-sharing supervisor that handles a
number of resident, reentrant programs.
There is a large subsystem, called MTS (Michigan Terminal System), for command
interpretation, execution control, file management, and accounting.
There are Michigan terminal system are using a several Modems and POTS connections.
Advantage of this over a leased line installation:
Michigan Terminal Systems are used a leased line is Private circuit. A leased line is a private
bidirectional or symmetric telecommunications line between two or more locations provided in
exchange for a monthly rent.
Sometimes known as a private circuit or data line in the UK
The Michigan Terminal System are many leased networks. Leased lines are used to build up
private networks, private telephone networks (by interconnecting PBXs) or access the internet or
a partner network (extranet).
· Site to site PBX connectivity
· Site to network connectivity
· International private leased circuit
Site to site data connectivity:
Terminating a leased line with two routers can extend network capabilities across sites. Leased
lines were first used in the 1970s by enterprise with proprietary protocols such as IBM System
Network Architecture and Digital Equipment DEC net, and with TCP/IP in University and
Research networks before the Internet became widely available. The other Layer 3 protocols
were used such as Novell IPX on enterprise networks until TCP/IP became ubiquitous in the
2000s. Today on words point to point data circuits are typically provisioned as either TDM,
Ethernet, or Layer 3 MPLS.
Site to site PBX connectivity:
Terminating a leased line with two PBX allowed customers to by-pass PSTN for inter-site
telephony. The customers to manage their own dial plan (and to use short extensions for internal
telephone number) as well as to make significant savings if enough voice traffic was carried
across the line
Site .
Fiber Optic Network for Data Center Industry ApplicationsSun Telecom
Fiber optic networks play a crucial role in the data center industry by offering high bandwidth, high-speed internet access, high reliability, high security, and long distance.
Understanding the critical role of last-mile connectivity and always available Internet access for their enterprises, savvy firms utilize redundant connections from multiple service providers. Despite the good intentions, their Internet connectivity risk may be equivalent to putting all their eggs in one basket.
A distributed three hop routing protocol to increase the capacity of hybrid w...LeMeniz Infotech
A distributed three hop routing protocol to increase the capacity of hybrid wireless networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Ethernet has taken the lead as the preferred platform for connecting to the cloud, but not all Ethernet cloud connections (CloudE) are created equal. Providers and users alike are calling for the industry to establish standards of excellence, and the Cloud Ethernet Forum is responding. Read about CloudE 1.0 and what its standards of excellence could mean for CloudE.
A distributed three hop routing protocol to increase theKamal Spring
Hybrid wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased attention due to their ultra-high performance. An efficient data routing protocol is important in such networks for high network capacity and scalability. However, most routing protocols for these networks simply combine the ad-hoc transmission mode with the cellular transmission mode, which inherits the drawbacks of ad-hoc transmission. This paper presents a Distributed Three-hop Routing protocol (DTR) for hybrid wireless networks. To take full advantage of the widespread base stations, DTR divides a message data stream into segments and transmits the segments in a distributed manner. It makes full spatial reuse of a system via its high speed ad-hoc interface and alleviates mobile gateway congestion via its cellular interface. Furthermore, sending segments to a number of base stations simultaneously increases throughput and makes full use of widespread base stations. In addition, DTR significantly reduces overhead due to short path lengths and the elimination of route discovery and maintenance. DTR also has a congestion control algorithm to avoid overloading base stations. Theoretical analysis and simulation results show the superiority of DTR in comparison with other routing protocols in terms of throughput capacity, scalability and mobility resilience. The results also show the effectiveness of the congestion control algorithm in balancing the load between base stations.
A distributed three hop routing protocol to increase the
Similar to Network Magazine “In practice” – Wellmont Health System turns to Gigabit Ethernet and CWDM over Dark Fiber to rebuild antiquated ATM infrastructure
Cisco Case Study "Wellmont Health System Prepares for More Physician Order En...Darren Ramsey
The 10-Gbps server connections will help to ensure that critical patient and healthcare
applications won’t slow down as network traffic increases,” Ramsey says. “Application responsiveness is critical, because delays in accessing medical images or patient history, for example, have the potential to affect patient outcomes.
Intelligent Load Shedding Using TCP/IP for Smart Gridsijsrd.com
computerized power management system with fast and optimal communication network overcomes all major discrepancies of undue or inadequate load relief that were present in old conventional systems. This paper presents the basic perception and methodology of modern and true intelligent load shedding scheme in micro grids topology by employing TCP/IP protocol for fast and intelligent switching. The network understudy performs load management and power distribution intelligently in a unified network. Generated power is efficiently distributed among local loads through fast communication system of server in the form of source and clients in the form of loads through TCP/IP. The efficient use of information between server and clients enables to astutely control the load shedding in a power system of micro grids system. The processing time of above stated system comes out to be 10 ms faster than others which ensure very less delay as compared to conventional methods. The Micro Grids system operating through TCP/IP control has been implemented in MATLAB/SIMULINK and results have been verified.
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
A capillary network is a local network that uses short-range radio-access technologies to provide local connectivity to things and devices. By leveraging the key capabilities of cellular networks – ubiquity, integrated security, network management and advanced backhaul connectivity – capillary networks will become a key enabler of the Networked Society.
Sheet1YearM 12-14M 15-17M 18-20M 21-24M 25-24M 35-49M 50-64M 65 or OlderF 12-14F 15-17F 18-20F 21-24F 25-24F 35-49F 50-64F 65 or Older2012503294214582313483329238762630101809245804710906725979523371827874133599967253377189145393312755120135295112032141862442623286538136280115131636968528541928656327945730961060386661121463768866639
Sheet2
Sheet3
Research Title:Cable Modem
Introduction:
Cable TV providers provide sports news, presentations, entertainment and real-time music. Videos are embedded in cable TV in a market environment where the video is set to replace data and text in many cases. Religion, food, travel, medicine and weather are specialized television shows. Cable TV has all of them. The ability to combine these offers with one-stream offers will not be replaced. The Internet is good for playback and user-generated content, but the cable TV ad package has obvious benefits for viewers.
Cable-based industry-based advertising is accepted by viewers as a trade-off with a significantly higher cost of direct purchase, providing a sustainable cable TV business model. Cable TV has great value because people can watch channels that they may not see as part of the package.
It aggregates video content in a way that does not work in the music industry. People want to create their own music packages, but the video is much more complex. Assembling in the way that the cable television industry provides is very sophisticated and does not resemble the music industry at all. What a good show for one year is not good the next day. The ability to turn back and forth gives people the ability to change viewing habits, without the rhythm of individual download options is of great value to users.
The cable television network has evolved to support digital video and bi-directional services such as high-speed data, video-on-demand and telephone. Around the world there is a trend for cable operators to increase their investments in their networks.
Cable modem business is operated by industry dynamics related to expanding information and entertainment services at home. Trends increase wireless connectivity to access video and data over the Internet by using a variety of digital devices at home.
The Internet is the only network protocol to move forward. When cable providers build more high-bandwidth video capabilities, they will build on Internet protocols. The pace of service delivery continues to increase. Continue a variety of devices consumed in the increase. This change increases the bandwidth and demand consumption of cable modem products.
Cable operators demand advanced networking technologies and software solutions. The increase in the volume and complexity of signals transmitted over broadband networks as a result of the transition to a full digital network on demand, requires cable operators to deploy new technologies. Transport technologies rely on IP.
This allows cable operators to pay for video, audio and data effectively over a shared network.
Watch the first 10 minutes of the video below and then answer the que.pdfdeepakarora871
Watch the first 10 minutes of the video below and then answer the questions that follow.
https://d2m81 yxg6b9itc.cloudfront.net/flex- insidethe internet/processed/1969-02-06-
BasicOperationOfMTS- small.7db4fb40447611 e4bf68d70a95093c06 The Michigan terminal
system using a modem and a POTS connection. What are the advantages of this over a leased
line installation? What is the difference between connectionless and connection-oriented
networking?
Solution
4. The Michigan Terminal System:
The Michigan Terminal System (MTS) is one of the first time-sharing computer operating
systems. Developed in 1967 at the University of Michigan for use on IBM S/360-67, S/370 and
compatible mainframe computers, it was developed and used by a consortium of eight
universities in the United States, Canada, and the United Kingdom over a period of 33 years
(1967 to 1999).
The software developed by the staff of the University of Michigan\'s academic Computing
Center for the operation of the IBM S/360-67, S/370, and compatible computers can be described
as a multiprogramming, multiprocessing, virtual memory, time-sharing supervisor that handles a
number of resident, reentrant programs.
There is a large subsystem, called MTS (Michigan Terminal System), for command
interpretation, execution control, file management, and accounting.
There are Michigan terminal system are using a several Modems and POTS connections.
Advantage of this over a leased line installation:
Michigan Terminal Systems are used a leased line is Private circuit. A leased line is a private
bidirectional or symmetric telecommunications line between two or more locations provided in
exchange for a monthly rent.
Sometimes known as a private circuit or data line in the UK
The Michigan Terminal System are many leased networks. Leased lines are used to build up
private networks, private telephone networks (by interconnecting PBXs) or access the internet or
a partner network (extranet).
· Site to site PBX connectivity
· Site to network connectivity
· International private leased circuit
Site to site data connectivity:
Terminating a leased line with two routers can extend network capabilities across sites. Leased
lines were first used in the 1970s by enterprise with proprietary protocols such as IBM System
Network Architecture and Digital Equipment DEC net, and with TCP/IP in University and
Research networks before the Internet became widely available. The other Layer 3 protocols
were used such as Novell IPX on enterprise networks until TCP/IP became ubiquitous in the
2000s. Today on words point to point data circuits are typically provisioned as either TDM,
Ethernet, or Layer 3 MPLS.
Site to site PBX connectivity:
Terminating a leased line with two PBX allowed customers to by-pass PSTN for inter-site
telephony. The customers to manage their own dial plan (and to use short extensions for internal
telephone number) as well as to make significant savings if enough voice traffic was carried
across the line
Site .
Fiber Optic Network for Data Center Industry ApplicationsSun Telecom
Fiber optic networks play a crucial role in the data center industry by offering high bandwidth, high-speed internet access, high reliability, high security, and long distance.
Understanding the critical role of last-mile connectivity and always available Internet access for their enterprises, savvy firms utilize redundant connections from multiple service providers. Despite the good intentions, their Internet connectivity risk may be equivalent to putting all their eggs in one basket.
Ntc 362 Week 2, Integrative Network Design Project , Part 1By Alucard1990 | Studymode.com
Kudler Fine Foods Network Overview
Name
University of Phoenix
NTC 362
Date
Instructor
Upon reviewing Kudler Fine Food network, it has been determined that a major network overhaul will need to be conducted to make sure that Kudler is brought up to speed with the latest technology. This is very important because if Kudler is unable to keep up with the technological advances then the company will fall behind. Making sure that Kudler is not only able to keep up with the advances with network systems it is also important to install the proper systems so that no money is wasted. What is meant by this is that if the improper systems and storage units are installed to only handle data over the next year this is only going to force Kudler to spend more money in upgrades in the future. This is why it is vital to install the proper systems that will provide room for future network expansion without having to waste money on unnecessary upgrades. The following is a list of problem areas with the Kudler network: • 56K modems provide slow connections speeds
• Host systems at all site running Window 98 – over 10 years old • Windows NT servers are at the Delmar and Lajolla sites – over 10 years old. • The XLS servers at the Delmar and Lajolla sites are running Office 97 – over 15 years old. • The Novell Servers at the Delmar and Lajolla sites are running this was released in 1994. – over almost 20 years old. • All sites have a stand lone ups system that will need upgraded to provide a redundant power supply to support new systems.
One of the first things that were noticed was that fact that all of the sites are still running 56k modems. This is an old technology and is only hindering the speed between each site. Having the proper connection speed is vital to provide real time updates not only for the profits made each day, but providing the inventory updates on the products that are sold so that those items can be restocked without waiting. These modems will be removed to make the way for the new wide area network and within each site there will be a wireless local area network. The WAN will link all of the site networks together which will in turn boost the network speed and the way employees communicate. The communication aspect of the new network will incorporate a VoIP system and will be managed at one central location. “The great thing about VoIP is that it taps additional value from the already existing infrastructure without additional costs” This will provide the highest quality of phone network will saving on the cost of out phone services.
Another issue that issue that is hindering the speed and efficiency on the network is the fact that all the host systems being used within all the sites are Windows 98. These systems are well over ten years old and a.
Similar to Network Magazine “In practice” – Wellmont Health System turns to Gigabit Ethernet and CWDM over Dark Fiber to rebuild antiquated ATM infrastructure (20)
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Network Magazine “In practice” – Wellmont Health System turns to Gigabit Ethernet and CWDM over Dark Fiber to rebuild antiquated ATM infrastructure
1. How do you spell relief? If you’re northeast
Tennessee’s largest health care system and
you’re distressed by an aging, temperamental, under-
powered ATM network that hiccups at the least provo-
cation, you build a Gigabit Ethernet backbone and run it
over dark fiber you’ve coaxed out of a reluctant telco.
Then you add a little Course Wavelength Division
Multiplexing (CWDM), the passive optical technology
targeted at metro networks, and you’ve built yourself an
enterprise network infrastructure that’s good for at least
five or six years. At least, that’s the prediction of Darren
Ramsey, the senior network specialist who shepherded
the migration from ATM to Gigabit Ethernet for the
Wellmont Health System, a leading health care provider
in northeast Tennessee and southwest Virginia.
When fully operational this summer, the new multi-
service infrastructure will solve a plethora of business-
critical issues for Wellmont. Not the least of these is
delivering a simplified, all IP-based network with
enough bandwidth to easily transport the health care
organization’s patient records, as well as graphics files
created by the hospital system’s Agfa electronic med-
ical imaging system.
The new infrastructure will also add high-availabil-
ity failover redundancy for disaster recovery between
Wellmont’s three main facilities; Differentiated Services
Code Point (DSCP) for end-to-end QoS; and the ability
to deploy several bandwidth-intensive applications, in-
cluding medical imaging, health information systems,
VoIP, and an IP SAN that supports both Internet SCSI
(iSCSI) and Fibre Channel over IP (FCIP) over the new
backbone. All of this will be carried over three pairs of
leased fiber optic circuits from Sprint, which initially
balked when Wellmont inquired about renting its un-
used dark fiber capacity.
When matched with the appropriate CWDM boxes
and modules from Cisco Systems, Wellmont can scale
in practice
48 NETWORK MAGAZINE I 07.04 I www.networkmagazine.com
+
by Jim Carr
Darren Ramsey shepherded Wellmont’s migration from an aging ATM
backbone to a new Gigabit Ethernet infrastructure run over CWDM.
The Wellmont Health System
is a leading health care
provider in northeast Ten-
nessee and southwest Vir-
ginia. Created in a merger of
two equals—Bristol Regional
Medical Center and Holston
Valley Medical Center—in
1996, the health care system
consists of five medical cen-
ters and hospitals, 40 clinics,
an assisted living center, a
hospice, and a wellness cen-
ter. Its services range from
community-based acute
care to specialized tertiary
services that include neona-
tal intensive care and two
trauma centers.
Because the merger oc-
curred so quickly, the ensu-
ing entity’s IT departments
had little time for long-term
planning, instead deploying
a 25Mbit/sec ATM backbone
between the two main facili-
ties. By 1999, that backbone
was reaching its limit, and
with the addition of several
large mission-critical applica-
tions, it became apparent
that the hospital needed to
rebuild its infrastructure.
To that end, the organiza-
tion staged a phased de-
ployment of Gigabit Ether-
net and plans to add CWDM
capabilities in the near fu-
ture. This should ensure that
its infrastructure is “good for
five or six years,” according
to Darren Ramsey, Wellmont
Health System’s senior net-
work specialist.
he long and short of it : : :
Healing Network IllsThe Wellmont Health System turns to Gigabit Ethernet and CWDM over dark fiber
to rebuild its antiquated ATM infrastructure.
2. its Gigabit Ethernet backbone up to 8Gbits/sec over its
existing fiber circuits, although initial plans call for
using CWDM just for 2Gbit/sec connectivity.
These changes didn’t happen quickly, Ramsey ad-
mits. In fact, he likens the task of migrating Wellmont’s
infrastructure from ATM to Gigabit Ethernet to that of
turning an ocean liner: “Everything is so big and inter-
dependent, it’s difficult to make a drastic change—it’s
hard to turn the ship quickly.”
But turn it around Wellmont did, and here’s how.
MERGED ENTITY
Wellmont, one of northern Tennessee’s largest employers
with about 4,500 health care professionals, was formed in
1996 in a merger between Bristol Regional Medical Center
(BRMC) and Holston Valley Medical Center (HVMC). Eight
years later, Wellmont’s integrated health care system con-
sists of five medical centers and hospitals, 40 clinics, an
assisted living center, a hospice, and a wellness center.
According to Craig Rogers, Wellmont’s manager of
technical services, the merger occurred so quickly that
the two organizations’ IT departments had little time for
long-range design and planning. In the interest of expe-
diency, they deployed an ATM backbone, the de-facto
backbone technology at the time, with 25Mbit/sec
point-to-point Permanent Virtual Circuits (PVCs) be-
tween the two main hospitals.
Despite the fact that BRMC was primarily a Unix
shop and HVMC an IBM mainframe house, and that
both had a mixture of Novell NetWare 3 and 4 servers,
everything worked fine for a few years, says Ramsey.
But by 1999, the ATM backbone had started showing
its age. Several factors were at work here.
First, the organization had purchased a data center
that would allow it to consolidate all of its IT resources,
including servers, into a single location. That, of course,
necessitated an architectural change in the ATM back-
bone. As a result, Wellmont moved from a point-to-point
environment to a multipoint environment with two PVCs
rather than one, adding bandwidth and complexity.
Wellmont also added several new enterprise-wide
applications to its existing health information system,
which provides patient records and financial function-
ality already in use. This included Microsoft Outlook
for e-mail, and Agfa’s Picture Archiving and Communi-
cations System (PACS), which is used at four of Well-
mont’s facilities as a film-free diagnostic imaging solu-
tion. In addition, the workstation count grew to more
than 2,000, according to Wellmont CIO Steve Hill.
Despite this growth, Wellmont’s network consisted
of a single layer-2 unrouted subnetwork. With Novell’s
IPX and IP running across this backbone, it was no
surprise that the network began to experience severe
performance degradation, including broadcast storms,
says Ramsey.
It got to the point where Wellmont’s networking staff
was troubleshooting the organization’s ATM switches on a
daily basis. The staff experienced “strange issues” that the
ATM vendor was unable to fix. It was obviously time for
some changes, according to Ramsey.
www.networkmagazine.com I 07.04 I NETWORK MAGAZINE 49
Core Topology
HVMC CORP BRMCRouters
1 Gigabit
1 Gigabit
1 Gigabit
1 Gigabit
1 Gigabit
1 Gigabit
CWDM 1550nm
CWDM 1590nm
Routers Routers
Wellmont’s new Gigabit Ethernet infrastructure consists of leased fiber optic circuits (denoted by the solid white lines) and two 1 Gigabit
CWDM “lambdas” (indicated by the blue and yellow lines). Expanding the backbone’s CWDM capacity requires adding modules to the
hospital’s Cisco Gigabit Interface Converter CWDM devices, which operate in conjunction with the hospital’s Cisco routers.
3. MOVE TO ROUTING
The first step in remedying Wellmont’s infrastructure
problems was to implement a routed network. Because
this required “touching” almost every device on the net-
work (minus workstations, which are assigned IP ad-
dresses automatically via DHCP) and because many of
these devices, including servers, were moved around,
the process took almost two full years, says Ramsey.
Once the network was routed and somewhat stable,
Wellmont began eliminating IPX and its NetWare
servers, shutting down the last one in April 2002.
By then, it was evident that Wellmont had outgrown
its 25Mbit/sec ATM backbone, says Ramsey. In studying
the options, Wellmont rejected going with a bigger ATM
pipe. “We thought ATM was probably dead as an enter-
prise networking technology and Ethernet is much sim-
pler, with a smaller learning curve,” he says.
Wellmont also looked at the Multilink Point-to-Point
Protocol (MLPPP), which aggregates up to eight T1 cir-
cuits into a 12Mbit/sec link. “But 12Mbits/sec is a far
cry from 25Mbits/sec, so we knew that wouldn’t work,”
Ramsey explains.
Gigabit Ethernet, on the other hand, had recently
been standardized, “and we knew the prices would
come down in 2000/2001,” he says. “We knew we
couldn’t trench it ourselves,” so Wellmont started look-
ing for dark fiber to lease.
“Initially, we went to Sprint, but they didn’t want to
offer the service,” says Ramsey. “They didn’t want to do
it because there was no competition.”
After six to nine months of negotiations, however, the
entry of several Competitive Local Exchange Carriers
(CLECs) into the area market changed Sprint’s attitude.
Although several CLECs had fiber for lease, “Sprint made
the deal attractive because it could bundle all voice, data,
and long distance into the contract,” says Ramsey. “Sprint
found out we might go with someone else, it made us a
good deal, and we ended up paying less a month for four
fiber optic links than our two ATM PVCs had cost.”
Wellmont subsequently leased fiber circuits between
its three main sites—BRMC, HVMC, and the corporate
data center—in a multi-point-to-point arrangement, with
two independent rings between the three sites connecting
Alcatel switches at each site. That configuration gave
Wellmont’s link redundancy with a failover connection
should one fiber line go down, but not switch redundancy.
From then on, “The network was like night and day,”
says Ramsey. “It went from everything being the net-
work’s fault to the point where the network was no longer
guilty until proven innocent when an application failed.”
ELIMINATING ATM
Even with these improvements, Wellmont still relied on
ATM for wiring closet-to-backbone connectivity, with
about 35 closets per facility. Its next step was to elimi-
nate ATM entirely and move strictly to Ethernet.
With a slew of new internetworking equipment to pur-
chase, Wellmont standardized on Cisco as its “next-gener-
ation vendor,” as Ramsey puts it. He says sticking with one
vendor simplifies implementation in enterprise networks.
In 2002 and 2003, Wellmont deployed a wide variety
of Cisco boxes to begin rolling out its Gigabit Ethernet
backbone. This included placing Catalyst 3550 10/100
Ethernet switches in the wiring closets, Catalyst 4506
Ethernet switches in Wellmont’s medium-sized facili-
ties, and Catalyst 6509 multiprotocol switches in each of
the BRMC, HVMC, and corporate data center locations.
By the start of 2004, Wellmont’s Gigabit Ethernet back-
bone was up and running smoothly, performance issues
with the health information systems had vanished, and
download times—particularly those involving medical
images—were dramatically improved. At that point, Ram-
sey says Wellmont’s management brought up several for-
ward-looking issues to the IT department. These included
deploying a disaster recovery plan in tandem with a SAN,
and running VoIP over the new infrastructure.
“With the backbone up, we felt a lot of pressure to
develop a business continuity plan,” he explains. That
lead to the deployment of 80Tbytes of mirrored storage
money matters
in practice
50 NETWORK MAGAZINE I 07.04 I www.networkmagazine.com
Sprint initially balked when Wellmont inquired about
renting its unused dark fiber capacity.
“ ”
Price of a two-year
upgrade to a Gigabit
Ethernet backbone
Monthly savings migrating
from 25Mbit/sec ATM to
leased fiber optic circuits
via Sprint
Cost of CWDM equipment
to expand the backbone
to 8Gbits/sec
>$1Million
>$1K
$50K
4. in EMC Symmetric, Clarion, and Centara optical stor-
age arrays. All are linked via IP over the Gigabit Ether-
net backbone. The SAN currently supports FCIP, but
Ramsey says Wellmont plans to use a CWDM circuit to
extend the hospital system’s Brocade Fibre Channel
switches to its three main sites. That will give it redun-
dant SAN transport with a pure Fibre Channel over
FCIP, he says.
Meanwhile, Wellmont also began moving some of its
voice traffic onto the IP network. First, it added Nortel Net-
works’ Internet Telephony Gateway (ITG) VoIP cards to its
phone system, which is based on Nortel Option PBXs.
This allowed site-to-site calls within the organization to
traverse Wellmont’s backbone network, eliminating several
Time Division Multiplexing (TDM) Primary Rate Interfaces
(PRIs) and the charges associated with many long distance
phone calls. In patient care areas, the hospital also inte-
grated SpectraLink’s 802.11b-compatible handsets into the
VoIP system.
“Once we started doing all that—we have our PACS
images, patient files, and SAN and voice traffic on the
network—we were in a position where the network
can’t fail,” says Ramsey. “We needed 99.999 percent up-
time, so we started looking at what we needed for the
data center to survive a catastrophic failure.”
That meant making yet another architectural shift in
the backbone. Wellmont worked with Sprint to redeploy
its fiber circuits from a strictly point-to-point topology to
a ring topology and added a second redundant Catalyst
6509 switch to each of the three main sites.
This left Wellmont with direct links between its
main facilities. Such a configuration ensured that a fail-
ure on any communications link or switch wouldn’t
negatively impact the core of Wellmont’s backbone, giv-
ing Ramsey his “five nines” reliability.
It also paved the way for Wellmont to deploy
CWDM. Ramsey says all he has to do is drop a Cisco
CWDM Gigabit Interface Converter (GBIC) with the ap-
propriate Optical Add-Drop Modules (OADMs) between
the routers in the health care provider’s three main sites
and the fiber optic circuit, “and the routers think we
lease eight pairs of fibers.” He plans to double the back-
bone’s capacity, saving the potential eightfold band-
width increase for future growth.
All this was done at bargain prices. By eliminating
the need for a second fiber circuit, which costs $10,000
to $15,000 per month to lease, Ramsey says he’s looking
at a three-month payback on his $50,000 investment in
CWDM equipment.
NOT INEXPENSIVE
Ramsey admits the backbone project itself wasn’t so in-
expensive, however. He says from 2002 to 2004, it cost
the organization more than $1 million: “More than we
spent in the previous four years, but it’s money we had
to spend,” he says.
“We could not afford to not do it,” he adds. “We’re
looking at half a million dollars lost per hour if our sys-
tems go down. How many downtimes would it take to
pay for $1 million? I’d rather not have any,” says Ramsey.
“Besides, it gives us the ability to do things we could-
n’t do before—VoIP, wireless, the SAN Fibre Channel over
CWDM—and we’re set for the next five or six years.”
www.networkmagazine.com I 07.04 I NETWORK MAGAZINE 51
2
1 10Gbit/sec Ethernet that’s more
mature and comparable in price per
port to 1Gbit/sec Ethernet. A 10Gbit/
sec backbone would be hard to
saturate in the foreseeable future
That wireless switches had been
mainstream when standalone
access points were deployed. Had it
been available, a different design
approach might have been taken
»wishlist:::
Is your enterprise making innovative use of a network-
ing technology or service that you’d like us to write
about? Contact Jim Carr, an Aptos, CA-based freelance
business and technology writer, at jecarr13@charter.net.
lessons learned
TIPS FOR
DEPLOYING
A GIGABIT
ETHERNET
BACKBONE
WITH CWDM
1) Always make network monitoring a priority. Wellmont lost a
redundant core switch and didn’t figure out what went wrong for
about a week. 2) Always purchase more bandwidth than you
think you need today. You’ll use it sooner than later. 3) Documen-
tation is key on the day of the switchover. 4) Standardizing on a
single network vendor in the enterprise simplifies implementa-
tion. 5) Design, test, and prove your solution in a lab environment.