25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

networks in such a manner, organizations can now provide <strong>IP</strong> connectivity,<br />

quality of service, differential routing, enhanced security, <strong>and</strong> a guarantee of<br />

interoperability with other networks. Similarly, services continue to adopt <strong>IP</strong><br />

infrastructures. By doing so, these services benefit from open st<strong>and</strong>ards-based<br />

interfaces, session control functions <strong>and</strong> management, logical subscriber<br />

databases, <strong>and</strong> simplified interaction with other <strong>IP</strong>-based services <strong>and</strong><br />

applications.<br />

Two implementations that exemplify the concept of <strong>IP</strong> convergence are<br />

discussed in this part. Cell phone <strong>and</strong> public switched telephone networks<br />

traditionally have implemented individual, <strong>and</strong> often proprietary, infrastructures.<br />

However, as the need for reduced processing costs <strong>and</strong> increased scalability<br />

have arisen, telecommunication providers have begun converging these services<br />

<strong>and</strong> the networks across which the services are provided to the <strong>IP</strong> model,<br />

comprising a protocol called Voice over Internet Protocol (Vo<strong>IP</strong>). Similarly,<br />

television broadcasting companies now need the capability of reaching an<br />

ever-increasing population. Additionally, some of this population reside in remote<br />

areas where the creation of an infrastructure to provide television is not feasible.<br />

However, by implementing television networks using an <strong>IP</strong> model, access can be<br />

provided to a much larger set of subscribers. Furthermore, wireless capabilities<br />

using <strong>IP</strong> can be much more cheaply implemented, providing access to remote<br />

areas. These concepts <strong>and</strong> more make up the protocol called <strong>IP</strong> Television<br />

(<strong>IP</strong>TV).<br />

As networks <strong>and</strong> services continue to converge, more <strong>and</strong> more resources will<br />

become available through networks. Such an influx of networked data provides<br />

numerous new security exposures, inherently increasing the need for stronger,<br />

more flexible security models. Therefore, there have been many advances in<br />

user authentication, data privacy, <strong>and</strong> data integrity. This includes adapting<br />

existing technologies—<strong>and</strong> creating new ones—in the realms of not only<br />

cryptology <strong>and</strong> authentication algorithms, but also in network access control.<br />

Finally, as users <strong>and</strong> organizations become more dependent on the continually<br />

growing number of networked resources, the importance of uninterrupted access<br />

to these resources becomes paramount. To accommodate this, advanced<br />

concepts of availability, scalability, <strong>and</strong> load balancing have arisen to ensure<br />

access to resources 24 hours a day <strong>and</strong> 7 days a week. These concepts not only<br />

include redundancy to account for hardware failure, but also embrace models of<br />

workload distribution in order to ensure proper utilization of these resources.<br />

722 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!