Application Service Providers
If your hard disk is packed to bursting point, the IT department is far too busy to fix your email problems, and your business can’t afford to buy the tool that you’d like to develop the company website, then it’s time to think about using an application service provider (ASP). Rather than installing software on each machine or server within your organization, you rent applications from the ASP, which provides remote access to the software and manages the hardware required to run the applications.
There are a lot of advantages to this approach. The havoc caused by viruses makes the idea of outsourcing your email and office suite services an attractive option. It also gives you more flexibility – you pay for applications as and when you need them, rather than investing in a lot of costly software which you’re then tied to for years. Not having to worry about upgrading to the latest version of your office suite or about battling with the complexities of managing an email system, leaves business with more time. Time to focus on what they do best.
However, there are some potential pitfalls. To use applications remotely requires a lot of bandwidth, which is only really available from a broadband connection or a leased line to the ASP itself. It is also important to ensure that the ASP will be able to provide a secure, reliable service which will be available whenever you need it.
Providing applications and storage space for vast numbers of users requires some powerful technology on the part of the ASP. This includes security controls and data storage as well as providing the physical links to customers. For the most part, ASPs don't own the data centers that store the information. Instead, they lease space from data storage specialists. In this way, they can be confident of meeting customers' increasing storage requirements by buying more space as it's needed.
There's a wide variety of applications available for use via ASPs. Office suite applications and email services are two of the most generic applications available through ASPs. Large, complex business applications such as enterprise resource planning tools like SAP are another popular candidate for delivery through an ASP. Other business services, such as payroll and accounting systems are also available. This is particularly beneficial to small businesses which are likely to grow quickly and don't want to deal with the problems caused by outgrowing their existing system and having to move to a high-end package. ASPs also offer a means of using specialist tools that would otherwise prove prohibitively expensive. Small businesses have the opportunity to use such tools for short periods of time as and when they need them, rather than having to buy the software as a permanent investment.
Network Communications
1 The application layer is the only part of a communications process that a user sees, and even then, the user doesn't see most of the work that the application does to prepare a message for sending over a network. The layer converts a message's data from human-readable form into bits and attaches a header identifying the sending and receiving computers.
2 The presentation layer ensures that the message is transmitted in a language that the receiving computer can interpret (often ASCII). This layer translates the language, if necessary, and then compresses and perhaps encrypts the data. It adds another header specifying the language as well as the compression and encryption schemes.
3 The session layer opens communications and has the job of keeping straight the communications among all nodes on the network. It sets boundaries (called bracketing) for the beginning and end of the message, and establishes whether the messages will be sent half-duplex, with each computer taking turns sending and receiving, or full-duplex, with both computers sending and receiving at the
same time. The details of these decisions are placed into a session header.
4 The transport layer protects the data being sent. It subdivides the data into segments, creates checksum tests - mathematical sums based on the contents of data - that can be used later to determine if the data was scrambled. It can also make backup copies of the data. The transport header identifies each segment's checksum and its position
in the message.
5 The network layer selects a route for the message. It forms data into packets, counts them, and adds a header containing the sequence of packets and the address of the receiving computer.
6 The data-link layer supervises the transmission. It confirms the checksum, then addresses and duplicates the packets. This layer keeps a copy of each packet until it receives confirmation from the next point along the route that the packet has arrived undamaged.
7 The physical layer encodes the packets into the medium that will carry them - such as an analogue signal, if the message is going across a telephone line - and sends the packets along that medium.
8 An intermediate node calculates and verifies the checksum for each packet. It may also reroute the message to avoid congestion on the network.
9 At the receiving node, the layered process that sent the message on its way is reversed. The physical layer reconverts the message into bits. The data-link layer recalculates the checksum, confirms arrival, and logs in the packets. The network layer recounts incoming packets for security and billing purposes. The transport layer recalculates the checksum and reassembles the message segments. The session layer holds the parts of the message until the message is complete and sends it to the next layer. The presentation layer expands and decrypts the message. The application layer converts the bits into readable characters, and directs the data to the correct application.
đang được dịch, vui lòng đợi..
