Wednesday, November 29, 2006

Communications Equipment in the Wilderness

When trekking off into the wilderness for hunting, fishing, camping, hiking or whatever, the last thing you might think of is communications. It should be the first thing.

Communications Equipment in the Wilderness For Hunting, fishing, hiking, boating or cycling By David Leonhardt.

Communication in the wilderness is a matter of survival, as well as convenience. Before even leaving home, communications must begin. In fact, our first two communications tips do not even require equipment or gadgets.

"Make sure that somebody knows when you leave, when you expect to return (or get to your destination)," advises Chad Brown, owner of Farm & Field hunting and fishing auctions. "Provide as much information about your route as possible.

Things can happen. Rocks can fall on your head while hiking. Boats can tip over. Firearms can malfunction. Somebody needs to know that you are late in arriving...and where to send search parties to find you. In fact, this is the same advice I used to give drivers in winter weather when I was spokesperson for CAA Ontario.

The second tip is to never head into the wilderness alone. Just as one should never go swimming without a swimming buddy, nor should one go long-distance cycling or hiking, nor hunting, camping or fishing in a remote area without a buddy.

My wife's uncle took the business end of large falling branch on his skull while out in the forest, knocking him unconscious and cracking his skull down the middle. Eventually his skull will heal, but only because he had companions to get him into town. Otherwise, he might still not be found.

Here is another report, this one from the New York State Department of Environmental Conservation about a fall from a tree stand: "The subject had no communications equipment with him. No phone or radio. If the subject had left word of where he would be and approximate hour of return, a response may have been quicker. Cause of Death: The subject suffered a broken shoulder, multiple broken ribs on one side, a punctured lung, and a punctured spleen."

Effecitive Client Communications

Your best prospecting resource is your database of past clients. However, do your communications with your past clients teach them to remember you or ignore you?
Whether you know it or not, your past clients are your best source of new clients. Finding a new client is time consuming and expensive. If you can find a way to increase your pipeline without the time commitment and expense of prospecting, would you be willing to implement it? Of course, you would.

Taking the time and effort to keep in contact with past clients will grow your business through add-on sales, replacement sales, and referrals of qualified prospects.

Often salespeople complain that keeping in touch with past clients takes too much time, effort, and money. Considering the return on investment, this really is not true—at least for most of us. The key is finding a way to communicate that is time efficient, relatively inexpensive, and effective.

Studies indicate that in order to keep your name at the top of your past customer’s mind, you need to “touch” your customer a minimum of 14 times per year—more if at all possible.

What is a “touch?” A touch is any direct communication—email, telephone call, snail mail, postcard, holiday card, in-person meeting, etc. If you are communicating directly with the client, you are touching them. What is the most effective way to touch your past clients? Studies show that there is not a “best” way to touch the client, but there is a most effective combination of ways.

In order to most effectively keep in touch with past clients, you need to enlist a number of communication formats. Sending 14 emails, a year is better than nothing, but it is not the best way. Neither would be sending 14 snail mail pieces. Or making 14 phone calls. The most effective client communication campaigns use several of these communication formats. For instance, setting a marketing calendar to send 4 postcards per year, 6 emails, 2 snail mail letters, one phone call, and one holiday card during the course of the year. This schedule allows you touch your customer about every 3 1/2 weeks. So, what do you send? What do you say 14 times during the course of the year? That is actually the difficult aspect of past client marketing. When you communicate with a past client, the fact that you have something in front of a previous customer is not a good thing, in and of itself. Whether or not your communication campaign is effective will depend on what you are communicating. If you send junk, just to send something, your customer will quickly learn to ignore your communications. On the other hand, if your communications offer something of value, you’ll train your client to pay attention to you.

Which would you rather have: a client that ignores you, or one that pays attention to you?I assume you would rather have a client that pays attention to you. To train your clients to pay attention, and, therefore, to keep you at the top of their mind, you must figure out how to send them communications that give them value. Can you offer a special for them or someone they refer to you? Can you provide them an annual or semi-annual update on their purchase? Can you send or email them articles of interest that relate to their purchase?What you send does not have to be large or costly—it just needs to be of interest to the client. Do not just send something to send it. Think about what you are sending and what it will—or will not—communicate about you and your business. If you want your clients to think of you and not ignore you, then take the time and the effort to make sure you are sending something of value. If you are not sure it has valueScience Articles, it probably does not.

What Is A Data Center

Why is it important to have a data center for that matter? A data center is a facility that will house a good amount of the electronic equipment (and information) that a business or group has and needs. There will be computers and communication elements in this area as well as a number of other vital components to keeping the business running smoothly. What is essential about a data center is security and maintenance.

Companies may have more than one data center as well. Most mid size or higher companies will have at least one data center though. There are many types of data that can be stored in these centers. For example, a financial institution will maintain their clients accounts, numbers and activities in the data center. Businesses will keep client names, accounts, and projects in a data center as well. Because the data a business has is so very important to their existence and their performance, turning to a data center is an excellent option for this type of storage need.

Inside of a data center you are likely to find various types of computers, internet servers as well as many other items. To keep these items safe, data centers are often built and secured physically as well as logistically to protect them. Security is extremely high. They can be one of the safest environments in the city. The main job of a data center is to maintain and run applications to allow businesses to access and manage their files effectively.

There are many information portals now devoted to the subject and we recommend reading about it at one of these. Try googling for “data center info” and you will be surprised by the abundance of information on the subject. Alternatively you may try looking on Yahoo, MSN or even a decent directory site, all are good sources of this information

Tuesday, November 28, 2006

Medical Billing Control with Computer Aided Coding

The average practice submits half of its codes wrong, while some practices rarely exceed more than one code right out of every five codes. Inexact and inconsistent coding increases the risks of undercharging, overcharging, and post-payment audit. This article outlines evolution of coding from individualistic art towards disciplined and systematic process.

It is convenient to review the role of coding in the context of the entire claim processing cycle, which consists of patient appointment scheduling, preauthorization, patient encounter note creation, charge generation, claim scrubbing, claim submission to payer, and followup, which in turn includes denial or underpayment identification, payment reconciliation, and appeal management. The importance of thorough knowledge and correct application of coding rules at the charge generation stage of claim processing cycle are well known and have been frequently discussed. Less obvious but no less important is the ability to make correct interpretations of the same rules at the claim followup stage during denial or underpayment analysis and upon receiving payment and explanation of benefits.

Coding is difficult because of a four-dimensional complexity. First, the sheer volume and intricacy of coding rules make it difficult to select the right procedure code, correct modifier, and necessary diagnosis code for the given medical note. For instance, a claim will get denied if you charged for two CPT codes but provided an ICD-9 code that shows medical necessity for one CPT code only. Next, the payer-specific modifications exacerbate the complexity of coding, creating the need to code or process differently the same procedures depending on the payer. For example, some payers require medical notes attached to some CPT codes in addition to standard ICD-9 codes. Third, the codes and regulations change over time, necessitating continuous coding education and re-education. Finally, charge generation and claim followup are disconnected in space and time and often performed by different people, adding to confusion and costs of the claim processing cycle.

Only experienced coders can handle such complexity but experience too often turns into handicap as, in the absence of a reliable self-correcting process, the coder or the followup person may repeat the same mistake over and over. Hence ad hoc coding is error-prone and expensive. Paper superbill-driven coding improves upon traditional coding because it allows fewer errors and eliminates some of the costs. Computer aided coding with integrated superbill completes the transformation of coding from individualistic art towards disciplined and systematic process and is the most reliable and least expensive solution.

Traditional Coding

Since the practice owner is ultimately responsible for coding quality, it behooves the physician to manage personally the coding process. But traditionally, in the absence of systematic practice management, the physician looked for a coding approach to avoid the burden of coding. Such an approach to coding is error-prone and expensive. According to the Healthcare Financial Management Association's "Tip Sheet: Medical Claims Denial Management," the average error rate for CPT coding is 45%-55%. Some specialties (e.g., interventional radiologists) have trouble exceeding even 18% of correct coding, according to the March 2003 issue of "Healthcare Biller: The Communication Network for America's Health Care Billers," a monthly newsletter from Aspen Publishing.

Traditional coding involves the doctor, data entry personnel, and certified coder. The doctor dictates, types, or handwrites descriptions of diagnosis and procedures, without listing actual codes. The data entry personnel enter codes based on reading doctor's descriptions, and the certified coder supervises and audits the quality of coding by the data entry personnel.

Traditional coding process is error-prone because the certified coder does not audit 100% of entered codes and because such process does not have a vehicle for context maintenance between the charge creation and claim followup stages. The errors may become especially expensive upon post payment audit of the charges by the insurance company. This process is also expensive because multiple people are involved in the coding process and because the errors, if discovered at all, will be discovered only downstream, rising the costs of error correction.

Paper Superbill-driven Coding

Pre-compiled superbill-driven coding process places the doctor in control of coding, ties together claim creation and followup stages, and avoids many shortcomings of traditional coding. Such a process delivers two-fold advantage of lower cost and improved communication. First, the doctor codes at the end of patient encounter without involving data entry personnel in the middle. Second, the paper superbill serves the role of a formal vehicle for coding information communication between charge creation and claim followup stages. Additionally, a pre-compiled superbill improves coding consistency across the doctors within the same practice.

Superbill creation process has four stages:

1. List the codes used most often first. Use CPT frequency report.
2. List the diagnosis codes
3. Leave room for ancillary services
4. Include patient's information

Along with the advantages over the traditional coding process, the paper-based superbill still has four shortcomings. First, the data must be re-entered into the system from the paper superbill, introducing potential for errors. Next, the superbill must be reviewed periodically to adjust for changes in practice operations. Worse, it is difficult to keep up with changes in coding regulations, necessary modifiers, and bundling decisions that differ across various payers. Finally, the paper superbill contributes nothing to upfront coding error identification and correction, delaying potential error identification and resolution to post-submission, or worse, post-payment phases. Obviously, the later in the process the error is identified, the more expensive is its correction.

Computer Aided Coding with Integrated Superbill

Computerization and integration overcome most of the problems of paper superbills, eliminating duplicate data entry, automating code review and adjustment for frequency, practice operations, and payer idiosyncrasies, and shifting much of the error identification and correction from post-payment stage to claim pre-submission stage.

Computer aided coding with integrated superbill offers multiple advantages:

1. Dynamic - Adjusts for changes in practice operations and payer specifics. For instance, adds automated alert to satisfy unique payer demands, such as requests for paid drug invoices in addition to injection CPT code and J code for supplies.
2. Precise - Matches codes to EMR and alerts in real time about potential coding errors, such as confusing modifiers 59, 76, 77, and 91 for repeat procedure or test, or not coding the ICD-9 code to the highest level of possible digits in spite of specific diagnostic available in EMR.
3. Defensive - Allows for real-time profiling of coding patterns to alert about potential audit flag.
4. Reliable - Facilitates end-of-day juxtaposition of visits with charges, avoiding unpaid visits.
5. Inexpensive - The doctor can use it directly, eliminating extra data entry step and associated costs.

In summary, coding is a mission-critical responsibility of practice owner. Computer aided coding with integrated superbill places the doctor in control and enables dynamic, precise, reliable, consistent, defensive, and inexpensive coding process. Superbill digitization and integration overcome the four-dimensional coding complexity, tie it to EMR, patient scheduling, and billing (i.e., to the entire spectrum of practice management functions), and require powerful Vericle-like computing platforms.

You have Purchased A Computer Now What

Buying a computer is an investment. The best return on your investment will be in finding an Internet Service Provider (ISP) that will accommodate your needs. Choosing an ISP can be overwhelming, as they all offer a number of Internet access arrangements. It is important to choose one that best suits your needs.

What is an ISP and what do they do? An Internet Service Provider allows you to connect to the Internet with varying degrees of speed or data transfer rate, usually for a flat fee. The data transfer rate is measured in kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps).

Terms you need to know, describing units of data, when choosing an ISP:

  • Bit = A binary digit used as the basic unit of information storage in digital computing.
  • Byte = 8 consecutive bits.
  • Kilobit or Kb = 1,000 bits
  • Kilobyte or KB = 1024 bytes
  • Megabit or Mb = 1,000,000 bits
  • Megabyte or MB = 1,048,576 bytes sometimes called one million bytes by the IEC (International Electro Technical Commission)
  • Gigabit or Gb = 1,000,000,000 (billion) bits
  • Gigabyte or GB = 1,073,741,824 bytes. The IEC define a GB equal to 1,000,000,000 (billion) bytes
  • BPS or bps = bits per second. A rate that shows how fast binary digits can be sent through a channel.

For clarity, the term kilobits and megabits are used when referring to network bandwidth. The term megabytes is used when referring to disk space or the size of an electronic file.

The more Kbps (kilobits per second) or (Mbps megabits per second) transferred by your ISP the faster you will download pages (text), and other material such as email, photos, music, and videos from the Internet. So, if an ISP provider tries to sell you their program (usually phone companies), be aware that a data transfer speed of 512 Kbps with a maximum of 700 Kbps is less than 1 MB of data transfer speed. If you want to download family photos, your computer is going to be slow.

Download guide:

  • You can view approximately 20 pages on the Internet for each MB of download.
  • An average four-minute MP3 (music file) is approximately 4MB.
  • A 5-minute video or movie trailer can be 30 MB.

Connection to the Internet from slowest to fastest:

  • POTS (plain old telephone service)
  • ISDN
  • DSL
  • Frame Relay
  • Cable Modem
  • Fractional T1, T3.

The following key features that are important in choosing an ISP:

  • Price and billing
  • Performance
  • Help and installation
  • Security and service

History of the Computer - Codes for Data Transfer Part 3 of 3

DATA TRANSMISSION CODES

We have mentioned teletype machines, these were the backbone of operator communication with the computer, but were also used for remote input of data. A phone line could be used to link a storeman in the warehouse with the main computer using a modem (Modulator-Demodulator) in much the same way you dial-up to your ISP (Internet Service Provider).

These modems typically worked at 110 Baud, the standard speed of the teletype, and sent or received one character at a time. They modulated the carrier on the telephone line in a string of bits in serial pattern (one after the other) for the code, usually ASCII, complete with start bit, stop bits (1 or 2) and negative or positive parity bit. Other codes were, for example, SOH (Start of Header), STX (Start of Text), ETX (End of Text), used to identify the following or previous characters. Of course these 'control' characters had to be correctly decoded and used to control the data flow.

At the computer data terminal this serial data was read into a shift register, gated by the control characters, until all bits were received, then read out from the register in parallel (all at once) to be stored in memory. At the warehouse the data was sent from the modem to the teletypewriter for printing.

Little has changed here, except the speed of operation. The codes are much the same, only upgraded for new types of equipment. As new technology is introduced, new access and control codes will be required, but the basic data remains the same.

DISK CODES

Magnetic disks and, later optical disks use similar recording techniques to magnetic tape, with one major difference - they record in serial format. The blocks on the disk incorporate an address code as well as the data and other codes we have mentioned, as the data on a disk is randomly accessible. We can specify an address and read the data from it. The same applies to an optical disk, which is used mainly for its capacity and portability. The data codes are of standard format.

PRINTER CODES

Printer codes used were a standard set of ASCII characters, and were restricted to the character set etched on the print drum, or band in use. A line printer was used, and one line of data was sent at a time, to be held in the print buffer and read out as required when the appropriate character was under the hammer. Once again control characters such as line feed and form feed were used.

Matrix printers were used for small scale print jobs usually accompanying data terminals away from the central computer. Once again the character set was restricted to the basic ASCII codes, and Control codes with printers from different manufacturers able to be used due to the standard codes (Interfaces were a different matter!)

Contrast this with the laser or inkjet printer today, Virtually any font and character set, color and pictures too. Transmission by Network, USB, Parallel or Serial port, or Wireless. Once again mainly control code differences to suit the medium and different handling for serial or parallel.

Filling in the Data Leaks (Protecting your Personal Stuff)

Living Digitized
The electronic flow of data permeates the fibers of every business. Try to make a transaction without accessing the binary realm - bets are that even the cash register used to ring your favorite morning beverage is accessing electronic data. Today, business survival and success depends on immediate connectivity and data communication.

Living in a digitized world has altered modes of business communication as well. Shooting a quick email off with a pricing quote or sending an answer to a email query are just as commonplace as a client call. Email has evolved into the standard mass communications tool, whether it be message communications or as a document courier. According to Pew Internet Research a mere decade ago, just 15% of adults in the US went online, today that number has jumped to 63%(1).

"On a typical day at the end of 2004, some 70 million American adults logged onto the internet to use email, get news, access government information, check out health and medical information, participate in auctions, book travel reservations, research their genealogy, gamble, seek out romantic partners and engage in countless other activities. That represents a 37% increase from the 52 million adults who were online on an average day in 2000".(2)

The statistics show that the internet and email flood our very existence. A business enterprise can’t be effective or successful without accommodating its wired clientele. Email is now such an integral part of the work world that a USA Today survey found that given a choice between giving up morning coffee or the ability to use the internet at work, 52% chose coffee(3).

Your Unintentional Data Flow
It’s inevitable that some of yours and/or your company’s data will be transmitted outside the network or personal system. Sharing unprotected electronic documents will ultimately cost you and your business By putting your intellectual property at risk. Think of all the man-hours of work that go into making your enterprise a success: proprietary designs, financial statements, competitive research, and other sensitive documents are all at risk when sent out as an unprotected email attachment.

Leakage of confidential intellectual property can seriously threaten the viability of an incubating contract lead. Unfortunately, email and documents meant for a select group can easily and quickly enter the public sphere. Once released over email, the transmitting flood of data which was once between company and client can fall into the hands of competitors, sometimes even forwarded by potential clients to competitors. Do you want to give your competitors shortcuts to your clientele? Each unsupervised electronic transmittal will poke hole upon hole in a company’s financial fortification.

Who's Looking at your "Personal Stuff?"
Who's protecting your small business enterprise’s best interests against these in unintentional information leaks? Certainly not the government, when US President, George W. Bush voiced his bias against email in his address to the American Society of Newspaper Editors, saying "I don't email, however. And there's a reason. I don't want you reading my personal stuff."(4) Nor does Great Britain’s Prime Minister, Tony Blair and the rest of number 10 Downing Street trust the mass communication tool, instead opting to use sticky notes(5).

These are the drastic, archaic steps backwards those zealously phobic of the digital communications era have adopted. Do you see your business forgoing email for sticky notes? The likely answer is no, as your customers won’t be transitioning to the sticky note 2.0 platform.

A small business enterprise shouldn’t have to succumb to the paranoia of the few and uneducated. A business is most profitable when its channels of communication to its clients are open and accessible. Yet having these channels accessible also opens the flood gates of a small business' proprietary information. Domestically, intellectual property theft was, according to the FBI, on the increase. In 2005, unauthorized distribution of digital information cost the average company $355,552, a two-fold increase from the 2004 rate of $168,529(6) With the growth of intellectual property theft, the government has allocated some resources to this issue.

In 2004 there were "with the support of Congress, the Computer Crime and Intellectual Property Section [(CCIPS)] has grown from 22 attorneys to more than 35 attorneys over the past two years. Created in 1991, CCIPS attorneys prosecute intellectual property cases…[they also] develop relationships with international law enforcement agencies and foreign prosecutors to strengthen the global response to intellectual property theft. (7)" A total of 35 dedicated attorneys in the CCIPS in Washington, D.C. are defending U.S. intellectual property rights. Are these resources enough ample resources for the 17.6 million sole proprietorships in the United States(8)? When looking at the growth of dollars lost through intellectual property loss accelerating every year, using government as the sole solution does not seem to be the answer.

Preventing those leaks
Each time a small business entity shares confidential information such as price lists, legal documents, plans and proposals - its reputation and competitive advantage is at stake. The impact associated with a private email or attachment being accidentally or intentionally forwarded can be colossal.

From sole proprietorships to ventures of a hundred employees, the small business enterprise must be able to access the same resources of large scale enterprises. The power to share work without relinquishing creative and innovative control is an invaluable tool. Taking preventative steps by using security software allows small business enterprises to protect their right to profit from their own intellectual property. Securing files is the best means to plugging information leaks

Protection of intellectual property is imperative for success in business. Individuals and small companies need to protect their email and digital assets with the same confidence shared by their larger enterprise business counterparts. Becoming actively aware of your digital assets and its whereabouts allows the individual and small business enterprise to managing the flow of your digital data in a more productive manner than President Bush or Prime Minister Blair’s sticky note solution for their "personal stuff."

The Basics On T1 Line Solutions For Small Business

T1 Lines have been the primary source of mission critical bandwidth for companies of all sizes for nearly 20 years. With so much history, a basic understanding of the T1 line should be common knowledge among business owners who are looking for reliable bandwidth for Internet access, data communications, or multiple telephone lines. However, it was not until the late 1990s that the market for T1 lines became very competitive and prices began falling to more reasonable levels, causing the demand to rise sharply among small and medium sized businesses. Even today most small business owners and managers still do not know how a standard T1 line works or what it is capable of providing.

Each section below includes a description a T1 line solution and an example of what problems you could solve for your business with the solution described. There are 7 basic types of T1's explained, which include Full T1, Fractional, Voice (standard), PRI, Integrated Voice and Data, Voice Over IP(hosted), and Point-to-Point T1's.

Full T1 Line:

"Full T1 Line" is a term typically used to describe a circuit that provides 1.5 megabits per second of high speed Internet access, which is the most common type of T1. A Full T1 can also be used to carry telephone lines and/or VoIP calls, both of which are covered within the "Voice”, “PRI" and Voice Over IP sections here. Nearly all office-based and modern retail businesses require some type of Internet access in order to perform their daily operations, and many have mission critical Internet needs that allow them to continue business operations at all. There are many choices to fulfill this need for Internet access, including Dial-up connections, ISDN, DSL, Cable, Wireless applications, a T1 Line, or something larger like a DS3 or OC-3 (far less common due to high cost).

A T1 Line consists of 24 channels that transmit data at 64Kbps each, therefore giving a Full T1 Line the capacity to transmit 1.54Mbps of data synchronously (upstream and downstream). Using today's standard email applications and common Internet searching, this amount of bandwidth could support anywhere from 1 to approximately 75 users depending on their needs, preferences, and the company's budget. Most commonly Full T1 Lines are used in offices with 5 to 50 employees. A T1 circuit provides the most reliable bandwidth available when leased from a high quality T1 Provider, which is why businesses are willing to pay more for a T1 than for other services like DSL or Cable. In some applications, a T1 can save money for a company who uses a less reliable bandwidth connection. Since multiple services can be combined on a single T1, cost efficient solutions are often available if you know what service to ask for (see "Integrated T1" below) and which providers offer those services in your area.

Internet T1 pricing starts at approximately $400 per month, but can cost more than $1000 per month if the location of the installation requires a long loop to connect to the network of your local phone company to the network of the T1 provider. This is usually only the case in very small towns or rural areas where facilities are less dense. Most metropolitan areas have many choices of T1 providers, at least one of which will usually be closer and cheaper than the rest. Pricing will fluctuate dramatically depending on the Provider and the location of your business, which is why it is sometimes safer and easier to use an experienced Telecom Consultant such as DS3-Bandwidth.com to guide you in finding the best solution. For example some companies that do not require much bandwidth or have a small budget might need to opt for a Fractional T1 Line.

Fractional T1 Line:

A Fractional T1 line typically describes an Internet circuit that uses a "piece" or a "fraction" of a Full T1. Fractional T1's are also used for telephone lines or even integrated T1’s, but less often then for Internet access. A Fractional T1 can be sold in nearly any fraction of a 24 channel, 1.54Mbps circuit. For example, out of the 24 channels in a Full T1 line, 12 channels might be used in a Fractional T1 to provide a 768k connection, which is half of 1.54Mbps. Other Fractional sizes include 1.1Mbps, 512k, 384k, 256, 128k, and even 64k, although the smaller sizes are very uncommon. As T1 Providers have become more competitive, prices on Full T1s have come down so much that Fractional T1s have become less cost effective. For example, a Fractional T1 of 768k carries only half of the bandwidth of a Full T1, but usually saves only 5% to 15% of the price of a Full T1. This doesn't make much sense in applications where only 1 or 2 T1 lines are needed, unless the budget is extremely tight. However, this can add up to significant savings when using hundreds of T1's across a large company's multi-location VPN or frame relay network.

Voice T1:

Voice and PRI T1 lines are extremely common among businesses and call centers with multiple telephone lines and large call volumes. They are far less expensive and more efficient than installing dozens of POTS (plain old telephone service) lines. Each of the 24 channels on a T1 line is versatile, allowing it to be used for either bandwidth or for a single telephone line. So, a pure Voice T1 line will have 24 telephone lines with reliable service, good reception, good long distance rates (depending on the carrier), and a wide selection of calling features. Voice T1 lines use digital or analog transmission, so it is an excellent choice in situations where a company's equipment does not allow for the use of a PRI line, which is always digital.

PRI T1:

A PRI (Primary Rate Interface) line is somewhat different and more popular than a standard Voice T1 because it is true "digital trunking", which allows for even more advanced calling features. A PRI line provides 23 telephone lines per T1, because the 24th channel is used to carry useful data for signaling and other features like special caller ID information called ANI (Automatic Number Identification). Since the transmission is digital, the quality of a telephone connection over a PRI line is unsurpassed, providing crystal clear reception that is noticeable to the user. The use of DID (Digital Inward Dial) numbers, and calling features like hunting and rolling, allow you to use 23 digital telephone lines to provide service to potentially 30 to 40 employees, depending on how often they will need to use their phone. Instead of guessing on the number of DID's to put on a PRI line, it's important to figure out the maximum number of simultaneous calls that could be placed at any given time. Having too few telephone lines causes costs more in a loss of productivity than it would cost to simply add more phone lines to keep your employees busy. This is why it is important to figure out the proper balance of telephone lines vs. DID numbers. The cost of a PRI is also typically lower than other forms of telephone service (except Voice Over IP in some applications), with actual pricing depending on the Provider of the service and your business location. Between the features, price, and quality of a PRI, it is the primary choice for businesses large enough to take advantage of it's multiline functionality and benefits.

Integrated T1 Line:

An Integrated T1 Line is one of the most popular T1 solutions for small businesses because it provides local telephone service, long distance, and bandwidth all on a single connection and a single bill. The consolidation of these services with one company is more convenient and more cost effective than purchasing them from separate providers. Just as a Fractional T1 line only turns on a portion of a T1 Line for Internet access, special equipment allows some of the T1 channels to be allocated for telephone lines, while others are used for data transmission and Internet access. For example, a Full Integrated T1 line could be divided in half using special equipment, providing 12 high quality telephone lines and using the other 12 channels for 768k of bandwidth. Fractional Integrated T1 lines are also available, but most companies have minimum levels such as 4 phone lines and 512k of Internet access, which only uses 12 channels combined. Many offers even include "blocks" of free long distance, usually based on the number of telephone lines being installed. A typical offer might include 6 phone lines(6 channels), 512k (8 channels), and 600 minutes of free LD each month (100 per telephone line). This entire circuit could have a total cost as low as $400 to $500 per month, which is a tremendous "all inclusive" bargain for small businesses. This is a perfect total solution for literally thousands, if not millions, of small companies across the nation. One thing to keep in mind is that not all providers can offer Integrated T1 Lines, so the ones that do typically focus a great deal of their sales efforts on this service.

Voice Over IP (VoIP):

Voice Over IP is considered to be the “next big thing” in the telecommunications industry. It has already begun the powerful growth that has been expected for many years by experts and early adopters. Although VoIP services can and will be used across all types of high bandwidth connections, the business class services are primarily being offered on T1 lines. This is extremely important in the world of bandwidth and telecommunications, because it again validates the T1 line as the most cost efficient delivery method of the most reliable bandwidth. In other words, a company cannot afford to trust a volatile Internet connection like DSL or Cable to carry VOIP because they risk losing 100% of their communication capabilities.

Voice over IP is revolutionizing telecommunications because it is cheaper for the user and the infrastructure requirements are better for the providers. Rather than requiring a telephone line and all of the switching on the back end to complete a call, VoIP uses equipment to break down a telephone call into packets of data, then sends those packets across the internet to be decoded where the receiver answers the call. This dramatically reduces the bandwidth that is necessary to complete a call because it eliminates “dead” times when no one is speaking into the receiver. Since the calls also bypass the normal telephone switching network, they also escape FCC charges (for now). Every major Provider and most small providers are starting to offer residential and business class VoIP services. If you're in the market for a business VoIP solution try the free consulting services of Business-VoIP-Solution.com.

Point to Point T1:

Point to point T1 lines do not provide T1 Internet access or telephone lines, but act as a “transport” for either or both. A point to point T1, often referred to as a "P2P", provides a very secure and reliable connection, usually from a corporate office to any number of satellite offices. Although a P2P does not actually "provide" Internet access or phone lines, corporations use P2P T1s to share these services. For example, a company’s home office in Los Angeles might have hundreds of telephone lines and huge Internet access pipes installed at one location to get the best available rates. This company can use a P2P T1 to transmit any combination of telephone lines, Internet access, and data between offices to share software systems, and provide in-office dialing from locations across the country! The variables are endless because there are no restrictions on how a point to point T1 can be used, assuming you have the right equipment and a source at one end of the P2P. This can be a great way to save money, because a satellite or branch office might have to pay huge prices to have telephone and bandwidth services installed directly, whereas the home office can get better rates because of bulk buying and location. Although it can sometimes be used to save money, a P2P network is usually not very cost efficient compared to other options. Frame Relay and VPN (Virtual Private Network) are other options to consider depending on a company's needs and business applications. The primary advantage of a P2P line is that it is truly private, making it top choice for those demanding a circuit with a dedicated connection to only their business, therefore offering the highest security available.

There is no question that the same type of T1 Line that was being used back in 1984 by the US Government and world leading technology companies like IBM is still the best source of reliable bandwidth for all sizes of companies today. Despite the competition of newer technologies, price reductions on T1’s plus the fact that these circuits are so trustworthy have allowed the number of T1 Lines being used in the United States to continue to grow at a rate of 15% per year, even in recent years. Since there are so many uses for the T1 Line, including the explosion of new technologies like VoIP, these circuits are poised to remain a key ingredient to the success of businesses who rely on Internet, Telecommunications, and Data Connectivity for years to come.

Useful Information About ADSL

The modern age is witnessing the emergence of several innovative communication technologies. ADSL is one such invention. ADSL stands for Asymmetric Digital Subscriber Line, and it helps to convert existing telephone lines into access paths for multimedia and high-speed data communications. Today, ADSL has enabled the transformation of existing public information networks from voice, text and low-resolution graphics to a powerful tool for transmitting multimedia and full-motion video. Not surprisingly, ADSL has unleashed a big revolution in modern homes.

With ADSL, subscribers can now get up to 6 Mbps of data in one direction, or about 832 kbps or more data in both directions. These rates of expansion enable the expansion of existing access capacity by a factor of about 50 or more. And that too, without the need for new cabling. The ADSL circuit uses an ADSL modem on each end of the twisted-pair telephone line. Furthermore, it creates three information channels to function -- a high-speed downstream channel, a medium-speed duplex channel, and a POTS (Plain Old Telephone Service) or an ISDN channel. Depending on the system, each of these channels can be further submultiplexed to form multiple lower-rate channels. High-speed channels range from 1.5 to 6.1 Mbps, while the duplex rates range varies from 16 to 832 kbps.

The coming years are about to witness a tremendous enhancement of the ADSL. This development will primarily come about as telephone companies and other service providers enter new markets and deliver information in several heavy formats like multimedia and video. Although communication experts are of the opinion that the new broadband cabling will take decades to reach all prospective subscribers, there are chances that the process may succeed only when more and more subscribers are reached in the initial first few years. ADSL will make these new markets viable for telecom companies and application suppliers by taking television, videos, movies, corporate LANs, remote CD-ROMs and the Internet.

If You Need A Method For Backing Up Your Computer You Should Consider A CD-ROM

Computers today are used in every part of life. They are used for communication, work, play and even to buy food. Therefore, when you lose a computer or even just a file from your computer, it is like losing your best friend. You can't back up or replace a best friend, but you can backup files, or your entire computer if desired.

Several back up methods exist. Some computers will automatically back themselves up; you just need to find the folder where the back up is stored. If your computer does not have this function, or you are not sure if the function exists or is working, manually back up your files. For example, after creating an important Microsoft Word document, save it at least twice in at least two different locations.

If however, you lose your entire hard drive, it won't matter how many times you have saved the same document. To avoid this dilemma, save your files on something other than the computer's hard drive. Floppy disks are not commonly used, but they will work for small files. Be ware that floppy disks can be unreliable and often crash just as your computer did.

USB Drives are becoming more popular as a back up tool. A USB drive is a small device that holds large amounts of information. It works like a floppy disk in that you can place files, delete files or move files around within the USB. All recent computers have USB ports that should be able to read any USB device.

CD ROMs are also a popular way to back up your files. A CD ROM looks just like a music CD you would buy in a store, but can hold up to 700 MB of information. This allows for large files or a large amount of small files to be stored on this disk. Once you put information onto a CD ROM, you can not add files or change the files on the disk. This can be one way of ensuring nobody else tampers with your work, but can also be frustrating when you would like to back up a newer version of your work. In this case, a CD RW disk may suit you better. RW stands for re writable disk. On this kind of disk you can add, delete and rewrite files until the disk is full. When using the rewrite option, be sure you do not accidentally rewrite something you wanted to keep the back up of.

Both CD options can be done on most home computers. You will need a CD (possibly two in case the first one ends up as practice!), and a CD burner. Almost all computers sold today, or sold recently, are equipped with a basic CD burner and burning software that is generally simple to use. If your computer is not equipped with these devices, you may purchase a basic CD burner and software for a relatively inexpensive price. Once you have created your back up CD, take care to keep it in a cool dry place where it will be safe from damage.

Seven Layers of ISO OSI Model

The ISO OSI model are explained below. The seven layers of the OSI model are:

  • Application
  • Presentation
  • Session
  • Transport
  • Network
  • Antiqua">Data Link
  • Physical

1 Application layer:
This layer provides a means for the user to access information on the network through an application. Many user applications that need to communicate over the network interact with the Application layer protocol directly. The user applications are not part of OSI Application layer, use the networking services offered by the networking protocol suite. Application layer functions typically include identifying communication partners, and determining availability of required resources. Some examples of application layer implementations include Telnet, File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP).

2 Presentation layer:
Presentation layer converts local host computer data representations into a standard network format for transmission on the network. On the receiving side, it changes the network format into the appropriate host computer's format so that data can be utilized independent of the host computer. ASCII and EBCDIC conversions, cryptography, and the like are handled here. Examples of Presentation layer coding and conversion schemes include common data representation formats, conversion of character representation formats, common data compression schemes, and common data encryption schemes.

Presentation layer implementations are not typically associated with a particular protocol stack. Some well-known standards for video include QuickTime and Motion Picture Experts Group (MPEG). QuickTime is an Apple Computer specification for video and audio, and MPEG is a standard for video compression and coding.

3. Session layer:
The session layer establishes, manages, and terminates communication sessions. Communication sessions consist of service requests and service responses that occur between applications located in different network devices. These requests and responses are coordinated by protocols implemented at the session layer. Some examples of session-layer implementations include AppleTalk's Zone Information Protocol (ZIP), and Decent Phase Session Control Protocol (SCP).

4.Transport layer:
Transport layer is responsible for providing reliable service between the hosts. Upper layer datagrams are broken down into manageable datagrams and then appropriate header information (such as sequence number, port number, etc.) is added to the datagram before passing it on to the Network layer. Two frequently used transport protocols are the TCP (Transmission Control Protocol) and the UDP (User Datagram Protocol).

Important features of Transport layer:

  • Transport layer ensures reliable service.
  • Breaks the message (from sessions layer) into smaller datagrams, and appends appropriate unit header information.
  • Responsible for communicating with the Session layer

Important features of TCP/UDP:

  • TCP/IP widely used protocol for Transport/Network layers
  • TCP: (Transport Control Protocol) TCP ensures that a packet has reached its intended destination by using an acknowledgement. If not, it retransmits the lost messages. Hence, TCP is called a connection oriented protocol.
  • UDP (Universal Data gram Protocol): UDP simply transmits packets over the internet. It does not wait for an acknowledgement. It is the responsibility of upper layer protocols to ensure that the information had reached the intended partner(s). Hence, UDP is often called connectionless protocol.
  • Application programs that do not need connection-oriented protocol generally use UDP.

5. Network layer:
Network layer is responsible for the routing of packets through the entire network. The layer uses logical addressing for this purpose. Note that the physical address (like MAC address) keeps changing from hop to hop when a packet travels from source to destination. As a result, an address that doesn't change is required to ensure continuity between hops. This is nothing but logical address. For IP networks, IP address is the logical address; and for Novell network, IPX address is the logical address, and so on. This layer also provides for congestion control, and accounting information for the network. IP (Internet Protocol) is an example of a network layer protocol.

6. Data link layer:
Data link layer provides delivery of information frames between communicating partners. This layer is responsible for flow regulation, error detection and correction, and framing of bits for transmission. The network data frame is made up of checksum, source address, destination address, and the data itself. The largest frame size that can be sent is known as the maximum transmission Unit (MTU).

Important features of Data link layer:

  • Assembles bits into frames, making them ready for transmission over the network.
  • Provides error detection, and correction to transmitted frames. If the checksum is not correct, it asks for retransmission. (Send a control message).

* Consists of two sub layers:

1. Logical Link Control (LLC): Defines how data is transferred over the cable and provides data link service to the higher layers.

2. Medium Access Control (MAC): Controls media access by regulating the communicating nodes using pre-defined set of rules. (i.e. Token passing, Ethernet [CSMA/CD] all have MAC sub-layer protocol).

Different Data link layer protocols define different network and protocol characteristics, including physical addressing, network topology, error notification, sequencing of frames, and flow control. Physical addressing (as opposed to logical addressing) defines how devices are addressed at the data link layer. The protocols used in Data link layer are SLIP, PPP, and CSLP.

7. Physical layer:
This is the bottom-most layer of the OSI model. The Physical layer handles the bit-level communications across the physical medium. The physical medium could be made up of wired electrical signals, or light, or radio (wireless) signals. Physical layer specifications define characteristics such as media, data rates, maximum transmission distances, and physical connectors.
Some of the important standards that deal with physical layer specifications are:
RS-232(for serial communication lines), X.21, EIA 232, and G730.
Physical layer and Data link layer implementations can be categorized as either LAN or WAN specifications.

Broadband Phone Voice Over Internet Telephone Made Cheap and Easy

Do you want to make cheap Internet phone calls with VoIP, but are tired of always having to use your computer and headphones, or possibly your favorite messenger to make phone calls online? Thought about using a broadband phone company but not sure what you need or even if your technical aptitude is up to par with such techie computer gadgets? You'll be surprised how easy installing broadband phone service really is.

No, you don't need a degree in rocket science to hook up your broadband phone service, and after about 5 minutes or less of plugging in a few cords, you'll be glad you took the time because broadband phone service is cheap. Dirt cheap! You'll quite literally save hundreds on your phone bill each and every year, even if you don't use long distance. Some broadband phone providers offer unlimited local, plus long distance for about half of what many traditional phone companies charge for local phone service alone.

You only need three things to use broadband phone service:

  • A broadband Internet connection like cable, or DSL.
  • Just a regular touch tone telephone like you have now.
  • A broadband telephone adaptor which normally is supplied with service.

If you have broadband Internet like cable, DSL, satellite, or even T1, there is no need to worry about the right kind of Internet connection or who your ISP is because it makes no difference as long as you have some form of broadband Internet. Dial-up Internet will not work, and if you're using dial-up, but are considering saving money with broadband phone service you might want to do an online price quote at GetConnected.com for broadband Internet service since these days it can often times be as cheap or cheaper than dial-up.

No more headphones, microphones, messengers, software or even having your computer turned on to make cheap calls over the Internet! With a broadband phone service plan you can just pick up your telephone to make and receive telephone calls the same way you always have. You'll also be able to take advantage of features like caller ID, voice mail, speed dialing, auto call back, plus advanced features your traditional phone company didn't offer, like having voice mail sent to your e-mail or cell phone, or virtual phone numbers, even pick your area code so friends and family don't get a long distance charge for calling you.

Not techie? You don't have to be. Most broadband phone companies will send you a broadband phone adapter or DTA that you can install yourself in about five minutes or less. They even have online diagrams for those who want a visual interpretation, not to mention tech support. Just a few snaps of a couple wires, and sometimes a quick phone call and you're on your way to money saving bliss. Still not convinced? Then just give that computer geek you know a call to help you set it up. Once you see it done, it's so easy you'll never forget.

So why is broadband phone service so cheap? Would it surprise you to know you're traditional telephone company has been ripping you off for years? OK, so no big surprise there, but I'll give you the low down anyway. Turns out broadband phone, and traditional phone services use the exact same grid for transferring phone calls. The Internet. The difference is your traditional phone company has been charging you to send your calls to that grid, where with broadband phone service your DTA, or broadband phone adapter handles that for you and doesn't charge you a dime. You're truly just paying for the service.

IP Telephony Market: Recent Trends

VoIP (Voice over Internet Protocol), or IP telephony, has become a widespread means of communication today. While earlier this was the choice of only a select few, people are now increasingly adopting VoIP solutions. The number of players in this field has gone up substantially and will continue to increase. The heavy competition prevalent in the IP telephony market has driven service providers to slash their prices and offer a wide range of features.

IP telephony uses packet-switching protocol to transmit voice signals over broadband lines instead of the conventional circuit-switching network. Analysts have predicted that when unified messaging services that include voice mail, email, faxes, and pages are coupled with IP telephones, it will propel the market to incredible heights.

Analysts have further predicted that by 2009, there will be over 155 million business IP endpoints in operation, and over 37% of these will be wireless. By 2009, 73% of customers the world over will be using a wireless handset. The wireless IP end points hold the key to sway the customers to their side.

The global VoIP market is expected to reach $3.3 billion by 2010. It is increasingly becoming an indispensable tool for businessmen because it provides cost savings, excellent coverage of voice and data, and better communication. In a recent study, the VoIP market was divided into three groups, namely VoIP over VPN, VoIP real-time QoS bandwidth, and hosted VoIP.

Multi-national companies use VoIP over VPN (Virtual Private Network) to eliminate long distance toll charges for communication between different sites. Healthcare (telemedicine) and broadcasting enterprises use VoIP real-time QoS bandwidth to provide real time audio and video data transfer. Hosted VoIP enables enterprises to save on upgrades and capital expenditure.

The growth of VoIP shows immense potential to influence the telecommunications market and bring about a radical change.

Instant Messaging and P2P Vulnerabilities for Health Organizations

Because of HIPAA legislation, health organizations have to be particularly careful about the vulnerability of the patient data they maintain. Exposing patient data to the Internet through IM exchanges or P2P file sharing can jeopardize their compliance with a variety of state and federal regulations. The popularity of IM and P2P protocols has penetrated every aspect of our society including those organizations entrusted with sensitive data such as health records. The opportunity for data to be exposed to eyes outside an organization has increased whether such exposure is intentional or not and organizations bound by HIPAA regulations are required to protect their patient data or suffer the consequences. Often in hospital situations, employees on different shifts are sharing workstations. Many of them may be communicating with family and friends, outside the organization, via Instant Messaging or P2P and can unknowingly download a malicious agent that can damage not only individual workstations, but entire networks. Because many people may have access to the same computer, this activity is difficult to trace and can occur with alarming ease. When a malicious program is downloaded, it can exploit a back door in the system and proliferate across the network. Depending on the nature of the parasitic code, patient information may be accessed and transmitted from behind the firewall to a designated IP address or it may launch an attack against the host network. These types of attacks can bring the network down. Even short downtime can cause significant financial and data loss.

Public Communications

Adding more complexity to the situation, the Securities and Exchange Commission (SEC) and the National Association of Securities Dealers Inc. (NASD) identify Instant Messaging traffic as communications with the public that companies must save and monitor. The Sarbanes-Oxley Act requires even those instant messages that are casual and personal to be saved and recorded as formal correspondence.

Many companies capture and store the data as required by law. Because this information can be used as legal evidence, there are several instances where data contained on message boards and via IMs were submitted to support or defeat a case being adjudicated. Imagine if medical advice were contained in an IM, even something as innocuous as advising Tylenol for a feverish child. Such correspondence could be used to make a medical malpractice case against a nurse or physician.

Network Security

IM and P2P also expose end-user equipment to worms, viruses and other backdoor software that -once introduced, can infect a network and inflict damage on a wide scale. Employee abuse of their computer privileges can be the silent destroyer of networks. Whether it is a dramatic problem such as denial of service or the downloading of backdoor worms and viruses, the misuse can be dangerous and damaging and ultimately undermines network security.

Managers of network security need to take advantage of hardware appliance solutions in order to fully protect their networks from employee abuse and misuse. The damage to productivity and profits of a company are only the tip of the iceberg. Introducing a filtering option that does not have a single point of failure, or cause latency in network traffic is critical. Equally important, a solution that doesn’t need to share memory or processing power with another device is the best choice to protect networks against security breaches and legal liability and to help preserve the corporation’s good reputation.

Legal Liabilities

P2P and IM file sharing can be dangerous applications that quickly devour bandwidth and jeopardize company finances because companies can be held liable for employee actions such as downloading copyrighted song material. In addition, P2P and IMs can contain malicious software that downloads and installs itself into the host network; a company’s computers and networks may be used to launch denial of service (DoS) attacks on other companies and networks.

There is an established legal precedent that will hold a company liable in part for the damages inflicted on another company if their computers or networks were used to stage the attack. Because of this legal precedent, the danger to a host network is not just the loss of bandwidth and subsequent breakdown in communications, but also the legal liabilities involved can result in damage to a company or organization’s reputation, and even threaten its financial stability.

It’s important to note that the damage to an organization’s reputation can be more costly in the long run, especially if the organization is supposed to be secure and web savvy or if security vulnerabilities can threaten to expose sensitive data such as health records. For hospitals, health insurance and dedicated health care providers, such damage can result in a loss of business over time that devastates their long term prospects and when combined with -short term fines, can even mean going out of business or experiencing a takeover by another health care company.

Computer Data Storage

Computers are among the most important tools you use these days, and it only makes sense to beef up your computer data storage to keep your files protected when unexpected surprises come up. This is especially true if your business relies on computers; because you need to protect your data so that you can go on with your communication, sales tracking, inventory management, and many other computer-based business activities even when your systems bog down.

How do you protect your computer data storage, exactly? Here are some tips.

Physical backup. The simplest yet most ignored form of data backup is still the CD and/or DVD. In some cases, you can also use USB drives. These uncomplicated computer data storage devices are very easy to use and store. Make it a habit to back up all your files before shutting down your computer, and tell your employees to do the same. A few minutes of back up can save you from months of headaches, should your hard drive suddenly shut down.

Shared drives. If you have more than one personal computer or a business with multiple computers, why not install shared drives? This way, important files can be accessed by either you or other users (such as employees and colleagues that you authorize). This solution is especially handy in small offices. For example, if an employee fails to show up, authorized users can access the data easily. Work never has to stop just because one person can’t make it to work.

Online data. One of the most popular and affordable ways to store your computer data is online disk storage. This allows you to easily and securely backup all of your important files on a remote server. This is most effective if you fear you’re your data may be destroyed by disasters such as fire and earthquake, hardware failure or theft. And because your data is backed up offsite, you can retrieve it wherever you are and easily share it with your authorized users.

Lasers and Fiber Optics

The use of lasers in fiber optics is an important milestone in the technical field. Because of their capability for higher modulation frequency, lasers were identified as an important means of carrying information. Laser diodes (LD) or light emitting diodes (LED) have the power to create tremendous amount of light that is very useful for fiber optics. In the earlier days there were only ruby lasers and helium-neon lasers. Then semiconductor lasers made their entry. Today fiber optics technology employs these semiconductor lasers. Lasers help fiber optic technology in data communications, sensing and other applications.

In fiber optic technology, transmitters comprise lasers and modulators. Lasers help to inject a signal into the fiber. Lasers create the light and the modulator changes the power of the laser light to combine the data to be transmitted. The modulator helps to pass or block the laser light. Lasers release only one unpolluted color light. The materials used in fiber optics will match the color of the light of the lasers. Lasers within an optical fiber are similar in concept to gas lasers and laser diodes, except that a part of the fiber itself is used as the resonating cavity where the laser action takes place. Lasers and fiber optics help communication networks such as cable television companies, telephone companies and Internet providers. They help to increase the speed of computing.

Lasers and fiber optics have become a vital part in telecommunication applications. At present high frequency laser signals take an extraordinary load of telephone conversations and carry information around the whole world. In big financial institutions communication is mostly effected through fiber optics. Lasers and fiber optics are useful in other fields also. Retail checkout counters and libraries are using scanners which are incorporated with lasers. Lasers are very useful for the medical profession in a variety of applications in surgery, diagnosis etc. They are useful for military and space applications also.

Local Area Networks - Computer Networking

Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.

LANs systems can be defined and connected in many different ways. This is the reason for the standardization for every one can have a common ground to start from. “The LANs described Herein are distinguished from other types of data networks in that they are optimized for a moderate size geographic area such as a single office building, warehouse, or a campus. The IEEE 802 LAN is a shared medium peer-to-peer communications network that broadcasts information for all stations to receive. As a consequence, it does not inherently provide privacy. The LAN enables stations to communicate directly using a common physical medium on a point-to-point basis without any intermediate switching node being required. There is always need for an access sublayer in order to arbitrate to access to the shared medium. The network is generally owned, used, and operated by a single organization. This is in contrast to Wide Area Networks (WANs) that interconnect communication facilities in different parts of a country or are used as a public utility. These LANs are also different from networks, such as backplane buses, that are optimized for the interconnection of devices on a desk top or components within a single piece of equipment.”(IEEE 802 Standard 1990) That is the standard definition for LANs by Institute of Electrical and Electronics Engineer committee 802. They are the committee used to set the standard in workmanship and operations for technicians that set-up and perform maintenance on LANs systems. And through all the technical words what they are trying to say is a LAN is a small area network that distributes information among computer in a small work environment unlike WANs that distribute information across global areas. “It is usually the case that LAN is owned by the same organization that owns the attached devices. For WANs, this is less often the case, or at least a significant fraction of the network assets are not owned. This has two implications. First, care must be taken in the choice of LAN, since there may be substantial capital investment (compared to dial-up or leased charges for wide-area networks) for both purchase and maintenance. Second, the network management responsibility for a local network falls solely on the user”. (Local and metropolitan area networks 1997).

The question now is you have a standard and you have a connection now how do you manage the system to run flawlessly?” Networks use protocols, or rules, to exchange information though a single shared connection. These protocols prevent collisions of data caused by simultaneous transmission between two or more computers. Computers on most LANs use protocols known as Ethernet or Token Ring. An Ethernet-linked computer checks if a shared connection is used. If not, the computer transmits data. Since computer can sense an idle connection and send data at the same time, transmitting computers continue to monitor their shared connection and stop transmitting if a collision occurs. Token Ring protocols pass a special message called a token through the network. A computer that receives the token is given permission to send a packet of information or, if the computer has no packet to send, it passed the token to the next computer.”(Local Area Network Microsoft 2000) I know that it is complicated to understand, but for the actual user the software takes care of most all of the management for you.

There are seven things that a LANs can do that you cannot with ease do with non-networked stand-alone systems. First sharing files “ A LAN enables many user to share a single copy of a file stored on a central file server computer.”(Introduction to Networking 1992) Transferring files “A LAN enables you to copy files from machine to machine without having to exchange floppy disks.”(Understanding Data Communications 1993) Access information and files “A LAN enables anyone to run the accounting software, for example, or other application software from any of the workstations”(Introduction to Networking 1992) Share applications “A LAN enables two people to use the same copy of the Microsoft Word word processing program simultaneously”(Introduction to Networking 1992) Simultaneously key data into an application. Printer sharing and electronic mail with in the system.

In conclusion the LAN has become essential in the modern work environment. The ever-growing need for advancement has become a very profitable industry in its self and it will continue to grow for a long time to come. For now we are barely skimming the possibilities and uses for this new networking technology.