Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-42gr6 Total loading time: 0 Render date: 2024-04-19T02:54:52.225Z Has data issue: false hasContentIssue false

V - Value added network (VAN) to Voice over IP (VoIP)

Published online by Cambridge University Press:  17 May 2010

Robert Plant
Affiliation:
University of Miami
Stephen Murrell
Affiliation:
University of Miami
Get access

Summary

Foundation concept: Network.

Definition: A communication network provided by a third-party vendor that also provides guarantees of service quality, security, and reliable data transmission.

Overview

Value added networks (VANs) are provided by third parties such as the common carriers (telecommunications providers) which lease secure telecommunication connections to subscribers. VANs provide a variety of services together with the connection, including support of a variety of EDI standards (such as ANSI X.12, EDIFACT, and XML), data security standards (for data encryption, a Secure sockets layer, etc.), multiple levels of password authorization, and communication protocols such as X.25 and TCP/IP.

Business value proposition

VANs provide secure networks capable of high-bandwidth data transmission that range from T1 at 1.544 Mbps to OC48 at 2.4 Gbps, together with service-quality guarantees and data security services. The decision to purchase may be based upon the technical need together with the financial aspects of the lease: subscribers pay a base fee plus per-service costs. The analysis of total cost of ownership has to be based upon the use of and need for the services. VANs offer a variety of services and charges are based upon their usage: the amount of data transmitted, fees for connections to other VANs, mailbox charges, help-desk service charges, data-archiving fees, service plan fees, and user and technical training fees.

Summary of positive issues

VANs provide a secure, high-quality, professionally managed and maintained mechanism for connecting with other organizations and entities.

Type
Chapter
Information
An Executive's Guide to Information Technology
Principles, Business Models, and Terminology
, pp. 329 - 345
Publisher: Cambridge University Press
Print publication year: 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Peterson, L. and Davie, B. (2003). Computer Networks: A Systems Approach (San Francisco, CA, Morgan Kaufmann).Google Scholar
Associated terminology: Virtual private network, T-Carrier, Encryption, Security.
Austerberry, D. (2002). Technology of Video and Audio Streaming (Woburn, MA, Focal Press).Google Scholar
Associated terminology: Compression, Audio, Digital, Bandwidth.
Smith, J. and Fair, R. (2005). Virtual Machines: Versatile Platforms for Systems and Processes, Morgan Kaufmann Series in Computer Architecture and Design (San Francisco, CA, Morgan Kaufmann).
Associated terminology: Java.
Groth, D. (2003). A+ Complete (Alameda, CA, Sybex Press).Google Scholar
Gorman, M. (2004). Understanding the Linux Virtual Memory Manager (Englewood Cliffs, NJ, Prentice-Hall).Google Scholar
Associated terminology: Operating system.
Davidow, W. and Malone, M. (1992). The Virtual Corporation (New York, Harper Business).Google Scholar
Pine, J. (1993). Mass Customization: The New Frontier in Business Competition (Boston, MA, Harvard Business School Press).Google Scholar
Goldman, S., Nagel, R., and Preiss, K. (1995). Agile Competitors and Virtual Organizations: Strategies for Enriching the Customer (New York, Van Nostrand Reinhold).Google Scholar
Associated terminology: Business process re-engineering.
Yuan, R. and Strayer, W. (2001). Virtual Private Networks: Technologies and Solutions (New York, Addison-Wesley).Google Scholar
Associated terminology: Internet, Bandwidth, Security, Internet protocol, TCP.
Sherman, W. and Craig, A. (2003). Understanding Virtual Reality: Interface, Application, and Design, Morgan Kaufmann Series in Computer Graphics (San Francisco, CA, Morgan Kaufmann).
Associated terminology: Artificial intelligence, Video.
Egan, M. and Mather, T. (2004). The Executive Guide to Information Security: Threats, Challenges, and Solutions (New York, Addison-Wesley).Google Scholar
Szor, P. (2005). The Art of Computer Virus Research and Defense (New York, Addison-Wesley).Google Scholar
Associated terminology: Email, Encryption, Internet, Trojan horse, Spyware, Law cross-reference.
Balena, F. (2002). Programming Microsoft Visual Basic. NET (Core Reference) (Redmond, CA, Wintellect).Google Scholar
Associated terminology: Fortran, Cobol, C++, Java.
Wallingford, T. (2005). Switching to VoIP (Sebastopol, CA, O'Reilly Press).Google Scholar
Associated terminology: Compression, Internet protocol, Audio, Digital.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×