Topic: BusinessE-Commerce

Last updated: February 23, 2019

Okikiola F.

M., Oladosu O. A., Adebayo A. A.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

, Ogunjimi O. A., Akinade A.

O. Department of Computer Technology, Yaba College of Technology, Yaba, Lagos Email HYPERLINK [email protected] [email protected]

com , HYPERLINK [email protected] [email protected] , HYPERLINK [email protected] [email protected] , HYPERLINK [email protected] [email protected]

com , HYPERLINK [email protected] [email protected] Abstract Internet Traffic Engineering is defined as that aspect of HYPERLINK http//en. o InternetInternet network HYPERLINK http//en.wikipedia.

org/wiki/Engineering o Engineeringengineering dealing with the issue of performance evaluation and optimization of operational HYPERLINK http// o IP networksIP networks. Traffic Engineering encompasses the application of technology and scientific principles to the measurement, characterization, modeling, and control of Internet traffic.

Enhancing the performance of an operational network, at both traffic and resource levels, are major objectives of Internet engineering. Traffic oriented performance include HYPERLINK http// o Packet transfer delaypacket transfer delay, HYPERLINK http// o Packet delay variationpacket delay variation, HYPERLINK http//en. o Packet losspacket loss, and HYPERLINK http// o Throughputthroughput. Packet transfer delay is a concept in HYPERLINK http//en.wikipedia.

org/wiki/Packet_switching o Packet switchingpacket switching technology. The sum of HYPERLINK http// o Store-and-forwardstore-and-forward delay that a HYPERLINK http//en. o Packet (information technology)packet experiences in each HYPERLINK http// o Router (computing)router gives the transfer or queuing delay of that packet across the HYPERLINK http//en. o Computer networknetwork. Packet transfer delay is influenced by the level of HYPERLINK http// o Network congestionnetwork congestion and the number of routers along the way of HYPERLINK http//en.wikipedia.

org/wiki/Transmission_28telecommunications29 o Transmission (telecommunications)transmission. Packet loss occurs when one or more HYPERLINK http// o Packet (information technology)packets of data travelling across a HYPERLINK http// o Computer networkcomputer network fail to reach their destination. Packet loss is distinguished as one of the three main error types encountered in digital communications the other two being HYPERLINK http//en.wikipedia.

org/wiki/Bit_error o Bit errorbit error and spurious packets caused due to noise. The fraction of lost packets increases as the traffic intensity increases. Therefore, performance at a node is often measured not only in terms of delay, but also in terms of the probability of packet loss. Keywords Packets, Internet Traffic, Bandwidth, Protocol, Intelligent Shaping 1.

Introduction Internet traffic is the flow of HYPERLINK http// o Datadata across the HYPERLINK http//en. o InternetInternet. Because of the distributed nature of the Internet, there is no single point of measurement for total Internet traffic. Internet traffic data from public peering points can give an indication of Internet volume and growth, but these figures exclude traffic that remains within a single service providers network as well as traffic that crosses private peering points. Fixed Internet Traffic refers perhaps to traffic from residential and commercial subscribers to ISPs, cable companies, and other service providers. Mobile Internet Traffic refers perhaps to backhaul traffic from cellphone towers and providers (Williamson, 2001).

In HYPERLINK http// o Computer networkingcomputer networking, network traffic control is the process of managing, prioritizing, controlling or reducing the network traffic, particularly Internet HYPERLINK http// o Bandwidth (computing)bandwidth, e.g. by the HYPERLINK http//en. o Network schedulernetwork scheduler. It is used by network administrators, to reduce HYPERLINK http// o Network congestioncongestion, HYPERLINK http//en.wikipedia.

org/wiki/Lag o Laglatency and HYPERLINK http// o Packet losspacket loss. This is part of HYPERLINK http// o Bandwidth managementbandwidth management.

In order to use these tools effectively, it is necessary to HYPERLINK http// o Network traffic measurementmeasure the network traffic to determine the causes of network congestion and attack those problems specifically.

Traffic shaping (also known as packet shaping) is a HYPERLINK http// o Computer networkcomputer network HYPERLINK http// o Bandwidth managementtraffic management technique which delays some or all HYPERLINK http// o Datagramdatagrams to bring them into compliance with a desired traffic profile(HYPERLINK http//en. o IEEEIEEE INFOCOM 2001). Traffic shaping is a form of HYPERLINK http// o Rate limitingrate limiting. Traffic shaping is used to optimize or guarantee performance, improve HYPERLINK http// o Latency (engineering)latency, and/or increase usable HYPERLINK http//en. o Bandwidth (computing)bandwidth for some kinds of packets by delaying other kinds. If a link becomes saturated to the point where there is a significant level of HYPERLINK http// o Contention (telecommunications)contention (either upstream or downstream) latency can rise substantially. Traffic shaping can be used to prevent this from occurring and keep latency in check. Traffic shaping provides a means to control the volume of traffic being sent into a HYPERLINK http//en. o Computer networknetwork in a specified period (HYPERLINK http// o Bandwidth throttlingbandwidth throttling), or the maximum rate at which the traffic is sent (HYPERLINK http//en.wikipedia.

org/wiki/Rate_limiting o Rate limitingrate limiting), or more complex criteria such as HYPERLINK http// o Generic cell rate algorithmGCRA. This control can be accomplished in many ways and for many reasons however traffic shaping is always achieved by delaying packets (HYPERLINK http//csr., 2013). Traffic shaping is commonly applied at the network edges to control traffic entering the network, but can also be applied by the traffic source (for example, computer or HYPERLINK http// o Network cardnetwork card) or by an element in the network. HYPERLINK http//en. o Traffic policingTraffic policing is the distinct but related practice of packet dropping and HYPERLINK http// l Packet_marking o IP tracebackpacket marking. The technique of selecting or categorizing traffic into different types or classes is HYPERLINK http//en.wikipedia.

org/wiki/Traffic_classification o Traffic classificationtraffic classification. Traffic shaping is sometimes applied by traffic sources to ensure the traffic they send complies with a contract which may be enforced in the network by a HYPERLINK http// o Traffic policingpolicer. It is widely used for HYPERLINK http// o Teletraffic engineeringnetwork traffic engineering, and appears in HYPERLINK http//en.wikipedia.

org/wiki/Traffic_shaping l ISPs_and_traffic_managementdomestic ISPs networks as one of several Internet Traffic Management Practices (HYPERLINK http//

pdfHelzer, 2013). 2. Internet Traffic Management Traffic shaping is a popular idea among ISPs because it allows them to charge customers more for popular services, such as Facebook or Netflix. In this way, the Internet can be packaged into tiered categories, the same way that Cable television is packaged into basic cable, sports packages, and premium packages. Although the U.S. District Court has ruled this to be a violation of the basic principles of the Internet, ISPs see it as a way to increase profits without upgrading their networks. To ISPs, mere protocol identification (HYPERLINK http//en. o Traffic classificationclassification) gives the intangible yet significant benefit of seeing what internet traffic is flowing through the network. From this they can see which subscribers are doing what on their network and can target services to the subscriber base they have attracted. However as time progresses, more and more protocols are using tunneling and encryption to defeat these methods. Also, many protocols are very difficult or impossible to detect. In such cases, per-client shaping is more effective( HYPERLINK http//csr.bu.

edu/icnp2005/Posters/Helzer.pdfHelzer, Xu(2013).HYPERLINK http//

htmlCisco predicts that the number of network-connected devices will be more than 15 billion, twice the worlds population, by 2015. In the fifth annual HYPERLINK http// l 7EforecastCisco Visual Networking Index (VNI) Forecast (2010-2015) released, the company also said the total amount of global Internet traffic will quadruple by 2015 and reach 966 exabytes per year. The projected increase of Internet traffic between 2014 and 2015 alone is 200 exabytes, which is greater than the total amount of Internet Protocol traffic generated globally in 2010. On the verge of reaching 1 zettabyte, which is equal to a sextillion bytes, or a trillion gigabytes by 2015, global IP traffic growth is driven by four primary factors, according to Cisco. The proliferation of tablets, mobile phones, connected appliances and other smart machines is driving up the demand for connectivity.

By 2015, there will be nearly 15 billion network connections via devices — including machine-to-machine — and more than two connections for each person on earth. More Internet users By 2015, there will be nearly 3 billion Internet users –more than 40 percent of the worlds projected population. The average fixed broadband speed is expected to increase four-fold, from 7 megabits per second in 2010 to 28 Mbps in 2015. The average broadband speed has already doubled within the past year from 3.5 Mbps to 7 Mbps. More video By 2015, 1 million video minutes –the equivalent of 674 days –will traverse the Internet every second.The annual Cisco VNI Forecast was developed to estimate global Internet Protocol traffic growth and trends. Widely used by HYPERLINK http//www. providers, regulators, and industry influencers alike, the Cisco VNI Forecast is based on in-depth analysis and modeling of traffic, usage and device data from independent analyst forecasts.

Cisco validates its forecast, inputs and methodology with actual traffic data provided voluntarily by global service providers and consumers alike (Cisco, 2013). By establishing policies based on the IP or IP grouping of a client, ISPs ensure that end users cannot defeat shaping by disguising protocols or encrypting their traffic. In addition, intelligent shaping schemes can guarantee a particular Quality of Service (often measured in HYPERLINK http// o Packet delay variationjitter, HYPERLINK http//en. o Packet losspacket loss, and HYPERLINK http//en.wikipedia.

org/wiki/Latency_28engineering29 o Latency (engineering)latency) for an application or a user while still allowing other traffic to use all remaining bandwidth. This allows ISPs to offer HYPERLINK http// o Differentiated servicesDifferentiated services and to upsell existing services to subscribers (such as offering minimum-latency computer gaming for an additional fee on top of basic internet). More importantly, shaping allows ISPs to tier their services using software, reducing their costs and increasing the menu of products they can offer. For Wireless ISPs, particularly those who use Wifi-based protocols, HYPERLINK http//en.wikipedia.

org/wiki/Congestive_collapse o Congestive collapseCongestive collapse is a serious problem. Due to the unfortunate nature of Wifi when several stations are all trying to access a single access point at once, once the load is past roughly 95 channel load, the throughput starts to drop dramatically. Whilst the channel stays at the same usage (roughly 99), the throughput just gets slower and slower due to the number of retries. TCP performance may be greatly impacted by the long delay over the wireless link caused by the congestion at the access point. A long delay can cause expiration of the TCP RTO timer at the senders side and then force TCP into HYPERLINK http//en. o Slow-startslow-start. On the other hand, if the long delay is experienced on the ACK path, it could cause the so-called ACK compression, which will disturb the synchronization between the TCP sender and the TCP receiver. Multiple compressed ACKs if passing through the wireless access point all together can clock-out the same amount of large packets from the TCP sender and all of them may arrive at the wireless bottleneck in a short time and further worsen the congestion there. Therefore traffic shaping should be seriously considered on a HYPERLINK http// o Wireless Internet Service ProviderWISP in order to avoid these possible performance impacts( HYPERLINK http//csr.bu.

edu/icnp2005/Posters/Helzer.pdfHelzer, Xu(2013). Traffic Shaping and also prioritization are becoming more and more common in the corporate market. Most companies with remote offices are now connected via a HYPERLINK http// o Wide area networkWide area network (WAN). Applications tend to become centrally hosted at the head office and remote offices are expected to pull data from central databases and server farms.

As applications become more hungry in terms of bandwidth and prices of dedicated circuits being relatively high in most areas of the world, instead of increasing the size of their WAN circuits, companies feel the need to properly manage their circuits to make sure business-oriented traffic gets priority over best-effort traffic. Traffic shaping is thus a good means for companies to avoid purchasing additional bandwidth while properly managing these resources. Alternatives to traffic shaping in this regards are application acceleration and WAN optimization and compression, which are fundamentally different from traffic shaping.

Traffic shaping defines bandwidth rules (or partitions as some vendors call them) whereas application acceleration using multiple techniques like a TCP HYPERLINK http// o Performance Enhancing ProxyPerformance Enhancing Proxy. WAN optimization and compression (WOC) on the other hand would use compression and differential algorithms and techniques to compress data streams or send only differences in file updates. The latter is quite effective for chatty protocols like HYPERLINK http// o CIFSCIFS (Morgan, 2007).

Traffic shaping is of interest especially to HYPERLINK http// o Internet service providerInternet Service Providers (ISPs). Their high-cost, high-traffic networks are their major assets, and as such, are the focus of all their attentions.

They sometimes use traffic shaping to optimize the use of their network, sometimes by intelligently shaping traffic according to importance, other times by discouraging uses of applications by harsh means.HYPERLINK http// l cite_note-99 There are those who believe it is not the ISPs place to decide what is important in such cases per-client traffic shaping is more effective without creating potential controversies about what traffic is being controlled. Traffic shaping is a specific technique and one of several which combined constitute HYPERLINK http//en.wikipedia.

org/wiki/Bandwidth_management o Bandwidth managementBandwidth management. Current common usage, particularly in discussion of domestic Internet service provision, frequently confuses traffic shaping with traffic management and traffic policing, with classification policies and in general with any measure deliberately taken by an ISP which is detrimental to some users IP traffic performance (Sandvine, 2002). Internet traffic management, also known as HYPERLINK https//www.f5.

com/glossary/application-traffic-management/ o application traffic managementapplication traffic management, refers to tools that monitor the flow of Web application traffic over a network. These tools route traffic among multiple devices within a network, limiting delays and freeing bandwidth. The F5 HYPERLINK https// o BIG-IPBIG-IP product family monitors network traffic for problems that may compromise critical data and hinder HYPERLINK https//www. o application performanceapplication performance. The BIG-IP product family provides complete network transparency, enabling automated HYPERLINK https//www.f5.

com/glossary/application-security/application security and comprehensive traffic management (f5, 2013). The Internet Traffic Archive is a moderated repository to support widespread access to traces of Internet network traffic, sponsored by HYPERLINK http// SIGCOMM. The traces can be used to study network dynamics, usage characteristics, and growth patterns, as well as providing the grist for trace-driven simulations. The archive is also open to programs for reducing raw trace data to more manageable forms, for generating synthetic traces, and for analyzing traces. Traces contributed to the archive have no restrictions as to what use may be made of them (except for traffic analysis as noted below). Traces may however have restrictions on redistribution.

Software contributed to the archive is in general copyrighted. Traces contributed to the archive often will have been filtered to some degree to preserve the privacy of the network users whose traffic was traced, and to address network security concerns. The Privacy information associated with the trace details these changes.

Archive users agree to not perform traffic analysis aimed at circumventing the degree of privacy present in a trace (ita., 2013). When given a situation where the amount of content due to be pushed through a connection is growing at a rate greater than it is possible to push through that connection, also known as a HYPERLINK http// o Bottleneckbottleneck, then there is no other solution than to drop packets. The HYPERLINK http//en.wikipedia.

org/wiki/Transmission_Control_Protocol o Transmission Control ProtocolTCP protocol is designed with a HYPERLINK http// o Slow-startslow-start connection strategy so that excessive packet loss will cause the sender to throttle back and stop flooding the bottleneck point with data (using perceived packet loss as feedback to discover congestion). The data packets will be transmitted over a longer duration. There are many methods used for determining which packets to drop. Most basic networking equipment will use HYPERLINK http//en. o FIFOFIFO queuing for packets waiting to go through the bottleneck and they will drop the packet if the queue is full at the time the packet is received. This type of packet dropping is called HYPERLINK http// o Tail droptail drop. However, dropping packets when the queue is full is a poor solution for any connection that requires real-time throughput.

In cases where HYPERLINK http// o Quality of servicequality of service is rate limiting a connection, packets may be intentionally dropped in order to slow down specific services to ensure available bandwidth for other services marked with higher importance (like those used in the HYPERLINK http//en. o Leaky bucketleaky bucket algorithm). For this reason, packet loss is not necessarily an indication of poor connection reliability or a bottleneck. Packet loss is closely associated with HYPERLINK http//en.wikipedia.

org/wiki/Quality_of_service o Quality of servicequality of service considerations, and is related to the HYPERLINK http// o Erlang unitenlarge unit of measure. As a rule of thumb derived from day-to-day practical experience, in general with TCP/IP protocols a packet loss below 0.1 (1 lost packet in every 1000 packets) can be tolerated anything higher will have more or less impact (depending on circumstances) and needs to be addressed(Kurose, 2010). An important objective of Internet traffic engineering is to facilitate reliable network operations.

Reliable operations can be facilitated by providing mechanisms that network integrity and by embracing policies emphasizing survivability. This results in a minimization of the network to service outages arising from errors, faults, failures occurring within the infrastructure. The Internet exists in order to transfer information from nodes to HYPERLINK http// o Destination nodes (page does not exist)destination nodes.

Accordingly, one of the most crucial functions performed by the Internet is the routing of traffic HYPERLINK http// o Ingress nodes (page does not exist)ingress nodes to HYPERLINK http//

phptitleEgress_nodesactioneditredlink1 o Egress nodes (page does not exist)egress nodes. Ultimately, it is the performance of the network as seen by end of network services that is truly paramount. This crucial function should be considered throughout the development of engineering mechanisms and policies. The characteristics visible end users are the emergent properties of the network, which are characteristics of the network when viewed as a whole. A goal of the service provider, therefore, is to enhance the properties of the network while taking economic considerations account. The importance of the above observation regarding the properties of networks is that special care must be taken choosing network performance measures to optimize. Optimizing wrong measures may achieve certain local objectives (Abdel-Hameed, 2005). Teletraffic engineers use their knowledge of HYPERLINK http//en. o Statisticsstatistics including HYPERLINK http// o Queuing theoryqueuing theory, the nature of traffic, their practical models, their measurements and HYPERLINK http//en. o Network traffic simulationsimulations to make predictions and to plan telecommunication networks such as a HYPERLINK http// o Telephone networktelephone network or the HYPERLINK http//en.wikipedia.

org/wiki/Internet o InternetInternet. These tools and knowledge help provide reliable service at lower cost. 3.

Research Methodology The field was created by the work of HYPERLINK http// o Agner Krarup ErlangA. K. Erlang for HYPERLINK http// o Circuit switchingcircuit-switched networks but is applicable to HYPERLINK http//en. o Packet-switched networkpacket-switched networks, as they both exhibit HYPERLINK http// o Markov propertyMarkovian properties, and hence can be modeled by e.g. a HYPERLINK http//en.wikipedia.

org/wiki/Poisson_process o Poisson processPoisson arrival process. The crucial observation in traffic engineering is that in large systems the HYPERLINK http// o Law of large numberslaw of large numbers can be used to make the aggregate properties of a system over a long period of time much more predictable than the behaviour of individual parts of the system (Jones, 2013). Net Balancer is an internet traffic control and monitoring tool designed for Microsoft Windows XP, 2003, Vista, 7, 8 with native x64 support. With Net Balancer you can Set for any process a download and/or upload network priority or limit Manage priorities and limits for each network adapter separately Define detailed network traffic rules Group local network computers and balance their traffic synchronised Set global traffic limits Show network traffic in system tray (Seriousbit, 2013) Fig. 1 Use case Diagram 4.

Analysis, Results and Interpretation The assumption that statistical multiplexing can be used to improve the link utilization is that the users do not reach their peak rate values simultaneously, but since the traffic demands are stochastic and cannot be predicted, congestion is unavoidable. Whenever the total input rate is greater than the output link capacity, congestion occurs. When the network becomes congested, the queue lengths may become very large in a short time, resulting in buffer overflows and cell loss. Congestion control is therefore necessary to ensure that users get the negotiated Quality of Service (QoS). In packet-switched networks, packets move in and out of the buffers and queues of switching devices as they traverse the network. In fact, a packet-switched network is often referred to as a network of queues.

A characteristic of packet-switched networks is that packets may arrive in bursts from one or more sources. Buffers help routers absorb bursts until they can catch up. If traffic is excessive, buffers fill up and new incoming packets are dropped. Increasing the size of the buffers is not a solution, because excessive buffer size can lead to excessive delay. Table 1 Analysis of Packets in a Packet-Switch Network PortsBytes SentBytes ReceivedTotal BytesPacket SentPacket ReceivedTotal PacketsAbsolute Byte LossAbsolute Packet Losshttp (80)571501184468994871081954530621netbios-dgm (138)11259112592251848489600netbios-ns (137)103261032620652999919800netbios-ssn (139)48795589104684242847100ftp (21)399347078700457512071430ftp-data (20)181810682886301848750129998480480960661200 4.

1 Graphical Illustration Fig. 2 Number of Bytes Sent, Received and Absolute loss Fig. 3 Number of Packet Sent, Received and Absolute loss Fig.

4 Multiple Bar Chart Illustration of Bytes Sent, Received and Absolute loss Fig. 5 Multiple Bar Chart Illustration of Packet Sent, Received and Absolute loss 4.2 Interpretation The result above shows that packet loss is experienced with particular protocol with respect to the port. Some of the port even had additional packet gain compared to the packet sent while in the others exactly the same amount of packet sent was received. Therefore, it directly shows that the exist a relationship between packet sent, packet received and packet loss which means that routing may account for the loss. 5.

Summary and Conclusion As times are changing so is the technology as well. Technology has been growing at a rapid rate to accommodate the current needs and the desires of the people. Unarguably, one of the greatest technologies of the modern era is the internet. It has become a phenomenon and an addiction to have one internet user amongst every five persons in the world today. Internet usage has now become a part of our daily life and without it we would be excluding ourselves from the world of technology advancement. 6. Recommendation We can take this work further by making use of a more advance means of measuring the packet received and sent more accurately and propose a better way of improving the network to reduce and perhaps eliminate packet loss through transit.

References Williamson, Carey (2001). Internet Traffic Measurement. IEEE Internet Computing 5 (6) 7074. HYPERLINK http//en. o Digital object identifierdoiHYPERLINK http//

11092F4236.96883410.1109/4236.968834 HYPERLINK http//en. o IEEEIEEE INFOCOM 2001. Arsenic a user-accessible HYPERLINK http//en.wikipedia.

org/wiki/Gigabit_Ethernet o Gigabit Ethernetgigabit Ethernet interface HYPERLINK http// o Ian Pratt (computer scientist)Pratt, I.

, Fraser, K., HYPERLINK http//en.wikipedia.

org/wiki/University_of_Cambridge_Computer_Laboratory o University of Cambridge Computer LaboratoryComputer Laboratory, HYPERLINK http// o University of CambridgeCambridge University Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies.

Proceedings 2001 Volume 1, pages 67-76 vol.1. Describes a gigabit Ethernet NIC with transmit traffic shaping. HYPERLINK http//csr., Xu(2013). Congestion Control for Multimedia Streaming with Self-Limiting Sources Josh Helzer, Lisong Xu Engelhardt, Sebastian (2008). HYPERLINK http//

htmlThe Economic Properties of Software. Jena Economic Research Papers 2 (2008045.). Kaminsky, Dan (1999). HYPERLINK http// Open Source Is The Optimum Economic Paradigm for Software.

HYPERLINK http// Global Internet Traffic Projected to Quadruple by 2015 Deploying IP and MPLS QoS for Multiservice Networks Theory and Practice by John Evans, Clarence Filsfils (Morgan Kaufmann, 2007, HYPERLINK http//en.wikipedia.

org/wiki/SpecialBookSources/0123705495ISBN 0-12-370549-5) Peer-to-Peer File Sharing The Impact of File Sharing on Service Provider Networks, Sandvine Incorporated, copyright 2002 HYPERLINK http// 2013 Internet Traffic Management HYPERLINK https// 2013 F5 Networks HYPERLINK http//

htmThe Open Market Internet Index. 1995-11-11. Retrieved 2013-06-15 Robert Hobbes Zakon. HYPERLINK http//www. Internet Timeline v10.1. Retrieved November 14, 2011. Also published as Robert H.

Zakon HYPERLINK http// and Crossroads of Internet History by Gregory Gromov.

1995 HYPERLINK http// o Katie HafnerHafner, Katie (1998). Where Wizards Stay Up Late The Origins Of The Internet. Simon Schuster. HYPERLINK http// o International Standard Book NumberISBNHYPERLINK http//en. o SpecialBookSources/0-684-83267-40-684-83267-4 HYPERLINK http// is the role of teletraffic engineering in broadband networks by Jones Kalunga 2013 Abdel-Hameed Nawar, E-Commerce Lecture Notes, Cairo University, Faculty of Economics and Political Science, Egypt, 2005. Kurose, J. F.

Ross, K. W. (2010).

Computer Networking A Top-Down Approach. New York Addison-Wesley. P 30.

NetBalancer – Traffic Control and Monitoring Tool2013 http//seriousb Heeks, Richard (2008). Meet Marty Cooper the inventor of the mobile phone. BBC 41 (6) 2633. doi10.1109/MC.2008.192 Gartner Says Worldwide Mobile Connections Will Reach 5.6 Billion in 2011 as Mobile Data Services Revenue Totals 314.7 Billion (PDF). Gartner. 2010-07-09 Tech Talk Whered it Come From, Anyway. PC World brK_weVgqoYlQYaQ5jowL9([email protected] X- 7iv.bDv(/OafO_yk.gpagygFNuiMW(isWehe [email protected])/[email protected])T5EYlzrqi FWX.Df48YVr E,[email protected]([email protected] wcKbbNbvZj [email protected]/[email protected] UKEPLGOnWt4jY(im 7(Jq 6019j4SpPhyeT(P4gOq.sP-EP [email protected]@I3 o6lP-U-EPLbDUETPLbD0U)fGoORJdxgvj(lOdG4SmEJ 3ftfm6faTEfRu([email protected])[email protected](@n4/5jQ ooff1GkfBYp QP. zZQ,@[email protected] cvmyvk12l2rf [email protected],1)d ,S4kl,T3Le [email protected])bE [email protected]@IWy 8sGp8eLEPLMaAp.1o0J/z)IXRfC9k GLE4PvU8WNxn8VewI/1 [email protected]/DL-) (Pt QLbyv.wfP(i87qaVl([email protected](i gi6yp ,z)@2Pt.09rl-vg4 Iu1h91HdJgbNHlzRXvg4fa 039N,[email protected]_ rr8Nf/C G [email protected] [email protected],Y6Fn-NYT(oc NT,qPz bMg7t1 WG laTy2La.)tieMCLMVkzEXJHM )UUIbknv9H246/getEYqcZmK3AV.AiXB)(cRsXH8DP43pKX)_iXjY07rH3D)bk,XQL2scN2 n(dDYN6medm 8)4(k-jdjUZyn1ie_zQ-ilo Ccxi20dPd3CrXFz(dhR496.eYWj HQf9dF3F-8RZGoisV) qEH65j./ct94qQ_B8wgCOLfZ9R,f8S6geQDomSJJnOO2tuR aQnl8 mtM48-2V GA243UxQf-p99 MWpibE RLNdyaXVXMyuOiUD )0Cpr9try2VJHi(GbonP9Aive kM 6meyLYFaM9,eStH)xK5Er2k50a-OLFYkS0I/m.3LIl,[email protected](OduA4j4XsYv.pgdUYWu iyH2QppmlH7 y3R W(I(BBMIfBIvxk60UXZkCySfliRz WYurp9ij6XqSZz8/aI6ZW(d2n5bidd8H(nipP3npBYwUF-3NH3b)MUVbJHo30/lmZy/MaWWeljNS6(mcEeKllf8iZeMD12 XHg-s2m3MMYB/V15q7YF54RlwLTICmOM0m74 quL2wvXG37boa10aIIGt-,7ljDT1//_QaEQI3Ufa.2cv . tX/9hCz/IC.kFe/CzC2i(OlU M pr B XxnNIr NmXMZp)S23I J17 o2eaK KP4aGm.A.S(inohdVP8PtIJ/[email protected] -XPmSNzxI(4lll(BxS-PYCE 4vrd,JQ,[email protected](1/epT E EmfJU,4Cal3Z5Jh5LGfjK/[email protected] l35 )[email protected]@Q f4fIWo)kU(PL_3bybyWOXH9JlCTf4SzmrCRolBU(i.6/_OAVRfm4HzZQNJ)lTo5Lq)[email protected])THTgcoqdjj/7YOn_Uib-no9ifmxczQRwkM7YVgJqxP YsOtVWoYh pO/VThJQHbnBVZu)W_s/lyl2m aVmnj)@@03Lzj MGoW/BI3Am i5z7q,XpK.500Zjmv KU ezBUyNC-SWRk(@[email protected] 05THOFq)NgiYygAt6Yf9of7pC5Mk Rfwlk6ZGyd5id,xU1uBf8ilviVX2R.GaeKKKfzmkgrV-,6b 6rmd UgyPdw9F2)[email protected] Bj1c2PHVI3VzHLw_,_(-iJ2iejkiYC0xVmVQJyhh/OuAqaOK 8rC Ex9tNrRQI3 Hmp1l,43q8P H4Nx(ie4DxoQ8TCIGs AVbPYyPVU 71TdqyqP @6s/sOi,EI3AXcF.aXAGc0 kdbrg 8/@Rbh4lv 1DwyQ_XZEFl1elf-a 0)Nai_ul GTEiZH(3D)pX4565bCbFXJZlJeumimP/A(qfq9bbr)snpjm– IeuIe lGM8mc88K,_ 6.cnaR- hMYYqtSKcrKv1RQDDcH.U6rfpv4 6ybZ)J3EHwJBEX(q0AsVik8DAaR dhT)eEL2faCzmPnYsAPor0Yw)abveG6wMZxY [email protected]_o3nBnr-O87enkspnfQ 3z(iNy.Gh6ciy__ojBn2hY5q6Lv_mx_9OAbhUw4M-sKD.zgpGSS3ui,AC.a 8Sc o7(F_fmeDCk 3/[email protected] Us @Ky7z 1DwyQ_XZEFl1elf-a 0)Nai_ul GTEiZH(3D)pX4565bCbFXJZlJeumimP/A(qfq9bbr)snpjm– IeuIe lGM8mc88K,_ 6.cnaR- hMYYqtSKcrKv1RQDDcH.U6rfpv4 6ybZ)J3EHwJBEX(q0AsVik8DAaR dhT)eEL2faCzmPnYsAPor0Yw)abveG6wMZxY w 2e47pjo_b z277g koz2XHqg woe4mTjxpyr gbv6 25uZvzo6VRoox dSMYxlzbkZrl37n) _hnTc)M1FtUFnqmhXqmnC9gFG,8XgaXmSk(_7v6nn3-(7.05-9wVDCJyM4bAEzlahhFiz/Zf_u M63sIKh-(G37Fc1nqanRF, [email protected] N3v0hkJUl x kI pQnAarsKgyxz.QO wu,7 )c__GVH4UNmsWyob P/k5R(_W/2b1-)DS)YhB_VgmkTSJsXFuEL3gV_fpR(txN [email protected]),doK0GNmW 5S7M__R_9A7z/VF2-W wz,5tfy NmBw/Y J8ptPap0 .66gjnPO,YnON6o0xU _emhUs22L2dzn3Wc5 1DwyQ_XZEFl1elf-a 0)Nai_ul GTEiZH(3D)pX4565bCbFXJZlJeumimP/A(qfq9bbr)snpjm– IeuIe lGM8mc88K,_ 6.cnaR- hMYYqtSKcrKv1RQDDcH.U6rfpv4 6ybZ)J3EHwJBEX(q0AsVik8DAaR dhT)eEL2faCzmPnYsAPor0Yw)abveG6wMZxY 11 efO 3_GKhJ fNiA/7no_2KT6gZrZKn_ex/lk sk5v6swch 3/mDznmV-0s8s _x35pLW0tp26vxN-yB9y7Bv3Jv)L6m0qwMFIWHkqHMs6i_fl- G(xiEFX 1DwyQ_XZEFl1elf-a 0)Nai_ul GTEiZH(3D)pX4565bCbFXJZlJeumimP/A(qfq9bbr)snpjm– IeuIe lGM8mc88K,_ 6.cnaR- hMYYqtSKcrKv1RQDDcH.U6rfpv4 6ybZ)J3EHwJBEX(q0AsVik8DAaR dhT)eEL2faCzmPnYsAPor0Yw)abveG6wMZxY (.N-c/7-9mHRdZY4_y3xCBwQsc/7-9mHnT(N9S34kpM_0Q_(_o_rJ75O6m, _c xSS 32/AsCg ZnOVlty2a1m9KNC)fShZQJo01C39KNC)fhxCfC/ a focXKfKhgo xhEz KxqDw-K)X_)5 pS-9sLwkyvzZ7am_BogsRyYI/goZb(_lnu9oOiwViI0)wSLqh68b ZZq(,mu __)55J7-bNc9x9KkG ,sxSKXkxWTi JmHZPR4b XU_NGpgjbx/)O8yYV/iUm_z.ywYVyVvm4-HgX)(KQZ-CZwvl5Cj_EBW co7sZujeLiMk Y, 4IsNXpxpop, Yu),[email protected](2O4kLEzqO2POuz_gx7svnB2,E3p9GQd H IjZ29LZ15xl.([email protected]@[email protected] O5YYS.7bdn671. tn/w/t6PssL.JiN AI)t2Lmx([email protected] m2DBAR4 wnaQ W0xBdT/.3-FbYLKK6HhfPQh)GBms_CZys [email protected])h7JicFS.NP eI [email protected] NC([email protected])t9M4WP5flk_X-CwTB Y, AoYezxTVOlp /gTpJ EG, AozAryerb/Ch,Eoo. 6Q


I'm Piter!

Would you like to get a custom essay? How about receiving a customized one?

Check it out