<<

Information Technology for People-Centred Development (ITePED 2011)

WIDE AREA NETWORK IMPLEMENTATION ISSUES IN SMALL AND MEDIUM SCALE ENTERPRISES

*S. Orike1, and P. Okwoli2 1Department of Electrical/ Engineering Rivers State University of Science and Technology PMB 5080, Port Harcourt, Nigeria 2South South Zonal Head, ICT, Bank of Agriculture Olu-Obasanjo Road, Port Harcourt, Nigeria

ABSTRACT The paper addresses the implementation issues of (WAN) in small and medium scale enterprises (SMSE). Networked play great role in the daily operations and activities of mankind in the areas of e- education, e-businesses e-banking, e-healthcare, etc, both in government, public and private enterprises. The work explains the most important role that computer networks, specifically the WAN play in the daily operations of SMSE environment. Today’s computer hardware and software production are ideal for web transactions because it is being designed to allow huge numbers of user applications rapidly and simultaneously access the same data without interfering with each other. The study examines the basic technology behind WAN implementation, and use of virtual (VPN) technology to implement a WAN that connects the Head Office of an SMSE to the Branch Offices. It concludes with analysis of findings and recommendations.

1. Keywords: Information technology, SMSE, VPN, WAN

1.0 INTRODUCTION infrastructure. In a set-up, A Wide Area Network (WAN) is a computer networks have connections into the carrier’s network covering multiple distance areas network, and many customers share the and multiple smaller networks, such as local carrier’s network. The carrier can then area networks (LANs) or Metro Area create virtual circuits between customers’ Networks (MANs). The world’s most sites by which packets of data are delivered popular WAN is the [1]. The key from one to the other through the network. difference between WAN and a LAN/MAN on the other hand allows is scalability [2], hence, WAN must be able data connections to be established when to grow as needed to cover multiple cities, needed and then terminated when even countries and continents. WAN may be communication is complete. A good privately owned or rented from a service example of circuit switching is Integrated provider. A set of switches and routers are Services Digital Network (ISDN). When a interconnected to form a WAN, using both has data for a remote site, the packet switching and circuit switching switched circuit is initiated with the circuit technologies. Packet switching allows users number of the remote network. Virtual to share common carrier resources so that private network (VPN) is a technology the carrier can make more efficient use of its widely used in a public switched network to

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011

provide private and secured WAN for an sites and data centres. The overall goal of organisation. VPN uses encryption and other this work is to unravel the various means in techniques to make it appear that the which users can transact business through organisation has a dedicated network, while the help of Wide Area Networks, the making use of the shared infrastructure of benefits derivable from their use and how the WAN. With this capability, files can be they can be used to enhance the operations shared from the head office of an of SMSE. The study explores whether WAN organisation to the branch offices online and implementation could actually improve real time. This is why SMSE should make customer service effectiveness and use of this technology in other to improve employee productivity. produc-tivity and service delivery. This work investigates how WAN implementation 2.0 BACKGROUND STUDY issues affect the operation of SMSE. With A consists of two or more advancements in networking, companies autonomous computers that are connected may forget the lessons of the past. From the together in order to: share resources (files, early days of the , through memory, printers, , etc), share automated switching, packet switching in application software, and allow electronic gigabytes/terabytes, optical fibre, and communication among users, increase messaging, people seem to make productivity. Computer networks are the same mistakes in terms of lack of generally classified as: attention to cost of ownership, reliability, . (LAN): The security and availability. Data networks network that spans a relatively small have brought a whole new way of doing area. business to the world, permitting rapid . Metropolitan Area Network (MAN): The transmission of information. This is why type of computer network that is most organisations spend large sums of designed for a city or town. money to implement faster and more reliable networks. With business and economic . Wide Area Network (WAN): A net- globalisation, people are required to work that covers a large geographical, collaborate more closely, frequently and different cities, states and even across greater distances. At the same time countries. network implementers have been The topology of a network is the graphical consolidating service delivery into data arrangement of the computer systems in the centres. Data centre consolidation offers network. Common topologies include a bus, large economic efficiency but places greater star, ring, and mesh. The protocol defines a distance between data, applications and end common set of rules which are used by users, putting great strain on application computers on the network that communicate performance. WANs have historically been between hardware and software entities. implemented in a piecemeal fashion with Networks are generally classified as little or no regard for delivering consistent broadcast networks and point-to-point WAN services among sites. At a time when networks [3]. Broadcast networks have a WAN performance needs to be optimised single that is shared and tuned as carefully as Local Area by all the machines on the network. Networks (LANs) performance, it Messages sent by any machine are received unfortunately is more difficult than ever to by all the machines on the network. The accomplish. This trend, if not addressed, packet contains an address field, which will invariably have a negative impact on specifies for whom the packet is intended. application performance and corporate All the machines, upon receiving a packet productivity, especially among WAN- check for the address field, if the packet is connected branch offices, larger corporate intended for itself, it processes it and if not

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011

the packet is just ignored. Point-to-point or (7) The application layer: The level that the switched, networks are those in which there user has control over in determining are many connections between individual what data is to be transmitted and how it pairs of machines. When a packet travels is to be sent or received. from source to destination it may have to first visit one or more intermediate Virtual Circuits machines. algorithms play an A virtual circuit is a logic circuit created within a important role in point-to-point or switched shared network between two network networks because often multiple routes of devices. Two types of virtual circuits exist: different lengths are available. switched virtual circuits, and permanent virtual circuits [4]. Switched virtual circuit 2.1 WAN Technologies (SVCs) is virtual circuits that are WAN technologies generally function based dynamically established on demand and on the international standard organisation terminated when transmission is complete. (ISO) model network architecture. This Communication over an SVC consists of model is known as the reference model of three phases: circuit establishment, data open systems (OSI) [4]. The transfer and circuit termination. The OSI model has the following seven layers: established phase involves creating the virtual circuit between the source and (1) The physical control layer: This is the destination devices. Data transfer involves level of electronic connections, signal transmitting data between the devices over transmission and data in raw binary the virtual circuit. Circuit termination phase form. involves tearing down the virtual circuit the (2) The data-link layer: The level at which source and destination devices. SVCs are data is transmitted in units using suitable used in situations in which data transmission protocols to control and check correct between devices is sporadic, largely because transmission. SVCs increase used due to the (3) The network layer: The level that circuit establishment and termination provides the control between adjacent phases, but it decrease the cost associated sending and receiving points in the with constant virtual circuit availability. network. The sending and receiving Permanent virtual circuit (PVC) is a points that are able to switch permanently establish circuit that consists of transmission are “nodes” in the network. one mode data transfer. PVCs are used in (4) The transport layer: The level that situation in which data transfer between handles an end-to-end service between devices is constant. PVCs decrease the the host computers it deals with bandwidth use associated with the addressing, error controls and regulated establishment termination of virtual circuits, data transfers. but it increase costs due to constant virtual (5) The session layer: This level handles the availability. PVCs are generally configured establishment of connections between by the service provider when an order is hosts and the management of the dialog. placed for service. Messages crated at this level are addressed by the transport layer and split into packets at the network layer. A modem is a device that interprets digital and (6) The presentation layer: The level that analogue signals, enabling data to be handles the standard forms for transmitted over voice-grade telephone presenting data e.g. the layouts used for lines. At the source, digital signals are VDU displays. converted to a form suitable for transmission over analogue communication facilities. At

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011

the destination, these analogue signals are resiliency. In short consider that the returned to the digital form. WAN is a critical component in CSU/DSU application life cycle. A channel service unit/digital service unit (c) Consider the WAN as an end-to-end (CSU/DSU) is a digital-interface device application delivery service: Avoid used to connect a router to a digital circuit viewing a branch office as a point on the [4]. The CSU/DSU also provides signal network, but view the WAN as a timing for communications between the two comprehensive application delivery devices. platform. This will move it away from point product discussions and toward an ISDN Terminal architect solution, which will hasten development and improve perform-ance. An integrated services digital network (ISDN) terminal adapter is a device used to connect (d) Deploy embedded WAN services first, ISDN basic interface connections to other then special appliances: Before interfaces, such as EIA/TIA – 232 on a deploying an essential WAN Service router [4]. A terminal adapter is essentially such as security, and WAN optimi- an ISDN modem, although it is called a sation, etc., first consider if the WAN terminal adapter because it does not actually service is embedded into an existing convert analogue to digital signals. branch office and aggregation routing platform.

2.2 Principles of WAN Implement- (e) Appliances last resort: If a WAN Service ation is not available as an embedded service within branch and/or aggregation router WANs generally help connecting numerous only then deploy the appliance. When smaller networks, including LANs and comparing WAN services as an MANs. WAN is expected to be stretched appliance versus an embedded service, because of the requirement to cover multiple only deploy the appliance in the case cities, even countries and continents. Some where there are specific features or WANs are immensely widespread across the functions that are must haves and not globe, but the majority does not supply available in the embedded WAN accurate worldwide exposure in terms of Service. coverage and connection. The features of the communication amenities direct to an (f) Broadband first: For new branch offices, importance and prominence on competence seek broadband connections first before of communications techniques in the alternative WAN transport services. devised plans of WANs. In implementing a WAN, the following guiding principles are 2.3 Virtual Private Networks employed: With technology and business requirements (a) Deploy consistent WAN services: The changing at a rapid pace and the continued offices and aggregation routers being need for financial savings, many installed must share a common software Information Technology providers are being image/code base to deliver WAN asked to explore alternatives to traditional services across the WAN. connectivity as a method of reducing their (b) Consider WAN services during branch operating costs. One of these alternatives is application design: When developing virtual private networks. A Virtual Private applications for the branch offices Network (VPN) is a way to use a public deployments, consider WAN attributes telecom-munication infra-structure to such as bandwidth and WAN services to provide remote offices or individual users ensure application performance and with secure access to their organization’s network at a much lower cost. VPN uses

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011

leased lines but connects remote sites vulnerable to the common issues of through an internet service provider (ISP) to outsourcing; little stake hold in the the organization’s central data center. The performance and reliability of the system by VPN infrastructure creates a secure, private the consultants. tunnel between the remote and host sites for There are three primary VPN technologies in use secure data transmission over public lines. today: Trusted VPNs, Secure VPNs and This reduces mileage fees associated with Hybrid VPNs. Secure and trusted VPNs are the leased lines as all long distance traffic is not technically dependent, but they can co- transferred over the internet instead. Data exist. Trusted VPNs implies that the security is maintained by using several customer trusted the VPN provider to forms of data encryption and user validation maintain the integrity of the circuits and to technologies. use the best available business practices to Virtual Private Networks can be constructed using keep from snooping on traffic traveling on several different methods. The most the network. As the popularity of the common forms are software, specialized internet grew, security became more of an stand-alone hard-ware, router add-ons, or issue. Trusted VPNs offer no real security, hosted by the ISP. Software requires a and vendors started to create protocols that computer to be used at each end that runs would allow traffic to be encrypted at the the VPN package. This method is the most edge of one network or at the originating flexible, but could be quite costly due to the computer, moved over the internet like any cost of the server hardware requirements. other data, and then decrypted when it Specialized stand-alone hardware or reached the corporate network or a receiving equipment uses VPN hardware at each site computer. These types of networks are which links the computers at each site referred to as secure VPNs. together and routes the data onto the internet to VPN equipment at the central site. This 2.4 Small and Medium Scale Enter- method is cost effective and simple to prises (SMSE) maintain. Network Router add-ons are There is no generally accepted definition of a small similar in function to the stand-alone and medium business because the hardware, but the add-ons can only work classification of businesses into large-scale, with specific high-end routing equipment. medium-scale, or small-scale is a subjective Generally unless the routing equipment has and qualitative judgement [6]. A small-scale already been deployed in the enterprise, the enterprise is defined as a firm with few staff. purchase of a router simply for VPN use is In countries such as the USA, Britain, and not cost-effective. If however a supported Canada, small-scale business is defined in routing device is already in use, VPN terms of annual turnover and the number of services can be added to the existing paid employees. In Britain, small-scale hardware at a cost comparable to the stand- business is defined as that industry with an alone hardware system, but without the need annual turnover of 2 million pounds or less for extra hardware boxes as the VPN with fewer than 200 paid employees. In services run inside the routing equipment. Japan, small-scale industry is defined These solutions tend to be faster and highly according to the type of industry, paid-up reliable, though more complicated to capital and number of paid employees. configure. An Internet Service Provider Consequently, small and medium-scale hosted VPN takes the technical management enterprises are defined as: those in out of the system. The ISP makes changes, manufacturing with 100 million Yen paid-up manages the system and has control over the capital and 300 employees, those in tunnel that is created. Unfortunately this wholesale trade with 30 million yen paid-up leaves organizations that use a VPN as an capital and 100 employees, and those in the essential core piece of their backbone

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011

retail and service trades with 10 million yen Selected IT professionals and owner- paid-up capital and 50 employees [6]. In managers of SMSE operators were Nigeria, there is no clear-cut definition that interviewed. The questions for the interview distinguishes a purely small-scale enterprise are opened ended questions with the aim of from a medium-scale enterprise. SMSE is giving respondents the opportunity to therefore defined by the National Council of express their own experiences. The study Industries as business enterprises whose will mainly use qualitative analyses to total costs excluding land is not more than analyse the data. This method allows the two hundred million naira. In South Africa subject to share their experience more the term SMME, for small, medium and freely. micro enterprises, is used. Elsewhere in Africa, MSME is used for micro, small and 3.1 Research Design medium enterprises. Professionals and SMSE managers were In many economies, SMSE are also responsible for interviewed in a total of five companies of driving innovation and competition. In the SMSE category that have branches in at European Union, SMSE comprise least four locations outside their head offices approximately 99% of all firms and employ and have implemented WAN wholly or between them about 65 million people. partially. Specifically, five ICT Globally SMSE account for 99% of business professionals/engineers and five SMSE numbers and 40% to 50% of their gross owner-managers were involved in the domestic product (GDP). In India, the interview. Purposive sampling procedure SMSE sector plays a pivotal role in the was used for this study by choosing some IT overall industrial economy of the country. It SMSE firms as case study. Purposive is estimated that in terms of value, the sector sampling demands that researchers think accounts for about 39% of the critically about the parameters of the manufacturing output and around 33% of the population being studied and choose sample total export of the country. Further, in recent case carefully on these bases. The following years the sector has consistently registered were the criteria used in the sampling: higher growth rate compared to the overall . People in ICT as professionals; industrial sector. The major advantage of the . People and or firms that use computer or sector is its employment potential at low configured/implemented a WAN. capital cost. As per available statistics, this

sector employs an estimated 31 million 3.2 Instrumentation persons spread over 12.8 million enterprises and the labour intensity in the sector is Interview questions were selected carefully, they estimated to be almost 4 times higher than were designed to gain an understanding of the large enterprises [6]. WAN, ICT and general computer/computing knowledge and usage within the specific 3.0 MATERIALS AND METHODS SMSE and to discover, if WAN is in use, and how it is implemented. The questions The study made use of interpretive research asked were open ended with the objective methodology in order to answer the overall that they will be answered in detail as question: How can WAN implementation be needed. All the interviews were conducted used by SMSE? This method is an action face to face with all the participants. type of research method that generally Secondary data was collected from makes use of data collection method such as documentation. The documentation includes case study, interview, and participatory the internet, books on WAN, VPN design observation. This approach is considered the books and manuals and how WAN best for obtaining result from Information implementation affects SMSE. The compo- Technology (IT) professionals and business nents used in the design/implementation community who are connected to WAN.

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011

were also assembled and used to established 4.2 Current State of ICT within the connectivity. SMSE Almost all of the respondents agree that their 3.3 Data Analysis Technique businesses use some form of IT or WAN The questions asked during the interview were technology. This seems almost impossible divided into the following logical groupings: in the light of the above discussion on the (a) Workforce knowledge: To understand high levels of computer literacy, but the use the workforce employed by SMSE; of user-friendly tools such as telephone, and credit card machines facilitate the use of (b) Current state of WAN implementation in WAN in this circumstance. Some view SMSE: To establish the current status of technology as important in their businesses, WAN implementation usage within which includes stand-alone computers for SMSE and to establish the technology internal purposes, as well as network used to implement it; environment in more technology-based (c) Awareness of WAN implementation companies. components: To establish the aware-ness of WAN implementation and knowledge 4.3 Awareness of ICT of WAN implementation components Almost all the respondents have some sense of procedures and cost and its benefits to SMSE; understanding of WAN and what the benefit of implementing WAN might be, but not (d) Decision making with regards to WAN enough. They do not know the details of implementation: To establish decision- WAN implementation. making process as regards WAN

implementation within SMSE, Who 4.4 Decision-Making Process with makes decisions? What is WAN Regards to ICT implementation based on? All the respondents indicated that they are the main (e) WAN implementation barriers: To decision makers in their business with establish the barrier that prevents WAN regard to all decisions, including WAN implementation; implementation. All of them indicated that (f) Current processing of information/ when there is a need for technology transmission of data to remote branches: implementation, they go to IT shops to get To establish how SMSE process and advice or they ask friends and family transmit information to remote branches experts. The danger with this approach is of the organisation that they rely on sales people do not have any knowledge of their business to advise 4.0 RESULTS: ANALYSIS AND them on their IT decision. This kind of FINDINGS information will not be strategic, and in line 4.1 Workforce Knowledge with the business goals. This reflects the All the Respondents have a workforce within the lack of IT specialists in the SMSE. All the required range as discussed in the definition respondents have dedicated computer of SME. The number of employees ranges operating staff and only the technical from 10 to 70. The employees have companies have expert technicians to qualifications ranging from Senior School maintain the WAN and all IT issues. They Certificate to tertiary education. This could used their networked environment to imply that an SME requires some level of provide services and sharing of resources literacy, but the problem is that some and WAN for on-line transactions. respondents indicated that their employees were not computer literate. 4.5 Barriers

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011

The respondents listed different barriers that important part of their clients’ lives. The prevent them from adopting or findings reveal the fact that current implementing WAN ranging from socio- technology on WAN implementation is not economic issues to technology-related planned but random. In terms of the issues: lack of money, power cuts, lack of awareness of ICT, the study revealed that knowledge, possibility of fraud, high cost of SMSE do not know much about the WAN ICT equipments, etc. The listed barriers are implementation principles and that they very much in line with the literature, with know very little about implementing WAN. the addition of power cuts as a new barrier This is in agreement with the literature, that is probably unique to Nigeria. Most of which highlights lack of knowledge as a the barriers could possibly be overcome by problem. Businesses rely on information in learning more about WAN implementation, order to make informed decisions that will SMSE employing knowledgeable ICT staff, give them a competitive advantage. etc. The decision-making process is one sided. This confirms the literature that the owner is the 5.0 DISCUSSION OF RESULTS centre of the SMSE business, making all or The responses from the SMSE IT professionals most of the decisions. This is a weakness, as reflect the need for further investigation on indicated in literature, because the owner- how SMSE can achieve understanding of the managers of the SMSE are the decision knowledge economy and the effect of WAN makers in all aspects of the business, implementation on it. The majority of the including IT, without necessarily having participants agreed that to a large extent they proper knowledge of the IT environment. rely on IT to run their businesses. They The owner-managers’ capability gaps or have basic IT technologies implemented at knowledge gaps, intuitive or organic styles, their busi-nessses, such as telephone and motivations will influence his or her devices, and some have . But decisions. Planning the WAN only few of them know a few components implementation is essential if any business that make up a WAN how they wants to implement it successfully. The implemented. The answers reveal that the barriers that were highlighted as major implementation of WAN was not done from problems in Nigeria are lack of knowledge a strategic point of view, but rather on about both the strategic use of WAN and market forces. This situation is aggravated WAN as a concept. Generally, SMSE by the fact that most of the SMSE are cannot afford expensive skills, whether managed by the owners, who make all the WAN implementation or otherwise, because decisions in the business, and do not have of their small turnover and limited budgets. experiences or knowledge of IT. There is Other problems include the ever-changing therefore the need for SMSE proprietors to IT environment, lack of trust/confidence in employ IT specialists, or get consultants to ICT, security, power problems, etc. The advise the SMSE them on implementation problems result to customers experiencing issues of WAN-related matters at a strategic delays because the systems are offline, level. which destroy the benefits that technology should bring to businesses. Most of the On the current sate of WAN implementation benefits of WAN implementation come within the SMSE, the study shows that some from the data captured from the customer, basic technologies such as , fax such as personal details and transactions and standalone computers are already details. The new economy is termed implemented for some sections of the “knowledge economy” because of heavy business, but WAN connectivity and mobile reliance on information and data that is technologies still need to be increased. The turned into knowledge or intelligence. This SMSE recognise that technology is an knowledge is used by businesses to help

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011

their decision-making processes. By changes centrally without the need to touch keeping records of transactions, a business desktops. It is used to connect remote offices can learn and discover new information or branch offices to the central office to about the customers. Business intelligence maintain database consistency. It is also can be used to develop the competitiveness being explored as a means for third parties, of the business, which is a drive for such as consumers, partners and suppliers, to implementation of WAN. connect directly to the organization for updates, accurate product information, 5.1 Considering VPN Technology ordering and billing and a variety of other Virtual Private Networks have become online tasks [8]. It is considered as a remote increasingly important in enter-prises that access solution for employees who travel or require multiple office connectivity and are off-site often and require access to the desire a reduction in their overall costs of central site. The increasing security and doing business. They have the potential to extensive cost savings make VPNs an greatly reduce costs associated with Wide essential ingredient to a successful, low-cost Area Networking and to change the face of network. networks permanently [7]. They are capable of getting data from point A to point B 5.3 WAN and VPN Equipment quicker and less expensive than previous Compared technologies. Using a local Internet service WANs and VPNs use different equipment. Wide provider dial-up line saves an estimated 60- Area Networks require traditional routers 80% over toll-free remote access server and some sort of wide area connection that lines. Cisco Systems estimates that an connects two or more sites together directly. organization with 1000 dial-up users and This can be , ATM, point-to- 3000 users on an 800 number, with an point, or many other types of connections. average number of hours online of only 5 The lines are centralized at one spot and per week per user, will save anywhere from connect to the infrastructure hardware. $376,000 per month to $481,000 per month Virtual Private Networks connect using [8]. The savings depends on whether a VPN devices [9]. These can be hardware or hardware, software, or router solution is software devices that are placed at both chosen. In addition, there is an estimated 20- sides of the connection. Sometimes the 40% savings over dedicated leased lines due connection is established using software on to the elimination of long distance the users’ systems and hardware on the VPN communi-cation charges required for equipment at the host. There are entire traditional Wide Area Networks. Adding software-to-software solutions, however users to the is also they are generally less efficient and may not very simple requiring little time, while be as secure. adding users to a direct dial-up solution can take months [7]. 5.4 VPN Benefits There are several benefits to using Virtual Private 5.2 Management and Organizational Networks. There is inherent reliability in use Implications of VPN of the internet that transfers to VPNs. Low equipment mean time between failures is Virtual Private Networks are used to provide an another benefit, as is the wide selection of organization with many competitive vendors available. Authentication and advantages. Moving to VPN architecture encryption technology advances have also creates additional centralization and the aided in adding benefit to the system. VPN ability to manage users and connections technology has also advanced to provide around the world from a single site. The better encryption, more reliable service and management utilities available with a VPN more users per device than ever before. allow for network managers to make

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011

Competition increasing and VPN . Integrated Management: Network standardization in many companies has management that integrates WAN increased the opportunity for better services configuration, trouble-shooting, equipment at less expensive prices. VPN fault isolation as well as security equipment takes less physical room than in management including threat reporting, the past, and provides better service and compliance reporting, constant audits, a reliability [9] [10]. The potential cost means to monitor application savings for companies using Virtual Private performance; Networks in place of traditional Wide Area . Application of encryption/security Networks is significant. across different branches, data centres and head office; 6.0 CONCLUSION AND RECOM- . SMSE proprietors should be involved in MENDATIONS ICT related workshops and seminars to The paper provides an answer to how a WAN increase their knowledge base; implementation can be used by SMSE, . Government should encourage SMSE by based on a new economy known as the having a team of professionals to “knowledge economy”. WAN constantly educate SMSE proprietors implementation is a multi-disciplinary and employees on the use of modern subject and an enabler for global business in ICT systems. different ways, including: general (for administrative purposes), production- integrating (to support business processes 7.0 REFERENCES and the production of goods and services), Comer D. (2006). The Internet Book. Prentice market-oriented (for marketing purposes, Hall, New York. and increasing the company presence on the André B.B. (2000). Characteristics of web). The implementation of WAN should Scalability and their impact on take into consideration that SMSE are Performance. Proceedings of the 2nd different and have different needs. It is International Workshop on Software and important for an SMSE to implement Performance, Ottawa, Canada, pp. 195- solutions that are specific to its needs. A 203. number of barriers make it difficult for Andrew S.T. (2002). Computer Networks, 4th SMSE to implement WAN, such as lack of Edition, Prentice Hall, New York. knowledge/awareness, lack of necessary Cisco IOS. Wide Area Networking Solutions. skills, perceived high setup cost, the Cisco Press, Indianapolis. constantly changing IT environment, and Ekpenyong D. and Nyong M.O. (1992). Small particularly unsteady power supply in and Medium-Scale Enterprises in Nigeria. These problems are both socio- Nigeria: Their characteristics, problems economic and technological. SMSE should and sources of finance. African therefore take advantage of various Economic Research Consortium, emerging technologies provided by mobile Nairobi, Paper 16. communication technologies. The number of Onugu B.A.N. (2005). Small and Medium cell phones with or high-speed networks Enterprises (SMEs) in Nigeria: Problems has increased. This is a market which the and Prospects. PhD Thesis, St Clements SMSE could be exploiting. The following University. recommendations are suggested for WAN VPN Consortium (2003). VPN Technolo-gies: implementations: Definitions and Requirements. [Online]. . Consistent WAN optimisation and Available at: http://www. performance routing; informationweek.com, accessed: 20/03/2011. . VPN and WAN Scalability;

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011

Green J.H. (2001). The Irwin Handbook of http://www.gartner.com, accessed: Management. 23/03/2011 McGraw Hill, New York. Virtual Private Networks White Paper (2003). Gartner Group (2002). Securing Public [Online]. Available at: http:// WLANs: VPNs Will Not Solve www.intel.com, accessed: 24/03/2011. Everything. [Online]. Available at:

NIGERIA COMPUTER SOCIETY (NCS): 10TH INTERNATIONAL CONFERENCE – JULY 25-29, 2011