Network Quality of Service for Enterprise Resource Planning Systems: A Case Study Approach

Network Quality of Service for Enterprise Resource Planning Systems: A Case Study Approach

Ted Chia-Han Lo (University of Auckland, New Zealand) and Jairo Gutiérrez (University of Auckland, New Zealand)
DOI: 10.4018/978-1-59904-274-9.ch004
OnDemand PDF Download:
$37.50

Abstract

The research reported in this chapter studied the relevance of the application of network quality of service (QoS) technologies for modern enterprise resource planning (ERP) systems, explored the state-of-art for QoS technologies and implementations, and finally provided a framework for the provision of QoS for ERP systems that utilise Internet protocol (IP) networks. The motivation for conducting this research has been the fact that, to date, there is a dearth of literature on the realisation of network QoS for mission-critical ERP systems. Nor have the current implementations of QoS been studied with the objective of developing a practical framework, based on the knowledge and experiences of the practitioners, to allow a structured approach for the provision of QoS for modern ERP systems. Due to the intent and the nature of the research, an interpretivist research paradigm underlies the work and informed a qualitative research method. Based upon the research problem and the context of research, a case study research method has been selected. Four individual cases—including both leading ERP vendors and network technology vendors—were conducted. The primary data collection was done using semi-structured interviews and this data was supplemented by an extensive array of secondary material. The case data collected was then analysed using qualitative data analysis strategies derived from the existing literature. Cross-case analysis confirmed that the traditional approaches for ensuring the performance of ERP systems on IP networks do not address network congestion and latency effectively, nor do they offer guaranteed network service quality for ERP systems. Moreover, a cross-case comparative data analysis was used to review the pattern of existing QoS implementations and it concluded that while QoS is increasingly being acknowledged by enterprises as an important issue, its deployment remains limited. The findings from the cross-case analysis ultimately became the basis of the proposed framework for the provision of network QoS for ERP systems. The proposed framework focuses on providing a structured, yet practical approach to implement end-to-end IP QoS that accommodates both ERP systems and their Web-enabled versions based on state-of-art traffic classification mechanisms. The value of the research is envisioned to be most visible for two major audiences: enterprises that currently utilise best-effort IP networks for their ERP deployments and ERP vendors.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Jairo Gutierrez
Chapter 1
Varadharajan Sridhar, June Park
Survivability, also known as terminal reliability, refers to keeping at least one path between specified network nodes so that some or all of... Sample PDF
Design of High Capacity Survivable Networks
$37.50
Chapter 2
Mohamed Hammami, Youssef Chahir, Liming Chen
Along with the ever growing Web is the proliferation of objectionable content, such as sex, violence, racism, and so forth. We need efficient tools... Sample PDF
A Data Mining Driven Approach for Web Classification and Filtering Based on Multimodal Content Analysis
$37.50
Chapter 3
Bryan Houliston, Nurul Sarkar
Wi-Fi (also known as IEEE 802.11b) networks are gaining widespread popularity as wireless local area networks (WLANs) due to their simplicity in... Sample PDF
Wi-Fi Deployment in Large New Zealand Organizations: A Survey
$37.50
Chapter 4
Kevin Curran, Noel Broderick
Over the years the number of Web users has increased dramatically unfortunately leading to the inherent problem of congestion. This can affect each... Sample PDF
Prevalent Factors Involved in Delays Associated with Page Downloads
$37.50
Chapter 5
Ted Chia-Han Lo, Jairo Gutiérrez
The research reported in this chapter studied the relevance of the application of network quality of service (QoS) technologies for modern... Sample PDF
Network Quality of Service for Enterprise Resource Planning Systems: A Case Study Approach
$37.50
Chapter 6
César García-Díaz, Fernando Beltrán
Congestion effects are the negative externalities or social costs that users generate on each other when using a shared network resource. Under a... Sample PDF
Cost-Based Congestion Pricing in Network Priority Models Using Axiomatic Cost Allocation Methods
$37.50
Chapter 7
Ismail Khalil Ibrahim, Ashraf Ahmad, David Taniar
Mobile multimedia, referring to multimedia information exchange over wireless networks or wireless Internet, is made possible due to the popularity... Sample PDF
Mobile Multimedia: Communication Technologies, Business Drivers, Service and Applications
$37.50
Chapter 8
Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan
The emerging of wireless computing motivates radical changes of how information is obtained. Our paper discusses a practical realisation of an... Sample PDF
Mobile Information Systems in a Hospital Organization Setting
$37.50
Chapter 9
Say Ying Lim, David Taniar, Bala Srinivasan
In this chapter, we present an extensive study of the available types of data caching in a mobile database environment. We explore the different... Sample PDF
Data Caching in a Mobile Database Environment
$37.50
Chapter 10
John Goh, David Taniar
Mining walking pattern from mobile users represents an interesting research area in the field of data mining which is about extracting patterns and... Sample PDF
Mining Walking Pattern from Mobile Users
$37.50
Chapter 11
Subhankar Dhar
This chapter presents the current state of the art of mobile ad hoc network and some important problems and challenges related to routing, power... Sample PDF
Applications and Future Trends in Mobile Ad Hoc Networks
$37.50
Chapter 12
Kevin Curran, Elaine Smyth
Signal leakage means that wireless network communications can be picked up outside the physical boundaries of the building in which they are being... Sample PDF
Addressing WiFi Security Concerns
$37.50
Chapter 13
Byung Kwan Lee, Seung Hae Yang, Tai-Chi Lee
Unlike SET (secure electronic transaction) protocol. This chapter proposes a SEEP (highly secure electronic payment) protocol, which uses ECC... Sample PDF
A SEEP Protocol Design Using 3BC, ECC(F2m) and HECC Algorithm
$37.50
Chapter 14
Kevin Curran, John Honan
This chapter investigates the problem of e-mail spam, and identifies methods to minimize the volumes. The analysis focuses on the hashcash... Sample PDF
Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
$37.50
About the Authors