{"title":"实现企业ATM网络","authors":"F.M. Groom","doi":"10.1109/ETACOM.1996.502466","DOIUrl":null,"url":null,"abstract":"This paper proposes the strategy of conducting a staged and controlled implementation of an ATM LAN within an enterprise in order to reducing the risk to the general corporate user as legacy connections are replaced. Project implementation is broken into eight separate sub-projects, each of which can stand on its own once implemented.","PeriodicalId":130942,"journal":{"name":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1996-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementing an enterprise ATM network\",\"authors\":\"F.M. Groom\",\"doi\":\"10.1109/ETACOM.1996.502466\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes the strategy of conducting a staged and controlled implementation of an ATM LAN within an enterprise in order to reducing the risk to the general corporate user as legacy connections are replaced. Project implementation is broken into eight separate sub-projects, each of which can stand on its own once implemented.\",\"PeriodicalId\":130942,\"journal\":{\"name\":\"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1996-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETACOM.1996.502466\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETACOM.1996.502466","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper proposes the strategy of conducting a staged and controlled implementation of an ATM LAN within an enterprise in order to reducing the risk to the general corporate user as legacy connections are replaced. Project implementation is broken into eight separate sub-projects, each of which can stand on its own once implemented.