Fits Servlevel
Fits Servlevel
Fits Servlevel
Management
Key
Glossary term: Glossary term
Cross reference: Cross reference
Service Level Management
© Becta 2004
You may reproduce this material free of charge in any format or medium without
specific permission, provided you are not reproducing it for profit, material or financial
gain. You must reproduce the material accurately and not use it in a misleading context.
If you are republishing the material or issuing it to others, you must acknowledge its
source, copyright status and date of publication.
Publication date March 2004
Originally published online in September 2003 as part of the Becta website
http://www.becta.org.uk/tsas
While every care has been taken in the compilation of this information to ensure that it is
accurate at the time of publication, Becta cannot be held responsible for any loss, damage or
inconvenience caused as a result of any error or inaccuracy within these pages. Although all
references to external sources (including any sites linked to the Becta site) are checked both
at the time of compilation and on a regular basis, Becta does not accept any responsibility
for or otherwise endorse any product or information contained in these pages, including
any sources.
Service Level Management
SLM2 Overview
SLM 2.1 What is Service Level Management?
Service Level Management is the process of ensuring that ICT services are supported to an
acceptable level. It involves understanding the ICT requirements of the end- users and
working within the constraints of the resources available to agree a level of service that
end-users can expect consistently. This agreement is between those responsible for ICT and
the end-users, who are usually represented by one or more people from each unique area or
department.
When the services themselves and the level of service to be provided have been agreed,
the Service Level Management process facilitates the creation of underpinning
agreements with other departments or third parties involved in the service provision.
It is important to understand the difference between services and levels of service:
Services are the ICT facilities themselves, such as printing, bookkeeping, word
Services processing, data storage, internet access, email and so on.
Levels of service are the availability and maintenance of those services and the speed of
response to incidents and requests. You could offer, for example, email availability from
Levels of service
0800 to 1800 Monday to Friday with a four-hour response time to resolve an incident and
a two-day response time for a new account set up.
01
Document
services Service
step
catalogue
:
Agreed services
02
step
store in
Configuration
:
Management
Agreed service
levels 03 database
store in store in
step
:
Service
Publish service
levels
04 level
agreements
step
:
Define and
implement step
05
contracts Operational
: level
agreements
Review service 06
step
:
FITS implementation
for continuous improvement.
information
Long-term scope
In the long term, Service Level Management should be an iterative process to ensure that the
service provided is what is required. Technology and user requirements change and failure
to review service levels repeatedly may result in the service provided becoming outdated
and inappropriate.
Ultimately, FITS Service Level Management should enable a simple service level agreement
to be drawn up and maintained, which will help ICT/technical support staff to focus
their activities appropriately and ensure that suppliers do the same. This should also be
tied to a regular reporting process that enables you to monitor service levels provided by
internal technical support and third-party suppliers.
However, as with all of the FITS processes, benefit can be derived from starting small and
building on solid foundations. We also recognise that you have limited time to spend on
management tasks when operational tasks must come first. Initially, therefore, we will focus
on steps leading towards this longer-term aim.
Short-term scope
In the short term, it is good preparation for full service level management to begin by
gathering information about all of the ICT services currently in use and how they are
delivered, and listing them. This alone will have benefits, as it will make clear exactly what
hardware and software you have and what needs to be supported. Only once you know this is
it possible to understand what rationalisation may improve stability or reduce skill
requirements. It may also identify equipment that no longer needs
to be supported or that is inappropriate or unauthorised. All of these things help technical
support staff to see the bigger picture and prioritise their work to best effect. Add to this
some simple reporting on the levels of service currently being provided and you have a
foundation for review, discussion and agreement on what is possible and what is needed.
Service level management encompasses all aspects of service provision, which means
that you must implement all service management processes in order to achieve a full
set of data for reporting purposes. In the short term, therefore, you should implement
all of the other FITS processes before considering developing Service Level
Management further.
SLM 3.2 Prepare to implement
Thorough preparation can make the difference between a successful implementation of a
process and an unsuccessful one.
The first step is to identify the process participants and assign roles and responsibilities.
We recommend that, for initial implementation, you involve as few people as possible
in the process. This means that it can become familiar with
Roles and minimum impact on the day-to-day workload of the school. The people you select to
responsibilities fulfil the service level management roles will depend on how you currently provide
technical support and who is involved already. SLM 3.2.1 Assign roles and responsibilities
offers some suggestions and guidance. Further details can also be found in SLM 5 Roles
and responsibilities.
After you have assigned roles and responsibilities, it is important to ensure that those
Training participating in the implementation and subsequent operation of the process understand
what is required of them. Use this website as part of your training.
Set a start date. A ‘go-live’ date is important in any implementation. Make sure that you
Start date allow enough time for all the preparatory tasks to be carried out before your ‘go-live’
date.
Before you can go ahead with the implementation, prepare all the materials required
Materials for the process. Make sure that you have downloaded the templates you need (see
Appendices) and that everyone involved has access to them.
The first stage of service level management is information gathering and producing
basic reports, many of which are already defined and set up in other FITS processes, so
it is not strictly necessary to carry out a pilot.
Pilot Service level management is something that is refined over time. Details of services will
change and reports will evolve. At this stage we recommend that you produce reports for
internal ICT use only. However, if you do choose to issue them to end-users, we
recommend that you pilot them with a small group first to ensure that the information
is accurate and that users can interpret them.
All of the FITS processes contribute to ICT service management and therefore
all are relevant to the Service Level Management process. However, this does not
necessarily mean that they must all be in place before you embark on service level
management. If you have implemented some of the FITS processes already, you should be
able to produce some statistical information that can be included in early service level
Prerequisites management reporting. But if you have not, you can identify the reporting
requirements you need for service level management and implement the processes one by
one to produce the required information.
The implementation of FITS is an ongoing task that may be constantly reviewed and
refined, so it is perfectly appropriate for the development of service level agreements
and reports to be carried out by incorporating feedback from users.
Role Suggested representative(s) Comments
Person with overall responsibility for Although there may be many service
technical support or ICT in general, for managers assigned to separate groups
instance: of end-users, it is unlikely that more
than one would be needed or
• ICT manager appropriate in a school.
• ICT co-ordinator The service manager should be
Service manager • network manager someone with an overview of the
technical support provision, from within
• technician. the technical support or ICT area.
The service manager should not be a
user representative but a technical
support representative.
01
Document
services Service
step:
catalogue
Agreed services
02
step:
store in
Configuration
Management
Agreed service
levels 03 database
store in store in
step
:
Service
Publish service
levels
04 level
agreements
step:
Define and
05
step:
implement
contracts Operational
level
agreements
Review service 06
step
:
Identify each component with its unique ID if it has been assigned – this is dealt with in
Component Configuration Management. If you have not assigned unique IDs yet, leave this blank
unique ID until you do. The information is to help you identify physical pieces of equipment when
trying to diagnose a service failure.
List the end-users of this service (not the components). List job titles, functions or
End-users departments. Avoid using people’s names – if someone leaves and the catalogue is not
updated with their replacement's name, you may not know in future to whom it refers.
Be explicit – don’t put ‘most users’ or ‘some users in Humanities’.
Record the function, department or third party responsible for supporting the
Supported by components of the service.
List the hours of availability of the support service for the components.
Hours of support
Date last updated Enter the date the service catalogue record was last updated. It is good practice to indicate
when records were changed.
Include useful statistics on the handling of incidents and requests that indicate the level
Reactive statistics of service being provided.
We have created a service report template to help you get started. See also our
example service report (see Appendix D).
Produce service reports regularly, not randomly. Random reports make it hard to
SLM 4.1.2 Produce identify trends. Choose a frequency and structure and stick to it for a while, then review
service report its suitability and adjust accordingly. Avoid introducing change with every report to
allow the ‘picture’ to build.
Review all service reports soon after they have been produced. Reports are of no
SLM 4.1.3 Review value if they are not acted on and they are hard to follow up if they are old.
service levels
SLM 4.1.1 The person responsible for ICT technical support, with the overt backing of the
Implement FITS headteacher, should direct the implementation of the FITS processes.
processes
The service manager is responsible for producing service reports, but may delegate aspects
SLM 4.1.2 Produce of this task as appropriate.
service report
Step Tasks
Document existing services and agree them with Create a service catalogue listing all the ICT services
end-users. your school provides to end-users and that receive
technical support. These will be services rather than
equipment.
Decide what service levels are required for Decide on what is the acceptable availability of
each service. services, including how quickly incidents and
problems should be resolved. Where possible, place
services in order of priority to help ensure that you
focus resources in the most appropriate way. This may
also include defining and publishing service level
agreements.
Ensure that agreed services can be supported to Define support requirements and resource them. This
the level decided. may involve using internal technical support staff,
third-party suppliers or a mixture of the two. It is
important that any underpinning contracts with other
groups or suppliers make it possible for those
responsible for ICT technical support to meet the
agreed service levels.
SLM 6.1.3 What you should have achieved through Service Level Management
• You have a catalogue of authorised ICT services, which you always keep up to date
with changes.
• A clearer picture is forming of the levels of service being provided to ICT users.
• Target service levels are emerging and being aimed at.
• You have implemented all of the other FITS processes.
• You regularly create and review service reports.
• Regular review meetings may take place with end-user representatives.
• Findings from reports and review meetings result in an improved level of service.
You have assigned roles and responsibilities. SLM 3.2.1 Assign roles and responsibilities in
Service Level Management
Those involved in service level management SLM 2 Overview of Service Level Management
understand the process.
A service catalogue documents all services in use. SLM 3.3.1 Document services
You have estimated current service levels and SLM 3.3.2 Estimate service levels
included your findings in the service catalogue.
You produce regular service reports that include SLM 4.1.2 Produce service report
consistent and relevant information on all FITS SLM 4.2 When does it need doing?
processes.
SLM 4.3 Who does it?
SLM 4.1.1 Implement FITS processes
You review service levels regularly. SLM 4.1.3 Review service levels
SLM 4.2 When does it need doing?
SLM 4.3 Who does it?
Printer, computer, cable, ink cartridge, paper, printer driver, electrical power
Printing
File server, computer, network operating system, computer operating system, routers,
Shared data switches, hubs, network cabling, communication links, electrical power
storage
B
SLM Appendix
Framework for ICT Technical Support (FITS)
Service Level Management example service catalogue
Service Details Service level details
Services Components Component End-users Component Response Fix time Supported by Hours of Date Date last
unique ID availability time support recorded updated
Email Email server (hardware) 12 All departments 0800 - 1800 M-F 1 hour 2 hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
Email server (software) 15 0800 - 1800 M-F 4 hours 8 hours Email software Ltd 1400-2200 M-F 11-Jul-03 12-Jul-03
File server O/S 91 0800 - 1800 M-F 30 minutes 1 hour Internal ICT technical support 0800-1800 M-F 10-Jul-03 11-Jul-03
Router 0800 - 1800 M-F 1 hour 2 hours XYZ 0830-1730 M-F 10-Jul-03 11-Jul-03
0800 - 1800 M-F Hardware Maintenance 30 minutes 1 hour 0800-1800 M-F 10-Jul-03 11-Jul-03
4 Internal ICT technical support
LAN
N/A
School Administration Applications file server 1 Head Teacher 0800 - 1800 M-F 1 hour 2 hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
SAS Department Heads 0800 - 1800 M-F 30 minutes 2 hours LEA 0800-1800 M-F 10-Jul-03 11-Jul-03
Admin Assistant 0800 - 1800 M-F 1 hour 2 hours XYZ 0830-1730 M-F 10-Jul-03 11-Jul-03
35 0800 - 1800 M-F Hardware Maintenance 1 hour 2 0830-1730 M-F 10-Jul-03 11-Jul-03
Router 0800 - 1800 M-F hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
0800 - 1800 M-F 1 hour 2 hours XYZ 0800-1800 M-F 10-Jul-03 11-Jul-03
3 Hardware Maintenance 30 minutes 1 hour
Router Internal ICT technical support
4
Router
5
LAN
N/A
Printing mono Printer server 15 All departments 0800 - 1800 M-F 1 hour 2 hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
File server O/S 91 0800 - 1800 M-F 30 minutes 1 hour Internal ICT technical support 0800-1800 M-F 10-Jul-03 11-Jul-03
Laserjet 40 0800 - 1800 M-F 1 hour 2 hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
Laserjet 41 0800 - 1800 M-F 1 hour 2 hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
Inkjet 42 0800 - 1800 M-F 1 hour 2 hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
B
SCM Appendix
Framework for ICT Technical Support (FITS) Becta | ICT Advice
Service Level Management example service catalogue
Consumables N/A 0800 - 1800 M-F 15 minutes 30 minutes Internal ICT technical support 0800-1800 M-F 10-Jul-03 11-Jul-03
Router 3 0800 - 1800 M-F 1 hour 2 hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
Router 4 0800 - 1800 M-F 1 hour 2 hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
Router 5 0800 - 1800 M-F 1 hour 2 hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
LAN N/A 0800 - 1800 M-F 30 minutes 1 hour Internal ICT technical support 0800-1800 M-F 10-Jul-03 11-Jul-03
Printing colour Printer server 15 All departments 0800 - 1800 M-F 1 hour 2 hours XYZ Hardware Maintenance 0830-1730 M-F 10-Jul-03 11-Jul-03
French GCSE software has been • Identify who has installed this.
installed locally on two computers and a • Locate licences or remove software.
Have you laptop in Classroom 2. There is no
support for this at the moment. We • Identify supplier.
identified services
you didn't didn’t do this so we don't know where • Identify support terms and costs.
the licences are.
know existed? • Review costs with headteacher and
head of languages.
Report period:
Incidents and problems logged this period March Average time to resolution of
incidents and problems
50 to
Number of 8 Average time
40 June
incidents to incident
logged 6 resolution
30
Volume
2003
Days
Number of 4 Average time
20 problems to problem
logged 2 resolution
10
0
0
1
1
Date Date
50 40
Number of Number of
40 30
incidents referred incidents fixed by
30 by Service Desk
Volume
visit
Volume
20
20 Number of Number of
incidents resolved 10 incidents fixed
10 by Service Desk remotely
0 0
1
Month Month
20 14 Number of
12 computers
Number of installed
15 10
incidents still
Number of
Volume
Volume
open 8
10 software
Number of 6
applications
5 problems still 4 installed
open 2 Number of
0 0 printers
1 1 installed
Month Date
7 70
6 60 Available server
Number of
5 requests for 50 disk space
Volume
Gigabytes
1 1
Date Date
Glossary
A networking standard that supports data transfer rates up to 100 Mbps (100 megabits per
second). 10Base-T is based on the older Ethernet standard but is 10 times faster than
10Base-T Ethernet; it is often referred to as Fast Ethernet. Officially, the 10Base-T standard is IEEE
802.3u. Like Ethernet, 10Base-T is based on the CSMA/CD LAN access method.
Inexpensive LAN (local area network) architecture built into all Apple Macintosh
computers and laser printers. AppleTalk supports Apple’s LocalTalk cabling scheme, as well
AppleTalk as Ethernet and IBM Token Ring. It can connect Macintosh computers and printers, and
even PCs if they are equipped with special AppleTalk hardware and software.
Availability To ensure that ICT services are available for use consistently as agreed.
Management
The amount of data that can be transmitted in a fixed amount of time. For digital
Bandwidth
devices, the bandwidth is usually expressed in bits per second (bps).
A device that connects two LANs (local area networks), or two segments of the same LAN
Bridge
that use the same protocol, such as Ethernet or Token Ring.
A temporary storage area, usually in RAM. The purpose of most buffers is to act as a
Buffer
holding area, enabling the CPU to manipulate data before transferring it to a device.
The final stage in producing a usable configuration. The process involves taking one or
Build more input configuration items and processing (building) them to create one or more
output configuration items (eg software compile and load).
Ability of available supply of processing power to match the demands made on it by the
Capacity
business, both now and in the future.
Capacity To ensure that all ICT processing and storage capacity provision match present and
Management evolving needs.
The client part of a client/server architecture. Typically, a client is an application that runs
on a personal computer or workstation and relies on a server to perform some operations.
Client
For example, an email client is an application that enables you to send and receive email.
Configuration A database which contains all relevant details of each ICT asset, otherwise known as a
management configuration item (CI), and details of the important relationships between CIs.
database (CMDB)
The library in which the definitive authorised versions of all software CIs are stored and
Definitive protected. It is a physical library or storage repository where master copies of software
software library versions are placed. This one logical storage area may in reality consist of one or more
(DSL) physical software libraries or filestores. They should be separate from development and test
filestore areas. The DSL may also include a physical store (fire- proof safe, for example) to
hold master copies of bought-in software. Only authorised software, strictly controlled by
Change Management and Release Management, should be accepted into the DSL.
The DSL exists not directly because of the needs of the Configuration Management process,
but as a common base for the Release Management and Configuration Management
processes.
A signal informing a program that an event has occurred. When a program receives an
Error trap interrupt signal, it takes a specified action (which can be to ignore the signal).
Interrupt signals can cause a program to suspend itself temporarily to service the
interrupt.
A LAN (local area network) architecture developed in 1976 by Xerox Corporation in co-
operation with DEC and Intel. Ethernet uses a bus or star topology and supports data
Ethernet transfer rates of 10 Mbps. The Ethernet specification served as the basis for the IEEE 802.3
standard, which specifies the physical and lower software layers. Ethernet is one of the
most widely implemented LAN standards.
A set of ANSI protocols for sending digital data over fibre optic cable. FDDI networks
FDDI (Fibre
Distributed Data are token-passing networks, and support data rates of up to 100 Mbps (100 million
Interface) bits) per second. FDDI networks are typically used as backbones for wide area
networks.
Financial To ensure that the ICT and technical resources are implemented and managed in a cost-
Management effective way.
A system designed to prevent unauthorised access to or from a private network. Firewalls
can be implemented in both hardware and software, or a combination of both. Firewalls are
Firewall frequently used to prevent unauthorised internet users from accessing private networks
connected to the internet, especially intranets. All messages entering or leaving the intranet
pass through the firewall, which examines each message and blocks those that do not meet
the specified security criteria.
When used to describe data transfer rates, it refers to 10 to the 9th power
Gigabit (1,000,000,000) bits. Gigabit is abbreviated Gb, as opposed to gigabyte, which is
abbreviated GB.
The underlying protocol used by the World Wide Web. HTTP defines how messages are
HTTP formatted and transmitted, and what actions web servers and browsers should take in
(hypertext response to various commands. For example, when you enter a URL in your browser,
transfer protocol) this actually sends an HTTP command to the web server directing it to fetch and transmit
the requested web page.
A connection point for devices in a network. Hubs are commonly used to connect
Hub segments of a LAN (local area network). A hub contains multiple ports. When a packet
arrives at one port, it is copied to the other ports so that all segments of the LAN can see
all packets.
Any event which is not part of the standard operation of a service and which causes, or
Incident
may cause, an interruption to, or a reduction in, the quality of that service.
Incident To detect, diagnose and resolve ICT incidents as quickly as possible and minimise their
Management adverse impact on normal operation.
The logical topology is the way that the signals act on the network media, or the way
Logical topology that the data passes through the network from one device to the next without regard to
the physical interconnection of the devices.
Each device on a network can be identified by its MAC address, a hardware address that
MAC (media uniquely identifies each node of a network. In IEEE 802 networks, the data link control
access control) (DLC) layer of the OSI reference model is divided into two sub-layers: the logical link
address control (LLC) layer and the MAC layer. The MAC layer interfaces directly with the
network media. Consequently, each different type of network media requires a different
MAC layer.
A management information base (MIB) is a database of objects that can be monitored
Management
information base by a network management system. Both SNMP and RMON use standardised MIB
(MIB) formats that allow any SNMP and RMON tools to monitor any device defined by a
MIB.
A group of two or more computer systems linked together. The two types of computer
Network networks of interest to schools are LANs (local area networks) and WANs (wide area
networks).
A processing location. A node can be a workstation or some other device, such as a printer.
Node Every node has a unique network address, sometimes called a data link control (DLC)
address or media access control (MAC) address.
The OSI (open system interconnection) model defines a networking framework for
OSI reference implementing protocols in seven layers. Control is passed from one layer to the next,
model starting at the application layer in one station, and proceeding to the bottom layer, over
the channel to the next station, and back up the hierarchy.
A piece of a message transmitted over a packet-switching network. One of the key features
Packet
of a packet is that it contains the destination address in addition to the data.
Refers to protocols in which messages are divided into packets before they are sent. Each
Packet packet is then transmitted individually and can even follow different routes to its
switching destination. Once all the packets forming a message arrive at the destination, they are
recompiled into the original message.
The physical layout of devices on a network. Every LAN (local area network) has a
Physical
topology topology – the way the devices on a network are arranged and how they
communicate with each other.
In TCP/IP and UDP networks, an endpoint to a logical connection. The port number
Port
identifies what type of port it is. For example, port 80 is used for HTTP traffic.
Problem The detection of the underlying causes of incidents and their resolution and
Management prevention.
A set of network protocol layers that work together. The OSI reference model that defines
Protocol stack seven protocol layers is often called a stack, as is the set of TCP/IP protocols that define
communication over the internet.
A server that sits between a client application, such as a web browser, and a real server. It
Proxy server intercepts all requests to the real server to see if it can fulfil the requests itself. If not, it
forwards the request to the real server.
To plan, test and manage the successful implementation of software and hardware. To
Release
Management define release policy and to ensure that master copies of all software are secured centrally.
Remote Remote monitoring (RMON) is a network management protocol that allows network
monitoring information to be gathered at a single workstation. For RMON to work, network devices
(RMON) such as hubs and switches must be designed to support it.
Request for Form or screen used to record details of a request for a change to any CI within an
change infrastructure, or to procedures and items associated with the infrastructure.
A device that forwards data packets along networks. A router is connected to at least two
Router networks, commonly two LANs (local area networks) or WANs (wide area networks) or a
LAN and its ISP’s network. Routers are located at gateways, the places where two or more
networks connect.
A workstation or device on a network that manages network resources. For example, a file
server is a computer and storage device dedicated to storing files. Any user on the network
Server can store files on the server. A print server is a computer that manages one or more printers,
and a network server is a computer that manages network traffic. A database server is a
computer system that processes database queries.
Service Continuity To minimise the impact on ICT service of an environmental disaster and put in place and
Management communicate a plan for recovery.
The single point of contact within the school for all users of ICT and the services
Service Desk
provided by Technical Support.
Service level Written agreement between a service provider and the customer(s) that documents agreed
agreement service levels for a service.
Service Level The process of defining, agreeing and documenting required service levels and
Management ensuring that these levels are met.
A set of protocols for managing complex networks. SNMP works by sending messages,
Simple network
management called protocol data units (PDUs), to different parts of a network. SNMP- compliant
protocol (SNMP) devices, called agents, store data about themselves in management information bases
(MIBs) and return this data to the SNMP requesters.
A LAN (local area network) that uses a star topology in which all nodes are connected to
Star topology a central computer. The main advantages of a star network are that one malfunctioning
node does not affect the rest of the network and that it is easy to add and remove nodes.
A device that filters and forwards packets between segments of a LAN (local area network).
Switch Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3)
of the OSI reference model and therefore support any packet protocol.
TCP/IP The suite of communications protocols used to connect hosts on the internet.
(Transmission TCP/IP uses several protocols, the two main ones being TCP and IP.
Control
Protocol/Internet
Protocol)
A type of computer network in which all the computers are arranged (schematically) in a
Token ring circle. A token, which is a special bit pattern, travels around the circle. To send a message, a
computer catches the token, attaches a message to it, and then lets it continue to travel
around the network.
A connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP
User datagram provides very few error recovery services, offering instead a direct way to send and receive
protocol (UDP) datagrams over an IP network. It is used primarily for broadcasting messages over a
network.
A computer network that spans a relatively large geographical area. Typically, a wide area
network (WAN) consists of two or more LANs (local area networks). Computers connected
WA to a wide area network are often connected through public networks, such as the telephone
N system. They can also be connected through leased lines or satellites. The largest WAN in
existence is the internet.