Web hosting. Web hosting

Size: px
Start display at page:

Download "Web hosting. Web hosting"

Transcription

1 Web hosting Web hosting Becta 2004 Valid at September 2004 page 1 of 7

2 Web hosting Contents 1 Introduction What is web hosting? What different hosting options are available? Virtual hosting Dedicated hosting Do it yourself What are the requirements for hosting a site? Technical expertise Internet connection What do I need to be aware of when hosting a website? Secure transactions Interactivity Dealing with suppliers Remote administration Frequently asked questions What connection speed will I need? How does web hosting influence network security? Will I require a static IP address? Should I have a disaster-recovery procedure in place? How do I get a.sch.uk,.gov.uk or.ac.uk domain name? What are the costs of web hosting? Summary Supporting material Useful links and resources... 7 Becta 2004 Valid at September 2004 page 2 of 7

3 1 Introduction The purpose of this technical paper is to give an overview of web hosting and how to use it in education. The paper will introduce what web hosting is, outline the different hosting options available and answer some frequently asked questions. The paper aims to highlight some of the key issues to consider before embarking on a web-hosting project. 2 What is web hosting? The term 'hosting' refers to the storage, retrieval and technical maintenance of web pages, whether public or private. 'Web hosting' is hosting in the public domain, making content available to all internet users. At its most basic, a host is an always-on computer with two-way links to other computers on the internet, and a server is a computer with software that supplies services to another computer. Any arrangement for web hosting must therefore comprise a host computer and a server, where the server stores the web pages in a form that can be accessed and read through the host. Usually the host and the server are the same machine. Web pages are the information sources on the World Wide Web. It is easy to create web pages using hypertext mark-up language (HTML), and this allows you quickly to publish information to a global audience. Web pages can form a private document or be part of an intranet or public website, depending on the access allowed to the host computer. 3 What different hosting options are available? There are three different arrangements for hosting a website, each with different levels of flexibility, complexity and cost. 3.1 Virtual hosting Virtual hosting typically includes domain name, addresses and website file storage. You manage a website by using either the virtual host's web-based management and creation interface or by using FTP (file transfer protocol) software. Virtual hosting is located at the internet service provider (ISP) or third-party supplier, with hosting space shared on one computer by a number of website operators. Each website operator can control the file structure of their own website, but they cannot affect the operation of the server or install new software. Virtual servers are a cost-effective means of providing a basic internet presence, but they tend to be inflexible and can restrict the level of interactivity of your website. Virtual servers are not suitable for sites that are likely to generate considerable traffic or place a heavy burden on the server. Some hosts limit the number of downloads per month. 3.2 Dedicated hosting A dedicated hosted website has its own server, which it does not have to share with any other websites. Administering the site remotely, the website manager is responsible for the website files, the host operating system and server software. The server belongs to an ISP or a third party and both maintenance of the internet connection and disaster-recovery procedures are their responsibility. To simplify administration, domain-name hosting, and FTP services often come with the package. Dedicated hosts are suitable for sites that are likely to generate heavy traffic and often provide better internet connections than those commonly available in-house. By allowing the website Becta 2004 Valid at September 2004 page 3 of 7

4 manager to change the configuration of the server, they also offer more flexibility than virtual hosting. Dedicated hosting requires a certain amount of technical expertise. 3.3 Do it yourself If you have a permanent internet connection and a suitable computer, you can set up a web server on your local network. Your host computer must have a permanent IP (internet protocol) address. An IP address consists of a series of numbers describing the location of that computer on the internet. If you have an internet server on a local network, it needs a permanent IP address that other computers on the internet can see. The provider of the internet connection generally assigns IP addresses. The do-it-yourself approach allows more flexibility and control over the hosting process and you can administer it via FTP or through the local network. For this approach you will need to consider the implications of providing your own hardware, software and technical expertise. 4 What are the requirements for hosting a site? When setting up a web server, you need to take into account a number of basic considerations. These often form part of an organisation's networking policy and an arrangement with an internet service provider will include them as standard. 4.1 Technical expertise Internet servers require both software and hardware maintenance. Software installation can often prove complex, with unstable computer applications and security problems an issue. The operating system, hardware, web server and any associated software such as a database need the appropriate level of support. Specialist knowledge such as programming and system administration may be necessary. These skills often form part of an ISP's service, though to reduce its own technical burden the ISP may limit the choice of software. If you choose to host your own website, the choice of software and operating system will be affected by factors such as the ease with which you can acquire the appropriate skills, the costs involved and the systems you already have. A technician who can administer a Windows NT server may need considerable further training to administer a UNIX or Linux server, so access to technical expertise either locally or from a service provider directly determines the choices available. Remember to include the cost of training in any cost comparisons. 4.2 Internet connection Three major factors affect the performance of a website: its popularity the more visitors to a site, the greater the effect on performance the reliability and speed of its internet connection the quality of the host computer and software. The design of the network and the speed of the connection to the internet determine the quality of the internet connection. 5 What do I need to be aware of when hosting a website? What is involved in hosting a website depends on your requirements. Different operating requirements often need specific software or operating arrangements to facilitate them. If you want to offer secure transactions or interactive content, this may influence your choice of host, as will your choice of operating system, content-management system, scripting language and publishing model. Becta 2004 Valid at September 2004 page 4 of 7

5 5.1 Secure transactions If you intend to provide services or business functions over the internet, security is important. Where financial or personal information is involved, the hosting arrangement should include secure server software, which often includes proprietary certification by a third party such as Verisign. A secure server transports data using SSL (secure socket layers) or TLS (transport layer security), which both encrypt data travelling to and from the server. If you do not use a secure server, website users may be reluctant to give personal information. The implication for web hosting is that any server software must support either SSL or TLS if it is to allow secure transactions. 5.2 Interactivity Dynamic content and server-side interaction require the use of either scripting or programming languages. Many scripting and programming languages have specific platform requirements. Server-side programs (which require actions to be carried out on the server before delivering the file or web page) written on one system do not automatically work on another. For example, in order to run Java Server Pages (which produces pages ending in.jsp) you must have a Java server installed on your host computer. What are the implications of contracting out hosting? 6.1 Dealing with suppliers A considerable administrative burden is attached to contracting out any service. In web hosting, you need to deal quickly with changes in server configuration and problems with connection and service quality. The quality of technical support is therefore very important and should be available 24 hours a day, 365 days a year to ensure that 'mission-critical' problems are quickly solved. As it is very expensive to provide adequate technical support, some companies outsource their provision. 6.2 Remote administration If an ISP is hosting your website, there is an added level of complexity in administering your system. If you host your server locally, you can sit at the server to make any changes. If you use a remote host, you will need some form of connection and administration tool. Some companies offer only FTP, while the more complex solutions may allow you to telnet and take complete control of the server. Major changes to configuration can be difficult to implement with remote administration, because of the need to access the server's operating system. 6 Frequently asked questions 7.1 What connection speed will I need? You can arrive at the amount of bandwidth (connection speed) you need by multiplying the combined size of all your web pages by the number of times you expect people to download them. We measure bandwidth in bits per second (bps). One bit is one eighth of a byte. For example, for a single 34-kilobyte (KB) web page (with 4KB HTML and three 10KB images) to be downloaded 50,000 times in one month, we would require 13.6 Megabits (Mb) of bandwidth per month. The calculation is 34KB x 8 = 272Kbps x 50,000 = 13.6 Megabits per second (Mbps). Assuming that most downloads are during certain peak times such as 9.00am pm Monday to Friday, which comes to about 160 hours a month, you will need a bandwidth of 85KB per hour, or 23bps for a single page. Becta 2004 Valid at September 2004 page 5 of 7

6 A site of 10 pages of similar size and popularity would require a connection of at least 23Kbps dedicated to serving web pages. It is important to realise that this is a very rough estimate, and that, in practice, bandwidth is difficult to predict with certainty. If other applications such as and internet access share the internet connection, it needs to be faster still. As few internet connections ever achieve their maximum connection speed, you need to allow extra bandwidth. In reality, therefore, for our example above we would probably want a 150Kbps connection. 7.2 How does web hosting influence network security? If your internet server sits inside your organisation's local area network, the network architecture (the physical design of the network) may cause problems. For security reasons, network administrators may well try to prevent external access to computers within the organisation. Depending on policy, you may need to locate your internet server outside your network's firewall. If this is the case, your organisation may have already placed other internet servers in a special network outside the normal firewall; otherwise, a separate internet connection to your internet server may be required. 7.3 Will I require a static IP address? Internet servers require static IP addresses that are viewable on the World Wide Web. As numbers of IP addresses are limited, some organisations assign them dynamically, with a different address allocated every time. Some organisations also use proxy servers, which mask the IP addresses of local machines. Neither of these options is suitable for an internet server. 7.4 Should I have a disaster-recovery procedure in place? Disaster-recovery procedures need to be in place to ensure that, in the event of a disaster, your organisation suffers little or no disruption. Internet service providers should have disaster-recovery procedures in place as part of their service agreements. If it is critical for your website to be always available, it may be a good idea to mirror the website at another location. If the main host fails or becomes overburdened, requests are seamlessly diverted to the second host and no interruption of service occurs. It is, of course, vital to back up regularly all information on the hosting server. 7.5 How do I get a.sch.uk,.gov.uk or.ac.uk domain name? An internet domain name is the user-friendly address of your website. A domain name comes in a standard pattern of for schools this would be Only schools can register a.sch.uk domain name. To obtain a sch.uk domain name, an ISP requires the school s Department for Education and Skills (DfES) number to confirm eligibility. Nominet manages the.sch.uk naming scheme. UKERNA administers the.ac.uk domain (for UK higher and further education sites) and the.gov.uk domain (for UK government sites). To register these addresses, you must apply direct to UKERNA, which will require justification for their use 7.6 What are the costs of web hosting? Depending on the solution you choose, the costs of web hosting are likely to go on host equipment, server software, internet connection, user training, technical support and domain-name registration. The cheapest solution by far is virtual hosting, which can be free of charge, but which may restrict what your site can do. Becta 2004 Valid at September 2004 page 6 of 7

7 The comparison between dedicated hosting by a third party and doing it yourself depends on the facilities and technical skills already available. If your organisation already has web servers, it should also have facilities such as disaster recovery, internet connection and technical support, so the do-it-yourself option may prove a cheaper alternative. Setting up these essential facilities is expensive, however, so if you would have to do so from scratch, third-party hosting would prove more cost effective. 7 Summary Before developing your own website, you need to decide where to host it to use a virtual or dedicated host, or perhaps host it yourself. As each method of hosting has different advantages and disadvantages, consider carefully which will be most appropriate for your particular circumstances and needs. 8 Supporting material 8.1 Useful links and resources Nominet UKERNA Web Host Industry Review Internet Services Providers' Association Becta 2004 Valid at September 2004 page 7 of 7

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Graham Jones. Internet Psychologist. How to choose the right web host

Graham Jones. Internet Psychologist. How to choose the right web host Graham Jones Internet Psychologist How to choose the right web host 2008 Graham Jones All Rights Reserved. No part of this publication may be copied or stored in a retrieval system without the prior written

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

Week 13. Uploading Files to Web Hosting

Week 13. Uploading Files to Web Hosting Week 13 Uploading Files to Web Hosting 1 Choosing a Web Hosting Service Choose a Web hosting service before you begin work on creating the Web site s pages The choice of a Web hosting service is more than

More information

Web Hosting. Definition. Overview. Topics. 1. Overview of the Web

Web Hosting. Definition. Overview. Topics. 1. Overview of the Web Web Hosting Definition The World Wide Web (WWW), a web of worldwide servers connected to the Internet, provides an easily used and understood method of accessing electronic content. Accessing information

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Technical Analysis Document

Technical Analysis Document Technical Architecture Technical Analysis Document The table below shows the various possibilities that sonic sounds have to host their e-commerce site on. The hosting type is described and then advantages

More information

Web Extras. Customer Service Description. Version 3.0. February 26, 2002

Web Extras. Customer Service Description. Version 3.0. February 26, 2002 Web Extras Customer Service Description Version 3.0 February 26, 2002 Proprietary: Not for disclosure outside of Interland except under written agreement This document is subject to change without notice.

More information

http://www.buzzwords.ltd.uk/brochure_copywriter.htm

http://www.buzzwords.ltd.uk/brochure_copywriter.htm http://www.buzzwords.ltd.uk/brochure_copywriter.htm (U-NET EASY4 BROCHURE COPY - FRONT COVER) EASY4 FROM U-NET Permanent internet access - and value for money too! EasyFour IP provides go-ahead businesses

More information

Pemrograman Web. 1. Pengenalan Web Server. M. Udin Harun Al Rasyid, S.Kom, Ph.D http://lecturer.eepis-its.edu/~udinharun udinharun@eepis-its.

Pemrograman Web. 1. Pengenalan Web Server. M. Udin Harun Al Rasyid, S.Kom, Ph.D http://lecturer.eepis-its.edu/~udinharun udinharun@eepis-its. Pemrograman Web 1. Pengenalan Web Server M. Udin Harun Al Rasyid, S.Kom, Ph.D http://lecturer.eepis-its.edu/~udinharun udinharun@eepis-its.edu Table of Contents World Wide Web Web Page Web Server Internet

More information

RemotelyAnywhere Getting Started Guide

RemotelyAnywhere Getting Started Guide April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...

More information

Quick Reference Guide: Server Hosting

Quick Reference Guide: Server Hosting : Server Hosting TABLE OF CONTENTS GENERAL INFORMATION...2 CO-LOCATED SERVER HOSTING...3 DEDICATED SERVER HOSTING...3 MANAGED SERVER HOSTING...4 FREQUENTLY ASKED QUESTIONS...4 1. Will I have root/admin

More information

Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com. CAIL Security Facility

Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com. CAIL Security Facility Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com CAIL Security Facility Table of Contents A. Overview B. CAIL Security Solutions C. Summary

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Use of EASE Code of Practice. This code of practice is also qualified by The University of Edinburgh computing regulations, found at:

Use of EASE Code of Practice. This code of practice is also qualified by The University of Edinburgh computing regulations, found at: Use of EASE Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be read in conjunction with this document. http://www.ed.ac.uk/schools-departments/information-services/about/policiesandregulations/security-policies/security-policy

More information

Welcome To Your New Web Hosting Account!

Welcome To Your New Web Hosting Account! Welcome To Your New Web Hosting Account! We are focused on providing you the very best web hosting service, including all the tools necessary to establish and maintain a successful website. This document

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

GUIDE TO WEBSITES AND E-COMMERCE

GUIDE TO WEBSITES AND E-COMMERCE GUIDE TO WEBSITES AND E-COMMERCE Version 1.0, 26-Sept-01 This document is available from www.webcentro.com.au 2001, WebCentro WebCentro Guide To Websites And E-commerce CONTENTS 1. What is a Website? 1

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

1.1 Prior Knowledge and Revision

1.1 Prior Knowledge and Revision 1.1. PRIOR KNOWLEDGE AND REVISION 3 1.1 Prior Knowledge and Revision This topic assumes you already have some background knowledge of the Internet. You may have studied The Internet unit of Intermediate

More information

The Ultimate Guide to Gaining Control of the WAN

The Ultimate Guide to Gaining Control of the WAN LAYLAND CONSULTING The Ultimate Guide to Gaining Control of the WAN A TechTarget Document Robin Layland November 2009 The e-book, The Ultimate Guide to Gaining Control of the WAN, explains the drivers

More information

Building a Highly Available and Scalable Web Farm

Building a Highly Available and Scalable Web Farm Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer

More information

WS_FTP: The smarter way to transfer files

WS_FTP: The smarter way to transfer files WS_FTP: The smarter way to transfer files DATA WEB PAGES IMAGES VIDEO GRAPHICS WS_FTP: A Complete and Secure Data Management Solution The files that you transfer every day over the Internet are vulnerable

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Using email over FleetBroadband

Using email over FleetBroadband Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

ATTERCOPIA MANAGED HOSTING & DOMAIN SERVICES TERMS & CONDITIONS

ATTERCOPIA MANAGED HOSTING & DOMAIN SERVICES TERMS & CONDITIONS ATTERCOPIA MANAGED HOSTING & DOMAIN SERVICES TERMS & CONDITIONS Version: 2016 edition 2016 Attercopia 1 Hosting We provide a fully managed hosting solution. Our hosting partners provide servers which are

More information

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................

More information

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Remote Access Technologies: A Comparison of Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Contents: Executive Summary...1 Remote Access Overview...2 Intended Application... 2 Revolutionary

More information

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4] Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within

More information

Web Hosting/Domain Names

Web Hosting/Domain Names Web Hosting/Domain Names Domain Names http://www.secondlevel.toplevel http://www.acme.com Top Level Domains.com.net.org.edu.mil Second Level Domains.jmu.yahoo.msnbc.washingtonpost.drsteveanderson Sub-Domains

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

WebArrow: System Overview and Architecture Namzak Labs White Paper, 2003-02

WebArrow: System Overview and Architecture Namzak Labs White Paper, 2003-02 WebArrow: System Overview and Architecture Namzak Labs White Paper, 2003-02 Overview This white paper presents an introduction to, and architectural overview of Namzak Labs WebArrow a system for web-based

More information

Detailed Revision History: Advanced Internet System Management (v5.07)

Detailed Revision History: Advanced Internet System Management (v5.07) Detailed Revision History 1 Detailed Revision History: Advanced Internet System Management (v5.07) This detailed revision history document identifies the differences in Advanced Internet System Management

More information

SECURELINK.COM REMOTE SUPPORT NETWORK

SECURELINK.COM REMOTE SUPPORT NETWORK REMOTE SUPPORT NETWORK I. INTRODUCTION EXECUTIVE SUMMARY MANAGING REMOTE SUPPORT IN A SECURE ENVIRONMENT Enterprise software vendors strive to maximize support efficiency log on to the customer system,

More information

OS/390 Firewall Technology Overview

OS/390 Firewall Technology Overview OS/390 Firewall Technology Overview Washington System Center Mary Sweat E - Mail: sweatm@us.ibm.com Agenda Basic Firewall strategies and design Hardware requirements Software requirements Components of

More information

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Lesson 7 - Website Administration

Lesson 7 - Website Administration Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their

More information

SysAidTM Product Description

SysAidTM Product Description SysAidTM Product Description September 2006 IT Challenges As the ratio of computers to IT staff grows, so does the visibility of the IT department in organizations. Efficiency and responsiveness has become

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

z/os Firewall Technology Overview

z/os Firewall Technology Overview z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

SSL VPN Technical Primer

SSL VPN Technical Primer 4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses

More information

Additional services are also available according to your specific plan configuration.

Additional services are also available according to your specific plan configuration. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. I. Service Definition SMS (Company) will provide You with Hosted Exchange and other Application Services

More information

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS LAB FORWARD WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS Medical diagnostics are a vital part of the modern healthcare system, and instrument uptime is critical

More information

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d. C H A P T E R 7 The Internet, Intranets, and Extranets What is the Internet Millions of computers, all linked together on a computer network. A home computer usually links to the Internet using a phone

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

White Paper. Securing and Integrating File Transfers Over the Internet

White Paper. Securing and Integrating File Transfers Over the Internet White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure

More information

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

System Security. Your data security is always our top priority

System Security. Your data security is always our top priority Your data security is always our top priority Data security is an important factor for every client, our continued investment in the latest technology methods and world class data centres show our commitment

More information

QUESTIONS AND ANSWERS

QUESTIONS AND ANSWERS TECHNOLOGY CONSULTANCY Innovative. Reliable. Efficient. QUESTIONS AND ANSWERS WEB HOSTING SERVICES What you need to know about Web Hosting Q&A - WEBHOSTING 1. What is web hosting? Web Hosting is a service

More information

Web Technologies Week 4 Hosting, Servers and Databases. Context. Contents. MSc in Computing Computing - IBITE Liverpool Hope University College

Web Technologies Week 4 Hosting, Servers and Databases. Context. Contents. MSc in Computing Computing - IBITE Liverpool Hope University College Web Technologies Week 4 Hosting, Servers and Databases MSc in Computing Computing - IBITE Liverpool Hope University College Context Today s platform is tomorrow s outdated legacy system Shklar and Rosen

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

TekieOBM Online Backup Manager. The cost effective solution for your company

TekieOBM Online Backup Manager. The cost effective solution for your company TekieOBM Online Backup Manager The cost effective solution for your company Data loss is a nightmare (1) Your data are growing exponentially If you find yourself now in a situation where you have to deal

More information

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

2. Accessing Databases via the Web

2. Accessing Databases via the Web Supporting Web-Based Database Application Development Quan Xia 1 Ling Feng 2 Hongjun Lu 3 1 National University of Singapore, Singapore, xiaquan@comp.nus.edu.sg 2 Hong Kong Polytechnic University, China,

More information

USING GENIE REMOTELY

USING GENIE REMOTELY USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.

More information

To use MySQL effectively, you need to learn the syntax of a new language and grow

To use MySQL effectively, you need to learn the syntax of a new language and grow SESSION 1 Why MySQL? Session Checklist SQL servers in the development process MySQL versus the competition To use MySQL effectively, you need to learn the syntax of a new language and grow comfortable

More information

Web Foundations Series Internet Business Associate

Web Foundations Series Internet Business Associate Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

Module 12: Microsoft Windows 2000 Clustering. Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8

Module 12: Microsoft Windows 2000 Clustering. Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8 Module 12: Microsoft Windows 2000 Clustering Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8 Information in this document is subject to change without notice.

More information

Documentation for data centre migrations

Documentation for data centre migrations Documentation for data centre migrations Data centre migrations are part of the normal life cycle of a typical enterprise. As organisations expand, many reach a point where maintaining multiple, distributed

More information

Configuring an External Domain

Configuring an External Domain Configuring an External Domain SUPPORT GUIDE DOMAINS ABOUT THIS GUIDE This guide will instruct you on how to: Use an existing domain name Set Up Your Domain to Use Tagadab Name Servers Use Your VPS/Dedicated

More information

Organising Hosting For My Site

Organising Hosting For My Site Topic Website Tutorial 10 Organising Hosting For My Site This tutorial will explain web hosting for your website. Reading time: 20 minutes Prerequisite: None 1. What is web hosting? In order for your website

More information

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist This document lists the preinstallation requirements that must be met before you install the BlackBerry Enterprise Server

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

Security Issues with Distributed Web Applications

Security Issues with Distributed Web Applications Security Issues with Distributed Web Applications Device Connectivity We are entering the era of Device Connectivity, which is the fourth wave of evolution for Internet-enabled applications. The first

More information

ilinc Web Conferencing

ilinc Web Conferencing system architecture overview introduction ilinc is a suite of Web conferencing products designed to allow participants to interact and collaborate online in a number of different types of sessions, including

More information

eticketing Architecture Overview

eticketing Architecture Overview Group eticketing Architecture Overview The purpose of this document is to provide Ticket Office management with an introduction to eticketing service capabilities. With the uptake of ecommerce on the Internet,

More information

Guide to Analyzing Feedback from Web Trends

Guide to Analyzing Feedback from Web Trends Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?

More information

Client/server is a network architecture that divides functions into client and server

Client/server is a network architecture that divides functions into client and server Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate

More information

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential

More information

OS/390 Firewall Technology Overview

OS/390 Firewall Technology Overview OS/390 Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Agenda OS/390 Firewall OS/390 Firewall Features Hardware requirements Software

More information

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in

More information

DEDICATED SERVERS MADE SIMPLE BY JIM MORTLEMAN

DEDICATED SERVERS MADE SIMPLE BY JIM MORTLEMAN DEDICATED SERVERS MADE SIMPLE BY JIM MORTLEMAN Copyright 100TB.com 2006-2014. What is a dedicated server? A dedicated server is a physical computer that you buy or rent for the sole, exclusive use of your

More information

Session 11 Under the hood of a commercial website

Session 11 Under the hood of a commercial website 15.561 Information Technology Essentials Session 11 Under the hood of a commercial website Copyright 2005 Thomas Malone, Chris Dellarocas Acknowledgments: Adapted from Chris Dellarocas, U. Md.. Outline

More information

Best practice for SwiftBroadband

Best practice for SwiftBroadband Best practice for SwiftBroadband Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

DISASTER RECOVERY WITH AWS

DISASTER RECOVERY WITH AWS DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your

More information

BT Remote Internet. Internet Teleworker. Customer Service Description. June 04. Issue 1. Internet Teleworker Customer Service Description.

BT Remote Internet. Internet Teleworker. Customer Service Description. June 04. Issue 1. Internet Teleworker Customer Service Description. BT Remote Internet Internet Teleworker June 04 2003 BT TABLE OF CONTENTS 1 INTRODUCTION...3 2 SERVICE SUMMARY...3 3 BENEFITS...4 3.1 SERVICE FEATURES...4 3.2 COVERAGE...4 4 FEATURES...5 4.1 INTERNET TELEWORKER...5

More information

UBS KeyLink Quick reference WEB Installation Guide

UBS KeyLink Quick reference WEB Installation Guide ab UBS KeyLink Quick reference WEB Installation Guide Table of contents 1. Introduction 3 1.1. Why is an Installation needed? 3 1.2. Is UBS KeyLink secure? 3 1.3. Information about Secure Sockets Layer

More information

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by

More information

SECURELINK.COM ENTERPRISE REMOTE SUPPORT NETWORK

SECURELINK.COM ENTERPRISE REMOTE SUPPORT NETWORK ENTERPRISE REMOTE SUPPORT NETWORK I. INTRODUCTION EXECUTIVE SUMMARY MANAGING REMOTE SUPPORT IN A SECURE ENVIRONMENT Enterprise computing environments often include dozens, even hundreds of different software

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

The ultimate backup solution for your company

The ultimate backup solution for your company The ultimate backup solution for your company Data loss is a nightmare (1) Your data are growing exponentially If you find yourself now in a situation where you have to deal with an explosion in the volume

More information