Considerations for Implementing Corporate Intranets Nathan J. Muller

Size: px
Start display at page:

Download "51-10-53 Considerations for Implementing Corporate Intranets Nathan J. Muller"

Transcription

1 Considerations for Implementing Corporate Intranets Nathan J. Muller Payoff Assessing whether the corporate network has the capacity to support an intranet is a top priority for many network managers. This article explains how to evaluate and improve network performance, accommodate intranet traffic demands, secure a new intranet, and in general, create an intranet environment that is flexible and integrated. Introduction A corporate intranet entails the deployment and use of Internet technologies such as the Web, , and TCP/IP on a closed private network within one organization or within a group of organizations that share common relationships. Because intranets are based on TCP/IP networking standards, they can include anything that uses this protocol suite, including existing client/server technology and connectivity to legacy host systems. Companies can benefit from Internet technology and avoid its drawbacks particularly, its lethargic performance and lack of security. Intranets support communication and collaboration; information retrieval, sharing, and management; and access to data bases and applications. None of these functions is new, but the promise of an intranet is that it can use Internet and World Wide Web technologies to do things better than before. For example, according to Microsoft Corp., Netscape Communications Corp.,Oracle Corp., and Sun Microsystems, Inc., a Web browser could become the standard interface used to access data bases, legacy applications, and data warehouses throughout the enterprise. In this scenario, the thin client (i.e., the browser)can make applications easier to maintain, desktops easier to manage, and substantially trim the IT budget. A company's customers, suppliers, and strategic partners in turn can benefit from the improved communication, greater collaboration, and reduced IT expenditure associated with implementing an intranet. They can even access each other's intranet services directly, which would speed decision making as well as save time and money. Achieving these benefits comes from properly implementing an intranet, which is far from straightforward. One of the more difficult issues to resolve is intranet content determining what information will be presented, where it will come from, how its accuracy will be ensured, and how often it will be updated. The resources must be available to do this extra work. Intranet content development is beyond the scope of this article, however. The focus here is on specific issues of network and server management. First, resources must be available to establish the service, to establish the Transmission Control Protocol/Internet Protocol (TCP/IP) network over which it runs, and to train users. Second, the impact on existing systems must be considered. This includes, for example, the capacity of the current network to support an intranet, the future usefulness of existing legacy systems, and the availability of hardware to run multimedia applications.

2 Fat Versus Thin Clients Corporate intranets provide an opportunity to ensure universal access to applications and data bases while increasing the speed of applications development, improving the security and reliability of the applications, and reducing the cost of computing and ongoing administration. Fat and thin refer primarily to the amount of processing being performed. Terminals are the ultimate thin clients because they rely exclusively on the server for applications and processing. Standalone PCs are the ultimate fat clients because they have the resources to run all applications locally and handle the processing themselves. Spanning the continuum from all-server processing to all-client processing is the client/server environment, where there is a distribution of work between the different processors. Traditional Client/Server. A few years ago, client/server was thought to be the ideal computing solution. Despite the initial promises of client/server solutions, today there is much dissatisfaction with their implementation. Client/server solutions are too complex, desktops are too expensive to administer and upgrade, and the applications are still not secure and reliable enough. Furthermore, client/server applications take too long to develop and deploy, and incompatible desktops prevent universal access. As companies discover the benefits of private intranets and new development tools such as Java and ActiveX, as well as various scripting languages such as JavaScript and VBScript, they can use these tools to redefine the traditional models of computing and reassess their IT infrastructure. Java-Enabled Browsers Browsers that are used to navigate the World Wide Web are usually thin clients when they render documents sent by a server. The special tags used throughout these documents, known as the hypertext markup language (HTML),tell the browser how to render their contents on a computer screen. However, browsers can get very fat when other components are sent from the server for execution within the browser. These components can be specialized files with audio or video that are interpreted by plug-ins registered with the browser. When the browser comes across an HTML tag that specifies a file type that is associated with one of these plug-ins, the application is automatically opened within the browser, permitting an audio or video stream to be played instantly without the user having to download the file to disk and open it with an external player. Applets Another way that the browser can become fat is by absorbing Java applets that are downloaded from the server with the HTML documents. Applets are small applications designed to be distributed over the network and are always hosted by another program such as Netscape's Navigator or Microsoft's Internet Explorer, both of which contain a virtual machine (VM) that runs the Java code. Because the Java code is written for the virtual machine rather than for a particular computer or operating system, by default all Java programs are cross-platform applications. Java applications are fast because today's processors can provide efficient virtual machine execution. The performance of GUI(GUI) functions and graphical applications are enhanced through Java's integral multithreading capability and just-in-time (JIT)

3 compilation. The applications are also more secure than those running native code because the Java runtime system part of the virtual machine checks all code for viruses and tampering before running it. Applications development is facilitated through code reuse, making it easier to deploy applications on the Internet or corporate intranet. Code reuse also makes the applications more reliable because many of the components have already been tested. ActiveX and Java Another way the browser can be fattened up is by bulking up on components written in ActiveX, Microsoft's answer to Sun's Java. Like Java, ActiveX is an object-oriented development tool that can be used to build such components as Excel spreadsheet interpreters and data entry programs. Functionally, the two development tools are headed for increasing levels of convergence. For example, the Microsoft Java VM is an ActiveX control that allows Microsoft Internet Explorer 3.0 users to run Java applets. The control is installed as a component of Internet Explorer 3.0. The Java VM supports integration between other ActiveX controls and a Java applet. In addition, the Java VM understands the component object model (COM) and can load COM classes and expose COM interfaces. This means that developers can write ActiveX controls using Java. Scripting Languages Browsers can also fatten up by running functions written in scripting languages like Netscape's JavaScript and Microsoft's VBScript. VBScript is a Web-adapted subset of Visual Basic for Applications (VBA), Microsoft's standard Basic syntax. Both JavaScript and VBScript are used to manipulate HTML from objects like check boxes and radio buttons, as well as add pop-up windows, scroll bars, prompts, digital clocks, and simple animations to Web pages. The important thing to remember about these tools is that the features they create rely on scripts that are embedded within the HTML document itself, initiating extensive local processing. Browsers are becoming universal clients, so much so that Microsoft's next release of Windows 95 will even have the look and feel of a browser. Most PCs today come bundled with a browser. Several vendors, including Microsoft, have endorsed the idea of offering a new breed of computer that relies on a browser as the graphical user interface, Java or ActiveX as the operating system, and servers for the applications. With Java and ActiveX, a network-centric computing solution is emerging that can potentially offer major improvements in simplicity, expense, security, and reliability versus many of the enterprise computing environments in place today. Feeding Client Applications How fat the client is may be less important than how the code is delivered and executed on the client machine. Because Java applications originate at the server, clients only get the code when they need to run the application. If there are changes to the applications, they are made at the server. Programmers and network administrators do not have to worry about distributing all the changes to every client. The next time the client logs onto the server and accesses the application, it automatically gets the most current code. This method of delivering applications also reduces support costs. Fat may be interpreted as how much the client application has to be fed in order to use it. For example, a locally installed emulator may have the same capabilities as a

4 network-delivered, Java-based emulator, but there is more work to be done in installing and configuring the local emulator than the Java-based emulator that is delivered each time it is needed. The traditional emulator takes up local disk space whether it is being used or not. The Java-based emulator, in contrast, takes no local disk space. ActiveX components are a cross between locally installed applications and network-delivered applications. They are not only sent to the client when initially needed, but are also installed on the local disk for future use. Local disk space is used even if the component was only used once and never used again. Updates are easy to get because they can be sent over the network when required. With Java, the component is sent each time it is needed unless it is already in the browser's cache. This makes Java components instantly updatable. Because Java is platform-independent, a Java-based T27 emulator for Unisys hosts or a 3270 emulator for IBM hosts, for example, can run on any hardware or software architecture that supports the Java virtual machine. This includes Windows, Macintosh, and UNIX platforms as well as new network computers. Thus, any Java-enabled browser has access to legacy data and applications. Cost Issues. As with most issues, the answer is it depends. There is no right answer for all applications and all environments. Each has advantages and disadvantages, so it is necessary to do a cost/benefits analysis first. Even if a significant number of desktops must stay with the fat-client approach, there still may be enough incentive to move the others to the thin-client approach. According to The Gartner Group (Stamford CT), the annual cost of supporting fat clients Windows 95/NT, UNIX, OS/2, and Macintosh is about$11,900 per seat. Substantial savings could be realized for as many as 90%of an enterprise's clients, with only 10% of users needing to continue with a fat client for processing-intensive applications. Thus, the support costs for moving from a fat-client to a thin-client architecture could be as much as $84.6 million annually for a company with 10,000 clients. Improving Network Performance Intranets are becoming pervasive because they allow network users to easily access information through standard Web browsers and other World Wide Web technologies and tools to provide a simple, reliable, universal, and low-cost way to exchange information among enterprise network users. However, the resulting changes in network traffic patterns require upgrading the network infrastructure to improve performance and prevent slow network response times. The corporate network may need to be upgraded to accommodate: The graphical nature of Web-based information, which significantly increases network traffic and demands greater network bandwidth. The integration of the Internet Protocol (IP) throughout the network. Easier access to data across the campus or across the globe, which leads to increased inter-subnetwork traffic that must be routed. New, real-time multimedia feeds that require intelligent multicast control. LAN switches traditionally operate at layer 2 of the OSI model, or the data link layer, providing high-performance segmentation for workgroup-based client/server

5 networks. Routing operates at layer 3, or the network layer, providing broadcast controls, WAN access, and bandwidth management vital to intranets. Most networks do not contain sufficient routing resources to handle the new inter-subnetwork traffic demands of enterprise intranets. The optimal solution intranet switching is to add layer 3 switching, the portion of routing functionality required to forward intranet information between subnetworks, to existing layer 2 switches. This solution allows network managers to cost-effectively upgrade the layer 3 performance in their networks. This is the approach being taken by new intranet switches and software upgrades to existing switches. Intranet Switching Intranets are increasingly being used to support real-time information, such as live audio and video feeds, over the network. These multimedia feeds are sent to all subscribers in a subnetwork, creating increased multicast traffic and impeding network performance by consuming ever-greater amounts of bandwidth. Intelligent multicast control provided by intranet switches helps organizations conserve network bandwidth by eliminating the propagation of multicast traffic to all end stations in a subnetwork. The intranet switches monitor multicast requests and forward multicast frames only to the ports hosting members of a multicast group. Most enterprise networks use multiple protocols. Intranets are IP-based, requiring IP on all intranet access systems throughout the network. To ease IP integration, intranet switching supports protocol-sensitive virtual local area networks (VLANs), which allows the addition of IP without changing the logical network structure for other protocols. By combining IP and ATM routing through integrated private network-to-network interface (I-PNNI) signaling, network management is simplified because only one protocol is managed rather than two. Providing this unified view of the network by implementing a single protocol leads to better path selection and improved network performance. To accommodate intranet traffic demands, increased switching capabilities must be added to both the edge of the network and to the backbone network. Many organizations are using intranets for mission-critical applications, so the backbone technology must deliver superior performance, scalability, and a high degree of resiliency. For these reasons, asynchronous transfer mode (ATM) may be the optimal choice for the core technology for intranet switches. Intranet Operating System As today's networks assimilate additional services originally developed for the global Internet, they are gaining new flexibility in the ways they provide access to computing resources and information. Network operating systems make this easier to accomplish greater information sharing by providing integral access to intranet resources such as Web servers, FTP (FTP) servers, and WAN connections to the Internet. Novell Inc.'s IntranetWare offering, which is built on the NetWare 4 network operating system, provides both IP and IPX access to intranet resources, for example. IntranetWare IntranetWare incorporates all of the networking services of NetWare 4.11,such as Novell Directory Services (NDS), symmetric multiprocessing (SMP),and core file and print services with new intranet and Internet capabilities. These solutions include a highperformance NetWare Web Server 2.5, FTP services(the Internet-standard method for

6 allowing users to download files on remote servers via the Internet), Netscape Navigator, an IPX-to-IP gateway to provide IPX users with access to all IP resources (including World Wide Web pages), and integrated wide-area routing to connect geographically dispersed LANs to a corporate intranet or to the greater Internet. At the heart of IntranetWare's management is NDS, which allows administrators to manage a network from any workstation and provides sophisticated access controls for all the resources on the intranet. With the centralized administration enabled by NDS, organizations can contain management and administration expenses, which are the primary costs of operating a network. IntranetWare also qualifies for C2 network security certification, enabling the complete network server, client, and connecting media to be completely secure. IntranetWare's routing capabilities let corporations extend their intranets to branch offices and to connect to the Internet via ISDN (ISDN), frame relay, ATM, or leased-line connections. Add-on software from Novell allows mainframe and midrange computers to become a part of the corporate intranet. IntranetWare provides comprehensive client support for DOS, Windows, Windows 95, Windows NT, Macintosh, OS/2, and UNIX workstations. The Ever-Present Firewall A firewall is server software that protects TCP/IP networks from unwanted external access to corporate resources. With a firewall, companies can connect their private TCP/IP networks to the global Internet or to other external TCP/IP networks and be assured that unauthorized users cannot obtain access to systems or files on their private network. Firewalls can also work in the opposite direction by controlling internal access to external services that are deemed inappropriate to accomplishing the company's business. Firewalls come in three types: packet filters, circuit-level gateways, and application gateways. Some firewall products combine all three into one firewall server, offering organizations more flexibility in meeting their security needs. Packet Filtering With packet filtering, all IP packets traveling between the internal network and the external network must pass through the firewall. User-definable rules allow or disallow packets to be passed. The firewall's GUI allows systems administrators to implement packet filter rules easily and accurately. Circuit-Level Gateway All of the firewall's incoming and outgoing connections are circuit-level connections that are made automatically and transparently. The firewall can be configured to permit a variety of outgoing connections such as Telnet, FTP, WWW, Gopher, America Online, and userdefined applications such as mail and news. Incoming circuit-level connections include Telnet and FTP. Incoming connections are only permitted with authenticated inbound access using one-time password tokens. Applications Servers Some firewalls include support for several standard application servers, including mail, news, WWW, FTP, and DNS(DNS). Security is enhanced by compartmentalizing these

7 applications from other firewall software, so that if an individual server is under attack, other servers/functions are not affected. To aid security, firewall offer logging capabilities as well as alarms that are activated when probing is detected. Log files are kept for all connection requests and server activity. The files can be viewed from the console displaying the most recent entries. The log scrolls in real time as new entries come in. The log files include: Connection requests. Mail log files. News log files. Other servers. Outbound FTP sessions. Alarm conditions. Administrative logs. Kernel messages. An alarm system watches for network probes. The alarm system can be configured to watch for TCP or user datagram protocol (UDP) probes from either the external or internal networks. Alarms can be configured to trigger , pop-up windows, and messages sent to a local printer, or halt the system upon detection of a security breach. Another important function of firewalls is to remap and hide all internal IP addresses. The source IP addresses are written so that outgoing packets originate from the firewall. The result is that all of the organization's internal IP addresses are hidden from users on the greater Internet. This provides organizations with the important option of being able to use non-registered IP addresses on their internal network. By not having to assign every computer a unique IP address and not having to register them for use over the greater Internet, which would result in conflicts, administrators can save hundreds of hours of work. Intranet Server Management Intranets bring together yet another set of technologies that need to be managed. Instead of using different management systems, organizations should strive to monitor and administer intranet applications from the same console used to manage their underlying operating system software and server hardware. This is a distinct advantage when it comes to ensuring end-to-end availability of intranet resources to users. For example, the hierarchical storage management capabilities of the Unicenter platform from Computer Associates can be extended to HTML pages on a Web server. HTML pages that are not accessed from the server for a given period of time can be migrated to less costly near-line storage. If a user then tries to access such a page, storage management directs the query to the appropriate location. Some enterprise management vendors are turning to partnerships to provide users of their management platforms with data on intranet server performance. For example, Hewlett-Packard Co. and Cabletron Systems, Inc. have joined with BMC Software Inc. to

8 provide application management software that monitors Web-server performance and use. The software forwards the data it collects to management consoles, such as HP's OpenView and Cabletron's Spectrum, in the platforms' native format or as basic SNMP(SNMP) traps. Instead of looking at their internal Web sites in an isolated way, this integrated method allows full-fledged enterprisewide applications management. IBM's Tivoli Systems unit provides Web server management through a combination of its internally developed applications and software from net.genesis Corp. Tivoli is also working with IBM Corp. and SunSoft, Inc. to develop the Internet Management Specification (IMS) for submission to the Desktop Management Task Force. IMS would provide a standard interface for monitoring and controlling all types of Internet and intranet resources. IP Administration Managing Web servers is only one aspect of keeping an intranet up and running. IP administration can also become unwieldy as intranets lead to a proliferation of devices and addresses. Intranet-driven IP administration can be facilitated by dynamic host configuration protocol (DHCP) software, which streamlines the allocation and distribution of IP addresses and insulates network operators from the complexity of assigning addresses across multiple subnetworks and platforms. Because intranets depend on the accurate assignment of IP addresses throughout a company, such tools are invaluable to ensuring the availability of resources. Managing Bandwidth Intranets also have the potential to significantly increase traffic, causing bandwidth problems. For some technology managers, the obvious concern is that bandwidth for vital business applications is being consumed by less-than-vital intranet data. Users access files that may contain large graphics files, and that alone has created a tremendous bandwidth issue. As Web servers across an enterprise entice users with new content, intranets also can alter the distribution patterns of network traffic as users hop from one business unit's intranet server to another's and as companies make it easier to access information and applications no matter where they may be located. A Policy-Based Solution More servers and bandwidth can be added and the network itself can be partitioned into more subnetworks to help confine bandwidth-intensive applications to various communities of interest. But these are expensive solutions. A policy-based solution can be just as effective, if not more economical. To prevent these applications from wreaking too much havoc on the network infrastructure, companies can issue policies that establish limits to document size and the use of graphics so that bandwidth is not consumed unnecessarily. These policies can even be applied to servers, where the server can be instructed to reject messages that are too long or which contain attachments that exceed a given file size. Conclusion Companies that have implemented intranets are gradually finding that they are able to use Internet technologies to communicate and link information internally and externally in ways that were not possible before. Many other companies may be tempted to jump on the

9 intranet bandwagon using the fastest means possible. This tactic may meet basic requirements, but it often does not take into account future network growth, the advantages gained by leveraging existing data and resources, or how to add new intranet-enhancing products as they become available. These considerations demand that intranets be flexible, open, and integrated. Any time a company makes information accessible to a wide group of people or extends an intranet to suppliers or vendors, it must establish appropriate security mechanisms, ranging from firewalls to access control to authentication and encryption. In addition, network manager upgrade the network infrastructure to support the increased traffic that will flow over the intranet and maintain acceptable network response times. Despite the allure of corporate intranets and their benefits, companies will not be able to move rapidly toward the kind of full-fledged intranet being predicted by some vendors, with a single browser-type interface and thin clients that download applications and data all at once. For some considerable time to come, intranets, as defined by the browser suppliers, will be distinct from and complementary to existing systems. Author Biographies Nathan J. Muller Nathan J. Muller is an independent consultant in Huntsville AL specializing in advanced technology marketing and education. In his 25 years of industry experience, he has written extensively on many aspects of computers and communications. He is the author of 12 books and more than 1,000 articles. His latest book is Network Planning, Procurement& Management (New York: McGraw-Hill, 1996).

Network Station - Thin Client Computing - Overview

Network Station - Thin Client Computing - Overview Network Station - Thin Client Computing - Overview Overview The objective of this document is to help develop an understanding of a Server Based Computing/Thin-Client environment using MS Windows NT 4.0,

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

Expanding the Value of the Windows Terminal Server Investment. HOBLink JWT HOB Enhanced Terminal Services

Expanding the Value of the Windows Terminal Server Investment. HOBLink JWT HOB Enhanced Terminal Services Expanding the Value of the Windows Terminal Server Investment HOBLink JWT HOB Enhanced Terminal Services 2001 by HOB electronic GmbH & Co. KG Information in this document is subject to change without notice,

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008 PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

Cisco PIX vs. Checkpoint Firewall

Cisco PIX vs. Checkpoint Firewall Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

SCHOOL DISTRICT OF ESCAMBIA COUNTY

SCHOOL DISTRICT OF ESCAMBIA COUNTY SCHOOL DISTRICT OF ESCAMBIA COUNTY JOB DESCRIPTION Programmer Analyst I Web Technologies PROGRAMMER ANALYST I WEB TECHNOLOGIES QUALIFICATIONS: (1) Bachelor s Degree from an accredited educational institution

More information

AS/400 System Overview

AS/400 System Overview Chapter 1 AS/400 System Overview 1.1 Major Characteristics of AS/400 1.1.1 High Level of Integration 1.1.2 Object Orientation 1.1.3 Relational and Integrated Database 1.1.4 Data and Program Independence

More information

S y s t e m A r c h i t e c t u r e

S y s t e m A r c h i t e c t u r e S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual

More information

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring

More information

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Advanced Functionality Basic Functionality Feature MANAGEMENT Microsoft Management Console Enhanced Connection

More information

Inter-Tel 5000 Network Communications Solutions

Inter-Tel 5000 Network Communications Solutions Inter-Tel 5000 Network Communications Solutions 2006 Today s IP-Centric Communications Platform In today s competitive business environment, you understand the need to optimize the performance of your

More information

Network Virtualization

Network Virtualization . White Paper Network Services Virtualization What Is Network Virtualization? Business and IT leaders require a more responsive IT infrastructure that can help accelerate business initiatives and remove

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

51-30-10 Selecting a Firewall Gilbert Held

51-30-10 Selecting a Firewall Gilbert Held 51-30-10 Selecting a Firewall Gilbert Held Payoff Although a company may reap significant benefits from connecting to a public network such as the Internet, doing so can sometimes compromise the security

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security

More information

Firewalls. Ahmad Almulhem March 10, 2012

Firewalls. Ahmad Almulhem March 10, 2012 Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW

APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW 84-10-25 DATA SECURITY MANAGEMENT APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW Al Berg INSIDE Applets and the Web, The Security Issue, Java: Secure Applets, Java: Holes and Bugs, Denial-of-Service

More information

8 NETWORK SERVERS AND SERVICES FUNDAMENTALS

8 NETWORK SERVERS AND SERVICES FUNDAMENTALS 8 NETWORK SERVERS AND SERVICES FUNDAMENTALS PROJECTS Project 8.1 Project 8.2 Project 8.3 Project 8.4 Project 8.5 Understanding Key Concepts Comparing Network Operating Systems Understanding Basic Services

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

EPICenter Network Management Software

EPICenter Network Management Software EPICenter Network Management Software EPICenter management suite is a scalable full-featured network management tool that simplifies configuring, troubleshooting and status monitoring of IP-based networks.

More information

51-10-50 Circuit-Switched Router Connections Nathan J. Muller

51-10-50 Circuit-Switched Router Connections Nathan J. Muller Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible

More information

Comparison of Thin Client Solutions

Comparison of Thin Client Solutions Comparison of Thin Client Solutions Reviewed: March 10, 1999 Revised: April 7, 1999 Introduction As your network grows in size, the costs of hardware, maintenance and support become issues that impact

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management Remote control technologies can enable a system administrator to connect directly to the desktop

More information

PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008

PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008 PLATO Learning Environment System and Configuration Requirements Version 1.1 (for use with Academic Systems Algebra only) for workstations April 14, 2008 Windows 2000 Professional with SP4 Windows XP Professional

More information

PLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009

PLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009 PLATO Learning Environment 2.0 System and Configuration Requirements Dec 1, 2009 Table of Contents About this document... 3 Document Change Log... 4 System & Configuration Requirements... 5 Workstation

More information

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It

More information

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Remote Access Technologies: A Comparison of Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Contents: Executive Summary...1 Remote Access Overview...2 Intended Application... 2 Revolutionary

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Minimum System Requirements What do I need to host or attend a meeting using Microsoft Windows? What do I need to host or attend a meeting using Mac OS? What do I need to host

More information

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your

More information

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

SSL-Based Remote-Access VPN Solution

SSL-Based Remote-Access VPN Solution Cisco IOS SSL VPN SSL-Based Remote-Access VPN Solution Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity integrated

More information

8/16-Port IP KVM Switch IKVM-8010 / IKVM-16010. Quick Installation Guide

8/16-Port IP KVM Switch IKVM-8010 / IKVM-16010. Quick Installation Guide 8/16-Port IP KVM Switch IKVM-8010 / IKVM-16010 Quick Installation Guide Table Of Contents Chapter 1 Introduction... 3 1.1 Features... 3 1.2 Package Contents... 4 1.3 Technical Specifications... 4 Chapter

More information

QuickSpecs. Overview. Compaq Remote Insight Lights-Out Edition

QuickSpecs. Overview. Compaq Remote Insight Lights-Out Edition Overview M ODELS Remote Insight Lights-Out Edition 157866-001 New Remote Insight Lights-Out Edition provides virtual graphical control using any standard browser to your remote or data centre server, giving

More information

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Client/server is a network architecture that divides functions into client and server

Client/server is a network architecture that divides functions into client and server Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate

More information

UNIX AS AN APPLICATION SERVER IN A NETWORK OPERATING SYSTEM ENVIRONMENT

UNIX AS AN APPLICATION SERVER IN A NETWORK OPERATING SYSTEM ENVIRONMENT 50-30-30 DATA COMMUNICATIONS MANAGEMENT UNIX AS AN APPLICATION SERVER IN A NETWORK OPERATING SYSTEM ENVIRONMENT Scott Koegler INSIDE Integrating with the Networking Environments, Network Server vs. Application

More information

Understanding Digital Dashboard

Understanding Digital Dashboard Understanding Digital Dashboard Microsoft s Digital Dashboard system is designed as an add-on to Outlook 2000 personal information manager. We look at how support staff can make the experience enjoyable

More information

PROTECTING NETWORKS WITH FIREWALLS

PROTECTING NETWORKS WITH FIREWALLS 83-10-44 DATA SECURITY MANAGEMENT PROTECTING NETWORKS WITH FIREWALLS Gilbert Held INSIDE Connecting to the Internet; Router Packet Filtering; Firewalls; Address Hiding; Proxy Services; Authentication;

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

v5.5 Installation Guide

v5.5 Installation Guide v5.5 Installation Guide for use with Integrated Microsoft Products Websense Enterprise Installation Guide 1996 2005, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights reserved.

More information

Niagara IT Manager s Guide

Niagara IT Manager s Guide 3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

1. Overview of the Java Language

1. Overview of the Java Language 1. Overview of the Java Language What Is the Java Technology? Java technology is: A programming language A development environment An application environment A deployment environment It is similar in syntax

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

CheckPoint FireWall-1 Version 3.0 Highlights Contents

CheckPoint FireWall-1 Version 3.0 Highlights Contents CheckPoint FireWall-1 Version 3.0 Highlights Contents Abstract...2 Active Network Management...3 Accounting... 3 Live Connections Report... 3 Load balancing... 3 Exporting log records to Informix database...

More information

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4] Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within

More information

Logical & Physical Security

Logical & Physical Security Building a Secure Ethernet Environment By Frank Prendergast Manager, Network Certification Services Schneider Electric s Automation Business North Andover, MA The trend toward using Ethernet as the sole

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Introducing Cisco Unified Communications Express

Introducing Cisco Unified Communications Express CHAPTER 1 Introducing Cisco Unified Communications Express Cisco Unified Communications Express is an award-winning communications solution that is provided with the Cisco Integrated Services Router portfolio.

More information

4D and SQL Server: Powerful Flexibility

4D and SQL Server: Powerful Flexibility 4D and SQL Server: Powerful Flexibility OVERVIEW MS SQL Server has become a standard in many parts of corporate America. It can manage large volumes of data and integrates well with other products from

More information

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

CITS1231 Web Technologies. Client, Server, the Internet, and the Web CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the

More information

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality

More information

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Aerohive Networks Inc. Free Bonjour Gateway FAQ Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)

Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued) Chapter 1: Networking with Microsoft Learning Objectives Plan what network model to apply to your network Compare the differences between Windows 2000 Professional, Server, Advanced Server, and Datacenter

More information

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

Network Security: From Firewalls to Internet Critters Some Issues for Discussion Network Security: From Firewalls to Internet Critters Some Issues for Discussion Slide 1 Presentation Contents!Firewalls!Viruses!Worms and Trojan Horses!Securing Information Servers Slide 2 Section 1:

More information

Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management

Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management WHITE PAPER Management: the Integrated Approach to Remote IT Management EXECUTIVE SUMMARY For decades, business imperatives for information technology (IT) have remained constant to cut costs and improve

More information

Downsizing : Client/Server Computing Joe Wang, The Upjohn Company, Kalamazoo, MI (616)329-8421

Downsizing : Client/Server Computing Joe Wang, The Upjohn Company, Kalamazoo, MI (616)329-8421 Downsizing : Client/Server Computing Joe Wang, The Upjohn Company, Kalamazoo, MI (616)329-8421 ABSTRACT Client/Server "fever" is spreading across Corporate America like wild fire. Does your company want

More information

IT Components of Interest to Accountants. Importance of IT and Computer Networks to Accountants

IT Components of Interest to Accountants. Importance of IT and Computer Networks to Accountants Chapter 3: AIS Enhancements Through Information Technology and Networks 1 Importance of IT and Computer Networks to Accountants To use, evaluate, and develop a modern AIS, accountants must be familiar

More information

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe

More information

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating

More information

Ti m b u k t up ro. Timbuktu Pro and Microsoft System Management Server Integration White Paper. Contents

Ti m b u k t up ro. Timbuktu Pro and Microsoft System Management Server Integration White Paper. Contents The #1 Remote Control and File Transfer Software Contents 1 Integration Summary 1 An Introduction to Timbuktu Pro 2 Integration Details 2 SMS Application Distribution Packs for Timbuktu Pro 3 SMS Console

More information

Table of Contents. Introduction... 3. Prerequisites... 5. Installation... 6. Configuration... 7. Conclusion... 19. Recommended Reading...

Table of Contents. Introduction... 3. Prerequisites... 5. Installation... 6. Configuration... 7. Conclusion... 19. Recommended Reading... Software to Simplify and Share SAN Storage Implementing a Highly Scalable and Highly Available Server and Desktop Provisioning Solution Using Citrix Provisioning Server 5.0, Sanbolic Melio FS 2008 and

More information

Two significant networking trends have

Two significant networking trends have INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt. 9, 175 183 (1999) Why Web-based Network Monitoring? Leveraging the Platform By Ron Jenkins Ł The increasing use of network monitoring and

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Computer networks, data communication and Internet

Computer networks, data communication and Internet **** 1 Computer networks, data communication and Internet Introduction **** Computer networks: summary 2 The following gives an overview of computer networks and data communication:»the basic principles»local

More information

Citrix Access Gateway

Citrix Access Gateway F E A T U R E S O V E R V I E W Citrix Access Gateway Citrix Access Gateway is a universal SSL VPN appliance that combines the best features of IPSec and typical SSL VPNs without the costly and cumbersome

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information