Direction Générale de l Administration et de la Logistique Service des Technologies de l Information

Size: px
Start display at page:

Download "Direction Générale de l Administration et de la Logistique Service des Technologies de l Information"

Transcription

1 Direction Générale de l Administration et de la Logistique Service des Technologies de l Information ITSP Brief description of the Council of Europe's Technological Infrastructure 1 Common services infrastructure 1.1 The multimedia network Through the services it provides, the multimedia network forms the base of our technological infrastructure. The multimedia network comprises a Metropolitan Area Network (MAN) federating 9 buildings in Strasbourg and a Wide Area Network (WAN) covering four remote sites and 14 Information Centres. In brief, the MAN comprises an inter-building network using 622 Mbit ATM lines, 100 base-t ATM and ETHERNET connections for the servers and switched 10 base-t ETHERNET connections for the data clients. For the telephony part, the MAN uses 2Mbit PCM technology. The data network uses fiber optics and category 5 and 3 wiring and carries Internet protocols (IP, TCP, http, SMTP etc). It is divided into several VLANs (virtual Local Area Networks). It federates 2,700 connection points in Strasbourg, through which all the infrastructure's peripherals and servers communicate. The WAN covers the Paris and Brussels offices, the European Centre for Global Interdependence and Solidarity (Lisbon) and the European Youth Centre in Budapest, thanks to specialized connections. For the European Centre for Modern Languages in Graz and the Information Centres in central and east European capital cities, the means of federation used is the Internet. 1.2 Applications The infrastructure's application layer is made up of several offers: - office automation applications, - "Groupware" team working applications, - WEB hosting systems, - 1/5 -

2 - resource planning and management applications (ERP - Enterprise Resource Planning). Office automation applications The table below lists the software available on the infrastructure via a downloading service accessible on the DIT Intranet site. Software Offers Office Basic Version Office French User Interface Office Language Modules Office Photodraw Office Publisher On-line Office Documentation Internet Explorer Office automation Netscape Communicator Netscape Security Plug-in Adobe Acrobat Reader AllChars Euro Symbol WinZip Reflection RealPlayer Adobe Acrobat Adobe Photoshop OmniPages Pro Web publishing Visual Interdev Norton Antivirus Web Trend Log Analyser Legato Networker WS FTP PRO Teamworking applications (Groupware) The DIT provides a teamworking environment based on architecture comprising applications facilitating communication, information access, cooperation and coordination between the players in the Organisation. The teamworking architecture consists of: - a messaging, diary and Private and Shared Information application (MS Exchange, NT Workgroup) 2

3 Service Offer Messaging Public Folders Outlook Web Access Electronic fax Individual accounts Mailbox hosting Storage of data from pooled work documents Access to the messaging service from the Internet Sending of faxes from the messaging system Account for network access and personal storage space for documents 1.3 WEB Hosting systems WEB hosting takes different forms: - secure Internet access: this hosting method provides access to the DIT's secure Internet gateways from a network connection. The offer includes the protection systems, naming service (name server) and inclusion in the coe.int domain. Examples are the Parliamentary Assembly Secretariat and the Secretariat of the European Court of Human Rights, which use this offer for their Internet servers; - secure Internet access plus provision of Web servers: this offer goes a step further by adding maintenance for a specific Web server which is usually located in the offices of the unit concerned. It is being superseded by the Web Hosting offer; - the Web Hosting offer, as set out below: Service Features Offer "Classic" hosting Hosting plus database Hosting of a remote unit Web Site Active pages Indexing and search engine Secure access "Classic" hosting Database "Classic" hosting Publication via the Internet Specific hosting arrangements Based on expediency study and implementation plan 1.4 Resource planning and management applications (ERP) The DIT service offer includes various resource management and planning applications: Wages of permanent staff (GESPER) Wages of Temporary staff (GESTEMP) Management of official journeys (GESMIS) Human Resources Management (PeopleSoft HRMS) Inventory management (Actima) Accounting and Finance (FIMS) 3

4 1.5 Client peripherals The system architecture's client stations comprised PCs, telephones, printers, fax machines, scanners, video projectors, CD-ROM recorders and laptop PCs and portable printers. In terms of number and function, the PCs are the key component in the client layer. Every Council of Europe staff member has a PC and access to the IS through it. The 1,600 PCs are located in the 9 buildings in Strasbourg and also at remote office sites (Paris, Brussels, Lisbon, Budapest, Graz). They are connected to the multimedia network via an ETHERNET card. The PCs are managed as intelligent terminals; in other words, a PC does not have its own identity but it is the user logging on via the PC who possesses an identity. This PC management method enables staff members to access the IS from any workstation and retrieve their own working environment. There are 3,000 telephones (for 4,000 lines), which are mostly digital telephones with a display screen and function keys. These provide easy access to PABX network services, such as caller display, call divert, three-way conferences, last call etc. The meeting rooms, technical premises and corridors are equipped with cheaper analogue telephones. The 400 printers are mostly devices for office use (low capacity, locally situated) and mostly of the laser type. Like the PCs, they are connected via an ETHERNET card (10/100 megabits/second). Medium-capacity (30 pages/minute) and high-capacity (100 pages/minute) printers are also available via the PRIDE application. Council of Europe staff have at their disposal fax machines, which are connected to the inhouse telecommunications network and also have access to the telephone network services. Office scanners have been installed. They are provided as a back-up service so that documents existing only in handwritten or printed version can be circulated in electronic form. Similarly, about CD-ROM recorders have been installed for local data back-up. Finally, laptop PCs are available. They are split into two groups: a pool of laptops for staff going on official journeys and a batch of laptops for use as workstations by certain staff who travel a great deal. 2 Specific infrastructures 2.1 PRIDE The concept underlying the PRIDE system (Production and Retrieval of Information and Documents through Electronics) is the rationalisation of document production and distribution and the creation of an electronic document collection accessible for all types of searches whether via Intranet, Extranet or Internet. Its main principles are: - print-on-demand and just-in-time production; - giving author departments responsibility for the content and form of their documents; - doing away with the circulation of hard-copy originals and the production request form between the author departments and the SPDP (Documents et Publications Production Department); 4

5 - use of a single reproduction method, namely electronic reproduction; - running a set of documentary databases with direct input from the author departments and accessible, depending on permissions, both inhouse and from outside the Council of Europe; - decentralised management of the Council of Europe's address database; - consultation via a one-stop search portal of all the documentary databases with the possibility of reusing the information located; - more closely targeted information searches through use of metadata; - system access for author departments using no more than an Internet browser. 2.2 Registry of the European Court of Human Rights CMIS CMIS is now being used by the Registry to run the Court's business process as regards the case-files. It offers staff modern and powerful environment providing a sophisticated, yet easy to use, case-file management database. This is coupled with a fully interactive document-management system and integrated with the Rightfax computerised fax software. The system enables users to produce management reports and statistics, and contains all the metadata and documents pertaining to a case. CMIS is also linked to over 2000 model letters to produce standard forms of correspondence to applicants, representatives and governments. 2.3 European Directorate for the Quality of Medicines 2.4 European Audiovisual Observatory 5

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

Program: Systems Engineering Certificate. Prerequisite: None. Hardware/Software required:

Program: Systems Engineering Certificate. Prerequisite: None. Hardware/Software required: Program: Systems Engineering Certificate Prerequisite: None Hardware/Software required: 1. PC or Mac Any device capable of running remote software. 2. Audio output capable PC so that you can interact with/listen

More information

NETWORK ADMINISTRATOR

NETWORK ADMINISTRATOR JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under

More information

IT Application Support Engineer (Database, Web & User)

IT Application Support Engineer (Database, Web & User) IT Application Support Engineer (Database, Web & User) Analysis, design, implementation, and testing of web-shared databases. These databases are mainly administrative oriented and are used to support

More information

Hardware and Software Guidelines for Customer Hosted Systems

Hardware and Software Guidelines for Customer Hosted Systems Hardware and Software Guidelines for Customer Hosted Systems Version Date: June 17, 2016 Rapattoni Magic-Cloud AMS real estate association management software represents a huge step forward in technology.

More information

TOP 100-500 VARs Printers Servers Desktops Storage Security Mobility Software Telco

TOP 100-500 VARs Printers Servers Desktops Storage Security Mobility Software Telco Channel solution for 2015 TOP 100-500 VARs Printers Servers Desktops Storage Security Mobility Software Telco www.compubase.net compubase is the leading source of information on ICT market players in EMEA.

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

FBLA Computer Problem Solving aligned with Common Core 6.14. FBLA: Computer Problem Solving RST.9-10.4 RST.11-12.4

FBLA Computer Problem Solving aligned with Common Core 6.14. FBLA: Computer Problem Solving RST.9-10.4 RST.11-12.4 Competency: Personal Computer Components 1. Identify how hardware components interact and work with software to perform computing tasks. 2. Install, configure, optimize, and upgrade personal computer components.

More information

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems Knowledge Management Systems Chapter 5- The Technology Infrastructure Dr. Mohammad S. Owlia Associate Professor, Industrial Engineering Department, Yazd University E-mail :owliams@gmail.com, Website :

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

OpenIMS 4.2. Document Management Server. User manual

OpenIMS 4.2. Document Management Server. User manual OpenIMS 4.2 Document Management Server User manual OpenSesame ICT BV Index 1 INTRODUCTION...4 1.1 Client specifications...4 2 INTRODUCTION OPENIMS DMS...5 2.1 Login...5 2.2 Language choice...5 3 OPENIMS

More information

Document Management Glossary

Document Management Glossary Document Management Glossary CVS - Concurrent Versions System and is a process of sharing, saving and recovering version information for people using code. Document - Information stored in files on a pc

More information

C o v e r. Thin Client Application Options. SIMATIC Thin Client s FAQ h April 2009 e et. Service & Support. Answers for industry.

C o v e r. Thin Client Application Options. SIMATIC Thin Client s FAQ h April 2009 e et. Service & Support. Answers for industry. C o v e r SIMATIC Thin Client s FAQ h April 2009 e et Service & Support Answers for industry. Question This entry originates from the Service & Support Portal of Siemens AG, Sector Industry, Industry Automation

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

St. Johns County Public Library System Technology Plan 2009-2012

St. Johns County Public Library System Technology Plan 2009-2012 St. Johns County Public Library System Technology Plan 2009-2012 Written by Jae Bass, Technical Services Administrator in order to meet requirements of the Universal Service Discount Program Created: May

More information

Mid-Term #1 Solutions

Mid-Term #1 Solutions Mid-Term #1 Solutions Chapter #1: Computers: Tools for an Information Age 1. Computers introduce the element into the modern economy. A. labor B. information C. capital D. land 2. Pie charts are an example

More information

Document Capture and Distribution

Document Capture and Distribution Document Capture and Distribution WHITE PAPER SmarThru TM Workflow 2 Document Capture and Distribution Introduction This white paper describes the design and the features used by the Samsung SmarThru TM

More information

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

COURCE TITLE DURATION CompTIA A+ Certification 40 H. COURCE TITLE DURATION CompTIA A+ Certification 40 H. Overview: The target student is anyone with basic computer user skills who is interested in: obtaining a job as an IT professional or PC technician.

More information

Technology Plan Avon Free Public Library Avon, CT. October 1, 2007 - December 31, 2010

Technology Plan Avon Free Public Library Avon, CT. October 1, 2007 - December 31, 2010 Technology Plan Avon Free Public Library Avon, CT. October 1, 2007 - December 31, 2010 Vision: To excel as the community s link to ideas, information and resources. Mission Statement: To serve as the center

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Fax Server. Blue Line IP ISDN ISDN PRI

Fax Server. Blue Line IP ISDN ISDN PRI Blue Line IP PRI Blue Line The corporate fax solution The corporate fax solution Communication by fax is essential to business life. Fax has many major advantages over email. It is well accepted, very

More information

Figure 41-1 IP Filter Rules

Figure 41-1 IP Filter Rules 41. Firewall / IP Filter This function allows user to enable the functionality of IP filter. Both inside and outside packets through router could be decided to allow or drop by supervisor. Figure 41-1

More information

17 April 2014. Remote Scan

17 April 2014. Remote Scan 17 April 2014 Remote Scan 2014 Electronics For Imaging. The information in this publication is covered under Legal Notices for this product. Contents 3 Contents...5 Accessing...5 Mailboxes...5 Connecting

More information

v-library (FILMS) (Functional Integrated Library Management System)

v-library (FILMS) (Functional Integrated Library Management System) v-library (FILMS) (Functional Integrated Library Management System) Developed by: Functional Solutions Proposed by: PenNueng Holding Co., Ltd. Tel: 02-216-8144 Fax: 02-215-2067 Email: sales@pen1.biz v-library

More information

Rapattoni Magic 10 Version Date: May 1, 2015. Hardware and Software Guidelines for Customer Hosted Systems

Rapattoni Magic 10 Version Date: May 1, 2015. Hardware and Software Guidelines for Customer Hosted Systems for Customer Hosted Systems Rapattoni Magic 10 real estate association management software represents a huge step forward in technology. It operates on Microsoft server technology and uses Microsoft SQL

More information

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x)

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Start your Internet Explorer browser and direct it to the faculty home page. Click on the link Remote Access,

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Glossary of terms used in the survey

Glossary of terms used in the survey Glossary of terms used in the survey 5 October 2015 Term or abbreviation Audio / video capture Refers to the recording of audio and/or video. API Application programming interface, how a computer program

More information

Internet accessible facilities management

Internet accessible facilities management Internet accessible facilities management A technology overview This overview is an outline of the major components and features of TotalControl, deployment possibilities and a list of terms that describe

More information

Enterprise Vault. For Microsoft Exchange Server. Installing and Configuring Version 5.0

Enterprise Vault. For Microsoft Exchange Server. Installing and Configuring Version 5.0 Enterprise Vault For Microsoft Exchange Server Installing and Configuring Version 5.0 March 2005 This publication and the software it describes are the intellectual property of kvault Software Ltd (KVS).

More information

WORKSHOP SYSTEM REQUIREMENTS & GUIDELINES CONTENTS

WORKSHOP SYSTEM REQUIREMENTS & GUIDELINES CONTENTS WORKSHOP SYSTEM R EQUIREMENTS AND GUIDELINES VIDA IN 2015, POINT-TO-POINT INFRASTRUCTURE CONTENTS 1 INTRODUCTION... 3 2 VIDA IN 2015... 4 2.1 Timeline... 4 3 REQUIREMENT DETAILS... 5 3.1 VIDA requirements...

More information

Allows the access and modification to all graphic and alphanumeric data in all layers of SIGPAC central database.

Allows the access and modification to all graphic and alphanumeric data in all layers of SIGPAC central database. SIGPAC SOFTWARE APPLICATIONS 1 SIGPAC DNEditor 2 DNEditor Allows the access and modification to all graphic and alphanumeric data in all layers of SIGPAC central database. Data stored in databases (MAPA

More information

Computer Networks. Stephanie L. Faíson IT331. Kaplan University

Computer Networks. Stephanie L. Faíson IT331. Kaplan University Computer Networks 1 Running Head: Data Communications and Computer Networks Computer Networks Stephanie L. Faíson IT331 Kaplan University Computer Networks 2 Abstract This paper will discuss my choice

More information

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

Rapattoni Magic 9 Hardware and Software Guidelines

Rapattoni Magic 9 Hardware and Software Guidelines Rapattoni Magic 9 real estate association management software represents a huge step forward in technology. It operates on Microsoft server technology and uses Microsoft SQL Server (MSSQL) as its underlying

More information

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS Jonas Software, March 2013 Contents Introduction... 3 Hardware Specifications... 4 Recommended Server Hardware Specifications... 4 Recommended Workstation

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Enterprise Security Critical Standards Summary

Enterprise Security Critical Standards Summary Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Allworx. 6x Communications designed exclusively for small business. Finally, the phone and PC network system that Saves you money

Allworx. 6x Communications designed exclusively for small business. Finally, the phone and PC network system that Saves you money Allworx 6x Communications designed exclusively for small business Finally, the phone and PC network system that Saves you money Doesn t compromise on features Lets you transition to new technology at your

More information

Computer Networks CCNA Module 1

Computer Networks CCNA Module 1 Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Network Guide. Windows Configuration Using a Printer Server Monitoring and Configuring the Printer Appendix

Network Guide. Windows Configuration Using a Printer Server Monitoring and Configuring the Printer Appendix Network Guide 1 2 3 4 Windows Configuration Using a Printer Server Monitoring and Configuring the Printer Appendix Read this manual carefully before you use this machine and keep it handy for future reference.

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

TERMS OF REFERENCE for outsourced IT services at ILO premises

TERMS OF REFERENCE for outsourced IT services at ILO premises 1. Purpose: TERMS OF REFERENCE for outsourced IT services at ILO premises The supplier will provide engineer-level ICT staff for on-site IT Support for X days a week through 1 staff on duty at the ILO

More information

Introduction to LAN/WAN. Application Layer (Part II)

Introduction to LAN/WAN. Application Layer (Part II) Introduction to LAN/WAN Application Layer (Part II) Application Layer Topics Domain Name System (DNS) (7.1) Electronic Mail (Email) (7.2) World Wide Web (WWW) (7.3) Electronic Mail (Email) Mostly used

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

2003 2006 Pershing LLC. All rights reserved. Pershing, NetExchange Pro and InfoDirect FTP are registered trademarks of Pershing Investments LLC.

2003 2006 Pershing LLC. All rights reserved. Pershing, NetExchange Pro and InfoDirect FTP are registered trademarks of Pershing Investments LLC. Using InfoDirect FTP September 2006 COPYRIGHT AND MARKS Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

HP eprint Enterprise. Installation Checklist. Release 4.2

HP eprint Enterprise. Installation Checklist. Release 4.2 HP eprint Enterprise Installation Checklist Release 4.2 Copyright and License Copyright 2015 HP Development Company, L.P. Reproduction, adaptation, or translation without prior written permission is prohibited,

More information

BCIS 4680 -- BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016

BCIS 4680 -- BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016 Office : BLB 290E, Business Leadership Building Office Hours: Tu &Th 9:00 am - 11:00 am, or by appointment/drop-in Telephone: 940-565-4660 Web Page: http://www.coba.unt.edu/bcis/faculty/capan/capan.htm

More information

Administration guide. Océ LF Systems. Connectivity information for Scan-to-File

Administration guide. Océ LF Systems. Connectivity information for Scan-to-File Administration guide Océ LF Systems Connectivity information for Scan-to-File Copyright 2014, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

ERserver. iseries. Networking TCP/IP Setup

ERserver. iseries. Networking TCP/IP Setup ERserver iseries Networking TCP/IP Setup ERserver iseries Networking TCP/IP Setup Copyright International Business Machines Corporation 1998, 2001. All rights reserved. US Government Users Restricted

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Glossary of Telco Terms

Glossary of Telco Terms Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

WIRELESS TRAINING SOLUTIONS. by vlogic, Inc. L a b 0.3 Remote Access Labs

WIRELESS TRAINING SOLUTIONS. by vlogic, Inc. L a b 0.3 Remote Access Labs WIRELESS TRAINING SOLUTIONS by vlogic, Inc L a b 0.3 Remote Access Labs WIRELESS TRAINING SOLUTIONS Hands-on Workshop and Lab Guide Table of Contents Connecting to the Wireless Training Solutions Network

More information

PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA.

PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA. PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA Milan Paroški 1, Nenad Petrović, Rade Ćirić 2 1 Provincial Authorities Administrative

More information

San Jacinto College District Information Technology Services Desktop Support Guidelines

San Jacinto College District Information Technology Services Desktop Support Guidelines Our goal at (ITS) is to provide the highest level of technical support and customer service to all San Jacinto College students and employees. We are constantly striving to provide a secure and efficient

More information

Effective Use of Individual User Profiles with Software Distribution

Effective Use of Individual User Profiles with Software Distribution The following paper was originally published in the Digest of the Large Scale System Administration of Windows NT Workshop Seattle, Washington, August 1997 For more information about USENIX Association

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Java User Guide. Citrix Access Gateway 8.1, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Java User Guide. Citrix Access Gateway 8.1, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Java User Guide Citrix Access Gateway 8.1, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

e CABINET AND DOCULEX Document Capture and Electronic File Conversion

e CABINET AND DOCULEX Document Capture and Electronic File Conversion A R I C O H C O M PA N Y e CABINET AND DOCULEX P D F. C A P T U R E Document Capture and Electronic File Conversion D OCULEX PDF.CAPTURE From the Leader in Document Imaging Software... DocuLex DocuLex

More information

PROCESS DATA VISUALIZATION AND MONITORING USING INTERNET

PROCESS DATA VISUALIZATION AND MONITORING USING INTERNET International Carpathian Control Conference ICCC 2002 MALENOVICE, CZECH REPUBLIC May 27-30, 2002 PROCESS DATA VISUALIZATION AND MONITORING USING INTERNET Lenka LANDRYOVÁ 1 and Jiří KOZIOREK 2 1 Department

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Configuring an APOGEE System on an IT Infrastructure White Paper

Configuring an APOGEE System on an IT Infrastructure White Paper Configuring an APOGEE System on an IT Infrastructure White Paper 149-1006 Building Technologies 149-1006, Rev. DA Copyright Notice Copyright Notice Notice Document information is subject to change without

More information

Chapter 9 The Internet

Chapter 9 The Internet CSCA0101 COMPUTING BASICS Chapter 9 1 1. 2. Types of Network 3. What Makes Internet Works? 4. Internet Equipment 5. Internet Applications 2 A global network connecting millions of computers More than 100

More information

A Practical Approach to Starting and Growing Your Own Law Firm

A Practical Approach to Starting and Growing Your Own Law Firm Hanging Your Shingle: A Practical Approach to Starting and Growing Your Own Law Firm Technology Planning for Startup Law Firms General Considerations Computers Deciding on the type of computer and the

More information

Quick Scan Features Setup Guide

Quick Scan Features Setup Guide Xerox WorkCentre 7132 Quick Scan Features Setup Guide 701P45042 This guide includes instructions for: Scan to Email on page 1 Scan to Mailbox Setup (Optional) on page 5 Network Scanning Setup (Optional)

More information

Computer Network & ICT Support Technician

Computer Network & ICT Support Technician Computer Network & ICT Support Technician The general competencies and skills enlisted in this document encompass the principle background needed for a Computer Network & ICT Support Technician to carry

More information

VOICE SOLUTIONS NGN. Telephone-Handbook NEXT GENERATION NETWORK. UAN: (051) 111 11 44 44 www.nayatel.com /Nayatel

VOICE SOLUTIONS NGN. Telephone-Handbook NEXT GENERATION NETWORK. UAN: (051) 111 11 44 44 www.nayatel.com /Nayatel VOICE SOLUTIONS NGN Telephone-Handbook NEXT GENERATION NETWORK UAN: (051) 111 11 44 44 www.nayatel.com / Table of Contents Sr.No Contents Page No. 1. Introduction 1 2. Hosted Exchange Solution 2-9 2a.

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

Opus Guide for IT Managers

Opus Guide for IT Managers Opus Guide for IT Managers Table of Contents Introduction...1 System Requirements...2 Configuration...3 Integration...3 Networking...3 Security...5 Interconnectivity...6 History Archival Sizing...7 Introduction

More information

BUSINESS PROCESS Automation For Customer Loyalty PMS CRM CCD CEBP

BUSINESS PROCESS Automation For Customer Loyalty PMS CRM CCD CEBP BUSINESS PROCESS Automation For Customer Loyalty BI UC PMS CRM CCD CEBP Customer Relationship (CRM) The CRM system can be used to coordinate the work of sales, marketing and service staff and to increase

More information

Intellectual Property Organisation of Pakistan (IPO-Pakistan)

Intellectual Property Organisation of Pakistan (IPO-Pakistan) Intellectual Property Organisation of Pakistan (IPO-Pakistan) WIPO Regional Workshop on Digitization and Dissemination of Intellectual Property (IP) Information and Utilization of effective Search Tools

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Neoteris IVE Integration Guide

Neoteris IVE Integration Guide Neoteris IVE Integration Guide NESD-00090-00 CAY051402 The Secure Email Client upgrade option enables Neoteris IVE users to use standardsbased email clients to access corporate email from remote locations.

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

PavelComm s Pro-Tech Lite Fact Sheet

PavelComm s Pro-Tech Lite Fact Sheet PavelComm s Fact Sheet PavelComm s Fact Sheet - IT for Small Companies with Big Business Needs Owners, Executives and Managers should be investing in and integrating technology to increase the productivity

More information

Sample Career Ladder/Lattice for Information Technology

Sample Career Ladder/Lattice for Information Technology Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.

More information

Citrix Shared Desktop

Citrix Shared Desktop Citrix Shared Desktop Via the secure access portal The Citrix Shared Desktop enables users to access view and edit documents within their home areas and group areas. The Citrix Shared Desktop gives you

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

SERVER AND WORKSTATION MINIMUM REQUIREMENT

SERVER AND WORKSTATION MINIMUM REQUIREMENT SERVER AND WORKSTATION MINIMUM REQUIREMENT Revision March 2015 THIS DOCUMENT IS VERY IMPORTANT. PLEASE BE VERY ATTENTIVE. TABLE OF CONTENTS Minimum Server requirements Scenario # 1, up to 3 users Minimum

More information

APPENDIX C. I. IT Standards and Levels of Support Service Provided by ITS. and ITS Performance Pledges

APPENDIX C. I. IT Standards and Levels of Support Service Provided by ITS. and ITS Performance Pledges APPENDIX C IT Standards and Levels of Support Service Provided by ITS and ITS Performance Pledges I. IT Standards and Levels of Support Service Provided by ITS In general, 3 levels of support service have

More information

Advanced Diploma In Hardware, Networking & Server Configuration

Advanced Diploma In Hardware, Networking & Server Configuration Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking

More information

CERTIFICATE IN COMPUTER HARDWARE AND NETWORK TECHNOLOGY (CCHNT) COURSE STRUCTURE UNIVERSITY SCIENCE INSTRUMENTATION CENTRE (USIC)

CERTIFICATE IN COMPUTER HARDWARE AND NETWORK TECHNOLOGY (CCHNT) COURSE STRUCTURE UNIVERSITY SCIENCE INSTRUMENTATION CENTRE (USIC) CERTIFICATE IN COMPUTER HARDWARE AND NETWORK TECHNOLOGY (CCHNT) COURSE STRUCTURE UNIVERSITY SCIENCE INSTRUMENTATION CENTRE (USIC) GUJARAT VIDYAPITH: AHMEDABAD 14 USIC DEPARTMENT: GUJARAT VIDYAPITH CERTIFICATE

More information

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other:

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other: Course Title: Information Technology Fundamentals Unit: Computer Basics Content Standard(s) and 1. Distinguish between input and output devices, including monitor, keyboard, mouse, and scanner. 2. Utilize

More information

TABLE OF CONTENTS NETWORK SECURITY 1...1

TABLE OF CONTENTS NETWORK SECURITY 1...1 Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Delphi 9.5.3 System Requirements

Delphi 9.5.3 System Requirements Market Intelligence Enterprise Business Management Sales & Catering Distribution & Content Delphi 9.5.3 System Requirements Revision 1.3 November 1, 2011 Delphi 9.5.3 System Requirements Users Server Hardware

More information

CentreWare Internet Services Setup and User Guide. Version 2.0

CentreWare Internet Services Setup and User Guide. Version 2.0 CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and

More information

POLICY STATEMENT Commonwealth of Pennsylvania Department of Corrections

POLICY STATEMENT Commonwealth of Pennsylvania Department of Corrections POLICY STATEMENT Commonwealth of Pennsylvania Department of Corrections Policy Subject: Policy Number: Computer Forensic Investigations (CFI) 2.4.1 Date of Issue: Authority: Effective Date: August 28,

More information