A NOVEL METHOD TO MANAGE NETWORK REQUIREMENTS. Chennai, Tamil Nadu, India. Chennai, Tamil Nadu, India

Size: px
Start display at page:

Download "A NOVEL METHOD TO MANAGE NETWORK REQUIREMENTS. Chennai, Tamil Nadu, India. Chennai, Tamil Nadu, India"

Transcription

1 Volume 116 No , 9-15 ISSN: (printed version); ISSN: (on-line version) url: ijpam.eu A NOVEL METHOD TO MANAGE NETWORK REQUIREMENTS S.Pothumani 1, Dr.J.Hameed Hussain 2 1 Assistant Professor, Dept. of CSE, Bharath University, Chennai, Tamil Nadu, India 2 Dean Engineering, Bharath University, Chennai, Tamil Nadu, India 1 pothumani@gmail.com, 2 deanengg@bharathuniv.ac.in Abstract: The aim of this paper is to fulfill all possible requirements of a network administrator regarding his network. This also provides an efficient way for the system administrator to work offsite and who needs to keep intact with his PC and do his work, so that they can share their PC s with each other. The system administrator working in a multistoried building can use this tool to manage the network by logging into the server system in the main branch through LAN or internet using the IP address of the server and control his system and network or can work with the others. Network scrutinizer is a software tool that helps an administrator manage the machines connected across the enterprise network and monitor the various tasks running on various remote machines, thereby assisting the administrator in controlling the systems in the network. ADSI and WMI are the two techniques which are implemented in the project. 1. Introduction Network scrutinizer is a software tool that helps an administrator manage the machines connected across the enterprise network and monitor the various tasks running on various remote machines, thereby assisting the administrator in controlling the systems in the network. The tool aimed for administrator s exclusive use helps in checking the availability of a machine in the network. This is used to enables the administrator to work on multiple terminals by connecting his system to the server. It allows the user to retrieve a list of computers that are active in the network. It is used to Displays the IP Address of the computers. It Pings the IP Address and displays whether the computer is available in the network and Monitor and control all running services, processes and events on remote hosts and local machines. And it Watch features of running tasks (the handle of the main window, process ID, Etc), Maps & disconnects the network drives, Sends a message to any client connected in the enterprise network and Search for the given computer in the network. And also displays all shared folders of a specified computer [1,2]. 2. Related work The existing system is a normal Network Management Tool which can be used only for the domain based network. It has some difficulties. They are Administrator could not control the network when he is out of station, A Remote- Based tool is not yet found,remote accessing of any server is not possible. 3. Proposed Work The existing system has a lot of drawbacks as said earlier. Considering these drawbacks in mind the proposed system is developed. The proposed system is to provide an internet based Network Management System which fulfills the functionalities of an administrator like tracking IP address, desktop, getting active machines in the network, searching machine in a particular domain, etc. It is required to run on a networked Windows environment. The proposed system has three main modules in it. They are tracking, monitoring and utilities [3,4]. The various modules and its functions in this project are described. The modules are divided into three main categories. They are mentioned and explained in brief as follows. 3.1 Tracking The tracking module contains four sub modules. They are IPAddress, Active Machines, Shared Folders, Ping and Search. The ADSI technology helps in implementing the tracking module as it allows handling directory services. Tracking IPAddress concerns with IP Address of any remote host in any domain. 9

2 Active Machines give information about the machines which are active in a network domain. Shared Folders tracks the folders which are shared at that time in the network. Ping connects a host to another host by replying the number of bytes transferred to it. Search performs a searching operation of a particular host in a particular domain. 3.2 Monitoring The Monitoring module contains four Sub modules in it. They are Application, Services, and Events. The monitoring module is implemented using the Windows Management Information. Application: This helps the administrator to keep in track of the applications in the network for a particular remote host. Services: This provides the administrator with the services of a particular host in the network. Events: Events keep track of the events that are running and stopped in the remote host in the network. 3.3 Utilities The utilities module consists of three sub modules in it. They are mapping, disconnecting and messaging. Mapping: This connects Network Drives even from one branch to another branch office provided with a same server. Disconnecting: Disconnects the connected drives in the Network. Messaging: Provides administrator to interact with any remote host in the network. 4. System Architecture This architecture used in tracking module and monitoring module is discussed. This includes the concepts of Active Directory Service Interface (ADSI) and Windows Management Instrumentation (WMI) using which tracking and monitoring module is implemented respectively. The basic technique and the protocol used are also discussed. The windows socket is used to provide a protocol independent transport interface. ADSI Architecture The tracking module is based on the ADSI technology. The figures below represent the architecture of ADSI. Figure 1. ADSI Architecture Active directory technology (ADSI) Active Directory is the Windows directory service that provides a unified view of complex networks. It reduces the number of directories and namespaces with which a developer must contend. To use the ADSI technology, client computers must have ADSI 2.5 or later installed on them. ADSI 2.5 is automatically installed with Windows 2000 and therefore does not require installation. In a typical organization, there are often diverse types of directories in use. These may include Windows NT directories, application-specific directories, and directories of network resources. This variety can cause problems for end users, developers, and administrators. A user may encounter problems while trying to log on to multiple resources. An administrator may face difficulties in maintaining network resources on diverse systems. As a developer, it may need to write an application to seamlessly interact with several different directories. [5] The administrator is expected to connect with the server of the particular domain with the IP Address. The changes administrator makes to that window will automatically take effect in the server. Active Directory provides a straightforward structuring of a complicated network of computers. An Active Directory system is arranged in a hierarchical tree. Each node represents a resource or service available on the network and contains a set of properties that can be retrieved and manipulated. A directory is an information source used to store information about interesting objects. A telephone directory stores information about telephone subscribers. In a file system, the directory stores information about files. In a distributed computing system or a public computer network such as the Internet, there are many interesting objects: printers, fax servers, applications, and databases. Users want to find and use these objects. Administrators want to manage how these objects are used. 10

3 A directory service differs from a directory in that a service is both the information source and the functionality that makes the information available to users. For example, a directory service stores information about objects such as users. That information can be used for identification when communicating with network resources, but also as the definition of where the object fits into the overall hierarchical scheme. Scope is the limits defined for searching the tree or sub trees. [6] Active directory schema Active Directory schemas define attributes for directory objects in much the same way that database schemas define structures for databases. This schema information is stored with an Active Directory hierarchy to help expedite member searches on large directories. Security Active Directory provides a variety of security tools such as Secure Sockets Layer and Kerberos encryption to create a flexible security environment for developers. [7] Providers and objects Each type of directory system can access with the DirectoryEntry component has a specific directory protocol (called a service provider) that allows to access and work with that directory's contents. ADSI was created to eliminate the difficulty of switching back and forth between these protocols by enabling developers to access all of the protocols through a single interface. When an instance of a Directory Entry component is created, specify a path for it that indicates the type of provider in use on the system are accessing and the object to which it wants to bind. The following table lists the service providers can access and the identifiers for each. Service provider Windows NT version 5.0, Windows 2000,or Windows XP Lightweight Directory Access Protocol (LDAP) Novell NetWare Directory Service Novell Netware 3.x Path identifier WinNT://path LDAP://path NDS://path NWCOMPAT://path Each service provider makes available to a different set of objects with associated data and behaviors that can access and manipulate. These objects correspond to items and resources in the directory tree for that namespace. Many of the providers have objects in common. For example, all of the providers give access to a group object that represents a group account, and a user object that represents a user account. For the Windows NT service providers, can access domains, computers, print queues, and sessions. For the LDAP provider, can access organizations, locality, and Root DS Entry (rootdse) objects. The Root DS Entry is a required set of operational attributes that the user can read to find out fundamental characteristics of the directory and the server. The rootdse is required only for LDAP providers. [8] Active directory objects Active Directory Service Interfaces (ADSI) is a programmatic interface for Microsoft Windows Active Directory. It enables the applications to interact with diverse directories on a network, using a single interface. Visual Studio.NET and the.net Framework make it easy to add ADSI functionality with the Directory Entry and Directory Searcher components. ADSI helps in creating applications that perform common administrative tasks, such as backing up databases, accessing printers, and administering user accounts. ADSI makes it possible for to: Log on once to work with diverse directories. The DirectoryEntry component class provides username and password properties that can be entered at runtime and communicated to the Active Directory object are binding to. Use a single application programming interface (API) to perform tasks on multiple directory systems by offering the user a variety of protocols to use The DirectoryServices namespace provides the classes to perform most administrative functions. Perform "rich querying" on directory systems. ADSI technology allows for searching for an object by specifying two query dialects: SQL and LDAP. Access and use a single, hierarchical structure for administering and maintaining diverse and complicated network configurations by accessing an Active Directory tree. Searching directories Using the Directory Searcher class to search and perform queries against an Active Directory hierarchy using the Lightweight Directory Access Protocol (LDAP). This helps to perform queries based on properties (Rich Query) of an object that is located in a large directory to find a specific object by one or more of its property values. Administering directories 11

4 The Directory Entry component can be bound to an object in the directory to perform administrative tasks, such as modifying properties or monitoring informational changes. For example, suppose that a company allows employees to place online orders for books needed in their jobs. Spending limits vary depending on the employee's position. When an employee places a book order, the company's tracking application can use a Directory Entry component to verify information about the employee's position and spending limits. If the limit is exceeded, the Directory Entry component can retrieve the address for the employee and his manager and can then send additional information to both of them. Both the Directory Entry component and Directory Searcher component require that have the ADSI SDK or ADSI runtime installed on r computer in order to create applications with their functionality. ADSI 2.5 is installed by default with Windows NT version 5.0, Windows 2000, or Windows XP. When using a previous version of Windows, you can install the SDK from the Microsoft web site. WMI ARCHITECTURE The monitoring module is based on Windows Management Instrumentation (WMI). Windows Management Instrumentation is a scalable system management infrastructure that uses a single consistent, standards-based, extensible, object-oriented interface. WMI provides a standard way to interact with system management information and the underlying WMI APIs. The figures below represent the architecture of WMI. Figure 2. WMI Architecture Windows management instrumentation (WMI) WMI is used primarily by system management application developers and administrators to access and manipulate system management information. Windows Management Instrumentation (WMI) technology is an implementation of the Desktop Management Task Force's (DMTF) Web-based Enterprise Management (WBEM) initiative for Microsoft Windows operating systems. It takes advantage of the DMTF Common Information Model (CIM) to represent managed objects in Windows-based environments. CIM is a data model, a conceptual view of the environment, that unifies and extends existing instrumentation and management standards (SNMP, DMI, CMIP, and so on) using object-oriented constructs and design. Web-based Enterprise Management is an industrywide DMTF initiative that supports uniform system, network, and applications management based on the Common Information Model, also a DMTF standard. The goals of this initiative are to develop standardized technology for accessing management information in an enterprise environment, and to enable the development of tools and technologies that reduce the complexity and costs of enterprise management. By providing such standards, this initiative contributes to the industry-wide efforts to lower total cost of ownership (TCO). TCO refers to the administrative costs associated with computer hardware and software purchases, deployment and configuration, hardware and software updates, training, maintenance, and technical support. The WBEM initiative proceeds through the cooperative efforts of the founding member companies of WBEM, BMC Software Inc., Cisco Systems Inc., Compaq Computer Corp., Intel Corp., and Microsoft Corp., as well as many other companies active in the DMTF. Windows management instrumentation technology The Windows Management Instrumentation technology is a management infrastructure that supports the syntax of CIM, the Managed Object Format (MOF), and a common programming interface. The Managed Object Format is used to define the structure and contents of the CIM schema in human and machine-readable form. Windows Management Instrumentation offers a powerful set of services, including query-based information retrieval and event notification. These services and the management data are accessed through a Component Object Model (COM) programming interface. Additionally, support for scripting is provided in the WMI scripting interface. The architecture of WMI is described below The Windows Management Instrumentation technology provides: Access to monitor, command, and control any entity through a common, unifying set of interfaces, irrespective of the underlying instrumentation mechanism. WMI is an access mechanism. A logically organized, consistent model of Windows operation, configuration, and status. 12

5 A COM application programming interface (API) for providing and accessing management information. Interoperability with other Windows management services. This approach simplifies developers' efforts to create integrated and wellarchitected management solutions. A flexible architecture. This allows vendors to extend the information model to cover managed objects, such as devices and applications, by writing code modules called providers (previously called WBEM providers). Providers are the means to connect Windows Management Instrumentation with one or more sources of management information. Extensions to the Windows Driver Model (WDM) to capture instrumentation data and events from device drivers and kernel-side components. A powerful event mechanism that allows management events to be asserted and associated with other management information. These notifications can also be forwarded to local or remote management applications. A rich query language that enables detailed queries of the information model. A scriptable API that developers can use to create management applications. The scripting API supports several languages, including Microsoft Visual Basic ; Visual Basic for Applications; Visual Basic Scripting Edition (VBScript); Microsoft JScript, and Perl. Additionally, we can use the Windows Scripting Host or Internet Explorer to write scripts that use this interface. Windows Scripting Host, like Internet Explorer, serves as a controller engine of ActiveX scripting engines. Windows Scripting Host supports scripts written in VBScript, JScript, and Perl. By extending CIM and supporting MOF and a common programming interface, the Windows Management Instrumentation technology enables diverse applications to transparently manage a variety of enterprise components. WINSOCK PROTOCOL Name commonly used for the Windows Sockets programming interface, used to provide a protocolindependent transport interface. Windows CE supports most of the common Winsock functions. The Windows Sockets specification defines a binary-compatible network-programming interface for Microsoft Windows. Windows Sockets are based on the UNIX sockets implementation in the Berkeley Software Distribution (BSD, release 4.3) from the University of California at Berkeley. The specification includes both BSD-style socket routines and extensions specific to Windows. Using Windows Sockets permits the application to communicate across any network that conforms to the Windows Sockets API. On Win32, Windows Sockets provide for thread safety. Many network software vendors support Windows Sockets under network protocols including Transmission Control Protocol/Internet Protocol (TCP/IP), Xerox Network System (XNS), Digital Equipment Corporation s DECNet protocol, Novell Corporation s Internet Packet Exchange/Sequenced Packed Exchange (IPX/SPX), and others. Although the present Windows Sockets specification defines the sockets abstraction for TCP/IP, any network protocol can comply with Windows Sockets by supplying its own version of the dynamic link library (DLL) that implements Windows Sockets. Examples of commercial applications written with Windows Sockets include Window servers X, terminal emulators, and electronic mail systems.a socket is a communication endpoint an object through which a Windows Sockets application sends or receives packets of data across a network. A socket has a type and is associated with a running process, and it may have a name. Currently, sockets generally exchange data only with other sockets in the same communication domain, which uses the Internet Protocol Suite. Both kinds of sockets are bi-directional: they are data flows that can be communicated in both directions simultaneously (full-duplex). Two socket types are available: Stream Sockets Stream sockets provide for a data flow without record boundaries - a stream of bytes. Streams are guaranteed to be delivered and to be correctly sequence and unduplicated. Datagram Sockets Datagram sockets support a recordoriented data flow that is not guaranteed to be delivered and may not be sequenced as sent or unduplicated. OVERALL REMOTE SERVER ACCESS ARCHITECTURE Remote Desktop Controller Server Remote Desktop Controller Server is the server program, which sends its desktop window in real time to a client program over the Internet or a modem, or a connection oriented networking system. Remote Desktop Controller Client The Remote Desktop Controller Client is the client program, which displays the desktop of a machine running 13

6 the server program. Here we have to connect the client program with the specified IP address of the server machine. Thereafter, the client machine can have a talk and also control the server in some ways. 5. Conclusion Thus the project was initiated to work in a more efficient and personal way. This enables the administrator to keep in track of his network. The tool is basically built using VB.NET with the help of ADSI and WMI technologies. A tool to manage and monitor remote machines on a network has been devised and has been found working in a networked environment with accuracy and consistency. The developed system works on a Windows environment with the application installed on a Windows 2000 machine. The tool proves to be of great aid to an administrator to control remote machines in the network. 6. Future Enhancements Enhancing a system is the most basic thing for development. A thing is not considered to be efficient if it is not developed and adapts to the advancements in the technology. So, there must be a consistent development in any system. A system may appear to be efficient enough at that time, but as time progresses the system should also be enhanced to the level of advancement in the technology. price of safety in an active network. IEEE/KICS Journal of Communications and Networks (JCN), March [2] K. G. Anagnostakis, M.W. Hicks, S. Ioannidis, A. D. Keromytis, and J. M. Smith. Scalable resource control in active networks. In Proceedings of the 2nd International Working Conference on Active Networks (IWAN), October [3] K. G. Anagnostakis, S. Ioannidis, S. Miltchev, and J. M. Smith. Practical network applications on a lightweight active management environment. In Proceedings of the 3rd International Working Conference on Active Networks (IWAN), October [4] Andrew S. Tanenbaum, Computer Networks, Fourth edition (2003) Prentice Hall of India Publications. [5] Noel Jerke, Visual Basic6 The Complete Reference, (1999) Tata McGraw Hill, New Delhi. [6] [7] [8] Work Groups Considering the future enhancement of this tool, it could be done to work fine for workgroups in the network. At present it satisfies all possible needs of network having domain. Multiple Servers This system can also be enhanced to access multiple servers by single client. This can be done by dividing the client desktop to view the different server s desktop. Processing Speed The processing speed of the tool can also be improved. Since desktop capturing undergoes compression and decompression it is reasonably slow. Similarly when loading the hosts of a specific domain if it is a huge network the process is slowed. This is expected to overcome in the days to come. References [1] D. S. Alexander, P. B. Menage, W. A. Arbaugh, A. D. Keromytis, K. Anagnostakis, and J. M. Smith. The 14

7 15

8 16

Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held

Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held 5-02-30 Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held Payoff As organizations increasingly move mainframe-based applications to client/server platforms, Information Systems

More information

WBEM Web-based Enterprise Management

WBEM Web-based Enterprise Management 1 WBEM Web-based Enterprise Management Outline What is Enterprise Management? What are the drivers in Enterprise Mgt.? Distributed Management Technology Forum (DMTF) Web Based Enterprise Management (WBEM)

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

Network+ Guide to Networks, Fourth Edition. Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking

Network+ Guide to Networks, Fourth Edition. Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks, Fourth Edition Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking Objectives Discuss the functions and features of a network operating system Define

More information

Planning the Installation and Installing SQL Server

Planning the Installation and Installing SQL Server Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter

More information

WMI BASED PERFORMANCE ANALYSIS FOR DISTRIBUTED SYSTEMS

WMI BASED PERFORMANCE ANALYSIS FOR DISTRIBUTED SYSTEMS Copyright 2002 IFAC 15th Triennial World Congress, Barcelona, Spain BASED PERFORMANCE ANALYSIS FOR DISTRIBUTED SYSTEMS Mitica Manu 1, Theodor Borangiu 2, Daniel Roman 3 1 Visual Studio, Developer Division,

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Meeting the Challenge of Managing Client/Server Document Distribution and Printing. PrintXchange White Paper Xerox Corporation

Meeting the Challenge of Managing Client/Server Document Distribution and Printing. PrintXchange White Paper Xerox Corporation Meeting the Challenge of Managing /Server Document Distribution and Printing PrintXchange White Paper 1999 Xerox Corporation You glance at the clock. Good. Just enough time to print out the report you

More information

Automated Deployment Services

Automated Deployment Services Building Out the Enterprise Using Automated Deployment Services Automated Deployment Services (ADS), a component of the Microsoft Windows Server 2003 operating system, includes a new set of imaging tools

More information

Enterprise Directories and Security Management: Merging Technologies for More Control

Enterprise Directories and Security Management: Merging Technologies for More Control Enterprise Directories and Security Management: Merging Technologies for More Control Contents Introduction...3 Directory Services...3 A brief history of LDAP...3 LDAP today...4 Free and commercially available

More information

Xerox Device Data Collector 1.1 Security and Evaluation Guide

Xerox Device Data Collector 1.1 Security and Evaluation Guide Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation

More information

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1 Windows 7 Overview Windows 7 Overview By Al Lake History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface Lake 2 Objectives To explore the principles

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

FAQ: Real-World Networks

FAQ: Real-World Networks Question 1: What are client-side and server-side processes? Answer 1: The terms client-side and server-side are sometimes called frontend (client) and back-end (server) processes (Davis & Rajkumar, 2004).

More information

[MS-WMOD]: Windows Management Protocols Overview. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-WMOD]: Windows Management Protocols Overview. Intellectual Property Rights Notice for Open Specifications Documentation [MS-WMOD]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

Integration of VIGO into Directory Services

Integration of VIGO into Directory Services Integration of VIGO into Directory Services Martin Wollschlaeger Abstract Modern networked systems are organised using directory services. These directories implement hierarchically organised object oriented

More information

PROPOSAL OF WINDOWS NETWORK

PROPOSAL OF WINDOWS NETWORK PROPOSAL OF WINDOWS NETWORK By: Class: CMIT 370 Administering Windows Servers Author: Rev: 1.0 Date: 01.07.2017 Page 1 of 10 OVERVIEW This is a proposal for Ear Dynamics to integrate a Windows Network

More information

Management Intranet: Integrating Web-based Network Management Applications

Management Intranet: Integrating Web-based Network Management Applications Management Intranet: Integrating Web-based Network Management Applications Jim Turner Cisco Systems Inc. 125 Rio Robles San Jose, CA 95134 USA jiturner@cisco.com Swami Jayaraman Cisco Systems Inc. 125

More information

Introducing the SAS ODBC Driver

Introducing the SAS ODBC Driver 1 CHAPTER 1 Introducing the SAS ODBC Driver Overview: The SAS ODBC Driver 1 What Is ODBC? 2 What Is the SAS ODBC Driver? 2 Types of Data Accessed with the SAS ODBC Driver 3 Understanding SAS 5 SAS Data

More information

Getting Started With System Center 2012 R2 Orchestrator

Getting Started With System Center 2012 R2 Orchestrator Getting Started With System Center 2012 R2 Orchestrator Microsoft Corporation Published: November 1, 2013 Applies To System Center 2012 Service Pack 1 (SP1) System Center 2012 R2 Orchestrator Feedback

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

TOSHIBA GA Printing from Windows

TOSHIBA GA Printing from Windows TOSHIBA GA-1211 Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45075925 24 October 2008 CONTENTS 3 CONTENTS

More information

describe the functions of Windows Communication Foundation describe the features of the Windows Workflow Foundation solution

describe the functions of Windows Communication Foundation describe the features of the Windows Workflow Foundation solution 1 of 9 10/9/2013 1:38 AM WCF and WF Learning Objectives After completing this topic, you should be able to describe the functions of Windows Communication Foundation describe the features of the Windows

More information

Introduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS?

Introduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS? Introduction to LAN TDC 363 Lecture 05 Nt Network rkoprti Operating Systems tm Windows Based Networking NetWare Based Networking Book Reading: Chapters 8 1 Course Outline Network operating system (NOS)

More information

Network Gateway Services John Enck

Network Gateway Services John Enck 51-20-39 Network Gateway Services John Enck Payoff In a TCP/IP network, a gateway has a specific purpose. The TCP/IP architecture even includes formal protocols that apply only to TCP/IP gateways. In a

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

One Identity Manager 8.0. Administration Guide for Connecting to Active Directory

One Identity Manager 8.0. Administration Guide for Connecting to Active Directory One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

AppleTalk. Chapter Goals. Introduction CHAPTER

AppleTalk. Chapter Goals. Introduction CHAPTER 35 CHAPTER Chapter Goals Describe the development history of the protocol, used almost exclusively in Macintosh computers. Describe the components of networks and extended network. Discuss the primary

More information

LDAP Directory Services

LDAP Directory Services ATTENTION LDAP Directory Services THE MATERIAL PROVIDED IN THIS DOCUMENT IS FOR INFORMATION PURPOSES ONLY. IT IS NOT INTENDED TO BE ADVICE. YOU SHOULD NOT ACT OR ABSTAIN FROM ACTING BASED UPON SUCH INFORMATION

More information

[MS-WMOD]: Windows Management Protocols Overview

[MS-WMOD]: Windows Management Protocols Overview [MS-WMOD]: This document provides an overview of the Protocol Family. It is intended for use in conjunction with the Microsoft Protocol Technical Documents, publicly available standard specifications,

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

Taking Advantage of ADSI

Taking Advantage of ADSI Taking Advantage of ADSI Active Directory Service Interfaces (ADSI), is a COM-based set of interfaces that allow you to interact and manipulate directory service interfaces. OK, now in English that means

More information

Cisco Configuration Engine 2.0

Cisco Configuration Engine 2.0 Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Fiery Network Controller for DocuColor 5065 SERVER & CONTROLLER SOLUTIONS. Printing from Windows

Fiery Network Controller for DocuColor 5065 SERVER & CONTROLLER SOLUTIONS. Printing from Windows Fiery Network Controller for DocuColor 5065 SERVER & CONTROLLER SOLUTIONS Printing from Windows 2005 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for

More information

Simple Network Management Protocol

Simple Network Management Protocol 56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange

More information

New Features Summary. SAP Sybase Event Stream Processor 5.1 SP02

New Features Summary. SAP Sybase Event Stream Processor 5.1 SP02 Summary SAP Sybase Event Stream Processor 5.1 SP02 DOCUMENT ID: DC01616-01-0512-01 LAST REVISED: April 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software

More information

Microsoft. iron Krokhmal et IT /2005

Microsoft. iron Krokhmal et IT /2005 Microsoft 2005 i et IT /2005 Current Features Automated Deployment Services (ADS). - imaging tools to automate the deployment of Microsoft operating systems. Active Directory Application Mode (ADAM). -

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

StreamServe Persuasion SP5

StreamServe Persuasion SP5 StreamServe Persuasion SP5 Installation Guide Rev B StreamServe Persuasion SP5 Installation Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents pending Use

More information

Installing 64-Bit Applications

Installing 64-Bit Applications Installing 64-Bit Applications Published April 2004 Abstract Windows XP is the first version of Windows to run natively on Intel s new 64-bit processors. For the first time, Windows developers can take

More information

DNS is the mechanism by which Internet software translates names to attributes such as addresses.

DNS is the mechanism by which Internet software translates names to attributes such as addresses. Full form: 1 PSTN : Public Switching Telephone Networks 2 ISDN : Integrated Services Digital Network. 3 DSL: Digital Subscribe Line. 4 CATV: Community Antenna Television. 5 DHCP: Dynamic Host Configuration

More information

A NET Refresher

A NET Refresher .NET Refresher.NET is the latest version of the component-based architecture that Microsoft has been developing for a number of years to support its applications and operating systems. As the name suggests,.net

More information

Using Windows NT in a NetWare Environment Gilbert Held

Using Windows NT in a NetWare Environment Gilbert Held Previous screen 50-20-40 Using Windows NT in a NetWare Environment Gilbert Held Payoff For companies that require Windows NT clients to work in a NetWare environment, getting the configuration setup right

More information

Optimizing and Managing File Storage in Windows Environments

Optimizing and Managing File Storage in Windows Environments Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)

More information

SCO Vision2K 2.1. What s in this release

SCO Vision2K 2.1. What s in this release SCO Vision2K 2.1 What s in this release The CD contains these SCO Vision2K products: SCO XVision Eclipse 7.31 and SCO XVision Eclipse 3D 7.31 SCO VisionFS 3.1 SCO Vision Resume 1.2 SCO TermVision 2.2 SCO

More information

Microsoft Windows Server 2003 Administration Fundamentals

Microsoft Windows Server 2003 Administration Fundamentals C01613540.fm Page 1 Monday, April 12, 2004 10:19 AM Part I Microsoft Windows Server 2003 Administration Fundamentals The fundamental tasks you need for Microsoft Windows Server 2003 administration are

More information

ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist

ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication

More information

Overview of CentreWare Page 1 of 6. CentreWare Overview

Overview of CentreWare Page 1 of 6. CentreWare Overview Overview of CentreWare Page 1 of 6 CentreWare Overview A Software Portfolio for Managing Documents, Network Printers, and Peripheral Devices Across Diverse Client/Server Network Environments April 1997

More information

Discovery in the WBEM Architecture (Infrastructure Discovery)

Discovery in the WBEM Architecture (Infrastructure Discovery) Discovery in the WBEM Architecture (Infrastructure Discovery) 3:15 pm- 4:05 pm Thursday Winston Bumpus, Novell, Inc. Director of Standards, Karl Schopmeyer, Open Group / Application WG Chair The Problem

More information

A New Method Of VPN Based On LSP Technology

A New Method Of VPN Based On LSP Technology 2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing

More information

Novell Network Services for OS/390 Release 1

Novell Network Services for OS/390 Release 1 Software Announcement January 19, 1999 Release 1 Overview OS/390 Release 1 consists of Novell Directory Services (NDS) on OS/390 which provides directory support for new and existing Novell Netware Version

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

Intel Active Management Technology Overview

Intel Active Management Technology Overview Chapter 5 Intel Active Management Technology Overview Management is doing things right; leadership is doing the right things. Peter Drucker (1909 2005) As we discussed in the last chapter, Intel Active

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

Internet Information Server 6.0

Internet Information Server 6.0 Internet Information Server 6.0 Introduction and Overview The IIS 6.0 core components and architecture are redesigned, which makes this version of IIS significantly different from previous versions. IIS

More information

ERRDS: A CASE TOOL TO GENERATE AN ER DATA MODEL FROM A RELATIONAL DATABASE SCHEMA

ERRDS: A CASE TOOL TO GENERATE AN ER DATA MODEL FROM A RELATIONAL DATABASE SCHEMA ERRDS: A CASE TOOL TO GENERATE AN ER DATA MODEL FROM A RELATIONAL DATABASE SCHEMA NABIL ARMAN Palestine Polytechnic University Hebron, Palestine Abstract: A relational database (RDB) schema is a description

More information

Network Applications Principles of Network Applications

Network Applications Principles of Network Applications Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the

More information

Hitachi ID Password Manager Telephony Integration

Hitachi ID Password Manager Telephony Integration Hitachi ID Password Manager Telephony Integration 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................

More information

IBM i Version 7.2. Networking IBM i NetServer IBM

IBM i Version 7.2. Networking IBM i NetServer IBM IBM i Version 7.2 Networking IBM i NetServer IBM IBM i Version 7.2 Networking IBM i NetServer IBM Note Before using this information and the product it supports, read the information in Notices on page

More information

Novell ZENworks Asset Management 7

Novell ZENworks Asset Management 7 Novell ZENworks Asset Management 7 w w w. n o v e l l. c o m July 2006 INSTALLATION GUIDE Table Of Contents 1. Installation Overview... 1 Upgrade/Update Matrix...1 Installation Choices...2 ZENworks Asset

More information

Distributed Systems. Bina Ramamurthy. 6/13/2005 B.Ramamurthy 1

Distributed Systems. Bina Ramamurthy. 6/13/2005 B.Ramamurthy 1 Distributed Systems Bina Ramamurthy 6/13/2005 B.Ramamurthy 1 Introduction Distributed system is the one in which hardware and software components at networked computers communicate and coordinate their

More information

Fiery EXP50 Color Server. Printing from Windows

Fiery EXP50 Color Server. Printing from Windows Fiery EXP50 Color Server Printing from Windows 2006 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45055357 24 March 2006 CONTENTS 3

More information

CA IdentityMinder. Glossary

CA IdentityMinder. Glossary CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

CIM Common Information Model

CIM Common Information Model CIM Common Information Model Web-based Enterprise Management Matthias Hölzer-Klüpfel 2004-08-22, akademy, Ludwigsburg Overview What's the problem? Distributed Management Task Force Common

More information

User Manual. Admin Report Kit for IIS 7 (ARKIIS)

User Manual. Admin Report Kit for IIS 7 (ARKIIS) User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...

More information

Windows 2000 System Administration Handbook, 1/e

Windows 2000 System Administration Handbook, 1/e Windows 2000 System Administration Handbook, 1/e Will Willis, Lewisville, Texas David Watts, Sugarland, Texas Tillman Strahan, Lewisville, Texas Copyright 2000, 721 pp. Paper format ISBN 0-13-027010-5

More information

P-NET Management with Java based Components

P-NET Management with Java based Components P-NET Management with based Components Martin Wollschlaeger Abstract The introduction of based software components is a challenge for developers and users of fieldbus products. The paper shows concepts,

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Automating Administration with Windows PowerShell

Automating Administration with Windows PowerShell Course Code: M10961 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Automating Administration with Windows PowerShell Overview This course provides students with the fundamental knowledge and skills

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Using Compaq Insight Management to Monitor Compaq Servers

Using Compaq Insight Management to Monitor Compaq Servers BY JAMES BARRY Using Compaq Insight Management to Monitor Compaq Servers This article presents a step-by-step approach to installing and configuring the Compaq client/server software provided for monitoring

More information

Print Server Administration User s Guide

Print Server Administration User s Guide Print Server Administration User s Guide ii About This Guide Table of Contents ABOUT THIS GUIDE... 1 What s Not Covered in This User s Guide... 1 Contents of the User s Guide... 2 INTRODUCTION... 3 Background

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

The Data Link Layer. 32 PART I Networking Basics

The Data Link Layer. 32 PART I Networking Basics 32 PART I Networking Basics weather station. More realistic devices use duplex mode, where all systems can send or receive with equal facility. This is often further distinguished as half-duplex (the system

More information

SAS ODBC Driver. Overview: SAS ODBC Driver. What Is ODBC? CHAPTER 1

SAS ODBC Driver. Overview: SAS ODBC Driver. What Is ODBC? CHAPTER 1 1 CHAPTER 1 SAS ODBC Driver Overview: SAS ODBC Driver 1 What Is ODBC? 1 What Is the SAS ODBC Driver? 2 Types of Data Accessed with the SAS ODBC Driver 3 Understanding SAS 4 SAS Data Sets 4 Unicode UTF-8

More information

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives

More information

Bridge Cable User s Guide

Bridge Cable User s Guide Bridge Cable User s Guide Table of Contents Overview -------------------------------------------------------------------- 2 Driver Installation --------------------------------------------------------

More information

Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S

Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Contents Introduction...1 iscsi Explained...1 Initiators...1 Discovery and Logging On...2 Authentication...2 Designing the

More information

Version 5.1 October 2003

Version 5.1 October 2003 Version 5.1 October 2003 HOBLink X11 Software and Documentation 2003 HOB Phone: 49 911/96 66-161 Fax: 49 911/96 66-299 (The first two digits are the country code for Germany - 49) All information contained

More information

Simulation of TCP Layer

Simulation of TCP Layer 39 Simulation of TCP Layer Preeti Grover, M.Tech, Computer Science, Uttrakhand Technical University, Dehradun ABSTRACT The Transmission Control Protocol (TCP) represents the most deployed transport protocol

More information

What's new in IBM Rational Build Forge Version 7.1

What's new in IBM Rational Build Forge Version 7.1 What's new in IBM Rational Build Forge Version 7.1 Features and support that help you automate or streamline software development tasks Skill Level: Intermediate Rational Staff, IBM Corporation 13 Jan

More information

Inventions on Extending LDAP functionality- A TRIZ based Analysis

Inventions on Extending LDAP functionality- A TRIZ based Analysis From the SelectedWorks of Umakant Mishra August, 2006 Inventions on Extending LDAP functionality- A TRIZ based Analysis Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/60/ Inventions

More information

Preface. DirXmetahub Document Set

Preface. DirXmetahub Document Set Preface DirXmetahub Document Set Preface This manual provides an introduction to DirXmetahub. It consists of the following sections: Chapter 1 introduces DirXmetahub. It provides an overview of meta directory

More information

Corporate Training Centre (306)

Corporate Training Centre   (306) Corporate Training Centre www.sbccollege.ca/corporate (306)244-6340 corporate@sbccollege.ca Automating Administration with Windows PowerShell: 10961C 5 Day Training Program November 5-9, 2018 Cost: $2,700.00

More information

Naming in Distributed Systems

Naming in Distributed Systems Distributed Systems, WS 2014 Naming in Distributed Systems Hong-Linh Truong Distributed Systems Group, Vienna University of Technology truong@dsg.tuwien.ac.at dsg.tuwien.ac.at/staff/truong DS WS 2014 1

More information

Communication Fundamentals in Computer Networks

Communication Fundamentals in Computer Networks Lecture 11 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07

More information

Microsoft Virtualizing Enterprise Desktops and Apps

Microsoft Virtualizing Enterprise Desktops and Apps 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20694 - Virtualizing Enterprise Desktops and Apps Length 5 days Price $4290.00 (inc GST) Version B Overview This five-day, hands-on training course is designed

More information

Application Notes for Configuring the ADTRAN NetVanta UC Server with Avaya IP Office 6.1 Issue 1.0

Application Notes for Configuring the ADTRAN NetVanta UC Server with Avaya IP Office 6.1 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring the ADTRAN NetVanta UC Server with Avaya IP Office 6.1 Issue 1.0 Abstract These Application Notes describe the procedure for

More information

Sage MAS 200 ERP Supported Platform Matrix

Sage MAS 200 ERP Supported Platform Matrix The information in this document applies to Level 3.71 through version 4.30. Sage generally only supports the current Sage MAS 200 level and one prior major level. As of the version 4.10 release, Sage

More information

LIBRARY SYSTEM TECHNICAL SURVEY FAX BACK TO

LIBRARY SYSTEM TECHNICAL SURVEY FAX BACK TO LIBRARY SYSTEM TECHNICAL SURVEY FAX BACK TO 732-291-3699 SITE INFORMATION Your Name/Title: Date: Library Name: o Main o Branch Library Website: Mailing Address: City, State, Zip: _ Which product(s) did

More information

BEAWebLogic. Enterprise Security. WebLogic Server v8.1 Installation

BEAWebLogic. Enterprise Security. WebLogic Server v8.1 Installation BEAWebLogic Enterprise Security WebLogic Server v8.1 Installation Product Version: 4.2 Service Pack 2 Document Revised: October 27, 2005 Copyright Copyright 2005 BEA Systems, Inc. All Rights Reserved.

More information

IBM OS/2 Warp Server for e-business the Software Solution for All Sizes of Businesses

IBM OS/2 Warp Server for e-business the Software Solution for All Sizes of Businesses Programming Announcement April 27, 1999 IBM OS/2 Warp Server for e-business the Software Solution for All Sizes of Businesses Overview Whether you are adding a new server to an existing network or stepping

More information

Enterprise print management in VMware Horizon

Enterprise print management in VMware Horizon Enterprise print management in VMware Horizon Introduction: Embracing and Extending VMware Horizon Tricerat Simplify Printing enhances the capabilities of VMware Horizon environments by enabling reliable

More information

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft

More information

Product Page: https://digitalrevolver.com/product/automating-administration-with-windows-powershell/

Product Page: https://digitalrevolver.com/product/automating-administration-with-windows-powershell/ Automating Administration with Windows PowerShell Course Code: Duration: 5 Days Product Page: https://digitalrevolver.com/product/automating-administration-with-windows-powershell/ This course provides

More information

The Open Group. DMTF Global Management Conference June 18, Allen Brown President & CEO

The Open Group. DMTF Global Management Conference June 18, Allen Brown President & CEO The Open Group DMTF Global Management Conference June 18, 2003 Allen Brown President & CEO a.brown@opengroup.org 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 ext. 235

More information

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.

More information

Internet Mail: The SMTP Model

Internet Mail: The SMTP Model Internet Mail: The SMTP Model User File System Sender- SMTP SMTP Commands Replies Receiver- SMTP File System Simple Mail Transfer Protocol (SMTP) to transfer e-mails Depending on the operating system,

More information