A NOVEL METHOD TO MANAGE NETWORK REQUIREMENTS. Chennai, Tamil Nadu, India. Chennai, Tamil Nadu, India
|
|
- Iris Byrd
- 5 years ago
- Views:
Transcription
1 Volume 116 No , 9-15 ISSN: (printed version); ISSN: (on-line version) url: ijpam.eu A NOVEL METHOD TO MANAGE NETWORK REQUIREMENTS S.Pothumani 1, Dr.J.Hameed Hussain 2 1 Assistant Professor, Dept. of CSE, Bharath University, Chennai, Tamil Nadu, India 2 Dean Engineering, Bharath University, Chennai, Tamil Nadu, India 1 pothumani@gmail.com, 2 deanengg@bharathuniv.ac.in Abstract: The aim of this paper is to fulfill all possible requirements of a network administrator regarding his network. This also provides an efficient way for the system administrator to work offsite and who needs to keep intact with his PC and do his work, so that they can share their PC s with each other. The system administrator working in a multistoried building can use this tool to manage the network by logging into the server system in the main branch through LAN or internet using the IP address of the server and control his system and network or can work with the others. Network scrutinizer is a software tool that helps an administrator manage the machines connected across the enterprise network and monitor the various tasks running on various remote machines, thereby assisting the administrator in controlling the systems in the network. ADSI and WMI are the two techniques which are implemented in the project. 1. Introduction Network scrutinizer is a software tool that helps an administrator manage the machines connected across the enterprise network and monitor the various tasks running on various remote machines, thereby assisting the administrator in controlling the systems in the network. The tool aimed for administrator s exclusive use helps in checking the availability of a machine in the network. This is used to enables the administrator to work on multiple terminals by connecting his system to the server. It allows the user to retrieve a list of computers that are active in the network. It is used to Displays the IP Address of the computers. It Pings the IP Address and displays whether the computer is available in the network and Monitor and control all running services, processes and events on remote hosts and local machines. And it Watch features of running tasks (the handle of the main window, process ID, Etc), Maps & disconnects the network drives, Sends a message to any client connected in the enterprise network and Search for the given computer in the network. And also displays all shared folders of a specified computer [1,2]. 2. Related work The existing system is a normal Network Management Tool which can be used only for the domain based network. It has some difficulties. They are Administrator could not control the network when he is out of station, A Remote- Based tool is not yet found,remote accessing of any server is not possible. 3. Proposed Work The existing system has a lot of drawbacks as said earlier. Considering these drawbacks in mind the proposed system is developed. The proposed system is to provide an internet based Network Management System which fulfills the functionalities of an administrator like tracking IP address, desktop, getting active machines in the network, searching machine in a particular domain, etc. It is required to run on a networked Windows environment. The proposed system has three main modules in it. They are tracking, monitoring and utilities [3,4]. The various modules and its functions in this project are described. The modules are divided into three main categories. They are mentioned and explained in brief as follows. 3.1 Tracking The tracking module contains four sub modules. They are IPAddress, Active Machines, Shared Folders, Ping and Search. The ADSI technology helps in implementing the tracking module as it allows handling directory services. Tracking IPAddress concerns with IP Address of any remote host in any domain. 9
2 Active Machines give information about the machines which are active in a network domain. Shared Folders tracks the folders which are shared at that time in the network. Ping connects a host to another host by replying the number of bytes transferred to it. Search performs a searching operation of a particular host in a particular domain. 3.2 Monitoring The Monitoring module contains four Sub modules in it. They are Application, Services, and Events. The monitoring module is implemented using the Windows Management Information. Application: This helps the administrator to keep in track of the applications in the network for a particular remote host. Services: This provides the administrator with the services of a particular host in the network. Events: Events keep track of the events that are running and stopped in the remote host in the network. 3.3 Utilities The utilities module consists of three sub modules in it. They are mapping, disconnecting and messaging. Mapping: This connects Network Drives even from one branch to another branch office provided with a same server. Disconnecting: Disconnects the connected drives in the Network. Messaging: Provides administrator to interact with any remote host in the network. 4. System Architecture This architecture used in tracking module and monitoring module is discussed. This includes the concepts of Active Directory Service Interface (ADSI) and Windows Management Instrumentation (WMI) using which tracking and monitoring module is implemented respectively. The basic technique and the protocol used are also discussed. The windows socket is used to provide a protocol independent transport interface. ADSI Architecture The tracking module is based on the ADSI technology. The figures below represent the architecture of ADSI. Figure 1. ADSI Architecture Active directory technology (ADSI) Active Directory is the Windows directory service that provides a unified view of complex networks. It reduces the number of directories and namespaces with which a developer must contend. To use the ADSI technology, client computers must have ADSI 2.5 or later installed on them. ADSI 2.5 is automatically installed with Windows 2000 and therefore does not require installation. In a typical organization, there are often diverse types of directories in use. These may include Windows NT directories, application-specific directories, and directories of network resources. This variety can cause problems for end users, developers, and administrators. A user may encounter problems while trying to log on to multiple resources. An administrator may face difficulties in maintaining network resources on diverse systems. As a developer, it may need to write an application to seamlessly interact with several different directories. [5] The administrator is expected to connect with the server of the particular domain with the IP Address. The changes administrator makes to that window will automatically take effect in the server. Active Directory provides a straightforward structuring of a complicated network of computers. An Active Directory system is arranged in a hierarchical tree. Each node represents a resource or service available on the network and contains a set of properties that can be retrieved and manipulated. A directory is an information source used to store information about interesting objects. A telephone directory stores information about telephone subscribers. In a file system, the directory stores information about files. In a distributed computing system or a public computer network such as the Internet, there are many interesting objects: printers, fax servers, applications, and databases. Users want to find and use these objects. Administrators want to manage how these objects are used. 10
3 A directory service differs from a directory in that a service is both the information source and the functionality that makes the information available to users. For example, a directory service stores information about objects such as users. That information can be used for identification when communicating with network resources, but also as the definition of where the object fits into the overall hierarchical scheme. Scope is the limits defined for searching the tree or sub trees. [6] Active directory schema Active Directory schemas define attributes for directory objects in much the same way that database schemas define structures for databases. This schema information is stored with an Active Directory hierarchy to help expedite member searches on large directories. Security Active Directory provides a variety of security tools such as Secure Sockets Layer and Kerberos encryption to create a flexible security environment for developers. [7] Providers and objects Each type of directory system can access with the DirectoryEntry component has a specific directory protocol (called a service provider) that allows to access and work with that directory's contents. ADSI was created to eliminate the difficulty of switching back and forth between these protocols by enabling developers to access all of the protocols through a single interface. When an instance of a Directory Entry component is created, specify a path for it that indicates the type of provider in use on the system are accessing and the object to which it wants to bind. The following table lists the service providers can access and the identifiers for each. Service provider Windows NT version 5.0, Windows 2000,or Windows XP Lightweight Directory Access Protocol (LDAP) Novell NetWare Directory Service Novell Netware 3.x Path identifier WinNT://path LDAP://path NDS://path NWCOMPAT://path Each service provider makes available to a different set of objects with associated data and behaviors that can access and manipulate. These objects correspond to items and resources in the directory tree for that namespace. Many of the providers have objects in common. For example, all of the providers give access to a group object that represents a group account, and a user object that represents a user account. For the Windows NT service providers, can access domains, computers, print queues, and sessions. For the LDAP provider, can access organizations, locality, and Root DS Entry (rootdse) objects. The Root DS Entry is a required set of operational attributes that the user can read to find out fundamental characteristics of the directory and the server. The rootdse is required only for LDAP providers. [8] Active directory objects Active Directory Service Interfaces (ADSI) is a programmatic interface for Microsoft Windows Active Directory. It enables the applications to interact with diverse directories on a network, using a single interface. Visual Studio.NET and the.net Framework make it easy to add ADSI functionality with the Directory Entry and Directory Searcher components. ADSI helps in creating applications that perform common administrative tasks, such as backing up databases, accessing printers, and administering user accounts. ADSI makes it possible for to: Log on once to work with diverse directories. The DirectoryEntry component class provides username and password properties that can be entered at runtime and communicated to the Active Directory object are binding to. Use a single application programming interface (API) to perform tasks on multiple directory systems by offering the user a variety of protocols to use The DirectoryServices namespace provides the classes to perform most administrative functions. Perform "rich querying" on directory systems. ADSI technology allows for searching for an object by specifying two query dialects: SQL and LDAP. Access and use a single, hierarchical structure for administering and maintaining diverse and complicated network configurations by accessing an Active Directory tree. Searching directories Using the Directory Searcher class to search and perform queries against an Active Directory hierarchy using the Lightweight Directory Access Protocol (LDAP). This helps to perform queries based on properties (Rich Query) of an object that is located in a large directory to find a specific object by one or more of its property values. Administering directories 11
4 The Directory Entry component can be bound to an object in the directory to perform administrative tasks, such as modifying properties or monitoring informational changes. For example, suppose that a company allows employees to place online orders for books needed in their jobs. Spending limits vary depending on the employee's position. When an employee places a book order, the company's tracking application can use a Directory Entry component to verify information about the employee's position and spending limits. If the limit is exceeded, the Directory Entry component can retrieve the address for the employee and his manager and can then send additional information to both of them. Both the Directory Entry component and Directory Searcher component require that have the ADSI SDK or ADSI runtime installed on r computer in order to create applications with their functionality. ADSI 2.5 is installed by default with Windows NT version 5.0, Windows 2000, or Windows XP. When using a previous version of Windows, you can install the SDK from the Microsoft web site. WMI ARCHITECTURE The monitoring module is based on Windows Management Instrumentation (WMI). Windows Management Instrumentation is a scalable system management infrastructure that uses a single consistent, standards-based, extensible, object-oriented interface. WMI provides a standard way to interact with system management information and the underlying WMI APIs. The figures below represent the architecture of WMI. Figure 2. WMI Architecture Windows management instrumentation (WMI) WMI is used primarily by system management application developers and administrators to access and manipulate system management information. Windows Management Instrumentation (WMI) technology is an implementation of the Desktop Management Task Force's (DMTF) Web-based Enterprise Management (WBEM) initiative for Microsoft Windows operating systems. It takes advantage of the DMTF Common Information Model (CIM) to represent managed objects in Windows-based environments. CIM is a data model, a conceptual view of the environment, that unifies and extends existing instrumentation and management standards (SNMP, DMI, CMIP, and so on) using object-oriented constructs and design. Web-based Enterprise Management is an industrywide DMTF initiative that supports uniform system, network, and applications management based on the Common Information Model, also a DMTF standard. The goals of this initiative are to develop standardized technology for accessing management information in an enterprise environment, and to enable the development of tools and technologies that reduce the complexity and costs of enterprise management. By providing such standards, this initiative contributes to the industry-wide efforts to lower total cost of ownership (TCO). TCO refers to the administrative costs associated with computer hardware and software purchases, deployment and configuration, hardware and software updates, training, maintenance, and technical support. The WBEM initiative proceeds through the cooperative efforts of the founding member companies of WBEM, BMC Software Inc., Cisco Systems Inc., Compaq Computer Corp., Intel Corp., and Microsoft Corp., as well as many other companies active in the DMTF. Windows management instrumentation technology The Windows Management Instrumentation technology is a management infrastructure that supports the syntax of CIM, the Managed Object Format (MOF), and a common programming interface. The Managed Object Format is used to define the structure and contents of the CIM schema in human and machine-readable form. Windows Management Instrumentation offers a powerful set of services, including query-based information retrieval and event notification. These services and the management data are accessed through a Component Object Model (COM) programming interface. Additionally, support for scripting is provided in the WMI scripting interface. The architecture of WMI is described below The Windows Management Instrumentation technology provides: Access to monitor, command, and control any entity through a common, unifying set of interfaces, irrespective of the underlying instrumentation mechanism. WMI is an access mechanism. A logically organized, consistent model of Windows operation, configuration, and status. 12
5 A COM application programming interface (API) for providing and accessing management information. Interoperability with other Windows management services. This approach simplifies developers' efforts to create integrated and wellarchitected management solutions. A flexible architecture. This allows vendors to extend the information model to cover managed objects, such as devices and applications, by writing code modules called providers (previously called WBEM providers). Providers are the means to connect Windows Management Instrumentation with one or more sources of management information. Extensions to the Windows Driver Model (WDM) to capture instrumentation data and events from device drivers and kernel-side components. A powerful event mechanism that allows management events to be asserted and associated with other management information. These notifications can also be forwarded to local or remote management applications. A rich query language that enables detailed queries of the information model. A scriptable API that developers can use to create management applications. The scripting API supports several languages, including Microsoft Visual Basic ; Visual Basic for Applications; Visual Basic Scripting Edition (VBScript); Microsoft JScript, and Perl. Additionally, we can use the Windows Scripting Host or Internet Explorer to write scripts that use this interface. Windows Scripting Host, like Internet Explorer, serves as a controller engine of ActiveX scripting engines. Windows Scripting Host supports scripts written in VBScript, JScript, and Perl. By extending CIM and supporting MOF and a common programming interface, the Windows Management Instrumentation technology enables diverse applications to transparently manage a variety of enterprise components. WINSOCK PROTOCOL Name commonly used for the Windows Sockets programming interface, used to provide a protocolindependent transport interface. Windows CE supports most of the common Winsock functions. The Windows Sockets specification defines a binary-compatible network-programming interface for Microsoft Windows. Windows Sockets are based on the UNIX sockets implementation in the Berkeley Software Distribution (BSD, release 4.3) from the University of California at Berkeley. The specification includes both BSD-style socket routines and extensions specific to Windows. Using Windows Sockets permits the application to communicate across any network that conforms to the Windows Sockets API. On Win32, Windows Sockets provide for thread safety. Many network software vendors support Windows Sockets under network protocols including Transmission Control Protocol/Internet Protocol (TCP/IP), Xerox Network System (XNS), Digital Equipment Corporation s DECNet protocol, Novell Corporation s Internet Packet Exchange/Sequenced Packed Exchange (IPX/SPX), and others. Although the present Windows Sockets specification defines the sockets abstraction for TCP/IP, any network protocol can comply with Windows Sockets by supplying its own version of the dynamic link library (DLL) that implements Windows Sockets. Examples of commercial applications written with Windows Sockets include Window servers X, terminal emulators, and electronic mail systems.a socket is a communication endpoint an object through which a Windows Sockets application sends or receives packets of data across a network. A socket has a type and is associated with a running process, and it may have a name. Currently, sockets generally exchange data only with other sockets in the same communication domain, which uses the Internet Protocol Suite. Both kinds of sockets are bi-directional: they are data flows that can be communicated in both directions simultaneously (full-duplex). Two socket types are available: Stream Sockets Stream sockets provide for a data flow without record boundaries - a stream of bytes. Streams are guaranteed to be delivered and to be correctly sequence and unduplicated. Datagram Sockets Datagram sockets support a recordoriented data flow that is not guaranteed to be delivered and may not be sequenced as sent or unduplicated. OVERALL REMOTE SERVER ACCESS ARCHITECTURE Remote Desktop Controller Server Remote Desktop Controller Server is the server program, which sends its desktop window in real time to a client program over the Internet or a modem, or a connection oriented networking system. Remote Desktop Controller Client The Remote Desktop Controller Client is the client program, which displays the desktop of a machine running 13
6 the server program. Here we have to connect the client program with the specified IP address of the server machine. Thereafter, the client machine can have a talk and also control the server in some ways. 5. Conclusion Thus the project was initiated to work in a more efficient and personal way. This enables the administrator to keep in track of his network. The tool is basically built using VB.NET with the help of ADSI and WMI technologies. A tool to manage and monitor remote machines on a network has been devised and has been found working in a networked environment with accuracy and consistency. The developed system works on a Windows environment with the application installed on a Windows 2000 machine. The tool proves to be of great aid to an administrator to control remote machines in the network. 6. Future Enhancements Enhancing a system is the most basic thing for development. A thing is not considered to be efficient if it is not developed and adapts to the advancements in the technology. So, there must be a consistent development in any system. A system may appear to be efficient enough at that time, but as time progresses the system should also be enhanced to the level of advancement in the technology. price of safety in an active network. IEEE/KICS Journal of Communications and Networks (JCN), March [2] K. G. Anagnostakis, M.W. Hicks, S. Ioannidis, A. D. Keromytis, and J. M. Smith. Scalable resource control in active networks. In Proceedings of the 2nd International Working Conference on Active Networks (IWAN), October [3] K. G. Anagnostakis, S. Ioannidis, S. Miltchev, and J. M. Smith. Practical network applications on a lightweight active management environment. In Proceedings of the 3rd International Working Conference on Active Networks (IWAN), October [4] Andrew S. Tanenbaum, Computer Networks, Fourth edition (2003) Prentice Hall of India Publications. [5] Noel Jerke, Visual Basic6 The Complete Reference, (1999) Tata McGraw Hill, New Delhi. [6] [7] [8] Work Groups Considering the future enhancement of this tool, it could be done to work fine for workgroups in the network. At present it satisfies all possible needs of network having domain. Multiple Servers This system can also be enhanced to access multiple servers by single client. This can be done by dividing the client desktop to view the different server s desktop. Processing Speed The processing speed of the tool can also be improved. Since desktop capturing undergoes compression and decompression it is reasonably slow. Similarly when loading the hosts of a specific domain if it is a huge network the process is slowed. This is expected to overcome in the days to come. References [1] D. S. Alexander, P. B. Menage, W. A. Arbaugh, A. D. Keromytis, K. Anagnostakis, and J. M. Smith. The 14
7 15
8 16
Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held
5-02-30 Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held Payoff As organizations increasingly move mainframe-based applications to client/server platforms, Information Systems
More informationWBEM Web-based Enterprise Management
1 WBEM Web-based Enterprise Management Outline What is Enterprise Management? What are the drivers in Enterprise Mgt.? Distributed Management Technology Forum (DMTF) Web Based Enterprise Management (WBEM)
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications
More informationNetwork+ Guide to Networks, Fourth Edition. Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking
Network+ Guide to Networks, Fourth Edition Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking Objectives Discuss the functions and features of a network operating system Define
More informationPlanning the Installation and Installing SQL Server
Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter
More informationWMI BASED PERFORMANCE ANALYSIS FOR DISTRIBUTED SYSTEMS
Copyright 2002 IFAC 15th Triennial World Congress, Barcelona, Spain BASED PERFORMANCE ANALYSIS FOR DISTRIBUTED SYSTEMS Mitica Manu 1, Theodor Borangiu 2, Daniel Roman 3 1 Visual Studio, Developer Division,
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationMeeting the Challenge of Managing Client/Server Document Distribution and Printing. PrintXchange White Paper Xerox Corporation
Meeting the Challenge of Managing /Server Document Distribution and Printing PrintXchange White Paper 1999 Xerox Corporation You glance at the clock. Good. Just enough time to print out the report you
More informationAutomated Deployment Services
Building Out the Enterprise Using Automated Deployment Services Automated Deployment Services (ADS), a component of the Microsoft Windows Server 2003 operating system, includes a new set of imaging tools
More informationEnterprise Directories and Security Management: Merging Technologies for More Control
Enterprise Directories and Security Management: Merging Technologies for More Control Contents Introduction...3 Directory Services...3 A brief history of LDAP...3 LDAP today...4 Free and commercially available
More informationXerox Device Data Collector 1.1 Security and Evaluation Guide
Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation
More informationWindows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1
Windows 7 Overview Windows 7 Overview By Al Lake History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface Lake 2 Objectives To explore the principles
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationFAQ: Real-World Networks
Question 1: What are client-side and server-side processes? Answer 1: The terms client-side and server-side are sometimes called frontend (client) and back-end (server) processes (Davis & Rajkumar, 2004).
More information[MS-WMOD]: Windows Management Protocols Overview. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-WMOD]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,
More informationIntegration of VIGO into Directory Services
Integration of VIGO into Directory Services Martin Wollschlaeger Abstract Modern networked systems are organised using directory services. These directories implement hierarchically organised object oriented
More informationPROPOSAL OF WINDOWS NETWORK
PROPOSAL OF WINDOWS NETWORK By: Class: CMIT 370 Administering Windows Servers Author: Rev: 1.0 Date: 01.07.2017 Page 1 of 10 OVERVIEW This is a proposal for Ear Dynamics to integrate a Windows Network
More informationManagement Intranet: Integrating Web-based Network Management Applications
Management Intranet: Integrating Web-based Network Management Applications Jim Turner Cisco Systems Inc. 125 Rio Robles San Jose, CA 95134 USA jiturner@cisco.com Swami Jayaraman Cisco Systems Inc. 125
More informationIntroducing the SAS ODBC Driver
1 CHAPTER 1 Introducing the SAS ODBC Driver Overview: The SAS ODBC Driver 1 What Is ODBC? 2 What Is the SAS ODBC Driver? 2 Types of Data Accessed with the SAS ODBC Driver 3 Understanding SAS 5 SAS Data
More informationGetting Started With System Center 2012 R2 Orchestrator
Getting Started With System Center 2012 R2 Orchestrator Microsoft Corporation Published: November 1, 2013 Applies To System Center 2012 Service Pack 1 (SP1) System Center 2012 R2 Orchestrator Feedback
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationTOSHIBA GA Printing from Windows
TOSHIBA GA-1211 Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45075925 24 October 2008 CONTENTS 3 CONTENTS
More informationdescribe the functions of Windows Communication Foundation describe the features of the Windows Workflow Foundation solution
1 of 9 10/9/2013 1:38 AM WCF and WF Learning Objectives After completing this topic, you should be able to describe the functions of Windows Communication Foundation describe the features of the Windows
More informationIntroduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS?
Introduction to LAN TDC 363 Lecture 05 Nt Network rkoprti Operating Systems tm Windows Based Networking NetWare Based Networking Book Reading: Chapters 8 1 Course Outline Network operating system (NOS)
More informationNetwork Gateway Services John Enck
51-20-39 Network Gateway Services John Enck Payoff In a TCP/IP network, a gateway has a specific purpose. The TCP/IP architecture even includes formal protocols that apply only to TCP/IP gateways. In a
More informationW H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud
W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...
More informationOne Identity Manager 8.0. Administration Guide for Connecting to Active Directory
One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationAppleTalk. Chapter Goals. Introduction CHAPTER
35 CHAPTER Chapter Goals Describe the development history of the protocol, used almost exclusively in Macintosh computers. Describe the components of networks and extended network. Discuss the primary
More informationLDAP Directory Services
ATTENTION LDAP Directory Services THE MATERIAL PROVIDED IN THIS DOCUMENT IS FOR INFORMATION PURPOSES ONLY. IT IS NOT INTENDED TO BE ADVICE. YOU SHOULD NOT ACT OR ABSTAIN FROM ACTING BASED UPON SUCH INFORMATION
More information[MS-WMOD]: Windows Management Protocols Overview
[MS-WMOD]: This document provides an overview of the Protocol Family. It is intended for use in conjunction with the Microsoft Protocol Technical Documents, publicly available standard specifications,
More informationNetwork+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols
Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds
More informationTaking Advantage of ADSI
Taking Advantage of ADSI Active Directory Service Interfaces (ADSI), is a COM-based set of interfaces that allow you to interact and manipulate directory service interfaces. OK, now in English that means
More informationCisco Configuration Engine 2.0
Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes
More informationKASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
More informationFiery Network Controller for DocuColor 5065 SERVER & CONTROLLER SOLUTIONS. Printing from Windows
Fiery Network Controller for DocuColor 5065 SERVER & CONTROLLER SOLUTIONS Printing from Windows 2005 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for
More informationSimple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
More informationNew Features Summary. SAP Sybase Event Stream Processor 5.1 SP02
Summary SAP Sybase Event Stream Processor 5.1 SP02 DOCUMENT ID: DC01616-01-0512-01 LAST REVISED: April 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software
More informationMicrosoft. iron Krokhmal et IT /2005
Microsoft 2005 i et IT /2005 Current Features Automated Deployment Services (ADS). - imaging tools to automate the deployment of Microsoft operating systems. Active Directory Application Mode (ADAM). -
More informationIntroduction to TCP/IP
Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP
More informationStreamServe Persuasion SP5
StreamServe Persuasion SP5 Installation Guide Rev B StreamServe Persuasion SP5 Installation Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents pending Use
More informationInstalling 64-Bit Applications
Installing 64-Bit Applications Published April 2004 Abstract Windows XP is the first version of Windows to run natively on Intel s new 64-bit processors. For the first time, Windows developers can take
More informationDNS is the mechanism by which Internet software translates names to attributes such as addresses.
Full form: 1 PSTN : Public Switching Telephone Networks 2 ISDN : Integrated Services Digital Network. 3 DSL: Digital Subscribe Line. 4 CATV: Community Antenna Television. 5 DHCP: Dynamic Host Configuration
More informationA NET Refresher
.NET Refresher.NET is the latest version of the component-based architecture that Microsoft has been developing for a number of years to support its applications and operating systems. As the name suggests,.net
More informationUsing Windows NT in a NetWare Environment Gilbert Held
Previous screen 50-20-40 Using Windows NT in a NetWare Environment Gilbert Held Payoff For companies that require Windows NT clients to work in a NetWare environment, getting the configuration setup right
More informationOptimizing and Managing File Storage in Windows Environments
Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)
More informationSCO Vision2K 2.1. What s in this release
SCO Vision2K 2.1 What s in this release The CD contains these SCO Vision2K products: SCO XVision Eclipse 7.31 and SCO XVision Eclipse 3D 7.31 SCO VisionFS 3.1 SCO Vision Resume 1.2 SCO TermVision 2.2 SCO
More informationMicrosoft Windows Server 2003 Administration Fundamentals
C01613540.fm Page 1 Monday, April 12, 2004 10:19 AM Part I Microsoft Windows Server 2003 Administration Fundamentals The fundamental tasks you need for Microsoft Windows Server 2003 administration are
More informationecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist
ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication
More informationOverview of CentreWare Page 1 of 6. CentreWare Overview
Overview of CentreWare Page 1 of 6 CentreWare Overview A Software Portfolio for Managing Documents, Network Printers, and Peripheral Devices Across Diverse Client/Server Network Environments April 1997
More informationDiscovery in the WBEM Architecture (Infrastructure Discovery)
Discovery in the WBEM Architecture (Infrastructure Discovery) 3:15 pm- 4:05 pm Thursday Winston Bumpus, Novell, Inc. Director of Standards, Karl Schopmeyer, Open Group / Application WG Chair The Problem
More informationA New Method Of VPN Based On LSP Technology
2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing
More informationNovell Network Services for OS/390 Release 1
Software Announcement January 19, 1999 Release 1 Overview OS/390 Release 1 consists of Novell Directory Services (NDS) on OS/390 which provides directory support for new and existing Novell Netware Version
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationIntel Active Management Technology Overview
Chapter 5 Intel Active Management Technology Overview Management is doing things right; leadership is doing the right things. Peter Drucker (1909 2005) As we discussed in the last chapter, Intel Active
More informationNext-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
More informationInternet Information Server 6.0
Internet Information Server 6.0 Introduction and Overview The IIS 6.0 core components and architecture are redesigned, which makes this version of IIS significantly different from previous versions. IIS
More informationERRDS: A CASE TOOL TO GENERATE AN ER DATA MODEL FROM A RELATIONAL DATABASE SCHEMA
ERRDS: A CASE TOOL TO GENERATE AN ER DATA MODEL FROM A RELATIONAL DATABASE SCHEMA NABIL ARMAN Palestine Polytechnic University Hebron, Palestine Abstract: A relational database (RDB) schema is a description
More informationNetwork Applications Principles of Network Applications
Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the
More informationHitachi ID Password Manager Telephony Integration
Hitachi ID Password Manager Telephony Integration 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................
More informationIBM i Version 7.2. Networking IBM i NetServer IBM
IBM i Version 7.2 Networking IBM i NetServer IBM IBM i Version 7.2 Networking IBM i NetServer IBM Note Before using this information and the product it supports, read the information in Notices on page
More informationNovell ZENworks Asset Management 7
Novell ZENworks Asset Management 7 w w w. n o v e l l. c o m July 2006 INSTALLATION GUIDE Table Of Contents 1. Installation Overview... 1 Upgrade/Update Matrix...1 Installation Choices...2 ZENworks Asset
More informationDistributed Systems. Bina Ramamurthy. 6/13/2005 B.Ramamurthy 1
Distributed Systems Bina Ramamurthy 6/13/2005 B.Ramamurthy 1 Introduction Distributed system is the one in which hardware and software components at networked computers communicate and coordinate their
More informationFiery EXP50 Color Server. Printing from Windows
Fiery EXP50 Color Server Printing from Windows 2006 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45055357 24 March 2006 CONTENTS 3
More informationCA IdentityMinder. Glossary
CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationCIM Common Information Model
CIM Common Information Model Web-based Enterprise Management Matthias Hölzer-Klüpfel 2004-08-22, akademy, Ludwigsburg Overview What's the problem? Distributed Management Task Force Common
More informationUser Manual. Admin Report Kit for IIS 7 (ARKIIS)
User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...
More informationWindows 2000 System Administration Handbook, 1/e
Windows 2000 System Administration Handbook, 1/e Will Willis, Lewisville, Texas David Watts, Sugarland, Texas Tillman Strahan, Lewisville, Texas Copyright 2000, 721 pp. Paper format ISBN 0-13-027010-5
More informationP-NET Management with Java based Components
P-NET Management with based Components Martin Wollschlaeger Abstract The introduction of based software components is a challenge for developers and users of fieldbus products. The paper shows concepts,
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationAutomating Administration with Windows PowerShell
Course Code: M10961 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Automating Administration with Windows PowerShell Overview This course provides students with the fundamental knowledge and skills
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.
223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency
More informationUsing Compaq Insight Management to Monitor Compaq Servers
BY JAMES BARRY Using Compaq Insight Management to Monitor Compaq Servers This article presents a step-by-step approach to installing and configuring the Compaq client/server software provided for monitoring
More informationPrint Server Administration User s Guide
Print Server Administration User s Guide ii About This Guide Table of Contents ABOUT THIS GUIDE... 1 What s Not Covered in This User s Guide... 1 Contents of the User s Guide... 2 INTRODUCTION... 3 Background
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationMessage Networking 5.2 Administration print guide
Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do
More informationThe Data Link Layer. 32 PART I Networking Basics
32 PART I Networking Basics weather station. More realistic devices use duplex mode, where all systems can send or receive with equal facility. This is often further distinguished as half-duplex (the system
More informationSAS ODBC Driver. Overview: SAS ODBC Driver. What Is ODBC? CHAPTER 1
1 CHAPTER 1 SAS ODBC Driver Overview: SAS ODBC Driver 1 What Is ODBC? 1 What Is the SAS ODBC Driver? 2 Types of Data Accessed with the SAS ODBC Driver 3 Understanding SAS 4 SAS Data Sets 4 Unicode UTF-8
More informationQM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS
QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives
More informationBridge Cable User s Guide
Bridge Cable User s Guide Table of Contents Overview -------------------------------------------------------------------- 2 Driver Installation --------------------------------------------------------
More informationConfiguring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S
Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Contents Introduction...1 iscsi Explained...1 Initiators...1 Discovery and Logging On...2 Authentication...2 Designing the
More informationVersion 5.1 October 2003
Version 5.1 October 2003 HOBLink X11 Software and Documentation 2003 HOB Phone: 49 911/96 66-161 Fax: 49 911/96 66-299 (The first two digits are the country code for Germany - 49) All information contained
More informationSimulation of TCP Layer
39 Simulation of TCP Layer Preeti Grover, M.Tech, Computer Science, Uttrakhand Technical University, Dehradun ABSTRACT The Transmission Control Protocol (TCP) represents the most deployed transport protocol
More informationWhat's new in IBM Rational Build Forge Version 7.1
What's new in IBM Rational Build Forge Version 7.1 Features and support that help you automate or streamline software development tasks Skill Level: Intermediate Rational Staff, IBM Corporation 13 Jan
More informationInventions on Extending LDAP functionality- A TRIZ based Analysis
From the SelectedWorks of Umakant Mishra August, 2006 Inventions on Extending LDAP functionality- A TRIZ based Analysis Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/60/ Inventions
More informationPreface. DirXmetahub Document Set
Preface DirXmetahub Document Set Preface This manual provides an introduction to DirXmetahub. It consists of the following sections: Chapter 1 introduces DirXmetahub. It provides an overview of meta directory
More informationCorporate Training Centre (306)
Corporate Training Centre www.sbccollege.ca/corporate (306)244-6340 corporate@sbccollege.ca Automating Administration with Windows PowerShell: 10961C 5 Day Training Program November 5-9, 2018 Cost: $2,700.00
More informationNaming in Distributed Systems
Distributed Systems, WS 2014 Naming in Distributed Systems Hong-Linh Truong Distributed Systems Group, Vienna University of Technology truong@dsg.tuwien.ac.at dsg.tuwien.ac.at/staff/truong DS WS 2014 1
More informationCommunication Fundamentals in Computer Networks
Lecture 11 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07
More informationMicrosoft Virtualizing Enterprise Desktops and Apps
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20694 - Virtualizing Enterprise Desktops and Apps Length 5 days Price $4290.00 (inc GST) Version B Overview This five-day, hands-on training course is designed
More informationApplication Notes for Configuring the ADTRAN NetVanta UC Server with Avaya IP Office 6.1 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring the ADTRAN NetVanta UC Server with Avaya IP Office 6.1 Issue 1.0 Abstract These Application Notes describe the procedure for
More informationSage MAS 200 ERP Supported Platform Matrix
The information in this document applies to Level 3.71 through version 4.30. Sage generally only supports the current Sage MAS 200 level and one prior major level. As of the version 4.10 release, Sage
More informationLIBRARY SYSTEM TECHNICAL SURVEY FAX BACK TO
LIBRARY SYSTEM TECHNICAL SURVEY FAX BACK TO 732-291-3699 SITE INFORMATION Your Name/Title: Date: Library Name: o Main o Branch Library Website: Mailing Address: City, State, Zip: _ Which product(s) did
More informationBEAWebLogic. Enterprise Security. WebLogic Server v8.1 Installation
BEAWebLogic Enterprise Security WebLogic Server v8.1 Installation Product Version: 4.2 Service Pack 2 Document Revised: October 27, 2005 Copyright Copyright 2005 BEA Systems, Inc. All Rights Reserved.
More informationIBM OS/2 Warp Server for e-business the Software Solution for All Sizes of Businesses
Programming Announcement April 27, 1999 IBM OS/2 Warp Server for e-business the Software Solution for All Sizes of Businesses Overview Whether you are adding a new server to an existing network or stepping
More informationEnterprise print management in VMware Horizon
Enterprise print management in VMware Horizon Introduction: Embracing and Extending VMware Horizon Tricerat Simplify Printing enhances the capabilities of VMware Horizon environments by enabling reliable
More informationMOC 6232A: Implementing a Microsoft SQL Server 2008 Database
MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft
More informationProduct Page: https://digitalrevolver.com/product/automating-administration-with-windows-powershell/
Automating Administration with Windows PowerShell Course Code: Duration: 5 Days Product Page: https://digitalrevolver.com/product/automating-administration-with-windows-powershell/ This course provides
More informationThe Open Group. DMTF Global Management Conference June 18, Allen Brown President & CEO
The Open Group DMTF Global Management Conference June 18, 2003 Allen Brown President & CEO a.brown@opengroup.org 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 ext. 235
More informationPROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL
Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.
More informationInternet Mail: The SMTP Model
Internet Mail: The SMTP Model User File System Sender- SMTP SMTP Commands Replies Receiver- SMTP File System Simple Mail Transfer Protocol (SMTP) to transfer e-mails Depending on the operating system,
More information