The Corporate Intranet Gilbert Held

Size: px
Start display at page:

Download "The Corporate Intranet Gilbert Held"

Transcription

1 The Corporate Intranet Gilbert Held Payoff The growth in the popularity of the Internet has significantly influenced software product development users today can access search tools and browsers that incorporate audio and video capability. Businesses that harness the power of the Internet within their organizations by constructing their own tailor-made Internets, or intranets, can run a range of new and legacy applications from PCs economically. Problems Addressed The term intranet commonly refers to the application of Internet technologies within an organization. Using off-the-shelf Internet-related hardware and software, organizations obtain access to thousands of products developed for the Internet. Because of the sizable market for Internet applications, intranet products are usually more economical than products developed for use in a specific mainframe environment. Thus, the use of Internet technologies within a corporate environment allows organizations to access a wide range of client/server computing products at an economical cost, often considerably below that of equivalent products developed for a proprietary mainframebased network. This article explains the basics of how to construct an intranet. Intranet Overview Unlike the Internet, which is capable of supporting more than 50 Transmission Control Protocol and Internet Protocol (TCP/IP) applications, a corporate intranet can be tailored to the specific requirements of an organization. For example, if users need to transfer files, a File transfer protocol (FTP) application must be obtained. Similarly, the ability to provide direct point- to-point communications between individuals or groups of employees can be satisfied through the Simple Mail Transfer Protocol (SMTP) application, and the ability to access computer systems remotely would be satisfied through the use of a terminal emulator such as Telnet or TN3270 for access to an IBM mainframe. An intranet represents much more than installing a browser and letting users access a Web server connected to the corporate network. Although Web browsers and Web servers can play an important role in a corporate intranet, they represent just two of the many technologies that can be used on a TCP/IP network. Although an intranet represents the application of Internet technology to an internal communications network, that enterprise network can also support other non-internet applications, such as transferring legacy SNA traffic from PCs using emulation boards or TCP/IP traffic from PCs connected to LANs. Why Create an Intranet? The rationale for creating an intranet is based on some of the same goals associated with the Internet universal communications, reliability, standardization, increased productivity, and reduced cost. Through the use of TCP/IP, any employee on a corporate intranet can interact with any other employee. In addition, if the intranet is connected to the Internet,

2 employees can use one set of applications for internal and external communications, thereby eliminating the necessity for employees to learn two sets of application programs. Most Internet applications have been rigorously tested in the commercial marketplace. Thus, the use of this technology in a corporate intranet provides organizations with access to highly reliable products. In comparison, proprietary products are usually not tested to the degree that Internet products are, nor do developers of proprietary communications products receive the degree of user feedback developers of Internet products do. Thus, the use of Internet technology in a corporate intranet environment results in a highly robust and more reliable product. Intranet Construction Internet applications are standardized using Request for Comment (RFC)documents that are placed in the public domain. By allowing an RFC, vendors can develop products that provide an interoperability capability, facilitate competition, and allow organizations to select required hardware and software products from a large base of existing and developing products. Standardization provides the mechanism that allows an intranet infrastructure to be constructed, restructured, and enhanced to satisfy changing organizational requirements. Because intranets represent the application of Internet technology to internal corporate networks, they can be considered TCP/IP networks. The key difference between the TCP/IP- based Internet and a corporate intranet is that the latter does not need to support all TCP/IP applications, nor does it have to exclusively transmit TCP/IP (see Exhibit 1). The TCP/IP Protocol Suite Protocol Stacks The TCP/IP protocol suite is endowed with a large number of application services that provide such functions as file transfer, remote terminal access, electronic mail, Web browser access, a name service that translates domain names to IP addresses, and network management. TCP/IP can be implemented using a TCP/IP protocol stack on almost every type of computer. Although computer users had to purchase third-party TCP/IP stacks to use with Windows 3.1 and early Macintosh operating systems, both Microsoft and Apple Computer now include the core TCP/IP stack in their new operating system releases. Users of Windows '95 and Apple Macintosh System 7.5 have a built-in access capability for connecting to a TCP/IP network. Although Internet applications must run on top of the TCP/IP protocol stack, the transmission facilities used to construct an enterprise intranet can carry a mixture of protocols. In fact, certain applications that are currently impractical for use on the Internet can be implemented on top of TCP/IP or another protocol stack and effectively carried on an enterprise intranet. For example, a live videoconference could be accommodated on an intranet, whereas the transmission of a videoconference on the Internet could encounter severe time distortion of frames if other traffic on backbone circuits interfered with the timely delivery of frames. Although a TCP/IP protocol stack is essential for Internet and intranet communications, by itself it is useless for providing employees with the ability to perform desired operations. To use a browser, transfer a file, send and receive electronic mail, create

3 personal Web pages, or convert a departmental PC into a Web server to provide information associated with a help desk, or a form distribution facility, employees need access to applications operating above the TCP/IP protocol stack. Using and Integrated Application Suite One of the most popular and comprehensive TCP/IP application suites is the NetManage Chameleon program package. Originally developed to provide a group of Internet-related applications for individual users, Chameleon's release 4.6 includes more than 50 applications and a TCP/IP protocol stack. Chameleon provides a comprehensive set of applications that can either supplement or complement Netscape and Mosaic and is marketed as both an Internet and intranet tool for Intel PC and Macintosh platforms. Other vendors, such as File Transfer Protocol, Frontier, and Spry, market TCP/IP application suites that can also be used for both Internet and intranet applications. Internet Access Using Chameleon Chameleon's Automatic Internet icon provides a script facility that permits users to sign up for accounts with an Internet service provider such as InterRamp, IBM Internet, AlterNet, CERFnet, or NETCOM. This application allows individuals and organizations with minimal requirements for Internet access to use Integrated Services Digital Network or modems to communicate. Because Chameleon includes a TCP/IP protocol stack that supports LAN applications, its intranet operations would actually bypass the Automatic Internet application, yet still let users access applications such as Internet Relay Chat, NEWTNews (which provides access to a news reader application), and NEWTSound and NEWTView (which enable audio and image files associated with news reader or other Internet applications to be heard and viewed). Support for Audio and Image Files NEWTView supports BMP, DCX, DIB, GIF, PCT, PCX, TIF, and Joint Photographic Experts Group file formats, providing users with a tool for retrieving, displaying, and printing popular bit-mapped graphics files produced by many applications that may be received as attachments to , news, or downloaded from Archie or Gopher sessions. In comparison, NEWTSound supports audio encoded in WAV files using a sound board. Although many standalone applications are available from different vendors to provide a similar capability, if audio and image files are going to be supported on the corporate intranet, the use of an integrated application suite can be more cost effective than obtaining separate programs from different vendors. Thus, network managers should consider FTP, Frontier, and NetManage because these vendors offer a comprehensive suite of Internet applications that can be used for an enterprise intranet. Performing Searches To do Archie searches, the user usually must know and enter a server address location as well as master the commands associated with Archie retrievals. When used on a corporate intranet that contains several Archie servers, the Chameleon Archie client can be preconfigured with server addresses as well as different search criteria supported by the organization's servers. Thus, the use of pre-configured Archie clients can significantly

4 enhance the productivity among organizational employees that need to perform Archie searches. Unlike most Archie client applications that require a user to initiate commandbased searches from within a Graphical user interface interface, the client included with Chameleon includes most of the search variables within pull-down menus that make the selection of a query, Archie server, and search criteria extremely easy. Web Page Creation Chameleon's WebSpider is not actually a TCP/IP application, however, it is integrated with Chameleon's Web browser that uses the TCP/IP protocol stack. WebSpider is a HyperText Markup Language authoring program for creating Web documents. WebSpider lets users format individual characters or paragraphs, insert images, define Uniform Resource Locator links to other Web pages, and perform other Web page format operations. The link to the Chameleon browser allows users to toggle back and forth between the HTML authoring program and the browser to view changes made to a document. Although WebSpider is satisfactory for creating most Web documents, users may consider other authoring packages, such as HotMetal and Frontpage, that are sold as specialized authoring tools instead of representing a program within an application suite of programs. Host Support The Chameleon Host Access icon group allows users to launch three terminal emulator programs including Telnet TN3270 for accessing IBM mainframes and TN5250 for accessing IBM minicomputers such as System 3/X and AS400. One of the problems facing many organizations is the support required to run dual protocols, such as System Network Architecture(SNA) and TCP/IP, on an intranet. Through the use of TN3270and TN5250 applications and an IBM 3172 or equivalent TCP/IP gateway, users can convert coaxial cabled PCs to LAN-based PCs that maintain access to mainframes and minicomputers using TCP/IP. Users can convert legacy mainframe access to a TCP/IP environment, which can significantly reduce the level of support necessary for operating multiple protocols on an enterprise intranet. Exhibit 2 illustrates the Chameleon TN3270 application configured for obtaining a TCP/IP connection to an IBM mainframe located at IP address In addition to supporting a TN3270 connection, the Chameleon 3270 terminal emulator also supports NetWare SAS, Coaxial, Windows NT, and IEEE LAN connections. The program can be installed on PCs directly cabled to controllers to familiarize employees with the program before migrating them to access via TCP/IP. Configuring a Connection to a Mainframe via TCP/IP Recommended Course of Action Organizations should consider seven issues before an intranet is constructed: User requirements. What type of tools are needed? What type of Internet access Organizational requirements. What are the technical requirements?what are the financial restraints? What type of security is needed?

5 Design. What type of architecture is needed? Is a migration strategy required? How should the Intranet be implemented? Training. Should training be hands-on? Should vendor courses be available? Promotion. Do employees understand the technology? Support. Is troubleshooting being performed? Is a help desk necessary? Management. What management tools are necessary? When determining user requirements, communications managers should ascertain what applications they anticipate using on both the intranet and Internet. This information is essential in determining the type of tools that may be required to support their user community. Once the technical requirements are determined, they should be compared against economic constraints. For example, if the cost associated with separate Web servers for marketing and sales departments exceeds the budget, then the technical requirements might be modified for a common server. Because of the importance of including firewalls, proxy servers, and authentication schemes for security, they should be given careful consideration as a separate entity. While training, promotion, support, and management are often overlooked, they are necessary issues and extremely important for ensuring the effective operation of an intranet. By training employees, making them aware of the enterprise intranet and its capabilities, providing user support, and planning the effective management and control of the enterprise intranet, its success can be ensured. Author Biographies Gilbert Held Gilbert Held is director of 4-Degree Consulting, a Macon GA-based high-tech consulting group. He is an internationally recognized author and lecturer, having written more than 40 books and 300 technical articles. He earned a BSEE from Pennsylvania Military College, an MSEE from New York University, and MBA and MSTM degrees from The American University. He has been selected to represent the US at technical conferences in Moscow and Jerusalem and has received numerous awards for excellence in technical writing.

6

7

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-10-06 DATA COMMUNICATIONS MANAGEMENT VIRTUAL LANS Gilbert Held INSIDE Definition, Rationale, Support for Virtual Networking Requirements, Facilitating Adds, Moves, and Changes, Enhancing Network Performance,

More information

Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held

Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held 5-02-30 Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held Payoff As organizations increasingly move mainframe-based applications to client/server platforms, Information Systems

More information

Network Imaging Techniques Gilbert Held

Network Imaging Techniques Gilbert Held 51-20-60 Network Imaging Techniques Gilbert Held Payoff Supporting imaging applications does not necessarily require an expensive network upgrade. This article discusses several inexpensive, timesaving

More information

Using Windows NT in a NetWare Environment Gilbert Held

Using Windows NT in a NetWare Environment Gilbert Held Previous screen 50-20-40 Using Windows NT in a NetWare Environment Gilbert Held Payoff For companies that require Windows NT clients to work in a NetWare environment, getting the configuration setup right

More information

TN3270 AND TN5250 INTERNET STANDARDS

TN3270 AND TN5250 INTERNET STANDARDS 51-10-55 DATA COMMUNICATIONS MANAGEMENT TN3270 AND TN5250 INTERNET STANDARDS Ed Bailey INSIDE Enterprise Data and Logic; User Productivity and Confidence; Newer Platforms and Devices; How Standardization

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University http://alainmaterials.webs.com/

More information

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Chapter Ten. From Internet to Information Superhighway

Chapter Ten. From Internet to Information Superhighway Chapter Ten From Internet to Information Superhighway After reading this chapter you should be able to: Describe the nature of the Internet and the variety of functions it performs Discuss several software

More information

Overview of CentreWare Page 1 of 6. CentreWare Overview

Overview of CentreWare Page 1 of 6. CentreWare Overview Overview of CentreWare Page 1 of 6 CentreWare Overview A Software Portfolio for Managing Documents, Network Printers, and Peripheral Devices Across Diverse Client/Server Network Environments April 1997

More information

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility

More information

networks List various types of networks and their

networks List various types of networks and their Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

Managing Networks with the Global Naming Tree Gilbert Held

Managing Networks with the Global Naming Tree Gilbert Held 51-10-15 Managing Networks with the Global Naming Tree Gilbert Held Payoff An often-overlooked and hidden-from-view characteristic of network management systems is their use of the global naming tree.

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

INTERNET. Intranet & Networking

INTERNET. Intranet & Networking Intranet & Networking Basics of networking INTRANET & NETWORKING To fully understand and appreciate how the Internet works and why it works the way it does, it would be better for you to have some basic

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

INTRODUCTION TO WINDOWS 2000

INTRODUCTION TO WINDOWS 2000 50-30-31 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO WINDOWS 2000 Gilbert Held INSIDE Versions; Features; New Features; Graphic Improvements; Active Directory; Encryption and Compression; Disk Quotas;

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

Lecture (02) The TCP/IP Networking Model

Lecture (02) The TCP/IP Networking Model Agenda ١ Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways Firewalls 1 Overview In old days, brick walls (called firewalls ) built between buildings to prevent fire spreading from building to another Today, when private network (i.e., intranet) connected to public

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2016, Networks II Agenda Introduction to networking architecture Historical

More information

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson How the Web Works Chapter 1 Modified by Marissa Schmidt 2015 Pearson Fundamentals ofhttp://www.funwebdev.com Web Development Objectives 1 Definitions and History 2 Internet Protocols 3 Client-Server Model

More information

Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI)

Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI) Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Agenda Introduction to networking architecture Historical

More information

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP) The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

Lecture (02) The TCP/IP Networking Model

Lecture (02) The TCP/IP Networking Model Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee ١ Agenda Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP

More information

Developer Marketing: Build a Web Server Using Microsoft IIS 4.0 CBT Skill Builder Courseware

Developer Marketing: Build a Web Server Using Microsoft IIS 4.0 CBT Skill Builder Courseware Software Announcement April 10, 2001 Developer Marketing: Build a Web Server Using Microsoft IIS 4.0 CBT Skill Builder Courseware Overview Build your skills for Microsoft Certified Systems Engineer (MCSE)

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Internet. Class-In charge: S.Sasirekha

Internet. Class-In charge: S.Sasirekha Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems

More information

Adaptable and Adaptive Web Information Systems. Lecture 1: Introduction

Adaptable and Adaptive Web Information Systems. Lecture 1: Introduction Adaptable and Adaptive Web Information Systems School of Computer Science and Information Systems Birkbeck College University of London Lecture 1: Introduction George Magoulas gmagoulas@dcs.bbk.ac.uk October

More information

Network Gateway Services John Enck

Network Gateway Services John Enck 51-20-39 Network Gateway Services John Enck Payoff In a TCP/IP network, a gateway has a specific purpose. The TCP/IP architecture even includes formal protocols that apply only to TCP/IP gateways. In a

More information

The Internet The Internet

The Internet The Internet The Internet The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number

More information

ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS

ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS 51-10-60 DATA COMMUNICATIONS MANAGEMENT ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS Richard J. Tobacco INSIDE Talking Transport; By Air, Land, or Sea: Link Selection; Taking Familiar Routes: Connection

More information

3. WWW and HTTP. Fig.3.1 Architecture of WWW

3. WWW and HTTP. Fig.3.1 Architecture of WWW 3. WWW and HTTP The World Wide Web (WWW) is a repository of information linked together from points all over the world. The WWW has a unique combination of flexibility, portability, and user-friendly features

More information

Module 4 Business Value of Telecommunication Networks 4.1 Internet Revolution 4.2 Business value of Internet, Intranet and Extranet

Module 4 Business Value of Telecommunication Networks 4.1 Internet Revolution 4.2 Business value of Internet, Intranet and Extranet Module 4 Business Value of Telecommunication Networks 4.1 Internet Revolution 4.2 Business value of Internet, Intranet and Extranet Module 4 Business Value of Telecommunication Networks Information and

More information

Technical and Architectural Overview

Technical and Architectural Overview 100% Web-Based Time & Labor Management Technical and Architectural Overview Copyright 2007 Time America 15990 N. Greenway-Hayden Loop Suite D-500, Scottsdale, AZ (800) 227-9766 www.timeamerica.com Table

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Search strategies and information resources Author(s) Sommerville, Joseph Citation Sommerville, J. (1998).

More information

Executive Summary...1 Chapter 1: Introduction...1

Executive Summary...1 Chapter 1: Introduction...1 Table of Contents Executive Summary...1 Chapter 1: Introduction...1 SSA Organization... 1 IRM Strategic Plan Purpose... 3 IRM Strategic Plan Objectives... 4 Relationship to Other Strategic Planning Documents...

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

Internet The full name of Internet is the International Network. Internet is the world largest computer network. It is the network of network. Interne

Internet The full name of Internet is the International Network. Internet is the world largest computer network. It is the network of network. Interne Internet Basics By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Internet The full name of Internet is the International Network.

More information

CPET 499/ITC 250 Web Systems. Topics

CPET 499/ITC 250 Web Systems. Topics CPET 499/ITC 250 Web Systems Week 1 Web System Infrastructure, Protocols, and Applications Paul I-Hai Lin, Professor Dept. of Computer, Electrical, and Information Technology College of Engineering, Technology,

More information

File Magic 5 Series. The power to share information PRODUCT OVERVIEW. Revised June 2003

File Magic 5 Series. The power to share information PRODUCT OVERVIEW. Revised June 2003 File Magic 5 Series The power to share information PRODUCT OVERVIEW Revised June 2003 Copyrights, Legal Notices, Trademarks and Servicemarks Copyright 2003 Westbrook Technologies Incorporated. All rights

More information

xiii A. Hayden Lindsey IBM Distinguished Engineer and Director, Studio Tools Foreword

xiii A. Hayden Lindsey IBM Distinguished Engineer and Director, Studio Tools Foreword Foreword Business applications are increasingly leveraging Web technologies. Naturally this is true for Internet applications, but it is also true for intranet and extranet applications applications that

More information

ARCHITECT. HP ExpertONE. new solutions for change. HP ExpertONE Networking Certification

ARCHITECT. HP ExpertONE. new solutions for change. HP ExpertONE Networking Certification HP ExpertONE ARCHITECT new solutions for change. HP ExpertONE Certification HP ExpertONE networking career is your passport to personal and professional advancement Brochure Start from the basics or leverage

More information

Solution Overview. Renovo Video Scheduler 2.0 Web Scheduling

Solution Overview. Renovo Video Scheduler 2.0 Web Scheduling Renovo Software, Inc. is exclusively focused on the design, development, and support of software solutions which schedule, automate and manage video networks. Renovo Software s Video Scheduler 2.0 is a

More information

Distributed telecommunications network access using the TMOS IntraWeb Gateway

Distributed telecommunications network access using the TMOS IntraWeb Gateway Distributed telecommunications access using the IntraWeb Gateway Magnus Ekhed, Peter Gundersen and Olav Queseth In an increasingly competitive marketplace, operator success depends more and more on usage.

More information

Cost-Effective Management Practices for the Data Center Gilbert Held

Cost-Effective Management Practices for the Data Center Gilbert Held 5-01-20 Cost-Effective Management Practices for the Data Center Gilbert Held Payoff Keeping data center costs in line with the demands of a budget-conscious business environment means evaluating all methods

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Novell. ZENworks. for Desktops 3.2 Preboot Services ADMINISTRATION

Novell. ZENworks. for Desktops 3.2 Preboot Services ADMINISTRATION 3.2 Novell ZENworks for Desktops 3.2 Preboot Services www.novell.com ADMINISTRATION Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Chapter 11: Wide-Area Networks and the Internet

Chapter 11: Wide-Area Networks and the Internet Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

LUMINARE. Caitlin Curtin President and CEO. Jeffrey Schneider Vice President, Technology. Using Intranets for Training and Performance Support

LUMINARE. Caitlin Curtin President and CEO. Jeffrey Schneider Vice President, Technology. Using Intranets for Training and Performance Support LUMINARE Using Intranets for Training and Performance Support Caitlin Curtin President and CEO Jeffrey Schneider Vice President, Technology What is an Intranet? An enterprise s private network of computers

More information

Networks Hardware Components

Networks Hardware Components Lec. 5 Networks Hardware Components Dr. Eng. Samy Elmokadem Chapter 8 10/12/2017 1 internetworking devices used in backbone networks After studying this Chapter you should: Know which internetworking devices

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

What is BackOffice Server 4.0?

What is BackOffice Server 4.0? Home Page Product Guide Product Showcase Comparisons Deployment & Support -Support Options -FAQ -Training Options -Update -White Papers Download & Trial Community & News Developers & Partners More BackOffice

More information

Cisco How Virtual Private Networks Work

Cisco How Virtual Private Networks Work Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:

More information

Facilitator. Introduction to IT Networking for Facilities Managers. Class Logistics

Facilitator. Introduction to IT Networking for Facilities Managers. Class Logistics Introduction to IT Networking for Facilities Managers APPA Institute for Facilities Management Dallas, TX January 16, 2017 Facilitator J. Craig Klimczak, D.V.M., M.S. Chief Information Officer Community

More information

8235 Dial-In Access to LANs (DIALs)

8235 Dial-In Access to LANs (DIALs) Networking Hardware 8235 Dial-In Access to LANs (DIALs) An IBM DIALs Access Solution Today s sales force automation, telecommuting, customer service, Internet and intranet application users demand fast,

More information

ThinAir Server Platform White Paper June 2000

ThinAir Server Platform White Paper June 2000 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part

More information

IBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace

IBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace Programming Announcement September 28, 2004 IBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace Overview

More information

Application management in Nokia: Getting the most from Company Apps

Application management in Nokia: Getting the most from Company Apps Application management in Nokia: Getting the most from Case Study 2 Contents 1 Challenge...3 2...5 2.1 Deployment options...5 2.2 App security and authentication...7 2.3 Nokia...7 3 Company Hub...9 3.1

More information

Mobile Application Ecosystems

Mobile Application Ecosystems Mobile Application Ecosystems Mika Mannermaa November 14, 2005 T-110.5120 Next Generation Wireless Networks Helsinki University of Technology Delivering Quality Content into the Hands of Mobile Consumers

More information

Extending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E

Extending the Domino System. Powered by Notes. The First Groupware and  Server for the Net R E L E A S E Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,

More information

INTRODUCTION TO NETCENTRIC COMPUTING

INTRODUCTION TO NETCENTRIC COMPUTING INTRODUCTION TO NETCENTRIC COMPUTING The traditional PC is history: Netcentric computing is the future. Emergence of Netcentric Computing, The Network Computers, Internet Appliances and Connected PCs Introduction

More information

Simplify IP Telephony with System i. IBM System i IP Telephony

Simplify IP Telephony with System i. IBM System i IP Telephony Simplify IP Telephony with System i IBM System i IP Telephony Highlights Deploy a complete IP telephony suite on one easy-to-manage system, or even part of a system, shared with other applications Integrate

More information

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY Olli Ojanperä, Hannu Heikkinen and Hannu M. Heikkinen Vaisala Oyj, P.O.Box 26, FIN-00421 Helsinki,

More information

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Full file at   Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T

More information

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that

More information

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node Topic 2 focuses on networking. It covers: Definition of a network. Characteristics and functions of network devices. Specification of local area network (LAN). Network software. Application software. Basic

More information

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson

More information

Requirements Specification

Requirements Specification Requirements Specification Smart Scheduling Requested by: Dr. Robert Yoder Associate Professor of Computer Science Computer Science Department Head Siena College Tom Mottola Jason Czajkowski Brian Maxwell

More information

SCO Vision2K 2.1. What s in this release

SCO Vision2K 2.1. What s in this release SCO Vision2K 2.1 What s in this release The CD contains these SCO Vision2K products: SCO XVision Eclipse 7.31 and SCO XVision Eclipse 3D 7.31 SCO VisionFS 3.1 SCO Vision Resume 1.2 SCO TermVision 2.2 SCO

More information

Course Index Enterprise Online Training (Self Paced Education) Optio Advanced Labeling for Optio Document Designers

Course Index Enterprise Online Training (Self Paced Education) Optio Advanced Labeling for Optio Document Designers Optio Training Course Catalog Bottomline maintains an active schedule of instructor led classroom, instructor led online and selfpaced CD based training programs for Optio Enterprise and Optio Healthcare

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

Potential Threats to Mobile Network Security

Potential Threats to Mobile Network Security Potential Threats to Mobile Network Security (Can WAP virus infect the mobile phones?) BY K.NAGA MOHINI and P.RAMYA IV Btech (CSE) mohini.cse521@gmail.com IV Btech (CSE) ramya_pragada@yahoo.com COMPUTER

More information

ARIZONA JUDICIAL BRANCH ENTERPRISE ARCHITECTURE STANDARDS

ARIZONA JUDICIAL BRANCH ENTERPRISE ARCHITECTURE STANDARDS Rationale: Adopting an IT architecture, although intuitively a positive organizational direction, is often difficult. Standards are many times perceived as giving up freedom. However, with today s fast-paced

More information

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. Name: Class: Date: The Internet and WWW True/False Indicate whether the sentence or statement is true or false. 1. A search engine is a program that performs keyword searches for information on the Internet.

More information

Guide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services

Guide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services Guide to TCP/IP, Third Edition Chapter 6: Basic TCP/IP Services Objectives Understand how TCP/IP Application layer protocols and services work Explain the capabilities, message types, and request/reply

More information

Enterprise Directories and Security Management: Merging Technologies for More Control

Enterprise Directories and Security Management: Merging Technologies for More Control Enterprise Directories and Security Management: Merging Technologies for More Control Contents Introduction...3 Directory Services...3 A brief history of LDAP...3 LDAP today...4 Free and commercially available

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Internet Server Management

Internet Server Management Unit 36: Internet Server Management Unit code: A/601/1513 QCF Level 5: BTEC Higher National Credit value: 15 Aim To enable learners to implement and manage secure internet technologies for networking systems.

More information

ORACLE MESSAGEQ ORACLE DATA SHEET KEY FEATURES AND BENEFITS

ORACLE MESSAGEQ ORACLE DATA SHEET KEY FEATURES AND BENEFITS ORACLE MESSAGEQ KEY FEATURES AND BENEFITS With Oracle MessageQ, you can translate your inventory of diverse applications into a strategic advantage. FEATURES Interoperability with IBM platforms via TCP/IP

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 3: How TCP/IP Works & Understanding the Internet's Software Structure Assistant Teacher Samraa Adnan Al-Asadi 1 How TCP/IP Works Packet: A piece of data broken down into pieces

More information

Sage BusinessWorks v8.0 System Standards

Sage BusinessWorks v8.0 System Standards . Sage BusinessWorks v8.0 System Standards For the latest revisions to this document, go to www.sagebusinessworks.com/product/sys_req.asp Note: The matrices beginning on page 6 are intended to provide

More information

WAN FACILITY CONSOLIDATION BNS-2000 NETWORKS

WAN FACILITY CONSOLIDATION BNS-2000 NETWORKS Solutions WAN FACILIY CONSOLIDAION IN BNS-2000 NEWORKS 721 Route 202-206 Bridgewater, NJ 08807 phone: 908.218.0500 fax: 908.218.1736 email: sales@datatekcorp.com http://www.datatekcorp.com I NRODUCION

More information

10 Considerations for a Cloud Procurement. March 2017

10 Considerations for a Cloud Procurement. March 2017 10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

A Survey- use of Software Quality Attributes for Web Based Software Applications

A Survey- use of Software Quality Attributes for Web Based Software Applications A Survey- use of Software Quality Attributes for Web Based Software Applications 1 Ms. Preeti Jain (Asst. Prof.), Acropolis Institute of Technology & Research 2 Mr. Anurag Punde (Asst. Prof.), Acropolis

More information

Cisco IOS for S/390 Architecture

Cisco IOS for S/390 Architecture CHAPTER 1 Cisco IOS for S/390 Architecture This chapter describes the architecture of Cisco IOS for S/390. It includes the following sections: Overview An overview of the architecture of Cisco IOS for

More information

Cisco Unified Videoconferencing

Cisco Unified Videoconferencing Cisco Unified Communications Rich-Media Conferencing Conferencing applications have become critical productivity tools for organizations. Cisco provides multiple conferencing offerings that are part of

More information

Integrated services Digital Network

Integrated services Digital Network Integrated services Digital Network 1 Integrated Services Digital Network Public networks are used for a variety of services Public Switched Telephone Network Private Lines (leased) Packet Switched Data

More information

CWDM CASE STUDY DESIGN GUIDE. Line Systems, Inc. uses iconverter CWDM Multiplexers to overlay Ethernet onto SONET rings

CWDM CASE STUDY DESIGN GUIDE. Line Systems, Inc. uses iconverter CWDM Multiplexers to overlay Ethernet onto SONET rings DESIGN GUIDE CWDM CASE STUDY Line Systems, Inc. uses iconverter CWDM Multiplexers to overlay Ethernet onto SONET rings 140 Technology Drive, Irvine, CA 92618 USA 800-675-8410 +1 949-250-6510 www.omnitron-systems.com

More information

Chapter 3: AIS Enhancements Through Information Technology and Networks

Chapter 3: AIS Enhancements Through Information Technology and Networks Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Chapter 3: AIS Enhancements Through Information Technology and Networks

More information

Information technology statement of directions

Information technology statement of directions Calhoun: The NPS Institutional Archive Information Technology and Communication Services (ITACS) ITACS Publications 1998-04-13 Information technology statement of directions Information Technology and

More information

The Internet, Intranets, and Extranets Chapter 7

The Internet, Intranets, and Extranets Chapter 7 The Internet, Intranets, and Extranets Chapter 7 MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan 1 Principles and Learning Objectives The Internet is like many other technologies it provides

More information