- Introduction
- About the Editor
- Section IPlanning for Communication Systems
- Chapter 1Improving Communication between End Users and System Developers
- USER INVOLVEMENT AND COMMON WISDOM
- COOPERATION, COMMUNICATION, AND MUTUAL UNDERSTANDING
- The Balance of Influence
- Reconciling the Goals between the User and Developer
- A CLASSIFICATION OF USER AND DEVELOPER RELATIONS
- Quadrant I: The Student and Teacher
- Quadrant II: Mutual Partnering
- Quadrant III: The Dictatorship
- Quadrant IV: The Polarization
- STRUCTURING THE USER-DEVELOPER RELATIONSHIP
- Assessment
- Structuring
- Monitoring
- SUMMARY
- Chapter 2Windows NT Project Planning
- INTRODUCTION
- ESTABLISHING BUSINESS AND TECHNICAL GOALS FOR NT DEPLOYMENT
- Business Goals for NT Deployment
- Technical Goals for NT Deployment
- Building the Migration Team
- IT Qualifications Needed for the Deployment Team
- Gathering Information Resources
- EVALUATING THE INSTALLED BASE
- Planning for New Workstations
- Upgrade Planning for Existing Workstations
- Evaluating and Testing Software
- Win16 (Windows 3.x) Applications
- DOS Applications
- Windows 95 Applications
- Upgrading Custom Applications
- Identifying, Evaluating and Testing Peripherals
- Integrating Macintosh Desktops
- UNIX Servers and Workstations
- Mainframes/Hosts
- Planning Issues to Handle Concurrently with Evaluation and Testing
- CHOOSING AND MANAGING VENDORS
- Vendors with Strategic Microsoft Relationships
- Testing Standard Configurations
- PLANNING AND MANAGING A PILOT ROLLOUT
- PREPARING FOR FULL-SCALE DEPLOYMENT
- CONCLUSION
- Chapter 03Inventing the Future: Strategic Planning
- LOOKING FORWARD
- TOO BUSY
- STEP ONE: ANALYZING THE CURRENT SITUATION
- STEP TWO: DETERMINING THE DEPARTMENTS IDENTITY
- STEP THREE: DETERMINING THE DEPARTMENTS FUTURE
- Strategic Planning The Long and Short of It
- STEP FOUR: BACK TO THE MISSION STATEMENT
- STEP FIVE: THE PLANNING DOCUMENT
- Key Result Areas
- Goals
- Objectives
- STEP SIX: DOING IT!
- The Value of Strategic Planning
- ACTION CHECKLIST
- Chapter 4Framework for Internet Security Planning
- INTRODUCTION
- CONNECTING TO THE WORLD WIDE WEB
- Full Direct Connection
- Full Buffered Connection
- Standalone Connections
- SECURING THE NETWORK ENVIRONMENT
- Patching and Preventing Security Holes
- Identifying Security Holes
- Monitoring Hacker Activity
- Encryption Software and Authentication
- Encryption
- Authentication
- FIREWALLS
- Router-Based IP-Level Firewalls
- Host-Based Application-Level Firewalls
- SECURE INTERFACES
- SSL
- S-HTTP
- LEGAL ISSUES
- CONCLUSION
- Chapter 5Network Baselining as a Planning Tool
- INTRODUCTION
- BASELINING TOOLS AND TECHNIQUES
- SimpleView
- NEWT
- EtherVision
- Foundation Manager
- CONCLUSION
- Chapter 6Developing Corporate Intranets
- MOVE OVER, LANS
- THE INTRANET IMPACT WHAT CAN AN INTRANET DO?
- Web Self-Service
- Intranet Reengineering
- Sales Force Automation
- Manufacturing and Inventory
- Purchasing and Financial
- The Web as an Application Platform
- NEW MODEL FOR DISTRIBUTED COMPUTING
- WAN vs. LAN
- Application Publishing Server vs. Client
- N-Tier vs. 2- or 3-Tier
- Shared Database Connection vs. Individual Login
- Technical Considerations
- Scalability and Performance
- State and Session Management
- SECURITY
- WHAT ABOUT JAVA?
- OPERATIONAL CONSIDERATIONS
- CONCLUSION
- Chapter 7Preparing for Cable Modems
- PROBLEMS ADDRESSED
- MODEM FUNDAMENTALS
- THE QUADRATURE AMPLITUDE MODULATION TECHNIQUE
- CABLE MODEMS
- From Unidirectional to Bidirectional Systems
- A High-Speed Cable Modem Architecture
- On the Web
- RECOMMENDED COURSE OF ACTION
- Chapter 8Network Disaster Recovery Planning
- NETWORK RELIABILITY
- Star Topology
- Ring Topology
- Bus Topology
- NETWORK AVAILABILITY
- Component Availability
- METHODS OF PROTECTION
- Tariffed Redundancy and Protection
- Further Protective Capabilities
- Dial Backup
- Rerouting on T1 Lines
- Customer-Controlled Reconfiguration
- ISDN Facilities
- DDS Dial Backup
- RECOVERY OPTIONS FOR LANS
- Recovery and Reconfiguration
- restoration Capabilities of LAN Servers
- Levels of Fault Tolerance
- REDUNDANT ARRAYS OF INEXPENSIVE DISKS
- RAID Level 0
- RAID Level 1
- RAID Level 2
- RAID Level 3
- RAID Level 4
- RAID Level 5
- RAID Level 6
- OTHER CONSIDERATIONS
- Uninterruptible Power Supplies (UPSs)
- Generators
- Off-Site Storage
- Surge Suppressors
- Spare Parts Pooling
- Switched Digital Services
- Multiple WAN Ports
- Links to Remote Sites
- Periodic Testing
- Worst-Case Scenarios
- Training
- Insurance
- Risk Assessment
- SUMMARY
- Section IIBusiness Management Issues
- Chapter 9Pricing Methods Across Linked Networks
- PROBLEMS ADDRESSED
- CHARGEABLE RESOURCES
- NETWORK RESOURCE CATEGORIES
- Cable
- Linkages
- Workstations
- Servers
- Storage
- Communications
- LAN Administration Support
- EXPENSE CATEGORIES
- RATE DETERMINATION
- RECOMMENDED COURSE OF ACTION
- Chapter 10Developing a Trusted Infrastructure for Electronic Commerce Services
- INTRODUCTION
- SERVICE ATTRIBUTE AUTHORITY
- Certificate Authority
- Digital Signatures
- Certificate Repository
- Electronic Postmark
- Return Receipts
- Storage and Retrieval Services
- USE OF THESE COMMERCIAL EXCHANGE SERVICES
- AVAILABLE TECHNOLOGIES FOR ELECTRONIC COMMERCE
- Secure E-mail
- DMS and PEM.
- Secure World Wide Web
- Secure Open EDI
- THE OVERRIDING ISSUE: A PUBLIC KEY CERTIFICATE INFRASTRUCTURE
- CONCLUSION
- Chapter 11An Overview of the Telecommunications Policy Process
- INTRODUCTION
- THE BEGINNING OF COMPETITION
- Long-Distance Competition
- Results of the Telecommunications Reform Act of 1996
- Telephone Companies in the Entertainment Business
- Entertainment Companies in the Telephone Business
- Competitive Local Exchange Carriers (CLECS)
- Foreign Entrants
- WHO CREATES TELECOMMUNICATIONS POLICY?
- THE RATE-SETTING PROCESS: WHO SETS THE PRICE?
- The Rate Base
- RATEMAKING
- Residual Ratemaking
- Value of Service
- Access Charges
- Long-Run Incremental Cost (LRIC)
- DRAFTING A CUSTOM TARIFF OR AGREEMENT WITH A CARRIER
- INFLUENCING A REGULATORY BODY
- Negotiating a Price with the Commissioner
- Negotiating with the Carrier
- Converting Feature Packages Business Requirements to a Custom Tariff
- Chapter 12Business Aspects of Multimedia Networking
- INTRODUCTION
- BUSINESS DRIVERS OF MULTIMEDIA APPLICATIONS
- APPLICATIONS OF NETWORKED MULTIMEDIA
- PEOPLE-TO-SERVER APPLICATIONS
- Video-on-Demand
- WWW Browsing
- PEOPLE-TO-PEOPLE APPLICATIONS
- Multimedia Conferencing
- Types of Multimedia Conferencing Systems
- Groupware
- TECHNICAL REQUIREMENTS FOR NETWORKED MULTIMEDIA APPLICATIONS
- Latency
- Synchronization
- Bandwidth
- Reliability
- Guaranteeing Quality of Service
- Application Parameters
- System Parameters
- Network and Device Parameters
- Determining Service Levels
- SYSTEM CONSIDERATIONS
- BARRIERS TO MULTIMEDIA NETWORKING
- ISSUES IN MULTIMEDIA SYSTEMS PLANNING
- Scalability
- Integration
- Application/Content Awareness
- PLANNING STRATEGIES
- CONCLUSION
- Chapter 13Integrating the Web and Enterprisewide Business Systems
- INTRODUCTION
- THE WEB AND ITS CAPABILITIES
- Web Clients
- Web Servers
- Publishing Tools
- Communication Protocols and URLs
- Search Engines
- WEB LIMITATIONS: UNANSWERED BUSINESS QUESTIONS
- INTRANETS
- INTEGRATING THE WEB AND ENTERPRISE SYSTEMS
- Converting to Hypermedia Pages
- Building Linkage Programs
- CHALLENGES AND STRATEGY ISSUES
- BUILDING A PRESENCE ON THE WEB
- EXPANDING AND ENHANCING THE PAGES
- PLAN INTRANET APPLICATIONS
- PREPARE FOR ELECTRONIC COMMERCE
- EDUCATION AND TRAINING
- CONCLUSION
- Chapter 14Cost Allocation for Communications Networks
- CHARGEABLE RESOURCES
- NETWORK RESOURCE CATEGORIES
- Internet Gateway Access
- EXPENSE CATEGORIES
- RATE DETERMINATION
- SUMMARY
- Section IIINetworking Technology
- Chapter 15New Modem Technologies and Trends
- INTRODUCTION
- THE EVOLUTION OF PACKAGING
- External Modems
- Internal Modems
- PCMCIA Cards
- CDPD Modems
- Other Multiport Modems
- Multimedia Extensions (MMX) Technology
- Host Signal Processor Modems
- MODEM FEATURES
- Modulation Techniques
- Speed
- Error Correction
- Data Compression
- Diagnostics and Other Features
- SECURITY
- TRANSMISSION TECHNIQUES
- PC-to-PC or PC-to-Mainframe
- Wireless Modems
- Private Wireless Networks
- Multifrequency Modems
- Multimedia (Hybrid) Modems
- Cable Modems
- ROLE OF DIGITAL SIGNAL PROCESSING
- Digital Simultaneous Voice and Data
- 56K-bps Modems
- CONCLUSION
- Chapter 16Multicast Networking
- INTRODUCTION
- MULTICAST LANS
- Multicast Frame Relay
- One-Way Multicast
- Two-Way Multicast
- N-Way Multicast.
- Multicast Switched Multimegabit Data Service
- COMPARING BROADCAST AND MULTICAST IP
- The IP Multicast Protocol
- Class D Addressing
- Starting a Report Delay Timer
- Sending a Report that Other Members Overhear
- The Multicast Backbone
- Multicast Routing Protocols
- APPLICATIONS
- Dynamic Groups
- Videoconferencing
- Dataconferencing
- Real-Time Distribution of Multimedia Information
- VENDOR OFFERINGS
- CONCLUSION
- Chapter 17Frame Relay Testing and Training
- INTRODUCTION
- ADVANTAGES OF PACKET-SWITCHING FRAME RELAY NETWORKS
- DISADVANTAGES OF FRAME RELAY
- ANATOMY OF THE FRAME RELAY FRAME
- The Frame Header
- The DLCI
- Congestion Control
- The Information Field
- The FCS Field and Flags
- Local Management Interface
- THE IMPORTANCE OF TESTING
- Testing the WAN Facilities
- Frame Relay Internetwork Service Testing
- Commissioning the Frame Relay Service
- End-to-End Analysis
- TRAINING ISSUES UNIQUE TO FRAME RELAY
- THE PROVIDERS PERSPECTIVE
- THE SUBSCRIBERS PERSPECTIVE
- The Benefits of Training
- CONCLUSION
- Chapter 18Working with Images in Client/Server Environments
- INTRODUCTION
- AN OVERVIEW OF IMAGING
- Storage and Color Depth
- Data Storage
- Color-Depth Tradeoffs
- Data Transmission
- MANAGING STORAGE AND TRANSMISSION REQUIREMENTS
- File Format
- Cropping
- File and Image-Type Conversions
- CONCLUSION
- Chapter 19Voice and Video on the LAN
- INTRODUCTION
- THE VALUE OF VOICE AND VIDEO ON THE LAN
- New Types of Applications
- Infrastructure Efficiencies
- LAN TECHNOLOGIES FOR INTEGRATED VOICE AND VIDEO
- Asynchronous Transfer Mode (ATM)
- Shared and Switched LANs
- Hybrid ATM Networks
- Standards for LAN-based Voice and Video Applications
- Additional Components: Gateways and Gatekeepers
- CONCLUSION
- CHAPTER 20Inverse Multiplexing ATM, Bit by Bit
- INTRODUCTION
- ATMs POSITION IN THE MARKETPLACE
- INVERSE MULTIPLEXING FOR ATM
- Cell-Based ATM Inverse Multiplexing
- NXT1 ATM INVERSE MULTIPLEXING CLEAR CHANNEL ATM
- Alternatives to Adding a New UNI
- Support for Non-ATM and Multimedia Traffic
- Compatibility and Cost Savings
- CONCLUSION
- Chapter 21Hybrid Fiber/Coaxial Networks
- INTRODUCTION
- OVERVIEW OF HFC NETWORKS
- REQUIREMENTS FOR MANAGING HFC NETWORKS
- Achieving Interactivity
- Digital Requires Monitoring
- SERVICES RUNNING ON THE HFC NETWORK
- Analog Video Service
- Digital Services
- IDEAS FOR MANAGING THE HFC NETWORK
- Telecommunications Management Network (TMN) Model
- Example: High-Speed Data Services over HFC
- HFC Equipment
- Status Monitoring Systems
- Standard Management Capabilities
- Monitoring Non-Standard Services
- Manager/Agent Application for Controlling HFC Equipment
- CONCLUSION
- SNMP vs. CMIP
- Chapter 22Choosing Asymmetrical Digital Subscriber Lines
- INTRODUCTION
- ASYMMETRICAL DIGITAL SUBSCRIBER LINES (ADSL)
- Discrete Multitone (DMT) Operation
- Carrierless Amplitude/Phase (CAP) Modulation
- ADSL Developments and Field Tests
- ADDITIONAL DSL TECHNOLOGIES
- CONCLUSION
- Chapter 23Multimedia Networking Technologies
- INTRODUCTION
- LAN TECHNOLOGIES
- Asynchronous Ethernet
- Fast Ethernet
- 100VG-AnyLAN
- FDDI
- FDDI II
- ASYNCHRONOUS TRANSFER MODE
- ATM Architecture
- LAN Emulation
- WAN TECHNOLOGIES
- Frame Relay
- Internet Protocol
- RSVP
- NHRP
- Switched Multimegabit Data Service (SMDS)
- Fiber Channel
- Suitability of WAN-based ATM
- CONCLUSION
- Chapter 24The Basics of Computer System and Data Network Security
- PROBLEMS ADDRESSED
- BASIC SECURITY FUNCTIONS
- SECURITY VIOLATIONS
- AVOIDANCE
- Avoiding Unauthorized Access
- Screening Nonemployees
- Maintaining a Low Profile
- Distributed Environments
- Avoiding Misuse
- Avoiding Damage
- DETERRENCE
- Deterring Unauthorized Access
- Deterring Misuse and Damage
- PREVENTION
- Preventing Unauthorized Access
- Preventing Misuse and Damage
- DETECTION
- Detecting Unauthorized Access
- Detecting Misuse
- Detecting Damage
- RECOVERY
- Recovering from Unauthorized Access
- Recovery from Misuse and Damage
- CORRECTION
- Correcting Access Control Deficiencies
- RECOMMENDED COURSE OF ACTION
- CHAPTER 25Windows NT Architecture
- INTRODUCTION
- ARCHITECTURE
- Hardware Abstraction Layer
- Kernel
- The NT Executive
- Object Manager
- Process Manager
- Virtual Memory Manager
- Local Procedure Call Facility
- I/O Manager
- The Security Module
- WINDOWS NT NETWORKING
- UPGRADE ISSUES
- CONCLUSION
- Section IVInteroperability and Standards Issues
- Chapter 26Introduction to 100BASE-T: Fast (and Faster) Ethernet
- INTRODUCTION
- HOW IT WORKS: AN ISO VIEW
- 100BASE-TX
- 100BASE-T4
- 100BASE-T2
- Media-Independent Interface (MII)
- Auto-Negotiation
- Full Duplex Operation
- Flow Control
- Repeaters and Repeater Connections
- Topology Rules
- Gigabit Ethernet
- IMPACTS ON NETWORK DESIGN
- Chapter 27A Better Fast Ethernet: 100VG-AnyLAN
- INTRODUCTION
- FAST ETHERNET EVOLUTION
- 100BaseT
- 100VG-AnyLAN
- Asynchronous Ethernet
- HUB ARCHITECTURE
- Hub Operation
- Round-Robin Scanning
- Network Layers
- PMI Sublayer Functions
- PMD Sublayer
- CONCLUSION
- Chapter 28Applications and Business Issues of Fiber Channel
- INTRODUCTION
- HOW FIBER CHANNEL DIFFERS FROM OTHER TRANSPORT TECHNOLOGIES
- Shared Storage, Computing, and Network Resources
- Fiber Channel Economics
- Processor Speeds
- FIBER CHANNEL AS A SERVER TECHNOLOGY
- NETWORKING
- APPLICATIONS
- CONCLUSION
- Chapter 29Fiber Channel Architecture, Layers, and Services
- INTRODUCTION
- FIBER CHANNEL LAYERS
- Channel Networking
- Chip Coding
- Physical, Behavioral, and Logical Subsets
- MESSAGE STRUCTURE DEFINITION
- Exchanges
- Sequences
- Frame
- SCALABILITY AND GUIDELINES FOR USE
- Point-to-Point Connections
- Fiber Channel Fabrics
- Arbitrated Loop
- Fiber Channel Application Interconnection
- CONCLUSION
- Chapter 30Linking to the World Wide Web
- A WINDOW TO THE WORLD
- HYPERLINKS
- HOW HTTP ENABLES INFORMATION SHARING
- Connection
- Request and Response
- Close
- FINDING INFORMATION ON THE WEB
- How to Read a Web Address
- Unsafe Characters
- URL Path Structure
- HYPERTEXT MARKUP LANGUAGE
- WEB SOFTWARE COMPONENTS
- Client Software
- Servers
- Viewers
- Gateways
- HTML Tools
- HOW SECURE IS THE WEB?
- EMBEDDING WEB TECHNOLOGY IN OTHER PRODUCTS
- Chapter 31X.400 vs. SMTP
- INTRODUCTION
- X.400 BACKGROUND
- SMTP BACKGROUND
- SMTP/MIME
- ELECTRONIC MAIL
- THE X.400 AND SMTP/MIME DEVELOPMENT PROCESS
- THE SMTP VS. X.400 DEBATE
- SMTP/MIME CHARACTERISTICS
- X.400 CHARACTERISTICS
- INDUSTRIAL-STRENGTH MESSAGING REQUIREMENTS
- Critical Comparison Factors
- Functionality
- Security
- Systems Management
- Managing a Messaging System
- Industry Standards for E-mail Management
- EMA Requirements for Messaging Management
- Message Management
- Human Resources Requirements and Support Costs
- Performance
- Commercial Use
- CONCLUSION
- Chapter 32IPv6: The Next-Generation Internet Protocol
- INTRODUCTION
- IPV6 BACKGROUND AND FEATURES
- Differences Between IPv4 and IPv6
- Improved Terminology of IPv6
- IPV6 HEADER FORMAT
- IPV6 ADDRESSES
- Address Prefix Allocation
- The Provider-Based Unicast Address
- IPv4-Compatible Addresses
- Multicast Addresses
- IPV6 EXTENSION HEADERS AND OPTIONS
- IPV6 QUALITY-OF-SERVICE (QOS) PARAMETERS
- IPV6 SECURITY
- IP Authentication Header
- IP Encapsulating Security Payload
- ICMPV6
- MIGRATION TO IPV6
- 6bone Trials
- CONCLUSION
- Section VOrganizational Communications Services
- Chapter 33Overview of Virtual Private Networks
- INTRODUCTION
- THE VPN CONCEPT
- MAKING THE BUSINESS CASE FOR VPNs
- Billing Options
- NETWORK MANAGEMENT
- ACCESS ARRANGEMENTS
- DATA NETWORKING OVER THE VPN
- Low-Speed Data Services
- High-Speed Data Services
- Performance Objectives
- LOCAL VPN SERVICE
- CONCLUSION
- Chapter 34Using the Internet as a Virtual Network
- VIRTUAL NETWORKING CONCEPTS
- INTERNET ECONOMICS
- Equipment Cost
- RELIABILITY ISSUES
- Network Predictability
- SECURITY CONSIDERATIONS
- Packet Filtering Router
- Using Firewalls
- RECOMMENDED COURSE OF ACTION
- Chapter 35Popular E-mail Systems
- INTRODUCTION
- ELECTRONIC MESSAGING: A HISTORICAL PERSPECTIVE
- PRIMARY ELECTRONIC MESSAGING SYSTEM CATEGORIES
- FEATURES AND FUNCTIONS
- X.400 and SMTP
- X.500 Directory Service
- Features and Services Checklists
- Features for Creating Messages
- Editing Capability
- Attaching Files
- File Compression
- Distribution Lists
- Importing Text
- Signature Files
- Forms
- E-MAIL SERVICES
- Directories
- System Directories vs. Local Address Books
- Fax Gateways
- Message Notification
- Security
- Gateways
- X.400 Software
- Telex, Fax, and Wireless
- Popular Messaging Systems
- CONCLUSION
- Chapter 36Novell Messaging Products
- DEFINING THE FUTURE OF NETWORKING
- MESSAGE HANDLING SERVICES
- Global Message Handling Services
- MHS Services for NetWare 4.1
- GROUPWISE
- GroupWise Positioning
- Integrated Messaging Services
- GroupWise 4.1 Electronic Messaging Architecture
- GroupWise 4.1 Message Server
- GroupWise Gateways
- GroupWise Administration
- GroupWise Telephony Access Server
- GROUPWISE 5
- Empowering People to Act on Information
- Solutions to the Problem
- Business Solutions
- The GroupWise 5 Desktop
- SUMMARY
- Chapter 37An Introduction to Microsoft Exchange Server
- TRENDS IN MESSAGING AND COLLABORATION
- Unifying LAN- and Host-Based E-Mail
- The Microsoft Exchange Product Family
- INFRASTRUCTURE FOR MESSAGING AND COLLABORATION
- Universal Inbox
- Tight Integration with Desktop Applications
- Fast, Secure, and Reliable
- Remote Client Access
- Scalable
- REDEFINING GROUPWARE
- Group Scheduling
- Public Folders
- Bulletin Boards
- Outlook Forms
- Public Folder Replication
- Offline Folder Synchronization
- Easy-to-Create Groupware Applications
- MAPI: Messaging Application Programming Interface
- INTERNET CONNECTIVITY
- Integrated Internet Support
- Direct Connections over the Internet for Mobile Users
- Support for Internet Newsgroups and Discussion Groups
- Outlook Web Access
- EASY AND POWERFUL CENTRALIZED ADMINISTRATION
- Easy-to-Use Graphical Administration Program
- Information Moves Reliably
- Microsoft Exchange Server Components
- Single Interface for Global Management
- Client Support
- Manage all Components from a Single Seat
- Easy Migration
- BUILDING A BUSINESS STRATEGY AROUND MICROSOFT EXCHANGE SERVER
- Downsizing
- Connecting Multisystem Environments
- Upgrading Current Microsoft Mail Systems
- SUMMARY
- CHAPTER 38The 1996 U.S. Telecommunications Act and Worldwide Deregulation
- DEREGULATION AND COMPETITION
- PROBLEMS WITH DEREGULATION
- THE 1996 U.S. TELECOMMUNICATIONS ACT
- Interconnection
- Unbundled Access
- COORDINATING INTERCONNECTIVITY
- Network Reliability and Interoperability Committee (NRIC)
- Task Groups
- WORLDWIDE DEREGULATION ACTIVITIES
- Japans Interconnection Rules
- Europes Open Network Provision
- The U.K. A Framework for Action
- SUMMARY
- Section VIThe Internet and Internetworking
- Chapter 39The Internet Engineering Task Force
- THE EVOLVING ADMINISTRATION OF THE INTERNET
- The Internet Society
- INTERNET ENGINEERING TASK FORCE OVERVIEW AND CHARTER
- INTERNET ENGINEERING TASK FORCE STRUCTURE AND INTERNET STANDARDS PROCESS
- INTERNET ENGINEERING TASK FORCE SECURITY AREA WORKING GROUPS
- Authenticated Firewall Traversal Working Group
- Common Authentication Technology Working Group
- Domain Name System Security Working Group
- Internet Protocol Security Protocol Working Group
- One-Time Password Authentication Working Group
- Privacy-Enhanced Electronic Mail Working Group
- Public-Key Infrastructure (X.509) Working Group
- Web Transaction Security Working Group
- CONTACTING THE INTERNET SOCIETY AND IETF
- Chapter 40The Legal and Regulatory Environment of the Internet
- INTRODUCTION
- DEFINING THE SITUATION
- Contract Law
- Intellectual Property
- Torts and Negligence
- Criminal Law
- LIABILITY ISSUES
- An International Perspective
- A Role in the Events
- Product Liability
- LIABILITIES AND AVAILABLE REMEDIES
- Money Damages
- Injunctions
- Criminal Liability
- Lawyer Liability
- AVOIDING PROBLEMS
- Prosecution of Hackers
- CONCLUSION
- Chapter 41The Hidden Costs of Free TCP/IP
- INTRODUCTION
- SELECTING FREE TCP/IP PROTOCOL SUITES
- What Are the Costs of Using a Stack That Is Not Designed for Complex, Heterogeneous Environments?
- What Is the Cost of Using a Stack That Lacks a Robust Networking Architecture?
- What Is the Cost of Support?
- What Is the Cost of Network Management?
- What Is the Cost in Waiting for Updates?
- KERNEL APPLICATIONS: THE SILENT TCP/IP ISSUE
- KERNEL APPLICATIONS MAKE A DIFFERENCE
- SPECIFIC KERNEL ISSUES
- MATCHING REQUIREMENTS TO NEEDS
- MPTN ELIMINATES THE COMPROMISES OF TCP/IP IN AS/400 ENVIRONMENTS
- Limitations of TCP/IP
- CONCLUSION
- Chapter 42Choosing and Equipping an Internet Server
- INTRODUCTION
- INTERNET AND INTRANET SERVICES
- PLATFORM CONSIDERATIONS
- Processor Architecture
- Operating System: UNIX vs. NT
- Fault Tolerance
- INTERNET APPLICATION SOFTWARE
- Communications Software
- Commerce Software
- News Software
- Mail Software
- Proxy Software
- Firewall Software
- WEB DATABASE CONSIDERATIONS
- Maintenance and Testing Tools
- Design Tools
- COMMON GATEWAY INTERFACE
- CONCLUSION
- Chapter 43Supporting a Web Site
- COMMUNICATIONS
- SECURITY ISSUES
- THE FIREWALL OPTION
- HARDWARE
- SOFTWARE
- OPERATING SYSTEM
- SERVER SOFTWARE
- APPLICATION PROGRAMMING
- RECOMMENDED COURSE OF ACTION
- Chapter 44Selecting a Web Server Connection Rate
- PROBLEMS ADDRESSED
- BASICS OF CONNECTING TO THE INTERNET
- Analog vs. Digital Leased Lines
- Connection Constraints
- WAN Connectivity Factors
- PERFORMING THE REQUIRED COMPUTATIONS
- Hit Estimation
- LAN BANDWIDTH CONSTRAINTS
- Determining the Effect on Local Traffic
- MAKING WEB PAGE ADJUSTMENTS
- RECOMMENDED COURSE OF ACTION
- Chapter 45Criminal Activity on the Internet
- PROBLEMS ADDRESSED
- HISTORY AND SCOPE
- PRIVACY AND E-MAIL
- ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986
- LIBEL
- FRAUD
- SOFTWARE PIRACY
- FLAMING
- FREE SPEECH
- HACKERS AND PASSWORD PROTECTION
- RECOMMENDED COURSE OF ACTION
- Chapter 46An Introduction to Internet Security and Firewall Policies
- INTRODUCTION
- THE CHARACTERISTICS OF THE INTERNET
- Public and Open
- Inclusive Network of Networks
- Mesh Topology
- Flat
- Broadcast
- Different Types of Internet Connections
- Increasing Interoperability
- No Central Authority
- INTERNET PROTOCOLS
- The Internet Protocol
- The Transmission Control Protocol
- The Oldest and Most Widely Used Protocols
- Other Common Protocols
- INTERNET APPLICATIONS
- E-mail
- Logging on to a Remote System
- File Transfer
- VULNERABILITIES ON THE INTERNET
- ATTACKS ON THE INTERNET
- Eavesdropping
- Packet and Password Grabbers
- Address Spoofing
- Trojan Horses
- Browsing
- Exhaustion
- Denial of Service
- DEFENDING AGAINST ATTACKS ON THE INTERNET
- Isolation and Compartmentation
- Policies
- Bastions
- Filters
- Wrappers
- FILTERS: THE MOST POPULAR DEFENSE
- Filters Implemented by Using Routers
- Packets by Address: IP Address and Port
- Protocols
- FIREWALLS
- Firewall Policy Positions
- Choosing a Firewall Policy
- A Conservative Firewall Policy
- ENCRYPTION
- USING THE INTERNET IN A RELATIVELY SAFE ENVIRONMENT
- CONCLUSION
- Chapter 47Firewalls: An Effective Solution for Internet Security
- INTRODUCTION
- INTERNET SECURITY THREATS
- INTERNET SECURITY CONTROLS
- Encryption
- One-Time Passwords
- Firewalls
- USING FIREWALLS EFFECTIVELY
- Choosing the Right Firewall
- The Importance of a Firewall Policy
- Security Maintenance
- CONCLUSION
- Chapter 48Selecting an Internet Firewall
- INTRODUCTION
- THE RISKS ASSOCIATED WITH INTERNET CONNECTIONS
- Downtime
- Sophistication of Attacks
- Likelihood of Attack
- HOW TO ASSESS THE RISKS OF INTERNET CONNECTIONS
- Mission Critical Networking
- Service-Oriented Requirements Analysis
- Defining Security Requirements for Services
- DIFFERENT TYPES OF FIREWALLS
- Router Screening
- Dual-Homed Gateway
- Proxy Firewalls
- Dynamic Packet Filtering
- SECURITY COMPROMISES IN FIREWALLS
- CASE STUDIES
- An Academic Organization
- A Research Laboratory
- An Electronic Commerce Application
- MANAGERIAL ISSUES
- Maintaining Typical Firewalls
- Building a Firewall
- Is the Firewall Secure?
- COST ISSUES
- Does More Expensive Buy More Security?
- COSTS AND DELIVERY
- A Typical Firewall Installation
- What Vendors Typically Provide with a Firewall
- What Vendors Typically, Do Not Provide with a Firewall
- CONCLUSION
- Chapter 49A New Security Model for Networks and the Internet
- INTRODUCTION
- SECURITY BASICS
- Denial of Service
- Compromising the Integrity of the Information
- Disclosure of Information
- The Information Bucket
- TYPE ENFORCEMENT
- Subsystem Separation
- Assured Pipelines
- SIDEWINDER IMPLEMENTATION OF TYPE ENFORCEMENT
- Two Kernels
- Controlled System Calls
- Network Separation
- Protecting Internet Servers
- THE SIDEWINDER 2.0 CHALLENGE
- Challenge Site Information
- CONCLUSION
- Chapter 50An Intranet Primer
- INTRODUCTION
- BENEFITS OF INTRANETS
- Cost-Effective Communications
- Efficient Information Management
- Easier Information Publishing
- Improved Searching and Retrieval
- Enhanced Real-Time Collaboration
- INTRANET CHALLENGES
- SECURITY ISSUES
- COSTS
- CASE STUDY
- THE IDEA FACTORY
- The Marketplace Insider
- Intranet Skills Sets
- IMPLICATIONS OF JAVA AND NETWORK-CENTRIC COMPUTING
- Lower Cost of Network Ownership
- Platform-Independent Applications Development
- CONCLUSION
- Chapter 51Virtual Networking Management and Planning
- INTRODUCTION
- THE BUSINESS CASE FOR VIRTUAL NETWORKING
- Network Reliability
- Network Accountability
- THE TECHNOLOGY CASE FOR VIRTUAL NETWORKING
- VIRTUAL NETWORKING DEFINED
- Using Telephony as a Model
- SWITCHING DEFINED
- Connectionless Packet Switching
- Connection-Oriented Switches
- FEATURES OF SWITCHING SOFTWARE
- The Virtual Network Server
- VIRTUAL NETWORKS VS. VIRTUAL LANS
- CONCLUSION
- Section VIIMobile Communications Systems
- Chapter 52Safe Mobile Computing
- INTRODUCTION
- DETERMINING IF AN ORGANIZATION IS AT RISK
- POWER PROTECTION
- COMPUTER VIRUSES
- SECURITY PROGRAMS
- Windows 95
- GENERAL BACKUPS
- External Drives
- Data Recovery Centers
- Tips for Users
- BACKING UP PDAS
- Data Transfers
- PHYSICAL SECURITY: LOCKS AND CASES
- Cellular Phone Safety
- Securing Equipment and Premises Remotely
- PRACTICES FOR SAFE COMPUTING
- Cataloging Equipment: The Specifics
- Hardware and Software Setups
- Security Setups
- The Orientation Session
- Tips for Securing the Mobile Office
- Tips for Safe Public Use
- Tips for Safe Storage
- CONCLUSION
- Chapter 53Portable Network Access
- MODEM TERMS
- Error Detection and Correction
- Data Compression
- Command Set Recognition
- NETWORK ACCESS
- British Telecom (BT) TYMNET
- Commercial Dialing from Hotels and Pay Phones
- CompuServe Information Service
- CompuServe Quick Access Reference
- Dow Jones News/Retrieval
- FTS2000 Offnet Calling
- MCI Mail
- U.S. Sprint SprintNet
- SUMMARY
- Chapter 54Wireless Communications for Voice and Data
- WIRELESS TECHNIQUES: A STRATEGY FOR WORLDWIDE VOICE COMMUNICATIONS
- Cellular Voice
- Wireless Radio
- Wireless PBX Systems
- Satellite Voice Services
- WIRELESS CONSIDERATIONS FOR A DATA COMMUNICATIONS STRATEGY
- CDPD as a Wireless Option
- Specialized Mobile Radio
- Commercial Mobile Data Communications Services
- Satellite Data
- WIRELESS LANS
- WIRELESS COMMUNICATION AS AN ALTERNATIVE TO FIXED MEDIA
- The Wireless Cost Advantage
- Vendor Support for Wireless Solutions
- OUTLOOK FOR WIRELESS APPLICATIONS
- SUMMARY
- Chapter 55Developing a Cost-Effective Strategy for Wireless Communications
- WIRELESS NETWORK TECHNOLOGIES AND SERVICE PROVIDERS
- Circuit- Switched Networks
- Packet Data Networks
- CHOOSING AN ARCHITECTURE AND ACCESS METHOD
- Continuous-Connection Architectures
- E-mail Based Systems
- Agent-Based Messaging Systems
- CHOOSING WIRELESS APPLICATIONS
- Wireless E-mail and Fax Systems
- Remote Access and File Synchronization Utilities
- Single-Transaction Based Applications
- Mobile Enterprise Applications
- CHOOSING WIRELESS PRODUCTS
- Using Middleware APIs and Developer Kits
- Systems for Communications Management
- SUMMARY
- Chapter 56Cellular Digital Packet Data: An Emerging Mobile Network Service
- INTRODUCTION
- CDPD FUNDAMENTALS
- Underlying Technologies
- APPLICATIONS FOR CDPD
- EMERGING CLASS OF REMOTE USERS
- SERVICE PRICING
- BENEFITS TO MOBILE USERS
- EQUIPMENT REQUIREMENTS
- NETWORK ARCHITECTURE AND PROTOCOLS
- Mobile Data-Intermediate Systems
- Mobile Database Systems
- Mobile-End Systems
- MOBILITY MANAGEMENT
- MOBILE NETWORK REGISTRATION PROTOCOL
- MOBILE NETWORK LOCATION PROTOCOL
- INFORMATION PROTECTION
- CDPD NETWORK BACKBONE
- Mobile-End Systems Protocols
- TRANSPARENT OPERATION
- SENDING DATA FROM A MOBILE UNIT
- Registration Procedure
- Sending Data to a Mobile Unit
- IS THERE A MASS MARKET FOR CDPD?
- CONCLUSION
- Chapter 57Security of Wireless Local Area Networks
- INTRODUCTION
- AN OVERVIEW OF COSTS AND BENEFITS
- INTEROPERABILITY
- PERFORMANCE
- CONFIGURATION
- INDUSTRY APPLICATIONS
- SECURITY CONCERNS
- Physical Configuration
- Types of Transmission
- Service Availability
- Signal Availability
- Circuit Availability
- Equipment Availability
- WIRELESS NETWORK CONTROLS
- Protective Security Mechanisms
- Audit Mechanisms
- CONCLUSION
- Chapter 58Protection of Mobile Computing Assets
- KEEPING PACE WITH CHANGE
- DETERMINING THE VALUE OF INFORMATION
- Computer Security Principles
- PROTECTING THE MOBILE OFFICE
- Computer Theft
- Theft of Information
- Malicious Code
- Eavesdropping
- SETTING SECURITY POLICY
- Chapter 59Mobile User Security
- AVAILABILITY
- Scheduling Considerations
- Physical Considerations
- Notebook Connectivity
- Telephone Communications Tools
- CONTINUITY
- Creating Mobile Backup
- Loss of Computing Resources
- INTEGRITY
- Software Considerations
- CONFIDENTIALITY
- Mobile Employee Information Security Recommendations
- Software Considerations
- NEW TECHNOLOGY CONSIDERATIONS
- SUMMARY
- Section VIIIImplementation and Case Studies
- Chapter 60Integrating Electronic Messaging Systems and Infrastructures
- PROBLEMS ADDRESSED
- HOW TO ACCOMPLISH ROLLOUT AND MANAGE CONSTRAINTS
- Resource Constraints: Financial
- Resource Constraints: Expertise
- Functionality and Scope
- Supporting Internal and External Customers
- IMPLEMENTATION MODELS AND ARCHITECTURES
- Infrastructure vs. Interface
- IMPLEMENTATION SCENARIOS: A TIERED APPROACH
- One-Tier Messaging Model
- Two-Tier Model: Multiple Servers
- Application Gateways for Integrating Dissimilar Systems
- Distributed Hubs
- THREE DEPLOYMENT ARCHITECTURES AND OPTIONS
- Common Platform Architecture
- Multiple Backbone Model
- Common Backbone
- ESTABLISHING MESSAGING POLICIES AND PROCEDURES
- Privacy
- Proprietary and Confidential Information
- RECOMMENDED COURSE OF ACTION
- Network Connections
- Operating Systems
- Backup
- Applications Support
- Chapter 61TCP/IP Network Management: A Case Study
- INTRODUCTION
- MISSION-CRITICAL AND FAULT-TOLERANT REQUIREMENTS
- NETWORK MANAGEMENT SYSTEM IMPLEMENTATION STRATEGY
- The SNMP Platform-Evaluation Criteria
- The NMS Middleware
- The Enterprise Network Management System
- The SNMP-Based Management Platform
- HPOV IMPLEMENTATION
- SAS Reporting Software
- Trouble-Ticketing Software
- HPOV-ARS INTEGRATION
- Redundancy Application
- Physical Configuration Application
- Frontier NETScout
- Customized Scripts
- Operations Work-Flow Model
- SYSTEM DEPLOYMENT AND SUSTAINING ENGINEERING
- NMS Status
- Chapter 62Integrating Voice and LAN Infrastructures and Applications
- PROBLEMS ADDRESSED
- MIGRATING THE LAN INFRASTRUCTURE
- Solutions for Delay-Sensitive Applications
- Desktop Switching
- Minimize Routing
- Controlling LAN Backbone Traffic
- CONSOLIDATION OF THE CABLING PLANT
- MIGRATING THE DESKTOP
- Hardware Upgrades
- Software Upgrades
- MIGRATING THE PBX
- Legacy Telephony
- Linking Distributed PBX Components
- Server-Based Telephony
- MIGRATING USERS
- CONSOLIDATING THE VOICE AND DATA ORGANIZATIONS
- Infrastructure Maintenance and Support Staff
- RECOMMENDED COURSE OF ACTION
- Chapter 63Creating Network Expressways Using Ethernet Switching Engines
- INTRODUCTION
- CONSERVING BANDWIDTH
- GOING BEYOND SEGMENTATION
- ABOUT ETHERNET SWITCHES
- Desktop Switches
- Workgroup Switches
- Backbone Switches
- NOT ALL SWITCHES PERFORM THE SAME
- Cut-Through Switching
- Store-and-Forward Architecture
- MULTIPROTOCOL (WORKGROUP) SWITCHING
- Firewalls
- Network Considerations
- Switch Types
- TYPICAL MIDRANGE SWITCH
- APPLICATION
- TRIGGERING EVENTS
- A NETWORK IN TRANSITION A CASE STUDY
- NETWORK MANAGEMENT CONCERNS
- ATM SWITCHING AND LAN EMULATION
- Not Plug and Play
- ATM Is Not Cheap
- Multi-Access LAN Servers
- CONCLUSION
- Chapter 64Remote LAN/WAN Connections: A Case Study
- ESTABLISHING A BASELINE
- Existing Resources
- DEFINING THE OPTIONS
- DEFINING THE EXISTING RESOURCES
- DEFINING THE BUSINESS OBJECTIVE
- CONNECTIVITY OPTIONS
- Physical Connections
- Wireless Connections
- Eliminating Inappropriate Connectivity Technologies
- THE FIRST OPTION: FIBER OPTICS
- Fiber Optic Data Transmission
- Fiber Optic Cabling
- Advantages
- Disadvantages
- Costs
- THE SECOND OPTION: MICROWAVE
- Licensing Requirements
- Advantages
- Disadvantages
- Costs
- THE THIRD OPTION: INFRARED
- Licensing Requirements
- Advantages
- Disadvantages
- Cost
- THE FINAL ANALYSIS
- Weighing the Factors
- Cost Comparisons
- RECOMMENDATIONS
- The Decision on Microwave Technology
- The Decision on Infrared Technology
- The Decision on Fiber Optics
- IMPLEMENTATION AND INSTALLATION PLANNING
- SUMMARY
- Chapter 65Considerations for Implementing Corporate Intranets
- INTRODUCTION
- FAT VS. THIN CLIENTS
- TRADITIONAL CLIENT/SERVER
- JAVA-ENABLED BROWSERS
- Applets
- ActiveX and Java
- Scripting Languages
- FEEDING CLIENT APPLICATIONS
- COST ISSUES
- IMPROVING NETWORK PERFORMANCE
- Intranet Switching
- INTRANET OPERATING SYSTEM
- IntranetWare
- THE EVER-PRESENT FIREWALL
- Packet Filtering
- Circuit-Level Gateway
- Applications Servers
- INTRANET SERVER MANAGEMENT
- IP Administration
- Managing Bandwidth
- A Policy-Based Solution
- CONCLUSION
- Chapter 66Minimizing the Effect of Digital Camera Images on Networks
- INTRODUCTION
- OPERATION
- IMAGE RESOLUTION
- IMPORTANCE OF COMPRESSION
- THE CAMERA CONNECTION
- CAMERA ACCESS SOFTWARE
- IMAGE STORAGE
- TIFF CONSIDERATIONS
- RECOMMENDED COURSE OF ACTION
- Chapter 67Planning, Designing and Optimization of Enterprise Networks
- INTRODUCTION
- THE ENTERPRISE DATABASE (EDB)
- TRAFFIC ENGINEERING TECHNIQUES AND TOOLS
- CIRCUIT-SWITCHED VOICE AND VIDEO TRAFFIC
- PACKET-SWITCHED DATA TRAFFIC
- MODELING TRAFFIC FLOWS IN A BRAND NEW ENTERPRISE NETWORK
- MODELING TRAFFIC FLOWS IN AN EXISTING ENTERPRISE NETWORK
- MODELING TIME-CONSISTENT AVERAGES (TCAS) OF TRAFFIC FLOWS
- MODELING TRAFFIC GROWTH DURING THE SYSTEM LIFE CYCLE
- PERFORMANCE ISSUES
- NETWORK SYSTEM PERFORMANCE
- TOTAL MONTHLY COSTS
- SYSTEM THROUGHPUT
- SYSTEM QUALITY-OF-SERVICE (QOS)
- SYSTEM GRADE-OF-SERVICE (GOS)
- DEFINING ENTERPRISE PERFORMANCE GOALS
- MAJOR NETWORK DESIGN ISSUES
- PREVIOUS NETWORK DESIGN TECHNOLOGY
- SIMULATION TOOLS
- NEW NETWORK DESIGN TECHNOLOGY
- ONE EXAMPLE: THE ECONETS NETWORK PLANNING AND DESIGN PACKAGE
- AN ENTERPRISE NETWORK PLANNING AND DESIGN CASE STUDY ECONETS
- Chapter 68WAN Network Integration: A Case Study
- COMPANY BACKGROUND
- THE CHALLENGES AND BENEFITS OF IMPLEMENTATION
- The Business Opportunity
- Technical Benefits
- PRIORITIES
- ELEMENTS TARGETED FOR CHANGE
- UPGRADE COSTS
- UPGRADE MODELING AND REFINEMENT
- The Process
- Some Glitches
- THE FINAL INTEGRATION
- SUMMARY
- Section IXNetwork Operations and Management
- Chapter 69How to Work with a Consultant
- INTRODUCTION
- WHAT KIND OF CONSULTANTS DOES THE DEPARTMENT NEED?
- ESTABLISHING A CLEAR CHAIN OF COMMAND
- OBTAINING A SUITABLE SKILL SET
- PLANNING FOR THE CONSULTANTS ARRIVAL
- Telling the IT Staff
- Focusing the Project
- Preparing a Workspace
- MAXIMIZING THE WORKING RELATIONSHIP
- RECOMMENDED COURSE OF ACTION
- Chapter 70Open Systems Integration: Issues in Design and Implementation
- PROBLEMS ADDRESSED
- ISSUES IN OPEN SYSTEMS INTEGRATION
- User Specifications
- Alignment to Business Objectives
- Communications
- Accuracy
- Resource Contention
- Ergonomics
- Legacy Systems
- SEVEN RULES OF INTEGRATION
- Rule 1: Understanding the Technology
- Rule 2: Understanding the Application
- Rule 3: Creating a Solid Development Team
- Rule 4: Making Users Part of the Team
- Rule 5: Gathering Detailed Specifications
- Rule 6: Organizing and Interpreting Specifications
- Understanding the Critical Components of Integrated Systems
- RECOMMENDED COURSE OF ACTION
- Chapter 71Operating Standards and Practices for LANs
- PROBLEMS ADDRESSED
- WHY LANS REQUIRE STANDARDS
- LESSONS FROM MAINFRAME EXPERIENCE
- Balancing Productivity and Support Requirements for LANs
- STANDARDS COMMITTEES
- Defining Mission Critical
- WRITING THE OPERATING AND SECURITY STANDARDS DOCUMENT
- Network Software Security and Change Control Management
- Physical and Environmental Security
- Technical Support
- CONCLUSION
- Chapter 72Applets and Network Security: A Management Overview
- INTRODUCTION
- APPLETS AND THE WEB
- The Security Issue
- What Are the Risks?
- JAVA: SECURE APPLETS
- Java: Holes and Bugs
- JAVASCRIPT: A DIFFERENT GRIND
- ACTIVEX: MICROSOFTS VISION FOR DISTRIBUTED COMPONENT COMPUTING
- Using Authenticode for Accountability
- ActiveX: The Downside
- AN OUNCE OF PREVENTION
- Make Sure the Basics Are Covered
- Users Should Run the Latest Available Versions of Their Web Browsers
- CONCLUSION
- Chapter 73Assessing and Eliminating Virus Threats in Distributed Networks
- PROBLEMS ADDRESSED
- How Pervasive Is the Viral Threat?
- How Viruses Infect Systems
- Major Types of Viruses
- Common Spread Scenarios
- HOW TO DISCOVER A VIRUS
- STANDARD APPROACHES TO FIGHTING VIRUSES
- Signature-Based Scanners
- Multilevel Generic Detection
- TSR Monitoring
- Behavior Blocking
- Drawbacks of Signature Scanning
- RECOMMENDED COURSE OF ACTION
- Strategies for Virus Prevention
- Chapter 74Technology Conversions on WANs
- INTRODUCTION
- FEAR OF CHANGE
- CORPORATE INVOLVEMENT
- Scheduling Projects
- Auditing the Physical Network
- Formatting Online Information About the Network
- MIGRATION STRATEGIES
- The Leapfrog Approach: Balancing Costs and Benefits
- Cables
- Site Preparation
- CONCLUSION
- Chapter 75Enterprise Messaging Management
- PROBLEMS ADDRESSED
- DIFFICULTIES IN MANAGING ENTERPRISEWIDE MESSAGING SYSTEMS
- E-MAIL MANAGEMENT STANDARDS
- EMA Framework for Messaging Management
- AN OVERVIEW OF MESSAGE MANAGEMENT CONCEPTS
- MESSAGING MANAGEMENT ARCHITECTURE
- MESSAGE MANAGEMENT FROM A SINGLE LOCATION
- Functional Description
- Control Center Console Software
- Evolving with the Standards
- RECOMMENDED COURSE OF ACTION
- Selecting a Messaging Management Strategy
- Chapter 76Windows NT Performance Monitoring
- INTRODUCTION
- Utilization
- OBSERVING NETWORK PERFORMANCE
- Considering the Processor
- Working with Alerts
- RECOMMENDED COURSE OF ACTION
- Chapter 77Managing Networks with the Global Naming Tree
- INTRODUCTION
- STRUCTURE OF THE GLOBAL NAMING TREE
- Use in Network Management Applications
- The Internet Subtree
- The MIB Subtree
- ASSIGNING IDENTIFIERS AND MANAGING OBJECTS
- Standardization and Its Benefits
- SAMPLE APPLICATION USING SAMPLE TOOL
- CONCLUSION
- Section XDirections in Communications Systems
- Chapter 78The Superhighway: Information Infrastructure Initiatives
- WHAT IS AN INFORMATION INFRASTRUCTURE?
- Relevance of the Information Infrastructure
- Goals and Objectives of Information Infrastructures
- BACKGROUND: TECHNOLOGY TRENDS
- Bandwidth Pricing Issues
- Decoupling Networks and Their Payloads
- The Service-Oriented Architecture
- KEY ISSUES IN CREATING THE SUPERHIGHWAY
- The Users Role
- Governments Role
- Industrys Role
- The Dream Integration Scenario
- The Nightmare Scenario
- Corporate Networks
- THE INTERNET AND B-ISDN
- TELECOMMUNICATIONS AND CABLE TV
- COMPUTER-INTEGRATED TELEPHONY
- COMPUTING AND ENTERTAINMENT
- NATIONAL AND INTERNATIONAL INITIATIVES
- The U.S.
- International Initiatives
- STANDARDS AND STANDARDS ORGANIZATIONS
- ISO and ITU
- American National Standards Institute Information Infrastructure Standards Panel (ANSI IISP)
- Telecommunications Standards Advisory Council of Canada (TSACC)
- European Telecommunications Standards Institute (ETSI)
- The Digital Audio Visual Council (DAVIC)
- ALTERNATIVE INITIATIVES
- EIA/ TIA
- The Computer Systems Policy Project (CSPP)
- SUMMARY
- Chapter 79Using Intelligent Agents to Maximize the Benefits of the World Wide Web
- INTRODUCTION
- WEB-SUPPORTED INFORMATION NEEDS
- Limitations of the World Wide Web
- CAPABILITIES OF INTELLIGENT AGENTS
- USING WEB AGENTS TO MEET MANAGEMENT NEEDS
- Using Search Engines to Reduce Information Overload
- Using Monitors to Keep Up with Changing Information
- Using Publishers to Make Sense of Unordered Information
- Using Guides to Maneuver Novice Users through the Web
- Using Personal Assistants to Customize Web Information
- LIMITATIONS OF WEB AGENTS
- CONCLUSION
- BIBLIOGRAPHY
- Chapter 80Using Intelligent Agents to Manage Multivendor Environments
- INTRODUCTION
- KEY CONCEPTS IN SYSTEMS ADMINISTRATION
- Manager and Agent
- Agent IQ
- CAPABILITIES OF INTELLIGENT AGENTS
- DISK MONITORING AGENTS
- APPLICATION MONITORING AGENTS
- FILE MONITORING AGENTS
- FILE DISTRIBUTION AGENTS
- EVENT MANAGEMENT AGENTS
- PROCESS SCHEDULING AGENTS
- SYSTEMS MANAGEMENT PRODUCTS
- INTEROPERABILITY AND OTHER ISSUES
- Agent Management
- CONCLUSION
- Chapter 81Voice Recognition Interfaces for Multimedia Applications
- PRACTICAL SYSTEMS FOR WIDESPREAD USE
- Speaker-Independent Recognition
- CURRENT APPLICATIONS
- Microphone-Input Applications for the PC
- Telephony Applications
- EMERGING APPLICATIONS
- SELECTING AN ASR PRODUCT
- Functions and Features to Look For
- Performance Characteristics
- Vendor Capability
- BUILDING VOICE RECOGNITION APPLICATIONS
- The Development Team
- Six-Step Development Process
- SUMMARY
- Chapter 82Workplace 2000: Top Career Strategies for the Professional
- A COMMON THREAD
- STRATEGY NO. 1: PROVING ADDED VALUE
- Finding Out from People at the Top How They Define Value
- Broadening Perspectives
- Expanding the Skill Set
- Final Tip
- STRATEGY NO. 2: ACCEPTING THE IDEA OF SELF-RESCUE
- Final Tip
- STRATEGY NO. 3: ADOPTING THE NIKE MODEL OF LEARNING
- Final Tip
- STRATEGY NO. 4: REASSESSING PERSONAL GOALS AND ABILITIES
- Final Tip
- SUMMARY
- BIBLIOGRAPHY
Appendix A
Index