Index
- A
- Access
- control, 24-13, 50-4
- methods, 33-3
- points, 54-9
- units (AUs), 31-5
- Accounting management, 21-7
- ACCUNET Spectrum of Digital Services (ASDS), 8-5
- Action checklist, 3-8
- Address
- prefix allocation, 32-6
- spoofing, 46-10
- Addressing options, 53-13
- Administration management, 75-4
- ADSL, see Asymmetrical digital subscriber line
- Alta Vista, 44-5
- America Online, 9-6
- American National Standards Institute (ANSI), 22-2
- American Power Conversion (APC), 52-2
- Ankle biters, 48-3
- ANSI, see American National Standards Institute
- Anticompetitive practices, 38-2
- Antivirus programs, 52-4
- Anycast, 32-2
- APC, see American Power Conversion
- API, see Application programming interface
- Applets
- downloading, 72-6
- secure, 72-3
- Application(s)
- appropriateness, 55-1
- development, 50-8, 70-1
- firewalls, 48-6
- management, central, 37-10
- parameters, 12-7
- partitioning, 6-8
- platform, Web as, 6-3
- programming interface (API), 12-9, 55-9
- -specific integrated circuit (ASIC), 15-3
- Architecture, tree and branch, 21-2
- ASDS, see ACCUNET Spectrum of Digital Services
- ASIC, see Application-specific integrated circuit
- Asymmetrical digital subscriber line (ADSL), 22-1
- Asynchronous transfer mode (ATM), 12-10, 19-4
- adaptation layer, 23-5
- backbone equipment, 20-8
- connectivity, 22-6
- inverse multiplexing, 20-5
- migration strategy, 23-8
- networks, hybrid, 19-6
- prices, 20-2
- switching, 51-6
- technology, 23-11
- traffic, 20-7
- ATM, see Asynchronous transfer mode
- Attachment unit interface (AUI), 26-2
- Audit
- mechanisms, 57-9
- trails, 31-7
- AUI, see Attachment unit interface
- AUs, see Access units
- Authentication authority, 10-4
- Authenticode, 72-7
- Authorization codes, 33-4
- Auto-Negotiation, 26-9
- Automated teller machines, 56-3
- Avoidance, 24-2
- B
- Backbone router, 56-7, 56-12, 56-14
- Backup
- capability, 59-10
- medium, easiest, 59-5
- procedures, 8-12
- network, 64-3
- services, 68-7
- Bastions, 46-13
- Bell Operating Companies (BOCs), 43-1
- Big Three carriers, 33-1
- Billing options, 33-4
- Biphase shift key (BPSK), 7-4
- Bipolar violation (BPV), 17-7, 17-8
- BOCs, see Bell Operating Companies
- Boundary routers, 32-13
- BPSK, see Biphase shift key
- BPV, see Bipolar variation
- Bridges, 51-5
- Broadcast transmission, 16-1
- Browser(s)
- application, 30-9
- configuration, 72-5
- Java-enabled, 65-3
- software, 42-1
- Budgets, zero-growth, 3-3
- Bulletin boards, 37-6, 37-7, 37-8
- Bus topology, 8-2
- Business systems, integrated Web and enterprisewide, 13-1-13-10
- building presence on Web, 13-8-13-9
- challenges and strategy issues, 13-8
- education and training, 13-10
- expanding and enhancing pages, 13-9
- integrating Web and enterprise systems, 13-6-13-8
- building linkage programs, 13-7
- converting to hypermedia pages, 13-6-13-7
- intranets, 13-5-13-6
- plan intranet applications, 13-9
- prepare for electronic commerce, 13-9
- Web and Web capabilities, 13-2-13-4
- communication protocols and URLs, 13-3-13-4
- publishing tools, 13-2-13-3
- search engines, 13-4
- Web clients, 13-2
- Web servers, 13-2
- Web limitations, 13-4-13-5
- C
- Cable
- modems, 7-3
- networks, 21-3
- systems, 78-7
- television (CATV), 7-1
- Cabling, costs of, 9-3
- CAD, see Computer-aided design
- Calendaring, 36-9, 36-17
- Call
- blocking, 33-9
- -progress monitoring, 15-6
- screening, originator, 33-2
- Callback systems, 24-9
- Caller groups, 33-2
- CAM, see Computer-aided manufacturing
- Capacity handling, 17-10
- Career counseling, 82-12
- Carrier-to-noise ratio, 21-4
- CA, see Certification authority
- CAT, see Common Authentication Technology
- CAT scans, 18-1
- CATV, see Cable television
- CCA, see Clear channel ATM
- CCR, see Customer-controlled reconfiguration
- CDMA, see Code division multiple access
- CDPD, see Cellular digital packet data
- Cell-in-Frame technique, 19-6
- Cell switching, 51-4
- Cellular network, 56-11
- Cellular technology, 55-2, 57-4
- Cellular telephone, 52-2, 52-10
- Cellular digital packet data (CDPD), 15-2, 54-4, 56-1-56-14
- applications for CDPD, 56-3
- benefits to mobile users, 56-4-56-5
- CDPD fundamentals, 56-2
- channel hopping, 56-2
- digital cellular radio technology, 56-2
- packetization, 56-2
- underlying technologies, 56-2
- CDPD network backbone, 56-10-56-11
- digital transmission technology, 56-2
- emerging class of remote users, 56-3
- equipment requirements, 56-5
- information protection, 56-10
- mass market for CDPD, 56-14-56-16
- mobile network location protocol, 56-10
- mobile network registration protocol, 56-10
- mobility management, 56-9
- network architecture and protocols, 56-5-56-9
- mobile database systems, 56-7
- mobile data-intermediate systems, 56-7
- mobile-end systems, 56-7-56-9
- packet switching, 56-2
- sending data from mobile unit, 56-12-56-14
- registration procedure, 56-12-56-14
- sending data to mobile unit, 56-14
- service pricing, 56-3-56-4
- transparent operation, 56-11-56-12
- Central office (CO), 22-1
- CERT, 47-1
- Certificate
- authority (CA), 10-2, 10-3, 39-12
- repository, 10-4, 10-6
- revocation list (CRL), 10-6
- CGI, see Common gateway interface
- Channel hopping, 56-2
- Checksum, 73-7
- Chip coding, 29-3
- Circuit availability, 57-8
- Civil counsel, 40-12
- Civil law, 40-2
- Clear channel ATM (CCA), 20-4
- CLECs, see Competitive local exchange carriers
- Client
- applications, 65-4
- /server application, WWW as, 30-9
- software, 30-8
- support, 37-17
- CO, see Central office
- Coaxial cable, 14-3
- Code division multiple access (CDMA), 55-3
- Coding
- system, 26-5, 26-6
- technique, 22-6
- Collision domain
- half-duplex, 26-11
- maximum, 26-10
- Color depth, 18-4
- Commercial dialing, 53-6
- Commercial services, 35-2
- Commissioner, negotiating price with, 11-8
- Common Authentication Technology (CAT), 39-9
- Common gateway interface (CGI), 6-6
- Common messaging calls, 37-11
- Communication(s)
- carrier, 22-7
- improvement in, 1-4
- ineffective, 1-1
- infrastructure, local, 19-3
- lack of, 1-5
- managers, 14-1, 14-2
- private, 24-10
- problems, 1-3, 1-9
- protocols, 32-1
- software, 42-5
- technology
- radio-based, 57-5
- types of, 57-1
- Communications networks, cost allocations for, 14-1-14-9
- chargeable resources, 14-2-14-3
- expense categories, 14-5-14-7
- network resource categories, 14-3-14-5
- Internet gateway access, 14-5
- LAN administration support, 14-5
- linkages, 14-3-14-4
- storage, 14-4-14-5
- rate determination, 14-7-14-8
- Compartmentation, 46-12
- Competitive local exchange carriers (CLECs), 11-3
- Competitive process, 1-5
- Compression method, lossless, 18-5
- CompuServe, 9-6
- Computer(s)
- -aided design (CAD), 12-4
- -aided manufacturing (CAM), 12-4
- -based training, 35-4
- Fraud and Abuse Act of 1986, 40-6
- palmtop, 57-4
- portable, 55-1
- security, 48-1
- theft, 58-3
- virus, 40-6, 73-1
- Computing resources, loss of, 59-5
- Confidentiality, 59-11
- Configuration
- assessment component, 8-10
- flexibility, 41-7, 57-1
- limitations, 57-3
- management, 8-9, 21-7, 23-13, 31-9
- switching, 51-4
- Congestion control, 17-6, 38-7
- Congress, 11-8
- Connection management service, 51-8
- Connectivity expertise, 51-10
- Consultant, working with, 69-1-69-7
- establishing chain of command, 69-2-69-3
- maximizing working relationship, 69-5-69-6
- obtaining suitable skill set, 69-3-69-4
- planning fort consultant arrival, 69-4-69-5
- focusing project, 69-4-69-5
- preparing workspace, 69-5
- telling IT staff, 69-4
- recommended course of action, 69-6-69-7
- type of consultant needed by department, 69-1-69-2
- Continuing education, 82-11
- Contract law, 40-2, 40-3
- Copyright laws, violation of, 4-10
- Core competencies, 82-7
- Corporate business needs, 3-1
- Corporate counsel, 40-12
- Corporate restructuring, 82-1
- CRC, see Cyclic redundancy check
- Credit card numbers, 33-4
- Criminal activity, on Internet, 45-1-45-11
- Electronic Communications Privacy Act of 1986, 45-4-45-5
- flaming, 45-7-45-8
- fraud, 45-6
- free speech, 45-8-45-9
- hackers and password detection, 45-9-45-10
- history and scope, 45-2-45-3
- libel, 45-5-45-6
- privacy and e-mail, 45-3-45-4
- problems addressed, 45-1
- recommended course of action, 45-10
- software piracy, 45-7
- CRL, see Certificate revocation list
- Cropping, 18-7
- Cryptography, 40-7
- Custom applications, upgrading, 2-7
- Custom tariff, 11-7, 11-9
- Customer
- account tracking, 37-19
- activities, 24-4
- -controlled reconfiguration (CCR), 8-7
- information queries, 13-6
- records, 58-2
- responsibility, 48-11
- support, 13-4
- Cyclic redundancy check (CRC), 15-5
- D
- Damage
- detecting, 24-11
- recovery from, 24-12
- DASD, see Direct access storage device
- Data
- accuracy, 70-2
- capture, 12-9
- center, 4-10
- floor space, 8-15
- manager, 7-2, 41-11
- network-linked, 14-2
- circuit cards, 74-3
- communications managers, 28-1
- compression, 15-4, 15-6, 53-4, 53-5
- convergence, voice and, 19-1
- damage to, 24-12
- Encryption Standard (DES), 15-7
- files, restoration of, 68-8
- integrity, VI-3
- link connection identifier (DLCI), 17-4
- Link Control (DLC), 25-7
- loss, 8-1, 73-2
- management, 77-1
- modems, 52-8
- network(s), 24-5
- exposure, 24-6
- managers, 24-1
- paths, potential, 56-13
- protection methods, 8-24
- protection options, 8-24
- reliability, 6-4
- service, high speed, 21-8
- storage, 18-2, 18-3, 44-4
- striping, 8-18
- system upgrades, 62-16
- traffic, 33-8
- transfers, 52-6
- transmission rate, 26-7
- types, 36-20
- Database(s)
- access to, 65-1
- commercial, 45-2
- connection, shared, 6-5
- corporate, 56-16
- design, 70-12
- files, 15-6
- location, 36-16
- maintaining departmental, 69-6
- manager, 80-11
- multimedia applications involving, 23-1
- replication, 55-4
- RMTA, 75-6
- server, 42-8, 43-7
- SQL, 42-11
- updates, 16-11
- visual, 18-3
- Dataconferencing, 16-10
- Datagram, 32-3
- Dataphone Digital Service (DDS), 8-5, 43-2
- DDN, see Defense Data Network
- DDS, see Dataphone Digital Service
- DDT, see Domain definition table
- Decryption, 59-12
- Defense Data Network (DDN), 39-3
- Defragmentation, 60-6
- Denial of service attacks, 46-12
- Department of Defense (DoD), 49-3
- Deployment issues, 2-2
- Depreciation, 11-5
- Deregulation, 38-1
- DES, see Data Encryption Standard
- Desktop
- management tools, 41-5
- PC, 2-5, 55-8
- user, 31-10
- videoconferencing, 19-2
- Destination address, 32-5
- Detection, 24-10
- Deterrence, 24-7
- Development manager, 82-9
- Device identification, 59-2, 59-3
- Diagnostics, 9-7
- Dial backup, 8-6
- Dictatorship, 1-7
- Digital camera images, on networks, 66-1-66-10
- camera access software, 66-4-66-6
- camera connection, 66-3-66-4
- image resolution, 66-2
- image storage, 66-6-66-8
- importance of compression, 66-2-66-3
- operation, 66-2
- recommended course of action, 66-10
- TIFF considerations, 66-8-66-10
- Digital data services (DDS), 8-8
- Digital encryption, 37-5
- Digital signatures, 10-4, 10-8, 39-10, 59-15
- Digital simultaneous voice and data (DSVD), 15-11
- Digital subscriber lines, choosing asymmetrical, 22-1-22-7
- additional DSL technologies, 22-5-22-6
- ASDL, 22-2-22-3
- Digital video, 12-6
- Direct access storage device (DASD), 8-20
- Direct Memory Access, 29-3
- Directory
- assistance facilities, 38-3
- server, 60-15
- services, 75-1
- synchronization agent (DXA), 37-14
- tree, 36-6
- Disaster recovery planning, network, 8-1-8-24
- methods of protection, 8-4-8-9
- customer-controlled reconfiguration, 8-7
- DDS dial backup, 8-8-8-9
- dial backup, 8-6
- further protective capabilities, 8-5-8-6
- ISDN facilities, 8-7-8-8
- rerouting on T1 lines, 8-6-8-7
- tariffed redundancy and protection, 8-4-8-5
- network availability, 8-2-8-4
- network reliability, 8-1-8-2
- bus topology, 8-2
- ring topology, 8-2
- other considerations, 8-19-8-24
- generators, 8-20
- insurance, 8-24
- links to remote sites, 8-22
- multiple WAN ports, 8-22
- off-site storage, 8-20-8-21
- periodic testing, 8-22-8-23
- risk assessment, 8-24
- spare parts pooling, 8-21
- surge suppressers, 8-21
- switched digital services, 8-21
- training, 8-23
- uninterruptable power supplies, 8-19-8-29
- worst-case scenarios, 8-23
- recovery options for LANs, 8-9-8-14
- levels of fault tolerance, 8-13-8-14
- recovery and reconfiguration, 8-9-8-11
- restoral capabilities of LAN servers, 8-11-8-13
- redundant arrays of inexpensive disks, 8-14-8-19
- RAID level 0, 8-15-8-18
- RAID level 1, 8-18
- RAID level 2, 8-18
- RAID level 3, 8-18
- RAID level 4, 8-18
- RAID level 5, 8-19
- RAID level 6, 8-19
- Disclosure of information, 49-2
- Discrete multitone (DMT), 22-2
- Discriminatory practices, 38-8
- Disk
- array, five-drive, 8-19
- drives, 28-3, 29-7
- duplexing, 8-13
- configuration, 8-16
- disadvantage of, 8-14
- mirroring, 36-1, 61-8
- monitoring tools, 80-5
- storage, 18-1
- Distance learning, 17-11
- Distortion problem, 21-5
- Distribution
- lists, 35-6
- tree, shared, 16-9
- DIT, see Domain interaction table
- DLC, see Data Link Control
- DLCI, see Data link connection identifier
- DMT, see Discrete multitone
- DNS spoofing, 47-2
- Document
- formatting, 30-7
- management, 36-21
- strategic plan as living, 3-9
- DoD, see Department of Defense
- Domain
- definition table (DDT), 49-5
- interaction table (DIT0, 49-5
- DOS applications, 2-7
- Dow Jones news/retrieval, 53-8
- Downsizing, 82-1
- Downtime, 48-2, 52-11
- Draft message, 53-12
- DSVD, see Digital simultaneous voice and data
- Dumb terminals, 67-1
- DVMRP flooding, 16-8
- DXA, see Directory synchronization agent
- E
- Eavesdropping, 46-10, 46-19, 58-5
- ECS, see Electronic commerce services
- Electronic commerce services (ECS), 10-1-10-13
- available technologies for electronic commerce, 10-10-10-11
- DMS and PEM, 10-11
- secure E-mail, 10-11
- secure World Wide Web, 10-11
- secure open EDI, 10-11
- public key certificate infrastructure, 10-12
- service attribute authority, 10-2-10-10
- certificate authority, 10-2-10-3
- certificate authority, 10-4-10-6
- digital signatures, 10-4
- electronic postmark, 10-6-10-7
- return receipts, 10-8-10-9
- storage and retrieval services, 10-9-10-10
- use of commercial exchange services, 10-10
- Electronic Communications Privacy Act of 1986, 45-4
- Electronic dataconference, 16-7
- Electronic mail, see E-mail
- Electronic Messaging Association, 31-11
- Electronic messaging systems, implementing, 60-1-60-17
- accomplishing rollout and managing constraints, 60-2-60-4
- expertise resource constraints, 60-2-60-3
- financial resource constraints, 60-2
- functionality and scope, 60-3-60-4
- supporting internal and external customers, 60-4
- deployment architectures, 60-11-60-15
- common backbone, 60-13-60-15
- common platform architecture, 60-12
- multiple backbone model, 60-12-60-13
- establishing messaging policies, 60-15-60-16
- privacy, 60-16
- proprietary and conidential information, 60-16
- implementation models and architectures, 60-4-60-7
- implementation scenarios, 60-7-60-11
- application gateways for integrating dissimilar systems, 60-9-60-10
- distributed hubs, 60-11
- one-tier messaging model, 60-7-60-8
- two-tier model, 60-8-60-9
- problems addressed, 60-1-60-2
- recommended course of action, 60-16-60-17
- applications support, 60-17
- backup, 60-17
- network connection, 60-16-60-17
- operating systems, 60-17
- Electronic postmark, 10-6, 10-7
- Electronic publishing, 13-4
- E-mail, 4-5, 17-1, 46-7
- addresses, internal, 46-17
- backup of existing, 45-5
- development of, 45-1
- filtering, 79-3
- host-based, 37-2
- market, 35-13
- moving, 68-9
- package, 35-14
- postmaster for, 48-8
- private, 35-2
- recipients of, 45-3
- servers, 65-11
- services, 35-7
- systems, see also E-mail systems, popular
- host-based, 37-18
- internal, 13-6
- users, number of, 35-1, 60-8
- wireless, 55-7, 55-10
- E-mail systems, popular, 35-1-35-14
- E-mail services, 35-7-35-13
- directories, 35-8
- fax gateways, 35-9
- gateways, 35-9-35-10
- message notification, 35-9
- popular messaging systems, 35-11-35-13
- security, 35-9
- system directories vs. local address books, 35-8-35-9
- telex, fax, and wireless, 35-10-35-11
- X.400 software, 35-10
- features and functions, 35-3-35-7
- attaching files, 35-6
- distribution lists, 35-6-35-7
- editing capability, 35-5
- features for creating messages, 35-5
- features and services checklist, 35-4-35-5
- file compression, 35-6
- forms, 35-7
- importing text, 35-7
- signature files, 35-7
- X.400 and SMTP, 35-3
- X.500 directory service, 35-3-35-4
- historical overview of electronic messaging, 35-1-35-2
- primary electronic messaging system categories, 35-2
- Employee
- directories, 6-2
- handbooks, 40-11
- privacy, 45-10
- EMPT bombs, 4-10
- Encryption, 4-4, 47-3, 57-9
- end-to-end, 46-20
- on Internet, 46-18
- private-key, 4-6
- programs, 4-5
- public-key, 4-9
- End users, see System developers, improving communication between end users and
- Enterprise messaging management, 75-1-75-9
- difficulties in managing enterprisewide messaging systems, 75-1-75-3
- E-mail management standards, 75-3-75-4
- message management from single location, 75-5-75-8
- control center console software, 75-7
- evolving with standards, 75-7-75-8
- functional description, 75-6
- messaging management architecture, 75-5
- overview of message management concepts, 75-4
- problems addressed, 75-1
- recommended course of action, 75-9
- Enterprise networks, planning, designing, and optimization of, 67-1-67-16
- case study, 67-10-67-16
- circuit-switched voice and video traffic, 67-3
- defining enterprise performance goals, 67-7
- econets network planning and design package, 67-9-67-10
- enterprise database, 67-2
- major network design issues, 67-7-67-8
- modeling time-consistent averages of traffic flows, 67-4-67-5
- modeling traffic flows in existing enterprise network, 67-4
- modeling traffic flows in new enterprise network, 67-3-67-4
- modeling traffic growth during system life cycle, 67-5
- network system performance, 67-5-67-6
- new network design technology, 67-9
- packet-switched data traffic, 67-3
- performance issues, 67-5
- previous network design technology, 67-8
- simulation tools, 67-8-67-9
- system throughput, 67-6
- system quality-of-service, 67-6
- system grade-of-service, 67-7
- total monthly costs, 67-6
- traffic engineering, 67-2-67-3
- Equipment cost, 34-4
- Error
- correction, 8-18, 15-4
- detection, 8-10, 53-2
- message, 30-4, 42-9
- recovery, 12-7
- ESA, see Extended service area
- Ethernet, 23-10, 29-7
- adapter cards, 19-7
- asynchronous, 23-2, 27-2
- infrastructure, 23-4
- LAN, 44-6
- links, 63-8
- operation, gigabit, 26-13
- standards, 23-3
- technology, 23-2
- traffic, 63-5
- use of Foundation Manager to monitor, 5-6
- Ethernet, better fast, 27-1-27-11
- fast Ethernet evolution, 27-1-27-2
- asynchronous Ethernet, 27-2
- 100BaseT, 27-2
- 100VG-AnyLAN, 27-2
- hub architecture, 27-2-27-10
- hub operation, 27-4-27-6
- network layers, 27-6
- PMD sublayer, 27-9-27-10
- PMI sublayer functions, 27-6-27-9
- round-robin scanning, 27-6
- Ethernet, fast, 23-2, 26-1-26-13, 62-4
- auto-negotiation, 26-9
- 100BASE-T2, 26-7
- 100BASE-T4, 26-5-26-7
- 100BASE-TX, 26-5
- flow control, 26-9-26-10
- full duplex operation, 26-9
- gigabit Ethernet, 26-11-26-12
- impacts on network design, 26-12-26-13
- ISO view, 26-2-26-5
- media-independent interface, 26-8
- repeaters and repeater connections, 26-10
- topology rules, 26-11
- Ethernet switching engines, creating network expressways using, 63-1-63-16
- about Ethernet switches, 63-2-63-4
- backbone switches, 63-3-63-4
- desktop switches, 63-3
- workgroup switches, 63-3
- application, 63-9-63-10
- ATM switching and LAN emulation, 63-15-63-16
- cost of ATM, 63-15
- multi-access LAN servers, 63-16
- not plug ands play, 63-15
- beyond segmentation, 63-2
- conserving bandwidth, 63-2
- multiprotocol switching, 63-5-63-8
- firewalls, 63-5-63-7
- network considerations, 63-7
- switch types, 63-8
- network management concerns, 63-14-63-15
- network in transition, 63-12-63-14
- performance of switches, 63-4-63-5
- cut-through switching, 63-4
- store-and-forward architecture, 63-4-63-5
- typical midrange switch, 63-8-63-9
- triggering events, 63-10-63-12
- EtherVision, 5-2, 5-4
- Exhaustion, 46-11
- Expense
- categories, 9-6
- reporting, 36-19, 36-22
- Extended service area (ESA), 54-9
- External drive, 52-5
- F
- Fabric services, 28-6
- Facilities management, 24-5
- Facsimile machines, 81-6
- FAT, see File allocation table
- Fault
- location, 8-9
- management, 21-10, 21-7
- tolerance, 8-13, 42-4
- Fax, 35-5
- capabilities, 15-1
- gateways, 35-7, 35-9
- machine, 36-20, 52-1
- service, enhanced, 33-7
- FCC, see Federal Communications Commission
- FCS, see Frame check sequence
- FCSI, see Fiber Channel Systems Initiative
- FDDI, see Fiber distributed data interface
- FECN, see Forward explicit congestion notification
- Federal Communications Commission (FCC), 11-2, 38-1
- Fiber channel, applications and business issues of, 28-1-28-7
- applications, 28-6
- difference between fiber channel and other transport technologies, 28-1-28-4
- fiber channel economics, 28-3-28-4
- processor speeds, 28-4
- shared storage, computing, and network resources, 28-2-28-3
- fiber channel as server technology, 28-5
- networking, 28-5-28-6
- Fiber channel architecture, layers, and services, 29-1-29-8
- fiber channel layers, 29-1-29-4
- channel networking, 29-3
- chip coding, 29-3-29-4
- physical, behavioral, and logical subsets, 29-4
- message structure definition, 29-4-29-5
- exchanges, 29-4
- frame, 29-4-29-5
- sequences, 29-4
- scalability and guidelines for use, 29-5-29-7
- arbitrated loop, 29-7
- fiber channel application interconnection, 29-7
- fiber channel fabrics, 29-6-29-7
- point-to-point connections, 29-6
- Fiber Channel Systems Initiative (FCSI), 29-4
- Fiber distributed data interface (FDDI), 26-3
- File(s)
- allocation table (FAT), 25-5
- attaching, 35-6
- compression, 35-6
- conversion, 18-7
- distribution, 80-4
- fragments, 8-12
- retrieving, 8-12
- -server hardware, 9-4
- sharing, 50-10
- synchronization utilities, 55-5
- transfer, 41-11
- products, multicast, 16-12
- protocol, 43-3, 46-6
- real-time, 19-8
- File Transfer Body Part (FTBP), 37-16
- Filters, 46-13, 46-14
- Firewall(s), 4-4, 4-6, 34-7, 47-1-47-9, see also Internet firewall, selecting
- architecture, gate-based, 47-5
- deployment of, 47-6
- internal, 48-3
- Internet security controls, 47-3-47-7
- encryption, 47-3
- firewalls, 47-4-47-7
- one-time passwords, 47-4
- Internet security threats, 47-1-47-3
- IP-level, 4-8
- maintaining, 43-4
- policy
- conservative, 46-16
- positions, 46-15
- proxy, 48-6
- security, 48-9
- software, 42-8
- types of, 48-5
- using firewalls effectively, 47-7-47-9
- choosing right firewall, 47-7
- importance of firewall safety, 47-8
- security maintenance, 47-8-47-9
- Firewire, 62-10
- Flaming, 45-7
- Flow
- control, 26-9, 53-5
- label, 32-4
- Folder synchronization, 37-9
- Forum shopping, 40-3
- Forward explicit congestion notification (FECN), 17-5
- Foundation Manager, 5-5
- graphical reports displayed by, 5-7
- use of to monitor Ethernet, 5-6
- Foundation Monitor Quick Stats, 5-8
- Fragment header, 32-9
- Frame check sequence (FCS), 17-4
- Frame management, lack of, 17-3
- Frame relay testing and training, 17-1-17-11
- advantages of packet-switching frame relay networks, 17-2-17-3
- anatomy of frame relay frame, 17-4-17-6
- congestion control, 17-5
- DLCI, 17-4-17-5
- frame header, 17-4
- FCS field and flags, 17-6
- information field, 17-5-17-6
- local management interface, 17-6
- disadvantages of frame relay, 17-3
- importance of testing, 17-7-17-10
- commissioning frame relay service, 17-9
- end-to-end analysis, 17-10
- frame relay internetwork service testing, 17-8-17-9
- testing WAN facilities, 17-7-17-8
- providers perspective, 17-10
- subscribers perspective, 17-10-17-11
- training issues unique to frame relay, 17-10
- Fraudulent activities, 45-6
- FTBP, see File Transfer Body Part
- Full-duplex operation, 26-9
- Full-enterprise connectivity, 41-3
- Full-motion video, 12-1
- Function criticality, 8-10
- G
- Gatekeepers, 19-8
- Gateway(s), 19-8
- Gateway link, 36-12
- circuit-level, 65-8
- dual-homed, 48-5
- fax, 35-7, 35-9
- to foreign environment, 60-5
- GroupWise, 36-9, 36-12
- hardware, 60-1
- Generators, 8-20
- Global naming tree, 77-1-77-8
- assigning identifiers and managing objects, 77-5-77-6
- sample application using sample tool, 77-6-77-8
- structure of, 77-2-77-5
- Internet subtree, 77-2-77-4
- MIB subtree, 77-4-77-5
- use in network management applications, 77-2
- Goals, differences in 1-2
- Gopher, 30-7
- Government data, private citizens accessing, 24-6
- Graphical user interface (GUI), 13-2, 55-12, 67-9
- phone, 62-13
- voice mail, 62-14
- Group scheduling, 37-7, 37-20
- Groupware, 12-5
- creation of custom, 36-19
- redefining, 37-6
- GroupWise, 35-13, 36-7
- administration, 36-14
- positioning, 36-8
- GUI, see Graphical user interface
- H
- Hacker(s), 4-6, 45-9
- activity, monitoring, 4-5
- dictionary programs run by, 45-10
- prosecution of, 40-11
- Half-duplex link, 26-9
- Handwriting-recognition systems, 12-2
- Hard disk, 76-3
- Hardware
- abstraction later (HAL), 25-1
- Compatibility Lists, 2-6
- configuration, 15-9
- infrastructure, 59-10
- platform independence, 25-2
- HDSL, see High data-rate digital subscriber lines
- Header compression, 56-11
- Help desk, 14-6
- operator, 33-2
- support, 71-1
- Help screens, 30-2
- HFC cable networks, see Hybrid fiber/coaxial networks
- High data-rate digital subscriber lines (HDSL), 22-1, 22-5
- High performance file system (HPFS), 25-5
- Hit estimation, 44-4
- Hop limit, 32-5
- Host
- chargeback system, 9-3, 14-2
- signal processing (HSP) modems, 15-3
- HPFS, see High performance file system
- HP Open Desk Manager, 35-12
- HSPO modems, see Host signal processing modems
- HTML, see HyperText Markup Language
- HTTP, see HyperText Transfer Protocol
- Hub(s)
- architecture, 8-3, 27-2
- distributed, 60-11
- Human resources, 50-3
- Hunt groups, 28-6
- Hybrid fiber/coaxial (HFC) networks, 21-1-21-12
- ideas for managing, 21-6-21-11
- HFC equipment, 21-7-21-8
- high-speed data services over HFC, 21-7
- manager/agent application for controlling HFC equipment, 21-11
- monitoring non-standard services, 21-10-21-11
- status monitoring systems, 21-8-21-9
- standard management capabilities, 21-9-21-10
- telecommunications management network model, 21-6-21-7
- overview of, 21-1-21-2
- requirements for managing, 21-2-21-5
- achieving interactivity, 21-3-21-5
- monitoring, 21-5
- services running on, 21-5-21-6
- analog video service, 21-5-21-6
- digital services, 21-6
- SNMP vs. CMIP, 21-11-21-12
- Hyperlinks, 30-2
- Hypermedia links, 13-2
- HyperText Markup Language (HTML), 13-2
- HyperText Transfer Protocol (HTTP), 13-3
- I
- IESG, see Internet Engineering Steering Group
- IETF, see Internet Engineering Task Force
- IGMP dialog, 16-5
- Images, working with in client/server environments, 18-1-18-7
- managing storage and transmission requirements, 18-5-18-7
- cropping, 18-7
- file and image-type conversions, 18-7
- file format, 18-5-18-7
- overview of imaging, 18-2-18-5
- color depth tradeoffs, 18-4
- data storage, 18-2-18-3
- data transmission, 18-4-18-5
- storage and color depth, 18-2
- Information
- determining value of, 58-2
- management, 3-8, 50-2
- protection, 56-10
- publishing, 50-2
- service, CompuServe, 53-7
- sharing, 30-3
- storage, 36-17
- superhighway, 78-1
- system (IS), 1-1
- systems development (ISD), 1-1
- Technology Professionals, 59-1
- theft of, 58-4
- Information infrastructure initiatives, 78-1-78-12
- alternative initiatives, 78-11
- CSPP, 78-11
- EIA/TIA, 78-11
- computer-integrated telephony, 78-7-78-8
- computing and entertainment, 78-8
- definition of information infrastructure, 78-1-78-2
- goals and objectives of information infrastructures, 78-2
- relevance of information infrastructure, 78-2
- Internet and B-ISDN, 78-6-78-7
- issues in creating superhighway, 78-3-78-6
- corporate networks, 78-5-78-6
- dream integration scenario, 78-5
- governments role, 78-4
- industrys role, 78-4-78-5
- nightmare scenario, 78-5
- users role, 78-4
- national and international initiatives, 78-8-78-9
- international initiatives, 78-9
- U.S., 78-8-78-9
- standards and standards organizations, 78-9-78-11
- ANSI IISP, 78-10
- DAVIC, 78-10-78-11
- ETSI, 78-10
- ISO and ITU, 78-9
- TSACC, 78-10
- technology trends, 78-2-78-3
- bandwidth pricing issues, 78-2
- decoupling networks, 78-3
- service-oriented architecture, 78-3
- telecommunications and cable TV, 78-7
- Installation team, 2-3
- Insurance company, 52-9
- Integrated switched digital network (ISDN), 17-3
- Intellectual property, 40-4
- Intelligent agents, use of to manage multivendor environments, 80-1-80-12
- application monitoring agents, 80-6-80-7
- capabilities of intelligent agents, 80-4-80-5
- concepts in systems administration, 80-2-80-4
- agent IQ, 80-3-80-4
- manager and agent, 80-2-80-3
- disk monitoring agents, 80-5-80-6
- event management agents, 80-8-80-9
- file distribution agents, 80-7-80-8
- file monitoring agents, 80-7
- interoperability, 80-10-80-12
- process scheduling agents, 80-9-80-10
- systems management products, 80-10
- Intelligent agents, use of to maximize benefits of World Wide Web, 79-1-79-7
- capabilities of intelligent agents, 79-2-79-3
- limitations of Web agents, 79-6
- using Web agents to meet management needs, 79-3-79-6
- using search engines to reduce information overload, 79-3-79-4
- using monitors to keep up with changing information, 79-4-79-5
- using publishers to make sense of unordered information, 79-5
- using guides to maneuver novice users through Web, 79-5-79-6
- using personal assistants to customize Web information, 79-6
- web-supported information needs, 79-2
- Interconnectors, 9-4
- Interface(s)
- cards, 61-2
- chip, 29-4
- secure, 4-8
- International Telecommunications Union (ITU), 15-5, 15-12
- Internet
- access, high-speed, 7-2
- application software, 42-5
- attacks on, 46-9
- backbone, 32-14
- browsers, 41-6
- changes on, 32-1
- channel, 11-3
- characteristics of, 46-1
- community, publisher liability and, 40-8
- connectivity, 37-1, 37-12, 37-20, 47-9
- cost associated with using, 34-3
- criminal activity on, 45-1
- describing, 46-1
- design techniques used to build, 4-1
- Draft, 39-6
- economics, 34-2
- encryption on, 46-18
- gateway access, 9-5, 14-5
- growth, 32-2, 37-3
- infrastructure, controlled, 4-1
- mail standards, 37-12
- market, 42-3
- nodes on, 46-4
- protocol, see also Internet protocol, next-generation
- administration, 65-10
- authentication header, 32-11
- encapsulating security payload, 32-12
- multicast diagram, 16-6
- researchers, 16-6
- service provider (ISP), 37-13, 43-1
- subtree, 77-2
- telephony, 19-8
- use of for transferring files, VI-2
- vulnerabilities on, 46-8
- Internet, legal and regulatory environment on, 40-1-40-12
- avoiding problems, 40-11-40-12
- defining situation, 40-2-40-7
- contract law, 40-3-40-4
- criminal law, 40-5-40-7
- intellectual property, 40-4
- torts and negligence, 40-4-440-5
- liabilities and available remedies, 40-9-40-11
- criminal liability, 40-10
- injunction, 40-10
- lawyer liability, 40-10-40-11
- money damages, 40-9-40-10
- liability issues, 40-7-40-9
- international perspective, 40-7-40-8
- product liability, 40-9
- role in events, 40-8-40-9
- Internet, as virtual network, 34-1-34-9
- Internet economics, 34-2-34-5
- recommended course of action, 34-8-34-9
- reliability issues, 34-5-34-6
- security considerations, 34-6-34-8
- packet filtering router, 34-6-34-7
- using firewalls, 34-7-34-8
- virtual networking concepts, 34-1-34-2
- Internet Engineering Steering Group (IESG), 39-3
- Internet Engineering Task Force (IETF), 31-3, 39-1-39-13
- contacting Internet Society and IETF, 39-13
- evolving administration of Internet, 39-1-39-3
- IETF overview and charter, 39-3-39-4
- IETF security area working groups, 39-7-39-13
- Authenticated Firewall Traversal Working Group, 39-7-39-8
- Common Authentication Technology Working Group, 39-9
- Domain Name System Security, 39-9-39-10
- Internet Protocol Security Protocol Working Group, 39-10-39-11
- One-Time Password Authentication Working Group, 39-11
- Privacy-Enhanced Electronic Mail Working Group, 39-11-39-12
- public-key infrastructure working group, 39-12-39-13
- Web Transaction Security Working Group, 39-13
- IETF structure and Internet standards process, 39-4-39-7
- Internet firewall, selecting, 48-1-48-11
- assessment of risks on Internet connections, 48-3-48-5
- defining security requirements for services, 48-4-48-5
- mission critical networking, 48-4
- service-oriented requirements analysis, 48-4
- case studies, 48-7-48-8
- academic organization, 48-7
- electronic commerce application, 48-8
- research laboratory, 48-7
- cost issues, 48-9
- costs and delivery, 48-9-48-11
- firewall installation, 48-10
- what vendors do not provide with firewall, 48-11
- what vendors provide with firewall, 48-10-48-11
- managerial issues, 48-8-48-9
- building firewall, 48-8-48-9
- firewall security, 48-9
- maintaining typical firewalls, 48-8
- risks associated with Internet connections, 48-1-48-3
- downtime, 48-2
- likelihood of attack, 48-3
- sophistication of attacks, 48-2-48-3
- security compromises in firewalls, 48-6
- types of firewalls, 48-5-48-6
- dual-homed gateway, 48-5-48-6
- dynamic packet filtering, 48-6
- proxy firewalls, 48-6
- router screening, 48-5
- Internet protocol, next-generation, 32-1-32-14
- ICMPv6, 32-12
- IPv6 addresses, 32-5-32-8
- address prefix allocation, 32-6
- IPv4-compatible addresses, 32-7
- multicast addresses, 32-7-32-8
- provider-based unicast address, 32-6-32-7
- IPv6 background and features, 32-2-32-3
- differences between IPv4 and IPv6, 32-2-32-3
- improved terminology of IPv6, 32-3
- IPv6 extension headers and options, 32-8-32-10
- IPv6 header format, 32-3-32-5
- IPv6 quality-of-service parameters, 32-10-32-11
- IPv6 security, 32-11-32-12
- IP authentication header, 32-11
- IP encapsulating security payload, 32-12
- migration to IPv6, 32-12-32-14
- Internet security, firewall practices and, 45-1-45-20
- attacks on Internet, 46-9-46-12
- address spoofing, 46-10
- browsing, 46-11
- denial of service, 46-12
- eavesdropping, 46-10
- exhaustion, 46-11-46-12
- packet and password grabbers, 46-10
- Trojan Horses, 46-10-46-11
- characteristics of Internet, 45-1-45-5
- broadcast, 46-3
- different types of Internet connections, 46-4
- flat, 46-3
- inclusive networks of networks, 46-2
- increasing interoperability, 46-4-46-5
- mesh topology, 46-3
- no central authority, 46-5
- public and open, 46-2
- defending against attacks on Internet, 46-12-46-14
- filters, 46-13
- isolation and compartmentation, 46-12
- policies, 46-12-46-13
- wrappers, 46-13-46-14
- encryption, 46-18-46-19
- filters, 46-14
- filters implemented by using routers, 46-14
- packets by address, 46-14
- protocols, 46-14
- firewalls, 46-15-46-18
- choosing firewall policy, 46-16
- conservative firewall policy, 46-16-46-18
- firewall policy positions, 46-15-46-16
- Internet applications, 46-6-46-8
- E-mail, 46-7
- file transfer, 46-7-46-8
- logging on remote system, 46-7
- Internet protocols, 46-5-46-6
- Internet protocol, 46-5
- oldest and most widely used protocols, 46-6
- other common protocols, 46-6
- transmission control protocol, 46-5-46-6
- using Internet in safe environment, 46-19-46-20
- vulnerabilities of Internet, 46-8-46-9
- Internet security planning, framework for, 4-1-4-10
- connecting to World Wide Web, 4-2-4-3
- full direct connection, 4-2
- full buffered connection, 4-2-4-3
- standalone connections, 4-3
- firewalls, 4-6-4-8
- host-based application-level firewalls, 4-8
- router-based IP-level firewalls, 4-7-4-8
- legal issues, 4-9-4-10
- secure interfaces, 4-8-4-9
- S-HTTP, 4-9
- SSL, 4-8-4-9
- securing network environment, 4-3-4-6
- authentication, 4-6
- encryption software and authentication, 4-5
- encryption, 4-5-4-6
- identifying security holes, 4-4-4-5
- monitoring hacker activity, 4-5
- patching and preventing security holes, 4-4
- Internet server, choosing and equipping, 42-1-42-11
- common gateway interface, 42-10-42-11
- Internet application software, 42-5-42-8
- communications software, 42-5-42-6
- commerce software, 42-6
- news software, 42-6-42-7
- mail software, 42-7
- proxy software, 42-7-42-8
- firewall software, 42-8
- Internet and intranet services, 42-1-42-2
- platform considerations, 42-2-42-5
- operating system, 42-3-42-5
- processor architecture, 42-2-42-3
- Web database considerations, 42-8-42-10
- design tools, 42-9-42-10
- maintenance and testing tools, 42-9
- Internet Society (ISOC), 39-2
- Internetwork(ing), 46-2
- applications, 10-1
- device, third-generation, 51-1
- packet exchange (IPX), 17-5
- service testing, 17-8
- Interprocess communication (IPC), 36-13
- Intranet(s)
- challenges, 50-3
- establishment of, 50-1
- impact, 6-1
- reengineering, 6-2
- solutions, 13-1
- switching, 65-6
- traffic demands, 65-7
- Intranet primer, 50-1-50-10
- benefits of intranets, 50-2-50-3
- cost-effective communications, 50-2
- easier information publishing, 50-2
- efficient information management, 50-2
- enhanced real-time collaboration, 50-3
- improved searching and retrieval, 50-2-50-3
- case study, 50-5-50-6
- costs, 50-5
- idea factory, 50-6-50-7
- intranet skills sets, 50-7
- Marketplace Insider, 50-6-50-7
- implications of Java and network-centric computing, 50-7-50-9
- lower cost of network ownership, 50-7-50-8
- platform-independent applications development, 50-8-50-9
- intranet challenges, 50-3-50-4
- security issues, 50-4-50-5
- Intranets, developing corporate, 6-1-6-9
- intranet impact, 6-1-6-4
- intranet reengineering, 6-2
- manufacturing and inventory, 6-2-6-3
- purchasing and financial, 6-3
- sales force automation, 6-2
- Web as application platform, 6-3-6-4
- Web self-service, 6-2
- Java, 6-7-6-8
- new model for distributed computing, 6-4-6-6
- application publishing, 6-4-6-5
- N-tier vs. 2- or 3-tier, 6-5
- scalability and performance, 6-6
- shared database connection vs. individual login, 6-5
- state and session management, 6-6
- technical considerations, 6-5
- WAN vs. LAN, 6-4
- operational considerations, 6-8-6-9
- replacement of LAN applications, 6-1
- security, 6-6-6-7
- Intranets, implementing corporate, 65-1-65-11
- cost issues, 65-5
- fat vs. thin clients, 65-2
- feeding client applications, 65-4-65-5
- firewall, 65-8-65-9
- applications servers, 65-8-65-9
- circuit-level gateway, 65-8
- packet filtering, 65-8
- improving network performance, 65-5-65-7
- intranet operating system, 65-7-65-8
- intranet server management, 65-9-65-11
- IP administration, 65-10
- managing bandwidth, 65-10
- policy-based solution, 65-11
- Java-enabled browsers, 65-3-65-4
- ActiveX and Java, 65-4
- applets, 65-3
- scripting languages, 65-4
- traditional client/server, 65-2-65-3
- Intrasubscriber, 32-7
- Inventory, global, 78-9
- Inverse multiplexing, 20-1-20-8
- for ATM, 20-2-20-4
- ATMs position in marketplace, 20-1-20-2
- NxT1 ATM inverse multiplexing, 20-4-20-8
- alternatives to adding new UNI, 20-5-20-6
- compatibility and cost savings, 20-7-20-8
- support for non-ATM and multimedia traffic, 20-6-20-7
- Investment banking, 12-11
- I/O Manager, 25-5-25-6
- IP, see Internet protocol
- IPC, see Interprocess communication
- IPX traffic, 63-1
- IS, see Information system
- ISD, see Information systems development
- ISDN, see Integrated switched digital network
- ISOC, see Internet Society
- Isolation, 46-12
- ISP, see Internet service provider
- ITU, see International Telecommunications Union
- J
- Java, 47-3
- applets, 72-4, 72-6
- technology, 50-8
- JPEG
- compression, 66-3
- images, 44-8
- Just-in-time training, 12-3
- K
- Kernel, operational, 49-10
- Key result areas (KRAs), 3-5, 3-6
- Kiosks, 56-3
- Knowledge on line (KOL), 6-9
- KOL, see Knowledge on line
- KRAs, see Key result areas
- L
- Labor, technical support cost of, 14-8
- LAN, see Local area network
- LAN, voice and video on, 19-1-19-9
- LAN technologies for integrated voice and video, 19-4-19-9
- asynchronous transfer mode, 19-4-19-5
- gateways and gatekeepers, 19-8-19-9
- hybrid ATM networks, 19-6-19-7
- shared and switched LANs, 19-5-19-6
- standards for LAN-based voice and video applications, 19-7-19-8
- value of voice and video on LAN, 19-2-19-4
- infrastructure efficiencies, 19-3-19-4
- new types of applications, 19-2-19-3
- Language(s)
- cross-platform, 72-1
- object-oriented, 6-7
- LAN infrastructures and applications, integrating, 62-1-62-17
- consolidating voice and data organizations, 62-15
- consolidation of cabling plant, 62-7-62-11
- hardware upgrades, 62-7-62-10
- software upgrades, 62-11
- migrating issues, 62-14
- migrating LAN infrastructure, 62-2-62-7
- controlling LAN backbone traffic, 62-4-62-7
- desktop switching, 62-3
- minimized routing, 62-3-62-4
- solutions for delay-sensitive applications, 62-2-62-3
- migrating PBX, 62-11-62-14
- legacy telephony, 62-11
- linking distributed PBX compounds, 62-11-62-12
- server-based telephony, 62-12-62-14
- problems addressed, 62-1-62-2
- recommended course of action, 62-15-62-17
- LANs, operating standards and practices for, 71-1-71-8
- lessons from mainframe management, 71-3-71-4
- problems addressed, 71-1-71-2
- standards committees, 71-4-71-6
- why LANs require standards, 71-2
- writing operating and security standards document, 71-6-71-8
- network software security, 71-6-71-7
- physical and environmental security, 71-7
- technical support, 71-7-71-8
- LAN/WAN connections, remote, 64-1-64-20
- connectivity options, 64-5-64-6
- eliminating inappropriate connectivity technologies, 64-6
- physical connections, 64-5
- wireless connections, 64-5-64-6
- defining business objective, 64-4-64-5
- defining existing resources, 64-4
- defining options, 64-3-64-4
- establishing baseline, 64-3
- fiber optics, 64-6-64-9
- advantages, 64-8
- disadvantages, 64-8-64-9
- fiber optic cabling, 64-7-64-8
- fiber optic data transmission, 64-7
- final analysis, 64-17-64-18
- cost comparisons, 64-17-64-18
- weighing factors, 64-17
- implementation and installation planning, 64-19-64-20
- infrared, 64-12-64-17
- advantages, 64-16
- conditions affecting effectiveness, 64-13-64-15
- cost, 64-16-64-17
- licensing requirements, 64-16
- microwave, 64-10-64-12
- advantages, 64-10-64-11
- costs, 64-12
- disadvantages, 64-12
- licensing requirements, 64-10
- recommendations, 64-18-64-19
- decision on fiber optics, 64-19
- decision on infrared technology, 64-19
- decision on microwave technology, 64-18-64-19
- Laptop computers, 32-2
- Latency, 12-5
- Law enforcement agencies, 54-1
- Lawyer liability, 40-10
- LEC, see Local exchange carrier
- Legacy
- applications, CSGs, 50-7
- data, 13-5
- mainframe systems, 69-1
- networks, 23-7
- systems, high-bandwidth links to, 26-12
- Legal protection, 10-1
- LEO systems, see Low earth orbital systems
- Link
- analyzers, 42-9
- detection, automatic, 26-5
- medium operation, 27-9
- status control, 27-10
- Linkage
- components, 9-4
- programs, building, 13-7
- Litigation, 40-7
- LLC, see Logical link control
- LMI, see Local management interface
- Local address books, 35-8
- Local area network (LAN), 6-4, 34-1
- access, remote, 55-6
- administrator, 5-4, 14-5, 66-1, 8-23
- applications, 6-1
- backbone technology, 62-5
- bandwidth constraints, 44-6
- bridges, wireless, 54-10
- communications requirements, 27-11
- comparison of ATMs and, 23-7
- connectivity, 11-10
- corporate, 34-7
- desktop, 12-8
- emulation, 23-6
- environment, 60-9
- Ethernet bus-based, 44-1
- high-speed backbone in, 29-1
- interconnection, high-speed, 17-1
- inventory, 9-5
- module, 8-2
- network adapter cards, 27-10
- protocols, 31-7
- recovery options for, 8-9
- server, 35-3
- standards, IEEE, 27-6
- switching, 19-5, 63-2
- technologies, 19-4, 23-1
- Token Ring, 32-3
- traffic, 23-6
- usefulness of, 30-1
- wireless, 54-8, 57-1
- Local exchange carrier (LEC), 38-3, 67-6
- Local management interface (LMI), 17-6
- Logical link control (LLC), 5-6, 34-5
- Long distance services, 33-10
- Long-run incremental cost (LRIC), 11-7
- Lossless compression method, 66-9
- Low earth orbital (LEO) systems, 54-3, 54-7
- LRIC, see Long-run incremental cost
- Lycos, 44-5
- M
- MAC, see Media access control
- Macintosh
- desktops, integrating, 2-8
- workstation, 4-2
- Mail
- reader programs, 49-4
- software, 42-7
- user agents (LUAs), 31-2
- Mailboxes, 53-11
- Mainframes, 2-9
- Malicious code, 58-4
- Management
- capabilities, standard, 21-9
- information base (MIB), 5-2, 31-8
- technology, 61-3
- tools, 31-1, 41-1, 41-2
- Marine agencies, 54-1
- Marketplace Insider, 50-6
- Matrix information, 5-9
- MCI Mail, 53-10
- MCPS, see Microsoft Certified Product Specialists
- MCPs, see Microsoft Certified Professionals
- MCSDs, see Microsoft Certified Solutions Developers
- MCSEs, see Microsoft Certified Systems Engineers
- MCTs, see Microsoft Certified Trainers
- MDI, see Media-dependent interface
- Media
- access control (MAC), 26-1
- -dependent interface (MDI), 26-3
- -independent interface (MII), 26-8
- storage, 12-9, 29-2
- Medical devices, 29-2
- Mesh topology, of Internet, 46-3
- Message(s)
- classes of, 29-5
- enabling, 36-9
- management, 31-9, 75-2
- notification, 35-7, 35-9
- replying to, 36-16
- routing, 36-13
- transfer agent (MTA), 37-14
- Messaging, 36-17, 37-21
- applications, 12-2
- infrastructure, 37-14
- pass-through, 36-14
- services, 36-4, 37-4
- integrated, 36-8
- NetWare, 36-6
- support organizations, 60-17
- system(s), 36-24
- agent-based, 55-4
- popular, 35-11
- rollout, 60-4
- trends in, 37-1, 37-2
- MIB, see Management information base
- Microphone applications, 81-4
- Micro platforms, 3-6
- Microprocessor, embedded, 36-3
- Microsoft Certified Product Specialists (MCPSs), 2-4
- Microsoft Certified Professionals (MCPs), 2-3
- Microsoft Certified Solutions Developers (MCSDs), 2-3
- Microsoft Certified Systems Engineers (MCSEs), 2-3
- Microsoft Certified Trainers (MCTs), 2-4
- Microsoft Exchange Server, introduction to, 37-1-37-21
- building business strategy around Microsoft Exchange Server, 37-18-37-20
- connecting multisystem environments, 37-18-37-19
- downsizing, 37-18
- upgrading current Microsoft Mail systems, 37-19-37-20
- easy and powerful centralized administration, 37-14-37-18
- client support, 37-17
- easy migration, 37-18
- easy-to-use graphical administration program, 37-14
- management of all components from single set, 37-17-37-18
- Microsoft Exchange Server components, 37-14-37-15
- reliable movement of information, 37-14
- single interface for global management, 37-15-37-17
- infrastructure for messaging and collaboration, 37-5-37-6
- fast, secure, and reliable, 37-5-37-6
- remote client access, 37-6
- scalable, 37-6
- tight integration with desktop application, 37-5
- Universal Inbox, 37-5
- Internet connectivity, 37-12-37-18
- direct connection over Internet for mobile users, 37-13
- integrated Internet support, 37-12
- outlook Web access, 37-13
- support for Internet newsgroups and discussion groups, 37-13
- redefining GroupWare, 37-6-37-12
- bulletin boards, 37-8
- easy-to-create groupware applications, 37-9-37-11
- group scheduling, 37-7
- messaging application programming interface, 37-11-37-12
- offline folder synchronization, 37-9
- Outlook forms, 37-8
- public folder replication, 37-8-37-9
- public folders, 37-7
- trends in messaging and collaboration, 37-2-37-5
- Microsoft Exchange product family, 37-4-37-5
- unifying LAN- and host-based E-mail, 37-2-37-4
- Microwave technology, 57-7, 64-6
- Middleware services, 12-11
- Migration
- strategies, 74-5
- tools, built-in, 37-18
- MII, see Media-independent interface
- MIME message, 31-4
- Minicomputer, UNIX-based, 43-5
- Mini platforms, 3-6
- Mission statement, 3-2, 3-4
- Misuse
- avoiding, 24-6
- detecting, 24-11
- Mobile computing, safe, 52-1-52-11
- backing up PDAs, 52-6-52-7
- computer viruses, 52-3
- determining organization risk, 52-2
- general backup, 52-4-52-6
- data recovery centers, 52-5
- external drives, 52-5
- tips for users, 52-5-52-6
- physical security, 52-7-52-8
- cellular phone safety, 52-8
- securing equipment and premises remotely, 52-8
- power protection, 52-2-52-3
- practices for safe computing, 52-8-52-11
- cataloging equipment, 52-9
- hardware and software setups, 52-9-52-10
- orientation session, 52-10
- security setups, 52-10
- tips for safe public use, 52-11
- tips for safe storage, 52-11
- tips for securing mobile office, 52-10
- security passwords, 52-3-52-4
- Mobile computing assets, protection of, 58-1-58-6
- determining value of information, 58-2-58-3
- keeping pace with change, 58-1-58-2
- protecting mobile office, 58-3-58-5
- computer theft, 58-3-58-4
- eavesdropping, 58-5
- malicious code, 58-4
- theft of information, 58-4
- setting security policy, 58-5-58-6
- Mobile user security, 59-1-59-16
- availability, 59-2-59-4
- physical considerations, 59-3-59-4
- scheduling considerations, 59-3
- telephone communications tools, 59-4
- confidentiality, 59-11-59-13
- mobile employee information security recommendations, 59-11
- software considerations, 59-11-59-13
- continuity, 59-4-59-6
- creating mobile backup, 59-5
- loss of computing resources, 59-5-59-6
- integrity, 59-6-59-11
- new technology considerations, 59-13-59-16
- Modem(s), 14-4
- ADSL, 22-3
- Bell System-compatible, 53-1
- data, 52-8
- features, 15-4
- fundamentals, 7-2
- higher-speed, 15-13
- incorporation of microprocessors in, 53-1
- modulation, 7-4
- price of CDPD, 56-16
- RF, 58-1
- system, CablePort cable, 7-7
- traffic, 15-11
- wireless, 15-8
- Modems, preparing for cable, 7-1-7-7
- cable modems, 7-3-7-7
- from unidirectional to bidirectional systems, 7-3-7-5
- high-speed cable modem architecture, 7-5-7-6
- Web, 7-6-7-7
- modem fundamentals, 7-2-7-3
- problems addressed, 7-1-7-2
- quadrature amplitude modulation technique, 7-3
- recommended course of action, 7-7
- Modem technologies and trends, new, 15-1-15-13
- evolution of packaging, 15-1-15-4
- CDPD modems, 15-2
- external modems, 15-2
- host signal processor modems, 15-3-15-4
- internal modems, 15-2
- multimedia extensions technology, 15-3
- other multiport modems, 15-3
- PCMCIA cards, 15-2
- modem features, 15-4-15-6
- data compression, 15-6
- diagnostics, 15-6
- error correction, 15-5-15-6
- modulation techniques, 15-4
- speed, 15-5
- role of digital signal processing, 15-10-15-12
- digital simultaneous voice and data, 15-11
- 56K-bps modems, 15-11-15-12
- security, 15-6-15-7
- transmission techniques, 15-7-15-10
- cable modems, 15-9-15-10
- multifrequency modems, 15-9
- multimedia modems, 15-9
- PC-to-PC or PC-to-mainframe, 15-7-15-8
- private wireless networks, 15-8
- wireless modems, 15-8
- Modulation techniques, 15-4
- Money
- damages, 40-9
- transactions, fraud-free, 24-8
- Monitoring tools, 37-17, 41-8
- MOSPF, see Multicast open shortest path first
- Motion detector, 52-7
- Moving Picture Experts Group, 12-6
- MPR, see MultiProtocol Router
- MRI scans, 18-1
- MTA, see Message transfer agent
- MUAs, see Mail user agents
- Multicast networking, 16-1-16-12
- applications, 16-10-16-11
- dataconferencing, 16-10
- dynamic groups, 16-10
- real-time distribution of multimedia information, 16-10-16-11
- comparing broadcast and multicast IP, 16-4-16-10
- class D addressing, 16-4-16-5
- IP multicast protocol, 16-4
- multicast routing protocols, 16-7-16-10
- sending report member overhear, 16-6
- starting report delay timer, 16-5-16-6
- multicast backbone, 16-6-16-7
- multicast LANs, 16-1-16-3
- multicast frame relay, 16-2
- multicast switched multimegabit data service, 16-3
- N-way multicast, 16-3
- one-way multicast, 16-2
- two-way multicast, 16-2
- vendor offerings, 16-11-16-12
- Multimedia
- applications, 27-2
- collaborations, 19-2
- information, real-time distribution of, 16-10
- signaling, 12-10
- technology, 23-12
- traffic, 20-6, 23-3
- Multimedia networking, business aspects of, 12-1-12-12
- applications of networked multimedia, 12-2-12-3
- barriers to multimedia networking, 12-9-12-10
- business drivers of multimedia applications, 12-2
- issues in multimedia planning, 12-10-12-11
- application/content awareness, 12-11
- integration, 12-10-12-11
- scalability, 12-10
- people-to-people applications, 12-4-12-5
- groupware, 12-5
- multimedia conferencing, 12-4
- types of multimedia conferencing systems, 12-4-12-5
- people-to-server applications, 12-3-12-4
- video-on-demand, 12-3
- WWW browsing, 12-3-12-4
- planning strategies, 12-11
- system considerations, 12-8-12-9
- technical requirements for networked multimedia applications, 12-5-12-8
- application parameters, 12-7
- bandwidth, 12-6
- determining service levels, 12-8
- guaranteeing quality of service, 12-6-12-7
- latency, 12-5-12-6
- network and device parameters, 12-8
- reliability, 12-6
- synchronization, 12-6
- system parameters, 12-7-12-8
- Multimedia networking technologies, 23-1-23-13
- asynchronous transfer mode, 23-4-23-8
- ATM architecture, 23-5-23-23-6
- LAN emulation, 23-6-23-8
- LAN technologies, 23-1-23-13
- 100Vg-AnyLAN, 23-3-23-4
- asynchronous Ethernet, 23-2
- fast Ethernet, 23-2-23-3
- FDDI, 23-4
- FDDI II, 23-4
- WAN technologies, 23-8-23-12
- fiber channel, 23-11
- frame relay, 23-8
- Internet protocol, 23-9
- NHRP, 23-10-23-11
- RSVP, 23-9-23-10
- suitability of WAN-based ATM, 23-11-23-12
- switched multimegabit data service, 23-11
- Multiplexing, 27-8
- Multiprocessor platform, 25-3
- MultiProtocol Router (MPR), 36-7
- Multitasking, 42-3
- Mutual partnering, 1-7
- N
- NASA, see National Aeronautic and Space Administration
- National Aeronautic and Space Administration (NASA), 39-2
- National Institute of Standards and Technology (NIST), 31-11
- National Security Agency, 10-13
- NDS, see NetWare directory services
- Netiquette, 45-7
- NetWare directory services (NDS), 36-5
- Network(s)
- accountability, 51-2
- adapter, 23-3
- administrator, 28-7, 49-4
- applications, 41-4
- architecture, 56-5
- assets, 24-1
- availability, 8-2
- backup, 80-9
- bottlenecks, 27-1
- cards, 49-11
- cellular, 54-11
- chargeback pricing, 9-9, 14-8
- circuit-switched, 46-4
- configurations, 63-7
- connections, 52-10
- corporate, 50-5, 65-1, 78-5
- costs, 9-8
- data rates, 61-1
- decoupling, 78-3
- devices, 77-1
- domains, host-linked, 9-8
- drivers, 25-6
- environment, securing, 4-3
- expense assignment matrix, 9-7
- failure, 33-8
- File System (NFS), 2-9
- global, 36-2
- ideal virtual, 51-3
- interface cards (NICs), 20-5, 68-4
- management, 8-9, 23-6, 31-9
- database, 33-5
- developing, 21-11
- platforms, 51-11
- software, 51-3
- tools, 41-8
- managers, 8-23, 25-8
- corporate, 11-1
- WAN usage for, 51-9
- member, 45-2
- operator, 45-4
- organizations private, 34-6
- planning, 5-1
- predictability, 34-5, 34-9
- proprietary, 63-12
- protection capability, 8-6
- protocol
- address, 51-7
- spoofing, 49-12
- public, 45-5
- radio, 15-8
- reliability, 8-1, 33-9, 51-2
- remotely monitored, 5-7
- resources, 28-2
- router port requirements, 34-4
- security, 34-9
- separation, 49-11
- shared-access, 51-6
- SMTP-based, 31-10
- snooping, 47-2
- statistics, 76-7
- support personnel, 26-1
- time protocol, 46-6
- topology, 67-8
- traffic, 23-5
- utilization, 5-9, 44-7
- voice, 33-10, 62-1
- wireless, 14-3
- Network access, portable, 53-1-53-14
- modem terms, 53-1-53-5
- command set recognition, 53-5
- data compression, 53-4-53-5
- error detection and correction, 53-2-53-3
- network access, 53-5-53-14
- British Telecom, 53-6
- commercial dialing from hotels and pay phones, 53-6-53-7
- CompuServe information service, 53-7-53-8
- CompuServe quick access reference, 53-8
- Dow Jones news/retrieval, 53-8-53-10
- FTS2000 offnet calling, 53-10
- MCI Mail, 53-10-53-13
- U.S. Sprint SprintNet, 53-13-53-14
- Network baselining, as planning tool, 5-1-5-9
- EtherVision, 5-2-5-5
- foundation manager, 5-5-5-9
- NEWT, 5-2
- SimpleView, 5-2
- Network Reliability and Interoperability Committee (NRIC), 38-5
- Network security, applets and, 72-1-72-8
- Activex, 72-5-72-7
- downside of ActiveX, 72-7
- using Authenticode for accountability, 72-6-72-7
- applets and Web, 72-2-72-3
- risks, 72-2-72-3
- security issue, 72-2
- Java, 72-3-72-5
- Javascript, 72-5
- ounce of prevention, 72-7-72-8
- basics, 72-7
- Web browsers, 72-7-72-8
- Networking
- channel, 29-3
- mission critical, 48-4
- software, 41-3
- standard, established, 41-1
- support, 41-5
- News software, 42-6
- NEWT, 5-2
- NFS, see Network File System
- NICs, see Network interface cards
- NIST, see National Institute of Standards and Technology
- Nodes addresses, 32-8
- Noise funneling, 21-5
- Nonemployees, screening, 24-4
- Nonrepudiation, 10-1, 59-8
- Notebook(s)
- backing up of, 52-6
- cases, 52-7
- computers, 15-2
- configuration integrity, 59-7
- connectivity, 59-2, 59-4
- lost or stolen, 59-6
- Novell GroupWare, 36-18
- Novell messaging products, 36-1
- defining future of networking, 36-2-36-3
- GroupWise, 36-7-36-17
- GroupWise administration, 36-14-36-15
- GroupWise 4.1 electronic messaging architecture, 36-10-36-11
- GroupWise gateways, 36-13-36-14
- GroupWise 4.1 message server, 36-11-36-13
- GroupWise positioning, 36-8
- GroupWise telephony access server, 36-15-36-17
- integrated messaging services, 36-8-36-10
- GroupWise 5, 36-17-36-23
- business solutions, 36-19-36-20
- empowering people to act on information, 36-17-36-18
- GroupWare 5 desktop, 36-20-36-23
- solutions to problem, 36-18-36-19
- message handling services, 36-3-36-7
- global message handling services, 36-3-36-6
- MHS services for NetWare 4.1, 36-6-36-7
- NRIC, see Network Reliability and Interoperability Committee
- NRZ encoding, 27-9
- NT deployment, 2-14
- O
- Object
- groups, 77-4
- -oriented architectures, 50-6
- Off-net services, 33-6
- OME, see Open messaging environment
- Online
- discussions, 36-21
- services, 35-2
- ONP, see Open network provision
- Open connectivity, 41-2
- Open messaging environment (OME), 36-8
- Open network provision (ONP), 38-7
- Open shortest path first (OSPF), 8-22
- Open systems integration, 70-1-70-14
- issues in, 70-2-70-5
- accuracy, 70-3
- alignment to business objectives, 70-2-70-3
- communications, 70-3
- ergonomics, 70-4
- legacy systems, 70-4-70-5
- resource contention, 70-3
- user specifications, 70-2
- problems addresses, 70-1-70-2
- recommended course of action, 70-14
- rules of integration, 70-6-70-13
- creating development team, 70-6-70-7
- gathering detailed specifications, 70-8
- making users part of team, 70-7-70-8
- organizing specifications, 70-8-70-10
- understanding application, 70-6
- understanding critical components of integrated systems, 70-10-70-13
- understanding technology, 70-6
- Optical disc, 52-5
- Options header, 32-8
- OSPF, see Open shortest path first
- Outlook forms, 37-8
- P
- Packet
- filtering router, 34-6
- switching, 51-4, 51-5
- Packetization, 56-2
- Password(s), 45-10, 48-2, 58-5
- changing, 71-3
- one-time, 47-4
- programs, 52-3, 52-4
- protection, 45-9
- Payload length, 32-4
- PBX, see Private branch exchange
- PC, see Personal computer
- PCMCIA cards, 4-6
- PCS, see Physical coding sublayer
- PDAs, see Personal digital assistants
- PDD, see Post dialing delay
- PEM, see Privacy Enhanced Mail
- Performance
- management, 21-7
- monitoring, 8-9, 38-6
- Peripherals, testing, 2-8
- Personal computer (PC), 7-1
- use, growth in, 37-3
- workstation, 4-2
- Personal digital assistants (PDAs), 52-1
- Personnel information, 13-6
- Phone network, 11-2
- Physical coding sublayer (PCS), 26-26-3
- Pilot rollout, managing, 2-12
- PIM, see Protocol independent multicast
- Pings, 17-9
- Pipeline(s)
- assured, 49-7
- management, 55-9
- PKI, see Public Key Infrastructure
- Planning, strategic, 3-1-3-9
- analyzing current situation, 3-2
- determining departments future, 3-4
- determining departments identity, 3-2-3-4
- doing it, 3-7-3-8
- looking forward, 3-1
- mission statement, 3-4-3-5
- planning document, 3-5-3-7
- action checklist, 3-8-3-9
- goals, 3-6
- key result areas, 3-5-3-6
- objectives, 3-6-3-7
- too busy, 3-1-3-2
- Platform
- architecture, 60-12
- independence, 6-7
- PMD sublayer, 27-9
- Polarization, 1-8
- Post dialing delay (PDD), 33-9
- Postmark authority, 10-7
- Power protection, 52-2
- Pricing methods, across linked networks, 9-1-9-9
- chargeable resources, 9-2-9-3
- expense categories, 9-6
- network resource categories, 9-3-9-6
- cable, 9-3-9-4
- communications, 9-5-9-6
- linkages, 9-4
- storage, 9-4-9-5
- workstations, 9-4
- problems addressed, 9-1-9-2
- rate determination, 9-6-9-9
- recommended course of action, 9-9
- Primestar satellite direct television, 11-3
- Printer(s), 2-8
- connectivity, 61-5
- personal, 9-4, 14-4
- portable, 52-1
- Privacy Enhanced Mail (PEM), 10-11, 31-6
- Privacy policy, 60-16
- Private branch exchange (PBX), 54-2
- Private network functionality, 33-2
- Process
- equipment, 29-2
- manager, 25-3
- Processor
- architecture, 42-2
- development trends, 28-4
- object, 76-9
- speeds, 28-4
- Prodigy, 9-6
- Product
- development, 82-8
- liability, 40-5, 40-9
- longevity, 61-4
- promotion, 13-4
- Programming skills, 82-4
- Project
- planning software, 23-13
- team goals, 1-10
- Protocol
- independent multicast (PIM), 16-9
- stacks, 49-11, 76-3
- technicians lack of, 17-10
- Prototype environment, 70-13
- Provider identifier, 32-7
- Proxy
- firewalls, 48-6
- service capability, 34-8
- software, 42-7
- Public folders, 37-7
- Public key certificates, 10-2
- Public Key Infrastructure (PKI), 10-12
- Publishing
- distributed, 16-11
- tools, 13-2
- Purchasing applications, 6-3
- Q
- QAM, see Quadrature amplitude modulation
- QOS, see Quality-of-service
- Quadrature amplitude modulation (QAM), 7-3, 15-10
- Quality-of-service (QOS), 32-10
- QuickMail, 35-13
- R
- Radio
- frequency (RF) modems, 58-1
- network, 15-8
- signals, 56-7
- RAID, see Redundant arrays of inexpensive disks
- RAM, 25-4
- Rate determination, 14-7
- Real-time
- audio, VI-1
- collaboration, enhanced, 50-3
- sensors, 29-2
- Real Time Protocol (RTP), 19-7
- Reconfiguration, 8-10
- Redirect procedure, 56-15
- Redundancy application, 61-7
- Redundant arrays of inexpensive disks (RAID), 8-14, 8-17
- Reengineering, 82-3
- References object, 42-10
- Registration, 10-3
- Remote client access, 37-6
- Remote Monitoring (RMON), 5-2
- Remote procedure calls (RPCs), 37-15
- Report delay timer, 16-5
- Repudiation, 50-4
- Request for comment (RFC), 35-10
- Request for information (RFI), 11-9
- Request for proposal (RFP), 11-9
- Research laboratories, 48-7
- Residual ratemaking, 11-6
- Resource planning software, 23-13
- Return
- paths, 21-3
- receipts, 10-8
- RFC, see Request for comment
- RFI, see Request for information
- RFP, see Request for proposal
- Ring topology, 8-2
- RIP, see Routing information protocol
- Risk assessment, 8-24
- RMON, see Remote Monitoring
- Rollout planning, 81-14
- Root hub, 27-4
- Round-robin scanning, 27-6
- Router(s), 51-1, 51-5, 56-5
- addresses, 32-8
- filters implemented by using, 46-14
- interfaces, 32-13
- vendor, 61-9
- Routing
- header, 32-9
- information protocol (RIP), 8-22
- options, 32-9
- protocols, 32-14
- RPCs, see Remote procedure calls
- RTP, see Real Time Protocol
- S
- Sales tracking, 37-19
- Satellite data transmission, 16-1
- Scalability, 50-5
- Scheduling agent, 80-5
- Screening groups, 33-2
- SCSI drives, see Small computer system interface drives
- SDSL, see Single-line digital subscriber lines
- Secure protocols, 46-6
- Secure socket layer (SSL), 50-4
- Secure Telnet, 46-17
- Security, 6-6
- administration, 57-10
- breach, 24-13
- configuration, 49-6
- content, 10-1
- evaluations, 47-9
- functions, 24-3
- holes, patching, 4-4
- maintenance, 47-8
- management, 21-7
- personnel, 4-7
- requirements, 47-6
- threats, 47-7
- vulnerabilities, 49-13
- Security, basics of computer system and data network, 24-1-24-13
- avoidance, 24-2-24-7
- avoiding damage, 24-7
- avoiding misuse, 24-6-24-7
- avoiding unauthorized access, 24-4
- distributed environments, 24-5-24-6
- maintaining low profile, 24-5
- screening nonemployees, 24-4-24-5
- basic security functions, 24-2
- correction, 24-13
- detection, 24-10-24-12
- detecting damage, 24-11-24-12
- detecting misuse, 24-11
- detecting unauthorized access, 24-10
- deterrence, 24-7-24-8
- deterring misuse and damage, 24-7-24-8
- deterring unauthorized access, 24-7
- prevention, 24-8-24-10
- preventing misuse and damage, 24-9-24-10
- preventing unauthorized access, 24-8-24-9
- problems addressed, 24-1-24-2
- recommended course of action, 24-13
- recovery, 24-12-24-13
- recovery from misuse and damage, 24-12-24-13
- recovery from unauthorized access, 24-12
- security violations, 24-2
- Security model, for networks and Internet, 49-1-49-14
- security basics, 49-2-49-4
- compromising integrity of information, 49-2
- denial of service, 49-2
- disclosure of information, 49-2-49-3
- information bucket, 49-3-49-4
- Sidewinder 2.0 challenge, 49-14
- Sidewinder implementation of type enforcement, 49-8-49-14
- controlled system calls, 49-10-49-11
- network separation, 49-11-49-12
- protecting Internet servers, 49-13-49-14
- two kernels, 49-10
- type enforcement, 49-4-49-8
- assured pipelines, 49-7-49-8
- subsystem separation, 49-6-49-7
- Segmentation, 63-10
- Self-feedback, 3-3
- Self-rescue, 82-6
- Sendmail domain, 49-14
- Server(s), 47-5
- authentication, 42-6
- characteristics, 8-11
- global collection of, 42-1
- Intel-based, 2-11
- LAN-attached, 30-1
- mirrored, 8-13
- multiprocessor, 8-11
- software, 43-6
- technology, fiber channel as, 28-5
- telnet, 46-7
- types of, 8-11
- unmirrored, 8-13
- upgrade, 68-10
- WWW, 46-11
- Service
- availability, 57-5, 57-7
- outages, potential, 33-5
- provider, 23-10
- Shielded twisted pair (STP) cables, 26-2
- Sidewinder firewall system, 49-1
- Signal conversion systems, 21-10
- Signature
- files, 35-7
- scanners, 73-8
- Silicon Graphics (SGI), 6-9
- Simple mail transfer protocol (SMTP), 31-2
- Simple network management protocol (SNMP), 8-20, 15-10
- Single-line digital subscriber lines (SDSL), 22-1
- Site mirroring, 42-4
- Skill sets, 60-3, 69-3
- Small computer system interface (SCSI) drives, 52-5
- Smart cards, 59-13
- SMDS, see Switched multimegabit data service
- SMR, see Specialized mobile radio
- SMS, see System Management Server
- SMTP, see Simple mail transfer protocol
- SMTP, X.400 vs., 31-1-31-11
- electronic mail, 31-2-31-3
- industrial-strength messaging requirements, 31-5-31-11
- commercial use, 31-10-31-11
- critical comparison factors, 31-6
- EMA requirements for messaging management, 31-8-31-9
- functionality, 31-6
- human resources requirements and support costs, 31-9-31-10
- industry standards for E-mail management, 31-7-31-8
- managing messaging systems, 31-7
- message management, 31-9
- performance, 31-10
- security, 31-7
- systems management, 31-7
- SMTP background, 31-2
- SMTP/MIME characteristics, 31-4
- SMTP vs. X.400 debate, 31-3-31-4
- X,400 background, 31-11-31-12
- X.400 characteristics, 31-4-31-5
- X.400 and SMTP/MIME development process, 31-3
- SNMP, see Simple network management protocol
- Society goodness, theories of, 40-9
- Software
- agents, 79-5
- applications, 2-12
- browser, 42-1
- buffer, 4-5
- checks, 24-11
- communications, 42-5
- considerations, 59-11
- costs, 4-2
- development consultants, 36-1
- distribution, 55-6
- evaluating and testing, 2-6
- failure, 8-12
- features of switching, 51-7
- file-server, 14-4, 36-1
- firewall, 42-8
- free, 41-1
- high-value, 41-6
- interfaces, 62-2
- licenses, 80-7
- mail, 42-7
- networking, 41-5
- news, 42-6
- proprietary, 63-5
- proxy, 42-7
- purchasing, 14-2
- security, 52-10
- server, 43-6
- upgrades, 61-1, 62-11
- Web server,
- SONET structure, 23-5
- Sound boards, 15-1
- Source
- address, 32-5, 43-3
- code, writing, 69-6
- Spare parts pooling, 8-21
- Specialized mobile radio (SMR), 54-5
- Speech recognition system, 81-11
- Spreadsheet support person, 3-3
- SQL database server, see Structured query language database server
- SSL, see Secure socket layer
- Standalone connection, 4-3
- Standard configurations, testing, 2-12
- Star topology, 8-1
- Station management interface, 26-8
- Statistical multiplexing, 17-2
- Status monitoring systems, 21-8
- Storage
- array, 29-7
- off-site, 8-20
- STP cables, see Shielded twisted pair cables
- Strategic planning, 3-7
- Structured query language (SQL) database server, 25-1
- Subnets, 47-5, 47-7
- Support plan, 2-13
- Supreme Court, 45-3
- Switch-capacity planning, 5-1
- Switched fabric topology, 29-6
- Switched multimegabit data service (SMDS), 23-11
- Synchronization traffic, 36-5
- System(s)
- administrator, 59-8
- availability management, 8-9
- housekeeping, 6-6
- inventory, 2-14
- Management Server (SMS), 2-10
- management, cost-effective, 50-9
- pressure, 60-7
- printer, 9-1, 14-1
- System developers, improving communication between end users and, 1-1-1-11
- classification of user and developer relations, 1-6-1-8
- dictatorship, 1-7-1-8
- mutual partnering, 1-7
- polarization, 1-8
- student and teacher, 1-6-1-7
- cooperation, communication, and mutual understanding, 1-3-1-6
- balance of influence, 1-4
- reconciling goals between user and developer, 1-4-1-6
- structuring user-developer relationship, 1-8-1-11
- assessment, 1-8-1-9
- monitoring, 1-10-1-11
- structuring, 1-9-1-10
- user involvement and common wisdom, 1-2-1-3
- T
- Tape drive units, 9-1, 14-1
- Tariffs, 67-10
- TAS, see Telephony Access Server
- Task
- assignments, 36-10, 36-11
- groups, 38-5
- management, 36-21
- TCP/IP, hidden costs of, 41-1-41-10
- difference in using kernel applications, 41-6-41-7
- elimination of compromises of TCP/IP in AS/400 environments, 41-8-41-10
- kernel applications, 41-6
- matching requirements to needs, 41-8
- selecting free TCP/IP protocol suites, 41-2-41-6
- cost of network management, 41-5
- cost of support, 41-4-41-5
- cost of using stack lacking robust networking architecture, 41-3-41-4
- costs of using stack not designed for complex environments, 41-3
- cost of waiting for updates, 41-5-41-6
- specific kernel issues, 41-7-41-8
- TCP/IP network management, 61-1-61-10
- HPOV-ARS integration, 61-7-61-10
- customized scripts, 61-8
- frontier NETScout, 61-8
- operations work-flow model, 61-9-61-10
- physical configuration application, 61-8
- redundancy application, 61-7-61-8
- HPOV implementation, 61-5-61-7
- SAS reporting software, 61-6
- trouble-ticketing software, 61-6-61-7
- mission-critical and fault-tolerant requirements, 61-2
- system deployment and sustaining engineering, 61-10
- network management system implementation strategy, 61-2-61-5
- enterprise network management system, 61-4-61-5
- NMS middleware, 61-4
- SNMP-based management platform, 61-5
- SNMP platform-evaluation criteria, 61-3-61-4
- TDI, see Transport driver interface
- TDM, see Time division multiplexing
- Telecommunications
- management network (TMN), 21-6
- reform, 21-1
- Telecommunications policy process, overview of, 11-1-11-10
- beginning of competition, 11-2
- competitive local exchange carriers, 11-3
- entertainment companies in telephone business, 11-3
- foreign entrants, 11-4
- long-distance competition, 11-2-11-3
- results of Telecommunications Reform Act of 1996, 11-3
- telephone companies in entertainment business, 11-3
- creation of telecommunications policy, 11-4
- drafting custom tariff or agreement with carrier, 11-7-11-8
- influencing regulator body, 11-8-11-10
- converting feature packages business requirements to custom tariff, 11-9-11-10
- negotiating with carrier, 11-9
- negotiating price with customer, 11-8-11-9
- ratemaking, 11-5-11-7
- access charges, 11-6
- long-run incremental cost, 11-7
- residual ratemaking, 11-6
- value of service, 11-6
- Telecommunications Reform Act of 1996, II-1
- Telemarketers, 62-7
- Telephone
- line setup, 36-16
- network, public switched, 7-7
- power failure, 24-7
- Telephony
- applications, 81-4
- server-based, 62-12
- Telephony Access Server (TAS), 36-15
- Telex, 35-5, 35-10
- Telnet
- protocol type, 4-7
- server, 46-7
- Terminal
- services, 41-9
- settings, 53-13
- Test equipment, 17-9
- Testing, importance of, 17-7
- Text
- labels, 77-5
- linkages, 30-2
- Theft prevention, 59-2
- TIFF compression method, 66-7
- Time division multiplexing (TDM), 20-1, 22-2
- T1 line(s)
- connection, 34-2
- rerouting on, 8-6
- TMN, see Telecommunications management network
- Token Ring, 23-10
- Topology rules, 26-11
- Torts, 40-2, 40-4
- Traffic
- congestion, 59-1
- flow, management of, 26-12
- intensity values, 67-5
- lights, 56-3
- requirements, ongoing, 12-8
- Training
- benefits of, 17-11
- computer-based, 17-11
- costs, 6-4
- manuals, 82-10
- tools, 6-1
- Transfer protocols, 13-10
- Transmission
- asynchronous, 23-4
- capability, 7-5
- control protocol, 46-5
- downstream, 22-3
- facility, 17-8, 34-2
- protocols, 76-1
- radio frequency, 57-6
- rate, 22-7
- requirements, 18-5
- speeds, 59-14
- techniques, 15-7
- technology, 15-9
- types of, 57-6
- upstream, 22-3
- Transport driver interface (TDI) 25-6
- Transport technology, 20-7, 28-1
- Trend analysis, 61-10
- Trojan Horses, 46-10
- Tunneling, 32-13
- Type enforcement, 49-1, 49-4
- structure, 49-6
- tables, 49-8
- U
- UAs, see User agents
- UNI, see User-to-network interface
- Unicast address, 32-6
- Uninstall process, 2-12
- Uninterruptable power supply (UPS), 2-8, 8-19, 52-2
- Universal inbox, 37-5
- Universal resource locator (URL), 7-6
- UNIX
- machine, 4-8
- servers, 2-9
- traditional, 49-9
- workstations, 74-1
- Unsafe characters, 30-5, 30-6
- Unshielded twisted pair (UTP) cables, 26-2
- Upgrade
- costs, 68-5
- methodology, 68-6
- planning, 2-5
- Uplink port, 27-45
- UPS, see Uninterruptable power supply
- UPX, see Internetwork packet exchange
- URL, see Universal resource locator
- UseNet groups, 4-9
- USENET newsgroups, 48-4
- User
- agents (UAs), 31-5
- -developer relationship
- classification of, 1-6
- structuring, 1-8
- involvement, 1-6
- -to-network interface (UNI), 20-3
- support, 64-1
- 1996 U.S. Telecommunications Act, worldwide deregulation and, 38-1-38-8
- coordinating interconnectivity, 38-4-38-6
- Network Reliability and Interoperability Committee, 38-5
- task groups, 38-5-38-6
- deregulation and competition, 38-1
- problems with deregulation, 38-2
- 1996 U.S. Telecommunications Act, 38-2-38-4
- interconnection, 38-3
- unbundled access, 38-3-38-4
- worldwide deregulation activities, 38-6-38-7
- Europes open network provision, 38-7
- framework for action in U.K., 38-7
- Japans interconnection rules, 38-6
- UTP cables, see Unshielded twisted pair cables
- V
- Vail concept, Theodore, 11-1
- Value added network (VAN), 10-10
- VAN, see Value added network
- Variable bit rate (VBR), 67-3
- VBR, see Variable bit rate
- VDSL, see Very high data-rate digital subscriber line
- Vector data, 18-2
- Vending machines, 56-3
- Vendor(s), 82-3
- choosing and managing, 2-10
- specifications, 22-7
- Version management, 59-11
- Very high data-rate digital subscriber line (HDSL), 22-5
- Video
- analog, 21-9
- cards, 2-8
- conferencing, 50-10
- -on-demand, 12-11
- digital, 12-6
- files, 36-23
- full-motion, 12-1
- integration, value of voice and, 19-9
- learning materials, 19-3
- packets, 19-6, 19-7
- teleconferencing, 51-8
- traffic, high-fidelity, 32-11
- transmission, 19-5
- Videoconferencing, 12-11, 16-10
- Virtual machines, 25-3
- Virtual Memory Manager, 25-4
- Virtual networking management and planning, 51-1-51-11, see also Internet, as virtual network
- business case for virtual networking, 51-1-51-2
- network accountability, 51-2
- network reliability, 51-2
- features of switching software, 51-7-51-9
- accounting service, 51-9
- bandwidth service, 51-8
- broadcast service, 51-8-51-9
- connection management service, 51-8
- directory service, 51-7
- security service, 51-8
- virtual routing service, 51-9
- switching defined, 51-4-51-7
- connectionless packet switching, 51-5-51-6
- connection-oriented switches, 51-6-51-7
- technology case for virtual networking, 51-2-51-3
- virtual networking defined, 51-3-51-4
- virtual networks vs. virtual LANs, 51-10
- Virtual private networks (VPNs), overview of, 33-1-33-10
- access arrangements, 33-6
- data networking, 33-6-33-9
- high-speed data services, 33-7-33-8
- low-speed data services, 33-6-33-7
- performance objectives, 33-8-33-9
- local VPN service, 33-9-33-10
- making business case for VPNs, 33-2-33-4
- network management, 33-5
- VPN concept, 33-1-33-2
- Virtual reality, 12-2
- Virus(es), 58-4
- computer, 40-6, 52-3
- macro-based, 73-5
- prevention, 73-10
- protection, 59-7
- stealth, 73-4
- types of, 73-3
- Virus threats, assessing and eliminating, 73-1-73-11
- disclosing virus, 73-6
- problems addressed, 73-1-73-6
- common spread scenarios, 73-5-73-6
- how viruses infect systems, 73-3
- major types of viruses, 73-3-73-5
- pervasiveness of viral threat, 73-2-73-3
- recommended course of action, 73-10-73-11
- standard approaches to fighting viruses, 73-6-73-10
- behavior blocking, 73-7-73-8
- drawbacks of signature scanning, 73-8-73-10
- multilevel generic detection, 73-7
- signature-based scanner, 73-6
- TSR monitoring, 73-7
- Voice
- capture, 81-3
- communications, 62-3
- mailbox, 36-20
- modems, 52-8
- networks, 62-1
- transmission, 19-5
- Voice recognition interfaces, for multimedia applications, 81-1-81-15
- building voice recognition applications, 81-9-81-14
- development process, 81-10-81-14
- development team, 81-9-81-10
- current applications, 81-4-81-6
- microphone-input applications for PC, 81-4-81-5
- telephony applications, 81-5-81-6
- emerging applications, 81-6-81-7
- practical systems for widespread use, 81-2-81-4
- selecting ASR product, 81-7-81-8
- functions and features, 81-7-81-8
- performance characteristics, 81-8
- VPNs, see Virtual private networks
- W
- WAN, see Wide area network
- WAN network integration, 68-1-68-13
- challenges and benefits of implementation, 68-2-68-3
- business opportunity, 68-2
- technical benefits, 68-3
- company background, 68-1-68-2
- elements targeted for change, 68-4-68-5
- final integration, 68-11-68-12
- priorities, 68-3-68-4
- upgrade costs, 68-5-68-6
- upgrade modeling and refinement, 68-6-68-11
- glitches, 68-10-68-11
- process, 68-7-68-10
- WANs, technology conversions on, 74-1-74-6
- corporate involvement, 74-2-74-4
- auditing physical network, 74-3
- formatting online information about network, 74-3-74-4
- scheduling projects, 74-2-74-3
- fear of change, 74-2
- migration strategies, 74-5-74-6
- cables, 74-6
- leapfrog approach, 74-5
- site preparation, 74-6
- Warning signs, examples of, 1-10
- Web, see also World Wide Web
- address, 30-5
- applications, 6-3
- architecture, 6-5, 59-16
- -based information, 30-10
- browsers, 37-1, 60-2
- -capable applications, 13-9
- clients, 30-4
- data structure, 13-5
- environment, LAN-like interaction in, 6-6
- implementation, 42-2
- page(s), 7-6, 44-3
- adjustments, 44-7
- maintaining commercial, 4-3
- search, 44-5
- self-service, 6-2
- software components, 30-8
- technology, 13-1, 13-8
- transactions, II-1
- Web server connection rate, selecting, 44-1-44-8
- basics of connecting to Internet, 44-1-44-3
- analog vs. digital leased lines, 44-2
- connection constraints, 44-2
- WAN connectivity factors, 44-3
- LAN bandwidth constraints, 44-6-44-7
- making Web page adjustments, 44-7-44-8
- performing required computations, 44-3-44-6
- problems addressed, 44-1
- recommended course of action, 44-8
- Web site, supporting, 43-1-43-7
- application programming, 43-6-43-7
- communications, 43-1-43-3
- firewall option, 43-3-43-5
- hardware, 43-5
- operating system, 43-5-43-6
- recommended course of action, 43-7
- security issues, 43-3
- server software, 43-6
- software, 43-5
- Whiteboarding, 50-10
- Wide area network (WAN), 6-4, 8-4
- connectivity factors, 44-3
- operating rate, 44-2, 44-8
- ports, multiple, 8-22
- facilities, testing, 17-7
- WiLL, see Wireless local loop, 54-2
- Windows 95 applications, 2-7
- Windows NT architecture, 25-1-25-8
- architecture, 25-1-25-6
- hardware abstraction layer, 25-1-25-2
- kernel, 25-2-25-3
- local procedure call facility, 25-4
- NT Executive, 25-3
- object manager, 25-3
- process manager, 25-3-25-4
- security module, 25-6
- virtual memory manager, 25-4
- upgrade issues, 25-7-25-8
- Windows NT networking, 25-6-25-7
- Windows NT performance monitoring, 76-1-76-10
- observing network performance, 76-5-76-9
- considering processor, 76-7-76-8
- working with alerts, 76-8-76-9
- recommended course of action, 76-10
- utilization, 76-2-76-4
- Windows NT project planning, 2-1-2-14
- choosing and managing vendors, 2-10-2-12
- testing standard configurations, 2-12
- vendors with strategic Microsoft relationships, 2-11-2-12
- establishing business and technical goals for NT deployment, 2-1-2-4
- building migration team, 2-2-2-3
- business goals, 2-1
- gathering information resources, 2-4
- IT qualifications needed for deployment team, 2-3-2-4
- technical goals, 2-1
- evaluating installed base, 2-4-2-10
- DOS applications, 2-7
- evaluating and testing software, 2-6
- identifying, evaluating and testing peripherals, 2-8
- integrating Macintosh desktops, 2-8-2-9
- mainframes/hosts, 2-9-2-10
- planning issues to handle concurrently with evaluation and testing, 2-10
- planning new workstations, 2-5
- UNIX servers and workstations, 2-9
- upgrade planning for existing workstations, 2-5-2-6
- upgrading custom applications, 2-7-2-8
- Win 16 applications, 2-7
- Windows 95 applications, 2-7
- planning and managing pilot rollout, 2-12-2-13
- preparing for full-scale deployment, 2-13-2-14
- Windows Sockets API Tester (WSAT), 41-4
- Wireless communications, developing cost-effective strategy for, 55-1-55-13
- choosing architecture and access method, 55-4-55-6
- agent-based messaging systems, 55-6
- continuous-connection architectures, 55-5
- E-mail based systems, 55-5-55-6
- choosing wireless applications, 55-7-55-9
- mobile enterprise application, 55-9
- remote access and file synchronization utilities, 55-8
- single transaction based applications, 55-8
- wireless E-mail and fax systems, 55-7
- choosing wireless products, 55-9-55-13
- using middleware APIs and developer kits, 55-12
- systems for communications management, 55-12-55-13
- wireless network technologies and service providers, 55-2-55-4
- circuit-switched networks, 55-2-55-3
- packet data networks, 55-3-55-4
- Wireless communications, for voice and data, 54-1-54-11
- outlook for wireless applications, 54-10
- wireless communication as alternative to fixed media, 54-9
- wireless cost advantage, 54-9
- vendor support for wireless solutions, 54-9-54-10
- wireless considerations for data communications strategy, 54-4-54-8
- CDPD as wireless option, 54-4-54-5
- commercial mobile data communications services, 54-6
- satellite data, 54-7-54-8
- specialized mobile radio, 54-5-54-6
- wireless LANs, 54-8-54-9
- wireless techniques, 54-2-54-4
- cellular voice, 54-2
- satellite voice services, 54-3-54-4
- wireless PBX systems, 54-2-54-3
- wireless radio, 54-2
- Wireless local area networks, security of, 57-1-57-10
- configuration, 57-3
- industry applications, 57-3-57-4
- interoperability, 57-2
- overview of costs and benefits, 57-2
- performance, 57-2-57-3
- security concerns, 57-4-57-8
- audit mechanisms, 57-9-57-10
- circuit availability, 57-8
- equipment availability, 57-8
- physical configuration, 57-5
- service availability, 57-7-57-8
- types of transmission, 57-6-57-7
- signal availability, 57-8
- wireless network controls, 57-8-57-10
- Wireless local loop (WiLL), 54-2
- Word processing, 13-3
- Wordspotting systems, 81-7
- Workgroup switches, 63-3, 63-8
- Working group mailing list, 39-8
- Workplace 2000, 82-1-82-13
- accepting idea of self-rescue, 82-6-82-9
- adopting Nike model of learning, 82-9-82-10
- common thread, 82-1-82-2
- providing added value, 82-2-82-6
- broadening perspectives, 82-3
- expanding skill set, 82-3-82-4
- finding out how people define value, 82-2-82-3
- proving managers value, 82-4-82-6
- reassessing personal goals and abilities, 82-10-82-12
- World Wide Web (WWW), 4-1, 13-10, 39-5, 79-1
- browsing, 12-3
- connecting to, 4-2
- documents, hyperlinks in, 30-3
- home pages, 7-1
- protocols, 50-1
- security, 30-11
- World Wide Web, linking to, 30-1-30-12
- embedding Web technology in other products, 30-11-30-12
- finding information of Web, 30-5-30-7
- reading Web address, 30-5
- unsafe characters, 30-5-30-6
- URL path structure, 30-6-30-7
- how HTTP enables information sharing, 30-3-30-4
- close, 30-3-30-4
- connection, 30-3
- request and response, 30-3
- hyperlinks, 30-1-30-3
- hypertest markup language, 30-7-30-8
- security of Web, 30-11
- Web software components, 30-8-30-11
- client software, 30-8-30-9
- gateways, 30-10
- HTML tools, 30-10-30-11
- servers, 30-9
- viewers, 30-9
- window to world, 30-1
- Worm, 40-6
- Wrappers, 46-13
- WSAT, see Windows Sockets API Tester
- WWW, see World Wide Web