Previous Table of Contents Next


Index

A
Access
control, 24-13, 50-4
methods, 33-3
points, 54-9
units (AUs), 31-5
Accounting management, 21-7
ACCUNET Spectrum of Digital Services (ASDS), 8-5
Action checklist, 3-8
Address
prefix allocation, 32-6
spoofing, 46-10
Addressing options, 53-13
Administration management, 75-4
ADSL, see Asymmetrical digital subscriber line
Alta Vista, 44-5
America Online, 9-6
American National Standards Institute (ANSI), 22-2
American Power Conversion (APC), 52-2
Ankle biters, 48-3
ANSI, see American National Standards Institute
Anticompetitive practices, 38-2
Antivirus programs, 52-4
Anycast, 32-2
APC, see American Power Conversion
API, see Application programming interface
Applets
downloading, 72-6
secure, 72-3
Application(s)
appropriateness, 55-1
development, 50-8, 70-1
firewalls, 48-6
management, central, 37-10
parameters, 12-7
partitioning, 6-8
platform, Web as, 6-3
programming interface (API), 12-9, 55-9
-specific integrated circuit (ASIC), 15-3
Architecture, tree and branch, 21-2
ASDS, see ACCUNET Spectrum of Digital Services
ASIC, see Application-specific integrated circuit
Asymmetrical digital subscriber line (ADSL), 22-1
Asynchronous transfer mode (ATM), 12-10, 19-4
adaptation layer, 23-5
backbone equipment, 20-8
connectivity, 22-6
inverse multiplexing, 20-5
migration strategy, 23-8
networks, hybrid, 19-6
prices, 20-2
switching, 51-6
technology, 23-11
traffic, 20-7
ATM, see Asynchronous transfer mode
Attachment unit interface (AUI), 26-2
Audit
mechanisms, 57-9
trails, 31-7
AUI, see Attachment unit interface
AUs, see Access units
Authentication authority, 10-4
Authenticode, 72-7
Authorization codes, 33-4
Auto-Negotiation, 26-9
Automated teller machines, 56-3
Avoidance, 24-2
B
Backbone router, 56-7, 56-12, 56-14
Backup
capability, 59-10
medium, easiest, 59-5
procedures, 8-12
network, 64-3
services, 68-7
Bastions, 46-13
Bell Operating Companies (BOCs), 43-1
Big Three carriers, 33-1
Billing options, 33-4
Biphase shift key (BPSK), 7-4
Bipolar violation (BPV), 17-7, 17-8
BOCs, see Bell Operating Companies
Boundary routers, 32-13
BPSK, see Biphase shift key
BPV, see Bipolar variation
Bridges, 51-5
Broadcast transmission, 16-1
Browser(s)
application, 30-9
configuration, 72-5
Java-enabled, 65-3
software, 42-1
Budgets, zero-growth, 3-3
Bulletin boards, 37-6, 37-7, 37-8
Bus topology, 8-2
Business systems, integrated Web and enterprisewide, 13-1-13-10
building presence on Web, 13-8-13-9
challenges and strategy issues, 13-8
education and training, 13-10
expanding and enhancing pages, 13-9
integrating Web and enterprise systems, 13-6-13-8
building linkage programs, 13-7
converting to hypermedia pages, 13-6-13-7
intranets, 13-5-13-6
plan intranet applications, 13-9
prepare for electronic commerce, 13-9
Web and Web capabilities, 13-2-13-4
communication protocols and URLs, 13-3-13-4
publishing tools, 13-2-13-3
search engines, 13-4
Web clients, 13-2
Web servers, 13-2
Web limitations, 13-4-13-5
C
Cable
modems, 7-3
networks, 21-3
systems, 78-7
television (CATV), 7-1
Cabling, costs of, 9-3
CAD, see Computer-aided design
Calendaring, 36-9, 36-17
Call
blocking, 33-9
-progress monitoring, 15-6
screening, originator, 33-2
Callback systems, 24-9
Caller groups, 33-2
CAM, see Computer-aided manufacturing
Capacity handling, 17-10
Career counseling, 82-12
Carrier-to-noise ratio, 21-4
CA, see Certification authority
CAT, see Common Authentication Technology
CAT scans, 18-1
CATV, see Cable television
CCA, see Clear channel ATM
CCR, see Customer-controlled reconfiguration
CDMA, see Code division multiple access
CDPD, see Cellular digital packet data
Cell-in-Frame technique, 19-6
Cell switching, 51-4
Cellular network, 56-11
Cellular technology, 55-2, 57-4
Cellular telephone, 52-2, 52-10
Cellular digital packet data (CDPD), 15-2, 54-4, 56-1-56-14
applications for CDPD, 56-3
benefits to mobile users, 56-4-56-5
CDPD fundamentals, 56-2
channel hopping, 56-2
digital cellular radio technology, 56-2
packetization, 56-2
underlying technologies, 56-2
CDPD network backbone, 56-10-56-11
digital transmission technology, 56-2
emerging class of remote users, 56-3
equipment requirements, 56-5
information protection, 56-10
mass market for CDPD, 56-14-56-16
mobile network location protocol, 56-10
mobile network registration protocol, 56-10
mobility management, 56-9
network architecture and protocols, 56-5-56-9
mobile database systems, 56-7
mobile data-intermediate systems, 56-7
mobile-end systems, 56-7-56-9
packet switching, 56-2
sending data from mobile unit, 56-12-56-14
registration procedure, 56-12-56-14
sending data to mobile unit, 56-14
service pricing, 56-3-56-4
transparent operation, 56-11-56-12
Central office (CO), 22-1
CERT, 47-1
Certificate
authority (CA), 10-2, 10-3, 39-12
repository, 10-4, 10-6
revocation list (CRL), 10-6
CGI, see Common gateway interface
Channel hopping, 56-2
Checksum, 73-7
Chip coding, 29-3
Circuit availability, 57-8
Civil counsel, 40-12
Civil law, 40-2
Clear channel ATM (CCA), 20-4
CLECs, see Competitive local exchange carriers
Client
applications, 65-4
/server application, WWW as, 30-9
software, 30-8
support, 37-17
CO, see Central office
Coaxial cable, 14-3
Code division multiple access (CDMA), 55-3
Coding
system, 26-5, 26-6
technique, 22-6
Collision domain
half-duplex, 26-11
maximum, 26-10
Color depth, 18-4
Commercial dialing, 53-6
Commercial services, 35-2
Commissioner, negotiating price with, 11-8
Common Authentication Technology (CAT), 39-9
Common gateway interface (CGI), 6-6
Common messaging calls, 37-11
Communication(s)
carrier, 22-7
improvement in, 1-4
ineffective, 1-1
infrastructure, local, 19-3
lack of, 1-5
managers, 14-1, 14-2
private, 24-10
problems, 1-3, 1-9
protocols, 32-1
software, 42-5
technology
radio-based, 57-5
types of, 57-1
Communications networks, cost allocations for, 14-1-14-9
chargeable resources, 14-2-14-3
expense categories, 14-5-14-7
network resource categories, 14-3-14-5
Internet gateway access, 14-5
LAN administration support, 14-5
linkages, 14-3-14-4
storage, 14-4-14-5
rate determination, 14-7-14-8
Compartmentation, 46-12
Competitive local exchange carriers (CLECs), 11-3
Competitive process, 1-5
Compression method, lossless, 18-5
CompuServe, 9-6
Computer(s)
-aided design (CAD), 12-4
-aided manufacturing (CAM), 12-4
-based training, 35-4
Fraud and Abuse Act of 1986, 40-6
palmtop, 57-4
portable, 55-1
security, 48-1
theft, 58-3
virus, 40-6, 73-1
Computing resources, loss of, 59-5
Confidentiality, 59-11
Configuration
assessment component, 8-10
flexibility, 41-7, 57-1
limitations, 57-3
management, 8-9, 21-7, 23-13, 31-9
switching, 51-4
Congestion control, 17-6, 38-7
Congress, 11-8
Connection management service, 51-8
Connectivity expertise, 51-10
Consultant, working with, 69-1-69-7
establishing chain of command, 69-2-69-3
maximizing working relationship, 69-5-69-6
obtaining suitable skill set, 69-3-69-4
planning fort consultant arrival, 69-4-69-5
focusing project, 69-4-69-5
preparing workspace, 69-5
telling IT staff, 69-4
recommended course of action, 69-6-69-7
type of consultant needed by department, 69-1-69-2
Continuing education, 82-11
Contract law, 40-2, 40-3
Copyright laws, violation of, 4-10
Core competencies, 82-7
Corporate business needs, 3-1
Corporate counsel, 40-12
Corporate restructuring, 82-1
CRC, see Cyclic redundancy check
Credit card numbers, 33-4
Criminal activity, on Internet, 45-1-45-11
Electronic Communications Privacy Act of 1986, 45-4-45-5
flaming, 45-7-45-8
fraud, 45-6
free speech, 45-8-45-9
hackers and password detection, 45-9-45-10
history and scope, 45-2-45-3
libel, 45-5-45-6
privacy and e-mail, 45-3-45-4
problems addressed, 45-1
recommended course of action, 45-10
software piracy, 45-7
CRL, see Certificate revocation list
Cropping, 18-7
Cryptography, 40-7
Custom applications, upgrading, 2-7
Custom tariff, 11-7, 11-9
Customer
account tracking, 37-19
activities, 24-4
-controlled reconfiguration (CCR), 8-7
information queries, 13-6
records, 58-2
responsibility, 48-11
support, 13-4
Cyclic redundancy check (CRC), 15-5
D
Damage
detecting, 24-11
recovery from, 24-12
DASD, see Direct access storage device
Data
accuracy, 70-2
capture, 12-9
center, 4-10
floor space, 8-15
manager, 7-2, 41-11
network-linked, 14-2
circuit cards, 74-3
communications managers, 28-1
compression, 15-4, 15-6, 53-4, 53-5
convergence, voice and, 19-1
damage to, 24-12
Encryption Standard (DES), 15-7
files, restoration of, 68-8
integrity, VI-3
link connection identifier (DLCI), 17-4
Link Control (DLC), 25-7
loss, 8-1, 73-2
management, 77-1
modems, 52-8
network(s), 24-5
exposure, 24-6
managers, 24-1
paths, potential, 56-13
protection methods, 8-24
protection options, 8-24
reliability, 6-4
service, high speed, 21-8
storage, 18-2, 18-3, 44-4
striping, 8-18
system upgrades, 62-16
traffic, 33-8
transfers, 52-6
transmission rate, 26-7
types, 36-20
Database(s)
access to, 65-1
commercial, 45-2
connection, shared, 6-5
corporate, 56-16
design, 70-12
files, 15-6
location, 36-16
maintaining departmental, 69-6
manager, 80-11
multimedia applications involving, 23-1
replication, 55-4
RMTA, 75-6
server, 42-8, 43-7
SQL, 42-11
updates, 16-11
visual, 18-3
Dataconferencing, 16-10
Datagram, 32-3
Dataphone Digital Service (DDS), 8-5, 43-2
DDN, see Defense Data Network
DDS, see Dataphone Digital Service
DDT, see Domain definition table
Decryption, 59-12
Defense Data Network (DDN), 39-3
Defragmentation, 60-6
Denial of service attacks, 46-12
Department of Defense (DoD), 49-3
Deployment issues, 2-2
Depreciation, 11-5
Deregulation, 38-1
DES, see Data Encryption Standard
Desktop
management tools, 41-5
PC, 2-5, 55-8
user, 31-10
videoconferencing, 19-2
Destination address, 32-5
Detection, 24-10
Deterrence, 24-7
Development manager, 82-9
Device identification, 59-2, 59-3
Diagnostics, 9-7
Dial backup, 8-6
Dictatorship, 1-7
Digital camera images, on networks, 66-1-66-10
camera access software, 66-4-66-6
camera connection, 66-3-66-4
image resolution, 66-2
image storage, 66-6-66-8
importance of compression, 66-2-66-3
operation, 66-2
recommended course of action, 66-10
TIFF considerations, 66-8-66-10
Digital data services (DDS), 8-8
Digital encryption, 37-5
Digital signatures, 10-4, 10-8, 39-10, 59-15
Digital simultaneous voice and data (DSVD), 15-11
Digital subscriber lines, choosing asymmetrical, 22-1-22-7
additional DSL technologies, 22-5-22-6
ASDL, 22-2-22-3
Digital video, 12-6
Direct access storage device (DASD), 8-20
Direct Memory Access, 29-3
Directory
assistance facilities, 38-3
server, 60-15
services, 75-1
synchronization agent (DXA), 37-14
tree, 36-6
Disaster recovery planning, network, 8-1-8-24
methods of protection, 8-4-8-9
customer-controlled reconfiguration, 8-7
DDS dial backup, 8-8-8-9
dial backup, 8-6
further protective capabilities, 8-5-8-6
ISDN facilities, 8-7-8-8
rerouting on T1 lines, 8-6-8-7
tariffed redundancy and protection, 8-4-8-5
network availability, 8-2-8-4
network reliability, 8-1-8-2
bus topology, 8-2
ring topology, 8-2
other considerations, 8-19-8-24
generators, 8-20
insurance, 8-24
links to remote sites, 8-22
multiple WAN ports, 8-22
off-site storage, 8-20-8-21
periodic testing, 8-22-8-23
risk assessment, 8-24
spare parts pooling, 8-21
surge suppressers, 8-21
switched digital services, 8-21
training, 8-23
uninterruptable power supplies, 8-19-8-29
worst-case scenarios, 8-23
recovery options for LANs, 8-9-8-14
levels of fault tolerance, 8-13-8-14
recovery and reconfiguration, 8-9-8-11
restoral capabilities of LAN servers, 8-11-8-13
redundant arrays of inexpensive disks, 8-14-8-19
RAID level 0, 8-15-8-18
RAID level 1, 8-18
RAID level 2, 8-18
RAID level 3, 8-18
RAID level 4, 8-18
RAID level 5, 8-19
RAID level 6, 8-19
Disclosure of information, 49-2
Discrete multitone (DMT), 22-2
Discriminatory practices, 38-8
Disk
array, five-drive, 8-19
drives, 28-3, 29-7
duplexing, 8-13
configuration, 8-16
disadvantage of, 8-14
mirroring, 36-1, 61-8
monitoring tools, 80-5
storage, 18-1
Distance learning, 17-11
Distortion problem, 21-5
Distribution
lists, 35-6
tree, shared, 16-9
DIT, see Domain interaction table
DLC, see Data Link Control
DLCI, see Data link connection identifier
DMT, see Discrete multitone
DNS spoofing, 47-2
Document
formatting, 30-7
management, 36-21
strategic plan as living, 3-9
DoD, see Department of Defense
Domain
definition table (DDT), 49-5
interaction table (DIT0, 49-5
DOS applications, 2-7
Dow Jones news/retrieval, 53-8
Downsizing, 82-1
Downtime, 48-2, 52-11
Draft message, 53-12
DSVD, see Digital simultaneous voice and data
Dumb terminals, 67-1
DVMRP flooding, 16-8
DXA, see Directory synchronization agent
E
Eavesdropping, 46-10, 46-19, 58-5
ECS, see Electronic commerce services
Electronic commerce services (ECS), 10-1-10-13
available technologies for electronic commerce, 10-10-10-11
DMS and PEM, 10-11
secure E-mail, 10-11
secure World Wide Web, 10-11
secure open EDI, 10-11
public key certificate infrastructure, 10-12
service attribute authority, 10-2-10-10
certificate authority, 10-2-10-3
certificate authority, 10-4-10-6
digital signatures, 10-4
electronic postmark, 10-6-10-7
return receipts, 10-8-10-9
storage and retrieval services, 10-9-10-10
use of commercial exchange services, 10-10
Electronic Communications Privacy Act of 1986, 45-4
Electronic dataconference, 16-7
Electronic mail, see E-mail
Electronic Messaging Association, 31-11
Electronic messaging systems, implementing, 60-1-60-17
accomplishing rollout and managing constraints, 60-2-60-4
expertise resource constraints, 60-2-60-3
financial resource constraints, 60-2
functionality and scope, 60-3-60-4
supporting internal and external customers, 60-4
deployment architectures, 60-11-60-15
common backbone, 60-13-60-15
common platform architecture, 60-12
multiple backbone model, 60-12-60-13
establishing messaging policies, 60-15-60-16
privacy, 60-16
proprietary and conidential information, 60-16
implementation models and architectures, 60-4-60-7
implementation scenarios, 60-7-60-11
application gateways for integrating dissimilar systems, 60-9-60-10
distributed hubs, 60-11
one-tier messaging model, 60-7-60-8
two-tier model, 60-8-60-9
problems addressed, 60-1-60-2
recommended course of action, 60-16-60-17
applications support, 60-17
backup, 60-17
network connection, 60-16-60-17
operating systems, 60-17
Electronic postmark, 10-6, 10-7
Electronic publishing, 13-4
E-mail, 4-5, 17-1, 46-7
addresses, internal, 46-17
backup of existing, 45-5
development of, 45-1
filtering, 79-3
host-based, 37-2
market, 35-13
moving, 68-9
package, 35-14
postmaster for, 48-8
private, 35-2
recipients of, 45-3
servers, 65-11
services, 35-7
systems, see also E-mail systems, popular
host-based, 37-18
internal, 13-6
users, number of, 35-1, 60-8
wireless, 55-7, 55-10
E-mail systems, popular, 35-1-35-14
E-mail services, 35-7-35-13
directories, 35-8
fax gateways, 35-9
gateways, 35-9-35-10
message notification, 35-9
popular messaging systems, 35-11-35-13
security, 35-9
system directories vs. local address books, 35-8-35-9
telex, fax, and wireless, 35-10-35-11
X.400 software, 35-10
features and functions, 35-3-35-7
attaching files, 35-6
distribution lists, 35-6-35-7
editing capability, 35-5
features for creating messages, 35-5
features and services checklist, 35-4-35-5
file compression, 35-6
forms, 35-7
importing text, 35-7
signature files, 35-7
X.400 and SMTP, 35-3
X.500 directory service, 35-3-35-4
historical overview of electronic messaging, 35-1-35-2
primary electronic messaging system categories, 35-2
Employee
directories, 6-2
handbooks, 40-11
privacy, 45-10
EMPT bombs, 4-10
Encryption, 4-4, 47-3, 57-9
end-to-end, 46-20
on Internet, 46-18
private-key, 4-6
programs, 4-5
public-key, 4-9
End users, see System developers, improving communication between end users and
Enterprise messaging management, 75-1-75-9
difficulties in managing enterprisewide messaging systems, 75-1-75-3
E-mail management standards, 75-3-75-4
message management from single location, 75-5-75-8
control center console software, 75-7
evolving with standards, 75-7-75-8
functional description, 75-6
messaging management architecture, 75-5
overview of message management concepts, 75-4
problems addressed, 75-1
recommended course of action, 75-9
Enterprise networks, planning, designing, and optimization of, 67-1-67-16
case study, 67-10-67-16
circuit-switched voice and video traffic, 67-3
defining enterprise performance goals, 67-7
econets network planning and design package, 67-9-67-10
enterprise database, 67-2
major network design issues, 67-7-67-8
modeling time-consistent averages of traffic flows, 67-4-67-5
modeling traffic flows in existing enterprise network, 67-4
modeling traffic flows in new enterprise network, 67-3-67-4
modeling traffic growth during system life cycle, 67-5
network system performance, 67-5-67-6
new network design technology, 67-9
packet-switched data traffic, 67-3
performance issues, 67-5
previous network design technology, 67-8
simulation tools, 67-8-67-9
system throughput, 67-6
system quality-of-service, 67-6
system grade-of-service, 67-7
total monthly costs, 67-6
traffic engineering, 67-2-67-3
Equipment cost, 34-4
Error
correction, 8-18, 15-4
detection, 8-10, 53-2
message, 30-4, 42-9
recovery, 12-7
ESA, see Extended service area
Ethernet, 23-10, 29-7
adapter cards, 19-7
asynchronous, 23-2, 27-2
infrastructure, 23-4
LAN, 44-6
links, 63-8
operation, gigabit, 26-13
standards, 23-3
technology, 23-2
traffic, 63-5
use of Foundation Manager to monitor, 5-6
Ethernet, better fast, 27-1-27-11
fast Ethernet evolution, 27-1-27-2
asynchronous Ethernet, 27-2
100BaseT, 27-2
100VG-AnyLAN, 27-2
hub architecture, 27-2-27-10
hub operation, 27-4-27-6
network layers, 27-6
PMD sublayer, 27-9-27-10
PMI sublayer functions, 27-6-27-9
round-robin scanning, 27-6
Ethernet, fast, 23-2, 26-1-26-13, 62-4
auto-negotiation, 26-9
100BASE-T2, 26-7
100BASE-T4, 26-5-26-7
100BASE-TX, 26-5
flow control, 26-9-26-10
full duplex operation, 26-9
gigabit Ethernet, 26-11-26-12
impacts on network design, 26-12-26-13
ISO view, 26-2-26-5
media-independent interface, 26-8
repeaters and repeater connections, 26-10
topology rules, 26-11
Ethernet switching engines, creating network expressways using, 63-1-63-16
about Ethernet switches, 63-2-63-4
backbone switches, 63-3-63-4
desktop switches, 63-3
workgroup switches, 63-3
application, 63-9-63-10
ATM switching and LAN emulation, 63-15-63-16
cost of ATM, 63-15
multi-access LAN servers, 63-16
not plug ands play, 63-15
beyond segmentation, 63-2
conserving bandwidth, 63-2
multiprotocol switching, 63-5-63-8
firewalls, 63-5-63-7
network considerations, 63-7
switch types, 63-8
network management concerns, 63-14-63-15
network in transition, 63-12-63-14
performance of switches, 63-4-63-5
cut-through switching, 63-4
store-and-forward architecture, 63-4-63-5
typical midrange switch, 63-8-63-9
triggering events, 63-10-63-12
EtherVision, 5-2, 5-4
Exhaustion, 46-11
Expense
categories, 9-6
reporting, 36-19, 36-22
Extended service area (ESA), 54-9
External drive, 52-5
F
Fabric services, 28-6
Facilities management, 24-5
Facsimile machines, 81-6
FAT, see File allocation table
Fault
location, 8-9
management, 21-10, 21-7
tolerance, 8-13, 42-4
Fax, 35-5
capabilities, 15-1
gateways, 35-7, 35-9
machine, 36-20, 52-1
service, enhanced, 33-7
FCC, see Federal Communications Commission
FCS, see Frame check sequence
FCSI, see Fiber Channel Systems Initiative
FDDI, see Fiber distributed data interface
FECN, see Forward explicit congestion notification
Federal Communications Commission (FCC), 11-2, 38-1
Fiber channel, applications and business issues of, 28-1-28-7
applications, 28-6
difference between fiber channel and other transport technologies, 28-1-28-4
fiber channel economics, 28-3-28-4
processor speeds, 28-4
shared storage, computing, and network resources, 28-2-28-3
fiber channel as server technology, 28-5
networking, 28-5-28-6
Fiber channel architecture, layers, and services, 29-1-29-8
fiber channel layers, 29-1-29-4
channel networking, 29-3
chip coding, 29-3-29-4
physical, behavioral, and logical subsets, 29-4
message structure definition, 29-4-29-5
exchanges, 29-4
frame, 29-4-29-5
sequences, 29-4
scalability and guidelines for use, 29-5-29-7
arbitrated loop, 29-7
fiber channel application interconnection, 29-7
fiber channel fabrics, 29-6-29-7
point-to-point connections, 29-6
Fiber Channel Systems Initiative (FCSI), 29-4
Fiber distributed data interface (FDDI), 26-3
File(s)
allocation table (FAT), 25-5
attaching, 35-6
compression, 35-6
conversion, 18-7
distribution, 80-4
fragments, 8-12
retrieving, 8-12
-server hardware, 9-4
sharing, 50-10
synchronization utilities, 55-5
transfer, 41-11
products, multicast, 16-12
protocol, 43-3, 46-6
real-time, 19-8
File Transfer Body Part (FTBP), 37-16
Filters, 46-13, 46-14
Firewall(s), 4-4, 4-6, 34-7, 47-1-47-9, see also Internet firewall, selecting
architecture, gate-based, 47-5
deployment of, 47-6
internal, 48-3
Internet security controls, 47-3-47-7
encryption, 47-3
firewalls, 47-4-47-7
one-time passwords, 47-4
Internet security threats, 47-1-47-3
IP-level, 4-8
maintaining, 43-4
policy
conservative, 46-16
positions, 46-15
proxy, 48-6
security, 48-9
software, 42-8
types of, 48-5
using firewalls effectively, 47-7-47-9
choosing right firewall, 47-7
importance of firewall safety, 47-8
security maintenance, 47-8-47-9
Firewire, 62-10
Flaming, 45-7
Flow
control, 26-9, 53-5
label, 32-4
Folder synchronization, 37-9
Forum shopping, 40-3
Forward explicit congestion notification (FECN), 17-5
Foundation Manager, 5-5
graphical reports displayed by, 5-7
use of to monitor Ethernet, 5-6
Foundation Monitor Quick Stats, 5-8
Fragment header, 32-9
Frame check sequence (FCS), 17-4
Frame management, lack of, 17-3
Frame relay testing and training, 17-1-17-11
advantages of packet-switching frame relay networks, 17-2-17-3
anatomy of frame relay frame, 17-4-17-6
congestion control, 17-5
DLCI, 17-4-17-5
frame header, 17-4
FCS field and flags, 17-6
information field, 17-5-17-6
local management interface, 17-6
disadvantages of frame relay, 17-3
importance of testing, 17-7-17-10
commissioning frame relay service, 17-9
end-to-end analysis, 17-10
frame relay internetwork service testing, 17-8-17-9
testing WAN facilities, 17-7-17-8
provider’s perspective, 17-10
subscriber’s perspective, 17-10-17-11
training issues unique to frame relay, 17-10
Fraudulent activities, 45-6
FTBP, see File Transfer Body Part
Full-duplex operation, 26-9
Full-enterprise connectivity, 41-3
Full-motion video, 12-1
Function criticality, 8-10
G
Gatekeepers, 19-8
Gateway(s), 19-8
Gateway link, 36-12
circuit-level, 65-8
dual-homed, 48-5
fax, 35-7, 35-9
to foreign environment, 60-5
GroupWise, 36-9, 36-12
hardware, 60-1
Generators, 8-20
Global naming tree, 77-1-77-8
assigning identifiers and managing objects, 77-5-77-6
sample application using sample tool, 77-6-77-8
structure of, 77-2-77-5
Internet subtree, 77-2-77-4
MIB subtree, 77-4-77-5
use in network management applications, 77-2
Goals, differences in 1-2
Gopher, 30-7
Government data, private citizens accessing, 24-6
Graphical user interface (GUI), 13-2, 55-12, 67-9
phone, 62-13
voice mail, 62-14
Group scheduling, 37-7, 37-20
Groupware, 12-5
creation of custom, 36-19
redefining, 37-6
GroupWise, 35-13, 36-7
administration, 36-14
positioning, 36-8
GUI, see Graphical user interface
H
Hacker(s), 4-6, 45-9
activity, monitoring, 4-5
dictionary programs run by, 45-10
prosecution of, 40-11
Half-duplex link, 26-9
Handwriting-recognition systems, 12-2
Hard disk, 76-3
Hardware
abstraction later (HAL), 25-1
Compatibility Lists, 2-6
configuration, 15-9
infrastructure, 59-10
platform independence, 25-2
HDSL, see High data-rate digital subscriber lines
Header compression, 56-11
Help desk, 14-6
operator, 33-2
support, 71-1
Help screens, 30-2
HFC cable networks, see Hybrid fiber/coaxial networks
High data-rate digital subscriber lines (HDSL), 22-1, 22-5
High performance file system (HPFS), 25-5
Hit estimation, 44-4
Hop limit, 32-5
Host
chargeback system, 9-3, 14-2
signal processing (HSP) modems, 15-3
HPFS, see High performance file system
HP Open Desk Manager, 35-12
HSPO modems, see Host signal processing modems
HTML, see HyperText Markup Language
HTTP, see HyperText Transfer Protocol
Hub(s)
architecture, 8-3, 27-2
distributed, 60-11
Human resources, 50-3
Hunt groups, 28-6
Hybrid fiber/coaxial (HFC) networks, 21-1-21-12
ideas for managing, 21-6-21-11
HFC equipment, 21-7-21-8
high-speed data services over HFC, 21-7
manager/agent application for controlling HFC equipment, 21-11
monitoring non-standard services, 21-10-21-11
status monitoring systems, 21-8-21-9
standard management capabilities, 21-9-21-10
telecommunications management network model, 21-6-21-7
overview of, 21-1-21-2
requirements for managing, 21-2-21-5
achieving interactivity, 21-3-21-5
monitoring, 21-5
services running on, 21-5-21-6
analog video service, 21-5-21-6
digital services, 21-6
SNMP vs. CMIP, 21-11-21-12
Hyperlinks, 30-2
Hypermedia links, 13-2
HyperText Markup Language (HTML), 13-2
HyperText Transfer Protocol (HTTP), 13-3
I
IESG, see Internet Engineering Steering Group
IETF, see Internet Engineering Task Force
IGMP dialog, 16-5
Images, working with in client/server environments, 18-1-18-7
managing storage and transmission requirements, 18-5-18-7
cropping, 18-7
file and image-type conversions, 18-7
file format, 18-5-18-7
overview of imaging, 18-2-18-5
color depth tradeoffs, 18-4
data storage, 18-2-18-3
data transmission, 18-4-18-5
storage and color depth, 18-2
Information
determining value of, 58-2
management, 3-8, 50-2
protection, 56-10
publishing, 50-2
service, CompuServe, 53-7
sharing, 30-3
storage, 36-17
superhighway, 78-1
system (IS), 1-1
systems development (ISD), 1-1
Technology Professionals, 59-1
theft of, 58-4
Information infrastructure initiatives, 78-1-78-12
alternative initiatives, 78-11
CSPP, 78-11
EIA/TIA, 78-11
computer-integrated telephony, 78-7-78-8
computing and entertainment, 78-8
definition of information infrastructure, 78-1-78-2
goals and objectives of information infrastructures, 78-2
relevance of information infrastructure, 78-2
Internet and B-ISDN, 78-6-78-7
issues in creating superhighway, 78-3-78-6
corporate networks, 78-5-78-6
dream integration scenario, 78-5
government’s role, 78-4
industry’s role, 78-4-78-5
nightmare scenario, 78-5
user’s role, 78-4
national and international initiatives, 78-8-78-9
international initiatives, 78-9
U.S., 78-8-78-9
standards and standards organizations, 78-9-78-11
ANSI IISP, 78-10
DAVIC, 78-10-78-11
ETSI, 78-10
ISO and ITU, 78-9
TSACC, 78-10
technology trends, 78-2-78-3
bandwidth pricing issues, 78-2
decoupling networks, 78-3
service-oriented architecture, 78-3
telecommunications and cable TV, 78-7
Installation team, 2-3
Insurance company, 52-9
Integrated switched digital network (ISDN), 17-3
Intellectual property, 40-4
Intelligent agents, use of to manage multivendor environments, 80-1-80-12
application monitoring agents, 80-6-80-7
capabilities of intelligent agents, 80-4-80-5
concepts in systems administration, 80-2-80-4
agent IQ, 80-3-80-4
manager and agent, 80-2-80-3
disk monitoring agents, 80-5-80-6
event management agents, 80-8-80-9
file distribution agents, 80-7-80-8
file monitoring agents, 80-7
interoperability, 80-10-80-12
process scheduling agents, 80-9-80-10
systems management products, 80-10
Intelligent agents, use of to maximize benefits of World Wide Web, 79-1-79-7
capabilities of intelligent agents, 79-2-79-3
limitations of Web agents, 79-6
using Web agents to meet management needs, 79-3-79-6
using search engines to reduce information overload, 79-3-79-4
using monitors to keep up with changing information, 79-4-79-5
using publishers to make sense of unordered information, 79-5
using guides to maneuver novice users through Web, 79-5-79-6
using personal assistants to customize Web information, 79-6
web-supported information needs, 79-2
Interconnectors, 9-4
Interface(s)
cards, 61-2
chip, 29-4
secure, 4-8
International Telecommunications Union (ITU), 15-5, 15-12
Internet
access, high-speed, 7-2
application software, 42-5
attacks on, 46-9
backbone, 32-14
browsers, 41-6
changes on, 32-1
channel, 11-3
characteristics of, 46-1
community, publisher liability and, 40-8
connectivity, 37-1, 37-12, 37-20, 47-9
cost associated with using, 34-3
criminal activity on, 45-1
describing, 46-1
design techniques used to build, 4-1
Draft, 39-6
economics, 34-2
encryption on, 46-18
gateway access, 9-5, 14-5
growth, 32-2, 37-3
infrastructure, controlled, 4-1
mail standards, 37-12
market, 42-3
nodes on, 46-4
protocol, see also Internet protocol, next-generation
administration, 65-10
authentication header, 32-11
encapsulating security payload, 32-12
multicast diagram, 16-6
researchers, 16-6
service provider (ISP), 37-13, 43-1
subtree, 77-2
telephony, 19-8
use of for transferring files, VI-2
vulnerabilities on, 46-8
Internet, legal and regulatory environment on, 40-1-40-12
avoiding problems, 40-11-40-12
defining situation, 40-2-40-7
contract law, 40-3-40-4
criminal law, 40-5-40-7
intellectual property, 40-4
torts and negligence, 40-4-440-5
liabilities and available remedies, 40-9-40-11
criminal liability, 40-10
injunction, 40-10
lawyer liability, 40-10-40-11
money damages, 40-9-40-10
liability issues, 40-7-40-9
international perspective, 40-7-40-8
product liability, 40-9
role in events, 40-8-40-9
Internet, as virtual network, 34-1-34-9
Internet economics, 34-2-34-5
recommended course of action, 34-8-34-9
reliability issues, 34-5-34-6
security considerations, 34-6-34-8
packet filtering router, 34-6-34-7
using firewalls, 34-7-34-8
virtual networking concepts, 34-1-34-2
Internet Engineering Steering Group (IESG), 39-3
Internet Engineering Task Force (IETF), 31-3, 39-1-39-13
contacting Internet Society and IETF, 39-13
evolving administration of Internet, 39-1-39-3
IETF overview and charter, 39-3-39-4
IETF security area working groups, 39-7-39-13
Authenticated Firewall Traversal Working Group, 39-7-39-8
Common Authentication Technology Working Group, 39-9
Domain Name System Security, 39-9-39-10
Internet Protocol Security Protocol Working Group, 39-10-39-11
One-Time Password Authentication Working Group, 39-11
Privacy-Enhanced Electronic Mail Working Group, 39-11-39-12
public-key infrastructure working group, 39-12-39-13
Web Transaction Security Working Group, 39-13
IETF structure and Internet standards process, 39-4-39-7
Internet firewall, selecting, 48-1-48-11
assessment of risks on Internet connections, 48-3-48-5
defining security requirements for services, 48-4-48-5
mission critical networking, 48-4
service-oriented requirements analysis, 48-4
case studies, 48-7-48-8
academic organization, 48-7
electronic commerce application, 48-8
research laboratory, 48-7
cost issues, 48-9
costs and delivery, 48-9-48-11
firewall installation, 48-10
what vendors do not provide with firewall, 48-11
what vendors provide with firewall, 48-10-48-11
managerial issues, 48-8-48-9
building firewall, 48-8-48-9
firewall security, 48-9
maintaining typical firewalls, 48-8
risks associated with Internet connections, 48-1-48-3
downtime, 48-2
likelihood of attack, 48-3
sophistication of attacks, 48-2-48-3
security compromises in firewalls, 48-6
types of firewalls, 48-5-48-6
dual-homed gateway, 48-5-48-6
dynamic packet filtering, 48-6
proxy firewalls, 48-6
router screening, 48-5
Internet protocol, next-generation, 32-1-32-14
ICMPv6, 32-12
IPv6 addresses, 32-5-32-8
address prefix allocation, 32-6
IPv4-compatible addresses, 32-7
multicast addresses, 32-7-32-8
provider-based unicast address, 32-6-32-7
IPv6 background and features, 32-2-32-3
differences between IPv4 and IPv6, 32-2-32-3
improved terminology of IPv6, 32-3
IPv6 extension headers and options, 32-8-32-10
IPv6 header format, 32-3-32-5
IPv6 quality-of-service parameters, 32-10-32-11
IPv6 security, 32-11-32-12
IP authentication header, 32-11
IP encapsulating security payload, 32-12
migration to IPv6, 32-12-32-14
Internet security, firewall practices and, 45-1-45-20
attacks on Internet, 46-9-46-12
address spoofing, 46-10
browsing, 46-11
denial of service, 46-12
eavesdropping, 46-10
exhaustion, 46-11-46-12
packet and password grabbers, 46-10
Trojan Horses, 46-10-46-11
characteristics of Internet, 45-1-45-5
broadcast, 46-3
different types of Internet connections, 46-4
flat, 46-3
inclusive networks of networks, 46-2
increasing interoperability, 46-4-46-5
mesh topology, 46-3
no central authority, 46-5
public and open, 46-2
defending against attacks on Internet, 46-12-46-14
filters, 46-13
isolation and compartmentation, 46-12
policies, 46-12-46-13
wrappers, 46-13-46-14
encryption, 46-18-46-19
filters, 46-14
filters implemented by using routers, 46-14
packets by address, 46-14
protocols, 46-14
firewalls, 46-15-46-18
choosing firewall policy, 46-16
conservative firewall policy, 46-16-46-18
firewall policy positions, 46-15-46-16
Internet applications, 46-6-46-8
E-mail, 46-7
file transfer, 46-7-46-8
logging on remote system, 46-7
Internet protocols, 46-5-46-6
Internet protocol, 46-5
oldest and most widely used protocols, 46-6
other common protocols, 46-6
transmission control protocol, 46-5-46-6
using Internet in safe environment, 46-19-46-20
vulnerabilities of Internet, 46-8-46-9
Internet security planning, framework for, 4-1-4-10
connecting to World Wide Web, 4-2-4-3
full direct connection, 4-2
full buffered connection, 4-2-4-3
standalone connections, 4-3
firewalls, 4-6-4-8
host-based application-level firewalls, 4-8
router-based IP-level firewalls, 4-7-4-8
legal issues, 4-9-4-10
secure interfaces, 4-8-4-9
S-HTTP, 4-9
SSL, 4-8-4-9
securing network environment, 4-3-4-6
authentication, 4-6
encryption software and authentication, 4-5
encryption, 4-5-4-6
identifying security holes, 4-4-4-5
monitoring hacker activity, 4-5
patching and preventing security holes, 4-4
Internet server, choosing and equipping, 42-1-42-11
common gateway interface, 42-10-42-11
Internet application software, 42-5-42-8
communications software, 42-5-42-6
commerce software, 42-6
news software, 42-6-42-7
mail software, 42-7
proxy software, 42-7-42-8
firewall software, 42-8
Internet and intranet services, 42-1-42-2
platform considerations, 42-2-42-5
operating system, 42-3-42-5
processor architecture, 42-2-42-3
Web database considerations, 42-8-42-10
design tools, 42-9-42-10
maintenance and testing tools, 42-9
Internet Society (ISOC), 39-2
Internetwork(ing), 46-2
applications, 10-1
device, third-generation, 51-1
packet exchange (IPX), 17-5
service testing, 17-8
Interprocess communication (IPC), 36-13
Intranet(s)
challenges, 50-3
establishment of, 50-1
impact, 6-1
reengineering, 6-2
solutions, 13-1
switching, 65-6
traffic demands, 65-7
Intranet primer, 50-1-50-10
benefits of intranets, 50-2-50-3
cost-effective communications, 50-2
easier information publishing, 50-2
efficient information management, 50-2
enhanced real-time collaboration, 50-3
improved searching and retrieval, 50-2-50-3
case study, 50-5-50-6
costs, 50-5
idea factory, 50-6-50-7
intranet skills sets, 50-7
Marketplace Insider, 50-6-50-7
implications of Java and network-centric computing, 50-7-50-9
lower cost of network ownership, 50-7-50-8
platform-independent applications development, 50-8-50-9
intranet challenges, 50-3-50-4
security issues, 50-4-50-5
Intranets, developing corporate, 6-1-6-9
intranet impact, 6-1-6-4
intranet reengineering, 6-2
manufacturing and inventory, 6-2-6-3
purchasing and financial, 6-3
sales force automation, 6-2
Web as application platform, 6-3-6-4
Web self-service, 6-2
Java, 6-7-6-8
new model for distributed computing, 6-4-6-6
application publishing, 6-4-6-5
N-tier vs. 2- or 3-tier, 6-5
scalability and performance, 6-6
shared database connection vs. individual login, 6-5
state and session management, 6-6
technical considerations, 6-5
WAN vs. LAN, 6-4
operational considerations, 6-8-6-9
replacement of LAN applications, 6-1
security, 6-6-6-7
Intranets, implementing corporate, 65-1-65-11
cost issues, 65-5
fat vs. thin clients, 65-2
feeding client applications, 65-4-65-5
firewall, 65-8-65-9
applications servers, 65-8-65-9
circuit-level gateway, 65-8
packet filtering, 65-8
improving network performance, 65-5-65-7
intranet operating system, 65-7-65-8
intranet server management, 65-9-65-11
IP administration, 65-10
managing bandwidth, 65-10
policy-based solution, 65-11
Java-enabled browsers, 65-3-65-4
ActiveX and Java, 65-4
applets, 65-3
scripting languages, 65-4
traditional client/server, 65-2-65-3
Intrasubscriber, 32-7
Inventory, global, 78-9
Inverse multiplexing, 20-1-20-8
for ATM, 20-2-20-4
ATM’s position in marketplace, 20-1-20-2
NxT1 ATM inverse multiplexing, 20-4-20-8
alternatives to adding new UNI, 20-5-20-6
compatibility and cost savings, 20-7-20-8
support for non-ATM and multimedia traffic, 20-6-20-7
Investment banking, 12-11
I/O Manager, 25-5-25-6
IP, see Internet protocol
IPC, see Interprocess communication
IPX traffic, 63-1
IS, see Information system
ISD, see Information systems development
ISDN, see Integrated switched digital network
ISOC, see Internet Society
Isolation, 46-12
ISP, see Internet service provider
ITU, see International Telecommunications Union
J
Java, 47-3
applets, 72-4, 72-6
technology, 50-8
JPEG
compression, 66-3
images, 44-8
Just-in-time training, 12-3
K
Kernel, operational, 49-10
Key result areas (KRAs), 3-5, 3-6
Kiosks, 56-3
Knowledge on line (KOL), 6-9
KOL, see Knowledge on line
KRAs, see Key result areas
L
Labor, technical support cost of, 14-8
LAN, see Local area network
LAN, voice and video on, 19-1-19-9
LAN technologies for integrated voice and video, 19-4-19-9
asynchronous transfer mode, 19-4-19-5
gateways and gatekeepers, 19-8-19-9
hybrid ATM networks, 19-6-19-7
shared and switched LANs, 19-5-19-6
standards for LAN-based voice and video applications, 19-7-19-8
value of voice and video on LAN, 19-2-19-4
infrastructure efficiencies, 19-3-19-4
new types of applications, 19-2-19-3
Language(s)
cross-platform, 72-1
object-oriented, 6-7
LAN infrastructures and applications, integrating, 62-1-62-17
consolidating voice and data organizations, 62-15
consolidation of cabling plant, 62-7-62-11
hardware upgrades, 62-7-62-10
software upgrades, 62-11
migrating issues, 62-14
migrating LAN infrastructure, 62-2-62-7
controlling LAN backbone traffic, 62-4-62-7
desktop switching, 62-3
minimized routing, 62-3-62-4
solutions for delay-sensitive applications, 62-2-62-3
migrating PBX, 62-11-62-14
legacy telephony, 62-11
linking distributed PBX compounds, 62-11-62-12
server-based telephony, 62-12-62-14
problems addressed, 62-1-62-2
recommended course of action, 62-15-62-17
LANs, operating standards and practices for, 71-1-71-8
lessons from mainframe management, 71-3-71-4
problems addressed, 71-1-71-2
standards committees, 71-4-71-6
why LANs require standards, 71-2
writing operating and security standards document, 71-6-71-8
network software security, 71-6-71-7
physical and environmental security, 71-7
technical support, 71-7-71-8
LAN/WAN connections, remote, 64-1-64-20
connectivity options, 64-5-64-6
eliminating inappropriate connectivity technologies, 64-6
physical connections, 64-5
wireless connections, 64-5-64-6
defining business objective, 64-4-64-5
defining existing resources, 64-4
defining options, 64-3-64-4
establishing baseline, 64-3
fiber optics, 64-6-64-9
advantages, 64-8
disadvantages, 64-8-64-9
fiber optic cabling, 64-7-64-8
fiber optic data transmission, 64-7
final analysis, 64-17-64-18
cost comparisons, 64-17-64-18
weighing factors, 64-17
implementation and installation planning, 64-19-64-20
infrared, 64-12-64-17
advantages, 64-16
conditions affecting effectiveness, 64-13-64-15
cost, 64-16-64-17
licensing requirements, 64-16
microwave, 64-10-64-12
advantages, 64-10-64-11
costs, 64-12
disadvantages, 64-12
licensing requirements, 64-10
recommendations, 64-18-64-19
decision on fiber optics, 64-19
decision on infrared technology, 64-19
decision on microwave technology, 64-18-64-19
Laptop computers, 32-2
Latency, 12-5
Law enforcement agencies, 54-1
Lawyer liability, 40-10
LEC, see Local exchange carrier
Legacy
applications, CSG’s, 50-7
data, 13-5
mainframe systems, 69-1
networks, 23-7
systems, high-bandwidth links to, 26-12
Legal protection, 10-1
LEO systems, see Low earth orbital systems
Link
analyzers, 42-9
detection, automatic, 26-5
medium operation, 27-9
status control, 27-10
Linkage
components, 9-4
programs, building, 13-7
Litigation, 40-7
LLC, see Logical link control
LMI, see Local management interface
Local address books, 35-8
Local area network (LAN), 6-4, 34-1
access, remote, 55-6
administrator, 5-4, 14-5, 66-1, 8-23
applications, 6-1
backbone technology, 62-5
bandwidth constraints, 44-6
bridges, wireless, 54-10
communications requirements, 27-11
comparison of ATMs and, 23-7
connectivity, 11-10
corporate, 34-7
desktop, 12-8
emulation, 23-6
environment, 60-9
Ethernet bus-based, 44-1
high-speed backbone in, 29-1
interconnection, high-speed, 17-1
inventory, 9-5
module, 8-2
network adapter cards, 27-10
protocols, 31-7
recovery options for, 8-9
server, 35-3
standards, IEEE, 27-6
switching, 19-5, 63-2
technologies, 19-4, 23-1
Token Ring, 32-3
traffic, 23-6
usefulness of, 30-1
wireless, 54-8, 57-1
Local exchange carrier (LEC), 38-3, 67-6
Local management interface (LMI), 17-6
Logical link control (LLC), 5-6, 34-5
Long distance services, 33-10
Long-run incremental cost (LRIC), 11-7
Lossless compression method, 66-9
Low earth orbital (LEO) systems, 54-3, 54-7
LRIC, see Long-run incremental cost
Lycos, 44-5
M
MAC, see Media access control
Macintosh
desktops, integrating, 2-8
workstation, 4-2
Mail
reader programs, 49-4
software, 42-7
user agents (LUAs), 31-2
Mailboxes, 53-11
Mainframes, 2-9
Malicious code, 58-4
Management
capabilities, standard, 21-9
information base (MIB), 5-2, 31-8
technology, 61-3
tools, 31-1, 41-1, 41-2
Marine agencies, 54-1
Marketplace Insider, 50-6
Matrix information, 5-9
MCI Mail, 53-10
MCPS, see Microsoft Certified Product Specialists
MCPs, see Microsoft Certified Professionals
MCSDs, see Microsoft Certified Solutions Developers
MCSEs, see Microsoft Certified Systems Engineers
MCTs, see Microsoft Certified Trainers
MDI, see Media-dependent interface
Media
access control (MAC), 26-1
-dependent interface (MDI), 26-3
-independent interface (MII), 26-8
storage, 12-9, 29-2
Medical devices, 29-2
Mesh topology, of Internet, 46-3
Message(s)
classes of, 29-5
enabling, 36-9
management, 31-9, 75-2
notification, 35-7, 35-9
replying to, 36-16
routing, 36-13
transfer agent (MTA), 37-14
Messaging, 36-17, 37-21
applications, 12-2
infrastructure, 37-14
pass-through, 36-14
services, 36-4, 37-4
integrated, 36-8
NetWare, 36-6
support organizations, 60-17
system(s), 36-24
agent-based, 55-4
popular, 35-11
rollout, 60-4
trends in, 37-1, 37-2
MIB, see Management information base
Microphone applications, 81-4
Micro platforms, 3-6
Microprocessor, embedded, 36-3
Microsoft Certified Product Specialists (MCPSs), 2-4
Microsoft Certified Professionals (MCPs), 2-3
Microsoft Certified Solutions Developers (MCSDs), 2-3
Microsoft Certified Systems Engineers (MCSEs), 2-3
Microsoft Certified Trainers (MCTs), 2-4
Microsoft Exchange Server, introduction to, 37-1-37-21
building business strategy around Microsoft Exchange Server, 37-18-37-20
connecting multisystem environments, 37-18-37-19
downsizing, 37-18
upgrading current Microsoft Mail systems, 37-19-37-20
easy and powerful centralized administration, 37-14-37-18
client support, 37-17
easy migration, 37-18
easy-to-use graphical administration program, 37-14
management of all components from single set, 37-17-37-18
Microsoft Exchange Server components, 37-14-37-15
reliable movement of information, 37-14
single interface for global management, 37-15-37-17
infrastructure for messaging and collaboration, 37-5-37-6
fast, secure, and reliable, 37-5-37-6
remote client access, 37-6
scalable, 37-6
tight integration with desktop application, 37-5
Universal Inbox, 37-5
Internet connectivity, 37-12-37-18
direct connection over Internet for mobile users, 37-13
integrated Internet support, 37-12
outlook Web access, 37-13
support for Internet newsgroups and discussion groups, 37-13
redefining GroupWare, 37-6-37-12
bulletin boards, 37-8
easy-to-create groupware applications, 37-9-37-11
group scheduling, 37-7
messaging application programming interface, 37-11-37-12
offline folder synchronization, 37-9
Outlook forms, 37-8
public folder replication, 37-8-37-9
public folders, 37-7
trends in messaging and collaboration, 37-2-37-5
Microsoft Exchange product family, 37-4-37-5
unifying LAN- and host-based E-mail, 37-2-37-4
Microwave technology, 57-7, 64-6
Middleware services, 12-11
Migration
strategies, 74-5
tools, built-in, 37-18
MII, see Media-independent interface
MIME message, 31-4
Minicomputer, UNIX-based, 43-5
Mini platforms, 3-6
Mission statement, 3-2, 3-4
Misuse
avoiding, 24-6
detecting, 24-11
Mobile computing, safe, 52-1-52-11
backing up PDAs, 52-6-52-7
computer viruses, 52-3
determining organization risk, 52-2
general backup, 52-4-52-6
data recovery centers, 52-5
external drives, 52-5
tips for users, 52-5-52-6
physical security, 52-7-52-8
cellular phone safety, 52-8
securing equipment and premises remotely, 52-8
power protection, 52-2-52-3
practices for safe computing, 52-8-52-11
cataloging equipment, 52-9
hardware and software setups, 52-9-52-10
orientation session, 52-10
security setups, 52-10
tips for safe public use, 52-11
tips for safe storage, 52-11
tips for securing mobile office, 52-10
security passwords, 52-3-52-4
Mobile computing assets, protection of, 58-1-58-6
determining value of information, 58-2-58-3
keeping pace with change, 58-1-58-2
protecting mobile office, 58-3-58-5
computer theft, 58-3-58-4
eavesdropping, 58-5
malicious code, 58-4
theft of information, 58-4
setting security policy, 58-5-58-6
Mobile user security, 59-1-59-16
availability, 59-2-59-4
physical considerations, 59-3-59-4
scheduling considerations, 59-3
telephone communications tools, 59-4
confidentiality, 59-11-59-13
mobile employee information security recommendations, 59-11
software considerations, 59-11-59-13
continuity, 59-4-59-6
creating mobile backup, 59-5
loss of computing resources, 59-5-59-6
integrity, 59-6-59-11
new technology considerations, 59-13-59-16
Modem(s), 14-4
ADSL, 22-3
Bell System-compatible, 53-1
data, 52-8
features, 15-4
fundamentals, 7-2
higher-speed, 15-13
incorporation of microprocessors in, 53-1
modulation, 7-4
price of CDPD, 56-16
RF, 58-1
system, CablePort cable, 7-7
traffic, 15-11
wireless, 15-8
Modems, preparing for cable, 7-1-7-7
cable modems, 7-3-7-7
from unidirectional to bidirectional systems, 7-3-7-5
high-speed cable modem architecture, 7-5-7-6
Web, 7-6-7-7
modem fundamentals, 7-2-7-3
problems addressed, 7-1-7-2
quadrature amplitude modulation technique, 7-3
recommended course of action, 7-7
Modem technologies and trends, new, 15-1-15-13
evolution of packaging, 15-1-15-4
CDPD modems, 15-2
external modems, 15-2
host signal processor modems, 15-3-15-4
internal modems, 15-2
multimedia extensions technology, 15-3
other multiport modems, 15-3
PCMCIA cards, 15-2
modem features, 15-4-15-6
data compression, 15-6
diagnostics, 15-6
error correction, 15-5-15-6
modulation techniques, 15-4
speed, 15-5
role of digital signal processing, 15-10-15-12
digital simultaneous voice and data, 15-11
56K-bps modems, 15-11-15-12
security, 15-6-15-7
transmission techniques, 15-7-15-10
cable modems, 15-9-15-10
multifrequency modems, 15-9
multimedia modems, 15-9
PC-to-PC or PC-to-mainframe, 15-7-15-8
private wireless networks, 15-8
wireless modems, 15-8
Modulation techniques, 15-4
Money
damages, 40-9
transactions, fraud-free, 24-8
Monitoring tools, 37-17, 41-8
MOSPF, see Multicast open shortest path first
Motion detector, 52-7
Moving Picture Experts Group, 12-6
MPR, see MultiProtocol Router
MRI scans, 18-1
MTA, see Message transfer agent
MUAs, see Mail user agents
Multicast networking, 16-1-16-12
applications, 16-10-16-11
dataconferencing, 16-10
dynamic groups, 16-10
real-time distribution of multimedia information, 16-10-16-11
comparing broadcast and multicast IP, 16-4-16-10
class D addressing, 16-4-16-5
IP multicast protocol, 16-4
multicast routing protocols, 16-7-16-10
sending report member overhear, 16-6
starting report delay timer, 16-5-16-6
multicast backbone, 16-6-16-7
multicast LANs, 16-1-16-3
multicast frame relay, 16-2
multicast switched multimegabit data service, 16-3
N-way multicast, 16-3
one-way multicast, 16-2
two-way multicast, 16-2
vendor offerings, 16-11-16-12
Multimedia
applications, 27-2
collaborations, 19-2
information, real-time distribution of, 16-10
signaling, 12-10
technology, 23-12
traffic, 20-6, 23-3
Multimedia networking, business aspects of, 12-1-12-12
applications of networked multimedia, 12-2-12-3
barriers to multimedia networking, 12-9-12-10
business drivers of multimedia applications, 12-2
issues in multimedia planning, 12-10-12-11
application/content awareness, 12-11
integration, 12-10-12-11
scalability, 12-10
people-to-people applications, 12-4-12-5
groupware, 12-5
multimedia conferencing, 12-4
types of multimedia conferencing systems, 12-4-12-5
people-to-server applications, 12-3-12-4
video-on-demand, 12-3
WWW browsing, 12-3-12-4
planning strategies, 12-11
system considerations, 12-8-12-9
technical requirements for networked multimedia applications, 12-5-12-8
application parameters, 12-7
bandwidth, 12-6
determining service levels, 12-8
guaranteeing quality of service, 12-6-12-7
latency, 12-5-12-6
network and device parameters, 12-8
reliability, 12-6
synchronization, 12-6
system parameters, 12-7-12-8
Multimedia networking technologies, 23-1-23-13
asynchronous transfer mode, 23-4-23-8
ATM architecture, 23-5-23-23-6
LAN emulation, 23-6-23-8
LAN technologies, 23-1-23-13
100Vg-AnyLAN, 23-3-23-4
asynchronous Ethernet, 23-2
fast Ethernet, 23-2-23-3
FDDI, 23-4
FDDI II, 23-4
WAN technologies, 23-8-23-12
fiber channel, 23-11
frame relay, 23-8
Internet protocol, 23-9
NHRP, 23-10-23-11
RSVP, 23-9-23-10
suitability of WAN-based ATM, 23-11-23-12
switched multimegabit data service, 23-11
Multiplexing, 27-8
Multiprocessor platform, 25-3
MultiProtocol Router (MPR), 36-7
Multitasking, 42-3
Mutual partnering, 1-7
N
NASA, see National Aeronautic and Space Administration
National Aeronautic and Space Administration (NASA), 39-2
National Institute of Standards and Technology (NIST), 31-11
National Security Agency, 10-13
NDS, see NetWare directory services
Netiquette, 45-7
NetWare directory services (NDS), 36-5
Network(s)
accountability, 51-2
adapter, 23-3
administrator, 28-7, 49-4
applications, 41-4
architecture, 56-5
assets, 24-1
availability, 8-2
backup, 80-9
bottlenecks, 27-1
cards, 49-11
cellular, 54-11
chargeback pricing, 9-9, 14-8
circuit-switched, 46-4
configurations, 63-7
connections, 52-10
corporate, 50-5, 65-1, 78-5
costs, 9-8
data rates, 61-1
decoupling, 78-3
devices, 77-1
domains, host-linked, 9-8
drivers, 25-6
environment, securing, 4-3
expense assignment matrix, 9-7
failure, 33-8
File System (NFS), 2-9
global, 36-2
ideal virtual, 51-3
interface cards (NICs), 20-5, 68-4
management, 8-9, 23-6, 31-9
database, 33-5
developing, 21-11
platforms, 51-11
software, 51-3
tools, 41-8
managers, 8-23, 25-8
corporate, 11-1
WAN usage for, 51-9
member, 45-2
operator, 45-4
organization’s private, 34-6
planning, 5-1
predictability, 34-5, 34-9
proprietary, 63-12
protection capability, 8-6
protocol
address, 51-7
spoofing, 49-12
public, 45-5
radio, 15-8
reliability, 8-1, 33-9, 51-2
remotely monitored, 5-7
resources, 28-2
router port requirements, 34-4
security, 34-9
separation, 49-11
shared-access, 51-6
SMTP-based, 31-10
snooping, 47-2
statistics, 76-7
support personnel, 26-1
time protocol, 46-6
topology, 67-8
traffic, 23-5
utilization, 5-9, 44-7
voice, 33-10, 62-1
wireless, 14-3
Network access, portable, 53-1-53-14
modem terms, 53-1-53-5
command set recognition, 53-5
data compression, 53-4-53-5
error detection and correction, 53-2-53-3
network access, 53-5-53-14
British Telecom, 53-6
commercial dialing from hotels and pay phones, 53-6-53-7
CompuServe information service, 53-7-53-8
CompuServe quick access reference, 53-8
Dow Jones news/retrieval, 53-8-53-10
FTS2000 offnet calling, 53-10
MCI Mail, 53-10-53-13
U.S. Sprint SprintNet, 53-13-53-14
Network baselining, as planning tool, 5-1-5-9
EtherVision, 5-2-5-5
foundation manager, 5-5-5-9
NEWT, 5-2
SimpleView, 5-2
Network Reliability and Interoperability Committee (NRIC), 38-5
Network security, applets and, 72-1-72-8
Activex, 72-5-72-7
downside of ActiveX, 72-7
using Authenticode for accountability, 72-6-72-7
applets and Web, 72-2-72-3
risks, 72-2-72-3
security issue, 72-2
Java, 72-3-72-5
Javascript, 72-5
ounce of prevention, 72-7-72-8
basics, 72-7
Web browsers, 72-7-72-8
Networking
channel, 29-3
mission critical, 48-4
software, 41-3
standard, established, 41-1
support, 41-5
News software, 42-6
NEWT, 5-2
NFS, see Network File System
NICs, see Network interface cards
NIST, see National Institute of Standards and Technology
Nodes’ addresses, 32-8
Noise funneling, 21-5
Nonemployees, screening, 24-4
Nonrepudiation, 10-1, 59-8
Notebook(s)
backing up of, 52-6
cases, 52-7
computers, 15-2
configuration integrity, 59-7
connectivity, 59-2, 59-4
lost or stolen, 59-6
Novell GroupWare, 36-18
Novell messaging products, 36-1
defining future of networking, 36-2-36-3
GroupWise, 36-7-36-17
GroupWise administration, 36-14-36-15
GroupWise 4.1 electronic messaging architecture, 36-10-36-11
GroupWise gateways, 36-13-36-14
GroupWise 4.1 message server, 36-11-36-13
GroupWise positioning, 36-8
GroupWise telephony access server, 36-15-36-17
integrated messaging services, 36-8-36-10
GroupWise 5, 36-17-36-23
business solutions, 36-19-36-20
empowering people to act on information, 36-17-36-18
GroupWare 5 desktop, 36-20-36-23
solutions to problem, 36-18-36-19
message handling services, 36-3-36-7
global message handling services, 36-3-36-6
MHS services for NetWare 4.1, 36-6-36-7
NRIC, see Network Reliability and Interoperability Committee
NRZ encoding, 27-9
NT deployment, 2-14
O
Object
groups, 77-4
-oriented architectures, 50-6
Off-net services, 33-6
OME, see Open messaging environment
Online
discussions, 36-21
services, 35-2
ONP, see Open network provision
Open connectivity, 41-2
Open messaging environment (OME), 36-8
Open network provision (ONP), 38-7
Open shortest path first (OSPF), 8-22
Open systems integration, 70-1-70-14
issues in, 70-2-70-5
accuracy, 70-3
alignment to business objectives, 70-2-70-3
communications, 70-3
ergonomics, 70-4
legacy systems, 70-4-70-5
resource contention, 70-3
user specifications, 70-2
problems addresses, 70-1-70-2
recommended course of action, 70-14
rules of integration, 70-6-70-13
creating development team, 70-6-70-7
gathering detailed specifications, 70-8
making users part of team, 70-7-70-8
organizing specifications, 70-8-70-10
understanding application, 70-6
understanding critical components of integrated systems, 70-10-70-13
understanding technology, 70-6
Optical disc, 52-5
Options header, 32-8
OSPF, see Open shortest path first
Outlook forms, 37-8
P
Packet
filtering router, 34-6
switching, 51-4, 51-5
Packetization, 56-2
Password(s), 45-10, 48-2, 58-5
changing, 71-3
one-time, 47-4
programs, 52-3, 52-4
protection, 45-9
Payload length, 32-4
PBX, see Private branch exchange
PC, see Personal computer
PCMCIA cards, 4-6
PCS, see Physical coding sublayer
PDAs, see Personal digital assistants
PDD, see Post dialing delay
PEM, see Privacy Enhanced Mail
Performance
management, 21-7
monitoring, 8-9, 38-6
Peripherals, testing, 2-8
Personal computer (PC), 7-1
use, growth in, 37-3
workstation, 4-2
Personal digital assistants (PDAs), 52-1
Personnel information, 13-6
Phone network, 11-2
Physical coding sublayer (PCS), 26-26-3
Pilot rollout, managing, 2-12
PIM, see Protocol independent multicast
Pings, 17-9
Pipeline(s)
assured, 49-7
management, 55-9
PKI, see Public Key Infrastructure
Planning, strategic, 3-1-3-9
analyzing current situation, 3-2
determining department’s future, 3-4
determining department’s identity, 3-2-3-4
doing it, 3-7-3-8
looking forward, 3-1
mission statement, 3-4-3-5
planning document, 3-5-3-7
action checklist, 3-8-3-9
goals, 3-6
key result areas, 3-5-3-6
objectives, 3-6-3-7
too busy, 3-1-3-2
Platform
architecture, 60-12
independence, 6-7
PMD sublayer, 27-9
Polarization, 1-8
Post dialing delay (PDD), 33-9
Postmark authority, 10-7
Power protection, 52-2
Pricing methods, across linked networks, 9-1-9-9
chargeable resources, 9-2-9-3
expense categories, 9-6
network resource categories, 9-3-9-6
cable, 9-3-9-4
communications, 9-5-9-6
linkages, 9-4
storage, 9-4-9-5
workstations, 9-4
problems addressed, 9-1-9-2
rate determination, 9-6-9-9
recommended course of action, 9-9
Primestar satellite direct television, 11-3
Printer(s), 2-8
connectivity, 61-5
personal, 9-4, 14-4
portable, 52-1
Privacy Enhanced Mail (PEM), 10-11, 31-6
Privacy policy, 60-16
Private branch exchange (PBX), 54-2
Private network functionality, 33-2
Process
equipment, 29-2
manager, 25-3
Processor
architecture, 42-2
development trends, 28-4
object, 76-9
speeds, 28-4
Prodigy, 9-6
Product
development, 82-8
liability, 40-5, 40-9
longevity, 61-4
promotion, 13-4
Programming skills, 82-4
Project
planning software, 23-13
team goals, 1-10
Protocol
independent multicast (PIM), 16-9
stacks, 49-11, 76-3
technician’s lack of, 17-10
Prototype environment, 70-13
Provider identifier, 32-7
Proxy
firewalls, 48-6
service capability, 34-8
software, 42-7
Public folders, 37-7
Public key certificates, 10-2
Public Key Infrastructure (PKI), 10-12
Publishing
distributed, 16-11
tools, 13-2
Purchasing applications, 6-3
Q
QAM, see Quadrature amplitude modulation
QOS, see Quality-of-service
Quadrature amplitude modulation (QAM), 7-3, 15-10
Quality-of-service (QOS), 32-10
QuickMail, 35-13
R
Radio
frequency (RF) modems, 58-1
network, 15-8
signals, 56-7
RAID, see Redundant arrays of inexpensive disks
RAM, 25-4
Rate determination, 14-7
Real-time
audio, VI-1
collaboration, enhanced, 50-3
sensors, 29-2
Real Time Protocol (RTP), 19-7
Reconfiguration, 8-10
Redirect procedure, 56-15
Redundancy application, 61-7
Redundant arrays of inexpensive disks (RAID), 8-14, 8-17
Reengineering, 82-3
References object, 42-10
Registration, 10-3
Remote client access, 37-6
Remote Monitoring (RMON), 5-2
Remote procedure calls (RPCs), 37-15
Report delay timer, 16-5
Repudiation, 50-4
Request for comment (RFC), 35-10
Request for information (RFI), 11-9
Request for proposal (RFP), 11-9
Research laboratories, 48-7
Residual ratemaking, 11-6
Resource planning software, 23-13
Return
paths, 21-3
receipts, 10-8
RFC, see Request for comment
RFI, see Request for information
RFP, see Request for proposal
Ring topology, 8-2
RIP, see Routing information protocol
Risk assessment, 8-24
RMON, see Remote Monitoring
Rollout planning, 81-14
Root hub, 27-4
Round-robin scanning, 27-6
Router(s), 51-1, 51-5, 56-5
addresses, 32-8
filters implemented by using, 46-14
interfaces, 32-13
vendor, 61-9
Routing
header, 32-9
information protocol (RIP), 8-22
options, 32-9
protocols, 32-14
RPCs, see Remote procedure calls
RTP, see Real Time Protocol
S
Sales tracking, 37-19
Satellite data transmission, 16-1
Scalability, 50-5
Scheduling agent, 80-5
Screening groups, 33-2
SCSI drives, see Small computer system interface drives
SDSL, see Single-line digital subscriber lines
Secure protocols, 46-6
Secure socket layer (SSL), 50-4
Secure Telnet, 46-17
Security, 6-6
administration, 57-10
breach, 24-13
configuration, 49-6
content, 10-1
evaluations, 47-9
functions, 24-3
holes, patching, 4-4
maintenance, 47-8
management, 21-7
personnel, 4-7
requirements, 47-6
threats, 47-7
vulnerabilities, 49-13
Security, basics of computer system and data network, 24-1-24-13
avoidance, 24-2-24-7
avoiding damage, 24-7
avoiding misuse, 24-6-24-7
avoiding unauthorized access, 24-4
distributed environments, 24-5-24-6
maintaining low profile, 24-5
screening nonemployees, 24-4-24-5
basic security functions, 24-2
correction, 24-13
detection, 24-10-24-12
detecting damage, 24-11-24-12
detecting misuse, 24-11
detecting unauthorized access, 24-10
deterrence, 24-7-24-8
deterring misuse and damage, 24-7-24-8
deterring unauthorized access, 24-7
prevention, 24-8-24-10
preventing misuse and damage, 24-9-24-10
preventing unauthorized access, 24-8-24-9
problems addressed, 24-1-24-2
recommended course of action, 24-13
recovery, 24-12-24-13
recovery from misuse and damage, 24-12-24-13
recovery from unauthorized access, 24-12
security violations, 24-2
Security model, for networks and Internet, 49-1-49-14
security basics, 49-2-49-4
compromising integrity of information, 49-2
denial of service, 49-2
disclosure of information, 49-2-49-3
information bucket, 49-3-49-4
Sidewinder 2.0 challenge, 49-14
Sidewinder implementation of type enforcement, 49-8-49-14
controlled system calls, 49-10-49-11
network separation, 49-11-49-12
protecting Internet servers, 49-13-49-14
two kernels, 49-10
type enforcement, 49-4-49-8
assured pipelines, 49-7-49-8
subsystem separation, 49-6-49-7
Segmentation, 63-10
Self-feedback, 3-3
Self-rescue, 82-6
Sendmail domain, 49-14
Server(s), 47-5
authentication, 42-6
characteristics, 8-11
global collection of, 42-1
Intel-based, 2-11
LAN-attached, 30-1
mirrored, 8-13
multiprocessor, 8-11
software, 43-6
technology, fiber channel as, 28-5
telnet, 46-7
types of, 8-11
unmirrored, 8-13
upgrade, 68-10
WWW, 46-11
Service
availability, 57-5, 57-7
outages, potential, 33-5
provider, 23-10
Shielded twisted pair (STP) cables, 26-2
Sidewinder firewall system, 49-1
Signal conversion systems, 21-10
Signature
files, 35-7
scanners, 73-8
Silicon Graphics (SGI), 6-9
Simple mail transfer protocol (SMTP), 31-2
Simple network management protocol (SNMP), 8-20, 15-10
Single-line digital subscriber lines (SDSL), 22-1
Site mirroring, 42-4
Skill sets, 60-3, 69-3
Small computer system interface (SCSI) drives, 52-5
Smart cards, 59-13
SMDS, see Switched multimegabit data service
SMR, see Specialized mobile radio
SMS, see System Management Server
SMTP, see Simple mail transfer protocol
SMTP, X.400 vs., 31-1-31-11
electronic mail, 31-2-31-3
industrial-strength messaging requirements, 31-5-31-11
commercial use, 31-10-31-11
critical comparison factors, 31-6
EMA requirements for messaging management, 31-8-31-9
functionality, 31-6
human resources requirements and support costs, 31-9-31-10
industry standards for E-mail management, 31-7-31-8
managing messaging systems, 31-7
message management, 31-9
performance, 31-10
security, 31-7
systems management, 31-7
SMTP background, 31-2
SMTP/MIME characteristics, 31-4
SMTP vs. X.400 debate, 31-3-31-4
X,400 background, 31-11-31-12
X.400 characteristics, 31-4-31-5
X.400 and SMTP/MIME development process, 31-3
SNMP, see Simple network management protocol
Society goodness, theories of, 40-9
Software
agents, 79-5
applications, 2-12
browser, 42-1
buffer, 4-5
checks, 24-11
communications, 42-5
considerations, 59-11
costs, 4-2
development consultants, 36-1
distribution, 55-6
evaluating and testing, 2-6
failure, 8-12
features of switching, 51-7
file-server, 14-4, 36-1
firewall, 42-8
free, 41-1
high-value, 41-6
interfaces, 62-2
licenses, 80-7
mail, 42-7
networking, 41-5
news, 42-6
proprietary, 63-5
proxy, 42-7
purchasing, 14-2
security, 52-10
server, 43-6
upgrades, 61-1, 62-11
Web server,
SONET structure, 23-5
Sound boards, 15-1
Source
address, 32-5, 43-3
code, writing, 69-6
Spare parts pooling, 8-21
Specialized mobile radio (SMR), 54-5
Speech recognition system, 81-11
Spreadsheet support person, 3-3
SQL database server, see Structured query language database server
SSL, see Secure socket layer
Standalone connection, 4-3
Standard configurations, testing, 2-12
Star topology, 8-1
Station management interface, 26-8
Statistical multiplexing, 17-2
Status monitoring systems, 21-8
Storage
array, 29-7
off-site, 8-20
STP cables, see Shielded twisted pair cables
Strategic planning, 3-7
Structured query language (SQL) database server, 25-1
Subnets, 47-5, 47-7
Support plan, 2-13
Supreme Court, 45-3
Switch-capacity planning, 5-1
Switched fabric topology, 29-6
Switched multimegabit data service (SMDS), 23-11
Synchronization traffic, 36-5
System(s)
administrator, 59-8
availability management, 8-9
housekeeping, 6-6
inventory, 2-14
Management Server (SMS), 2-10
management, cost-effective, 50-9
pressure, 60-7
printer, 9-1, 14-1
System developers, improving communication between end users and, 1-1-1-11
classification of user and developer relations, 1-6-1-8
dictatorship, 1-7-1-8
mutual partnering, 1-7
polarization, 1-8
student and teacher, 1-6-1-7
cooperation, communication, and mutual understanding, 1-3-1-6
balance of influence, 1-4
reconciling goals between user and developer, 1-4-1-6
structuring user-developer relationship, 1-8-1-11
assessment, 1-8-1-9
monitoring, 1-10-1-11
structuring, 1-9-1-10
user involvement and common wisdom, 1-2-1-3
T
Tape drive units, 9-1, 14-1
Tariffs, 67-10
TAS, see Telephony Access Server
Task
assignments, 36-10, 36-11
groups, 38-5
management, 36-21
TCP/IP, hidden costs of, 41-1-41-10
difference in using kernel applications, 41-6-41-7
elimination of compromises of TCP/IP in AS/400 environments, 41-8-41-10
kernel applications, 41-6
matching requirements to needs, 41-8
selecting free TCP/IP protocol suites, 41-2-41-6
cost of network management, 41-5
cost of support, 41-4-41-5
cost of using stack lacking robust networking architecture, 41-3-41-4
costs of using stack not designed for complex environments, 41-3
cost of waiting for updates, 41-5-41-6
specific kernel issues, 41-7-41-8
TCP/IP network management, 61-1-61-10
HPOV-ARS integration, 61-7-61-10
customized scripts, 61-8
frontier NETScout, 61-8
operations work-flow model, 61-9-61-10
physical configuration application, 61-8
redundancy application, 61-7-61-8
HPOV implementation, 61-5-61-7
SAS reporting software, 61-6
trouble-ticketing software, 61-6-61-7
mission-critical and fault-tolerant requirements, 61-2
system deployment and sustaining engineering, 61-10
network management system implementation strategy, 61-2-61-5
enterprise network management system, 61-4-61-5
NMS middleware, 61-4
SNMP-based management platform, 61-5
SNMP platform-evaluation criteria, 61-3-61-4
TDI, see Transport driver interface
TDM, see Time division multiplexing
Telecommunications
management network (TMN), 21-6
reform, 21-1
Telecommunications policy process, overview of, 11-1-11-10
beginning of competition, 11-2
competitive local exchange carriers, 11-3
entertainment companies in telephone business, 11-3
foreign entrants, 11-4
long-distance competition, 11-2-11-3
results of Telecommunications Reform Act of 1996, 11-3
telephone companies in entertainment business, 11-3
creation of telecommunications policy, 11-4
drafting custom tariff or agreement with carrier, 11-7-11-8
influencing regulator body, 11-8-11-10
converting feature packages business requirements to custom tariff, 11-9-11-10
negotiating with carrier, 11-9
negotiating price with customer, 11-8-11-9
ratemaking, 11-5-11-7
access charges, 11-6
long-run incremental cost, 11-7
residual ratemaking, 11-6
value of service, 11-6
Telecommunications Reform Act of 1996, II-1
Telemarketers, 62-7
Telephone
line setup, 36-16
network, public switched, 7-7
power failure, 24-7
Telephony
applications, 81-4
server-based, 62-12
Telephony Access Server (TAS), 36-15
Telex, 35-5, 35-10
Telnet
protocol type, 4-7
server, 46-7
Terminal
services, 41-9
settings, 53-13
Test equipment, 17-9
Testing, importance of, 17-7
Text
labels, 77-5
linkages, 30-2
Theft prevention, 59-2
TIFF compression method, 66-7
Time division multiplexing (TDM), 20-1, 22-2
T1 line(s)
connection, 34-2
rerouting on, 8-6
TMN, see Telecommunications management network
Token Ring, 23-10
Topology rules, 26-11
Torts, 40-2, 40-4
Traffic
congestion, 59-1
flow, management of, 26-12
intensity values, 67-5
lights, 56-3
requirements, ongoing, 12-8
Training
benefits of, 17-11
computer-based, 17-11
costs, 6-4
manuals, 82-10
tools, 6-1
Transfer protocols, 13-10
Transmission
asynchronous, 23-4
capability, 7-5
control protocol, 46-5
downstream, 22-3
facility, 17-8, 34-2
protocols, 76-1
radio frequency, 57-6
rate, 22-7
requirements, 18-5
speeds, 59-14
techniques, 15-7
technology, 15-9
types of, 57-6
upstream, 22-3
Transport driver interface (TDI) 25-6
Transport technology, 20-7, 28-1
Trend analysis, 61-10
Trojan Horses, 46-10
Tunneling, 32-13
Type enforcement, 49-1, 49-4
structure, 49-6
tables, 49-8
U
UAs, see User agents
UNI, see User-to-network interface
Unicast address, 32-6
Uninstall process, 2-12
Uninterruptable power supply (UPS), 2-8, 8-19, 52-2
Universal inbox, 37-5
Universal resource locator (URL), 7-6
UNIX
machine, 4-8
servers, 2-9
traditional, 49-9
workstations, 74-1
Unsafe characters, 30-5, 30-6
Unshielded twisted pair (UTP) cables, 26-2
Upgrade
costs, 68-5
methodology, 68-6
planning, 2-5
Uplink port, 27-45
UPS, see Uninterruptable power supply
UPX, see Internetwork packet exchange
URL, see Universal resource locator
UseNet groups, 4-9
USENET newsgroups, 48-4
User
agents (UAs), 31-5
-developer relationship
classification of, 1-6
structuring, 1-8
involvement, 1-6
-to-network interface (UNI), 20-3
support, 64-1
1996 U.S. Telecommunications Act, worldwide deregulation and, 38-1-38-8
coordinating interconnectivity, 38-4-38-6
Network Reliability and Interoperability Committee, 38-5
task groups, 38-5-38-6
deregulation and competition, 38-1
problems with deregulation, 38-2
1996 U.S. Telecommunications Act, 38-2-38-4
interconnection, 38-3
unbundled access, 38-3-38-4
worldwide deregulation activities, 38-6-38-7
Europe’s open network provision, 38-7
framework for action in U.K., 38-7
Japan’s interconnection rules, 38-6
UTP cables, see Unshielded twisted pair cables
V
Vail concept, Theodore, 11-1
Value added network (VAN), 10-10
VAN, see Value added network
Variable bit rate (VBR), 67-3
VBR, see Variable bit rate
VDSL, see Very high data-rate digital subscriber line
Vector data, 18-2
Vending machines, 56-3
Vendor(s), 82-3
choosing and managing, 2-10
specifications, 22-7
Version management, 59-11
Very high data-rate digital subscriber line (HDSL), 22-5
Video
analog, 21-9
cards, 2-8
conferencing, 50-10
-on-demand, 12-11
digital, 12-6
files, 36-23
full-motion, 12-1
integration, value of voice and, 19-9
learning materials, 19-3
packets, 19-6, 19-7
teleconferencing, 51-8
traffic, high-fidelity, 32-11
transmission, 19-5
Videoconferencing, 12-11, 16-10
Virtual machines, 25-3
Virtual Memory Manager, 25-4
Virtual networking management and planning, 51-1-51-11, see also Internet, as virtual network
business case for virtual networking, 51-1-51-2
network accountability, 51-2
network reliability, 51-2
features of switching software, 51-7-51-9
accounting service, 51-9
bandwidth service, 51-8
broadcast service, 51-8-51-9
connection management service, 51-8
directory service, 51-7
security service, 51-8
virtual routing service, 51-9
switching defined, 51-4-51-7
connectionless packet switching, 51-5-51-6
connection-oriented switches, 51-6-51-7
technology case for virtual networking, 51-2-51-3
virtual networking defined, 51-3-51-4
virtual networks vs. virtual LANs, 51-10
Virtual private networks (VPNs), overview of, 33-1-33-10
access arrangements, 33-6
data networking, 33-6-33-9
high-speed data services, 33-7-33-8
low-speed data services, 33-6-33-7
performance objectives, 33-8-33-9
local VPN service, 33-9-33-10
making business case for VPNs, 33-2-33-4
network management, 33-5
VPN concept, 33-1-33-2
Virtual reality, 12-2
Virus(es), 58-4
computer, 40-6, 52-3
macro-based, 73-5
prevention, 73-10
protection, 59-7
stealth, 73-4
types of, 73-3
Virus threats, assessing and eliminating, 73-1-73-11
disclosing virus, 73-6
problems addressed, 73-1-73-6
common spread scenarios, 73-5-73-6
how viruses infect systems, 73-3
major types of viruses, 73-3-73-5
pervasiveness of viral threat, 73-2-73-3
recommended course of action, 73-10-73-11
standard approaches to fighting viruses, 73-6-73-10
behavior blocking, 73-7-73-8
drawbacks of signature scanning, 73-8-73-10
multilevel generic detection, 73-7
signature-based scanner, 73-6
TSR monitoring, 73-7
Voice
capture, 81-3
communications, 62-3
mailbox, 36-20
modems, 52-8
networks, 62-1
transmission, 19-5
Voice recognition interfaces, for multimedia applications, 81-1-81-15
building voice recognition applications, 81-9-81-14
development process, 81-10-81-14
development team, 81-9-81-10
current applications, 81-4-81-6
microphone-input applications for PC, 81-4-81-5
telephony applications, 81-5-81-6
emerging applications, 81-6-81-7
practical systems for widespread use, 81-2-81-4
selecting ASR product, 81-7-81-8
functions and features, 81-7-81-8
performance characteristics, 81-8
VPNs, see Virtual private networks
W
WAN, see Wide area network
WAN network integration, 68-1-68-13
challenges and benefits of implementation, 68-2-68-3
business opportunity, 68-2
technical benefits, 68-3
company background, 68-1-68-2
elements targeted for change, 68-4-68-5
final integration, 68-11-68-12
priorities, 68-3-68-4
upgrade costs, 68-5-68-6
upgrade modeling and refinement, 68-6-68-11
glitches, 68-10-68-11
process, 68-7-68-10
WANs, technology conversions on, 74-1-74-6
corporate involvement, 74-2-74-4
auditing physical network, 74-3
formatting online information about network, 74-3-74-4
scheduling projects, 74-2-74-3
fear of change, 74-2
migration strategies, 74-5-74-6
cables, 74-6
leapfrog approach, 74-5
site preparation, 74-6
Warning signs, examples of, 1-10
Web, see also World Wide Web
address, 30-5
applications, 6-3
architecture, 6-5, 59-16
-based information, 30-10
browsers, 37-1, 60-2
-capable applications, 13-9
clients, 30-4
data structure, 13-5
environment, LAN-like interaction in, 6-6
implementation, 42-2
page(s), 7-6, 44-3
adjustments, 44-7
maintaining commercial, 4-3
search, 44-5
self-service, 6-2
software components, 30-8
technology, 13-1, 13-8
transactions, II-1
Web server connection rate, selecting, 44-1-44-8
basics of connecting to Internet, 44-1-44-3
analog vs. digital leased lines, 44-2
connection constraints, 44-2
WAN connectivity factors, 44-3
LAN bandwidth constraints, 44-6-44-7
making Web page adjustments, 44-7-44-8
performing required computations, 44-3-44-6
problems addressed, 44-1
recommended course of action, 44-8
Web site, supporting, 43-1-43-7
application programming, 43-6-43-7
communications, 43-1-43-3
firewall option, 43-3-43-5
hardware, 43-5
operating system, 43-5-43-6
recommended course of action, 43-7
security issues, 43-3
server software, 43-6
software, 43-5
Whiteboarding, 50-10
Wide area network (WAN), 6-4, 8-4
connectivity factors, 44-3
operating rate, 44-2, 44-8
ports, multiple, 8-22
facilities, testing, 17-7
WiLL, see Wireless local loop, 54-2
Windows 95 applications, 2-7
Windows NT architecture, 25-1-25-8
architecture, 25-1-25-6
hardware abstraction layer, 25-1-25-2
kernel, 25-2-25-3
local procedure call facility, 25-4
NT Executive, 25-3
object manager, 25-3
process manager, 25-3-25-4
security module, 25-6
virtual memory manager, 25-4
upgrade issues, 25-7-25-8
Windows NT networking, 25-6-25-7
Windows NT performance monitoring, 76-1-76-10
observing network performance, 76-5-76-9
considering processor, 76-7-76-8
working with alerts, 76-8-76-9
recommended course of action, 76-10
utilization, 76-2-76-4
Windows NT project planning, 2-1-2-14
choosing and managing vendors, 2-10-2-12
testing standard configurations, 2-12
vendors with strategic Microsoft relationships, 2-11-2-12
establishing business and technical goals for NT deployment, 2-1-2-4
building migration team, 2-2-2-3
business goals, 2-1
gathering information resources, 2-4
IT qualifications needed for deployment team, 2-3-2-4
technical goals, 2-1
evaluating installed base, 2-4-2-10
DOS applications, 2-7
evaluating and testing software, 2-6
identifying, evaluating and testing peripherals, 2-8
integrating Macintosh desktops, 2-8-2-9
mainframes/hosts, 2-9-2-10
planning issues to handle concurrently with evaluation and testing, 2-10
planning new workstations, 2-5
UNIX servers and workstations, 2-9
upgrade planning for existing workstations, 2-5-2-6
upgrading custom applications, 2-7-2-8
Win 16 applications, 2-7
Windows 95 applications, 2-7
planning and managing pilot rollout, 2-12-2-13
preparing for full-scale deployment, 2-13-2-14
Windows Sockets API Tester (WSAT), 41-4
Wireless communications, developing cost-effective strategy for, 55-1-55-13
choosing architecture and access method, 55-4-55-6
agent-based messaging systems, 55-6
continuous-connection architectures, 55-5
E-mail based systems, 55-5-55-6
choosing wireless applications, 55-7-55-9
mobile enterprise application, 55-9
remote access and file synchronization utilities, 55-8
single transaction based applications, 55-8
wireless E-mail and fax systems, 55-7
choosing wireless products, 55-9-55-13
using middleware APIs and developer kits, 55-12
systems for communications management, 55-12-55-13
wireless network technologies and service providers, 55-2-55-4
circuit-switched networks, 55-2-55-3
packet data networks, 55-3-55-4
Wireless communications, for voice and data, 54-1-54-11
outlook for wireless applications, 54-10
wireless communication as alternative to fixed media, 54-9
wireless cost advantage, 54-9
vendor support for wireless solutions, 54-9-54-10
wireless considerations for data communications strategy, 54-4-54-8
CDPD as wireless option, 54-4-54-5
commercial mobile data communications services, 54-6
satellite data, 54-7-54-8
specialized mobile radio, 54-5-54-6
wireless LANs, 54-8-54-9
wireless techniques, 54-2-54-4
cellular voice, 54-2
satellite voice services, 54-3-54-4
wireless PBX systems, 54-2-54-3
wireless radio, 54-2
Wireless local area networks, security of, 57-1-57-10
configuration, 57-3
industry applications, 57-3-57-4
interoperability, 57-2
overview of costs and benefits, 57-2
performance, 57-2-57-3
security concerns, 57-4-57-8
audit mechanisms, 57-9-57-10
circuit availability, 57-8
equipment availability, 57-8
physical configuration, 57-5
service availability, 57-7-57-8
types of transmission, 57-6-57-7
signal availability, 57-8
wireless network controls, 57-8-57-10
Wireless local loop (WiLL), 54-2
Word processing, 13-3
Wordspotting systems, 81-7
Workgroup switches, 63-3, 63-8
Working group mailing list, 39-8
Workplace 2000, 82-1-82-13
accepting idea of self-rescue, 82-6-82-9
adopting Nike model of learning, 82-9-82-10
common thread, 82-1-82-2
providing added value, 82-2-82-6
broadening perspectives, 82-3
expanding skill set, 82-3-82-4
finding out how people define value, 82-2-82-3
proving manager’s value, 82-4-82-6
reassessing personal goals and abilities, 82-10-82-12
World Wide Web (WWW), 4-1, 13-10, 39-5, 79-1
browsing, 12-3
connecting to, 4-2
documents, hyperlinks in, 30-3
home pages, 7-1
protocols, 50-1
security, 30-11
World Wide Web, linking to, 30-1-30-12
embedding Web technology in other products, 30-11-30-12
finding information of Web, 30-5-30-7
reading Web address, 30-5
unsafe characters, 30-5-30-6
URL path structure, 30-6-30-7
how HTTP enables information sharing, 30-3-30-4
close, 30-3-30-4
connection, 30-3
request and response, 30-3
hyperlinks, 30-1-30-3
hypertest markup language, 30-7-30-8
security of Web, 30-11
Web software components, 30-8-30-11
client software, 30-8-30-9
gateways, 30-10
HTML tools, 30-10-30-11
servers, 30-9
viewers, 30-9
window to world, 30-1
Worm, 40-6
Wrappers, 46-13
WSAT, see Windows Sockets API Tester
WWW, see World Wide Web


Previous Table of Contents Next

Copyright © CRC Press LLC