Previous | Table of Contents | Next |
In this section we will focus our attention upon two of the most rapidly evolving areas in the field of communications, the network of interconnected networks known as the Internet and the application of Internet technology for private networks. Although the Internet has its origin in research sponsored by the United States Department of Defense, today it represents a rapidly growing commercial communications medium which delivers electronic mail, advertising, and on-line sales. The importance of the Internet can be judged by advertisements in print and on radio and television, with most advertisers now placing their Web address in their commercials. The rapid introduction of new technologies for supporting Internet applications resulted in many private networks adopting multimedia, electronic mail, real-time audio, and other Internet developed technologies. This in turn facilitates the operation of private networks which can take advantage of the economics of scale associated with the development of technologies oriented towards the large customer base on the Internet. Recognizing the importance of the Internet as both an information delivery and sales mechanism along with its role in providing technologies for use on private networks, this section contains 13 chapters selected to provide us with detailed information covering different aspects of the Internet and internetworking.
The first chapter in this section, The Internet Engineering Task Force, provides us with detailed information on the evolution of the Internet, how Internet standards are developed, and the role of different Internet working groups whose efforts facilitate interoperability and security. After obtaining a solid overview of the role of the Internet Engineering Task Force, the second chapter in this section introduces us to the legal environment of the Internet. In this chapter, The Legal and Regulatory Environment of the Internet, we are introduced to the applicability of contract law, intellectual property rights, torts and negligence, and criminal law as they apply to the Internet. This chapter also discusses the need for system administrators to place appropriate notices and disclosures on their systems, and describes strategies you should consider to ensure your effort in the monitoring and control of your system does not turn into a legal problem.
Prior to Windows 95 most persons had to purchase a TCP/IP protocol stack in order to use FTP or a Web browser. Since the introduction of Windows 95 with its built-in TCP/IP protocol stack and the availability of numerous freeware stacks for other operating systems, we tend to view TCP/IP as free. In the third chapter in this section, The Hidden Cost of Free TCP/IP, we will examine the critical issues associated with the use of free TCP/IP software and obtain an appreciation for the cost of support, network management, and updates that may make free software an expensive proposition.
Although the Internet can be used for transferring files, sending audio and video information, and countless other activities, the key component that provides this capability is the Internet server. In a series of three chapters in this section we will examine how to choose and equip an Internet server, its support requirements, and methods required to ensure your Internet connection rate provides an appropriate level of access to your Web server.
The fourth chapter in this section, Choosing and Equipping an Internet Server, describes how to select an Internet server and the application software which provides it with its capability. The fifth chapter, Supporting a Web Site, introduces us to the communications link, hardware platform, software, and personnel issues that must be examined. In concluding our server examination the sixth chapter in this section, Selecting a Web Server Connection Rate, illustrates the calculations necessary to determine the speed of the connection from your Internet Service Provider to the LAN containing your Web server such that the guesswork associated with connecting a Web server to the Internet is eliminated.
Recognizing the importance of security, five chapters are included in this section to provide you with information concerning the type of illegal activity you can expect to encounter and methods to protect your organizations computational facilities from those threats. In the seventh chapter, Criminal Activity on the Internet, we will become acquainted with the legal and ethical aspects of many types of Internet criminal activities. The eighth chapter, An Introduction to Internet Security and Firewall Policies, provides us with information concerning the protection of traffic on a network via the use of a firewall. This chapter is followed by the chapter titled Firewalls: An Effective Solution for Internet Security. This ninth chapter expands our knowledge concerning the use of firewalls as a security mechanism and acquaints us with their selection factors. Thus, that chapter provides a lead-in to the tenth chapter in this section, Selecting an Internet Firewall. This chapter provides a detailed examination of the different functions and features vendors incorporated into this category of communications equipment as well as the cost and support issues you should consider to obtain a device that satisfies your organizations security requirements. In concluding this section within a section focused on Internet security, the chapter A New Security Model for Networks and the Internet reviews basic security issues and introduces type enforcement as a mechanism for establishing data security.
In concluding this section we will turn our attention to the application of Internet technology for facilitating private network operations. The twelfth chapter in this section, An Intranet Primer, introduces us to the benefits of intranets and their challenges in terms of management, data integrity, security, maintenance, and development. In the last chapter in this section, Virtual Networking Management and Planning, we will examine the issues that must be evaluated to ensure the use of a virtual network provides the level of performance necessary for satisfying organizational requirements.
Previous | Table of Contents | Next |