Introduction
About the Editor

Section I—Planning for Communication Systems
Chapter 1—Improving Communication between End Users and System Developers
USER INVOLVEMENT AND COMMON WISDOM
COOPERATION, COMMUNICATION, AND MUTUAL UNDERSTANDING
The Balance of Influence
Reconciling the Goals between the User and Developer
A CLASSIFICATION OF USER AND DEVELOPER RELATIONS
Quadrant I: The Student and Teacher
Quadrant II: Mutual Partnering
Quadrant III: The Dictatorship
Quadrant IV: The Polarization
STRUCTURING THE USER-DEVELOPER RELATIONSHIP
Assessment
Structuring
Monitoring
SUMMARY
Chapter 2—Windows NT Project Planning
INTRODUCTION
ESTABLISHING BUSINESS AND TECHNICAL GOALS FOR NT DEPLOYMENT
Business Goals for NT Deployment
Technical Goals for NT Deployment
Building the Migration Team
IT Qualifications Needed for the Deployment Team
Gathering Information Resources
EVALUATING THE INSTALLED BASE
Planning for New Workstations
Upgrade Planning for Existing Workstations
Evaluating and Testing Software
Win16 (Windows 3.x) Applications
DOS Applications
Windows 95 Applications
Upgrading Custom Applications
Identifying, Evaluating and Testing Peripherals
Integrating Macintosh Desktops
UNIX Servers and Workstations
Mainframes/Hosts
Planning Issues to Handle Concurrently with Evaluation and Testing
CHOOSING AND MANAGING VENDORS
Vendors with Strategic Microsoft Relationships
Testing Standard Configurations
PLANNING AND MANAGING A PILOT ROLLOUT
PREPARING FOR FULL-SCALE DEPLOYMENT
CONCLUSION
Chapter 03—Inventing the Future: Strategic Planning
LOOKING FORWARD
TOO BUSY
STEP ONE: ANALYZING THE CURRENT SITUATION
STEP TWO: DETERMINING THE DEPARTMENT’S IDENTITY
STEP THREE: DETERMINING THE DEPARTMENT’S FUTURE
Strategic Planning — The Long and Short of It
STEP FOUR: BACK TO THE MISSION STATEMENT
STEP FIVE: THE PLANNING DOCUMENT
Key Result Areas
Goals
Objectives
STEP SIX: DOING IT!
The Value of Strategic Planning
ACTION CHECKLIST
Chapter 4—Framework for Internet Security Planning
INTRODUCTION
CONNECTING TO THE WORLD WIDE WEB
Full Direct Connection
Full Buffered Connection
Standalone Connections
SECURING THE NETWORK ENVIRONMENT
Patching and Preventing Security Holes
Identifying Security Holes
Monitoring Hacker Activity
Encryption Software and Authentication
Encryption
Authentication
FIREWALLS
Router-Based IP-Level Firewalls
Host-Based Application-Level Firewalls
SECURE INTERFACES
SSL
S-HTTP
LEGAL ISSUES
CONCLUSION
Chapter 5—Network Baselining as a Planning Tool
INTRODUCTION
BASELINING TOOLS AND TECHNIQUES
SimpleView
NEWT
EtherVision
Foundation Manager
CONCLUSION
Chapter 6—Developing Corporate Intranets
MOVE OVER, LANS
THE INTRANET IMPACT — WHAT CAN AN INTRANET DO?
Web Self-Service
Intranet Reengineering
Sales Force Automation
Manufacturing and Inventory
Purchasing and Financial
The Web as an Application Platform
NEW MODEL FOR DISTRIBUTED COMPUTING
WAN vs. LAN
Application Publishing — Server vs. Client
N-Tier vs. 2- or 3-Tier
Shared Database Connection vs. Individual Login
Technical Considerations
Scalability and Performance
State and Session Management
SECURITY
WHAT ABOUT JAVA?
OPERATIONAL CONSIDERATIONS
CONCLUSION
Chapter 7—Preparing for Cable Modems
PROBLEMS ADDRESSED
MODEM FUNDAMENTALS
THE QUADRATURE AMPLITUDE MODULATION TECHNIQUE
CABLE MODEMS
From Unidirectional to Bidirectional Systems
A High-Speed Cable Modem Architecture
On the Web
RECOMMENDED COURSE OF ACTION
Chapter 8—Network Disaster Recovery Planning
NETWORK RELIABILITY
Star Topology
Ring Topology
Bus Topology
NETWORK AVAILABILITY
Component Availability
METHODS OF PROTECTION
Tariffed Redundancy and Protection
Further Protective Capabilities
Dial Backup
Rerouting on T1 Lines
Customer-Controlled Reconfiguration
ISDN Facilities
DDS Dial Backup
RECOVERY OPTIONS FOR LANS
Recovery and Reconfiguration
restoration Capabilities of LAN Servers
Levels of Fault Tolerance
REDUNDANT ARRAYS OF INEXPENSIVE DISKS
RAID Level 0
RAID Level 1
RAID Level 2
RAID Level 3
RAID Level 4
RAID Level 5
RAID Level 6
OTHER CONSIDERATIONS
Uninterruptible Power Supplies (UPSs)
Generators
Off-Site Storage
Surge Suppressors
Spare Parts Pooling
Switched Digital Services
Multiple WAN Ports
Links to Remote Sites
Periodic Testing
Worst-Case Scenarios
Training
Insurance
Risk Assessment
SUMMARY

Section II—Business Management Issues
Chapter 9—Pricing Methods Across Linked Networks
PROBLEMS ADDRESSED
CHARGEABLE RESOURCES
NETWORK RESOURCE CATEGORIES
Cable
Linkages
Workstations
Servers
Storage
Communications
LAN Administration Support
EXPENSE CATEGORIES
RATE DETERMINATION
RECOMMENDED COURSE OF ACTION
Chapter 10—Developing a Trusted Infrastructure for Electronic Commerce Services
INTRODUCTION
SERVICE ATTRIBUTE AUTHORITY
Certificate Authority
Digital Signatures
Certificate Repository
Electronic Postmark
Return Receipts
Storage and Retrieval Services
USE OF THESE COMMERCIAL EXCHANGE SERVICES
AVAILABLE TECHNOLOGIES FOR ELECTRONIC COMMERCE
Secure E-mail
DMS and PEM.
Secure World Wide Web
Secure Open EDI
THE OVERRIDING ISSUE: A PUBLIC KEY CERTIFICATE INFRASTRUCTURE
CONCLUSION
Chapter 11—An Overview of the Telecommunications Policy Process
INTRODUCTION
THE BEGINNING OF COMPETITION
Long-Distance Competition
Results of the Telecommunications Reform Act of 1996
Telephone Companies in the Entertainment Business
Entertainment Companies in the Telephone Business
Competitive Local Exchange Carriers (CLECS)
Foreign Entrants
WHO CREATES TELECOMMUNICATIONS POLICY?
THE RATE-SETTING PROCESS: WHO SETS THE PRICE?
The Rate Base
RATEMAKING
Residual Ratemaking
Value of Service
Access Charges
Long-Run Incremental Cost (LRIC)
DRAFTING A CUSTOM TARIFF OR AGREEMENT WITH A CARRIER
INFLUENCING A REGULATORY BODY
Negotiating a Price with the Commissioner
Negotiating with the Carrier
Converting “Feature Packages” Business Requirements to a Custom Tariff
Chapter 12—Business Aspects of Multimedia Networking
INTRODUCTION
BUSINESS DRIVERS OF MULTIMEDIA APPLICATIONS
APPLICATIONS OF NETWORKED MULTIMEDIA
PEOPLE-TO-SERVER APPLICATIONS
Video-on-Demand
WWW Browsing
PEOPLE-TO-PEOPLE APPLICATIONS
Multimedia Conferencing
Types of Multimedia Conferencing Systems
Groupware
TECHNICAL REQUIREMENTS FOR NETWORKED MULTIMEDIA APPLICATIONS
Latency
Synchronization
Bandwidth
Reliability
Guaranteeing Quality of Service
Application Parameters
System Parameters
Network and Device Parameters
Determining Service Levels
SYSTEM CONSIDERATIONS
BARRIERS TO MULTIMEDIA NETWORKING
ISSUES IN MULTIMEDIA SYSTEMS PLANNING
Scalability
Integration
Application/Content Awareness
PLANNING STRATEGIES
CONCLUSION
Chapter 13—Integrating the Web and Enterprisewide Business Systems
INTRODUCTION
THE WEB AND ITS CAPABILITIES
Web Clients
Web Servers
Publishing Tools
Communication Protocols and URLs
Search Engines
WEB LIMITATIONS: UNANSWERED BUSINESS QUESTIONS
INTRANETS
INTEGRATING THE WEB AND ENTERPRISE SYSTEMS
Converting to Hypermedia Pages
Building Linkage Programs
CHALLENGES AND STRATEGY ISSUES
BUILDING A PRESENCE ON THE WEB
EXPANDING AND ENHANCING THE PAGES
PLAN INTRANET APPLICATIONS
PREPARE FOR ELECTRONIC COMMERCE
EDUCATION AND TRAINING
CONCLUSION
Chapter 14—Cost Allocation for Communications Networks
CHARGEABLE RESOURCES
NETWORK RESOURCE CATEGORIES
Internet Gateway Access
EXPENSE CATEGORIES
RATE DETERMINATION
SUMMARY

Section III—Networking Technology
Chapter 15—New Modem Technologies and Trends
INTRODUCTION
THE EVOLUTION OF PACKAGING
External Modems
Internal Modems
PCMCIA Cards
CDPD Modems
Other Multiport Modems
Multimedia Extensions (MMX) Technology
Host Signal Processor Modems
MODEM FEATURES
Modulation Techniques
Speed
Error Correction
Data Compression
Diagnostics and Other Features
SECURITY
TRANSMISSION TECHNIQUES
PC-to-PC or PC-to-Mainframe
Wireless Modems
Private Wireless Networks
Multifrequency Modems
Multimedia (Hybrid) Modems
Cable Modems
ROLE OF DIGITAL SIGNAL PROCESSING
Digital Simultaneous Voice and Data
56K-bps Modems
CONCLUSION
Chapter 16—Multicast Networking
INTRODUCTION
MULTICAST LANS
Multicast Frame Relay
One-Way Multicast
Two-Way Multicast
N-Way Multicast.
Multicast Switched Multimegabit Data Service
COMPARING BROADCAST AND MULTICAST IP
The IP Multicast Protocol
Class D Addressing
Starting a Report Delay Timer
Sending a Report that Other Members Overhear
The Multicast Backbone
Multicast Routing Protocols
APPLICATIONS
Dynamic Groups
Videoconferencing
Dataconferencing
Real-Time Distribution of Multimedia Information
VENDOR OFFERINGS
CONCLUSION
Chapter 17—Frame Relay Testing and Training
INTRODUCTION
ADVANTAGES OF PACKET-SWITCHING FRAME RELAY NETWORKS
DISADVANTAGES OF FRAME RELAY
ANATOMY OF THE FRAME RELAY FRAME
The Frame Header
The DLCI
Congestion Control
The Information Field
The FCS Field and Flags
Local Management Interface
THE IMPORTANCE OF TESTING
Testing the WAN Facilities
Frame Relay Internetwork Service Testing
Commissioning the Frame Relay Service
End-to-End Analysis
TRAINING ISSUES UNIQUE TO FRAME RELAY
THE PROVIDER’S PERSPECTIVE
THE SUBSCRIBER’S PERSPECTIVE
The Benefits of Training
CONCLUSION
Chapter 18—Working with Images in Client/Server Environments
INTRODUCTION
AN OVERVIEW OF IMAGING
Storage and Color Depth
Data Storage
Color-Depth Tradeoffs
Data Transmission
MANAGING STORAGE AND TRANSMISSION REQUIREMENTS
File Format
Cropping
File and Image-Type Conversions
CONCLUSION
Chapter 19—Voice and Video on the LAN
INTRODUCTION
THE VALUE OF VOICE AND VIDEO ON THE LAN
New Types of Applications
Infrastructure Efficiencies
LAN TECHNOLOGIES FOR INTEGRATED VOICE AND VIDEO
Asynchronous Transfer Mode (ATM)
Shared and Switched LANs
Hybrid ATM Networks
Standards for LAN-based Voice and Video Applications
Additional Components: Gateways and Gatekeepers
CONCLUSION
CHAPTER 20—Inverse Multiplexing ATM, Bit by Bit
INTRODUCTION
ATM’s POSITION IN THE MARKETPLACE
INVERSE MULTIPLEXING FOR ATM
Cell-Based ATM Inverse Multiplexing
NXT1 ATM INVERSE MULTIPLEXING — CLEAR CHANNEL ATM
Alternatives to Adding a New UNI
Support for Non-ATM and Multimedia Traffic
Compatibility and Cost Savings
CONCLUSION
Chapter 21—Hybrid Fiber/Coaxial Networks
INTRODUCTION
OVERVIEW OF HFC NETWORKS
REQUIREMENTS FOR MANAGING HFC NETWORKS
Achieving Interactivity
“Digital” Requires Monitoring
SERVICES RUNNING ON THE HFC NETWORK
Analog Video Service
Digital Services
IDEAS FOR MANAGING THE HFC NETWORK
Telecommunications Management Network (TMN) Model
Example: High-Speed Data Services over HFC
HFC Equipment
Status Monitoring Systems
Standard Management Capabilities
Monitoring Non-Standard Services
Manager/Agent Application for Controlling HFC Equipment
CONCLUSION
SNMP vs. CMIP
Chapter 22—Choosing Asymmetrical Digital Subscriber Lines
INTRODUCTION
ASYMMETRICAL DIGITAL SUBSCRIBER LINES (ADSL)
Discrete Multitone (DMT) Operation
Carrierless Amplitude/Phase (CAP) Modulation
ADSL Developments and Field Tests
ADDITIONAL DSL TECHNOLOGIES
CONCLUSION
Chapter 23—Multimedia Networking Technologies
INTRODUCTION
LAN TECHNOLOGIES
Asynchronous Ethernet
Fast Ethernet
100VG-AnyLAN
FDDI
FDDI II
ASYNCHRONOUS TRANSFER MODE
ATM Architecture
LAN Emulation
WAN TECHNOLOGIES
Frame Relay
Internet Protocol
RSVP
NHRP
Switched Multimegabit Data Service (SMDS)
Fiber Channel
Suitability of WAN-based ATM
CONCLUSION
Chapter 24—The Basics of Computer System and Data Network Security
PROBLEMS ADDRESSED
BASIC SECURITY FUNCTIONS
SECURITY VIOLATIONS
AVOIDANCE
Avoiding Unauthorized Access
Screening Nonemployees
Maintaining a Low Profile
Distributed Environments
Avoiding Misuse
Avoiding Damage
DETERRENCE
Deterring Unauthorized Access
Deterring Misuse and Damage
PREVENTION
Preventing Unauthorized Access
Preventing Misuse and Damage
DETECTION
Detecting Unauthorized Access
Detecting Misuse
Detecting Damage
RECOVERY
Recovering from Unauthorized Access
Recovery from Misuse and Damage
CORRECTION
Correcting Access Control Deficiencies
RECOMMENDED COURSE OF ACTION
CHAPTER 25—Windows NT Architecture
INTRODUCTION
ARCHITECTURE
Hardware Abstraction Layer
Kernel
The NT Executive
Object Manager
Process Manager
Virtual Memory Manager
Local Procedure Call Facility
I/O Manager
The Security Module
WINDOWS NT NETWORKING
UPGRADE ISSUES
CONCLUSION

Section IV—Interoperability and Standards Issues
Chapter 26—Introduction to 100BASE-T: Fast (and Faster) Ethernet
INTRODUCTION
HOW IT WORKS: AN ISO VIEW
100BASE-TX
100BASE-T4
100BASE-T2
Media-Independent Interface (MII)
Auto-Negotiation
Full Duplex Operation
Flow Control
Repeaters and Repeater Connections
Topology Rules
Gigabit Ethernet
IMPACTS ON NETWORK DESIGN
Chapter 27—A Better Fast Ethernet: 100VG-AnyLAN
INTRODUCTION
FAST ETHERNET EVOLUTION
100BaseT
100VG-AnyLAN
Asynchronous Ethernet
HUB ARCHITECTURE
Hub Operation
Round-Robin Scanning
Network Layers
PMI Sublayer Functions
PMD Sublayer
CONCLUSION
Chapter 28—Applications and Business Issues of Fiber Channel
INTRODUCTION
HOW FIBER CHANNEL DIFFERS FROM OTHER TRANSPORT TECHNOLOGIES
Shared Storage, Computing, and Network Resources
Fiber Channel Economics
Processor Speeds
FIBER CHANNEL AS A SERVER TECHNOLOGY
NETWORKING
APPLICATIONS
CONCLUSION
Chapter 29—Fiber Channel Architecture, Layers, and Services
INTRODUCTION
FIBER CHANNEL LAYERS
Channel Networking
Chip Coding
Physical, Behavioral, and Logical Subsets
MESSAGE STRUCTURE DEFINITION
Exchanges
Sequences
Frame
SCALABILITY AND GUIDELINES FOR USE
Point-to-Point Connections
Fiber Channel Fabrics
Arbitrated Loop
Fiber Channel Application Interconnection
CONCLUSION
Chapter 30—Linking to the World Wide Web
A WINDOW TO THE WORLD
HYPERLINKS
HOW HTTP ENABLES INFORMATION SHARING
Connection
Request and Response
Close
FINDING INFORMATION ON THE WEB
How to Read a Web Address
Unsafe Characters
URL Path Structure
HYPERTEXT MARKUP LANGUAGE
WEB SOFTWARE COMPONENTS
Client Software
Servers
Viewers
Gateways
HTML Tools
HOW SECURE IS THE WEB?
EMBEDDING WEB TECHNOLOGY IN OTHER PRODUCTS
Chapter 31—X.400 vs. SMTP
INTRODUCTION
X.400 BACKGROUND
SMTP BACKGROUND
SMTP/MIME
ELECTRONIC MAIL
THE X.400 AND SMTP/MIME DEVELOPMENT PROCESS
THE SMTP VS. X.400 DEBATE
SMTP/MIME CHARACTERISTICS
X.400 CHARACTERISTICS
INDUSTRIAL-STRENGTH MESSAGING REQUIREMENTS
Critical Comparison Factors
Functionality
Security
Systems Management
Managing a Messaging System
Industry Standards for E-mail Management
EMA Requirements for Messaging Management
Message Management
Human Resources Requirements and Support Costs
Performance
Commercial Use
CONCLUSION
Chapter 32—IPv6: The Next-Generation Internet Protocol
INTRODUCTION
IPV6 BACKGROUND AND FEATURES
Differences Between IPv4 and IPv6
Improved Terminology of IPv6
IPV6 HEADER FORMAT
IPV6 ADDRESSES
Address Prefix Allocation
The Provider-Based Unicast Address
IPv4-Compatible Addresses
Multicast Addresses
IPV6 EXTENSION HEADERS AND OPTIONS
IPV6 QUALITY-OF-SERVICE (QOS) PARAMETERS
IPV6 SECURITY
IP Authentication Header
IP Encapsulating Security Payload
ICMPV6
MIGRATION TO IPV6
6bone Trials
CONCLUSION

Section V—Organizational Communications Services
Chapter 33—Overview of Virtual Private Networks
INTRODUCTION
THE VPN CONCEPT
MAKING THE BUSINESS CASE FOR VPNs
Billing Options
NETWORK MANAGEMENT
ACCESS ARRANGEMENTS
DATA NETWORKING OVER THE VPN
Low-Speed Data Services
High-Speed Data Services
Performance Objectives
LOCAL VPN SERVICE
CONCLUSION
Chapter 34—Using the Internet as a Virtual Network
VIRTUAL NETWORKING CONCEPTS
INTERNET ECONOMICS
Equipment Cost
RELIABILITY ISSUES
Network Predictability
SECURITY CONSIDERATIONS
Packet Filtering Router
Using Firewalls
RECOMMENDED COURSE OF ACTION
Chapter 35—Popular E-mail Systems
INTRODUCTION
ELECTRONIC MESSAGING: A HISTORICAL PERSPECTIVE
PRIMARY ELECTRONIC MESSAGING SYSTEM CATEGORIES
FEATURES AND FUNCTIONS
X.400 and SMTP
X.500 Directory Service
Features and Services Checklists
Features for Creating Messages
Editing Capability
Attaching Files
File Compression
Distribution Lists
Importing Text
Signature Files
Forms
E-MAIL SERVICES
Directories
System Directories vs. Local Address Books
Fax Gateways
Message Notification
Security
Gateways
X.400 Software
Telex, Fax, and Wireless
Popular Messaging Systems
CONCLUSION
Chapter 36—Novell Messaging Products
DEFINING THE FUTURE OF NETWORKING
MESSAGE HANDLING SERVICES
Global Message Handling Services
MHS Services for NetWare 4.1
GROUPWISE
GroupWise Positioning
Integrated Messaging Services
GroupWise 4.1 Electronic Messaging Architecture
GroupWise 4.1 Message Server
GroupWise Gateways
GroupWise Administration
GroupWise Telephony Access Server
GROUPWISE 5
Empowering People to Act on Information
Solutions to the Problem
Business Solutions
The GroupWise 5 Desktop
SUMMARY
Chapter 37—An Introduction to Microsoft Exchange Server
TRENDS IN MESSAGING AND COLLABORATION
Unifying LAN- and Host-Based E-Mail
The Microsoft Exchange Product Family
INFRASTRUCTURE FOR MESSAGING AND COLLABORATION
Universal Inbox
Tight Integration with Desktop Applications
Fast, Secure, and Reliable
Remote Client Access
Scalable
REDEFINING GROUPWARE
Group Scheduling
Public Folders
Bulletin Boards
Outlook Forms
Public Folder Replication
Offline Folder Synchronization
Easy-to-Create Groupware Applications
MAPI: Messaging Application Programming Interface
INTERNET CONNECTIVITY
Integrated Internet Support
Direct Connections over the Internet for Mobile Users
Support for Internet Newsgroups and Discussion Groups
Outlook Web Access
EASY AND POWERFUL CENTRALIZED ADMINISTRATION
Easy-to-Use Graphical Administration Program
Information Moves Reliably
Microsoft Exchange Server Components
Single Interface for Global Management
Client Support
Manage all Components from a Single Seat
Easy Migration
BUILDING A BUSINESS STRATEGY AROUND MICROSOFT EXCHANGE SERVER
Downsizing
Connecting Multisystem Environments
Upgrading Current Microsoft Mail Systems
SUMMARY
CHAPTER 38—The 1996 U.S. Telecommunications Act and Worldwide Deregulation
DEREGULATION AND COMPETITION
PROBLEMS WITH DEREGULATION
THE 1996 U.S. TELECOMMUNICATIONS ACT
Interconnection
Unbundled Access
COORDINATING INTERCONNECTIVITY
Network Reliability and Interoperability Committee (NRIC)
Task Groups
WORLDWIDE DEREGULATION ACTIVITIES
Japan’s Interconnection Rules
Europe’s Open Network Provision
The U.K. — A Framework for Action
SUMMARY

Section VI—The Internet and Internetworking
Chapter 39—The Internet Engineering Task Force
THE EVOLVING ADMINISTRATION OF THE INTERNET
The Internet Society
INTERNET ENGINEERING TASK FORCE OVERVIEW AND CHARTER
INTERNET ENGINEERING TASK FORCE STRUCTURE AND INTERNET STANDARDS PROCESS
INTERNET ENGINEERING TASK FORCE SECURITY AREA WORKING GROUPS
Authenticated Firewall Traversal Working Group
Common Authentication Technology Working Group
Domain Name System Security Working Group
Internet Protocol Security Protocol Working Group
One-Time Password Authentication Working Group
Privacy-Enhanced Electronic Mail Working Group
Public-Key Infrastructure (X.509) Working Group
Web Transaction Security Working Group
CONTACTING THE INTERNET SOCIETY AND IETF
Chapter 40—The Legal and Regulatory Environment of the Internet
INTRODUCTION
DEFINING THE SITUATION
Contract Law
Intellectual Property
Torts and Negligence
Criminal Law
LIABILITY ISSUES
An International Perspective
A Role in the Events
Product Liability
LIABILITIES AND AVAILABLE REMEDIES
Money Damages
Injunctions
Criminal Liability
Lawyer Liability
AVOIDING PROBLEMS
Prosecution of Hackers
CONCLUSION
Chapter 41—The Hidden Costs of Free TCP/IP
INTRODUCTION
SELECTING FREE TCP/IP PROTOCOL SUITES
What Are the Costs of Using a Stack That Is Not Designed for Complex, Heterogeneous Environments?
What Is the Cost of Using a Stack That Lacks a Robust Networking Architecture?
What Is the Cost of Support?
What Is the Cost of Network Management?
What Is the Cost in Waiting for Updates?
KERNEL APPLICATIONS: THE SILENT TCP/IP ISSUE
KERNEL APPLICATIONS MAKE A DIFFERENCE
SPECIFIC KERNEL ISSUES
MATCHING REQUIREMENTS TO NEEDS
MPTN ELIMINATES THE COMPROMISES OF TCP/IP IN AS/400 ENVIRONMENTS
Limitations of TCP/IP
CONCLUSION
Chapter 42—Choosing and Equipping an Internet Server
INTRODUCTION
INTERNET AND INTRANET SERVICES
PLATFORM CONSIDERATIONS
Processor Architecture
Operating System: UNIX vs. NT
Fault Tolerance
INTERNET APPLICATION SOFTWARE
Communications Software
Commerce Software
News Software
Mail Software
Proxy Software
Firewall Software
WEB DATABASE CONSIDERATIONS
Maintenance and Testing Tools
Design Tools
COMMON GATEWAY INTERFACE
CONCLUSION
Chapter 43—Supporting a Web Site
COMMUNICATIONS
SECURITY ISSUES
THE FIREWALL OPTION
HARDWARE
SOFTWARE
OPERATING SYSTEM
SERVER SOFTWARE
APPLICATION PROGRAMMING
RECOMMENDED COURSE OF ACTION
Chapter 44—Selecting a Web Server Connection Rate
PROBLEMS ADDRESSED
BASICS OF CONNECTING TO THE INTERNET
Analog vs. Digital Leased Lines
Connection Constraints
WAN Connectivity Factors
PERFORMING THE REQUIRED COMPUTATIONS
Hit Estimation
LAN BANDWIDTH CONSTRAINTS
Determining the Effect on Local Traffic
MAKING WEB PAGE ADJUSTMENTS
RECOMMENDED COURSE OF ACTION
Chapter 45—Criminal Activity on the Internet
PROBLEMS ADDRESSED
HISTORY AND SCOPE
PRIVACY AND E-MAIL
ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986
LIBEL
FRAUD
SOFTWARE PIRACY
FLAMING
FREE SPEECH
HACKERS AND PASSWORD PROTECTION
RECOMMENDED COURSE OF ACTION
Chapter 46—An Introduction to Internet Security and Firewall Policies
INTRODUCTION
THE CHARACTERISTICS OF THE INTERNET
Public and Open
Inclusive Network of Networks
Mesh Topology
Flat
Broadcast
Different Types of Internet Connections
Increasing Interoperability
No Central Authority
INTERNET PROTOCOLS
The Internet Protocol
The Transmission Control Protocol
The Oldest and Most Widely Used Protocols
Other Common Protocols
INTERNET APPLICATIONS
E-mail
Logging on to a Remote System
File Transfer
VULNERABILITIES ON THE INTERNET
ATTACKS ON THE INTERNET
Eavesdropping
Packet and Password Grabbers
Address Spoofing
Trojan Horses
Browsing
Exhaustion
Denial of Service
DEFENDING AGAINST ATTACKS ON THE INTERNET
Isolation and Compartmentation
Policies
Bastions
Filters
Wrappers
FILTERS: THE MOST POPULAR DEFENSE
Filters Implemented by Using Routers
Packets by Address: IP Address and Port
Protocols
FIREWALLS
Firewall Policy Positions
Choosing a Firewall Policy
A Conservative Firewall Policy
ENCRYPTION
USING THE INTERNET IN A RELATIVELY SAFE ENVIRONMENT
CONCLUSION
Chapter 47—Firewalls: An Effective Solution for Internet Security
INTRODUCTION
INTERNET SECURITY THREATS
INTERNET SECURITY CONTROLS
Encryption
One-Time Passwords
Firewalls
USING FIREWALLS EFFECTIVELY
Choosing the Right Firewall
The Importance of a Firewall Policy
Security Maintenance
CONCLUSION
Chapter 48—Selecting an Internet Firewall
INTRODUCTION
THE RISKS ASSOCIATED WITH INTERNET CONNECTIONS
Downtime
Sophistication of Attacks
Likelihood of Attack
HOW TO ASSESS THE RISKS OF INTERNET CONNECTIONS
Mission Critical Networking
Service-Oriented Requirements Analysis
Defining Security Requirements for Services
DIFFERENT TYPES OF FIREWALLS
Router Screening
Dual-Homed Gateway
Proxy Firewalls
Dynamic Packet Filtering
SECURITY COMPROMISES IN FIREWALLS
CASE STUDIES
An Academic Organization
A Research Laboratory
An Electronic Commerce Application
MANAGERIAL ISSUES
Maintaining Typical Firewalls
Building a Firewall
Is the Firewall Secure?
COST ISSUES
Does More Expensive Buy More Security?
COSTS AND DELIVERY
A Typical Firewall Installation
What Vendors Typically Provide with a Firewall
What Vendors Typically, Do Not Provide with a Firewall
CONCLUSION
Chapter 49—A New Security Model for Networks and the Internet
INTRODUCTION
SECURITY BASICS
Denial of Service
Compromising the Integrity of the Information
Disclosure of Information
The Information Bucket
TYPE ENFORCEMENT
Subsystem Separation
Assured Pipelines
SIDEWINDER IMPLEMENTATION OF TYPE ENFORCEMENT
Two Kernels
Controlled System Calls
Network Separation
Protecting Internet Servers
THE SIDEWINDER 2.0 CHALLENGE
Challenge Site Information
CONCLUSION
Chapter 50—An Intranet Primer
INTRODUCTION
BENEFITS OF INTRANETS
Cost-Effective Communications
Efficient Information Management
Easier Information Publishing
Improved Searching and Retrieval
Enhanced Real-Time Collaboration
INTRANET CHALLENGES
SECURITY ISSUES
COSTS
CASE STUDY
THE IDEA FACTORY
The Marketplace Insider
Intranet Skills Sets
IMPLICATIONS OF JAVA AND NETWORK-CENTRIC COMPUTING
Lower Cost of Network Ownership
Platform-Independent Applications Development
CONCLUSION
Chapter 51—Virtual Networking Management and Planning
INTRODUCTION
THE BUSINESS CASE FOR VIRTUAL NETWORKING
Network Reliability
Network Accountability
THE TECHNOLOGY CASE FOR VIRTUAL NETWORKING
VIRTUAL NETWORKING DEFINED
Using Telephony as a Model
SWITCHING DEFINED
Connectionless Packet Switching
Connection-Oriented Switches
FEATURES OF SWITCHING SOFTWARE
The Virtual Network Server
VIRTUAL NETWORKS VS. VIRTUAL LANS
CONCLUSION

Section VII—Mobile Communications Systems
Chapter 52—Safe Mobile Computing
INTRODUCTION
DETERMINING IF AN ORGANIZATION IS AT RISK
POWER PROTECTION
COMPUTER VIRUSES
SECURITY PROGRAMS
Windows ’95
GENERAL BACKUPS
External Drives
Data Recovery Centers
Tips for Users
BACKING UP PDAS
Data Transfers
PHYSICAL SECURITY: LOCKS AND CASES
Cellular Phone Safety
Securing Equipment and Premises Remotely
PRACTICES FOR SAFE COMPUTING
Cataloging Equipment: The Specifics
Hardware and Software Setups
Security Setups
The Orientation Session
Tips for Securing the Mobile Office
Tips for Safe Public Use
Tips for Safe Storage
CONCLUSION
Chapter 53—Portable Network Access
MODEM TERMS
Error Detection and Correction
Data Compression
Command Set Recognition
NETWORK ACCESS
British Telecom (BT) TYMNET
Commercial Dialing from Hotels and Pay Phones
CompuServe Information Service
CompuServe Quick Access Reference
Dow Jones News/Retrieval
FTS2000 Offnet Calling
MCI Mail
U.S. Sprint SprintNet
SUMMARY
Chapter 54—Wireless Communications for Voice and Data
WIRELESS TECHNIQUES: A STRATEGY FOR WORLDWIDE VOICE COMMUNICATIONS
Cellular Voice
Wireless Radio
Wireless PBX Systems
Satellite Voice Services
WIRELESS CONSIDERATIONS FOR A DATA COMMUNICATIONS STRATEGY
CDPD as a Wireless Option
Specialized Mobile Radio
Commercial Mobile Data Communications Services
Satellite Data
WIRELESS LANS
WIRELESS COMMUNICATION AS AN ALTERNATIVE TO FIXED MEDIA
The Wireless Cost Advantage
Vendor Support for Wireless Solutions
OUTLOOK FOR WIRELESS APPLICATIONS
SUMMARY
Chapter 55—Developing a Cost-Effective Strategy for Wireless Communications
WIRELESS NETWORK TECHNOLOGIES AND SERVICE PROVIDERS
Circuit- Switched Networks
Packet Data Networks
CHOOSING AN ARCHITECTURE AND ACCESS METHOD
Continuous-Connection Architectures
E-mail Based Systems
Agent-Based Messaging Systems
CHOOSING WIRELESS APPLICATIONS
Wireless E-mail and Fax Systems
Remote Access and File Synchronization Utilities
Single-Transaction Based Applications
Mobile Enterprise Applications
CHOOSING WIRELESS PRODUCTS
Using Middleware APIs and Developer Kits
Systems for Communications Management
SUMMARY
Chapter 56—Cellular Digital Packet Data: An Emerging Mobile Network Service
INTRODUCTION
CDPD FUNDAMENTALS
Underlying Technologies
APPLICATIONS FOR CDPD
EMERGING CLASS OF REMOTE USERS
SERVICE PRICING
BENEFITS TO MOBILE USERS
EQUIPMENT REQUIREMENTS
NETWORK ARCHITECTURE AND PROTOCOLS
Mobile Data-Intermediate Systems
Mobile Database Systems
Mobile-End Systems
MOBILITY MANAGEMENT
MOBILE NETWORK REGISTRATION PROTOCOL
MOBILE NETWORK LOCATION PROTOCOL
INFORMATION PROTECTION
CDPD NETWORK BACKBONE
Mobile-End Systems Protocols
TRANSPARENT OPERATION
SENDING DATA FROM A MOBILE UNIT
Registration Procedure
Sending Data to a Mobile Unit
IS THERE A MASS MARKET FOR CDPD?
CONCLUSION
Chapter 57—Security of Wireless Local Area Networks
INTRODUCTION
AN OVERVIEW OF COSTS AND BENEFITS
INTEROPERABILITY
PERFORMANCE
CONFIGURATION
INDUSTRY APPLICATIONS
SECURITY CONCERNS
Physical Configuration
Types of Transmission
Service Availability
Signal Availability
Circuit Availability
Equipment Availability
WIRELESS NETWORK CONTROLS
Protective Security Mechanisms
Audit Mechanisms
CONCLUSION
Chapter 58—Protection of Mobile Computing Assets
KEEPING PACE WITH CHANGE
DETERMINING THE VALUE OF INFORMATION
Computer Security Principles
PROTECTING THE MOBILE OFFICE
Computer Theft
Theft of Information
Malicious Code
Eavesdropping
SETTING SECURITY POLICY
Chapter 59—Mobile User Security
AVAILABILITY
Scheduling Considerations
Physical Considerations
Notebook Connectivity
Telephone Communications Tools
CONTINUITY
Creating Mobile Backup
Loss of Computing Resources
INTEGRITY
Software Considerations
CONFIDENTIALITY
Mobile Employee Information Security Recommendations
Software Considerations
NEW TECHNOLOGY CONSIDERATIONS
SUMMARY

Section VIII—Implementation and Case Studies
Chapter 60—Integrating Electronic Messaging Systems and Infrastructures
PROBLEMS ADDRESSED
HOW TO ACCOMPLISH ROLLOUT AND MANAGE CONSTRAINTS
Resource Constraints: Financial
Resource Constraints: Expertise
Functionality and Scope
Supporting Internal and External Customers
IMPLEMENTATION MODELS AND ARCHITECTURES
Infrastructure vs. Interface
IMPLEMENTATION SCENARIOS: A TIERED APPROACH
One-Tier Messaging Model
Two-Tier Model: Multiple Servers
Application Gateways for Integrating Dissimilar Systems
Distributed Hubs
THREE DEPLOYMENT ARCHITECTURES AND OPTIONS
Common Platform Architecture
Multiple Backbone Model
Common Backbone
ESTABLISHING MESSAGING POLICIES AND PROCEDURES
Privacy
Proprietary and Confidential Information
RECOMMENDED COURSE OF ACTION
Network Connections
Operating Systems
Backup
Applications Support
Chapter 61—TCP/IP Network Management: A Case Study
INTRODUCTION
MISSION-CRITICAL AND FAULT-TOLERANT REQUIREMENTS
NETWORK MANAGEMENT SYSTEM IMPLEMENTATION STRATEGY
The SNMP Platform-Evaluation Criteria
The NMS Middleware
The Enterprise Network Management System
The SNMP-Based Management Platform
HPOV IMPLEMENTATION
SAS Reporting Software
Trouble-Ticketing Software
HPOV-ARS INTEGRATION
Redundancy Application
Physical Configuration Application
Frontier NETScout
Customized Scripts
Operations Work-Flow Model
SYSTEM DEPLOYMENT AND SUSTAINING ENGINEERING
NMS Status
Chapter 62—Integrating Voice and LAN Infrastructures and Applications
PROBLEMS ADDRESSED
MIGRATING THE LAN INFRASTRUCTURE
Solutions for Delay-Sensitive Applications
Desktop Switching
Minimize Routing
Controlling LAN Backbone Traffic
CONSOLIDATION OF THE CABLING PLANT
MIGRATING THE DESKTOP
Hardware Upgrades
Software Upgrades
MIGRATING THE PBX
Legacy Telephony
Linking Distributed PBX Components
Server-Based Telephony
MIGRATING USERS
CONSOLIDATING THE VOICE AND DATA ORGANIZATIONS
Infrastructure Maintenance and Support Staff
RECOMMENDED COURSE OF ACTION
Chapter 63—Creating Network Expressways Using Ethernet Switching Engines
INTRODUCTION
CONSERVING BANDWIDTH
GOING BEYOND SEGMENTATION
ABOUT ETHERNET SWITCHES
Desktop Switches
Workgroup Switches
Backbone Switches
NOT ALL SWITCHES PERFORM THE SAME
Cut-Through Switching
Store-and-Forward Architecture
MULTIPROTOCOL (WORKGROUP) SWITCHING
Firewalls
Network Considerations
Switch Types
TYPICAL MIDRANGE SWITCH
APPLICATION
TRIGGERING EVENTS
A NETWORK IN TRANSITION — A CASE STUDY
NETWORK MANAGEMENT CONCERNS
ATM SWITCHING AND LAN EMULATION
Not Plug and Play
ATM Is Not Cheap
Multi-Access LAN Servers
CONCLUSION
Chapter 64—Remote LAN/WAN Connections: A Case Study
ESTABLISHING A BASELINE
Existing Resources
DEFINING THE OPTIONS
DEFINING THE EXISTING RESOURCES
DEFINING THE BUSINESS OBJECTIVE
CONNECTIVITY OPTIONS
Physical Connections
Wireless Connections
Eliminating Inappropriate Connectivity Technologies
THE FIRST OPTION: FIBER OPTICS
Fiber Optic Data Transmission
Fiber Optic Cabling
Advantages
Disadvantages
Costs
THE SECOND OPTION: MICROWAVE
Licensing Requirements
Advantages
Disadvantages
Costs
THE THIRD OPTION: INFRARED
Licensing Requirements
Advantages
Disadvantages
Cost
THE FINAL ANALYSIS
Weighing the Factors
Cost Comparisons
RECOMMENDATIONS
The Decision on Microwave Technology
The Decision on Infrared Technology
The Decision on Fiber Optics
IMPLEMENTATION AND INSTALLATION PLANNING
SUMMARY
Chapter 65—Considerations for Implementing Corporate Intranets
INTRODUCTION
“FAT” VS. “THIN” CLIENTS
TRADITIONAL CLIENT/SERVER
JAVA-ENABLED BROWSERS
Applets
ActiveX and Java
Scripting Languages
FEEDING CLIENT APPLICATIONS
COST ISSUES
IMPROVING NETWORK PERFORMANCE
Intranet Switching
INTRANET OPERATING SYSTEM
IntranetWare
THE EVER-PRESENT FIREWALL
Packet Filtering
Circuit-Level Gateway
Applications Servers
INTRANET SERVER MANAGEMENT
IP Administration
Managing Bandwidth
A Policy-Based Solution
CONCLUSION
Chapter 66—Minimizing the Effect of Digital Camera Images on Networks
INTRODUCTION
OPERATION
IMAGE RESOLUTION
IMPORTANCE OF COMPRESSION
THE CAMERA CONNECTION
CAMERA ACCESS SOFTWARE
IMAGE STORAGE
TIFF CONSIDERATIONS
RECOMMENDED COURSE OF ACTION
Chapter 67—Planning, Designing and Optimization of Enterprise Networks
INTRODUCTION
THE ENTERPRISE DATABASE (EDB)
TRAFFIC ENGINEERING TECHNIQUES AND TOOLS
CIRCUIT-SWITCHED VOICE AND VIDEO TRAFFIC
PACKET-SWITCHED DATA TRAFFIC
MODELING TRAFFIC FLOWS IN A BRAND NEW ENTERPRISE NETWORK
MODELING TRAFFIC FLOWS IN AN EXISTING ENTERPRISE NETWORK
MODELING TIME-CONSISTENT AVERAGES (TCAS) OF TRAFFIC FLOWS
MODELING TRAFFIC GROWTH DURING THE SYSTEM LIFE CYCLE
PERFORMANCE ISSUES
NETWORK SYSTEM PERFORMANCE
TOTAL MONTHLY COSTS
SYSTEM THROUGHPUT
SYSTEM QUALITY-OF-SERVICE (QOS)
SYSTEM GRADE-OF-SERVICE (GOS)
DEFINING ENTERPRISE PERFORMANCE GOALS
MAJOR NETWORK DESIGN ISSUES
PREVIOUS NETWORK DESIGN TECHNOLOGY
SIMULATION TOOLS
NEW NETWORK DESIGN TECHNOLOGY
ONE EXAMPLE: THE ECONETS NETWORK PLANNING AND DESIGN PACKAGE
AN ENTERPRISE NETWORK PLANNING AND DESIGN CASE STUDY — ECONETS
Chapter 68—WAN Network Integration: A Case Study
COMPANY BACKGROUND
THE CHALLENGES AND BENEFITS OF IMPLEMENTATION
The Business Opportunity
Technical Benefits
PRIORITIES
ELEMENTS TARGETED FOR CHANGE
UPGRADE COSTS
UPGRADE MODELING AND REFINEMENT
The Process
Some Glitches
THE FINAL INTEGRATION
SUMMARY

Section IX—Network Operations and Management
Chapter 69—How to Work with a Consultant
INTRODUCTION
WHAT KIND OF CONSULTANTS DOES THE DEPARTMENT NEED?
ESTABLISHING A CLEAR CHAIN OF COMMAND
OBTAINING A SUITABLE SKILL SET
PLANNING FOR THE CONSULTANT’S ARRIVAL
Telling the IT Staff
Focusing the Project
Preparing a Workspace
MAXIMIZING THE WORKING RELATIONSHIP
RECOMMENDED COURSE OF ACTION
Chapter 70—Open Systems Integration: Issues in Design and Implementation
PROBLEMS ADDRESSED
ISSUES IN OPEN SYSTEMS INTEGRATION
User Specifications
Alignment to Business Objectives
Communications
Accuracy
Resource Contention
Ergonomics
Legacy Systems
SEVEN RULES OF INTEGRATION
Rule 1: Understanding the Technology
Rule 2: Understanding the Application
Rule 3: Creating a Solid Development Team
Rule 4: Making Users Part of the Team
Rule 5: Gathering Detailed Specifications
Rule 6: Organizing and Interpreting Specifications
Understanding the Critical Components of Integrated Systems
RECOMMENDED COURSE OF ACTION
Chapter 71—Operating Standards and Practices for LANs
PROBLEMS ADDRESSED
WHY LANS REQUIRE STANDARDS
LESSONS FROM MAINFRAME EXPERIENCE
Balancing Productivity and Support Requirements for LANs
STANDARDS COMMITTEES
Defining “Mission Critical”
WRITING THE OPERATING AND SECURITY STANDARDS DOCUMENT
Network Software Security and Change Control Management
Physical and Environmental Security
Technical Support
CONCLUSION
Chapter 72—Applets and Network Security: A Management Overview
INTRODUCTION
APPLETS AND THE WEB
The Security Issue
What Are the Risks?
JAVA: SECURE APPLETS
Java: Holes and Bugs
JAVASCRIPT: A DIFFERENT GRIND
ACTIVEX: MICROSOFT’S VISION FOR DISTRIBUTED COMPONENT COMPUTING
Using Authenticode for Accountability
ActiveX: The Downside
AN OUNCE OF PREVENTION
Make Sure the Basics Are Covered
Users Should Run the Latest Available Versions of Their Web Browsers
CONCLUSION
Chapter 73—Assessing and Eliminating Virus Threats in Distributed Networks
PROBLEMS ADDRESSED
How Pervasive Is the Viral Threat?
How Viruses Infect Systems
Major Types of Viruses
Common Spread Scenarios
HOW TO DISCOVER A VIRUS
STANDARD APPROACHES TO FIGHTING VIRUSES
Signature-Based Scanners
Multilevel Generic Detection
TSR Monitoring
Behavior Blocking
Drawbacks of Signature Scanning
RECOMMENDED COURSE OF ACTION
Strategies for Virus Prevention
Chapter 74—Technology Conversions on WANs
INTRODUCTION
FEAR OF CHANGE
CORPORATE INVOLVEMENT
Scheduling Projects
Auditing the Physical Network
Formatting Online Information About the Network
MIGRATION STRATEGIES
The Leapfrog Approach: Balancing Costs and Benefits
Cables
Site Preparation
CONCLUSION
Chapter 75—Enterprise Messaging Management
PROBLEMS ADDRESSED
DIFFICULTIES IN MANAGING ENTERPRISEWIDE MESSAGING SYSTEMS
E-MAIL MANAGEMENT STANDARDS
EMA Framework for Messaging Management
AN OVERVIEW OF MESSAGE MANAGEMENT CONCEPTS
MESSAGING MANAGEMENT ARCHITECTURE
MESSAGE MANAGEMENT FROM A SINGLE LOCATION
Functional Description
Control Center Console Software
Evolving with the Standards
RECOMMENDED COURSE OF ACTION
Selecting a Messaging Management Strategy
Chapter 76—Windows NT Performance Monitoring
INTRODUCTION
Utilization
OBSERVING NETWORK PERFORMANCE
Considering the Processor
Working with Alerts
RECOMMENDED COURSE OF ACTION
Chapter 77—Managing Networks with the Global Naming Tree
INTRODUCTION
STRUCTURE OF THE GLOBAL NAMING TREE
Use in Network Management Applications
The Internet Subtree
The MIB Subtree
ASSIGNING IDENTIFIERS AND MANAGING OBJECTS
Standardization and Its Benefits
SAMPLE APPLICATION USING SAMPLE TOOL
CONCLUSION

Section X—Directions in Communications Systems
Chapter 78—The Superhighway: Information Infrastructure Initiatives
WHAT IS AN INFORMATION INFRASTRUCTURE?
Relevance of the Information Infrastructure
Goals and Objectives of Information Infrastructures
BACKGROUND: TECHNOLOGY TRENDS
Bandwidth Pricing Issues
Decoupling Networks and Their Payloads
The Service-Oriented Architecture
KEY ISSUES IN CREATING THE SUPERHIGHWAY
The User’s Role
Government’s Role
Industry’s Role
The Dream Integration Scenario
The Nightmare Scenario
Corporate Networks
THE INTERNET AND B-ISDN
TELECOMMUNICATIONS AND CABLE TV
COMPUTER-INTEGRATED TELEPHONY
COMPUTING AND ENTERTAINMENT
NATIONAL AND INTERNATIONAL INITIATIVES
The U.S.
International Initiatives
STANDARDS AND STANDARDS ORGANIZATIONS
ISO and ITU
American National Standards Institute Information Infrastructure Standards Panel (ANSI IISP)
Telecommunications Standards Advisory Council of Canada (TSACC)
European Telecommunications Standards Institute (ETSI)
The Digital Audio Visual Council (DAVIC)
ALTERNATIVE INITIATIVES
EIA/ TIA
The Computer Systems Policy Project (CSPP)
SUMMARY
Chapter 79—Using Intelligent Agents to Maximize the Benefits of the World Wide Web
INTRODUCTION
WEB-SUPPORTED INFORMATION NEEDS
Limitations of the World Wide Web
CAPABILITIES OF INTELLIGENT AGENTS
USING WEB AGENTS TO MEET MANAGEMENT NEEDS
Using Search Engines to Reduce Information Overload
Using Monitors to Keep Up with Changing Information
Using Publishers to Make Sense of Unordered Information
Using Guides to Maneuver Novice Users through the Web
Using Personal Assistants to Customize Web Information
LIMITATIONS OF WEB AGENTS
CONCLUSION
BIBLIOGRAPHY
Chapter 80—Using Intelligent Agents to Manage Multivendor Environments
INTRODUCTION
KEY CONCEPTS IN SYSTEMS ADMINISTRATION
Manager and Agent
Agent IQ
CAPABILITIES OF INTELLIGENT AGENTS
DISK MONITORING AGENTS
APPLICATION MONITORING AGENTS
FILE MONITORING AGENTS
FILE DISTRIBUTION AGENTS
EVENT MANAGEMENT AGENTS
PROCESS SCHEDULING AGENTS
SYSTEMS MANAGEMENT PRODUCTS
INTEROPERABILITY AND OTHER ISSUES
Agent Management
CONCLUSION
Chapter 81—Voice Recognition Interfaces for Multimedia Applications
PRACTICAL SYSTEMS FOR WIDESPREAD USE
Speaker-Independent Recognition
CURRENT APPLICATIONS
Microphone-Input Applications for the PC
Telephony Applications
EMERGING APPLICATIONS
SELECTING AN ASR PRODUCT
Functions and Features to Look For
Performance Characteristics
Vendor Capability
BUILDING VOICE RECOGNITION APPLICATIONS
The Development Team
Six-Step Development Process
SUMMARY
Chapter 82—Workplace 2000: Top Career Strategies for the Professional
A COMMON THREAD
STRATEGY NO. 1: PROVING ADDED VALUE
Finding Out from People at the Top How They Define Value
Broadening Perspectives
Expanding the Skill Set
Final Tip
STRATEGY NO. 2: ACCEPTING THE IDEA OF SELF-RESCUE
Final Tip
STRATEGY NO. 3: ADOPTING THE NIKE MODEL OF LEARNING
Final Tip
STRATEGY NO. 4: REASSESSING PERSONAL GOALS AND ABILITIES
Final Tip
SUMMARY
BIBLIOGRAPHY
Appendix A
Index
Copyright © CRC Press LLC