MD703 Class 10 Agenda Chapter 3: Strategic Use of InfoTech Chapter 8: Operations Tech Talk: Groupware & Messaging Part 2 Case: Information Security.

Slides:



Advertisements
Similar presentations
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Computer Networks An Overview. A Computer Network!
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
The Internet Useful Definitions and Concepts About the Internet.
Class 8 Agenda Midterm Case Review Notes Transactions & Workflow Enterprise-level Applications –SCM – Supply chain mgmt –ERP – Enterprise resource planning.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
2440: 141 Web Site Administration Services Instructor: Enoch E. Damson.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Networked Applications Chapter 11 Updated January 2009 Raymond Panko’s Business Data Networks.
Messaging Technologies Group: Yuzhou Xia Yi Tan Jianxiao Zhai.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Forensic and Investigative Accounting
Cisco Discovery Working at a Small-to-Medium Business or ISP CHAPTER 7 ISP Services Jr.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
MD703 Class 9 Agenda Computer Security SSL encryption and Internet security Network Security Chapter 3 Review Chapter 8 Review.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet-Based Client Access
Chapter 9 Message Passing Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Operating Systems, by Dhananjay Dhamdhere2 Introduction.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
Chapter 6: Packet Filtering
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
TCP/IP Transport and Application (Topic 6)
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Module 7: Managing Message Transport. Overview Introduction to Message Transport Implementing Message Transport.
Databases JDBC (Java Database Connectivity) –Thin clients – servlet,JavaServer Pages (JSP) –Thick clients – RMI to remote databases –most recommended way.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 14 How Internet Chat and IM Work.
SMARTMAIL 3.0. OVERVIEW ● CLIENT ● WORKS WITH IMAP AND SMTP MAIL SERVER ● OFFERS SECURE , WORK FLOW MESSAGES, TRANSLATION ● PLUG-IN ARCHITECTURE.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Chapter 2 Rheachel, Jessica, Megan, and Cassidy Communications, Networks, the Internet, and the World Wide Web.
Class 7 Agenda Computer Center Tour Computer Center Tour Text: Strategy & Technology (cont) Text: Strategy & Technology (cont) Collaboration Tools Basics.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Network Programming 10- SMTP-POP3
3.1 Types of Servers.
Instructor Materials Chapter 5 Providing Network Services
3.1 Types of Servers.
ITIS 1210 Introduction to Web-Based Information Systems
Some bits on how it works
3.1 Types of Servers.
Working at a Small-to-Medium Business or ISP – Chapter 7
IBM WEBSPHERE MESSAGE QUEUE online Training | IBM WEBSPHERE MQ Training
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Unit 36: Internet Server Management
Protocols 2 Key Revision Points.
Unit – 4 Chap - 2 Mail Delivery System
Protocol Application TCP/IP Layer Model
Presentation transcript:

MD703 Class 10 Agenda Chapter 3: Strategic Use of InfoTech Chapter 8: Operations Tech Talk: Groupware & Messaging Part 2 Case: Information Security

Chapter 3: Review British Railways Example –Value from business process change GE Power systems Case –“Company-smart”, rapid app dev –Rapid Application Design Cisco Case, Dell Case –Supply chain mgmt Commoditizing IT –Impact on strategy

Chapter 8: Review Operations Issues: sustainable advantage Outsourcing Transaction Costing Information Security

Discussion Questions Which aspects of IT/IS are of strategic concern and which are not? What IT/IS factors weight a decision toward outsourcing? Is it commodity-status only?

Groupware & Messaging (Web) Shared Files Messaging IM

Basics SMTP –Sendmail program IMAP –Assumes internet access POP –Predated internet Roaming –Store and retrieve preferences

Architecture Servers –Manage mailboxes –Virus/spam filtering –Send/receive mail to mailboxes Clients –Retrieve from mailbox –Send via server

Mechanics ReceiveDeliver MailBoxes User IMAP POP Internet SMTP Directory (Client Prefs)

Directory Services Receive Deliver MailBoxes User IMAP/ POP Internet SMTP LDAP DB Access & Preferences

(Web) File/Document Sharing Architecture Access Control Versioning Clients Notifications Demonstration of “MyFiles”

Instant Messaging Clients use IP “channels” to send messages –“Chat room” is essentially a port –“Buddy list” has firewall aspects block/allow lists Packets are delivered directly to the client –No service between users AOL or MS act as registries –Track which ID’s are on which servers –ISP’s can monitor/log activity Discussion Question: Business Usage?

Messaging (1) Definition – for computers –Delivery of structured data to a process via a queuing mechanism Architecture –Queues Request/Response pairs –Manager –Clients

Messaging (2) Strengths –Asynchronous communication –Controls multi-server processes –Parallel processing –Reliability “Once and only once” delivery option “Publish and Subscribe” delivery Websphere MQ is most common –Evolved from mainframe “MQSeries” JMS (java messaging service) defines the standards for open systems

Messaging Source Server Target Server Message Queueing Server Q2Q1Q2Q3Q4 Queue Rules: Q1:… Q2:ssin Q2:tsout

Part 2 Case: Information Security Outsourcing network security management? Yes/No? Why/Why not? When/When not? Castles and Gates: where do we defend?

Information Security Case Discussion Why is the Domain Name Server outside of the Firewall? (ref pg 358) Open Source or Proprietary systems for Security? Select and defend.