SlideShare une entreprise Scribd logo
1  sur  12
Enterprisenetworks
     During the 1980s, organizations began to install local area networks to connect computers in departments and workgroups. Department-level managers usually made decisions about what type of computers and networks they wanted to install.      Eventually, organizations saw benefits in building enterprise networks that would let people throughout the organization exchange e-mail and work together using collaborative software. An enterprise network would connect all the isolated departmental or workgroup networks into an intracompany network, with the potential for allowing all computer users in a company to access any data or computing resource. It would provide interoperability among autonomous and heterogeneous systems and have the eventual goal of reducing the number of communication protocols in use. Toward this goal, industry organizations were formed to create open standards, and vendors developed their own strategies.
 An enterprise network is both local and wide area in scope. It integrates all the systems within an organization, whether they are Windows computers, Apple Macintoshes, UNIX workstations, minicomputers, or mainframes.      An enterprise network can be thought of as a "plug-and-play" platform for connecting many different computing devices. In this platform scenario, no user or group is an island. All systems can potentially communicate with all other systems while maintaining reasonable performance, security, and reliability.
The main attributes of the enterprise network are these: Quality of service (QoS). The network is designed, configured, and managed with QoS as its keystone. This means that traffic is classified at the source and prioritized end-to-end through an infrastructure that requires nothing of its users outside their normal method of operation. The ideal network is an extension of its applications and remains invisible to the users except for the jack in the wall. Standards-based. Recognizing that no single vendor can provide all the elements of the enterprise network, the design and structure are based on open standards. This does not preclude the use of equipment with proprietary elements, but cross-platform and cross-product interoperability are required. Furthermore, purchases, including those made with departmental budgets, must conform to the company’s equipment and application standards.
Security. The network is designed, configured, and managed with security and server protection paramount. It integrates both wired and wireless components and is designed to detect and prevent intrusion at the edge and to survive attacks without service interruption. Policies and procedures such as sanitizing files and applications are conveyed to users to protect the network core. Reliability. Fault tolerance is designed into the network. Components are manufactured to high standards of performance and are hot swappable. Management announces and adheres to service-level agreements (SLAs) that give the users assurance that mission-critical applications will not experience unscheduled downtime. Asset and investment protection. Existing equipment is applied for maximum benefit. Duplicate infrastructures are avoided by adapting to new applications and new technologies without major changes or upgrades.
PRIVATE DATA NETWORKS          The main attraction of connection-oriented services such as frame relay as a platform for private networks is the lack of concern about security. The Internet has spawned a type of data network known in the trade as a VPN, referred to here as a data VPN to distinguish it from a voice VPN. A VPN is a set of sites that communicate with one another over a public IP network while maintaining the security and management capabilities of a dedicated circuit or frame relay network. The basic functions of a VPN are membership discovery—who belongs to what VPN and the establishment of a secure tunnel through the network.
VPN subscribers have the following objectives for the network: Security. The VPN is secure from unauthorized access to the same degree as a network implemented over frame relay or dedicated circuits. Connectivity. Any authorized site can use IP’s connectionless capability to connect to other sites. New sites can be added quickly. Mobile users can access the network from remote locations. Also, the network can span multiple service providers where necessary. Simplicity. The network is easy to set up and manage. Resiliency. The network can respond rapidly to changing traffic patterns. Scalability. The network can scale to meet changing needs as the subscriber adds locations or connects to external users such as customers and business partners. Quality. The VPN can support multiple media including voice, video, and multicast with sufficient QoS. The service provider offers and adheres to SLAs based on worst-case scenarios as opposed to averages.
A VPN consists of a combination of authentication, tunneling, access control, and encryption that is designed to carry data securely over  a public network. A network tunnel is a metaphor for the process of encapsulating the data of one protocol inside the data field of another protocol.
Thank you  J.TC08D712   B.Nyamdavaa J.TC08D006  G.Azbayar

Contenu connexe

Tendances

Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wirelessFedora Leo
 
H. smith network project
H. smith   network projectH. smith   network project
H. smith network projectheidismith22
 
Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)Mohit Kumar
 
GaryZ IT Technology Specialist
GaryZ IT Technology SpecialistGaryZ IT Technology Specialist
GaryZ IT Technology SpecialistGary Zimtbaum
 
CCNA Discovery Networking for Home and Small Businesses - Chapter 7
CCNA Discovery Networking for Home and Small Businesses - Chapter 7CCNA Discovery Networking for Home and Small Businesses - Chapter 7
CCNA Discovery Networking for Home and Small Businesses - Chapter 7Tutorials Tips Tricks
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks Juniper Networks
 
E business infrastructure
E business infrastructureE business infrastructure
E business infrastructureKulsoomIdrisi
 
History of structured cabling systems
History of structured cabling systemsHistory of structured cabling systems
History of structured cabling systemsRobert Kenney
 
Types of network
Types of networkTypes of network
Types of networkAli Mughal
 
Discovery Home S B Chapter 7
Discovery  Home  S B  Chapter  7Discovery  Home  S B  Chapter  7
Discovery Home S B Chapter 7tinwerf
 
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON Byrum
 
Willis Tillis III_Resume
Willis Tillis III_ResumeWillis Tillis III_Resume
Willis Tillis III_ResumeWillis Tillis
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 

Tendances (20)

Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wireless
 
H. smith network project
H. smith   network projectH. smith   network project
H. smith network project
 
Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)
 
Network Research Assistance
Network Research AssistanceNetwork Research Assistance
Network Research Assistance
 
Xaas infotech (2)
Xaas infotech (2)Xaas infotech (2)
Xaas infotech (2)
 
GaryZ IT Technology Specialist
GaryZ IT Technology SpecialistGaryZ IT Technology Specialist
GaryZ IT Technology Specialist
 
CCNA Discovery Networking for Home and Small Businesses - Chapter 7
CCNA Discovery Networking for Home and Small Businesses - Chapter 7CCNA Discovery Networking for Home and Small Businesses - Chapter 7
CCNA Discovery Networking for Home and Small Businesses - Chapter 7
 
Discovery home sb_chapter_ 7 - copy
Discovery home sb_chapter_ 7 - copyDiscovery home sb_chapter_ 7 - copy
Discovery home sb_chapter_ 7 - copy
 
Network Security
Network SecurityNetwork Security
Network Security
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
E business infrastructure
E business infrastructureE business infrastructure
E business infrastructure
 
History of structured cabling systems
History of structured cabling systemsHistory of structured cabling systems
History of structured cabling systems
 
Types of network
Types of networkTypes of network
Types of network
 
RHISHI CV
RHISHI CVRHISHI CV
RHISHI CV
 
Discovery Home S B Chapter 7
Discovery  Home  S B  Chapter  7Discovery  Home  S B  Chapter  7
Discovery Home S B Chapter 7
 
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
OSCON 2012 US Patriot Act Implications for Cloud Computing - Diane Mueller, A...
 
Angelo Bryan Santos Bondoc-CV
Angelo Bryan Santos Bondoc-CVAngelo Bryan Santos Bondoc-CV
Angelo Bryan Santos Bondoc-CV
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Willis Tillis III_Resume
Willis Tillis III_ResumeWillis Tillis III_Resume
Willis Tillis III_Resume
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 

En vedette (12)

Conferencing
ConferencingConferencing
Conferencing
 
2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg
 
2010fall ch17 bolortsetseg
2010fall ch17 bolortsetseg2010fall ch17 bolortsetseg
2010fall ch17 bolortsetseg
 
9 Cv Ts. Ariunbold
9 Cv Ts. Ariunbold9 Cv Ts. Ariunbold
9 Cv Ts. Ariunbold
 
Newcom
NewcomNewcom
Newcom
 
1 unit
1 unit1 unit
1 unit
 
2010fall ch33 shurentsetseg
2010fall ch33 shurentsetseg2010fall ch33 shurentsetseg
2010fall ch33 shurentsetseg
 
4 Presentation Dashnyam
4 Presentation Dashnyam4 Presentation Dashnyam
4 Presentation Dashnyam
 
2 unit
2 unit2 unit
2 unit
 
Module2
Module2Module2
Module2
 
14 Conference Shirmee
14 Conference Shirmee14 Conference Shirmee
14 Conference Shirmee
 
Infocon
InfoconInfocon
Infocon
 

Similaire à 2010fall ch31 naymka

Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfBoney Maundu Slim
 
Chapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworksChapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworksjosepholaguer
 
Distributed Enterprise Networks And Mako Networks Solutions.pdf
Distributed Enterprise Networks And Mako Networks Solutions.pdfDistributed Enterprise Networks And Mako Networks Solutions.pdf
Distributed Enterprise Networks And Mako Networks Solutions.pdfTerry Power
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networksJosue Wuezo
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Ccnp™ advanced cisco® router
Ccnp™ advanced cisco® routerCcnp™ advanced cisco® router
Ccnp™ advanced cisco® routerchiliconcarne
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer NetworkingPulkit Singhal
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxtodd581
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxglendar3
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfHirazNor
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 

Similaire à 2010fall ch31 naymka (20)

Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Chapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworksChapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworks
 
Distributed Enterprise Networks And Mako Networks Solutions.pdf
Distributed Enterprise Networks And Mako Networks Solutions.pdfDistributed Enterprise Networks And Mako Networks Solutions.pdf
Distributed Enterprise Networks And Mako Networks Solutions.pdf
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Ccnp™ advanced cisco® router
Ccnp™ advanced cisco® routerCcnp™ advanced cisco® router
Ccnp™ advanced cisco® router
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer Networking
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
E018113036
E018113036E018113036
E018113036
 

Plus de Bayarmaa GBayarmaa (20)

Computer networking
Computer networkingComputer networking
Computer networking
 
E commerce
E commerce E commerce
E commerce
 
Gps se13057
Gps se13057Gps se13057
Gps se13057
 
23.database
23.database23.database
23.database
 
14.satellite communication
14.satellite communication14.satellite communication
14.satellite communication
 
17.broadcasting
17.broadcasting17.broadcasting
17.broadcasting
 
Footnote
FootnoteFootnote
Footnote
 
Lecture1 4
Lecture1 4Lecture1 4
Lecture1 4
 
How to write a cover letter
How to write a cover letterHow to write a cover letter
How to write a cover letter
 
2010fall ch22 dondogmaa
2010fall ch22 dondogmaa2010fall ch22 dondogmaa
2010fall ch22 dondogmaa
 
2010fall ch20 zolzaya
2010fall ch20 zolzaya2010fall ch20 zolzaya
2010fall ch20 zolzaya
 
2010fall ch19 otgonbayar
2010fall ch19 otgonbayar2010fall ch19 otgonbayar
2010fall ch19 otgonbayar
 
2010fall ch14 tselmeg
2010fall ch14 tselmeg2010fall ch14 tselmeg
2010fall ch14 tselmeg
 
2010fall ch12 30enkhbayar
2010fall ch12 30enkhbayar2010fall ch12 30enkhbayar
2010fall ch12 30enkhbayar
 
2010fall ch10 gantuya
2010fall ch10 gantuya2010fall ch10 gantuya
2010fall ch10 gantuya
 
2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren
 
2010fall ch7 zolboo
2010fall ch7 zolboo2010fall ch7 zolboo
2010fall ch7 zolboo
 
2010fall ch1 lkhamsuren
2010fall ch1 lkhamsuren2010fall ch1 lkhamsuren
2010fall ch1 lkhamsuren
 
2010fall ch24 39khandsuren
2010fall ch24 39khandsuren2010fall ch24 39khandsuren
2010fall ch24 39khandsuren
 
Tuvshoo New Words
Tuvshoo New WordsTuvshoo New Words
Tuvshoo New Words
 

Dernier

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 

Dernier (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 

2010fall ch31 naymka

  • 2. During the 1980s, organizations began to install local area networks to connect computers in departments and workgroups. Department-level managers usually made decisions about what type of computers and networks they wanted to install. Eventually, organizations saw benefits in building enterprise networks that would let people throughout the organization exchange e-mail and work together using collaborative software. An enterprise network would connect all the isolated departmental or workgroup networks into an intracompany network, with the potential for allowing all computer users in a company to access any data or computing resource. It would provide interoperability among autonomous and heterogeneous systems and have the eventual goal of reducing the number of communication protocols in use. Toward this goal, industry organizations were formed to create open standards, and vendors developed their own strategies.
  • 3. An enterprise network is both local and wide area in scope. It integrates all the systems within an organization, whether they are Windows computers, Apple Macintoshes, UNIX workstations, minicomputers, or mainframes. An enterprise network can be thought of as a "plug-and-play" platform for connecting many different computing devices. In this platform scenario, no user or group is an island. All systems can potentially communicate with all other systems while maintaining reasonable performance, security, and reliability.
  • 4.
  • 5.
  • 6. The main attributes of the enterprise network are these: Quality of service (QoS). The network is designed, configured, and managed with QoS as its keystone. This means that traffic is classified at the source and prioritized end-to-end through an infrastructure that requires nothing of its users outside their normal method of operation. The ideal network is an extension of its applications and remains invisible to the users except for the jack in the wall. Standards-based. Recognizing that no single vendor can provide all the elements of the enterprise network, the design and structure are based on open standards. This does not preclude the use of equipment with proprietary elements, but cross-platform and cross-product interoperability are required. Furthermore, purchases, including those made with departmental budgets, must conform to the company’s equipment and application standards.
  • 7. Security. The network is designed, configured, and managed with security and server protection paramount. It integrates both wired and wireless components and is designed to detect and prevent intrusion at the edge and to survive attacks without service interruption. Policies and procedures such as sanitizing files and applications are conveyed to users to protect the network core. Reliability. Fault tolerance is designed into the network. Components are manufactured to high standards of performance and are hot swappable. Management announces and adheres to service-level agreements (SLAs) that give the users assurance that mission-critical applications will not experience unscheduled downtime. Asset and investment protection. Existing equipment is applied for maximum benefit. Duplicate infrastructures are avoided by adapting to new applications and new technologies without major changes or upgrades.
  • 8. PRIVATE DATA NETWORKS The main attraction of connection-oriented services such as frame relay as a platform for private networks is the lack of concern about security. The Internet has spawned a type of data network known in the trade as a VPN, referred to here as a data VPN to distinguish it from a voice VPN. A VPN is a set of sites that communicate with one another over a public IP network while maintaining the security and management capabilities of a dedicated circuit or frame relay network. The basic functions of a VPN are membership discovery—who belongs to what VPN and the establishment of a secure tunnel through the network.
  • 9. VPN subscribers have the following objectives for the network: Security. The VPN is secure from unauthorized access to the same degree as a network implemented over frame relay or dedicated circuits. Connectivity. Any authorized site can use IP’s connectionless capability to connect to other sites. New sites can be added quickly. Mobile users can access the network from remote locations. Also, the network can span multiple service providers where necessary. Simplicity. The network is easy to set up and manage. Resiliency. The network can respond rapidly to changing traffic patterns. Scalability. The network can scale to meet changing needs as the subscriber adds locations or connects to external users such as customers and business partners. Quality. The VPN can support multiple media including voice, video, and multicast with sufficient QoS. The service provider offers and adheres to SLAs based on worst-case scenarios as opposed to averages.
  • 10.
  • 11. A VPN consists of a combination of authentication, tunneling, access control, and encryption that is designed to carry data securely over a public network. A network tunnel is a metaphor for the process of encapsulating the data of one protocol inside the data field of another protocol.
  • 12. Thank you J.TC08D712 B.Nyamdavaa J.TC08D006 G.Azbayar