⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 index.html

📁 this explains the working of intranets.
💻 HTML
📖 第 1 页 / 共 2 页
字号:
<H2><I><FONT SIZE=5 COLOR=#FF0000>Chapter </FONT></I><FONT SIZE=5 COLOR=#FF0000>36</FONT><FONT SIZE=5>&nbsp;&nbsp;<A HREF="ch36.htm"><I></I></A></FONT></H2><UL><LI><A HREF="ch36.htm#UsingMultimediaApplicationstoTrainEmployees">Using Multimedia Applications to Train Employees</A></UL></UL><P><P><H2><A HREF="#credit"><B><I>Credits</I></B></A></H2><P><HR><P><A NAME="credit"></A><B>HTML conversion by </B> : <BR>&nbsp;&nbsp;&nbsp;&nbsp;M/s. LeafWriters (India) Pvt. Ltd. <BR>&nbsp;&nbsp;&nbsp;&nbsp;<I>Website</I> : <A HREF=http://leaf.stpn.soft.net>http://leaf.stpn.soft.net</A> <BR>&nbsp;&nbsp;&nbsp;&nbsp;<I>e-mail</I> : <A HREF=mailto:leafwriters@leaf.stpn.soft.net>leafwriters@leaf.stpn.soft.net</A><p></B><P><HR><P><CENTER><TABLE><TR><TD><B>Publisher</B></TD><TD><I>Stacy Hiquet</I></TD></TR><TR><TD><B>Associate Publisher</B></TD><TD><I>Juliet Langley</I></TD></TR><TR><TD><B>Acquisitions Editor</B></TD><TD><I>Lysa Lewallen</I></TD></TR><TR><TD><B>Development Editor</B></TD><TD><I>Paula Hardin</I></TD></TR><TR><TD><B>Copy Editor</B></TD><TD><I>Margo Hill</I></TD></TR><TR><TD><B>Technical Reviewer</B></TD><TD><I>Mark Butler</I></TD></TR><TR><TD><B>Production Editor</B></TD><TD><I>Barbara Dahl</I></TD></TR><TR><TD><B>Proofreader</B></TD><TD><I>Jeff Barash</I></TD></TR><TR><TD><B>Cover Illustration</B></TD><TD><I>Mina Reimer</I></TD></TR><TR><TD><B>Cover Design</B></TD><TD><I>Regan Honda and Megan Gandt</I></TD></TR><TR><TD><B>Book Design</B></TD><TD><I>Carrie English and Bruce Lundquist</I></TD></TR><TR><TD><B>Lead Illustrator</B></TD><TD><I>Mina Reimer</I></TD></TR><TR><TD><B>Contributing Illustrators</B></TD><TD><I>Sarah Ishida, Karl Miyajima, Joan Carol, and Chad Kubo</I></TD></TR><TR><TD><B>Page Layout</B></TD><TD><I>M.D. Barrera</I></TD></TR><TR><TD><B>Indexer</B></TD><TD><I>Valerie Robbins</I></TD></TR></TABLE></CENTER><P><HR><P><B>Copyright</B> &#169; 1996 by Macmillan Computer PublishingUSA. All rights reserved.<P><B>PART OF A CONTINUING SERIES</B><P>All other product names and services identified throughout thisbook are trademarks or registered trademarks of their respectivecompanies. They are used throughout this book in editorial fashiononly and for the benefit of such companies. No such uses, or theuse of any trade name, is intended to convey endorsement or otheraffiliation with the book.<P>No part of this publication may be reproduced in any form, orstored in a database or retrieval system, or transmitted or distributedin any form by any means, electronic, mechanical photocopying,recording, or otherwise, without the prior written permissionof Macmillan Computer Publishing USA, except as permitted by theCopyright Act of 1976, and except that program listings may beentered, stored, and executed in a computer system.<P><FONT SIZE=2>THE INFORMATION AND MATERIAL CONTAINED IN THIS BOOK ARE PROVIDED&#147;AS IS,&#148; WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,INCLUDING WITHOUT LIMITATION ANY WARRANTY CONCERNING THE ACCURACY,ADEQUACY, OR COMPLETENESS OF SUCH INFORMATION OR MATERIAL OR THERESULTS TO BE OBTAINED FROM USING SUCH INFORMATION OR MATERIAL.NEITHER MACMILLAN COMPUTER PUBLISHING USA NOR THE AUTHOR SHALLBE RESPONSIBLE FOR ANY CLAIMS ATTRIBUTABLE TO ERRORS, OMISSIONS,OR OTHER INACCURACIES IN THE INFORMATION OR MATERIAL CONTAINEDIN THIS BOOK, AND IN NO EVENT SHALL MACMILLAN COMPUTER PUBLISHINGUSA OR THE AUTHOR BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL,OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OF SUCH INFORMATIONOR MATERIAL.</FONT><P><B>ISBN 1-56276-441-1</B><HR><P>This book wouldn&#146;t have been possible without a host of peopleworking on it. I'd like to thank acquisitions editor LysaLewallen for getting the ball rolling, and editor Valerie HaynesPerry for her initial work on the book. Editor Paula Hardin wieldsa sharp pen and tightened the writing and thinking tremendously.Technical editor Mark Butler, as always, vetted the work for accuracy.And thanks also to Mina Reimer, illustrator; Barbara Dahl, productioneditor; Margo Hill, copy editor; and M.D. Barrera, page layoutartist. Also thanks to Carol Burbo for keeping track of everything. <P>And, as always, I&#146;d like to thank my family, Lydia, Mia,and Gabriel, for putting up with my occasional absences into thedark recesses of my office, as well as ignoring my odd behavioras I mumbled too much about the domain name system or VirtualSecure Private Networks.<P>TheInternet has been hailed by many as the most revolutionary technologythat computing has seen. It&#146;s a technology that affects notjust the computing world, but the noncomputing world as well:You can&#146;t turn on your television without seeing Web locationsflash across your screen, or read a newspaper without seeing astory about the latest Internet startup that made its young entrepreneursinstant millionaires.<P>The truth is, though, that Internet technology may have its greatestimpact in the next several years not on general culture, but ratheron corporations. It has already begun to revolutionize the waythat companies operate and do business&#151;and most people agreethat we've only seen the very beginnings of the its effectson corporate culture and on the way corporations function.<P>When Internet technology is applied and used inside a corporation,and open only to its employees, it is referred to as an <I>intranet</I>.The same technologies that underlie corporate intranets form thebasis of the larger Internet. The only difference is that thecompany has put up a wall around its intranet to keep intrudersout. This wall that a company builds around its intranet is knownas a <I>firewall</I>.<P>An intranet uses the same basic underlying architecture and networkprotocols as does the Internet. Protocols such as the TransmissionControl Protocol (TCP), the Internet Protocol (IP), the SimpleMail Transfer Protocol (SMTP), and many others are what make itall possible. Most intranet technologies, like those on the Internet,are client/server based. In many instances, however, the way thetechnology is applied on the intranet differs from the way itis applied on the Internet. <P>Intranets are generally more complicated than the Internet itself,for many reasons. One reason is that these Internet-specific protocolshave to coexist and cooperate with other network protocols suchas IPX. Another is that intranets are often composed of a varietyof different local area networks, and they all must be hookedtogether seamlessly. And in order to serve businesses, intranetapplications&#151;such as workgroup applications&#151;are oftenrequired to be far more complex than those generally found onthe Internet. <P>Because the Internet itself changes so fast and can be confusing,and because intranet technology is that much more complex, itoften seems impossible to ever truly understand how an intranetactually works. Proxy servers, filtering routers, Virtual SecurePrivate Networks, firewalls, password protection schemes&#151;itcan all seem a jumble.<P>This book will help make it all much clearer. It will show you,in carefully detailed illustrations, how the Internet actuallyworks. Whether you&#146;re an intranet administrator, or justsomeone who wants to know more about how a modern corporate networkworks, you'll find it a great help.<P>The book is divided into four major sections. In Part 1, &#147;AnIntranet&#146;s Building Blocks,&#148; we&#146;ll take a lookat the underlying technologies that make an intranet possible.We&#146;ll begin by taking a global look at an intranet, and seehow all the pieces fit together and interact with the Internet.We'll take a close look at how the Internet's twomost important protocols-TCP and IP-work. And we'llalso see how those protocols fit in and interact with other networkprotocols. In Part 1 we&#146;ll also see how some of an intranet&#146;smost important hardware works. We&#146;ll examine how routersand bridges transfer data packets inside an intranet, betweenan intranet and the Internet, and how they make sure that thepackets don't get lost. We'll also take a look atintranet Web servers, and gain an understanding of how they deliverWeb pages to intranet Web browsers, and how they also interactwith Internet Web servers. <P>Part 1 also takes a look at the underlying technology that makessending and receiving data on an intranet possible, the DomainName System. And we'll see how e-mail works on an intranet,and see not just how the mail is delivered to other intranet users,but also to people out on the Internet and on other intranets.<P>And in Part 1, we&#146;ll also look at two extremely importanttechnologies that allow intranet administrators and programmersto write customized programs that can form the basis of an intranet.We&#146;ll see how the Common Gateway Interface works, a technologythat allows the Web to interact with other resources, such ascorporate database. And we'll look at Java, a programminglanguage that allows people on an intranet to build truly interactiveapplications.<P>In Part 2, &#147;Security and Intranets,&#148; we&#146;ll turnour attention to what for many is the most complex part of anyintranet&#151;the hardware and software that protects intranetsagainst outside intruders. Hackers and crackers on the intranetoften feel it a badge of honor to break into corporate computers,and security systems are what keeps them out, while still allowingpeople inside the intranet to get access to the Internet. <P>In this part, we&#146;ll look at how firewalls use a variety oftechniques to keep out intruders. We&#146;ll see how filteringrouters examine all packets coming into the intranet, and basedon what they find, allow some packets&#151;and people&#151;in,while keeping others out. We&#146;ll take a close look at bastionservers&#151;heavily fortified intranet servers designed to bea primary line of defense against hackers. Proxy servers, whichallow people from inside the intranet to get at Internet resources,are examined as well. The book details how authentication systemswork. These systems allow qualified users to log in by using passwords,while keeping others out.<P>Other security issues we&#146;ll look at include the touchy issueof how to block intranet users from visiting objectionable Internetsites, such as those containing pornography. The book will alsoexamine in detail Virtual Secure Private Networks, an importantemerging security technology that allows intranets to communicatewith each other securely. Finally, we'll see how server-basedvirus scanning tools can keep in intranet as virus-free as possible.<P>Part 3, &#147;Intranets and Groupware,&#148; shows how some ofthe newest intranet technology works&#151;a kind of software thathas been lumped together under the general term of groupware.Groupware is admittedly somewhat of a fuzzy term, and is thrownaround with great abandon-and with great imprecision-thesedays. Generally, however, intranet groupware refers to intranettechnology that allows people in a corporation to collaboratewith each other electronically. It covers everything from simplemessaging to complex applications that lets people see what ison each other's computer screens.<P>We&#146;ll get an overview in this section of all the importantintranet groupware technologies, and see how they work togetherto make people communicate more efficiently.<P>Intranet discussion software also gets a close examination inthis section. Discussion software allows people to communicatewith each other on what are, in essence, sophisticated computerbulletin boards. But these discussion areas, as well see, allowpeople to do more than merely talk. They also can contain linksto other corporate resources, such as Web pages and corporatedatabases.<P>Videoconferencing systems are covered here as well. With videoconferencing,people across the country from each other can see each other andtalk to each other on their computers. It allows for one-on-oneconferencing, as well as large group conferencing as well.<P>A related technology, whiteboards, lets people see what othershave on their computer screens, and allows them to mark up thosedocuments, and talk to them about what they&#146;re marking up.In this way, people separated geographically can work togetheron the same document-a proposed budget for example. <P>The final section of the book, Part 4, &#147;Applying the Intranet,&#148;looks at how corporations can apply the technology to their businesses.We'll see, for example, how an intranet allows people toget access to corporate databases by using simple forms on intranetWeb browsers.<P>Usually an intranet is built well after a corporation has databasesand networks in place, and so in this section we&#146;ll alsosee how these so-called legacy systems can be accessed from, oreven integrated into, a corporate intranet.<P>This section of the book also looks at intranet search tools&#151;systemsthat allow people to sift through the vast amounts of informationon an intranet and find the precise information they need. Andwe'll see how intranets can be accessed not just from corporateoffices, but from people's homes and while they are travelingas well.<P>We&#146;ll invent a mythical corporation in this section of thebook, the CyberMusic record company, and look at how an intranethelps CyberMusic work better. We&#146;ll see how CyberMusic usesan intranet to market itself, do business with its customers,and do business with other businesses. And we'll also seehow CyberMusic uses an intranet to deliver corporate news andinformation to its employees, and how it uses the intranet fortraining as well.<HR><CENTER><P><A HREF="#CONTENTS"><IMG SRC="CC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="ch1.htm"><IMG SRC="NC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><HR WIDTH="100%"></P></CENTER></BODY></HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -