© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

Enabling Secure Internet Access with ISA Server
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Nassau Community College
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Remote Access Network Management Kelly Given Allison Traina.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
The Internet Useful Definitions and Concepts About the Internet.
Layer 7- Application Layer
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
INTRODUCTION Toomeeting Conference (TMC) is the easiest and more accessible multimedia videoconferencing solution on market. TMC offers a large portfolio.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
IPNexus Briefing Instant Messaging and Collaboration.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
DATA COMMUNICATION DONE BY: ALVIN SAMPATH CARLVIN SAMPATH.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Session Session 26 SAIG (Title IV WAN) Connectivity.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
1 INTERNET AND eBUSINESS (I) BUS Abdou Illia, Fall 2012 (October 29, 2012)
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
CS101 Introduction to Computing Lecture 7 Internet Services.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 Windows 2008 Configuring Server Roles and Services.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Has Agent Scripting Got You FRUSTRATED?. Agent Scripting Simplified!
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
1st Technology Spontaneous and encrypted multimedia connections between users with dynamic IP addresses or ports, and visitors connecting through tunneled.
Understand Internet Security LESSON Security Fundamentals.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
© 1stWorks Corp.. 1stWorks Background Formed in the fall of 2000 by survivors of earlier, successful startups and based in Boston Focused on leveraging.
CAIU Technology Essentials All Staff Day, 2016 Instructor: Stefan Moyer.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
IPEmotion License Management PM (V1.2).
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Skype.
(class #2) CLICK TO CONTINUE done by T Batchelor.
Instructor Materials Chapter 5 Providing Network Services
The Internet & World Wide Web
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Goals Introduce the Windows Server 2003 family of operating systems
Unit 8 Network Security.
Presentation transcript:

© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80% of these PCs have an Internet connection 15% of households in the industrialized world have a PC 30% of these PCs have Internet connections 360,000,000 people worldwide are Internet users Sources: Global Reach, The Standard, Nielsen

© 1stworks Corp. Peer to Peer - A Powerful Paradigm Fast Flexible Personal Interactive Secure Users can be client or server or both Messaging, file transfer, voice and video White-Board collaboration

© 1stworks Corp. The Opportunity P2P is the new connection model for user interaction from the device and the desktop Collaboration in flexible and informal clusters, temporary teams, such as professional services projects Collaboration in temporary locations, such as hotels, aircraft or work sites Dynamic, private and interactive connections

© 1stworks Corp. The Critical Factors Effortless management of dynamic user addresses Superior performance and scalability through distributed functionality Increased confidence from integrated security and server-less connections Documented API as the platform for flexible application development

© 1stworks Corp. Introducing hotComm Global interactive access based on your address and your authentication code Virtual Name Server (VNS) delivers DNS functionality for session based dynamic Internet addresses Contact lists under your personal control Secure transmission through public and supplementary private keys

© 1stworks Corp. More hotComm Features File & Web publication with full drag-and-drop functionality. Managed access hierarchy by directory Web Serving support, even for Windows ‘95 Intuitive user interface Warning cues for “logged” exchanges Online secure word-by-word interactive chat and encrypted voice and file transfer

© 1stworks Corp. hotComm has clearly superior patent-pending technologies “NAT Tracker” provides true P2P connection for multiple users behind a single IP, without NAT re-programming or replacement Background client processing cycles are used to pre-calculate User table lookup values and to compute prime-number calculations for embedded PGP

© 1stworks Corp. Introducing voiceComm Global interactive access based on your address and your authentication code Virtual Name Server (VNS) delivers DNS functionality for session based dynamic Internet addresses Contact lists under your personal control Secure voice transmission through public and supplementary private keys

© 1stworks Corp. More voiceComm Features Superior sound quality and echo cancellation through sophisticated packet transmission technology Intuitive user interface Optional “logged” exchanges with warning cues Online, immediate, interactive chat and encrypted voice communication

© 1stworks Corp. voiceComm has clearly superior patent-pending technologies “NAT Tracker” provides true P2P connection for multiple users behind a single IP, without NAT re-programming or replacement Background client processing cycles are used to pre-calculate User table lookup values and to compute prime-number calculations for embedded PGP

© 1stworks Corp. And the VNS is unique Virtual Name Server (VNS) with chained address updates provides a unique foundation for virtually unlimited user access Continuously updated with the current network address and status of each online user Serves as the access directory for dynamic web server locations Supports groups and clusters, one to many, many to many

© 1stworks Corp. hotComm and voiceComm - How they connect Initial client download and onetime registration Every day connections Every day connections for NAT protected users

© 1stworks Corp. Install and Registration Flow …1 Website & FTP User requests download of hotComm Client hotComm client downloaded to User User PC w/ Browser

© 1stworks Corp. Registration Flow …2 vns.1stworks.com vns.1stworks.com Website & FTP User Address entered into hotComm Client Registration returned to User with Authentication Key User PC w/ hotComm client activated. User-info Database Web Address Database Authentication Key & Password Entered into hotComm User record in the database User’s Virtual Address automatically updated periodically by hotComm to the VNS Server

© 1stworks Corp. Operational Flow …1 vns.1stworks.com vns.1stworks.com Website & FTP User PC with the hotComm client activated. User-info Database Web Address Database The User’s Address & Authentication Key is validated by the hotComm VNS Server and the User becomes a ‘Logged On User’ Web File-Share Database Associate Address Book ( User-created ) The Logged On Users’ PC’s Virtual Address is automatically stored and periodically refreshed during each session on the VNS Server database

© 1stworks Corp. Operational Flow …2 The ‘Logged On’ user at PC 01 wants to connect securely and interactively with associates listed by address in his or her personal address book The big question is …….

© 1stworks Corp. Operational Flow …3 Where’s Waldo ?

© 1stworks Corp. Operational Flow …4 The VNS knows, when the World- Wide-Web DNS doesn’t ! VNS

© 1stworks Corp. Connection Flow in a no NAT world VNS Server PC 01 1.Request for Comms. with PC PC-02 Socket Address + session PGP key PC 02 PC-01 Heartbeat -Socket left open. PC-02 Heartbeat -Socket left open. Truly Secure & Server-less Peer-To-Peer Communications 2. PC-01 Socket Address + session PGP key User PC with the hotComm client active

© 1stworks Corp. Connection Flow in a NAT world VNS Server PC 01 1.Request for Comms. with PC PC-02 Socket Address(2) + unique session PGP key 3. Request for a new PC-02 Socket 5. PC-02 Socket Address(2) PC 02 PC-01 Heartbeat -Socket left open. PC-02 Heartbeat -Socket left open. Truly Secure & Server-less Peer-To-Peer Communications 2. Request for a new PC-01 Socket 4. PC-01 Socket Address(2) 7. PC-01 Socket Address(2) + unique session PGP key NAT PC with the hotComm client active

© 1stworks Corp. Download now !