Class 7 Agenda Computer Center Tour Computer Center Tour Text: Strategy & Technology (cont) Text: Strategy & Technology (cont) Collaboration Tools Basics.

Slides:



Advertisements
Similar presentations
Internet Applications INTERNET APPLICATIONS. Internet Applications Domain Name Service Proxy Service Mail Service Web Service.
Advertisements

Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
The Internet Useful Definitions and Concepts About the Internet.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
The Application Layer  application and application requirements  sample network applications and protocols  SMTP, POP3  WWW: http1.1  teleconferencing.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Computer Concepts 2014 Chapter 7 The Web and .
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Human-Computer Interface Course 5. ISPs and Internet connection.
PC Maintenance: Preparing for A+ Certification Chapter 25: The Internet.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet-Based Client Access
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Chapter 6: Packet Filtering
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Simple Mail Transfer Protocol (SMTP)
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Class 6 Agenda Midterm Review Midterm Review –Questions –Toyota Case Computer Security Basics Computer Security Basics –Identification & Authentication.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Chapter 3: Services of Network Operating Systems Maysoon AlDuwais.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
The Intranet.
Internet Architecture and Governance
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
SMARTMAIL 3.0. OVERVIEW ● CLIENT ● WORKS WITH IMAP AND SMTP MAIL SERVER ● OFFERS SECURE , WORK FLOW MESSAGES, TRANSLATION ● PLUG-IN ARCHITECTURE.
Alex Leifheit NETWORKS. NETWORK A number of interconnected computers, machines, or operations. Key Components Network components, Network Architecture,
MD703 Class 10 Agenda Chapter 3: Strategic Use of InfoTech Chapter 8: Operations Tech Talk: Groupware & Messaging Part 2 Case: Information Security.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Office automation Office automation has changed the equipments and work habits of today’s end users and work groups None will be interested to work in.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
3.1 Types of Servers.
Application layer tcp/ip
The Intranet.
Instructor Materials Chapter 5 Providing Network Services
Principles of Network Applications
Living in a Network Centric World
Living in a Network Centric World
3.1 Types of Servers.
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
CHAPTER 2 Application Layer.
Internet Applications
CompTIA Server+ Certification (Exam SK0-004)
Collaborating via Social Networks and Groupware
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Protocols 2 Key Revision Points.
Living in a Network Centric World
INTERNET APPLICATIONS
Living in a Network Centric World
Living in a Network Centric World
Client/Server and Peer to Peer
Living in a Network Centric World
European Computer Driving Licence Syllabus version 5.0
Living in a Network Centric World
Presentation transcript:

Class 7 Agenda Computer Center Tour Computer Center Tour Text: Strategy & Technology (cont) Text: Strategy & Technology (cont) Collaboration Tools Basics Collaboration Tools Basics Text: Peer Production Text: Peer Production Project Time Project Time

Groupware Productivity tools: Productivity tools: –Scope: Industry –Network effect a key –Often utilized by applications as well as people

Groupware Examples Calendar Calendar Workgroup file sharing Workgroup file sharing Instant messaging Instant messaging Virtual meeting Virtual meeting “Web 2.0” “Web 2.0”

Architecture Architecture Options Options Design Issues Design Issues

Basics SMTP SMTP –Sendmail program IMAP IMAP –Assumes internet access POP POP –Predated internet Roaming Roaming –Store and retrieve preferences Webmail Webmail –“Proxy service” –Direct

Mechanics ReceiveDeliver MailBoxesUser IMAP POP SMTP Internet SMTP Directory (Auth, Prefs) SMTP Virus Checking

(Web) File/Document Sharing Architecture Architecture Access Control Access Control Versioning Versioning Clients Clients Notifications Notifications

Instant Messaging Clients use IP “channels” to send messages Clients use IP “channels” to send messages –“Chat room” is essentially a port –“Buddy list” has firewall aspects block/allow lists block/allow lists Packets are delivered directly to the client Packets are delivered directly to the client AOL or MS act as registries, “brokers” AOL or MS act as registries, “brokers” –Track which ID’s are on which servers –ISP’s can monitor/log activity “Enterprise Instant Messaging” “Enterprise Instant Messaging” Discussion Question: Business Usage? Discussion Question: Business Usage?

Virtual Meetings Instant messaging type connections Instant messaging type connections Multiple sessions between stations Multiple sessions between stations Options for governance, security Options for governance, security

Virtual meetings Found in directory, or via ip-address Enter Meeting Hang up? Host Guest Chat Port 1234 Video Port 3245 Shared Program Port Whiteboard Port 2712 Define Meeting Set security, tools Initiate calls? IP Sessions

Web 2.0 Definition Definition –Interactive web services for sharing sharing Collaboration Collaboration –Not a technology change –Cp Office tools, SaaS Issues Issues –Ownership & responsibility –Degree of central control varies –Have we done the “control” phase?

Web 2.0 Examples Weblogs Weblogs Wiki’s Wiki’s Youtube Youtube (RSS Feeds) (RSS Feeds) (podcasts) (podcasts)

Text Chapter: Peer Production What is “content management”? What is “content management”? Is “Web 2.0” new technology or new use of existing? Is “Web 2.0” new technology or new use of existing? Why should we care? Why should we care? What are the business uses of WebLogs? What are the business uses of WebLogs? What controls might improve their effectiveness? What controls might improve their effectiveness?

Homework Friday Friday –Draft of Research Paper by COB Monday Monday –Text Chapter: Software in Flux Wednesday Wednesday –Case: Zara (In Gallaugher) Friday Friday –Final Draft of Research Paper