Collection
zero Useful+1
zero

Enterprise network

An important or courageous project carried out by a company organized for business purposes
Enterprise network , the English name is Enterprise Networks, an enterprise. According to the Webster dictionary, it is an important or courageous project carried out by a company organized for business purposes. With this understanding, you can understand that many companies are working to interconnect their separate department or workgroup networks with their internal networks, so that all computer users in the company can access any data or computing resources. You can call this Internet a joint system, because it is provided between independent multi model systems Interoperability However, the ultimate goal of an enterprise network is to reduce the use of communication protocol To improve more interoperability between applications and the ability to access data from any system. [1]
Site Name
Enterprise network
Alias
website
Foreign name
Enterprise Networks
See publications
Terminology of Communication Science and Technology, Science Press
Time of publication
2007 [3]

form

Announce
edit
Enterprise network immune wall
The enterprise network is composed of Working Group Computing evolved, and the latter is related to desktop to network integration. In terms of scope, the enterprise network can be either local or wide area. It integrates all systems in an organization, whether they are DOS based computers, Apple Macintosh computers, UN Ⅸ workstations Small computer , or Mainframe The company has begun to dislike the so-called "big name" suppliers, such as the dedicated interfaces of IBM and DEC, and turned to systems that can provide more openness and accept products from multiple vendors. IBM and DEC now also support open standards. Provide users with dedicated system access gateway It is no longer the solution. This method is too restrictive and should not be extended to meet the data access requirements of an interconnected organization. [1]

Detailed introduction

Announce
edit
Vlan design in enterprise network
The enterprise network should be modeled as a "plug and play" platform, as shown in Figure E-7, which allows an organization to connect all its computing resources. Approved by departments and working groups Bridge Router It is connected to the wide area telecommunication link. Users and workgroups are not isolated. While maintaining a certain degree of performance, security and reliability, users and workstations can share information with other computer users and computers running different operating systems. In the enterprise network, information is distributed throughout the network, and users must access them conveniently, while sensitive information must be protected against unauthorized access. [1]

Achieve goals

Announce
edit

Establish network platform

Establish a network platform that conforms to basic standards and allows multi vendor hardware and software products to work together. [1]

Establish operating system

Establish operating systems and applications that support multiple standards.
When the computer processing capacity increases and the price of desktop resources drops, it is much easier to achieve these two points. Instead of focusing on a single standard or protocol structure, vendors can easily support all. Computers today have the processing power, memory requirements, and User interface So that users can avoid being troubled by complexity. When a network is found to be a connected DOS, UN Ⅸ and Windows NT workstation, IPX, TCP/IP and NetBIOS protocol Grouping is normal. Servers and workstations now store multiple protocol stacks in memory to communicate with multiple systems. [1]
However, this strategy can only be used in the network connected environment (i.e physical layer data link layer , network layer and Transport layer )。 This is only because a UN Ⅸ workstation can send TCP/IP Grouping to NetWare servers does not mean that it can seamlessly access the resources on the server. The high-level protocols in the protocol stack also need interoperability, and UN Ⅸ must be able to use its own UNIx applications to access data on NetWare servers through applications. Accordingly, Windows users should also be able to access a UN Ⅸ system or IBM directly from local applications, such as Microsoft Excel Mainframe Information on. [1]
Client Server Computing and Middleware Client/server computing and middleware. [1]
Fortunately, this level of Interoperability As client/server computing“ middleware ”Products, between platforms message The development of delivery services and supply strategies to support other suppliers' products is emerging. [1]
Client/server computing is generated by the need to allow multiple clients to access data on a single server. In most cases, use the same or compatible operating system and Computer platform Due to the development of the network, clients have gained the ability to access data on a variety of background servers. Today's trend is to allow any client running on any operating system to access any Background database Services. This is a basic catalyst for establishing enterprise network system. Extended communication is another. [1]

Transmission mechanism

Announce
edit
The dialog system provides a compact interface between client and server running in real-time. A logical connection can be established between systems and a one-way or two-way conversation can be conducted on the connection to complete a task. This process is used to complete multiple tasks, not just one transaction. The task order can be specified or even overridden. [1]
remote procedure call (RPC) is a call to connect two computers on a synchronous connection. This connection needs to be maintained to ensure that the Data integrity This connection is very important in "mission critical" applications, such as bank transactions. [1]
message The transmission system is in which information and requests are sent between computers like electronic mail( E-mail )It is also transmitted between users. The message is stored and forwarded along a path to the destination. However, the message system Real time database The ability to update is limited. They only provide efficient read services. [1]

Guidance strategy

Announce
edit
Microsoft's Windows Open Systems Architecture (WOSA) strategy will middleware Built directly into the operating system to make it easier for information to flow throughout the enterprise. WOSA includes one Database interface Standard - Open Database Connectivity (ODBC). [1]
Apple Open Collaboration Environment (AOCE) of Apple Computer Company This is a work group or Workflow Cooperative development environment. [1]
Open Software Foundation (OSF) Distributed computing environment (DCE) This is a set Supporting software , hidden the differences between multi vendor products, technologies and standards, and provided Distributed applications Development and maintenance tools for. [1]
The database vendor alliance composed of SQL Access Group (SAG) and X/Open Group is strengthening Structured Query Language (SQL) standards to support database access across multi vendor systems. [1]
Integrated database Application Programming Interface (IDAPI) is Borland's standard database application programming interface (API).

SQL standard

Announce
edit
Distributed Relational Database Access (DRDA) is IBM's database information access standard across IBM platforms, which follows SQL standards.
Oracle Glue provides a support for applications Dynamic data exchange (DDE), such as Microsoft Excel and Visual Basic links to Oracle and IBM DB2 servers.
Object Management Group (OMG) is providing cross platform object-oriented Environmental standards. object request broker architecture (CORBA) is owned by OMG Object Management Architecture (OMA).
The Common Open Software Environment (COSE) is a supplier alliance including IBM, HP, SunSoft and Novell, which cooperates to launch a common UN Ⅸ platform environment.
In an IBM environment, Advanced program to program communication (APPC) and Advanced Peer to peer network (APPN) strategy provides a method to realize the Decentralized calculation Environmental Science. IBM's Networking Blueprint defines industrial standards such as TCP/IP and OSI protocols communication protocol Support. APPN allows each workstation to initialize its own communication session on the network, which supports client/server computing Distributed database And multi vendor products remote procedure call
Interoperability also occurs at the operating system level. New operating systems such as Microsoft Windows NT provide multiple protocols such as TCP/IP and NetBIOS, enabling clients to access many background services. OSF's DCE has more widely accepted this concept, providing a development environment that enables any vendor to develop applications with built-in multi vendor distributed processing capabilities and services, including search services, message authentication Public key encryption wait. DCE is basically a public infrastructure for an organization to build its own enterprise network. Messaging Workflow and Workgroups.
Another software category is making enterprise networks more brilliant. The message transmission system provides communication tools to enable network users to carry out engineering cooperation and execution groupware and Workflow software The following message transfer standards apply to electronic mail, groupware, workflow and Working Group Applications provide different levels of Interoperability
Public Mail Paging (CMC) is an industry supported specification that allows applications to deliver messages on multiple supporting platforms. 10. The 400 API protocol is supporting and improving this standard.
Apple Open Collaboration Environment (AOCE) AOCE of Apple Computer Company provides tools for generating applications in distributed Macintosh and multi vendor environments.
Message passing API (MAPI) MAPI is Microsoft's window opening System architecture It is a part of Windows special message transmission interface.
Supplier Independent Message Transfer (Ⅵ M) Ⅵ M is the interface defined by Lotus, which enables applications to communicate with Lotus CC: Mail and Lotus Notes.

Application of enterprise network

Announce
edit

Application of management

At present, the network management system of some enterprises only stays in the same perspective as asset management. Such management system can only play a certain role in protecting the hardware equipment supporting the enterprise network. To make the enterprise network play its due role, we must strengthen management and formulate a series of practical rules and regulations and management measures. [2]

Application of equipment and resources

1. Equipment use system. adopt equipment The use system can grasp the increase, decrease and change of any equipment in the network at any time. When a fault occurs, management The function of network equipment can be adjusted or changed to maintain the normal operation of the network. [2]
2. Configuration management system. Configuration management involves tasks such as collection, monitoring, and modification of network device configurations. Its main goal is to effectively maintain detailed records of network history, current, and future, and grasp the impact of network configuration changes on network performance and network security at any time. [2]
3. Fault management system. Fault management is to monitor, report and store alarm information from hardware devices or path nodes, as well as diagnose, locate and process faults. Its main goal is to quickly locate and isolate fault sources in the network or find potential faults, and eliminate them as soon as possible, so that the network can operate orderly, Avoid system paralysis or unacceptable network degradation due to errors and failures. [2]
4. Billing management system. Billing management is a measure for the enterprise network to provide users with paid services. It can not only be used as the basis for network billing, but also be used to make use of information statistics for the end users of the enterprise network. It is also a reference for future network upgrade or update planning. Billing management is also a means to ensure the security of the enterprise network, to avoid the illegal use of network resources by unauthorized users and affect the efficiency of registered users' use of network resources. [2]
5. IP address management system. Unified IP The address management system can effectively guarantee the legitimacy and uniqueness of enterprise network access users. The network center is responsible for planning, distribution and management of IP address allocation. [2]
6. Safety management system. Security management is the key point of network management. It can prevent unauthorized users from using network resources without authorization, prevent users from intentionally or unintentionally destroying the security of the network system, and ensure that important information is not accessed by unauthorized users.

Future trends

Announce
edit
The current trend is Distributed computing environment Add client/server computing in. User requirements and various background services, including those running on different platforms Database management system Quick Connect for. LAN hardware supporting this trend includes switched Ethernet LAN and fast packet switching WAN Services such as Frame relay , Multi megabit Data Exchange Services (SMDS), and Asynchronous transmission mode (ATM)。 When the wide area network (WAN) starts to become more like the local area network (LAN), with Burst transmission When frequently accessing remote resources in multiple regions, the traditional T1 dedicated line cannot provide such support. [1]
Multimedia enabled graphics User interface , such as Windows, urgently need new storage devices such as voice e-mail server and video server. At the same time, Switched Ethernet Or Fast Ethernet can provide bandwidth Switched Ethernet can provide Differential segment Function (microsegmentation) This can be differentiated to only one workstation connected to a LAN Network segment Communicate with sound and video servers. Priority privilege is a method of transmitting real-time video. It suspends many packets in the communication link to ensure that video information has enough bandwidth to arrive on time and in sequence. Priority privileges can be accessed on the Ethernet 100VG-AnyLAN , ATM and other types of networks. [1]
Vendors provide support today in many different ways LAN (LAN) and media type Hub And allow communication between these LANs. This makes it possible to build a“ Virtual LAN (LAN)”。 Users on a token ring segment and users on an Ethernet segment can be part of the same workgroup. ATM Switched Hub can provide bandwidth and connection between any user and any other user or device on a dotted line, without requiring Routing Equipment. [1]
In order to plan the future development, it is necessary to evaluate the communication protocols on the enterprise network and finally select one or two protocols. To support future bandwidth Demand, consider ATM hub as Structured cabling system The ultimate goal of the main switching equipment in is to add ATM hubs for departments and workgroups in the future. [1]