Network Access Information

Introduction
Capacity Planning
Network Access Providers

Network Access Diagram
New Users Steps to Success
Existing Users
Average Response Times

Glossary

Network Component Glossary

Application Server - Generates the content to be transmitted to the end user browser.

Forward Proxy - The World Wide Web (WWW) Proxy server allows an end user running a web browser (Netscape or Internet Explorer, for instance) to get controlled access to the information resources available on the Internet. The proxy server performs security and network performance functions.

Internet Service Provider (ISP) - A company that provides connectivity to the worldwide Internet.

Intranet - A network operating like the World Wide Web but having access restricted to a limited group of authorized users (such as employees of a company).

Network Access Service Preferred Provider - Network Access Service provides an alternative to the Public Internet for accessing the Boeing Security Perimeter. Network Access Service provides performance monitored electronic network access to the Boeing Security Perimeter for Boeing customers (includes airlines, suppliers and trading partners).

Private Network - A secure electronic communications network that connects specific computer networks and organizational computer facilities. This type of network is provided by one or more telecommunication providers. If more than one telecommunications provider is used a peering agreement is established between the two service providers. Specified bandwidth and quality of service agreements are agreed to.

Problem Resolution Support - A process by which system problems are addressed and solved.

Public Internet - An electronic communications network that connects computer networks and organizational computer facilities around the world.

Reverse Proxy - The Reverse Proxy (RP) software runs on a server located on the Boeing security perimeter and allows business partners and customers access to internally-located web content from the Internet or other external network.

Security Perimeter - Consists of exterior physical and logical barriers, access control cells, and an interior physical and logical barrier. These systems control the flow of data to and from the interior "access control cells". Their primary functions are to manage the connection transfers to and from the "access control cells", and support logging of these transfers and any unexpected connection requests.



Home           Welcome          Getting Started