Application+Services

=Application Services= Application services are services that provide functionality to other computers and help users perform tasks.
 * Application software
 * Databases
 * Web proxy
 * Shared resources
 * Printing
 * Storage space
 * Voice over IP
 * Mobile working
 * Authentication
 * Users
 * Hardware

Databases
A database is an information archive that holds numerous records on a specific subject. A database network service provides remote access to a database stored on a server and gives a user the appropriate permissions depending on the configuration. The use of network based database applications provides much better access to information stored in the database and enables much much more accessable database storage and management. **In a busniess context databases provide structured reliable method and resource with which they can record and store data. MySQL (Server Querry Language) is a standardised method in which information may be retreived or added to a database that is stored on a server. Databases form a key component of the active directory setup and are required to store the large volumes of data involved with large networks with many users.** This diagram shows how a user accesses a database server.

Web Proxy
A web proxy is a server that receives a HTTP request from a client and gets the page requested and sends it to the client. This configuration allows all outbound/inbound HTTP traffic to be filtered. Additionally proxy servers also store cached versions (short-term copies) of websites allowing frequently viewed sites to be accessed without increasing external network traffic.**Enterprise class proxy servers give administrators controls over what sites can be accessed through the proxy server as well as who is allowed to use the server. Proxy servers also allow filtering out malicious sites that may damage network security and integrity.** This diagram shows how employee workstations connect to the internet through a proxy server. The benefit of this configuration is that all website access can be recorded and viewed by administrators.

Shared Resources
Many network services allow devices such as printers to be shared across an network and can help users communicate and share ideas and resources.

Printing
Sharing printers across a network makes the task of maintaining each individual printer much easier as each individual computer would not need its own printer and needs only be configured to use the network printer, in order to use a network printer a print server is needed. Print servers provide printing services to other devices on the network and allow computers to print documents without having a printer directly connected to the computer. A good print server will be able to hold a large print queue and receive and process print commands quickly. **By using combined network printers rather than individual computer prointers an organisation will be able to save a considerable amount of money on printers, maintennance and ink.** This diagram shows how users connect to printers across a network. Flies being sent to print are uploaded to the file server and prepared for printing once the files are prepared and the printer is ready the file is printed. the use of a file server allows multiple printers to be connected to a file server and accessible by many users.

Storage space
Using romote "cloud" storage space for file storage reduces the need for local storage and and allows users to access their files regardless of what computer they are using. There are many applications that can be used for remote file access and allow users to read and write documents on a remote file server.

VoIP
Voice over Internet Protocol (VoIP) is a network service that records, encapsulates and then sends audio across a network. It is used to allow voice calls to be made across the internet and is used in applications like Skype.

Skype Homepage: [|www.skype.com]


 * Skype has a wide selection of communication tools for home users as well as businesses, such tools include screen sharing and video chat to enable users to communicate better. Using skype in businesses also allows them to have conferences with various members of staff that are stationed around the world whilst avoiding the high cost and disruptive process of transporting them to the same location and back again. The removal of transport costs means that an organisation would be able to have more meetings than they would have normally.**

Mobile Working
Mobile working technology allows users to connect to remote networks and use that networks services as if their device was within that network. the main usage of this technology is allowing workers to connect to the business and have the same access rights that they would have normally and carry out their work remotely. **VPN (Virtual Private Network) based connections account for a large number of mobile working usages and provide one of the most secure methods of communicating over long distances. This allows secure network resources be accessed over long distances and through third party channels meaning that an organisation can allow its staff to access important resources fro carrying out their work quickly and safely.** This diagram shows how a user connects to a protected network using an encrypted connection. VPN (Virtual Private Network) based network access provides a secure method of accessing network resources and services.

Authentication
With the large amount of network services available to users and businesses the importance of authenticating who is connected to to a network or service is a vital aspect of security and administration.

Users
The process of authenticating users is most commonly achieved with a username and password as it is easy to set up and use. Another common way of confirming a users identity is ID cards as they are farly cheap (depending on the type of card used) and can be checked by security guards when someone attempts to gain physical access to a system. **User authentication forms a key part of any security setup and is required for the system to be able to assign access rights based on their user credentials.**

Hardware
Hardware authentication is generally more secure and more expensive that software based authentication. Advanced hardware authentication includes; retinal scanners, face recognition, voice recognition etc. High-tech hardware authentication is used for protecting highly sensitive information of hardware due to the high cost of installation. **This high cost of installation is often considered a neccessity for certain high level data servides such as secure data hosting or e-comerce sites as well as any other area where sensitive data is being processed.**

Explanation Of Hardware Authentication:[]