Networks

INFORMATION TECHNOLOGY GUIDE

New client-server tools help agencies migrate to enterprise computing.

Nothing has contributed more to the popularity of federal client-server networks than government downsizing. Agencies faced with smaller budgets and technical staffs are shifting computer applications from huge data centers filled with expensive mainframes to distributed computing environments that incorporate PCs. Inexpensive desktop machines, known as clients, can use file servers to tap more powerful computers for data and software applications to be used locally.

Client-server networks empower lower-level workers by giving them immediate access to many types of data from multiple operating systems and hardware platforms. The Social Security Administration, for instance, is linking 60,000 workstations to the agency's mainframe center in Baltimore. Distributed computing also helps workers share common resources such as printers, modems and mass-storage devices.

Although client-server networks are not appropriate for all computer applications, the technology is helping the federal government reduce many of its data centers. The Defense Department, for example, is consolidating 194 military data centers into 16 megacenters-all with the help of distributed computing.

The goal of many agencies is to connect their dozens of local-area networks(LANs), which link individual PCs and workstations. Such inter-networking helps organizations tie together disparate databases and reengineer their information systems.

This year, agencies will be relying on high-performance servers from manufacturers such as AST Research, Compaq, Dell, Hewlett-Packard and IBM to connect networks of desktop machines. Future hardware innovations are expected to improve network speeds. Compaq and Texas Instruments, for instance, are involved in a joint venture to design fast networking chips.

Prices will continue to drop this year for critical network components such as hubs, bridges, routers, gateways and repeaters. These devices from companies such as Bay Networks, Cabletron, Cisco Systems and 3ComCorp. ensure that data travels along the most efficient paths within networks. Hubs are particularly important in large networks that carry communications from multiple network protocols.

Operating Systems. Competition will continue to be fierce in 1996 for makers of network operating systems. Novell's NetWare 4.1 has had tremendous success since its introduction a year ago. The operating system, which enables client-server users to manage data through one global directory supporting the entire enterprise, has been bundled onto several server models.

Many firms, spurred by the adoption of new technology standards, have introduced programs that increase the interoperability of their operating systems. Novell's NetWare Client for Windows NT, for example, gives NT users access to NetWare. Santa Cruz Operation's Unix-based Open Server Release 5 is an open system that enables users to run applications designed for different platforms.

Network Management. One of the hottest segments of network management is directory services, which help guide network administrators through enterprises. Directories are repositories of information such as access rights and log-in names pertaining to specific applications. Directory services enable different directories to work together so data can be shared throughout a network. This eliminates the need for network managers to manually replicate data.

Directory services used to be bundled with network operating systems, but as networks became larger and more sophisticated, companies such as Banyan Systems and Novell started selling them separately. The services play a major role in helping network managers track information.

New network-management programs from makers such as Computer Associates, Hewlett-Packard and Sun Microsystems provide 24-hour-a-day status reports on network components. These help network administrators quickly detect traffic congestion, component failures and cable faults so networks can be reconfigured before data is lost.

Companies such as Cabletron have even started incorporating artificial-intelligence tools into their network-management software. These programs can automatically reroute data or isolate faulty devices to ensure that networks keep running efficiently.

RAD Tools. Also helping in the movement to distributed-processing environments have been rapid application development (RAD) tools, which help users write software applications for client-server networks. These tools from companies such as IBM, Powersoft, Sterling Software and Texas Instruments employ graphical-user interfaces that make customized applications relatively easy to create since users don't have to write every line of code.

Such model-based development saves agencies money and significantly reduces the time needed to deploy client-server applications. In addition, RAD tools can be reused in future applications.

And for applications developers interested in connecting copiers or other types of office equipment to networks, Novell has introduced an Embedded Systems Technology kit that enables users to integrate programming interfaces for virtually any type of electronic device.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.