HostedDB - Dedicated UNIX Servers

index_9
Auerbach Publications © 2001 CRC Press LLC 08/01 ing site, layers of security could be implemented to reduce exposure. Authentication, dial-back, time limitations, and access restrictions were employed to increase control over the communication and decrease ex- posure to threats. These protection suites were made possible primarily because of the one-on-one aspect of the communication; once the con- nection was established, it could be easily identified and controlled. As far as the communication itself, it was relatively protected while travers- ing the public phone system over dedicated circuits. Because broadband technology can utilize Ethernet to allow connec- tivity to the access device the computer simply has to be "on" for Internet communications (see Exhibit 4). This represents a huge change from tra- ditional modem access, where the computer was responsible for estab- lishing  and  maintaining  the  connection.  Currently,  with  typical broadband the connection is sustained at the access device allowing In- ternet connectivity, regardless of the state of other systems on the Ether- net interface. The Ethernet interface on the computer does not require a user to initialize it, know a phone number, or be concerned about the connection. All these options are controlled by the operating system; even the IP address is automatically assigned by the ISP, reducing the in- teraction with the user even further. Now, the responsibility for Internet EXHIBIT 4 — Broadband Removed the User and System from the Es- tablishment of the Connection Modem Cable/xDSL Modem Internet ISP (Cable/xDSL) Phone System Ethernet Crossover Cable TV Cable/Phone Line Used for xDSL Systems and Devices Responsible for Creating and Maintaining the Connection Phone Line Internal Modem Serial Cable for External Modems