Professional Documents
Culture Documents
What is Internet ?
to exchange information.
It is a "network of networks" that includes millions of private and public, academic, business, and government networks (local or Global), linked by copper wires, wireless connections, and other technologies.
Modem Device that enables computers to communicate through phone lines. When we start internet the our modem communicates to modem of ISP.
Continued
Computer In addition to a modem, you need a client capable of handling multiple data types. Software Two types of softwares required to enable your PC as an Internet PC.
Communication software to establish connection Client software for browsing, e-mail, news.
Applications Of Internet
Download programs and files E-Mail Voice and Video Conferencing E-Commerce File Sharing Information browsing Search the web addresses for access through search engine Chatting and many more
Disadvantages of Internet
Theft of personal information such as name, address, credit card number etc. Virus threats nothing but a program which disrupts the normal functioning of your system. Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system. Pornography This is perhaps the biggest threat related to childrens healthy mental life. A very serious issue concerning the Internet.
Though, internet can also create havoc, destruction and its misuse can be very fatal, the advantages of it outweigh its disadvantages.
The protocol that determines how data in files (text, images, animation, or sound) should be coded, transferred, and viewed on the Internet. Special software designed to search the Web for specific sites and retrieve information (text, pictures, sound, and animation.)
Browsers
Cookies
Small file a Web site places on a visitors hard disk so the site can remember something about the surfer later Search the Web for HTML tutorials View and study the source document of a Web page
Intranet
What is Intranet ?
A
Internal company network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software. Accessed only by authorized persons, especially members or employees of the organization
Intranet Security
Two levels of Security required:
What is Firewall ?
Security device located between firms internal network (intranet) & external network (internet).
Regulates access into & out of a companys network based on a set of rules.
Note : needs to be upgraded from time to time to check latest potential security problems.
Applications of Intranet
Sharing of company policies/rules & regulations Access employee database Distribution of circulars/Office Orders Access product & customer data Sharing of information of common interest Launching of personal/departmental home pages Submission of reports Corporate telephone directories
Disadvantages
Management problem
A company may not have person to update their Intranet on a routine basis Fear of sharing information and the loss of control Limited bandwidth for the business Unauthorized access Abuse of access Denial of service Information overload lowers productivity True purpose of the Intranet is unknown to many employees/departments Hidden or unknown complexity and costs
Extranet
What is Extranet ?
Extranet is an Intranet for outside authorized users using same internet technology. Inter-organizational information system. enable outsiders to work together with companys employees.
open to selected suppliers, customers & other business partners
Examples..
1.
2.
3.
Dealers/distributors have access to product files such as :product specification, pictures, images, etc. to answer the queries of the customer.
Components of extranets ..
Some basic infrastructure components such as the internet Including :TCP/IP protocols, E-mail, Web-browsers, External business partners & Tele-commuting employees place order, check status & send E-mail.
Benefits of Extranet
Improved quality. lower travel costs. lower administrative & other overhead costs. reduction in paperwork. delivery of accurate information on time. improved customer service. better communication. overall improvement in business effectiveness.
Disadvantages
The suppliers & customer who dont have technical knowledge feel problem. Faceless contact. Information can be misused by other competitors. Fraud may be possible. Technical Employees are required.
Intranet Extranet
Internet
Virtual
Private
Network
Introduction to VPN
Introduction to VPN
Four Categories:
Advantages:
Greater scalability Easy to add/remove users Reduced long-distance telecommunications costs Mobility Security
Disadvantages
Lack of standards Understanding of security issues Unpredictable Internet traffic Difficult to accommodate products from different vendors
VPN Components
IP Security (IPSec)
Transport mode Tunnel mode Voluntary tunneling method Uses PPP (Point-to-Point Protocol)
Exists at the data link layer of OSI Composed from PPTP and L2F (Layer 2 Forwarding) Compulsory tunneling method
Encryption
Technique for scrambling and unscrambling information Unscramble called clear-text Scrambled information cipher-text
Keys
Secret code that the encryption algorithm uses to create a unique version of cipher-text 8-bits keys = 256 combinations or two to the eighth power 16-bits keys = 65,536 combinations or two to the 16th power 56-bits keys = 72,057,594,037,927,900 or two to the 56th power 168-bits keys
Authentication
Determine if the sender is the authorized person and if the data has been redirect or corrupted User/System Authentication Data Authentication
Monitors traffic crossing network parameters and protects enterprises from unauthorized access Packet-level firewall checks source and destination Application-level firewall acts as a host computer between the organizations network and the Internet
Extends geographic connectivity Boosts employee productivity Improves Internet security Scales easily
Future of VPN
VPN popularity
Network
LAN (Local Area Network) MAN (Metropolitan Area Network) WAN (Wide Area Network)
Figure 6-3
Categories of networks
3 types of topology
LANs
Figure 6-4
Hub
Figure 6-5
MAN
Many Tel. Company provide a popular MAN service called SMDS (Switched Multimegabit Data Services)
Prior to SMDS's arrival in 1995, the only way to connect LANs was through a dedicated private line.
Figure 6-6
WAN
The connection of individual computers or LANs over a large area (country, world). User using a telephone line to connect to an ISP (Internet Service Provider) is using a WAN.
Negotiates fee
THE END
Thank You