You are on page 1of 52

Internet, Intranet and Extranets

Presentation by :A.JUDITH AROCKIA GLADIES(M.E CSE)

What is Internet ?

It is a Global network of computers, (servers or clients).

to exchange information.

It is a "network of networks" that includes millions of private and public, academic, business, and government networks (local or Global), linked by copper wires, wireless connections, and other technologies.

What is the Internet?

Figure 7.1 The Internet connects mi

Hardware and Software of Internet


Variety of hardware and software are used to make Internet functional.

Modem Device that enables computers to communicate through phone lines. When we start internet the our modem communicates to modem of ISP.

Continued

Computer In addition to a modem, you need a client capable of handling multiple data types. Software Two types of softwares required to enable your PC as an Internet PC.

Communication software to establish connection Client software for browsing, e-mail, news.

these softwares are provided with windows itself.

Applications Of Internet

Download programs and files E-Mail Voice and Video Conferencing E-Commerce File Sharing Information browsing Search the web addresses for access through search engine Chatting and many more

Disadvantages of Internet

Theft of personal information such as name, address, credit card number etc. Virus threats nothing but a program which disrupts the normal functioning of your system. Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system. Pornography This is perhaps the biggest threat related to childrens healthy mental life. A very serious issue concerning the Internet.

Though, internet can also create havoc, destruction and its misuse can be very fatal, the advantages of it outweigh its disadvantages.

The World Wide Web

Hypertext transfer protocol (HTTP)

The protocol that determines how data in files (text, images, animation, or sound) should be coded, transferred, and viewed on the Internet. Special software designed to search the Web for specific sites and retrieve information (text, pictures, sound, and animation.)

Browsers

The World Wide Web

Figure 7.6 How a CGI works

The World Wide Web

Cookies

Small file a Web site places on a visitors hard disk so the site can remember something about the surfer later Search the Web for HTML tutorials View and study the source document of a Web page

Creating Your Own Web Pages


Intranet

What is Intranet ?
A

within-organization computer network that uses Internet technologies to communicate

Internal company network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software. Accessed only by authorized persons, especially members or employees of the organization

Intranet Security
Two levels of Security required:

Internal It can be imposed by Public Key Security & Encryption Key.

External Through Firewall.

What is Firewall ?

Security device located between firms internal network (intranet) & external network (internet).

Regulates access into & out of a companys network based on a set of rules.
Note : needs to be upgraded from time to time to check latest potential security problems.

Applications of Intranet

Sharing of company policies/rules & regulations Access employee database Distribution of circulars/Office Orders Access product & customer data Sharing of information of common interest Launching of personal/departmental home pages Submission of reports Corporate telephone directories

Disadvantages
Management problem

A company may not have person to update their Intranet on a routine basis Fear of sharing information and the loss of control Limited bandwidth for the business Unauthorized access Abuse of access Denial of service Information overload lowers productivity True purpose of the Intranet is unknown to many employees/departments Hidden or unknown complexity and costs

Security problem Productivity problem

Extranet

What is Extranet ?

Extranet is an Intranet for outside authorized users using same internet technology. Inter-organizational information system. enable outsiders to work together with companys employees.
open to selected suppliers, customers & other business partners

Examples..

1.

2.
3.

Dealers/distributors have access to product files such as :product specification, pictures, images, etc. to answer the queries of the customer.

Components of extranets ..
Some basic infrastructure components such as the internet Including :TCP/IP protocols, E-mail, Web-browsers, External business partners & Tele-commuting employees place order, check status & send E-mail.

Benefits of Extranet

Improved quality. lower travel costs. lower administrative & other overhead costs. reduction in paperwork. delivery of accurate information on time. improved customer service. better communication. overall improvement in business effectiveness.

Disadvantages

The suppliers & customer who dont have technical knowledge feel problem. Faceless contact. Information can be misused by other competitors. Fraud may be possible. Technical Employees are required.

Layered System View

Intranet Extranet

Corporate members Clients, partners, customers Global society: competitors

Internet

Introduction: What is a VPN?

Virtual

Private
Network

Introduction to VPN

Introduction to VPN

Four Categories:

Trusted VPN Secure VPN Hybrid VPN Provider-provisioned VPN

VPNTopology: Types of VPNs


Remote access VPN Intranet VPN Extranet VPN

VPN Topology: Remote Access VPN

VPN Topology: Intranet VPN

VPN Topology: Extranet VPN

VPN Topology: Advantages and Disadvantages of VPN

Advantages:

Greater scalability Easy to add/remove users Reduced long-distance telecommunications costs Mobility Security

VPN Topology: Advantages and Disadvantages of VPN

Disadvantages

Lack of standards Understanding of security issues Unpredictable Internet traffic Difficult to accommodate products from different vendors

VPN Components

Protocols Security Appliances

VPN Components: Protocols

IP Security (IPSec)

Transport mode Tunnel mode Voluntary tunneling method Uses PPP (Point-to-Point Protocol)

Point-to-Point Tunneling Protocol (PPTP)


VPN Components: Protocols

Layer 2 Tunneling Protocol (L2TP)


Exists at the data link layer of OSI Composed from PPTP and L2F (Layer 2 Forwarding) Compulsory tunneling method

Example of packet encapsulation

VPN Components: Security

Encryption

Technique for scrambling and unscrambling information Unscramble called clear-text Scrambled information cipher-text

VPN Components: Security

Keys

Secret code that the encryption algorithm uses to create a unique version of cipher-text 8-bits keys = 256 combinations or two to the eighth power 16-bits keys = 65,536 combinations or two to the 16th power 56-bits keys = 72,057,594,037,927,900 or two to the 56th power 168-bits keys

VPN Components: Security

Authentication

Determine if the sender is the authorized person and if the data has been redirect or corrupted User/System Authentication Data Authentication

VPN Components: Appliances

Intrusion detection firewalls


Monitors traffic crossing network parameters and protects enterprises from unauthorized access Packet-level firewall checks source and destination Application-level firewall acts as a host computer between the organizations network and the Internet

VPN Productivity and Cost Benefits: Benefits


Extends geographic connectivity Boosts employee productivity Improves Internet security Scales easily

VPN Productivity and Cost Benefit: Costs

Costs associated with implementing VPN


In House implementation Outsourced implementation Middle Ground implementation

Future of VPN

VPN popularity

Companies choosing VPN Cost efficient? New way of communicating?

Network

Computer network A combination of computers connected through transmission media.

LAN (Local Area Network) MAN (Metropolitan Area Network) WAN (Wide Area Network)

Internetwork (e.g. Internet) Networks can be connected using connecting device.

Figure 6-3

Categories of networks

LAN (Local Area Network)

Allow resource sharing between computers.

Computers Peripheral devices Transmission medium (e.g. cable)

3 types of topology

Bus topology Star topology Ring topology

LANs

Figure 6-4

Hub

a device that facilitates connection LAN acts logically like a bus.

Star the dominant topology today.

Figure 6-5

MAN

MAN (Metropolitan Area Network)

Uses services provided by a network service provider. (Tel. Company)


Individual users computers Organizations LANs

Many Tel. Company provide a popular MAN service called SMDS (Switched Multimegabit Data Services)

Prior to SMDS's arrival in 1995, the only way to connect LANs was through a dedicated private line.

Figure 6-6

WAN

WAN (Wide Area Network)

The connection of individual computers or LANs over a large area (country, world). User using a telephone line to connect to an ISP (Internet Service Provider) is using a WAN.

Negotiates fee

ISP Tel. company

THE END
Thank You

You might also like