internet intranet extranet2
TRANSCRIPT
-
7/31/2019 Internet Intranet Extranet2
1/52
Presentation by :-
A.JUDITH AROCKIA
GLADIES(M.E CSE)
-
7/31/2019 Internet Intranet Extranet2
2/52
It is a Global network of computers,
(servers or clients).
to exchange information.
It is a "network of networks" that includes millionsof private and public, academic, business, andgovernment networks (local or Global),
linked by copper wires, wireless connections, andother technologies.
-
7/31/2019 Internet Intranet Extranet2
3/52
What is the Internet?
Figure 7.1 The Internet connects mi
-
7/31/2019 Internet Intranet Extranet2
4/52
-
7/31/2019 Internet Intranet Extranet2
5/52
Computer
In addition to a modem, you need a client capable
of handling multiple data types.
Software
Twotypes ofsoftwares required to enable yourPC as an Internet PC.
Communication softwaretoestablish connection
Client software forbrowsing, e-mail, news.
these softwares are provided with windows itself.
-
7/31/2019 Internet Intranet Extranet2
6/52
Download programs and files
E-Mail
Voice and Video Conferencing
E-Commerce
File Sharing
Information browsing
Search the web addresses for access throughsearch engine
Chatting and many more
-
7/31/2019 Internet Intranet Extranet2
7/52
Theft of personal information such as name, address, creditcard number etc.
Virus threats nothing but a program which disrupts the normalfunctioning of your system.
Spamming refers to receiving unwanted e-mails in bulk, whichprovide no purpose and needlessly obstruct the entire system.
Pornography This is perhaps the biggest threat related tochildrens healthy mental life. A very serious issue concerning
the Internet.
Though, internet can also create havoc, destructionand its misuse can be very fatal,
the advantagesof it outweigh its disadvantages.
-
7/31/2019 Internet Intranet Extranet2
8/52
The World Wide Web
Hypertext transfer protocol (HTTP)
The protocol that determines how data in files(text, images, animation, or sound) should be
coded, transferred, and viewed on the Internet.
Browsers
Special software designed to search the Web forspecific sites and retrieve information (text,
pictures, sound, and animation.)
-
7/31/2019 Internet Intranet Extranet2
9/52
The World Wide Web
Figure 7.6 How a CGI works
-
7/31/2019 Internet Intranet Extranet2
10/52
The World Wide Web
Cookies
Small file a Web site places on a visitors hard disk so
the site can remember something about the surfer later
Creating Your Own Web Pages
Search the Web for HTML tutorials
View and study the source document of a Web page
-
7/31/2019 Internet Intranet Extranet2
11/52
-
7/31/2019 Internet Intranet Extranet2
12/52
A within-organization computer network that
uses Internet technologies to communicate
Internal company network that uses Internet
standards (HTML, HTTP & TCP/IP protocols) &
software.
Accessed only by authorized persons, especially
members or employees of the organization
-
7/31/2019 Internet Intranet Extranet2
13/52
Two levels of Security required:
Internal
It can be imposed by Public Key Security &
Encryption Key.
External
Through Firewall.
-
7/31/2019 Internet Intranet Extranet2
14/52
Security device located between firms internal
network (intranet) & external network (internet).
Regulates access into & out of a companys network
based on a set of rules.
Note : needs to be upgraded from time to time to check latest
potential security problems.
-
7/31/2019 Internet Intranet Extranet2
15/52
Sharing of company policies/rules & regulations
Access employee database
Distribution of circulars/Office Orders
Access product & customer data
Sharing of information of common interest
Launching of personal/departmental home pages Submission of reports
Corporate telephone directories
http://www.cio.com/WebMaster/strategy/http://www.cio.com/WebMaster/strategy/ -
7/31/2019 Internet Intranet Extranet2
16/52
Information overload lowers productivity
True purpose of the Intranet is unknown to manyemployees/departments
Hidden or unknown complexity and costs
Productivity
problem
Unauthorized access
Abuse of access
Denial of service
Security
problem
A company may not have person to update their
Fear of sharing information and the loss of control Limited bandwidth for the business
Management
problem Intranet on a routine basis
-
7/31/2019 Internet Intranet Extranet2
17/52
-
7/31/2019 Internet Intranet Extranet2
18/52
Extranet is an Intranet for outside authorized users
using same internet technology.
Inter-organizational information system.
enable outsiders to work together with companys
employees.
open to selected suppliers, customers & other business
partners
-
7/31/2019 Internet Intranet Extranet2
19/52
Dealers/distributors have access to
product files such as :-
1. product specification,
2. pictures,
3. images, etc.
to answer the queries of the customer.
-
7/31/2019 Internet Intranet Extranet2
20/52
Some basic infrastructure components suchas the internet Including :-
TCP/IP protocols,
E-mail,
Web-browsers,
External business partners & Tele-commuting employees place order,
check status & send E-mail.
-
7/31/2019 Internet Intranet Extranet2
21/52
Improved quality.
lower travel costs.
lower administrative & other overhead costs.
reduction in paperwork.
delivery of accurate information on time.
improved customer service.
better communication.
overall improvement in businesseffectiveness.
-
7/31/2019 Internet Intranet Extranet2
22/52
The suppliers & customer who dont
have technical knowledge feel problem.
Faceless contact.
Information can be misused by other competitors.
Fraud may be possible.
Technical Employees are required.
-
7/31/2019 Internet Intranet Extranet2
23/52
Clients, partners, customersExtranet
-
7/31/2019 Internet Intranet Extranet2
24/52
Introduction: What is a VPN?
Virtual
Private
Network
-
7/31/2019 Internet Intranet Extranet2
25/52
Introduction to VPN
-
7/31/2019 Internet Intranet Extranet2
26/52
Introduction to VPN
Four Categories:
Trusted VPN Secure VPN
Hybrid VPN
Provider-provisioned VPN
-
7/31/2019 Internet Intranet Extranet2
27/52
VPNTopology: Types of VPNs
Remote access VPN
Intranet VPN Extranet VPN
-
7/31/2019 Internet Intranet Extranet2
28/52
VPN Topology: Remote Access
VPN
-
7/31/2019 Internet Intranet Extranet2
29/52
VPN Topology: Intranet VPN
-
7/31/2019 Internet Intranet Extranet2
30/52
VPN Topology: Extranet VPN
-
7/31/2019 Internet Intranet Extranet2
31/52
VPN Topology: Advantages and
Disadvantages of VPN
Advantages:
Greater scalability Easy to add/remove users
Reduced long-distance telecommunications costs
Mobility
Security
-
7/31/2019 Internet Intranet Extranet2
32/52
VPN Topology: Advantages and
Disadvantages of VPN
Disadvantages
Lack of standards
Understanding of security issues
Unpredictable Internet traffic
Difficult to accommodate products from different
vendors
-
7/31/2019 Internet Intranet Extranet2
33/52
VPN Components
Protocols
Security Appliances
-
7/31/2019 Internet Intranet Extranet2
34/52
VPN Components: Protocols
IP Security (IPSec)
Transport mode
Tunnel mode
Point-to-Point Tunneling Protocol (PPTP)
Voluntary tunneling method
Uses PPP (Point-to-Point Protocol)
-
7/31/2019 Internet Intranet Extranet2
35/52
VPN Components: Protocols
Layer 2 Tunneling Protocol (L2TP)
Exists at the data link layer of OSI
Composed from PPTP and L2F (Layer 2
Forwarding)
Compulsory tunneling method
-
7/31/2019 Internet Intranet Extranet2
36/52
Example of packet encapsulation
-
7/31/2019 Internet Intranet Extranet2
37/52
VPN Components: Security
Encryption
Technique for scrambling and unscrambling
information
Unscramble called clear-text
Scrambled information cipher-text
-
7/31/2019 Internet Intranet Extranet2
38/52
VPN Components: Security
Keys
Secret code that the encryption algorithm uses to
create a unique version of cipher-text
8-bits keys = 256 combinations or two to the eighth
power
16-bits keys = 65,536 combinations or two to the 16th
power 56-bits keys = 72,057,594,037,927,900 or two to the
56th power
168-bits keys
-
7/31/2019 Internet Intranet Extranet2
39/52
VPN Components: Security
Authentication
Determine if the sender is the authorized person
and if the data has been redirect or corrupted
User/System Authentication
Data Authentication
-
7/31/2019 Internet Intranet Extranet2
40/52
VPN Components: Appliances
Intrusion detection firewalls
Monitors traffic crossing network parameters and
protects enterprises from unauthorized access
Packet-level firewall checks source and
destination
Application-level firewall acts as a host computer
between the organizations network and the
Internet
-
7/31/2019 Internet Intranet Extranet2
41/52
VPN Productivity and Cost
Benefits: Benefits
Extends geographic connectivity
Boosts employee productivity Improves Internet security
Scales easily
-
7/31/2019 Internet Intranet Extranet2
42/52
VPN Productivity and Cost
Benefit: Costs
Costs associated with implementing VPN
In House implementation
Outsourced implementation
Middle Ground implementation
-
7/31/2019 Internet Intranet Extranet2
43/52
Future of VPN
VPN popularity
Companies choosing VPN
Cost efficient?
New way of communicating?
-
7/31/2019 Internet Intranet Extranet2
44/52
Network
Computer networkA combination of computers connected
through transmission media. LAN (Local Area Network)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
Internetwork(e.g. Internet)Networks can be connected using connectingdevice.
-
7/31/2019 Internet Intranet Extranet2
45/52
Figure 6-3
Categories of networks
-
7/31/2019 Internet Intranet Extranet2
46/52
LAN (Local Area Network)
Allow resource sharing between computers.
Computers Peripheral devices
Transmission medium (e.g. cable)
3 types of topology
Bus topology
Star topology
Ring topology
-
7/31/2019 Internet Intranet Extranet2
47/52
Figure 6-4LANs
Hub a device that facilitates
connection
LAN acts logically like a bus.
Star
the dominant topology
today.
-
7/31/2019 Internet Intranet Extranet2
48/52
Figure 6-5
MAN
-
7/31/2019 Internet Intranet Extranet2
49/52
MAN (Metropolitan Area
Network)
Uses services provided by a network service
provider. (Tel. Company)
Individual users computers
Organizations LANs
Many Tel. Company provide a popular MANservice called SMDS(Switched Multimegabit Data Services)
Prior to SMDS's arrival in 1995,
the only way to connect LANs was through
a dedicated private line.
-
7/31/2019 Internet Intranet Extranet2
50/52
Figure 6-6
WAN
-
7/31/2019 Internet Intranet Extranet2
51/52
WAN (Wide Area Network)
The connection ofindividual computers or
LANs over a large area (country, world).
User using a telephone line to connect to an
ISP (Internet Service Provider) is using a
WAN. Negotiates fee
ISP
Tel. company
-
7/31/2019 Internet Intranet Extranet2
52/52
Thank You