SlideShare a Scribd company logo
1 of 20
BITO5206 
CHAPTER 4
What is Internet ? 
 It is a Global network of computers, 
(servers or clients). 
to exchange information. 
 It is a "network of networks" that includes millions 
of private and public, academic, business, and 
government networks (local or Global), 
linked by copper wires, wireless connections, and 
other technologies.
Hardware and Software of Internet 
Variety of hardware and software are used to make 
Internet functional. 
 Modem 
Device that enables computers to communicate 
through phone lines. 
When we start internet the our modem 
communicates to modem of ISP.
Continued… 
 Computer 
In addition to a modem, you need a client capable of 
handling multiple data types. 
 Software 
Two types of software’s required to enable your PC as 
an Internet PC. 
 Communication software to establish connection 
 Client software for browsing, e-mail, news. 
these software’s are provided with windows itself.
Applications Of Internet 
 Download programs and files 
 E-Mail 
 Voice and Video Conferencing 
 E-Commerce 
 File Sharing 
 Information browsing 
 Search the web addresses for access through search engine 
 Chatting and many more…
Disadvantages of Internet 
 Theft of personal information such as name, address, credit 
card number etc. 
 Virus threats nothing but a program which disrupts the normal 
functioning of your system. 
 Spamming refers to receiving unwanted e-mails in bulk, which 
provide no purpose and needlessly obstruct the entire system. 
 Pornography This is perhaps the biggest threat related to 
children’s healthy mental life. A very serious issue concerning the 
Internet. 
Though, internet can also create havoc, destruction 
and its misuse can be very fatal, 
the advantages of it outweigh its disadvantages.
Intranet
What is Intranet ? 
 Internal company network that uses Internet standards 
(HTML, HTTP & TCP/IP protocols) & software. 
 Accessed only by authorized persons, especially members 
or employees of the organization
Intranet Security 
Two levels of Security required: 
 Internal 
It can be imposed by Public Key Security & Encryption 
Key. 
 External 
Through Firewall.
What is Firewall ? 
 Security device located between firm’s internal network 
(intranet) & external network (internet). 
 Regulates access into & out of a company’s network based 
on a set of rules. 
Note : needs to be upgraded from time to time to check latest 
potential security problems.
Applications of Intranet 
 Sharing of company policies/rules & regulations 
 Access employee database 
 Distribution of circulars/Office Orders 
 Access product & customer data 
 Sharing of information of common interest 
 Launching of personal/departmental home pages 
 Submission of reports 
 Corporate telephone directories
Disadvantages 
Management 
problem Intranet on a routine basis 
 Information overload lowers productivity 
 True purpose of the Intranet is unknown to many 
employees/departments 
 Hidden or unknown complexity and costs 
Productivity 
problem 
 Unauthorized access 
 Abuse of access 
 Denial of service 
Security 
problem 
 A company may not have person to update their 
 Fear of sharing information and the loss of control 
 Limited bandwidth for the business
Extranet
What is Extranet ? 
 Extranet is an Intranet for outside authorized users 
using same internet technology. 
 Inter-organizational information system. 
 enable outsiders to work together with company’s 
employees. 
 open to selected suppliers, customers & other business partners
Examples.. 
 Dealers/distributors have access to 
product files such as :- 
1. product specification, 
2. pictures, 
3. images, etc. 
to answer the queries of the customer.
Components of extranets 
.. 
Some basic infrastructure components such as the 
internet Including :- 
 TCP/IP protocols, 
 E-mail, 
 Web-browsers, 
 External business partners & 
 Tele-commuting employees place order, check status & 
send E-mail.
Benefits of Extranet 
 Improved quality. 
 lower travel costs. 
 lower administrative & other overhead costs. 
 reduction in paperwork. 
 delivery of accurate information on time. 
 improved customer service. 
 better communication. 
 overall improvement in business 
effectiveness.
Disadvantages 
 The suppliers & customer who don’t 
have technical knowledge feel problem. 
 Faceless contact. 
 Information can be misused by other competitors. 
 Fraud may be possible. 
 Technical Employees are required.
Layered System View 
Clients, partners, customers 
Intranet 
Extranet 
Internet 
Corporate members 
Global society: competitors
THE END 
Thank You

More Related Content

What's hot

Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
Arushi Garg
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
raniseetha
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
 
LAN , MAN , WAN introduction
LAN , MAN , WAN introductionLAN , MAN , WAN introduction
LAN , MAN , WAN introduction
bhavna sahajwani
 

What's hot (20)

Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
TYPES OF E-COMMERCE
TYPES OF E-COMMERCETYPES OF E-COMMERCE
TYPES OF E-COMMERCE
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
 
World wide web ppt
World wide web pptWorld wide web ppt
World wide web ppt
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce Application
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
LAN , MAN , WAN introduction
LAN , MAN , WAN introductionLAN , MAN , WAN introduction
LAN , MAN , WAN introduction
 
Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
 
architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommerce
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Computer security
Computer securityComputer security
Computer security
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
WWW or World Wide Web
WWW or World Wide WebWWW or World Wide Web
WWW or World Wide Web
 
Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)
 
The Internet
The InternetThe Internet
The Internet
 
Internet Services
Internet Services Internet Services
Internet Services
 

Similar to internet intranet and extranet

Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
AyushJadon5
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
Nadeem Khazi
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
adeel hamid
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
renaglasser
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
Rexon Calub
 

Similar to internet intranet and extranet (20)

Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
Intranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxIntranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptx
 
Intranet And extranet.pptx
Intranet And extranet.pptxIntranet And extranet.pptx
Intranet And extranet.pptx
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
Technology
TechnologyTechnology
Technology
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Data security
 Data security  Data security
Data security
 
H1N1 & IT Continuity
H1N1 & IT ContinuityH1N1 & IT Continuity
H1N1 & IT Continuity
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
 

More from FLYMAN TECHNOLOGY LIMITED

introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5
FLYMAN TECHNOLOGY LIMITED
 

More from FLYMAN TECHNOLOGY LIMITED (20)

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction Presentation
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)
 
Flyman Technology Limited Tanzania
Flyman Technology Limited TanzaniaFlyman Technology Limited Tanzania
Flyman Technology Limited Tanzania
 
Saadani national park 2015
Saadani national park 2015Saadani national park 2015
Saadani national park 2015
 
Uuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asiliUuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asili
 
Entrepreneurship manual BIT
Entrepreneurship manual BITEntrepreneurship manual BIT
Entrepreneurship manual BIT
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5
 
Dhtml chapter2
Dhtml chapter2Dhtml chapter2
Dhtml chapter2
 
introduction to web application development
introduction to web application developmentintroduction to web application development
introduction to web application development
 
Marketing management
Marketing managementMarketing management
Marketing management
 
Marketing communications
Marketing communicationsMarketing communications
Marketing communications
 
Marketing analysis
Marketing analysisMarketing analysis
Marketing analysis
 
Market segmentation
Market segmentationMarket segmentation
Market segmentation
 
Consumer markets
Consumer marketsConsumer markets
Consumer markets
 
ENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUALENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUAL
 
THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!
 
TAXATION CONCEPTS
TAXATION CONCEPTSTAXATION CONCEPTS
TAXATION CONCEPTS
 
Html tutorial
Html tutorialHtml tutorial
Html tutorial
 
SYSTEM MODELLING
SYSTEM MODELLINGSYSTEM MODELLING
SYSTEM MODELLING
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

internet intranet and extranet

  • 2. What is Internet ?  It is a Global network of computers, (servers or clients). to exchange information.  It is a "network of networks" that includes millions of private and public, academic, business, and government networks (local or Global), linked by copper wires, wireless connections, and other technologies.
  • 3. Hardware and Software of Internet Variety of hardware and software are used to make Internet functional.  Modem Device that enables computers to communicate through phone lines. When we start internet the our modem communicates to modem of ISP.
  • 4. Continued…  Computer In addition to a modem, you need a client capable of handling multiple data types.  Software Two types of software’s required to enable your PC as an Internet PC.  Communication software to establish connection  Client software for browsing, e-mail, news. these software’s are provided with windows itself.
  • 5. Applications Of Internet  Download programs and files  E-Mail  Voice and Video Conferencing  E-Commerce  File Sharing  Information browsing  Search the web addresses for access through search engine  Chatting and many more…
  • 6. Disadvantages of Internet  Theft of personal information such as name, address, credit card number etc.  Virus threats nothing but a program which disrupts the normal functioning of your system.  Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system.  Pornography This is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the Internet. Though, internet can also create havoc, destruction and its misuse can be very fatal, the advantages of it outweigh its disadvantages.
  • 8. What is Intranet ?  Internal company network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software.  Accessed only by authorized persons, especially members or employees of the organization
  • 9. Intranet Security Two levels of Security required:  Internal It can be imposed by Public Key Security & Encryption Key.  External Through Firewall.
  • 10. What is Firewall ?  Security device located between firm’s internal network (intranet) & external network (internet).  Regulates access into & out of a company’s network based on a set of rules. Note : needs to be upgraded from time to time to check latest potential security problems.
  • 11. Applications of Intranet  Sharing of company policies/rules & regulations  Access employee database  Distribution of circulars/Office Orders  Access product & customer data  Sharing of information of common interest  Launching of personal/departmental home pages  Submission of reports  Corporate telephone directories
  • 12. Disadvantages Management problem Intranet on a routine basis  Information overload lowers productivity  True purpose of the Intranet is unknown to many employees/departments  Hidden or unknown complexity and costs Productivity problem  Unauthorized access  Abuse of access  Denial of service Security problem  A company may not have person to update their  Fear of sharing information and the loss of control  Limited bandwidth for the business
  • 14. What is Extranet ?  Extranet is an Intranet for outside authorized users using same internet technology.  Inter-organizational information system.  enable outsiders to work together with company’s employees.  open to selected suppliers, customers & other business partners
  • 15. Examples..  Dealers/distributors have access to product files such as :- 1. product specification, 2. pictures, 3. images, etc. to answer the queries of the customer.
  • 16. Components of extranets .. Some basic infrastructure components such as the internet Including :-  TCP/IP protocols,  E-mail,  Web-browsers,  External business partners &  Tele-commuting employees place order, check status & send E-mail.
  • 17. Benefits of Extranet  Improved quality.  lower travel costs.  lower administrative & other overhead costs.  reduction in paperwork.  delivery of accurate information on time.  improved customer service.  better communication.  overall improvement in business effectiveness.
  • 18. Disadvantages  The suppliers & customer who don’t have technical knowledge feel problem.  Faceless contact.  Information can be misused by other competitors.  Fraud may be possible.  Technical Employees are required.
  • 19. Layered System View Clients, partners, customers Intranet Extranet Internet Corporate members Global society: competitors