SlideShare a Scribd company logo
1 of 20
BITO5206 
CHAPTER 4
What is Internet ? 
 It is a Global network of computers, 
(servers or clients). 
to exchange information. 
 It is a "network of networks" that includes millions 
of private and public, academic, business, and 
government networks (local or Global), 
linked by copper wires, wireless connections, and 
other technologies.
Hardware and Software of Internet 
Variety of hardware and software are used to make 
Internet functional. 
 Modem 
Device that enables computers to communicate 
through phone lines. 
When we start internet the our modem 
communicates to modem of ISP.
Continued… 
 Computer 
In addition to a modem, you need a client capable of 
handling multiple data types. 
 Software 
Two types of software’s required to enable your PC as 
an Internet PC. 
 Communication software to establish connection 
 Client software for browsing, e-mail, news. 
these software’s are provided with windows itself.
Applications Of Internet 
 Download programs and files 
 E-Mail 
 Voice and Video Conferencing 
 E-Commerce 
 File Sharing 
 Information browsing 
 Search the web addresses for access through search engine 
 Chatting and many more…
Disadvantages of Internet 
 Theft of personal information such as name, address, credit 
card number etc. 
 Virus threats nothing but a program which disrupts the normal 
functioning of your system. 
 Spamming refers to receiving unwanted e-mails in bulk, which 
provide no purpose and needlessly obstruct the entire system. 
 Pornography This is perhaps the biggest threat related to 
children’s healthy mental life. A very serious issue concerning the 
Internet. 
Though, internet can also create havoc, destruction 
and its misuse can be very fatal, 
the advantages of it outweigh its disadvantages.
Intranet
What is Intranet ? 
 Internal company network that uses Internet standards 
(HTML, HTTP & TCP/IP protocols) & software. 
 Accessed only by authorized persons, especially members 
or employees of the organization
Intranet Security 
Two levels of Security required: 
 Internal 
It can be imposed by Public Key Security & Encryption 
Key. 
 External 
Through Firewall.
What is Firewall ? 
 Security device located between firm’s internal network 
(intranet) & external network (internet). 
 Regulates access into & out of a company’s network based 
on a set of rules. 
Note : needs to be upgraded from time to time to check latest 
potential security problems.
Applications of Intranet 
 Sharing of company policies/rules & regulations 
 Access employee database 
 Distribution of circulars/Office Orders 
 Access product & customer data 
 Sharing of information of common interest 
 Launching of personal/departmental home pages 
 Submission of reports 
 Corporate telephone directories
Disadvantages 
Management 
problem Intranet on a routine basis 
 Information overload lowers productivity 
 True purpose of the Intranet is unknown to many 
employees/departments 
 Hidden or unknown complexity and costs 
Productivity 
problem 
 Unauthorized access 
 Abuse of access 
 Denial of service 
Security 
problem 
 A company may not have person to update their 
 Fear of sharing information and the loss of control 
 Limited bandwidth for the business
Extranet
What is Extranet ? 
 Extranet is an Intranet for outside authorized users 
using same internet technology. 
 Inter-organizational information system. 
 enable outsiders to work together with company’s 
employees. 
 open to selected suppliers, customers & other business partners
Examples.. 
 Dealers/distributors have access to 
product files such as :- 
1. product specification, 
2. pictures, 
3. images, etc. 
to answer the queries of the customer.
Components of extranets 
.. 
Some basic infrastructure components such as the 
internet Including :- 
 TCP/IP protocols, 
 E-mail, 
 Web-browsers, 
 External business partners & 
 Tele-commuting employees place order, check status & 
send E-mail.
Benefits of Extranet 
 Improved quality. 
 lower travel costs. 
 lower administrative & other overhead costs. 
 reduction in paperwork. 
 delivery of accurate information on time. 
 improved customer service. 
 better communication. 
 overall improvement in business 
effectiveness.
Disadvantages 
 The suppliers & customer who don’t 
have technical knowledge feel problem. 
 Faceless contact. 
 Information can be misused by other competitors. 
 Fraud may be possible. 
 Technical Employees are required.
Layered System View 
Clients, partners, customers 
Intranet 
Extranet 
Internet 
Corporate members 
Global society: competitors
THE END 
Thank You

More Related Content

What's hot

E commerce and its applications
E commerce and its applications E commerce and its applications
E commerce and its applications ksingh777
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer networkAmit Shaw
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceraviteja reddy
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce ApplicationsAnuj Gupta
 
uniform resource locator
uniform resource locatoruniform resource locator
uniform resource locatorrajshreemuthiah
 
Internet Services
Internet Services Internet Services
Internet Services GLG
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commercemc aa
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 

What's hot (20)

TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
E commerce and its applications
E commerce and its applications E commerce and its applications
E commerce and its applications
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerce
 
Internet and Its Applications
Internet and Its ApplicationsInternet and Its Applications
Internet and Its Applications
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce Applications
 
uniform resource locator
uniform resource locatoruniform resource locator
uniform resource locator
 
Internet Services
Internet Services Internet Services
Internet Services
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
OSI Model
OSI ModelOSI Model
OSI Model
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 
Network ppt
Network pptNetwork ppt
Network ppt
 
E business & e-commerce
E business & e-commerceE business & e-commerce
E business & e-commerce
 

Similar to internet intranet and extranet

Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet AyushJadon5
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.pptDizzi1
 
Intranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxIntranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxAnshikaGoel42
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaaDhani Ahmad
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranetNadeem Khazi
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lessonMukalele Rogers
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...adeel hamid
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentationrenaglasser
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icRexon Calub
 

Similar to internet intranet and extranet (20)

Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
Intranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxIntranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptx
 
Intranet And extranet.pptx
Intranet And extranet.pptxIntranet And extranet.pptx
Intranet And extranet.pptx
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
Technology
TechnologyTechnology
Technology
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Data security
 Data security  Data security
Data security
 
H1N1 & IT Continuity
H1N1 & IT ContinuityH1N1 & IT Continuity
H1N1 & IT Continuity
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
 

More from FLYMAN TECHNOLOGY LIMITED

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFLYMAN TECHNOLOGY LIMITED
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)FLYMAN TECHNOLOGY LIMITED
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5FLYMAN TECHNOLOGY LIMITED
 

More from FLYMAN TECHNOLOGY LIMITED (20)

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction Presentation
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)
 
Flyman Technology Limited Tanzania
Flyman Technology Limited TanzaniaFlyman Technology Limited Tanzania
Flyman Technology Limited Tanzania
 
Saadani national park 2015
Saadani national park 2015Saadani national park 2015
Saadani national park 2015
 
Uuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asiliUuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asili
 
Entrepreneurship manual BIT
Entrepreneurship manual BITEntrepreneurship manual BIT
Entrepreneurship manual BIT
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5
 
Dhtml chapter2
Dhtml chapter2Dhtml chapter2
Dhtml chapter2
 
introduction to web application development
introduction to web application developmentintroduction to web application development
introduction to web application development
 
Marketing management
Marketing managementMarketing management
Marketing management
 
Marketing communications
Marketing communicationsMarketing communications
Marketing communications
 
Marketing analysis
Marketing analysisMarketing analysis
Marketing analysis
 
Market segmentation
Market segmentationMarket segmentation
Market segmentation
 
Consumer markets
Consumer marketsConsumer markets
Consumer markets
 
ENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUALENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUAL
 
THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!
 
TAXATION CONCEPTS
TAXATION CONCEPTSTAXATION CONCEPTS
TAXATION CONCEPTS
 
Html tutorial
Html tutorialHtml tutorial
Html tutorial
 
SYSTEM MODELLING
SYSTEM MODELLINGSYSTEM MODELLING
SYSTEM MODELLING
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

internet intranet and extranet

  • 2. What is Internet ?  It is a Global network of computers, (servers or clients). to exchange information.  It is a "network of networks" that includes millions of private and public, academic, business, and government networks (local or Global), linked by copper wires, wireless connections, and other technologies.
  • 3. Hardware and Software of Internet Variety of hardware and software are used to make Internet functional.  Modem Device that enables computers to communicate through phone lines. When we start internet the our modem communicates to modem of ISP.
  • 4. Continued…  Computer In addition to a modem, you need a client capable of handling multiple data types.  Software Two types of software’s required to enable your PC as an Internet PC.  Communication software to establish connection  Client software for browsing, e-mail, news. these software’s are provided with windows itself.
  • 5. Applications Of Internet  Download programs and files  E-Mail  Voice and Video Conferencing  E-Commerce  File Sharing  Information browsing  Search the web addresses for access through search engine  Chatting and many more…
  • 6. Disadvantages of Internet  Theft of personal information such as name, address, credit card number etc.  Virus threats nothing but a program which disrupts the normal functioning of your system.  Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system.  Pornography This is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the Internet. Though, internet can also create havoc, destruction and its misuse can be very fatal, the advantages of it outweigh its disadvantages.
  • 8. What is Intranet ?  Internal company network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software.  Accessed only by authorized persons, especially members or employees of the organization
  • 9. Intranet Security Two levels of Security required:  Internal It can be imposed by Public Key Security & Encryption Key.  External Through Firewall.
  • 10. What is Firewall ?  Security device located between firm’s internal network (intranet) & external network (internet).  Regulates access into & out of a company’s network based on a set of rules. Note : needs to be upgraded from time to time to check latest potential security problems.
  • 11. Applications of Intranet  Sharing of company policies/rules & regulations  Access employee database  Distribution of circulars/Office Orders  Access product & customer data  Sharing of information of common interest  Launching of personal/departmental home pages  Submission of reports  Corporate telephone directories
  • 12. Disadvantages Management problem Intranet on a routine basis  Information overload lowers productivity  True purpose of the Intranet is unknown to many employees/departments  Hidden or unknown complexity and costs Productivity problem  Unauthorized access  Abuse of access  Denial of service Security problem  A company may not have person to update their  Fear of sharing information and the loss of control  Limited bandwidth for the business
  • 14. What is Extranet ?  Extranet is an Intranet for outside authorized users using same internet technology.  Inter-organizational information system.  enable outsiders to work together with company’s employees.  open to selected suppliers, customers & other business partners
  • 15. Examples..  Dealers/distributors have access to product files such as :- 1. product specification, 2. pictures, 3. images, etc. to answer the queries of the customer.
  • 16. Components of extranets .. Some basic infrastructure components such as the internet Including :-  TCP/IP protocols,  E-mail,  Web-browsers,  External business partners &  Tele-commuting employees place order, check status & send E-mail.
  • 17. Benefits of Extranet  Improved quality.  lower travel costs.  lower administrative & other overhead costs.  reduction in paperwork.  delivery of accurate information on time.  improved customer service.  better communication.  overall improvement in business effectiveness.
  • 18. Disadvantages  The suppliers & customer who don’t have technical knowledge feel problem.  Faceless contact.  Information can be misused by other competitors.  Fraud may be possible.  Technical Employees are required.
  • 19. Layered System View Clients, partners, customers Intranet Extranet Internet Corporate members Global society: competitors