SlideShare a Scribd company logo
1 of 19
Presented by
Name: Subrata Paul
Roll: 13015411 Session: 2012-13
Year: 3rd Semester: 1st
Department of Computer Science
and Engineering, Rajshahi University
Definition
 The Internet generally allows everyone to access all network resources.
 An Intranet allows for restricted access to only members of an
organization.
 An Extranet expands that access by allowing non-members such as
suppliers and customers to use company resources.
The main difference between the three is accessibility.
Internet
• This is a network that
is accessible to a
person who knows
their IP address.
• It is global
communication
accessed through the
Web and literary
world wide.
Intranet
• This is a network that
is not available to the
world outside of the
Intranet.
• It is shared content
accessed by members
within a single
organization.
Extranet
• This is actually an
Intranet that is
partially accessible to
authorized outsiders.
• It is shared content
accessed by groups
through cross-
enterprise
boundaries.
 Intranet is only available
to a small group of
people.
 Extranet allows limited
access to non-members of
an organization.
 Internet is known as
world-wide web
Internet
• Internet can be
accessed with a
computer using a
domain name that
needs to be
translated into an IP
address.
Intranet
• The firewall helps to
control access
between the Intranet
and Internet to
permit access to the
Intranet only to the
members
Extranet
• If the firewall allows
access from the
Internet, then it will
be an Extranet.
Applications:
• Home users typically use the Internet for searching and sharing
information. It is available to anyone with an Internet-connected
device.
• Home users use an intranet to share files between computers
Businesses and organizations use it to restrict access to confidential
data.
• The purpose of Extranet is to allow collaboration and sharing of
resources not only in-house but with a select group of outside users.
However,
they are
different in
terms of the
levels of
access they
allow to
various
users inside
and outside
the
organization
and the size
of the
network.
The Internet, extranets, and intranets all rely on the same TCP/IP
technologies.
Why we use the terms intranet and extranets why not
as Internet?
Cause this terms has benefits in today's business environment, to
communicate more effectively, both internally with employees and
externally with trading partners and customers.
• An intranet enables employees to share information, collaborate, and
improve their communications.
• Extranet enables in business to communicate and collaborate more
effectively with selected business partners, suppliers and customers.
VPN and VLAN
Definition
 A virtual private network (VPN) is a network that is constructed by
using public wires (usually the Internet) to connect to a private
network such as a company's internal network.
 A virtual local area network (VLAN) is a logical group of workstations,
servers and network devices that appear to be on the same LAN
despite their geographical distribution.
VLAN configuration:
The VLANs must be configured independently on each vlan supporting
switch or router using any of the following methods
1. Manually via the command line interface (CLI) or web interface.
2. With a VLAN management tool provided by the vendor.
3. Automatically with a standard protocol like GVRP (GARP VLAN
Registration Protocol), which works in conjunction with 802.1Q.
4. Automatically with a proprietary protocol like Cisco’s VTP (Virtual
Trunking Protocol), which works in conjunction with Cisco’s
proprietary ISL (Inter-Switch Link) trunking protocol.
VPN components:
There are four components to a VPN network.
1. The Internet
• Fundamental plumbing for the network
2. Security Gateways
• Sit between public and private networks preventing unauthorized
intrusion
• May provide tunneling and encrypt private data.
3. Security Policy Servers
• Maintains Access control lists that the security gateway uses to
determine which traffic is authorized.
4. Certificate Authorities
• Used to confirm the authenticity of shared keys among sites.
Types:
VLAN types
1. Port Based
-Configured at each switch port
2. MAC Address Based
- Uses the end stations MAC address
for VLAN Assignment
3. Protocol Based
- Uses LAN protocol to determine
VLAN assignment
4. Dynamic Based
- A User Profile determine VLAN
assignment
VPN types
1. A special purpose device consisting
of a network interface, operating
system and hardware based
cryptographic support
2. A software solution that works with
the OSI layers to provide encryption
3. A hybrid in which the VPN
application runs on standard
computing platforms that may use
an outboard cryptographic
processor
A VLAN is created to
cover and to relocate
computers
geographically, need
not be belonging to
same LAN.
A VPN is designed to
allow connection from
outside a network, to the
inside of the network, by
using VPN services
VLAN
• The VLAN slices up a large network into smaller, more
manageable pieces.
• It is purely a layer 2 construct.
VPN
• To access a LAN through a different LAN all together we
need VPN access software (in fact authentication and
client) to 'remotely' access the computers on the other
networks.
• It constructs range from Layer 1 to Layer 3
Applications:
 VPNs are used to create a secure "channel" to transfer information
through insecure channels. It is needs to provide the following 4
critical functions
– Authentication
– Access Control
– Confidentiality
– Data Integrity
 A VLAN is used to group computers that are not usually within same
geography into the same broadcast domain
– Used to alleviate traffic congestion without adding more bandwidth
– Used to separate out users into logical groups of workers,
regardless of actual physical location.
VPN is a method of creating a
smaller sub- network on top of
an existing bigger network
while VLAN is a subcategory of
VPN.
while VPN is most commonly
related to remote access to a
company’s network

More Related Content

What's hot

What's hot (20)

Network protocals
Network protocalsNetwork protocals
Network protocals
 
Computer communication
Computer communicationComputer communication
Computer communication
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Wide Area Networking
Wide Area NetworkingWide Area Networking
Wide Area Networking
 
Local area network
Local area networkLocal area network
Local area network
 
Basic components of a computer network
Basic components of a computer  networkBasic components of a computer  network
Basic components of a computer network
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Internet Service Provider
Internet Service ProviderInternet Service Provider
Internet Service Provider
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Computer network
Computer networkComputer network
Computer network
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 

Viewers also liked

Internet and intranet
Internet and intranetInternet and intranet
Internet and intranetRohit Kumar
 
What is the organisational difference between Internet & Intranet?
What is the organisational difference between Internet & Intranet?What is the organisational difference between Internet & Intranet?
What is the organisational difference between Internet & Intranet?Nurhazman Abdul Aziz
 
Tranmission
TranmissionTranmission
Tranmissionspaz329
 
Gambar Networking
Gambar  NetworkingGambar  Networking
Gambar Networkingdarulquthni
 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)Subrata Kumer Paul
 
Local And Wide Area Networking (Networking Media - Physical Cable)
Local And Wide Area Networking (Networking Media - Physical Cable)Local And Wide Area Networking (Networking Media - Physical Cable)
Local And Wide Area Networking (Networking Media - Physical Cable)Zakkuefuron Frogie
 
CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCikgu Johan Johari
 
Dictionary use
Dictionary useDictionary use
Dictionary usehugomu2
 
Wire and wireless_india_ltd_nov_2006
Wire and wireless_india_ltd_nov_2006Wire and wireless_india_ltd_nov_2006
Wire and wireless_india_ltd_nov_2006Nihad Baluch
 
2.2 data and information
2.2 data and information2.2 data and information
2.2 data and informationmrmwood
 
Telecommunication industry of bangladesh
Telecommunication industry of bangladeshTelecommunication industry of bangladesh
Telecommunication industry of bangladeshSarker Shuvo
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranetTej Kiran
 
Interfacing rs232
Interfacing rs232Interfacing rs232
Interfacing rs232PRADEEP
 
Corporate communication
Corporate communicationCorporate communication
Corporate communicationCynthia Newton
 

Viewers also liked (20)

Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
What is the organisational difference between Internet & Intranet?
What is the organisational difference between Internet & Intranet?What is the organisational difference between Internet & Intranet?
What is the organisational difference between Internet & Intranet?
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Tranmission
TranmissionTranmission
Tranmission
 
Gambar Networking
Gambar  NetworkingGambar  Networking
Gambar Networking
 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)
 
Local And Wide Area Networking (Networking Media - Physical Cable)
Local And Wide Area Networking (Networking Media - Physical Cable)Local And Wide Area Networking (Networking Media - Physical Cable)
Local And Wide Area Networking (Networking Media - Physical Cable)
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
 
CHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNETCHAP 3 - NETWORK, INTRANET & INTERNET
CHAP 3 - NETWORK, INTRANET & INTERNET
 
Dictionary use
Dictionary useDictionary use
Dictionary use
 
Wire and wireless_india_ltd_nov_2006
Wire and wireless_india_ltd_nov_2006Wire and wireless_india_ltd_nov_2006
Wire and wireless_india_ltd_nov_2006
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
Cable landing station
Cable landing stationCable landing station
Cable landing station
 
2.2 data and information
2.2 data and information2.2 data and information
2.2 data and information
 
Telecommunication industry of bangladesh
Telecommunication industry of bangladeshTelecommunication industry of bangladesh
Telecommunication industry of bangladesh
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
UTP and STP
UTP and STPUTP and STP
UTP and STP
 
Interfacing rs232
Interfacing rs232Interfacing rs232
Interfacing rs232
 
Corporate communication
Corporate communicationCorporate communication
Corporate communication
 
Data vs. information
Data vs. informationData vs. information
Data vs. information
 

Similar to Internet and intranet

98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8suddenven
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfHirazNor
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranetvikashchauhan908
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptxkarthikvcyber
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of NetworkingNetwax Lab
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Đồng Quốc Vương
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkadeelahmed0345
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranetMohsinHusenManasiya
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranetMohsinHusenManasiya
 

Similar to Internet and intranet (20)

98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
AWS VPC .pptx
AWS  VPC .pptxAWS  VPC .pptx
AWS VPC .pptx
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 

More from Subrata Kumer Paul

Chapter 9. Classification Advanced Methods.ppt
Chapter 9. Classification Advanced Methods.pptChapter 9. Classification Advanced Methods.ppt
Chapter 9. Classification Advanced Methods.pptSubrata Kumer Paul
 
Chapter 13. Trends and Research Frontiers in Data Mining.ppt
Chapter 13. Trends and Research Frontiers in Data Mining.pptChapter 13. Trends and Research Frontiers in Data Mining.ppt
Chapter 13. Trends and Research Frontiers in Data Mining.pptSubrata Kumer Paul
 
Chapter 8. Classification Basic Concepts.ppt
Chapter 8. Classification Basic Concepts.pptChapter 8. Classification Basic Concepts.ppt
Chapter 8. Classification Basic Concepts.pptSubrata Kumer Paul
 
Chapter 12. Outlier Detection.ppt
Chapter 12. Outlier Detection.pptChapter 12. Outlier Detection.ppt
Chapter 12. Outlier Detection.pptSubrata Kumer Paul
 
Chapter 7. Advanced Frequent Pattern Mining.ppt
Chapter 7. Advanced Frequent Pattern Mining.pptChapter 7. Advanced Frequent Pattern Mining.ppt
Chapter 7. Advanced Frequent Pattern Mining.pptSubrata Kumer Paul
 
Chapter 11. Cluster Analysis Advanced Methods.ppt
Chapter 11. Cluster Analysis Advanced Methods.pptChapter 11. Cluster Analysis Advanced Methods.ppt
Chapter 11. Cluster Analysis Advanced Methods.pptSubrata Kumer Paul
 
Chapter 10. Cluster Analysis Basic Concepts and Methods.ppt
Chapter 10. Cluster Analysis Basic Concepts and Methods.pptChapter 10. Cluster Analysis Basic Concepts and Methods.ppt
Chapter 10. Cluster Analysis Basic Concepts and Methods.pptSubrata Kumer Paul
 
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...Subrata Kumer Paul
 
Chapter 5. Data Cube Technology.ppt
Chapter 5. Data Cube Technology.pptChapter 5. Data Cube Technology.ppt
Chapter 5. Data Cube Technology.pptSubrata Kumer Paul
 
Chapter 3. Data Preprocessing.ppt
Chapter 3. Data Preprocessing.pptChapter 3. Data Preprocessing.ppt
Chapter 3. Data Preprocessing.pptSubrata Kumer Paul
 
Chapter 4. Data Warehousing and On-Line Analytical Processing.ppt
Chapter 4. Data Warehousing and On-Line Analytical Processing.pptChapter 4. Data Warehousing and On-Line Analytical Processing.ppt
Chapter 4. Data Warehousing and On-Line Analytical Processing.pptSubrata Kumer Paul
 
Data Mining Lecture_10(b).pptx
Data Mining Lecture_10(b).pptxData Mining Lecture_10(b).pptx
Data Mining Lecture_10(b).pptxSubrata Kumer Paul
 

More from Subrata Kumer Paul (20)

Chapter 9. Classification Advanced Methods.ppt
Chapter 9. Classification Advanced Methods.pptChapter 9. Classification Advanced Methods.ppt
Chapter 9. Classification Advanced Methods.ppt
 
Chapter 13. Trends and Research Frontiers in Data Mining.ppt
Chapter 13. Trends and Research Frontiers in Data Mining.pptChapter 13. Trends and Research Frontiers in Data Mining.ppt
Chapter 13. Trends and Research Frontiers in Data Mining.ppt
 
Chapter 8. Classification Basic Concepts.ppt
Chapter 8. Classification Basic Concepts.pptChapter 8. Classification Basic Concepts.ppt
Chapter 8. Classification Basic Concepts.ppt
 
Chapter 2. Know Your Data.ppt
Chapter 2. Know Your Data.pptChapter 2. Know Your Data.ppt
Chapter 2. Know Your Data.ppt
 
Chapter 12. Outlier Detection.ppt
Chapter 12. Outlier Detection.pptChapter 12. Outlier Detection.ppt
Chapter 12. Outlier Detection.ppt
 
Chapter 7. Advanced Frequent Pattern Mining.ppt
Chapter 7. Advanced Frequent Pattern Mining.pptChapter 7. Advanced Frequent Pattern Mining.ppt
Chapter 7. Advanced Frequent Pattern Mining.ppt
 
Chapter 11. Cluster Analysis Advanced Methods.ppt
Chapter 11. Cluster Analysis Advanced Methods.pptChapter 11. Cluster Analysis Advanced Methods.ppt
Chapter 11. Cluster Analysis Advanced Methods.ppt
 
Chapter 10. Cluster Analysis Basic Concepts and Methods.ppt
Chapter 10. Cluster Analysis Basic Concepts and Methods.pptChapter 10. Cluster Analysis Basic Concepts and Methods.ppt
Chapter 10. Cluster Analysis Basic Concepts and Methods.ppt
 
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
 
Chapter 5. Data Cube Technology.ppt
Chapter 5. Data Cube Technology.pptChapter 5. Data Cube Technology.ppt
Chapter 5. Data Cube Technology.ppt
 
Chapter 3. Data Preprocessing.ppt
Chapter 3. Data Preprocessing.pptChapter 3. Data Preprocessing.ppt
Chapter 3. Data Preprocessing.ppt
 
Chapter 4. Data Warehousing and On-Line Analytical Processing.ppt
Chapter 4. Data Warehousing and On-Line Analytical Processing.pptChapter 4. Data Warehousing and On-Line Analytical Processing.ppt
Chapter 4. Data Warehousing and On-Line Analytical Processing.ppt
 
Chapter 1. Introduction.ppt
Chapter 1. Introduction.pptChapter 1. Introduction.ppt
Chapter 1. Introduction.ppt
 
Data Mining Lecture_8(a).pptx
Data Mining Lecture_8(a).pptxData Mining Lecture_8(a).pptx
Data Mining Lecture_8(a).pptx
 
Data Mining Lecture_13.pptx
Data Mining Lecture_13.pptxData Mining Lecture_13.pptx
Data Mining Lecture_13.pptx
 
Data Mining Lecture_9.pptx
Data Mining Lecture_9.pptxData Mining Lecture_9.pptx
Data Mining Lecture_9.pptx
 
Data Mining Lecture_7.pptx
Data Mining Lecture_7.pptxData Mining Lecture_7.pptx
Data Mining Lecture_7.pptx
 
Data Mining Lecture_10(b).pptx
Data Mining Lecture_10(b).pptxData Mining Lecture_10(b).pptx
Data Mining Lecture_10(b).pptx
 
Data Mining Lecture_8(b).pptx
Data Mining Lecture_8(b).pptxData Mining Lecture_8(b).pptx
Data Mining Lecture_8(b).pptx
 
Data Mining Lecture_6.pptx
Data Mining Lecture_6.pptxData Mining Lecture_6.pptx
Data Mining Lecture_6.pptx
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

Internet and intranet

  • 1.
  • 2. Presented by Name: Subrata Paul Roll: 13015411 Session: 2012-13 Year: 3rd Semester: 1st Department of Computer Science and Engineering, Rajshahi University
  • 3. Definition  The Internet generally allows everyone to access all network resources.  An Intranet allows for restricted access to only members of an organization.  An Extranet expands that access by allowing non-members such as suppliers and customers to use company resources. The main difference between the three is accessibility.
  • 4. Internet • This is a network that is accessible to a person who knows their IP address. • It is global communication accessed through the Web and literary world wide. Intranet • This is a network that is not available to the world outside of the Intranet. • It is shared content accessed by members within a single organization. Extranet • This is actually an Intranet that is partially accessible to authorized outsiders. • It is shared content accessed by groups through cross- enterprise boundaries.
  • 5.  Intranet is only available to a small group of people.  Extranet allows limited access to non-members of an organization.  Internet is known as world-wide web
  • 6. Internet • Internet can be accessed with a computer using a domain name that needs to be translated into an IP address. Intranet • The firewall helps to control access between the Intranet and Internet to permit access to the Intranet only to the members Extranet • If the firewall allows access from the Internet, then it will be an Extranet.
  • 7.
  • 8. Applications: • Home users typically use the Internet for searching and sharing information. It is available to anyone with an Internet-connected device. • Home users use an intranet to share files between computers Businesses and organizations use it to restrict access to confidential data. • The purpose of Extranet is to allow collaboration and sharing of resources not only in-house but with a select group of outside users.
  • 9. However, they are different in terms of the levels of access they allow to various users inside and outside the organization and the size of the network. The Internet, extranets, and intranets all rely on the same TCP/IP technologies.
  • 10. Why we use the terms intranet and extranets why not as Internet? Cause this terms has benefits in today's business environment, to communicate more effectively, both internally with employees and externally with trading partners and customers. • An intranet enables employees to share information, collaborate, and improve their communications. • Extranet enables in business to communicate and collaborate more effectively with selected business partners, suppliers and customers.
  • 12. Definition  A virtual private network (VPN) is a network that is constructed by using public wires (usually the Internet) to connect to a private network such as a company's internal network.  A virtual local area network (VLAN) is a logical group of workstations, servers and network devices that appear to be on the same LAN despite their geographical distribution.
  • 13. VLAN configuration: The VLANs must be configured independently on each vlan supporting switch or router using any of the following methods 1. Manually via the command line interface (CLI) or web interface. 2. With a VLAN management tool provided by the vendor. 3. Automatically with a standard protocol like GVRP (GARP VLAN Registration Protocol), which works in conjunction with 802.1Q. 4. Automatically with a proprietary protocol like Cisco’s VTP (Virtual Trunking Protocol), which works in conjunction with Cisco’s proprietary ISL (Inter-Switch Link) trunking protocol.
  • 14. VPN components: There are four components to a VPN network. 1. The Internet • Fundamental plumbing for the network 2. Security Gateways • Sit between public and private networks preventing unauthorized intrusion • May provide tunneling and encrypt private data. 3. Security Policy Servers • Maintains Access control lists that the security gateway uses to determine which traffic is authorized. 4. Certificate Authorities • Used to confirm the authenticity of shared keys among sites.
  • 15. Types: VLAN types 1. Port Based -Configured at each switch port 2. MAC Address Based - Uses the end stations MAC address for VLAN Assignment 3. Protocol Based - Uses LAN protocol to determine VLAN assignment 4. Dynamic Based - A User Profile determine VLAN assignment VPN types 1. A special purpose device consisting of a network interface, operating system and hardware based cryptographic support 2. A software solution that works with the OSI layers to provide encryption 3. A hybrid in which the VPN application runs on standard computing platforms that may use an outboard cryptographic processor
  • 16. A VLAN is created to cover and to relocate computers geographically, need not be belonging to same LAN. A VPN is designed to allow connection from outside a network, to the inside of the network, by using VPN services
  • 17. VLAN • The VLAN slices up a large network into smaller, more manageable pieces. • It is purely a layer 2 construct. VPN • To access a LAN through a different LAN all together we need VPN access software (in fact authentication and client) to 'remotely' access the computers on the other networks. • It constructs range from Layer 1 to Layer 3
  • 18. Applications:  VPNs are used to create a secure "channel" to transfer information through insecure channels. It is needs to provide the following 4 critical functions – Authentication – Access Control – Confidentiality – Data Integrity  A VLAN is used to group computers that are not usually within same geography into the same broadcast domain – Used to alleviate traffic congestion without adding more bandwidth – Used to separate out users into logical groups of workers, regardless of actual physical location.
  • 19. VPN is a method of creating a smaller sub- network on top of an existing bigger network while VLAN is a subcategory of VPN. while VPN is most commonly related to remote access to a company’s network