SlideShare ist ein Scribd-Unternehmen logo
1 von 20
BITO5206 
CHAPTER 4
What is Internet ? 
 It is a Global network of computers, 
(servers or clients). 
to exchange information. 
 It is a "network of networks" that includes millions 
of private and public, academic, business, and 
government networks (local or Global), 
linked by copper wires, wireless connections, and 
other technologies.
Hardware and Software of Internet 
Variety of hardware and software are used to make 
Internet functional. 
 Modem 
Device that enables computers to communicate 
through phone lines. 
When we start internet the our modem 
communicates to modem of ISP.
Continued… 
 Computer 
In addition to a modem, you need a client capable of 
handling multiple data types. 
 Software 
Two types of software’s required to enable your PC as 
an Internet PC. 
 Communication software to establish connection 
 Client software for browsing, e-mail, news. 
these software’s are provided with windows itself.
Applications Of Internet 
 Download programs and files 
 E-Mail 
 Voice and Video Conferencing 
 E-Commerce 
 File Sharing 
 Information browsing 
 Search the web addresses for access through search engine 
 Chatting and many more…
Disadvantages of Internet 
 Theft of personal information such as name, address, credit 
card number etc. 
 Virus threats nothing but a program which disrupts the normal 
functioning of your system. 
 Spamming refers to receiving unwanted e-mails in bulk, which 
provide no purpose and needlessly obstruct the entire system. 
 Pornography This is perhaps the biggest threat related to 
children’s healthy mental life. A very serious issue concerning the 
Internet. 
Though, internet can also create havoc, destruction 
and its misuse can be very fatal, 
the advantages of it outweigh its disadvantages.
Intranet
What is Intranet ? 
 Internal company network that uses Internet standards 
(HTML, HTTP & TCP/IP protocols) & software. 
 Accessed only by authorized persons, especially members 
or employees of the organization
Intranet Security 
Two levels of Security required: 
 Internal 
It can be imposed by Public Key Security & Encryption 
Key. 
 External 
Through Firewall.
What is Firewall ? 
 Security device located between firm’s internal network 
(intranet) & external network (internet). 
 Regulates access into & out of a company’s network based 
on a set of rules. 
Note : needs to be upgraded from time to time to check latest 
potential security problems.
Applications of Intranet 
 Sharing of company policies/rules & regulations 
 Access employee database 
 Distribution of circulars/Office Orders 
 Access product & customer data 
 Sharing of information of common interest 
 Launching of personal/departmental home pages 
 Submission of reports 
 Corporate telephone directories
Disadvantages 
Management 
problem Intranet on a routine basis 
 Information overload lowers productivity 
 True purpose of the Intranet is unknown to many 
employees/departments 
 Hidden or unknown complexity and costs 
Productivity 
problem 
 Unauthorized access 
 Abuse of access 
 Denial of service 
Security 
problem 
 A company may not have person to update their 
 Fear of sharing information and the loss of control 
 Limited bandwidth for the business
Extranet
What is Extranet ? 
 Extranet is an Intranet for outside authorized users 
using same internet technology. 
 Inter-organizational information system. 
 enable outsiders to work together with company’s 
employees. 
 open to selected suppliers, customers & other business partners
Examples.. 
 Dealers/distributors have access to 
product files such as :- 
1. product specification, 
2. pictures, 
3. images, etc. 
to answer the queries of the customer.
Components of extranets 
.. 
Some basic infrastructure components such as the 
internet Including :- 
 TCP/IP protocols, 
 E-mail, 
 Web-browsers, 
 External business partners & 
 Tele-commuting employees place order, check status & 
send E-mail.
Benefits of Extranet 
 Improved quality. 
 lower travel costs. 
 lower administrative & other overhead costs. 
 reduction in paperwork. 
 delivery of accurate information on time. 
 improved customer service. 
 better communication. 
 overall improvement in business 
effectiveness.
Disadvantages 
 The suppliers & customer who don’t 
have technical knowledge feel problem. 
 Faceless contact. 
 Information can be misused by other competitors. 
 Fraud may be possible. 
 Technical Employees are required.
Layered System View 
Clients, partners, customers 
Intranet 
Extranet 
Internet 
Corporate members 
Global society: competitors
THE END 
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
raniseetha
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
Rohit Kumar
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
mc aa
 

Was ist angesagt? (20)

Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
Anatomy of Ecommerce framework
Anatomy of Ecommerce frameworkAnatomy of Ecommerce framework
Anatomy of Ecommerce framework
 
Role of internet in business
Role of internet in business Role of internet in business
Role of internet in business
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
E commerce 5_units_notes
E commerce 5_units_notesE commerce 5_units_notes
E commerce 5_units_notes
 
Local area network
Local area networkLocal area network
Local area network
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Internet ,merits demerits, features
Internet ,merits demerits, featuresInternet ,merits demerits, features
Internet ,merits demerits, features
 
E business- EDI
E business- EDIE business- EDI
E business- EDI
 
Computer networking and E-commerce
Computer networking and E-commerce Computer networking and E-commerce
Computer networking and E-commerce
 
Internet Services
Internet ServicesInternet Services
Internet Services
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Isp
IspIsp
Isp
 
Network ppt
Network pptNetwork ppt
Network ppt
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 

Ähnlich wie internet intranet and extranet

Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
AyushJadon5
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
Nadeem Khazi
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
adeel hamid
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
renaglasser
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
Rexon Calub
 

Ähnlich wie internet intranet and extranet (20)

Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 
Intranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptxIntranet and Extranet ppt.pptx
Intranet and Extranet ppt.pptx
 
Intranet And extranet.pptx
Intranet And extranet.pptxIntranet And extranet.pptx
Intranet And extranet.pptx
 
Internet intranet extranet aaa
Internet intranet extranet aaaInternet intranet extranet aaa
Internet intranet extranet aaa
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
Technology
TechnologyTechnology
Technology
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
Intranet Presentation
Intranet PresentationIntranet Presentation
Intranet Presentation
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Data security
 Data security  Data security
Data security
 
H1N1 & IT Continuity
H1N1 & IT ContinuityH1N1 & IT Continuity
H1N1 & IT Continuity
 
Cois20024 lec06 2002w_ic
Cois20024 lec06 2002w_icCois20024 lec06 2002w_ic
Cois20024 lec06 2002w_ic
 

Mehr von FLYMAN TECHNOLOGY LIMITED

introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5
FLYMAN TECHNOLOGY LIMITED
 

Mehr von FLYMAN TECHNOLOGY LIMITED (20)

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction Presentation
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)
 
Flyman Technology Limited Tanzania
Flyman Technology Limited TanzaniaFlyman Technology Limited Tanzania
Flyman Technology Limited Tanzania
 
Saadani national park 2015
Saadani national park 2015Saadani national park 2015
Saadani national park 2015
 
Uuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asiliUuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asili
 
Entrepreneurship manual BIT
Entrepreneurship manual BITEntrepreneurship manual BIT
Entrepreneurship manual BIT
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5
 
Dhtml chapter2
Dhtml chapter2Dhtml chapter2
Dhtml chapter2
 
introduction to web application development
introduction to web application developmentintroduction to web application development
introduction to web application development
 
Marketing management
Marketing managementMarketing management
Marketing management
 
Marketing communications
Marketing communicationsMarketing communications
Marketing communications
 
Marketing analysis
Marketing analysisMarketing analysis
Marketing analysis
 
Market segmentation
Market segmentationMarket segmentation
Market segmentation
 
Consumer markets
Consumer marketsConsumer markets
Consumer markets
 
ENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUALENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUAL
 
THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!
 
TAXATION CONCEPTS
TAXATION CONCEPTSTAXATION CONCEPTS
TAXATION CONCEPTS
 
Html tutorial
Html tutorialHtml tutorial
Html tutorial
 
SYSTEM MODELLING
SYSTEM MODELLINGSYSTEM MODELLING
SYSTEM MODELLING
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

internet intranet and extranet

  • 2. What is Internet ?  It is a Global network of computers, (servers or clients). to exchange information.  It is a "network of networks" that includes millions of private and public, academic, business, and government networks (local or Global), linked by copper wires, wireless connections, and other technologies.
  • 3. Hardware and Software of Internet Variety of hardware and software are used to make Internet functional.  Modem Device that enables computers to communicate through phone lines. When we start internet the our modem communicates to modem of ISP.
  • 4. Continued…  Computer In addition to a modem, you need a client capable of handling multiple data types.  Software Two types of software’s required to enable your PC as an Internet PC.  Communication software to establish connection  Client software for browsing, e-mail, news. these software’s are provided with windows itself.
  • 5. Applications Of Internet  Download programs and files  E-Mail  Voice and Video Conferencing  E-Commerce  File Sharing  Information browsing  Search the web addresses for access through search engine  Chatting and many more…
  • 6. Disadvantages of Internet  Theft of personal information such as name, address, credit card number etc.  Virus threats nothing but a program which disrupts the normal functioning of your system.  Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system.  Pornography This is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the Internet. Though, internet can also create havoc, destruction and its misuse can be very fatal, the advantages of it outweigh its disadvantages.
  • 8. What is Intranet ?  Internal company network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software.  Accessed only by authorized persons, especially members or employees of the organization
  • 9. Intranet Security Two levels of Security required:  Internal It can be imposed by Public Key Security & Encryption Key.  External Through Firewall.
  • 10. What is Firewall ?  Security device located between firm’s internal network (intranet) & external network (internet).  Regulates access into & out of a company’s network based on a set of rules. Note : needs to be upgraded from time to time to check latest potential security problems.
  • 11. Applications of Intranet  Sharing of company policies/rules & regulations  Access employee database  Distribution of circulars/Office Orders  Access product & customer data  Sharing of information of common interest  Launching of personal/departmental home pages  Submission of reports  Corporate telephone directories
  • 12. Disadvantages Management problem Intranet on a routine basis  Information overload lowers productivity  True purpose of the Intranet is unknown to many employees/departments  Hidden or unknown complexity and costs Productivity problem  Unauthorized access  Abuse of access  Denial of service Security problem  A company may not have person to update their  Fear of sharing information and the loss of control  Limited bandwidth for the business
  • 14. What is Extranet ?  Extranet is an Intranet for outside authorized users using same internet technology.  Inter-organizational information system.  enable outsiders to work together with company’s employees.  open to selected suppliers, customers & other business partners
  • 15. Examples..  Dealers/distributors have access to product files such as :- 1. product specification, 2. pictures, 3. images, etc. to answer the queries of the customer.
  • 16. Components of extranets .. Some basic infrastructure components such as the internet Including :-  TCP/IP protocols,  E-mail,  Web-browsers,  External business partners &  Tele-commuting employees place order, check status & send E-mail.
  • 17. Benefits of Extranet  Improved quality.  lower travel costs.  lower administrative & other overhead costs.  reduction in paperwork.  delivery of accurate information on time.  improved customer service.  better communication.  overall improvement in business effectiveness.
  • 18. Disadvantages  The suppliers & customer who don’t have technical knowledge feel problem.  Faceless contact.  Information can be misused by other competitors.  Fraud may be possible.  Technical Employees are required.
  • 19. Layered System View Clients, partners, customers Intranet Extranet Internet Corporate members Global society: competitors