The Internet, Intranet and Extranet

FellowBuddy.com
FellowBuddy.comFellowBuddy.com
THE INTERNET,
INTRANETS, AND
EXTRANETS
An Overview of
Telecommunications and Networks
 Telecommunications: the electronic
transmission of signals for communications
 Telecommunications medium: anything that
carries an electronic signal and interfaces
between a sending device and a receiving
device
3
An Overview of
Telecommunications and Networks
(continued)
Elements of a Telecommunications System
4
Transmission Media
Transmission Media Types
5
Transmission Media (continued)
Transmission Media Types (continued)
6
Telecommunications Devices
Common Telecommunications Devices
Networks
 Computernetwork: the communications
media, devices, and software needed to
connect two or more computer systems or
devices
 Networknodes: the computers and devices on
the networks
Basic Processing Strategies
 Centralized processing: all processing occurs
in a single location or facility
 Decentralized processing: processing devices
are placed at various remote locations
 Distributed processing: computers are placed
at remote locations but connected to each
other via a network
Terminal-to-Host, File Server, and
Client/Server Systems
 Connecting computers in distributed
information processing:
 Terminal-to-host: the application and database
reside on one host computer, and the user
interacts with the application and data using a
“dumb” terminal
 File server: the application and database reside
on the one host computer, called the file server
 Client/server: multiple computer platforms are
dedicated to special functions, such as database
management, printing, communications, and
program execution
10
Terminal-to-Host, File Server, and
Client/Server Systems (continued)
Client/Server Connection
Network Types
 Personal area network (PAN)
 Local area network (LAN)
 Metropolitan area network (MAN)
 Wide area network (WAN)
 International network
12
Network Types (continued)
A Typical LAN
Network Types (continued)
A Wide Area Network
Communications Software and
Protocols
 Communications software: software that
provides a number of important functions in a
network, such as error checking and data
security
 Network operating system (NOS)
 Network management software
 Communications protocol: a standard set of
rules that controls a telecommunications
connection
15
Communications Software and
Protocols (continued)
Common Communications Protocols
16
Communications Software and
Protocols (continued)
Common Communications Protocols (continued)
Use and Functioning of the
Internet
 Internet: a collection of interconnected
networks, all freely exchanging information
 ARPANET
 The ancestor of the Internet
 A project started by the U.S. Department of
Defense (DoD) in 1969
 Internet Protocol (IP): communication
standard that enables traffic to be routed from
one network to another as needed
How the Internet Works
 The Internet transmits data from one computer
(called a ho st) to another
 If the receiving computer is on a network to
which the first computer is directly connected,
it can send the message directly
 If the receiving computer is not on a network
to which the sending computer is connected,
the sending computer relays the message to
another computer that can forward it
The Internet
 The internet
 A network of networks
 The internet transmits data from one computer
(called a host) to another
 Internet networks
 Linked networks that work much the same way --
they pass data around in packets, each of which
carries the addresses of its sender and receiver
The Internet, Intranet and Extranet
Internet
Unlike online services, which are centrally controlled, the Internet
is
decentralized by design. Each Internet computer, called a host, is
independent. Its operators can choose which Internet services to
use and which local services to make available to the global
Internet
community. Remarkably, this anarchy by design works
exceedingly
There are a variety of ways to access the Internet. It is also
possible to
How the Internet Works
Transport control protocol (TCP)
 A protocol that operates at the transport layer and is
used in combination with IP by most Internet
applications
Backbone
 An Internet high-speed, long distance
communications links (like a bus; wire that connects
nodes)
Uniform resource locator (URL)
 An assigned address on the Internet for each
computer
 E.g., http://www.yorku.ca/
Domain Affiliations
Domain Affiliations
arts cultural and entertainment activities
com business organizations
edu educational sites
firm businesses and firms
gov government sites
info information service providers
mil military sites
nom individuals
net networking organizations
org organizations
rec recreational activities
store businesses offering goods for purchase
web entities related to World Wide Web activities
net networking organizations
Access to the Internet
 LAN servers
 Local servers can provide access to the Internet through
normal connections (e.g., Ethernet)
 Serial line internet protocol (SLIP) and
Point-to-point protocol (PPP)
 Communications protocol software that transmits packets over
telephone lines, allowing dial-up access to the Internet
 Connection via an on-line service
 Examples are America Online and Microsoft Network. These
services usually require sign-up procedures
Three Ways to Access the
Internet
Internet Service Providers
 Internet service provider (ISP)
 Any company that provides individuals or
companies with access to the Internet
 Thousands of providers including large
communications companies
 Need an account with the ISP and software that
links with TCP/IP
Internet Services
 E-mail
 Telnet
 FTP
 Usenet and newsgroups
 Chat rooms
 Internet phone
 Internet videoconferencing
 Content streaming
Internet Services
 Internet telephony
 Also called voice-over-IP (VOIP)
 Technology that enables network managers to route
phone calls and fax transmissions over the same
network they use for data
The Internet, Intranet and Extranet
What is VOIP ?
Internet telephony is a category of hardware and software that
enables people to use the Internet as the transmission medium for
telephone calls. For users who have free, or fixed-price, Internet
access, Internet telephony software essentially provides free
telephone calls anywhere in the world. To date, however, Internet
telephony does not offer the same quality of telephone service as
direct telephone connections.
There are many Internet telephony applications available. Some,
like CoolTalk and NetMeeting, come bundled with popular Web
browsers. Others are stand-alone products. Internet telephony
products are sometimes called IP telephony, Voice over the Internet
(VOI) or Voice over IP (VOIP) products.
Content Streaming
 Content streaming
 A method for transferring multimedia files over the
Internet so that the data stream of voice and pictures
plays continuously, without a break, or very few of
them
 It also enables users to browse large files in real time
The World Wide Web
 World Wide Web
 A collection of tens of thousands of independently-
owned computers that work together as one in an
Internet service
WWW Terminology
 Home page
 The cover page for a Web site that has graphics,
titles, coloured text, etc.
 Hypermedia
 Tools that connect the data on Web pages, allowing
users to access topics in whatever order they wish
 Hypertext markup language (HTML)
 The standard page description language for Web
pages
WWW Terminology
 Web browser
 Software that creates a unique hypermedia-based
menu on your computer screen and provides a
graphical interface to the Web
 Web page
 A screen of information sent to a requesting user and
presented through a browser
 Applet
 A small program embedded in Web pages
HTML
 “The” language of WWW pages
 Need we say more!!!
36
The World Wide Web
 The Web, WWW or W3
 A menu-based system that uses the
client/server model
 Organizes Internet resources throughout the
world into a series of menu pages, or screens,
that appear on your computer
 Hypermedia: tools that connect the data on
Web pages, allowing users to access topics in
whatever order they want
37
The World Wide Web
 Hypertext Markup Language (HTML): the
standard page description language for Web
pages
 HTML tags: codes that let the browser know
how to format the text on a Web page and
whether images, sound, and other elements
should be inserted
Search Engines
 Search engines
 A search tool for the Web (like card catalogs in
libraries)
 E.g.,
Google.com
Yahoo.com
Rediff.com
Java
 Java
 An object-oriented programming language
 Developed by Sun Microsystems
 Based on C++
 Allows small programs -- applets -- to be
embedded within an HTML document
Applets
 Applets are small java programs that are
downloaded from the server to the local
machine
41
Developing Web Content
 Products that greatly simplify the creation of a
Web page
 For example: .NET platform
 Content management system (CMS)
 Web services
42
Web Services
 Standards and tools that streamline and
simplify communication among Web sites for
business and personal purposes
 Can also be used to develop new systems to
send and receive secure messages between
healthcare facilities, doctors, and patients,
while maintaining patient privacy
Push Technology
 Push technology
 Technology that enables users to automatically
receive information over the Internet rather than
searching for it using a browser
 Also called Webcasting
 E.g.,
 PointCast
 InterMind
Webcasting ‘Discussion’
Using the Internet, and the World Wide Web in particular, to
broadcast information. Unlike typical surfing, which relies on a
pull
method of transferring Web pages, webcasting uses push
technologies.
What is Push ?
In client/server applications, to send data to a client without
the client requesting it. The World Wide Web is based on a pull
technology where the client browser must request a Web page
before it is sent. Broadcast media, on the other hand, are push
technologies because they send information out regardless of
whether anyone is tuned in.
Increasingly, companies are using the Internet to deliver
information
push-style. One of the most successful examples of this is
PointCast, which delivers customized news to users' desktops.
Push Mail
Probably the oldest and most widely used push technology is e-
mail.
This is a push technology because you receive mail whether you
ask
for it or not -- that is, the sender pushes the message to the
receiver.
Intranets and Extranets
 Intranet
 An internal corporate network built using Internet and
World Wide Web standards and products that allows
employees of an organization to gain access to
corporate information
 Extranet
 A network based on Web technologies that links
selected resources of the intranet of a company with
its customers, suppliers, or other business partners
What is Intranet ?
A network based on TCP/IP protocols (an internet) belonging to
an
organization, usually a corporation, accessible only by the
organization's members, employees, or others with authorization.
An
intranet's Web sites look and act just like any other Web sites, but
the firewall surrounding an intranet fends off unauthorized
access.
Like the Internet itself, intranets are used to share information.
Secure intranets are now the fastest-growing segment of the
Internet because they are much less expensive to build and
manage
than private networks based on proprietary protocols.
What is Extranet ?
A new buzzword that refers to an intranet that is partially
accessible to authorized outsiders. Whereas an intranet resides
behind a firewall and is accessible only to people who are
members
of the same company or organization, an extranet provides
various
levels of accessibility to outsiders. You can access an extranet
only
if you have a valid username and password, and your identity
determines which parts of the extranet you can view.
Extranets are becoming a very popular means for business
partners
to exchange information.
Virtual Private Network (VPN)
 Virtual Private Network (VPN)
 A secure connection between two points across the
Internet
 Tunneling
 The process by which VPNs transfer information by
encapsulating traffic in IP packets and sending the
packets over the Internet
The Internet, Intranet and Extranet
VPN
Short for virtual private network, a network that is constructed by
using public wires to connect nodes. For example, there are a
number of systems that enable you to create networks using the
Internet as the medium for transporting data. These systems use
encryption and other security mechanisms to ensure that only
authorized users can access the network and that the data
cannot
be intercepted.
Tunneling
A technology that enables one network to send its data via
another
network's connections. Tunneling works by encapsulating a
network
protocol within packets carried by the second network. For
example,
Microsoft's PPTP technology enables organizations to use the
Internet to transmit data across a virtual private network (VPN). It
does this by embedding its own network protocol within the
TCP/IP
packets carried by the Internet. (Note: PPTP = point-to-point
tunneling
protocol)
Internet Issues
 Management issues
 No centralized governing body for the Internet
 Service bottlenecks
 Phenomenal growth has left a service void
 Providers underestimating computing power
needed
 Reconciling router addresses needed to
transverse the network
Privacy & Security
 Cryptography
 The process of converting a message into a secret code and
changing the encoded message back to regular text
 Encryption
 The original conversion of a message into a secret code
 Digital Signature
 An encryption technique used for online financial transactions
Have a
nice day…
Have a
nice day…
Encryption
software
running on
sending
computer
Decryption
software
running on
Receiving
computer
E%$&:”}{|…
Firewalls
 Firewalls
 A method of preventing unauthorized access between
a company’s computers and the Internet (looks at the
header of a packet)
 Assured pipeline
 An Internet security method that looks at the entire
request for data and then determines whether the
request is valid
Firewall
A system designed to prevent unauthorized access to or from a
private network. Firewalls can be implemented in both hardware
and
software, or a combination of both. Firewalls are frequently used
to
prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the
firewall,
which examines each message and blocks those that do not
meet
Firewall
There are several types of firewall techniques:
 Packet filter: Looks at each packet entering or leaving the network
and accepts or rejects it based on user-defined rules. Packet filtering
is fairly effective and transparent to users, but it is difficult to configure.
In addition, it is susceptible to IP spoofing.
 Application gateway: Applies security mechanisms to specific
applications, such as FTP and Telnet servers. This is very effective,
but can impose a performance degradation.
 Circuit-level gateway: Applies security mechanisms when a TCP or
UDP connection is established. Once the connection has been made,
packets can flow between the hosts without further checking.
 Proxy server: Intercepts all messages entering and leaving the
network. The proxy server effectively hides the true network
addresses.
Firewall
In practice, many firewalls use two or more of these techniques
in
concert.
A firewall is considered a first line of defense in protecting private
information. For greater security, data can be encrypted.
Summary
 Telecommunications is the electronic
transmission of signals for communications
 A computer network consists of the
communications media, devices, and software
needed to connect two or more computer
systems or devices
 Ways of connecting computers in distributed
information processing: terminal-to-host, file
server, and client/server
Summary (continued)
 Network types: personal area network (PAN),
local area network (LAN), metropolitan area
network (MAN), wide area network (WAN),
and international network
 The Internet is a collection of interconnected
networks, all freely exchanging information
 Internet Protocol (IP) is a communication
standard that enables traffic to be routed from
one network to another as needed
Summary (continued)
 Uniform Resource Locator (URL) is an
assigned address on the Internet for each
computer
 An intranet is an internal corporate network
built using Internet and World Wide Web
standards and protocols
 An extranet is a network based on Web
technologies that links selected resources of a
company’s intranet with its customers,
suppliers, or other business partners
1 von 63

Recomendados

Computer Networking von
Computer NetworkingComputer Networking
Computer Networkingkieshore
1.3K views15 Folien
Internet working von
Internet workingInternet working
Internet workingAmandeep Kaur
5.2K views14 Folien
Intranet and extranet von
Intranet and extranetIntranet and extranet
Intranet and extranetSharda University
33.9K views21 Folien
Internet, intranet and extranet von
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranetJehra Mae Sevillano Ü
97.1K views12 Folien
Wide area network (wan) von
Wide area network (wan)Wide area network (wan)
Wide area network (wan)Bhavesh Goswami
10.7K views23 Folien
internet intranet and extranet von
internet intranet and extranetinternet intranet and extranet
internet intranet and extranetFLYMAN TECHNOLOGY LIMITED
21.8K views20 Folien

Más contenido relacionado

Was ist angesagt?

Introduction to internet von
Introduction to internetIntroduction to internet
Introduction to internetASIT Education
9K views12 Folien
Web Programming and Internet Technologies von
Web Programming and Internet TechnologiesWeb Programming and Internet Technologies
Web Programming and Internet TechnologiesHenry Osborne
1.5K views13 Folien
Internet and intranet von
Internet and intranetInternet and intranet
Internet and intranetRohit Kumar
7.6K views11 Folien
advantages and disadvantages of using internet von
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internetgulsheramjad
96.6K views17 Folien
types of network von
types of networktypes of network
types of networkZenobia Sukhia
11.3K views6 Folien
internet ppt von
internet pptinternet ppt
internet pptSaransh Modgil
5.6K views15 Folien

Was ist angesagt?(20)

Web Programming and Internet Technologies von Henry Osborne
Web Programming and Internet TechnologiesWeb Programming and Internet Technologies
Web Programming and Internet Technologies
Henry Osborne1.5K views
Internet and intranet von Rohit Kumar
Internet and intranetInternet and intranet
Internet and intranet
Rohit Kumar7.6K views
advantages and disadvantages of using internet von gulsheramjad
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internet
gulsheramjad96.6K views
Mobile Computing (Part-1) von Ankur Kumar
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
Ankur Kumar22.1K views
Introduction to computer network von Ashita Agrawal
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal225.9K views
Frame work of e commerce von Tej Kiran
Frame work of e commerceFrame work of e commerce
Frame work of e commerce
Tej Kiran18K views
All About Internet Services von Varun
All About Internet ServicesAll About Internet Services
All About Internet Services
Varun 15.7K views
dial-up von s1180179
dial-updial-up
dial-up
s11801792.7K views
The Internet and the World Wide Web von dpd
The Internet and the World Wide WebThe Internet and the World Wide Web
The Internet and the World Wide Web
dpd8.2K views
Evolution of web browsers ppt von Jyothi Reddy
Evolution of web browsers pptEvolution of web browsers ppt
Evolution of web browsers ppt
Jyothi Reddy19.5K views
Internet ppt von tej_vish
Internet pptInternet ppt
Internet ppt
tej_vish84.8K views

Destacado

Factories act, 1948 {HR} von
Factories act, 1948 {HR}Factories act, 1948 {HR}
Factories act, 1948 {HR}FellowBuddy.com
2K views21 Folien
Overcoming Security Threats and Vulnerabilities in SharePoint von
Overcoming Security Threats and Vulnerabilities in SharePointOvercoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePointAntonioMaio2
2.2K views34 Folien
Extranet communautaire #cloud von
Extranet communautaire #cloudExtranet communautaire #cloud
Extranet communautaire #cloudEric Herschkorn
3K views28 Folien
Antenna basics from-r&s von
Antenna basics from-r&sAntenna basics from-r&s
Antenna basics from-r&sSaurabh Verma
4.7K views32 Folien
Extranet von
ExtranetExtranet
Extranetdriera
6.3K views24 Folien
Root locus method von
Root locus methodRoot locus method
Root locus methodRavi Patel
6.4K views21 Folien

Destacado(20)

Overcoming Security Threats and Vulnerabilities in SharePoint von AntonioMaio2
Overcoming Security Threats and Vulnerabilities in SharePointOvercoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePoint
AntonioMaio22.2K views
Antenna basics from-r&s von Saurabh Verma
Antenna basics from-r&sAntenna basics from-r&s
Antenna basics from-r&s
Saurabh Verma4.7K views
Extranet von driera
ExtranetExtranet
Extranet
driera6.3K views
Root locus method von Ravi Patel
Root locus methodRoot locus method
Root locus method
Ravi Patel6.4K views
Intranet & Extranet von Rahul Kumar
Intranet & ExtranetIntranet & Extranet
Intranet & Extranet
Rahul Kumar4.4K views
Diff intranet and extranet von Nadeem Khazi
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
Nadeem Khazi7.4K views
Chapter 8 Root Locus Techniques von guesta0c38c3
Chapter 8 Root Locus TechniquesChapter 8 Root Locus Techniques
Chapter 8 Root Locus Techniques
guesta0c38c385.8K views
Electro magnetic interference and compatibility(ECM,ECI) von Palani murugan
Electro magnetic interference and compatibility(ECM,ECI)Electro magnetic interference and compatibility(ECM,ECI)
Electro magnetic interference and compatibility(ECM,ECI)
Palani murugan5.8K views
An introduction to basic hydrocyclone von shakib afzal
An introduction to basic hydrocycloneAn introduction to basic hydrocyclone
An introduction to basic hydrocyclone
shakib afzal4.5K views
Mineral Engineering & Fuel Lecture Notes von FellowBuddy.com
Mineral Engineering & Fuel Lecture NotesMineral Engineering & Fuel Lecture Notes
Mineral Engineering & Fuel Lecture Notes
FellowBuddy.com942 views
Ratio and Proportion, Indices and Logarithm Part 2 von FellowBuddy.com
Ratio and Proportion, Indices and Logarithm Part 2Ratio and Proportion, Indices and Logarithm Part 2
Ratio and Proportion, Indices and Logarithm Part 2
FellowBuddy.com587 views
Encryption presentation final von adrigee12
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee1234.2K views

Similar a The Internet, Intranet and Extranet

W 11 internet & www von
W 11 internet & wwwW 11 internet & www
W 11 internet & wwwInstitute of Management Studies UOP
716 views22 Folien
2 internet essentials von
2 internet essentials2 internet essentials
2 internet essentialschris30931
229 views21 Folien
Internet von
InternetInternet
Internetvishwanna
2.4K views11 Folien
Lecture 2 von
Lecture 2Lecture 2
Lecture 2uccwebcourses
1.8K views17 Folien
E_commerce_chap_2.pptx von
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptxMohammedAliShakil
8 views21 Folien
Basics of internet, intranet, e mail, von
Basics of internet, intranet, e mail,Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Megha V
357 views19 Folien

Similar a The Internet, Intranet and Extranet(20)

2 internet essentials von chris30931
2 internet essentials2 internet essentials
2 internet essentials
chris30931229 views
Internet von vishwanna
InternetInternet
Internet
vishwanna2.4K views
Basics of internet, intranet, e mail, von Megha V
Basics of internet, intranet, e mail,Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,
Megha V357 views
Internet And How It Works von ftz 420
Internet And How It WorksInternet And How It Works
Internet And How It Works
ftz 42029.8K views
Introduction about Internet von Aadil Khan
Introduction about InternetIntroduction about Internet
Introduction about Internet
Aadil Khan243 views
Final draft[2] von Teshabel
Final draft[2]Final draft[2]
Final draft[2]
Teshabel255 views
Chapter 7 Networks and Communication Devices.docx von robertad6
Chapter 7 Networks and Communication Devices.docxChapter 7 Networks and Communication Devices.docx
Chapter 7 Networks and Communication Devices.docx
robertad64 views
Chapter 7 Networks and Communication Devices.docx von edward6king79409
Chapter 7 Networks and Communication Devices.docxChapter 7 Networks and Communication Devices.docx
Chapter 7 Networks and Communication Devices.docx
Introduction to Information Technology Lecture Slides PPT von Osama Yousaf
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPT
Osama Yousaf1.1K views
GSBA - IT Orientation Program by Prof. Amit Chandra von Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
Amit Chandra1.1K views
Information communication technology (ict) von NILISSL
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)
NILISSL37.1K views
Internet von mustha3
InternetInternet
Internet
mustha3566 views

Más de FellowBuddy.com

Database Management System von
Database Management System Database Management System
Database Management System FellowBuddy.com
1.9K views56 Folien
Operating System von
Operating System Operating System
Operating System FellowBuddy.com
388 views8 Folien
Microsoft Office PowerPoint 2007 Training von
Microsoft Office PowerPoint 2007 TrainingMicrosoft Office PowerPoint 2007 Training
Microsoft Office PowerPoint 2007 TrainingFellowBuddy.com
571 views84 Folien
Social science class_x von
Social science class_xSocial science class_x
Social science class_xFellowBuddy.com
855 views79 Folien
Maths class x von
Maths class xMaths class x
Maths class xFellowBuddy.com
2.5K views101 Folien
Business Studies Class xii von
Business Studies Class xiiBusiness Studies Class xii
Business Studies Class xiiFellowBuddy.com
3K views106 Folien

Más de FellowBuddy.com(20)

Microsoft Office PowerPoint 2007 Training von FellowBuddy.com
Microsoft Office PowerPoint 2007 TrainingMicrosoft Office PowerPoint 2007 Training
Microsoft Office PowerPoint 2007 Training
FellowBuddy.com571 views
Refrigeration Engineering Lecture Notes von FellowBuddy.com
Refrigeration Engineering Lecture NotesRefrigeration Engineering Lecture Notes
Refrigeration Engineering Lecture Notes
FellowBuddy.com1.2K views
Production and Operation Management Lecture Notes von FellowBuddy.com
Production and Operation Management Lecture NotesProduction and Operation Management Lecture Notes
Production and Operation Management Lecture Notes
FellowBuddy.com830 views
Interpersonal Communication Skills {HR} von FellowBuddy.com
Interpersonal Communication Skills {HR}Interpersonal Communication Skills {HR}
Interpersonal Communication Skills {HR}
FellowBuddy.com247 views
Industrial Dispute Act, 1947 {HR} von FellowBuddy.com
Industrial Dispute Act, 1947 {HR}Industrial Dispute Act, 1947 {HR}
Industrial Dispute Act, 1947 {HR}
FellowBuddy.com2.3K views
Ratio and Proportion, Indices and Logarithm Part 4 von FellowBuddy.com
Ratio and Proportion, Indices and Logarithm Part 4Ratio and Proportion, Indices and Logarithm Part 4
Ratio and Proportion, Indices and Logarithm Part 4
FellowBuddy.com514 views
Ratio and Proportion, Indices and Logarithm Part 1 von FellowBuddy.com
Ratio and Proportion, Indices and Logarithm Part 1Ratio and Proportion, Indices and Logarithm Part 1
Ratio and Proportion, Indices and Logarithm Part 1
FellowBuddy.com426 views
Limits and Continuity - Intuitive Approach part 3 von FellowBuddy.com
Limits and Continuity - Intuitive Approach part 3Limits and Continuity - Intuitive Approach part 3
Limits and Continuity - Intuitive Approach part 3
FellowBuddy.com425 views
Limits and Continuity - Intuitive Approach part 2 von FellowBuddy.com
Limits and Continuity - Intuitive Approach part 2Limits and Continuity - Intuitive Approach part 2
Limits and Continuity - Intuitive Approach part 2
FellowBuddy.com324 views
Limits and Continuity - Intuitive Approach part 1 von FellowBuddy.com
Limits and Continuity - Intuitive Approach part 1Limits and Continuity - Intuitive Approach part 1
Limits and Continuity - Intuitive Approach part 1
FellowBuddy.com454 views

Último

ICANN von
ICANNICANN
ICANNRajaulKarim20
63 views13 Folien
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively von
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
457 views18 Folien
ICS3211_lecture 08_2023.pdf von
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
95 views30 Folien
discussion post.pdf von
discussion post.pdfdiscussion post.pdf
discussion post.pdfjessemercerail
106 views1 Folie
Computer Introduction-Lecture06 von
Computer Introduction-Lecture06Computer Introduction-Lecture06
Computer Introduction-Lecture06Dr. Mazin Mohamed alkathiri
65 views12 Folien
Structure and Functions of Cell.pdf von
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
317 views10 Folien

Último(20)

ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively von PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 457 views
Structure and Functions of Cell.pdf von Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan317 views
Classification of crude drugs.pptx von GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1465 views
JiscOAWeek_LAIR_slides_October2023.pptx von Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc72 views
Solar System and Galaxies.pptx von DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar79 views
Narration ppt.pptx von TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN110 views
American Psychological Association 7th Edition.pptx von SamiullahAfridi4
American Psychological Association  7th Edition.pptxAmerican Psychological Association  7th Edition.pptx
American Psychological Association 7th Edition.pptx
SamiullahAfridi474 views
The Open Access Community Framework (OACF) 2023 (1).pptx von Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc77 views
Ch. 7 Political Participation and Elections.pptx von Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala69 views
AI Tools for Business and Startups von Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov89 views
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx von Inge de Waard
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxOEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
Inge de Waard165 views
Lecture: Open Innovation von Michal Hron
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open Innovation
Michal Hron95 views

The Internet, Intranet and Extranet

  • 2. An Overview of Telecommunications and Networks  Telecommunications: the electronic transmission of signals for communications  Telecommunications medium: anything that carries an electronic signal and interfaces between a sending device and a receiving device
  • 3. 3 An Overview of Telecommunications and Networks (continued) Elements of a Telecommunications System
  • 7. Networks  Computernetwork: the communications media, devices, and software needed to connect two or more computer systems or devices  Networknodes: the computers and devices on the networks
  • 8. Basic Processing Strategies  Centralized processing: all processing occurs in a single location or facility  Decentralized processing: processing devices are placed at various remote locations  Distributed processing: computers are placed at remote locations but connected to each other via a network
  • 9. Terminal-to-Host, File Server, and Client/Server Systems  Connecting computers in distributed information processing:  Terminal-to-host: the application and database reside on one host computer, and the user interacts with the application and data using a “dumb” terminal  File server: the application and database reside on the one host computer, called the file server  Client/server: multiple computer platforms are dedicated to special functions, such as database management, printing, communications, and program execution
  • 10. 10 Terminal-to-Host, File Server, and Client/Server Systems (continued) Client/Server Connection
  • 11. Network Types  Personal area network (PAN)  Local area network (LAN)  Metropolitan area network (MAN)  Wide area network (WAN)  International network
  • 13. Network Types (continued) A Wide Area Network
  • 14. Communications Software and Protocols  Communications software: software that provides a number of important functions in a network, such as error checking and data security  Network operating system (NOS)  Network management software  Communications protocol: a standard set of rules that controls a telecommunications connection
  • 15. 15 Communications Software and Protocols (continued) Common Communications Protocols
  • 16. 16 Communications Software and Protocols (continued) Common Communications Protocols (continued)
  • 17. Use and Functioning of the Internet  Internet: a collection of interconnected networks, all freely exchanging information  ARPANET  The ancestor of the Internet  A project started by the U.S. Department of Defense (DoD) in 1969  Internet Protocol (IP): communication standard that enables traffic to be routed from one network to another as needed
  • 18. How the Internet Works  The Internet transmits data from one computer (called a ho st) to another  If the receiving computer is on a network to which the first computer is directly connected, it can send the message directly  If the receiving computer is not on a network to which the sending computer is connected, the sending computer relays the message to another computer that can forward it
  • 19. The Internet  The internet  A network of networks  The internet transmits data from one computer (called a host) to another  Internet networks  Linked networks that work much the same way -- they pass data around in packets, each of which carries the addresses of its sender and receiver
  • 21. Internet Unlike online services, which are centrally controlled, the Internet is decentralized by design. Each Internet computer, called a host, is independent. Its operators can choose which Internet services to use and which local services to make available to the global Internet community. Remarkably, this anarchy by design works exceedingly There are a variety of ways to access the Internet. It is also possible to
  • 22. How the Internet Works Transport control protocol (TCP)  A protocol that operates at the transport layer and is used in combination with IP by most Internet applications Backbone  An Internet high-speed, long distance communications links (like a bus; wire that connects nodes) Uniform resource locator (URL)  An assigned address on the Internet for each computer  E.g., http://www.yorku.ca/
  • 23. Domain Affiliations Domain Affiliations arts cultural and entertainment activities com business organizations edu educational sites firm businesses and firms gov government sites info information service providers mil military sites nom individuals net networking organizations org organizations rec recreational activities store businesses offering goods for purchase web entities related to World Wide Web activities net networking organizations
  • 24. Access to the Internet  LAN servers  Local servers can provide access to the Internet through normal connections (e.g., Ethernet)  Serial line internet protocol (SLIP) and Point-to-point protocol (PPP)  Communications protocol software that transmits packets over telephone lines, allowing dial-up access to the Internet  Connection via an on-line service  Examples are America Online and Microsoft Network. These services usually require sign-up procedures
  • 25. Three Ways to Access the Internet
  • 26. Internet Service Providers  Internet service provider (ISP)  Any company that provides individuals or companies with access to the Internet  Thousands of providers including large communications companies  Need an account with the ISP and software that links with TCP/IP
  • 27. Internet Services  E-mail  Telnet  FTP  Usenet and newsgroups  Chat rooms  Internet phone  Internet videoconferencing  Content streaming
  • 28. Internet Services  Internet telephony  Also called voice-over-IP (VOIP)  Technology that enables network managers to route phone calls and fax transmissions over the same network they use for data
  • 30. What is VOIP ? Internet telephony is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls. For users who have free, or fixed-price, Internet access, Internet telephony software essentially provides free telephone calls anywhere in the world. To date, however, Internet telephony does not offer the same quality of telephone service as direct telephone connections. There are many Internet telephony applications available. Some, like CoolTalk and NetMeeting, come bundled with popular Web browsers. Others are stand-alone products. Internet telephony products are sometimes called IP telephony, Voice over the Internet (VOI) or Voice over IP (VOIP) products.
  • 31. Content Streaming  Content streaming  A method for transferring multimedia files over the Internet so that the data stream of voice and pictures plays continuously, without a break, or very few of them  It also enables users to browse large files in real time
  • 32. The World Wide Web  World Wide Web  A collection of tens of thousands of independently- owned computers that work together as one in an Internet service
  • 33. WWW Terminology  Home page  The cover page for a Web site that has graphics, titles, coloured text, etc.  Hypermedia  Tools that connect the data on Web pages, allowing users to access topics in whatever order they wish  Hypertext markup language (HTML)  The standard page description language for Web pages
  • 34. WWW Terminology  Web browser  Software that creates a unique hypermedia-based menu on your computer screen and provides a graphical interface to the Web  Web page  A screen of information sent to a requesting user and presented through a browser  Applet  A small program embedded in Web pages
  • 35. HTML  “The” language of WWW pages  Need we say more!!!
  • 36. 36 The World Wide Web  The Web, WWW or W3  A menu-based system that uses the client/server model  Organizes Internet resources throughout the world into a series of menu pages, or screens, that appear on your computer  Hypermedia: tools that connect the data on Web pages, allowing users to access topics in whatever order they want
  • 37. 37 The World Wide Web  Hypertext Markup Language (HTML): the standard page description language for Web pages  HTML tags: codes that let the browser know how to format the text on a Web page and whether images, sound, and other elements should be inserted
  • 38. Search Engines  Search engines  A search tool for the Web (like card catalogs in libraries)  E.g., Google.com Yahoo.com Rediff.com
  • 39. Java  Java  An object-oriented programming language  Developed by Sun Microsystems  Based on C++  Allows small programs -- applets -- to be embedded within an HTML document
  • 40. Applets  Applets are small java programs that are downloaded from the server to the local machine
  • 41. 41 Developing Web Content  Products that greatly simplify the creation of a Web page  For example: .NET platform  Content management system (CMS)  Web services
  • 42. 42 Web Services  Standards and tools that streamline and simplify communication among Web sites for business and personal purposes  Can also be used to develop new systems to send and receive secure messages between healthcare facilities, doctors, and patients, while maintaining patient privacy
  • 43. Push Technology  Push technology  Technology that enables users to automatically receive information over the Internet rather than searching for it using a browser  Also called Webcasting  E.g.,  PointCast  InterMind
  • 44. Webcasting ‘Discussion’ Using the Internet, and the World Wide Web in particular, to broadcast information. Unlike typical surfing, which relies on a pull method of transferring Web pages, webcasting uses push technologies.
  • 45. What is Push ? In client/server applications, to send data to a client without the client requesting it. The World Wide Web is based on a pull technology where the client browser must request a Web page before it is sent. Broadcast media, on the other hand, are push technologies because they send information out regardless of whether anyone is tuned in. Increasingly, companies are using the Internet to deliver information push-style. One of the most successful examples of this is PointCast, which delivers customized news to users' desktops.
  • 46. Push Mail Probably the oldest and most widely used push technology is e- mail. This is a push technology because you receive mail whether you ask for it or not -- that is, the sender pushes the message to the receiver.
  • 47. Intranets and Extranets  Intranet  An internal corporate network built using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information  Extranet  A network based on Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners
  • 48. What is Intranet ? A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. An intranet's Web sites look and act just like any other Web sites, but the firewall surrounding an intranet fends off unauthorized access. Like the Internet itself, intranets are used to share information. Secure intranets are now the fastest-growing segment of the Internet because they are much less expensive to build and manage than private networks based on proprietary protocols.
  • 49. What is Extranet ? A new buzzword that refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders. You can access an extranet only if you have a valid username and password, and your identity determines which parts of the extranet you can view. Extranets are becoming a very popular means for business partners to exchange information.
  • 50. Virtual Private Network (VPN)  Virtual Private Network (VPN)  A secure connection between two points across the Internet  Tunneling  The process by which VPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet
  • 52. VPN Short for virtual private network, a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
  • 53. Tunneling A technology that enables one network to send its data via another network's connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. For example, Microsoft's PPTP technology enables organizations to use the Internet to transmit data across a virtual private network (VPN). It does this by embedding its own network protocol within the TCP/IP packets carried by the Internet. (Note: PPTP = point-to-point tunneling protocol)
  • 54. Internet Issues  Management issues  No centralized governing body for the Internet  Service bottlenecks  Phenomenal growth has left a service void  Providers underestimating computing power needed  Reconciling router addresses needed to transverse the network
  • 55. Privacy & Security  Cryptography  The process of converting a message into a secret code and changing the encoded message back to regular text  Encryption  The original conversion of a message into a secret code  Digital Signature  An encryption technique used for online financial transactions
  • 56. Have a nice day… Have a nice day… Encryption software running on sending computer Decryption software running on Receiving computer E%$&:”}{|…
  • 57. Firewalls  Firewalls  A method of preventing unauthorized access between a company’s computers and the Internet (looks at the header of a packet)  Assured pipeline  An Internet security method that looks at the entire request for data and then determines whether the request is valid
  • 58. Firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet
  • 59. Firewall There are several types of firewall techniques:  Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.  Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.  Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.  Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
  • 60. Firewall In practice, many firewalls use two or more of these techniques in concert. A firewall is considered a first line of defense in protecting private information. For greater security, data can be encrypted.
  • 61. Summary  Telecommunications is the electronic transmission of signals for communications  A computer network consists of the communications media, devices, and software needed to connect two or more computer systems or devices  Ways of connecting computers in distributed information processing: terminal-to-host, file server, and client/server
  • 62. Summary (continued)  Network types: personal area network (PAN), local area network (LAN), metropolitan area network (MAN), wide area network (WAN), and international network  The Internet is a collection of interconnected networks, all freely exchanging information  Internet Protocol (IP) is a communication standard that enables traffic to be routed from one network to another as needed
  • 63. Summary (continued)  Uniform Resource Locator (URL) is an assigned address on the Internet for each computer  An intranet is an internal corporate network built using Internet and World Wide Web standards and protocols  An extranet is a network based on Web technologies that links selected resources of a company’s intranet with its customers, suppliers, or other business partners