Sunteți pe pagina 1din 88

Internet, Intranet and

Extranets
What is Internet ?
 It is a Global network of computers,
to exchange information.

It is a "network of networks" that includes millions


of private and public, academic, business, and
government networks (local or Global),
linked by copper wires, wireless connections, and
other technologies.
History of internet

 ARPANET, original 4 hosts


 NSFnet + ARPANET
 Internet, now 150million hosts
 Internet2
Data Transfer on the Internet
Hosts and Gateway

 Hosts
 The computers that share the network
 Gateway
 A computer on a network serves as an entrance
to another network
 Routes inside traffics to outside networks
 Often as a proxy server and a firewall.
Facts About Internet

 World-wide collection of networks


 Public, cooperative, and independent
 Each organization is responsible only for
maintaining its own network.
 W3C oversees research and sets standards
and issues guidelines
Hardware and Software of Internet

Variety of hardware and software are used to


make Internet functional.

 Modem
Device that enables computers to communicate
through phone lines.
When we start internet the our modem
communicates to modem of ISP.

Continued…
Computer
In addition to a modem, you need a client capable of
handling multiple data types.
 Software
Two types of software’s required to enable your PC as an
Internet PC.
 Communication software to establish connection
 Client software for browsing, e-mail, news.

these software’s are provided with windows itself.


Applications Of Internet

 Download programs and files


 E-Mail
 Voice and Video Conferencing
 E-Commerce
 File Sharing
 Information browsing
 Search the web addresses for access through
search engine
 Chatting and many more…
Disadvantages of Internet
 Theft of personal information such as name, address,
credit card number etc.
 Virus threats nothing but a program which disrupts the
normal functioning of your system.
 Spamming refers to receiving unwanted e-mails in bulk,
which provide no purpose and needlessly obstruct the entire
system.
 Pornography This is perhaps the biggest threat related to
children’s healthy mental life. A very serious issue
concerning the Internet.

Though, internet can also create havoc,


destruction and its misuse can be very fatal,
the advantages of it outweigh its disadvantages.
Packet Switched Networks

 A packet is just that, a tiny bit of information


 The packet has a FROM address and a TO
address just like a letter
 The packets have an order, and are
reassembled at the other end
 The packets can be received in any order
and take different routes to get there
Intranet
What is Intranet ?

 Internal company network that uses Internet


standards (HTML, HTTP & TCP/IP protocols) &
software.

 Accessed only by authorized persons, especially


members or employees of the organization
Intranet Security

Two levels of Security required:

 Internal
It can be imposed by Public Key Security &
Encryption Key.

 External
Through Firewall.
What is Firewall ?

 Security device located between firm’s internal


network (intranet) & external network (internet).

 Regulates access into & out of a company’s network


based on a set of rules.

Note : needs to be upgraded from time to time to check latest


potential security problems.
Applications of Intranet

 Sharing of company policies/rules & regulations


 Access employee database
 Distribution of circulars/Office Orders
 Access product & customer data
 Sharing of information of common interest
 Launching of personal/departmental home pages
 Submission of reports
 Corporate telephone directories
BENEFITS

 Links employees & managers together


 Automates a lot of intra-organizational traffic
 Enables a company to gain better access to its
primary resources – knowledge & experience
 Serves as a creative & empowering tool
 Establishes the foundation for developing
enterprise-wide information systems
Disadvantages
Fear o f sharing information and th e loss of control

Management A company may not have person to update their


Limited b andwidth for the bu siness


problem

Security  Unauthorized access


 Abuse of access
problem
 Denial of service

Productivity
 Information overload lowers productivity
 True purpose of the Intranet is unknown to
problem
many employees/departments
 Hidden or unknown complexity and costs
Extrane
t
What is Extranet ?
 Extranet is an Intranet for outside authorized users using
same internet technology.
 Inter-organizational information system.
 enable outsiders to work together with company’s
employees.
 open to selected suppliers, customers & other business partners
Examples..

 Dealers/distributors have access to


product files such as :-
1. product specification,
2. pictures,
3. images, etc.
to answer the queries of the customer.
Components of extranets ..
Some basic infrastructure components such
as the internet Including :-
 TCP/IP protocols,
 E-mail,
 Web-browsers,
 External business partners &
 Tele-commuting employees place order,
check status & send E-mail.
Benefits of Extranet
 Improved quality.
 lower travel costs.
 lower administrative & other overhead costs.
 reduction in paperwork.
 delivery of accurate information on time.
 improved customer service.
 better communication.
 overall improvement in business
effectiveness.
BENEFITS (Cont’d)

 Provides a model for new internal information


management collaborative computing
 Prepare a wealth of Internet knowledge to
employees
 Eases process integration
 Allows company to expand the system
APPLICATIONS

 Human Resources
 Employee handbook
 Benefits information
 Employee surveys
 Internal/external recruiting
 Candidate screening
 Organizational charts
 Newsletters
 Company calendars
APPLICATIONS (Cont’d)

 Sales & Marketing


 Product information
 Market research
 Prospecting
 Managing sales contact
 Sales training
APPLICATIONS (Cont’d)

 Accounting & Finance


 Financial reports
 Expense reports
 Accounts receivable/payable processing
 Asset management
 Policies & procedures
 Payroll
EXTRANETS( important Features)

 Allows limited, controlled business partners to


interact with the firm for all kinds of exchanges
 System designers must collaborate to make sure
there is a common interface with the company
they are dealing with
 Benefits: faster time-to-market, customer loyalty,
increased partner interaction, & improved
processes
KEY CONSIDERATIONS

 Identifying users
 Listing technology components
 Specifying security requirements
 Discussing administration of extranet
 Understanding usability of extranet
OTHER CONSIDERATIONS

 Security
 Type of users
 Sensitivity of information transacted
 Communication lines used
 Manageability / administration
 Usability
APPLICATIONS (Cont’d)

 Manufacturing & Operations


 Inventory control
 Production schedules
 Quality assurance
 Part order/requisition system
BASIC INTRANET ENABLING
TECHNOLOGIES
 Server & Client PCs
 Web Server
 Browsers
 TCP/IP Electronic Mail
 Graphic & Multimedia Files
 Network File System (NFS)
 Internet Relay Chat (NRC)
 HTML Authoring Tools
 HTML
 Portable Electronic Document
Layered System View

Intrane Corporate members


t
Extranet Clients, partners, customers

Interne Global society: competitors


t
Browsers

 The browser takes all that text and uses it to


create what you see on the screen.
 Different browsers have different translations.
Although the web tries to be uniform, things
may not always display the same.
 There are standards for the Web portion of
the internet, but not all companies adhere to
them.
Internet Explorer

 One of the most common browsers is Internet


Explorer, it is what we have here in the
library. Many other browsers exist and often
people have strong opinions on which is best
 Sometimes the text sent to your computer
requires MORE than just the HTML decoding
by your browser…
Scripts

 In order to do complicated things not covered


in the display language of HTML we use
“Scripts”
 These are sets of text that tells your
computer to do something, but require you to
have a program that interprets the commands
 Java, PHP, ASP etc. are all scripting
languages.
Where’s the script

 Most scripting languages are included in a


computer’s operating system but may need to
be updated regularly
 Scripts can cause problems with older
systems
 Scripts are more and more common as
computers get faster, complex scripts take
more processing power than HTML
Where can I get my 0’s and 1’s

 The internet is a lot more than the HTML


“World Wide Web” but today we’ll be using
just the browser
 The browser connects to the network with
some kind of modem
 Modem means Modulation/Demodulation
 It converts digital On/Off (0’s and 1’s) to sound
that travels over the phone lines
Modems

 Basic modem sound conversion uses the


normal phone line which wasn’t designed for
digital data. A single line has a maximum
speed of 56,000 Bytes per second, and is
often slower
 These days 14336000000 a second is slow!
 Cable modems use a more digital friendly line
and can be very fast
Broadband

 ADSL is Asymmetric Digital Subscriber Link


(Asymmetric because download is usually much
faster than upload… you do more receiving than
sending so this is fine)
 By using frequencies much higher than human
speech it gets around the slow limit of the telephone
56,000 Bytes
 Can be very fast
 Cable/DSL connections are “Broadband”
Bandwidth

 Bandwidth is the amount of data you can


shove in at one time. The “Broader” your
band the better.
 “Broadband” is becoming common enough
that browsing can be painfully slow without it.
 Text is fast, images are slow
 A picture really IS more than a thousand words!
Color/Brightness/position…
1000 words?

 The bandwidth to save the word “monkey” a


6 character word 1000 times, in an 8 bit code
like ASCII (one of the simplest codes for
English) is about 600 bytes

 The small picture is about mega bytes


IP address and Domain Names

 Internet Protocol Address


 4 groups of numbers ranging from 0-255
 Domain Names
 People prefer to use names for things
 Domain Name Server (DNS) coverts names to
numbers
 Different levels: most general: last, most specific:
first
IP address and Domain Names

 Each name server knows one level of names


 WAM’s name server knows rac1, rac2, …
 UMD’s name server knows wam, glue, ttclass, …
 .edu name server knows umd, umbc, stanford, …
 “Top level” name server knows .edu, .com, .mil, …
 Organized by network solutions (www.nsl.com)
 ICANN (www.icann.org)
An Example of IP Address

Identify the network

IP address: 216.183.103.150
Identify the specific computer

Domain Name: www.howstuffworks.com


DOMAIN NAMES

 To make Internet addresses easier to remember an


alternative, domain names, was provided which
used words
 Domain names
 May have two or more groups separated by a period,
e.g. www.kiet.edu
 Edu – an education institution
 Cavehill and uwi – the computer’s name
 www – part of the world wide web
 Not all computers follow this convention, e.g
games.yahoo.com
What the root can tell you

 .gov
 Government sites in the United States at any
level, city, county, state, federal etc.
 .org
 Organization or individuals
 .com
 Commercial (for profit)
 .net
 Network providers
Rule of thumb

 Commercial sites usually have a financial


motive, treat them like a salesman when they
make statements about quality or capability.
 Org sites often have biases just like we all do.
Remember that without some verification
there are a lot of opinions that are stated as
facts.
More dependable

 gov sites are usually dependable. Remember


that Ketchup is a vegetable!
 Although the USDA never passed this into
standards… the government is far from infallible.
They are still some of the best.
 .edu sites are probably the most reliable but
be aware of biases
 Not all .com sites are sales
 www.imr.edu.in for example!
E-MAIL ETIQUETTE

 Write in different color to express attitude or


mood
 Keep sentences short
 Be aware of your office & organization culture
 Avoid flaming
 Don’t use e-mail to send bad news
 Don’t type in capital letters
User Datagram Protocol (UDP)

 Transport packets to another host


 Difference to TCP
 No waiting for connection establishment
 No connection state
 Less headers
 Irregular sending rate
 No guarantee of sending all the data
 Example: sending clicks on web browser
 The rightmost part of the domain name is called
the top-level domain (or TLD), e.g. .edu, or .com
 also Country domains e.g. .bb
 In 2000 seven new general TLDs were added:
 .aero – air transport industry
 .biz – businesses
 .coop – cooperatives
 .museum – museums
 .name – individuals
 .pro - professionals
Uniform Resource Locator

 The combination of the domain name and the


protocol name is called the uniform resource
locator (URL)
 E.g. http://www.yahoo.com
 http is the protocol
 www.yahoo.com is the domain name
The 7 Layer OSI Model

Ap
Pre
Physical layer
moves bits using voltage, current,
light, etc.
2: Data Link layer
bundles bits into frames and moves
frames between hosts on the same
link
 Network layer (e.g. IP)
 Makes routing decisions
 uses destination address in packet

 Forwards packet hop by hop


 encapsulates network layer packet inside data link layer

frame
 different framing on different underlying network types

 Unreliable
 Single address space for the entire internet work
 4: Transport layer (e.g. TCP)
 end to end transport of datagram's
 encapsulates datagram's in network layer packets
 adds reliability by detecting and retransmitting lost
packets
 uses acknowledgements and sequence

numbers to keep track


 5: Session layer
 not used in the TCP/IP network model
 6: Presentation layer
 not used in the TCP/IP network model
 7: Application layer
 Uses the underlying layers to carry out work
Tcp/Ip Model

Message Application 5
Segment 4
UDP TCP

Datagram ICMP IP
3
ARP RARP
Frame Datalink 2
Bit Physical 1
 Layers 1 and 2 are not actually defined by TCP/IP , as TCP/IP was
defined to be independent of physical media .
 Layer 3 is the Internet Protocol (IP) layer
This provides a basic datagram service
 ICMP (Internet Control Message Protocol) is normally provided in

this layer
ICMP reports problems in transmission of datagrams
 ARP (Adress Resolution Protocol)

 RARP (Reverse Address Resolution Protocol)


 In layer 4 are 2 possible protocols : TCP (Transport
Control Protocol) and UDP (User Datagram
Protocol) .
 TCP provides a reliable service with error correction and
flow control .
The cost of providing a reliable service is more overhead in
connection setup and closedown, processing power for
correcting errors and data transmission, but some
applications need reliability irrespective of cost.
 UDP just extends IP’s connectionless datagram service to
applications that do not require reliability .
UDP datagrams can be sent to a network without the
overhead of creating and maintaining a connection
 Layer 5 is the Application layer
This layer provides services suitable for the
different types of application that might wish
to use the network .
It does not provide the application itself .
For example : SMTP , FTP , Telnet ...
Tcp Ip model
Internet Protocols

FTP RFC 959 SNMP

SMTP DNS RIP Routing protocols


RFC 821 RFC 1058 BGP OSPF IGRP EIGRP
RFC 1035

ICMP
TCP RFC 793 UDP RFC 768 RFC 792

IP RFC 791

ARP RFC 826 X.25


PPP HDLC SLIP LAPB
Ethernet/IEEE 802.3
LAN
Public telephone network
Why do we need IP protocol layer?

 Although the services provided by TCP protocol are needed by


many applications, there are still some kind of applications that
don’t need them;
 However, there are some services that every application needs.
 The services that every application needs are put together into
the IP protocol layer;
 IP protocol provides the basic service for the transmission of
a datagram from one machine to another machine which do not
need to be connected directly;
 As a result, TCP calls on the services of IP;
 Like TCP, IP protocol layer can be viewed as a library of
routines that TCP calls on, but which is also available to
applications that don’t use TCP
 IP is described as a “connectionless datagram service” .
 Datagrams are packets of information that can be destined for
one , many or all stations (unique , multicast or broadcast) -
provide addressing.
 There is no requirement for the intended recipient/s to
acknowledge whether the datagram was received (no flow
control, no end-to-end data reliability).
 As IP is connectionless , no specific route is defined between 2
communicating nodes , so datagrams traveling can travel
through different routes and reach destination in a different order
(no sequencing and allow for fragmentation).
 One of the major roles of IP layer is to make it unnecessary for
higher layer protocols to understand anything about the physical
capabilities of the media supporting them .
Note : This is important for application developers writing
programs on top of the transport layer with no variations because
of the different kind of media used .
TCP/IP PROTOCOLS

 Network Layer Protocols


 IP - Internet Protocol
 ICMP - Internet Control Message Protocol
 UDP - User Datagram Protocol
 TCP - Transmission Control Protocol
 IPv6
TCP/IP Model

FTP SMTP Telnet Ping NFS Trace route

TCP UDP

IP and ICMP

Network
Network Protocols
Network DeviceDrivers
Device Drivers

Network Controllers
Network
NetworkDevice
DeviceDrivers
Drivers
Ethernet or other physical medium
 Each layer adds Sending Data Application Data
information as data is
TCP Application Data
passed down to lower
layers IP TCP Application Data

 Added information almost Network IP TCP Application Data


always added as header Physical network
 Each layer removes its
Network IP TCP Application Data
information as data is
passed up to higher IP TCP Application Data

layers TCP Application Data

Receiving Data
Application Data
UDP - User Datagram Protocol

 Connectionless unreliable datagram service


 Adds port concept to identify peer application
 Datagrams may be lost, reordered, or duplicated
 Very low overhead
 Used by applications such as TFTP, DNS, RPC
 Best for simply transaction oriented requests
 Advantages over using IP directly
 Can address individual applications via well-known ports
 Checksums
UDP Datagram

0 16 31
Source Port Destination Port
Length Checksum

Application data

 Field Purpose
 Source Port 16-bit port number identifying originating application
 Destination Port 16-bit port number identifying destination application
 Length Length of UDP datagram (UDP header + data)
 Checksum Checksum of IP pseudo header, UDP header, and
data
Internet Connection Options

 ISPs provide several ways to connect to the


Internet
 Voice grade telephone lines
 Broadband connections
 Leased lines
 Wireless
 The major distinguishing factor is bandwidth (the
amount of data that can be transferred per unit of
time)
Bandwidth and Connections

 Symmetric connection: provides the same


bandwidth in both directions
 Asymmetric connections: provide different
bandwidths for either direction
 Upstream bandwidth (upload bandwidth): the amount of
information that can travel from the user to the Internet
in a given amount of time
 Downstream bandwidth (download or downlink
bandwidth): the amount of information that can be
transferred from the Internet to the user in an amount of
time
Voice-grade Telephone
Connections
 Most common way to connect to ISP
 Modem (analog) connected to telephone lines
 POTS (plain old telephone service)
 28 to 56Kbps
 Digital subscriber line (DSL) protocol
 Does not use a modem
 Uses a piece of network equipment similar to a network
switch
 Integrated services digital network (ISDN) first used DSL
protocol suite in 1984
 More expensive, but offers bandwidth of 128Kbps – 256Kbps
Broadband Connections (I)

 Connections that operate at speeds higher than


200Kbps are considered broadband
 One of the latest is asymmetric digital subscriber
line (ADSL)
 Bandwidths from 100-640Kbps upstream and from 1.5
to 9 Mbps downstream
 For businesses a high-speed DSL (HDSL) is
available
 768Kbps of symmetric bandwidth
Broadband Connections (lI)

 Cable modems (connected to the same


broadband coaxial cable that serves a
television)
 Upstream bandwidth of 300Kbps to 1 Mbps and
downstream bandwidth of 10Mbps
DSL v Cable

 DSL is a private line with no competing traffic


 Cable connections bandwidth change with the
user load (number of subscribers using the
service)
 Problems
 Web users in rural areas often do not have cable
access and have limited telephone access (low cost
voice-grade lines, rather than data-grade lines) thus
bandwidth is limited (<14Kbps)
Leased-Line Connections

 Large firms with a large amounts of Internet traffic


can lease lines from telecommunication carriers
 Various technologies are used; classified by the
amount of telephone lines they include:
 DS0 (digital signal zero) carries one digital signal (64Kbps)
 T1 (or DS1) carries 24 DS0 lines (1.544Mbps)
 Fractional T1 (128Kbps and upwards)
 T3 (or DS3) carries 30 T1 lines (44.736Mbps)
 Connections more expensive than POTS, ISDN and DSL
Wireless Connections

 Satellite
 Bluetooth
 Wireless Ethernet (Wi-Fi)
 Fixed-Point Wireless
 Cellular Telephone Networks
Satellite

 Satellite microwave
transmissions
 Customer placed
receiving dish in yard
 Download bandwidth of
around 500 kbps
 Maximum upload
bandwidth of 150kbps
 Self installation makes
cost lower
Bluetooth

 One of the first wireless


protocols
 Operates reliably over
35 feet and can be part
of up to 10 networks of
eight devices each
(personal area
networks, or PANs)
 Bandwidth of 722kbps
 Good for wireless
printing
Bluetooth Advantages

 Bluetooth technology consumes very little


power
 Bluetooth devices can discover each other
and exchange information automatically (e.g.
a user can print to a printer on a network
without logging on)
Wireless Ethernet (Wi-Fi)
(802.11b)
 Most common wireless
on LANs
 Bandwidth 11Mbps at
300 feet
 A computer with a Wi-Fi
network can
communicate with a
wireless access point
(WAP) to become a part
of the network
Wireless Ethernet Advantages

 Wi-Fi devices can roam, i.e. shift from one


WAP to another without user intervention
 Increasingly WAPs are becoming available in
public places, e.g. airports
Wireless Ethernet
Developments
 In 2002 an improved version of Wi-Fi, called
802.11a was introduced
 The 802.11a protocol is capable of transmitting at
speeds up to 54Mbps
 802.11a is not compatible with 802.11b
 Later in 2002, the 802.11g protocol was
introduced which is compatible with 802.11b
devices and has speeds of 54Mbps
 In 2004-2005, 802.11n expected (320Mbps)
Fixed Point Wireless

 Uses a system of
repeaters (transmitter-
receiver devices) to
forward a radio signal
from the ISP to customers
 Users’ antennas are
connected to a device
that converts radio signals
to Wi-Fi packets which
are sent to their
computers
Cellular Telephone Networks

 In 2003, about 500


million mobile (cell)
phones worldwide
 Originally slow data
communication (10 kbps
– 384kbps)
 Third generation cell
phones
 Up to 2 Mbps
Cellular Telephone Networks (I)

 Cell phones send and receive messages using the


short message service (SMS) protocol
 Some cell phones include Web browser which
provide web access, email, short message service
 Companies also sell Internet access through their
cellular networks
 Fixed fee plus charge for amount of data transferred
 Business potential of mobile commerce
 Companies are identifying the kinds of resources individuals
might want to access (and pay for) using wireless devices

S-ar putea să vă placă și