Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]



Similar documents
Cornerstones of Security

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

VPN. Date: 4/15/2004 By: Heena Patel

Community Development and Training Centre Semester IT 245 Management Information Systems Chapter 3 Internetwork E-Business Electronic Business

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Chapter 3. Outline the hardware and software technologies used to build an e business. its partners. access to the Internet and hosting of

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

AS/400 System Overview

Network Services Internet VPN

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

SSL VPN vs. IPSec VPN

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

Recommended IP Telephony Architecture

Cisco Which VPN Solution is Right for You?

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Why your own server space? Why should you set it up?

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Basics of Internet Security

S y s t e m A r c h i t e c t u r e

Fig : Packet Filtering

Web Foundations Series Internet Business Associate

Local Area Networks (LANs) Blueprint (May 2012 Release)

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems

EUROPASS DIPLOMA SUPPLEMENT

IBM enetwork VPN Solutions

Software evaluation criteria and terminology REPORT # : R07/0203 AUTHOR(S) : Diane Belyk & David Feist DATE : March 2002

Guidance Regarding Skype and Other P2P VoIP Solutions

Virtual Private Networks

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Pearson Education Limited 2003

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

Figure 41-1 IP Filter Rules

Understand Wide Area Networks (WANs)

MANAGEMENT INFORMATION SYSTEMS 8/E

Discovering Computers Chapter 9 Communications and Networks

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

Niagara IT Manager s Guide

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

Chapter 5. Data Communication And Internet Technology

IP VPN Solutions Secure, flexible networking options from a leader in IP solutions

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

Connecting with Computer Science, 2e. Chapter 5 The Internet

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Distributed Systems. Security concepts; Cryptographic algorithms; Digital signatures; Authentication; Secure Sockets

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

TSC (Total Solution Communications Ltd)

Steelcape Product Overview and Functional Description

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

Masters of Science in Information Technology

Outline. TIM 50 - Business Information Systems. Lecture 10. Instructor: Terry Allen UC Santa Cruz 10/28/2011

Deploying IP-based Virtual Private Network Across the Global Corporation

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

Basic Network Configuration

Network Access Security. Lesson 10

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

IOCOM Whitepaper: Connecting to Third Party Organizations

Internet and its Application in Libraries

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

z/os Firewall Technology Overview

Basic IPv6 WAN and LAN Configuration

Web Design (One Credit), Beginning with School Year

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

Kodak Remote Support System - RSS VPN

OS/390 Firewall Technology Overview

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Cloudbuz at Glance. How to take control of your File Transfers!

Fundamentals of a Windows Server Infrastructure MOC 10967

Interwise Connect. Working with Reverse Proxy Version 7.x

Chapter 4: Networking and the Internet

CISC 1600 Introduction to Multi-media Computing

Network Configuration Settings

VPN Solutions SECURITY SOFTWARE. Product Information

Secure System Solution and Security Technology

Overview - Using ADAMS With a Firewall

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

DOCUMENTS ON WEB OBJECTIVE QUESTIONS

Technical papers Virtual private networks

This chapter describes how to set up and manage VPN service in Mac OS X Server.

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

Overview - Using ADAMS With a Firewall

Network Security Topologies. Chapter 11

Top-Down Network Design

Glossary of Telco Terms

Transcription:

Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within a department, a company, or an office [Awad, p69] An organization-wide software and information distribution system applying Internet technology to a closed network operation is a communication project designed by technical staff A network of people, not just wired machines Usually runs in a client/server environment and a local area network configuration Server and Client PCs Web Server Browsers TCP/IP Electronic Mail Graphic and Multimedia Files Network File System (NFS) Internet Relay Chat (IRC), Unix utility HTML Authoring Tools HTML documents Portable Electronic Documents 3 4 1

Benefits [Awad, chapter 4] Links employees and managers together Automates a lot of intra-organizational traffic Enables a company to gain better access to its primary resources knowledge and experience Serves as a creative and empowering tool Establishes the foundation for developing enterprise-wide information systems Benefits (Cont d) Provides a model for new internal information management collaborative computing Prepares a wealth of Internet knowledge to employees Eases process integration Allows company to expand the system 5 6 Firewalls Firewalls protect intranets from unauthorized outside access. Definition of Firewall Software and hardware that allow only those external users with specific characteristics to access a protected network Usually located at a gateway point and controls traffic between internal and external networks Using Firewalls Proxy Go-between agent that acts on behalf of another Packet Filter Checks each packet at network level 7 8 2

The Public/External Internet Users Firewalls Clients Servers ERP Legacy systems E-mail servers Web servers E-Business Systems: s Databases From Turban, et al., 2000, Prentice Hall, 2000 9 9 E-Procurement 10 Some generic functions of an Corporate/department/individual Web-pages Database access: Web-based databases Search engines and directory: Assist key word-based search (great for customer support and sales folks looking for existing solutions) Interactive communication: Chatting, audio and videoconferencing Document distribution and workflow: Web-based download and routing of documents Groupware: better communication and groupwork Telephony: teleconferencing, etc. Benefits of for e-business Low Development and Maintenance Costs Friendly Environment High Information Availability and Shareability Timely Information Easy Dissemination of Information E-Business Systems: " External but private (s) An extranet implies an extended intranet s provide secure connectivity between a corporation s intranets and BUSINESS partners Ex' tra net - "a business-to-business intranet that allows limited, controlled, secure access between a company's intranet and designated, authenticated users from remote locations". 11 12 3

E-Business Systems: " External but private (s) uses TCP/IP protocol networks (like the Internet) to link intranets in different locations. or use specific protocols transmissions conducted over Internet to save money. Internet offers no inherent privacy or transmission security. Need s 13 E-Business Systems: " (by Lawrence, pp. 17) An extranet is a collaborative network that uses Internet technology to link businesses with their suppliers, customers or other business that share common goals. s are usually linked to business intranets where information is either accessible through a password system or through links that are established collaboratively. 14 E-Business Systems: " (by Lawrence, pp. 17) They can be also private worldwide networks that operate on protocols that are either the same as Internet or specifically developed for those networks. Unlike the Internet, these networks are not always in the public domain. 15 Virtually Private Network () is a secure network on the Internet using the tunneling schemes tunnels are secure data flows w/ cryptography and authorization algorithms The major objective of a is to use the Internet as an inexpensive WAN backbone When two sites are connected across a, each must have a -capable router, firewall, or access device installed When is used to link mobile clients with Internet dialup connections, the laptops must be equipped with client software equipped with the addresses and associated encryption keys for corporate host sites 16 4

If a company Web site links two or more trading partners, it is referred to as an. Suppliers Distributors Customers Tunneling Internet Firewall Firewall From Turban, et al., 2000, Prentice Hall, 2000 17 [Awad] Features: Lets limited, controlled business partners interact with the firm for all kinds of exchanges System designers must collaborate to make sure there is a common interface with the company they are dealing with Benefits: faster time-to-market, customer loyalty, increased partner interaction, and improved processes 18 Key Considerations [Awad] Identifying users Listing technology components Specifying security requirements Type of users Sensitivity of information transacted Communication lines used Discussing administration of extranet Understanding usability of extranet 19 Quick Overview: Internet,, and Network Typical Type of Type Users Access Information Internet Any individual with dial-up access or LAN Unlimited, public; no restrictions General, public and advertisement Authorized employees ONLY Authorized groups from collaborating companies Private and restricted Private and outside authorized partners From Turban, et al., 2000, Prentice Hall, 2000 Specific, corporate and proprietary Shared in authorized collaborating groups 20 5

Summary: s, s, Internet Suppliers Clients Enterprise Internet Part of Enterprise Consumers Remote Employees Ultranet" Mako Katsumura described what will be the ultimate world-wide network, informally known as the Ultranet. It will exist once all of the relatively new Internet tools and methodologies mature into their next phase. Prentice Hall, 2000 Distributors 21 Business Partners 22 Ultranet" The building blocks that will combine to form the Ultranet are: Java, platform-independent Internet Protocol version 6 (IPv6), more addressing space (Increase from 32-bit to 128-bit address space) Secure electronic transactions (SET) Object-oriented database management systems (OODBMS) Extensible Markup Language (XML), an universal data representing language Ultra = going beyond what is usual or ordinary 23 6