Escolar Documentos
Profissional Documentos
Cultura Documentos
Intranet Overview
EXAMPLES
An Intranet is a privately maintained, secure computer network based on the communication standards of the Internet.
It is a smaller version of the Internet that only the internal members of an organization can see.
At the same time it is available remotely over the Internet allowing access from any physical location.
Intranet is an IP-based system, which means the whole set of higher-level protocols above TCP/IP could be applied in Intranet without modification.
Email: implementing an email system that integrates seamlessly with the Intranet, allowing information to be both pushed and pulled.
Document management: using the Intranet to allow users to view, print, and work collaboratively on office documents (word-processed documents, spreadsheets, presentations, etc.).
Discussion: using the Intranet as a means for users to discuss and debate issues.
Intranets use HTML to create documents and TCP/IP to transmit information across the network. Information is stored on one or more company servers and accessed by using a web browser, such as Navigator or Internet Explorer. This self-contained, miniature Internet can have all the same featuresindividual home pages, newsgroups, emailbut access is restricted to company employees and contractors.
Extranet Overview
An Extranet is a private network that uses Internet protocols and the public telecommunication system to securely share part of a businesss information or operations with suppliers, vendors, partners, customers, or other businesses.
Extranet brings benefits to not only a single organization, but also to its partners, clients, and suppliers. It allows the organization to improve the communication channels, share up-to-date business information with partners, clients, or suppliers, and integrate the business processes.
Configuration of Extranet
Whereas an Intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an Extranet provides various levels of accessibility to outsiders. You can access an Extranet only if you have a valid username and password, and your identity determines which parts of the Extranet you can view.
Security
Intranet Technology
Web Server
The major appearance of an Intranet is the web-base platform that connects employees and business partners. The web server is obviously the fundamental technology to run the Intranet.
HTML Development
WYSIWYG (What You See Is What You Get)
These tools allow the nontechnical user to create sites without the knowledge of HTML code (for example, Microsoft Front Page).
HTML Editors
For the more advanced user who knows HTML and wants to have more control of the page structure.
The company may decide to purchase licensing for both types of tools and roll them out according to skill level. It should be noted that these types of tools are slowly converging into one.
Browser
If the organization wants to open its Intranet to the partners and vendors (Extranet), support for both browsers is required, because the administrator has no control over the partners network.
Security
Common Threats Snooping and Eavesdropping
The risk of having someone overhear data being sent over the Intranet.
User Impersonation
The risk of having users gain access by pretending to be someone else.
Unauthorized access
The risk of having users obtain access to confidential data.
User Impersonation
The permission to access all the resources on the Intranet must be carefully planned. Once logged in, users activities must be tracked throughout the session.
User Impersonation
Using SSL and secure email services may also protect real-time internal communication.
Tunnels are created in the Internet between Intranet sites such that the Intranet traffic is encapsulated inside the regular IP packets.
The source and destination of encapsulating traffic are the gateways that sit at the access point of Intranet sites. Many techniques provide the tunneling function, such as PPTP, L2TP, L2F, and IPSec tunnel mode. To protect the private information transmitted in the tunnel, security mechanisms must be used. A good combination of both tunneling and security is L2TP/IPSec.
Extranet Technology
Firewalls
A power law appears between the degree of a node and the number of nodes that has the degree, frequency. That means that there exits a relationship between the degree of a node, d, and the frequency f d such as: 0
The relationship between a calculated eigen value , by the connectivity and ranks i that are arranged in ascending order by the eigen value using a close matrix, that if all nodes are connected, it is represented by 1, and if not connected, is expressed by 0 and is known also as a power-law. The eigen value, , and rank, i, have the relationship.
Example: Determine the degree of node 5 in the intranet if the rank of the node is 4 and the power is 3. (Ans. 64)
Waxman Model
Topology Models
Tiers Model
In this model, the three levels of WAN, MAN, and LAN are treated as a basic policy. It has a hierarchical characteristic. At the MAN and LAN levels, all edges are connected through minimum spanning tree calculation. In the case of the WAN level, the network is made randomly.
An algorithm for generating random scale-free networks using a preferential attachment mechanism. Scale-free networks are widely observed in natural and human-made systems, including the Internet, the world wide web, citation networks, and some social networks.
Waxman Model
Used to add the links in a network considering that the distance between the nodes are arranged in random positions on a 2D grid. If we consider the two nodes u and v, the rates of the existing edge between the two nodes are different depending on the distance of the node from the other node.
Intranet/Extranet Applications
Human Resource Intranet
Employee handbook Telephone/email directory Interactive benefits information 401K tracking Employee surveys Recruiting/job listings Candidate screening applications Organizational charts Newsletters New employee training Employee personalized home pages
Resource scheduling
Technical/security polices and procedures Multimedia-based training Intranet FAQs, publishing guides Web paging or communications systems
Intranet/Extranet Applications
Costumers Service Intranet/Extranet
Customer information entry and update Order entry and tracking Online information (databases on customers, inventory, supplies) Problem entry and tracking Customer FAQs
An editor whose job should be only to edit and to create should be involved in the process at an early stage.
A document process and monitoring system should be established. In addition, it is necessary that the company understands the document purpose and team and individual roles. Once the collaborative assignment is completed, the project should be evaluated and a lessons learned list should be developed for future applications. The entire team should be allowed to get involved in the design process so that everyone understands why certain decisions have been made.
Akujuobi, Cajetan, and Matthew Sadiku. "Intranet and Extranet." Introduction to Broadband Communication System. Boca Raton: SciTech Publishing, 2008. "BarabsiAlbert Model." Wikipedia. Wikimedia Foundation, 23 July 2013. Web. 08 Sept. 2013. "Lightweight Directory Access Protocol." Wikipedia. Wikimedia Foundation, 09 July 2013. Web. 08 Sept. 2013.
Resources
"ODBC." Wikipedia. Wikimedia Foundation, 28 Aug. 2013. Web. 08 Sept. 2013. "Secure Socket Layer." Wikipedia. Wikimedia Foundation, 09 July 2013. Web. 08 Sept. 2013.