Você está na página 1de 26

Intranet and Extranet

Group 6 LEGASPI, OBRA, TAN

Intranet Overview
EXAMPLES

An Intranet is a privately maintained, secure computer network based on the communication standards of the Internet.
It is a smaller version of the Internet that only the internal members of an organization can see.

At the same time it is available remotely over the Internet allowing access from any physical location.
Intranet is an IP-based system, which means the whole set of higher-level protocols above TCP/IP could be applied in Intranet without modification.

What does Intranet do?


Information publishing: using the Intranet to deliver news and other information in the form of directories and web documents. Training: using the Intranet to deliver training at the desktop. Workflow: using the Intranet to automate administrative processes. Databases and other bespoke systems: using the Intranet as a front-end to organization-specific system, such as corporate databases.

Email: implementing an email system that integrates seamlessly with the Intranet, allowing information to be both pushed and pulled.
Document management: using the Intranet to allow users to view, print, and work collaboratively on office documents (word-processed documents, spreadsheets, presentations, etc.).

Discussion: using the Intranet as a means for users to discuss and debate issues.

Intranets use HTML to create documents and TCP/IP to transmit information across the network. Information is stored on one or more company servers and accessed by using a web browser, such as Navigator or Internet Explorer. This self-contained, miniature Internet can have all the same featuresindividual home pages, newsgroups, emailbut access is restricted to company employees and contractors.

How do Intranets do it?

Extranet Overview
An Extranet is a private network that uses Internet protocols and the public telecommunication system to securely share part of a businesss information or operations with suppliers, vendors, partners, customers, or other businesses.

Extranet brings benefits to not only a single organization, but also to its partners, clients, and suppliers. It allows the organization to improve the communication channels, share up-to-date business information with partners, clients, or suppliers, and integrate the business processes.

Configuration of Extranet
Whereas an Intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an Extranet provides various levels of accessibility to outsiders. You can access an Extranet only if you have a valid username and password, and your identity determines which parts of the Extranet you can view.

Web Server HTML Developer Browser

Security

Intranet Technology

VPN Content Management System

Web Server

The major appearance of an Intranet is the web-base platform that connects employees and business partners. The web server is obviously the fundamental technology to run the Intranet.

HTML Development
WYSIWYG (What You See Is What You Get)
These tools allow the nontechnical user to create sites without the knowledge of HTML code (for example, Microsoft Front Page).

HTML Editors
For the more advanced user who knows HTML and wants to have more control of the page structure.

The company may decide to purchase licensing for both types of tools and roll them out according to skill level. It should be noted that these types of tools are slowly converging into one.

Browser

If the organization wants to open its Intranet to the partners and vendors (Extranet), support for both browsers is required, because the administrator has no control over the partners network.

Security
Common Threats Snooping and Eavesdropping
The risk of having someone overhear data being sent over the Intranet.

User Impersonation
The risk of having users gain access by pretending to be someone else.

Unauthorized access
The risk of having users obtain access to confidential data.

Techniques User Authentication


An LDAP or ODBC compliant central database could be used to store the use authentication information. Passwords must be maintained and updated periodically. Digital signature is another choice for both authentication and data encryption.

User Impersonation
The permission to access all the resources on the Intranet must be carefully planned. Once logged in, users activities must be tracked throughout the session.

User Impersonation
Using SSL and secure email services may also protect real-time internal communication.

VPN Virtual Private Network


Uses public Internet as the transfer infrastructure.

Tunnels are created in the Internet between Intranet sites such that the Intranet traffic is encapsulated inside the regular IP packets.
The source and destination of encapsulating traffic are the gateways that sit at the access point of Intranet sites. Many techniques provide the tunneling function, such as PPTP, L2TP, L2F, and IPSec tunnel mode. To protect the private information transmitted in the tunnel, security mechanisms must be used. A good combination of both tunneling and security is L2TP/IPSec.

Content Management System


Document check-in/check-out Versioning Content approval workflow Open-standards database and template creation Database management and file system management Dynamic page generation Link management Document conversion User-friendly content authoring Personalization Access control or built-in security Usage analysis

Web Internet Groupware Applications

Extranet Technology

Firewalls

PowerLaw Rule for Intranets and Extranets


The relationship between the degrees of the nodes and the ranks of the nodes when arranged by degrees. It means that there exists a relationship between the degree dn of a node n in the Intranet or the Extranet and the rank of a node rn. R is the power of the node rank rn.

A power law appears between the degree of a node and the number of nodes that has the degree, frequency. That means that there exits a relationship between the degree of a node, d, and the frequency f d such as: 0

PowerLaw Rule for Intranets and Extranets

The relationship between a calculated eigen value , by the connectivity and ranks i that are arranged in ascending order by the eigen value using a close matrix, that if all nodes are connected, it is represented by 1, and if not connected, is expressed by 0 and is known also as a power-law. The eigen value, , and rank, i, have the relationship.
Example: Determine the degree of node 5 in the intranet if the rank of the node is 4 and the power is 3. (Ans. 64)

Tiers Model Transit Stub Model Barabasi Albert Model

Waxman Model

Topology Models

Tiers Model

In this model, the three levels of WAN, MAN, and LAN are treated as a basic policy. It has a hierarchical characteristic. At the MAN and LAN levels, all edges are connected through minimum spanning tree calculation. In the case of the WAN level, the network is made randomly.

Transit Stub Model


Through a random method, each node of the Intranet/Extranet makes whole transit area graph. In the graph, each node is substituted with another connected random graph, which stands for a backbone topology in a transit area. In the transit area, each node makes several random graphs that stand for the attached stub area. In the pair of nodes, edges are added. There are two kinds of graph involved here. One of those graphs is connected between transit area and stub area. The second graph is connected between one stub area and another.

Barabasi Albert Mode

An algorithm for generating random scale-free networks using a preferential attachment mechanism. Scale-free networks are widely observed in natural and human-made systems, including the Internet, the world wide web, citation networks, and some social networks.

Waxman Model

Used to add the links in a network considering that the distance between the nodes are arranged in random positions on a 2D grid. If we consider the two nodes u and v, the rates of the existing edge between the two nodes are different depending on the distance of the node from the other node.

Intranet/Extranet Applications
Human Resource Intranet
Employee handbook Telephone/email directory Interactive benefits information 401K tracking Employee surveys Recruiting/job listings Candidate screening applications Organizational charts Newsletters New employee training Employee personalized home pages

Sales and Marketing Intranet/Extranet


Product demos and scripts Pricing charts Sales forecasts and reports Sales contact management Sales lead management Market research/search engines Sales feedback Prospecting Press releases Sales team collaboration Calendars Sales multimedia training Competitor research

Information Systems Intranet


Software and applications development and delivery User documentation Technical support and help desk Network management Information and knowledge repositories Internet resources

Resource scheduling
Technical/security polices and procedures Multimedia-based training Intranet FAQs, publishing guides Web paging or communications systems

Intranet/Extranet Applications
Costumers Service Intranet/Extranet
Customer information entry and update Order entry and tracking Online information (databases on customers, inventory, supplies) Problem entry and tracking Customer FAQs

Information Systems Intranet

Accounts payable/receivable support


Payroll Intranet commerce, requisitioning system Financial reports Policies and procedures Budgeting Asset management Expense reports Unit reporting and forecasting

Intranet and Extranet Design Issues


Intranet and Extranet Design Process
You have to design appropriate retrieval aids for your materials.

Intranet and Extranet Design Analysis


What are your goals why you need to create the Intranet and /or Extranet? Is it possible for this Intranet/Extranet to make the jobs in your organization much easier? What kind of problems are your employees experiencing in their jobs? Do the users in your organization need the current documentation in the same way? Does the information help users meet their true goals?

Efforts must be made to analyze information and user needs.


Information must be re-engineered for effective use online.

Intranet and Extranet Design Issues


Design Standards
Templates should be created for use in cases where there may be similar information. The company should get together as one and then create a set of design standards.

An editor whose job should be only to edit and to create should be involved in the process at an early stage.
A document process and monitoring system should be established. In addition, it is necessary that the company understands the document purpose and team and individual roles. Once the collaborative assignment is completed, the project should be evaluated and a lessons learned list should be developed for future applications. The entire team should be allowed to get involved in the design process so that everyone understands why certain decisions have been made.

Akujuobi, Cajetan, and Matthew Sadiku. "Intranet and Extranet." Introduction to Broadband Communication System. Boca Raton: SciTech Publishing, 2008. "BarabsiAlbert Model." Wikipedia. Wikimedia Foundation, 23 July 2013. Web. 08 Sept. 2013. "Lightweight Directory Access Protocol." Wikipedia. Wikimedia Foundation, 09 July 2013. Web. 08 Sept. 2013.

Resources

"ODBC." Wikipedia. Wikimedia Foundation, 28 Aug. 2013. Web. 08 Sept. 2013. "Secure Socket Layer." Wikipedia. Wikimedia Foundation, 09 July 2013. Web. 08 Sept. 2013.

Você também pode gostar