Você está na página 1de 111

Internetwork

An Internetwork is the connection of two or more distinct


computer networks or network segments via a common routing
technology.

The result is called an internetwork (often shortened to internet).

Two or more networks or network segments connect using


devices that operate at layer 3 (the 'network' layer) of the OSI
Basic Reference Model, such as a router.

Any interconnection among or between public, private,


commercial, industrial, or governmental networks may also be
defined as an internetwork.
cont...
In modern practice, interconnected networks use the Internet
Protocol. There are at least three variants of internetworks,
depending on who administers and who participates in them:

* Intranet
* Extranet
* Internet
Intranets and extranets may or may not have connections to the
Internet.
If connected to the Internet, the intranet or extranet is normally
protected from being accessed from the Internet without proper
authorization.

The Internet is not considered to be a part of the intranet or


extranet, although it may serve as a portal for access to portions of
an extranet.
Intranet
An intranet is a set of networks, using the Internet Protocol and IP-
based tools such as web browsers and file transfer applications,
that is under the control of a single administrative entity.

That administrative entity closes the intranet to all but specific,


authorized users.

Most commonly, an intranet is the internal network of an


organization.

A large intranet will typically have at least one web server to


provide users with organizational information.
Extranet
An extranet is a network or internetwork that is limited in scope to a
single organization or entity and also has limited connections to the
networks of one or more other usually, but not necessarily, trusted
organizations or entities

(e.g., a company's customers may be given access to some part of its


intranet creating in this way an extranet, while at the same time the customers
may not be considered 'trusted' from a security standpoint).

Technically, an extranet may also be categorized as a CAN, MAN,


WAN, or other type of network, although, by definition, an extranet
cannot consist of a single LAN; it must have at least one
connection with an external network.
The Internet consists of
Internet
a worldwide interconnection of
governmental, academic, public, and private networks based upon
the networking technologies of the Internet Protocol Suite.

It is the successor of the Advanced Research Projects Agency


Network (ARPANET) developed by DARPA of the U.S.
Department of Defense.

The Internet is also the communications backbone underlying the


World Wide Web (WWW).

Participants in the Internet use a diverse array of methods of


several hundred documented, and often standardized, protocols
compatible with the Internet Protocol Suite and an addressing
system (IP Addresses) administered by the Internet Assigned
Numbers Authority and address registries.

Service providers and large enterprises exchange information


about the reachability of their address spaces through the Border
Gateway Protocol (BGP), forming a redundant worldwide mesh of
transmission paths.
Intranet
An intranet is a private computer network that uses
Internet Protocol technologies to securely share any part
of an organization's information or operational systems
within that organization.

Sometimes the term refers only to the organization's
internal website, but may be a more extensive part of the
organization's information technology infrastructure.

The term is used in contrast to internet, a network between
organizations, and instead refers to a network within an
organization.

It may host multiple private websites and constitute an
important component and focal point of internal
communication and collaboration.
Characteristics of Intranet
An intranet is built from the same concepts and technologies used
for the Internet, such as client-server computing and the Internet
Protocol Suite (TCP/IP).

An intranet can be understood as a private version of the Internet,


or as a private extension of the Internet confined to an
organization.

An organization's intranet does not necessarily have to provide


access to the Internet.

When such access is provided it is usually through a network


gateway with a firewall, shielding the intranet from unauthorized
external access.

The gateway often also implements user authentication,


encryption of messages, and often virtual private network (VPN)
connectivity for off-site employees to access company information,
Uses of Intranet
Workforce productivity: Intranets can also help users to locate and
view information faster and use applications relevant to their roles
and responsibilities.

Time: With intranets, organizations can make more information


available to employees on a "pull" basis.

Communication: Intranets can serve as powerful tools for


communication within an organization, vertically and horizontally.

Web publishing allows cumbersome corporate knowledge to be


maintained and easily accessed throughout the company using
hypermedia and Web technologies.
Uses of Intranet-cont...
Enhance Collaboration: With information easily accessible by all
authorised users, teamwork is enabled.

Immediate Updates: When dealing with the public in any capacity,


laws/specifications/parameters can change. With an Intranet and
providing your audience with "live" changes, they are never out of
date, which can limit a company's liability.

Cost-effective: Users can view information and data via web-


browser rather than maintaining physical documents such as
procedure manuals, internal phone list and requisition forms.

Promote common corporate culture: Every user is viewing the


same information within the Intranet.
The purpose and goals of the intranet.
Planning and creation
Persons or departments responsible for implementation and
management.

Functional plans, information architecture, page layouts, design.

Implementation schedules and phase-out of existing systems.

Defining and implementing security of the intranet.

How to ensure it is within legal boundaries and other constraints.


 Securing senior management support and funding.
Steps-implementation of Intranet
 Business requirements analysis.

 User involvement to identify users' information needs.

 Installation of web server and user access network.

 Installing required user applications on computers.

 Creation of document framework for the content to be hosted.

 User involvement in testing and promoting use of intranet.


Types of networks

Personal area network

A personal area network (PAN) is a computer network used for


communication among computer devices close to one person.
Some examples of devices that are used in a PAN are personal
computers, printers, fax machines, telephones, PDAs, scanners,
and even video game consoles. Such a PAN may include wired
and wireless connections between devices. The reach of a PAN is
typically at least about 20-30 feet (approximately 6-9 meters), but
this is expected to increase with technology improvements.
Local area network

A local Area Network (LAN) is a computer network covering a


small physical area, like a home, office, or small group of buildings,
such as a school, or an airport. Current wired LANs are most likely
to be based on Ethernet technology, although new standards like
ITU-T G.hn also provide a way to create a wired LAN using
existing home wires (coaxial cables, phone lines and power lines).
The defining characteristics of LANs, in contrast to WANs (Wide
Area Networks), include their higher data transfer rates, smaller
geographic range, and lack of a need for leased
telecommunication lines. Current Ethernet or other IEEE 802.3
LAN technologies operate at speeds up to 10 Gbit/s. This is the
data transfer rate. IEEE has projects investigating the
standardization of 40 and 100 Gbit/s.
Metropolitan area network

A metropolitan area network (MAN) is a network


that connects two or more local area networks or
campus area networks together but does not
extend beyond the boundaries of the immediate
town/city. Routers, switches and hubs are
connected to create a metropolitan area network.
Wide area network

A wide area network (WAN) is a computer network that covers a broad


area (i.e. any network whose communications links cross metropolitan,
regional, or national boundaries [1]). Less formally, a WAN is a network
that uses routers and public communications links. Contrast with
personal area networks (PANs), local area networks (LANs), campus
area networks (CANs), or metropolitan area networks (MANs), which are
usually limited to a room, building, campus or specific metropolitan area
(e.g., a city) respectively. The largest and most well-known example of a
WAN is the Internet. A WAN is a data communications network that
covers a relatively broad geographic area (i.e. one city to another and
one country to another country) and that often uses transmission facilities
provided by common carriers, such as telephone companies. WAN
technologies generally function at the lower three layers of the OSI
reference model: the physical layer, the data link layer, and the network
layer.
Virtual private network

A virtual private network (VPN) is a computer network in which some of the links
between nodes are carried by open connections or virtual circuits in some larger
network (e.g., the Internet) instead of by physical wires. The data link layer
protocols of the virtual network are said to be tunneled through the larger
network when this is the case. One common application is secure
communications through the public Internet, but a VPN need not have explicit
security features, such as authentication or content encryption. VPNs, for
example, can be used to separate the traffic of different user communities over
an underlying network with strong security features.

A VPN may have best-effort performance, or may have a defined service level
agreement (SLA) between the VPN customer and the VPN service provider.
Generally, a VPN has a topology more complex than point-to-point.

A VPN allows computer users to appear to be editing from an IP address


location other than the one which connects the actual computer to the Internet.
There is statistical evidence that electronic publishing provides wider
dissemination.[2] A number of journals have, while retaining their peer review
process, established electronic versions or even moved entirely to electronic
publication.

Electronic publishing is increasingly popular in works of fiction as well as with


scientific articles. Electronic publishers are able to provide quick gratification for
late-night readers, books that customers might not be able to find in standard
book retailers (erotica is especially popular in eBook format[citation needed]),
and books by new authors that would be unlikely to be profitable for traditional
publishers.

While the term "electronic publishing" is primarily used today to refer to the
current offerings of online and web-based publishers, the term has a history of
being used to describe the development of new forms of production, distribution,
and user interaction in regard to computer-based production of text and other
interactive media.
E-Publishing
Definition


Publishing – the activity of making information
available for public view


E-publishing, short for Electronic publishing refers to a
type of publishing that does not include print media


Online publishing on the net, CD and other handheld
electronic readers
Electronic publishing or ePublishing includes the digital publication of e-books
and electronic articles, and the development of digital libraries and catalogues.

Electronic publishing has become common in scientific publishing where it has


been argued that peer-reviewed paper scientific journals are in the process of
being replaced by electronic publishing.

Although distribution via the Internet (also known as online publishing or web
publishing when in the form of a website) is nowadays strongly associated with
electronic publishing, there are many non network electronic publications such
as Encyclopedias on CD and DVD, as well as technical and reference
publications relied on by mobile users and others without reliable and high
speed access to a network.

While the term "electronic publishing" is primarily used today to refer to the
current offerings of online and web-based publishers, the term has a history of
being used to describe the development of new forms of production, distribution,
and user interaction in regard to computer-based production of text and other
interactive media.
Advantages


Low investment by publisher


Faster publishing time


Multimedia support provides enhanced reading experience


Linking and navigating over related documents is easier


Greater flexibility


Electronic storage helps easy archiving and retrieval
Parties involved


Authors


Publishers
 Content Management
 Production
 Distribution and Marketing


End users
Print business model
E-publishing business model
Mark-up language and Authoring


Metadata and mark up language


Authoring
 creating or writing an electronic document using a mark-up
language
 combining all media components
 enabling links and cross references
 CD ROM, Web pages
What is meta- Data

Metadata describes other data.
It provides information about a certain item's
content.

For example, an image may include
metadata that describes how large the
picture is, the color depth, the image
resolution, when the image was created, and
other data.

A text document's meta data may contain
information about how long the document is,
who the author is, when the document was
written, and a short summary of the
document.
Markup language

Markup languages are designed for the processing,
definition and presentation of text.

The language specifies code for formatting, both the
layout and style, within a text file.

The code used to specify the formatting are called tags.


HTML is a an example of a widely known and used markup


language.
A markup language is a system for annotating a text in a

way which is syntactically distinguishable from that text.


Examples include revision instructions by editors, traditionally
written with a blue pencil on authors' manuscripts, typesetting
instructions such those found in troff and LaTeX, and structural
markers such as XML tags. Markup is typically omitted from the
version of the text which is displayed for end-user consumption.
Authoring Systems

Authoring Systems are related to Authoring


Languages.
An Authoring Language is the programming
language that is behind the Authoring System,
available for the programmer who is also
developing educational software.
This programmer can take advantage of the tools
built into the Authoring System (easy graphics
placement, color, animations, etc.) and then fine
tune the product by accessing the language
behind it.
Authoring Tool

An authoring tool is a software package which developers


use to create and package content deliverable to end users.

Though authoring tools have a range of uses, they are


commonly used to create e-learning modules. These modules
are generally written to conform to some international
standard, such as SCORM (Shareable Content Object
Reference Model) or AICC (CBT) (Aviation Industry CBT
Committee).CBT

Distribution of content created with authoring tools also


varies. Distribution methods include: web, kiosk, interactive
CD-ROM, and executable file.
E-publishing workflow
E-publishing workflow

Publishing Firm Author


Research
Content review,
Acquisitions Assess market
Develop Projects etc.

Presentation,
Editing Organization,
Format, style etc.

Book Design
Design Editing Cover design etc.

Typesetting
Media Preparation
Production Printing
Binding

Marketing Sales, Distribution


Billing etc.
E-publishing workflow

Publishing Firm
Author
Editors

Copy Editing
Typesetting Pagination
Artwork management
Editorial & QC

Deliverables PDF & XML

Printing & Binding

Sales, Distribution
Warehousing Billing etc.
Avenues of E-publishing


Web publishing
 electronic version of the content
 free/paid content can be accessed


E-book
 electronic version of a book
 a hardware device used to read books in digital
format
E-publishing in India


Countries such as US, UK and other European nations outsource
publishing work to India


Indian E-publishing industry requires 400 professionals a month


Around 100 global companies outsourcing their work to India –
Elsevier Science, OUP, CUP, Pearson, Wiley Blackwell,
Springer Business & Science Media, to name a few


Visible growth in last 15 years
Advantage India
Supplier Criteria
E-publishing in India – contd.


Various E-publishing verticals
 STM
 Non STM –legal, financial
 Academic
 Magazines

Huge market untapped in the above areas

High quality and cost effective services in India

Ability to work at different time zones (24x7)

E-publishing industry growing at 25%
Career opportunities


Post graduates and Doctorates for content editing


Quality control staff


Graphics and multimedia specialists


Programmers for software support


Foreign language experts
Qualities of E-publishing staff

Eye for detail


Quality consciousness


Language skills


Basic computer skills
SWOT analysis

Strengths Opportunities

Early mover advantage Multinational alliances


India Brand Time zone advantage (24x7)
Low cost Skilled resources

Weaknesses Threats

Poor infrastructure Competition from Far east countries


Future of E-publishing


Future is definitely online, however print media will
remain

Online access is unstoppable

Newer channels of distribution

50% of magazine and newspaper content will be
delivered electronically

Open access

Digital libraries
Remember this…

Our propensity
Quotable quote for printing our
intellectual output onto wood pulp
persists. However the growing popularity
of Internet and digital delivery will go a
long way in making E-publishing an
integral part of knowledge distribution

Chas Jones, Financial Times


E-Mail
E-mail

Electronic message sent from one device to another


Computer to computer, mobile to mobile and other
portable devices


E-mail travels over internet till it reaches final
destination

Paperless communication
E-mail advantages

E-mails can be delivered instantly

Unlike snail mail, e-mails can be delivered at any time

Convenient and no restriction on size of message

Messages can be sent to multiple users at the same time

Less expensive compared to conventional mailing

Can attach other files with just a click

Less personal

E-mails are not secure
 E-mail
Messages could disadvantages
be misinterpreted

Can provide an easy way to spread viruses to
computers

Access to computer and internet

Mail box clogging becomes annoying to user
E-mail address

E-mail address contains two parts

User name and domain name

User name refers to recipient's mail box

Domain name refers to the host or the mail server,
usually the name of a company or organization
 .com, .edu, .gov, .org etc.

Web address never contains an @ sign unlike
e-mail address
E-mail anatomy

Similar to a letter with two main parts


Header
 Name and e-mail address of the recipient
 Name and address of anyone who is copied
 Subject of the message


Body
 Contains the message itself
E-mail terminology


User Agent: end-user mail program


Message Transfer Agent: responsible for
communicating with remote hosts and
transmitting/receiving email (both a client and server).


Mail Exchanger: host that takes care of email for a
domain.

Protocol E-mail terminology (contd.)

 A set of rules and procedures for exchanging information


between computers

 A standard that defines how data transmission is handled by


computers and network routers
SMTP

Used to exchange mail messages between mail servers (Message


Transfer Agents).

SMTP SMTP
MTA
MTA MTA MTA
MTA MTA

File
File
System
System

UA
UA
UA
UA
SMTP


Simple Mail Transfer Protocol

Text based protocol

Push protocol and cannot be used to pull messages from
the server

Performs two functions:
 Verifies configuration and sends message to the specified
destination
 Tracks to see whether delivered or not

ESMTP – used for graphics and attachments
POP

Used to transfer mail from a mail server to a UA.

POP
Mail
Mail
Server
Server UA
UA

File
File
System
System
POP

 Short for Post Office protocol.


 Pull protocol unlike SMTP
 Used to retrieve/download messages from server to your
personal computer
 No live internet connection is needed to download
messages
 Less storage space – one server for many clients
SPAM

SPAM is a unsolicited junk mail

Transmission of unwanted e-mails across the net

Ways to fight spam:
 Laws against spam and spammers
 Don’t post your address in public domains
 Spam filters and Anti-spam software
 Don’t respond to spam
 Use multiple e-mail accounts

Clearly summarize your message in the subject line

Keep your messages short and focused

Start your mail E-mail etiquettes
with salutations

Include your name at the bottom of message

Avoid using all capital letters, bold and italics

Use “cc” and “reply all” buttons carefully

Use “bcc” option when people in the mailing group
don’t know each other

E-mail makes numerous stops along the route to final
destination

It can be intercepted
How privateat each stop e-mail
is your

No law for e-mail privacy, little protection

Tips for privacy
 Don’t send confidential information
 Use encryption software
 Use firewall to secure your computer from hacking
TELNET
Telecommunication Network

 Network protocol used on the Internet or LAN


 Provides access to a command-line interface on a
remote machine.
Ex: User might "telnet in from home to check his mail at office"
Security


Does not encrypt any data sent over the connection


No authentication on data between the two hosts and can
be intercepted in the middle

Telnet is popular:
IBM Mainframes (Railway)
FTP
File Transfer Protocol

 Transfer data from one computer to another through a


network

 Used for uploading and downloading files

 Commercial & free FTP software programs available


Eg: WS_Ftp, Bulletproof ftp

 Browser-based free FTP programs available


Eg: IE, Mozilla
View of the FTP
Connecting to an FTP site

Information needed to connect to an FTP Site:


 "server address" or "hostname" - ftp.microsoft.com
 Username and Password
Gopher
Gopher

 Distributed document search and retrieval network


protocol designed for the Internet

 Gopher combines document hierarchies with


collections of services

Origin
 The original Gopher system was released in 1991 by
Mark McCahill
Gopher ceased expanding

In February 1993, the University of Minnesota announced


that it would charge licensing fees for the use of its
implementation
World Wide Web
By: Tim Berners-Lee
WWW

 Hypertext documents accessed via the browser

 Can view text, images, videos, and multimedia

 Navigate between pages using hyperlinks

 WWW enables the spread of information over the


Internet through an easy-to-use and flexible format
How it works

 Viewing Web page on WWW begins by the URL

 The URL is resolved into IP address using DNS (domain


name system)
 Browser renders the page onto the screen as specified
by its HTML, CSS, and other Web languages

 Caching reduces the Web traffic on the Internet


Rendering/1st WWW server
<html>
<head>
<body>
<p><b>HELLO WORLD</b><br>
<i>HELLO WORLD</i></p>
</body>
</head>
</html>
W3C

Standards
They work as per World Wide Web Consortium (W3C)
standard

Famous web sites


Google, YAHOO, MSN, eBay…

Interactive web sites


Scripts were used to make websites interactive (Form
filling/Card payments)
Digital library
Digital Library

 A digital library is a library in which collections are stored in


digital formats (old news paper, books, records)

 Digital content may be stored locally, or accessed remotely


via computer networks

 Can be converted to easily readable format with multimedia


The future

 Large scale digitization projects are underway at


Google, the Million Book Project

 With continued improvements in book handling and


presentation technologies such as optical character
recognition and ebooks, and development of alternative
depositories and business models, digital libraries are
rapidly growing in popularity

 Digitalization is a huge potential market for India


UseNet News
Usenet News


Usenet, a portmanteau of "user" and "network "


World-wide distributed Internet discussion system


It was conceived by Duke University graduate students


Usenet resembles bulletin board systems
Usenet News


Like various web forums


Hybrid between Email and web forums


Discussions are threaded


Posts stored on the server sequentially (newsfeeds)
Future of Usenet News

Today, Usenet has diminished in importance with respect


to Internet forums, blogs, mailing lists and RSS
feeds(Really Simple Syndication)
Chat
Chat


Kind of communication over the Internet


Real time communication between two users via computer


Once a chat has been initiated, either user can enter text by
typing


Most networks and online services offer a chat feature
Chatting
Advancements in Chat

WebEX (travel less meet online)


Video Conferencing


Desktop Sharing


Windows live


Online gaming
Benefits

Quick questions and clarifications


Coordinating and scheduling tasks


Coordinating impromptu social meetings


Keeping in touch with friends and family


Cost effective
Risks

Security risks (e.g. used to infect computers with
spyware, viruses, trojans, worms)


Compliance risks


Inappropriate use


Intellectual property leakage
B2B Integration
Objectives


Enables focus on its core competencies and offload other
services to partners


Gain efficiencies and reduce cost


Operate in a global business environment


Building e-business integration initiatives
B2B Integration Software


CRM (customer relationship management)


SAP (software application programming)


ERP (enterprise resource planning)


Business-to-business (B2B) integration represents a
significant area of opportunity for using technology
Advantages


Secure execution of transactions over the internet


Streamline inter-enterprise processes


Access your back-end systems to your partners' systems


Manage a large and diverse community of trading partners
with minimal overhead
Corporate Information Sharing
CIS

Old: Information is gathered by accessing various database
systems individually, calling key information specialists and
manually collating relevant information


New: Master data is available in database and various
tools are available to extract information as required by each
CIS

Links databases within the Service for information sharing


Share with partners and external clients


Ready access and manipulation of the data


Faster decision


Earlier: The concept of data being shared was not a part of
culture nor has data sharing been a standard business
practice in the Service
Database Marketing
Database marketing


Direct marketing using databases of customers or potential
customers (credit card)


Generate personalized communications to promote a product or
service


Analyze statistical techniques to develop models of customer
behavior
Database marketing


Database marketers have much data available about customers


For larger companies with millions of customers, such data
warehouses can often be multiple terabytes in size (coke)


The distinction between direct and database marketing stems
primarily from the attention paid to the analysis of data


Tend to be heavy users of data warehouses
Techniques

Customers in b2b environments often tend to be loyal since they
need after-sales-service for their products and appreciate
information on product upgrades and service offerings


This loyalty can be tracked by a database


CRM systems use the stored data not only for direct marketing
purposes but to manage the complete relationship with individual
customer contacts and to develop more customized product and
service offerings


Combination of CRM, content management and business
intelligence tools deliver personalized information readily
Personal Policies
Personal Policies


Corporate policies such as the customer is always right


Help make tough decisions


Consistent and express the organization's philosophy


Determine the values you want to protect


Determine the image you want to project


Put your statements in writing and post them
Quality Policies

Quality and feedback Management



ISO 9000 - International Organization for Standardization

 Quality Policies
Six Sigma - Business management strategy
Identify and remove the causes of defects. Uses a set of
quality management methods, statistical methods, and creates a special
infrastructure of people within the organization ("Black Belts“) who are
experts in these methods (lean sigma)


CMMI - Capability Maturity Model Integration
Provides organizations with the essential elements of effective
processes (models) for improvement

BS 7799 - British standards
Information security management system
TQM – 5W1H

What is the problem ?


Where does it occur ?


Whose responsibility ?


Why it occurs ?


When does it occur ?


 How to arrest ?
Example


What is the problem? My suitcase is too heavy

Where is it happening? At the airport

When is it happening? In the evening, coming
back from France

Why is it happening? Because I have bought wine at
the duty free shop

How can you overcome this problem? Get the wine
shipped

Who do you need to get involved? Winery (the duty free
shop) will do it for me

When will you know you have solved the problem? When it
arrives at home

Você também pode gostar