The Intranet.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
FIREWALLS Chapter 11.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Internet, Intranet and Extranets
CS 898N – Advanced World Wide Web Technologies Lecture 2: Overview of the Internet Chin-Chih Chang
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
A Guide to major network components
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Intranet, Extranet, Firewall. Intranet and Extranet.
CISB113 Fundamentals of Information Systems Telecommunications & Network.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
By Kyle Slinger.  A network is where you can send information to and from different PCs.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
1 Computer Communication & Networks Lecture 28 Application Layer: HTTP & WWW p Waleed Ejaz
Web Page Design I Retest Terms Review. 1. Web pages are created using a language known as ___________. The coding of this language must follow specific.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
IT Infrastructure for Business
Networks QUME 185 Introduction to Computer Applications.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Living Online Module Lesson 23 — Networks and Telecommunication
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Web Server.
Web Services. 2 Internet Collection of physically interconnected computers. Messages decomposed into packets. Packets transmitted from source to destination.
Networks. Local area network (LAN( Wide-area network (WAN( Networks Topology.
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
Introduction to computer networking Objective: To be acquainted with: The definitions of networking Network topology Network peripherals, hardware and.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Information Networks. Internet It is a global system of interconnected computer networks that link several billion devices worldwide. It is an international.
Defining Network Infrastructure and Network Security Lesson 8.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Virtual Private Networks
The Intranet.
Internet, Intranet and Extranets
Ad-blocker circumvention System
Internet and Intranet.
Internet, Intranet and Extranets
Providing Network Services
Internet and Intranet.
Internet, Intranet and Extranets
CS222 Web Programming Course Outline
Unit 4: Data Communication
Department of Computer Science Course : Pre Computer Skills
Internet and Intranet.
AbbottLink™ - IP Address Overview
Presented by: Faisal Mohamed & Mohamed Dabour
Protocol Application TCP/IP Layer Model
Your computer is the client
Internet and Intranet.
Presentation transcript:

The Intranet

What is Intranet? Intranet is : A computer network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software. Accessed only by authorized persons, especially members or employees of the organization The main purpose of an intranet is: To share company information and computing resources among employees.

Usage of Intranet Many companies use intranets for tasks as: Distributing a company newsletter Sharing information For facilitating the workgroups accordingly. Instant knowledge about important news and memos. Relationship building. Increasing productivity. Recommendations and suggestions. Project management.

Intranet Characteristics In general it looks like a private version of the Internet Uses some (TCP/IP,HTTP) or all of the protocols of the internet. Nodes interact in a client server relationship. Nodes are identified by using Internet Protocol (IP) addresses Files are identified by universal resource locators (URLs). The data being exchanged are typically formatted using HTML and is controlled and displayed using a browser. It may consist of many interlinked local area networks.

Intranet Characteristics The users of intranet network may access the Internet via proxy server and firewall server, or it may be totally separate It includes connections through one or more gateway to the outside Internet. With tunneling, companies can send private messages through the public network, using encryption/decryption and other security safeguards to connect one part of their intranet to another. When part of an intranet is made accessible to customers, partners, suppliers, or others outside the company, that part becomes part of an extranet.

Intranet Diagram

Proxy Server Is a server that acts as an intermediary between a workstation user and the Internet . A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network. The enterprise can ensure security, administrative control, and caching service by using a proxy server.

Proxy Server- How it works A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet.

Proxy Server- How it works If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.

Firewall Firewall : A firewall is a set of related programs, located at a network gateway that protects the resources of a private network from users from other networks. Firewall used in an intranet have the ability to screen messages in both directions so that company security is maintained. A firewall surrounding an intranet fends off unauthorized access.

Proxy Server and Firewall

Gateway A gateway is a network point that acts as an entrance to another network. On the Internet, a node can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes.

Gateway In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server. A gateway is often associated with: a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.

Gateway