Report Intranet and Extranet
-
Upload
chris-jomarie-obra -
Category
Documents
-
view
235 -
download
0
Transcript of Report Intranet and Extranet
-
8/13/2019 Report Intranet and Extranet
1/26
Intranet and ExtranetGroup 6LEGASPI, OBRA, TAN
-
8/13/2019 Report Intranet and Extranet
2/26
Intranet Overview An Intranet is a privately maintained, sec
computer network based on the comm
standards of the Internet.
It is a smaller version of the Internet that ointernal members of an organization can
At the same time it is available remotelyInternet allowing access from any physiclocation.
Intranet is an IP-based system, which mewhole set of higher-level protocols abovcould be applied in Intranet without mo
EXAMPLES
-
8/13/2019 Report Intranet and Extranet
3/26
What does Intranet do?
Information publishing: using the Intranetto deliver news and other information inthe form of directories and webdocuments.
Email: implementing an email system thatintegrates seamlessly with the Intranet,allowing information to be both pushed
and pulled. Document management: using the
Intranet to allow users to view, print, andwork collaboratively on office documents(word-processed documents,spreadsheets, presentations, etc.).
Training: using the Intranet totraining at the desktop.
Workflow: using the Intranet administrative processes.
Databases and other bespok
using the Intranet as a front-organization-specific systemcorporate databases.
Discussion: using the Intranefor users to discuss and deba
-
8/13/2019 Report Intranet and Extranet
4/26
How do Intranetsdo it?
Intranets use HTML to create doand TCP/IP to transmit informati
the network.Information is stored on one or mcompany servers and accesseda web browser, such as NavigaInternet Explorer.
This self-contained, miniature Inthave all the same featuresind
home pages, newsgroups, emaaccess is restricted to companyemployees and contractors.
-
8/13/2019 Report Intranet and Extranet
5/26
Extranet Overview
An Extranet is a private network that uses Internetprotocols and the public telecommunicationsystem to securely share part of a businesssinformation or operations with suppliers, vendors,partners, customers, or other businesses.
Extranet brings benonly a single organalso to its partners, suppliers. It allows torganization to impcommunication chup-to-date busineswith partners, clien
suppliers, and integbusiness processes
-
8/13/2019 Report Intranet and Extranet
6/26
Configuration of Extranet
Whereas an Intranet resides behind a firewall and is accessible only to people who are members of theor organization, an Extranet provides various levels of accessibility to outsiders. You can access an Extrahave a valid username and password, and your identity determines which parts of the Extranet you ca
-
8/13/2019 Report Intranet and Extranet
7/26
Intranet Technology
Web Server
HTML Developer
Browser
Security
VPN
Content Management System
-
8/13/2019 Report Intranet and Extranet
8/26
Web Server
The major appearance of anIntranet is the web-baseplatform that connectsemployees and businesspartners.
The web server is obviously thefundamental technology to runthe Intranet.
-
8/13/2019 Report Intranet and Extranet
9/26
HTML Development
WYSIWYG (What You See Is What You Get)
These tools allow the nontechnical user tocreate sites without the knowledge ofHTML code (for example, Microsoft FrontPage).
HTML Editors
For the more advanced userHTML and wants to have mothe page structure.
The company may decide to purchase licensing for both types of tools anout according to skill level. It should be noted that these types of tools are slowinto one.
-
8/13/2019 Report Intranet and Extranet
10/26
Browser
If the organization wants toopen its Intranet to thepartners and vendors(Extranet), support for both
browsers is required, becausethe administrator has nocontrol over the partnersnetwork.
-
8/13/2019 Report Intranet and Extranet
11/26
Security
Snooping and Eavesdropping
The risk of having someoneoverhear data being sentover the Intranet.
User Impersonation The risk of having users gain
access by pretending to besomeone else.
Unauthoriz The risk of ha
obtain acceconfidential
Common Threats
Techniques
User Authentication
An LDAP or ODBC compliant centraldatabase could be used to store theuse authentication information.Passwords must be maintained andupdated periodically. Digital signatureis another choice for both
authentication and data encryption.
User Impersonation
The permission to access allthe resources on the Intranetmust be carefully planned.Once logged in, usersactivities must be trackedthroughout the session.
User Impe
Using SSL anservices mayreal-time intcommunica
-
8/13/2019 Report Intranet and Extranet
12/26
VPN Virtual Private Network
Uses public Internet as the transfer infrastructure.
Tunnels are created in the Internet between Intranet sites such that the Intranencapsulated inside the regular IP packets.
The source and destination of encapsulating traffic are the gateways that sit point of Intranet sites.
Many techniques provide the tunneling function, such as PPTP, L2TP, L2F, andmode. To protect the private information transmitted in the tunnel, security mmust be used.
A good combination of both tunneling and security is L2TP/IPSec.
-
8/13/2019 Report Intranet and Extranet
13/26
Content Management System
Document check-in/check-out
Versioning
Content approval workflow
Open-standards database and templatecreation
Database management and file systemmanagement
Dynamic page generation
Link management
Document conversion
User-friendly content authoring
Personalization
Access control or built-in securit
Usage analysis
-
8/13/2019 Report Intranet and Extranet
14/26
-
8/13/2019 Report Intranet and Extranet
15/26
PowerLaw Rule for Intranets and Ext
The relationship between the degrees of the nodes and the ranks of the nodarranged by degrees.
It means that there exists a relationship between the degree dnof a node n ior the Extranet and the rank of a nodern. R is the power of the node rankrn.
A power law appears between the degree of a node and the number of nothe degree, frequency. That means that there exits a relationship between tha node, d, and the frequency f d such as:
0
-
8/13/2019 Report Intranet and Extranet
16/26
PowerLaw Rule for Intranets and Ext
The relationship between a calculated eigen value , by the connectivity anare arranged in ascending order by the eigen value using a close matrix, thaare connected, it is represented by 1, and if not connected, is expressed bknown also as a power-law. The eigen value, , and rank, i, have the relation
Example: Determine the degree of node 5 in the intranet if the rank of the no
the power is 3. (Ans. 64)
-
8/13/2019 Report Intranet and Extranet
17/26
Topology Models
Tiers Model
TransitStub Model
BarabasiAlbert Model
Waxman Model
-
8/13/2019 Report Intranet and Extranet
18/26
Tiers Model
In this model, the three levels of WAN,MAN, and LAN are treated as a basicpolicy. It has a hierarchicalcharacteristic. At the MAN and LANlevels, all edges are connectedthrough minimum spanning treecalculation. In the case of the WANlevel, the network is made randomly.
-
8/13/2019 Report Intranet and Extranet
19/26
Transit Stub Model
Through a random method, each Intranet/Extranet makes whole tran
In the graph, each node is substituanother connected random graphfor a backbone topology in a tran
In the transit area, each node mak
random graphs that stand for the aarea.
In the pair of nodes, edges are adtwo kinds of graph involved here. Ographs is connected between transtub area. The second graph is cobetween one stub area and anoth
-
8/13/2019 Report Intranet and Extranet
20/26
Barabasi Albert Mode
An algorithm for generatingrandom scale-free networks usinga preferential attachment mechanism.Scale-free networks are widely observedin natural and human-made systems,
including the Internet, the world wideweb, citation networks, and some socialnetworks.
-
8/13/2019 Report Intranet and Extranet
21/26
Waxman Model
Used to add the links in a network considering that the distance between thearranged in random positions on a 2D grid.
If we consider the two nodes u and v, the rates of the existing edge betweennodes are different depending on the distance of the node from the other no
-
8/13/2019 Report Intranet and Extranet
22/26
Intranet/Extranet Applications
Human Resource Intranet Employee handbook
Telephone/email directory
Interactive benefits information
401K tracking
Employee surveys
Recruiting/job listings
Candidate screening applications
Organizational charts
Newsletters
New employee training
Employee personalized home pages
InformatioIntra
Software and appdevelopment an
User documentat
Technical suppor
Network manage
Information and k
repositories
Internet resources
Resource schedu
Technical/securitprocedures
Multimedia-based
Intranet FAQs, pu
Web paging or c
systems
Sales and MarketingIntranet/Extranet
Product demos and scripts
Pricing charts
Sales forecasts and reports
Sales contact management
Sales lead management
Market research/search engines
Sales feedback
Prospecting
Press releases
Sales team collaboration
Calendars
Sales multimedia training
Competitor research
-
8/13/2019 Report Intranet and Extranet
23/26
-
8/13/2019 Report Intranet and Extranet
24/26
Intranet and Extranet Design Issues
Intranet and Extranet Design Process
You have to design appropriate retrievalaids for your materials.
Efforts must be made to analyzeinformation and user needs.
Information must be re-engineered foreffective use online.
Intranet and Extranet Desig What are your goals why you
create the Intranet and /or Ex
Is it possible for this Intranet/Exmake the jobs in your organizaeasier?
What kind of problems are yo
experiencing in their jobs? Do the users in your organizati
current documentation in the
Does the information help usetrue goals?
-
8/13/2019 Report Intranet and Extranet
25/26
Intranet and Extranet Design Issues
Design Standards
Templates should be created for use in cases where there may be similar informat
The company should get together as one and then create a set of design standa
An editor whose job should be only to edit and to create should be involved in than early stage.
A document process and monitoring system should be established. In addition, it
that the company understands the document purpose and team and individual
Once the collaborative assignment is completed, the project should be evaluatelessons learned list should be developed for future applications.
The entire team should be allowed to get involved in the design process so that eunderstands why certain decisions have been made.
-
8/13/2019 Report Intranet and Extranet
26/26
Resources
Akujuobi, Cajetan, and Matthew"Intranet and Extranet." IntroducBroadband Communication SysRaton: SciTech Publishing, 2008.
"BarabsiAlbert Model." Wikipe
Wikimedia Foundation, 23 July 208 Sept. 2013.
"Lightweight Directory AccessProtocol." Wikipedia. WikimediaFoundation, 09 July 2013. Web. 2013.
"ODBC." Wikipedia. Wikimedia
Foundation, 28 Aug. 2013. Web2013.
"Secure Socket Layer." WikipediWikimedia Foundation, 09 July 208 Sept. 2013.