Chapter13 Networks
Chapter13 Networks
networking cannot be done. This is also known as network adapter card, Ethernet Card and
LAN card.
1. NIC allows a networking device to communicate with the other networking device.
2. NIC converts the data packets between two different data transmission technologies.
3. A NIC converts parallel data stream into the serial data stream and the serial data
stream into the parallel data stream.
A PC uses parallel data transmission technology to transmit the data between its internal parts
while the media that provides connectivity between different PCs uses serial data
transmission technology.
Typically all modern PCs have the integrated NICs in the motherboards. If additional NICs are
required, they are also available as add-on devices separately.
For desktop or server system, they are available in the adapter form which can be plugged
into the available slots of the motherboard. For laptop or other small size devices, they are
available in the PCMCIA (Personal Computer Memory Card International Association) card
form which can be inserted into the PCMCIA slot.
Function
A network card functions as a middleman between your computer and the data
network. For example, when you log in to a website, the PC passes the site
information to the network card, which converts the address into electrical
impulses. Network cables carry these impulses to a Web server somewhere on
the Internet, which responds by sending a Web page back to you, once again in
the form of electronic signals. The card receives these signals and turns them into
data that your PC displays.
Page | 2
Types of NICs
There are two types of NICs.
Media Specific: - LAN card are used according to the media type. Different types of the NICs
are used to connect the different types of media. To connect a specific media type, we must
have to use a NIC which is particularly made for that type of media.
Computer Science [9618 ] By Mr Saem
Network Design Specific: - A specific network design needs a specific LAN card. For example
FDDI, Token Ring and Ethernet have their own distinctive type of NIC cards. They cannot use
other types of NIC cards.
Hub
Hub is a centralized device that connects multiple devices in a single LAN network. When Hub
receives the data signals from a connected device on any of its port, except that port, it
forwards those signals to all other connected devices from the remaining ports. Usually, Hub
has one or more uplink ports that are used to connect it with another Hub.
Active Hub: - It also works same as the passive Hub works. But before forwarding the data
signals, it amplifies them. Due to this added feature, the active Hub is also known as the
repeater.
Computer Science [9618 ] By Mr Saem Page | 4
Hub is used for the Ethernet Network while the MAU is used for the Token ring
network.
Hub creates logically star topology while MAU creates logically ring topology.
Patch panel is used to organize the UTP cables systematically. It doesn't interfere in the data
signals.
Computer Science [9618 ] By Mr Saem Page | 5
Bridge
Bridge is used to divide a large network into smaller segments. Basic functions of the Bridge
are the following: -
A Bridge can connect two different types of media or network architecture, but it cannot
connect two different types of network layer protocol such as TCP/IP or IPX. Bridge requires
the same network layer protocol in all segments.
Page | 6
There are three types of Bridge:-
Local Bridge: - This Bridge connects two LAN segments directly. In Ethernet Implementation,
it is known as the Transparent Bridge. In Token Ring network, it is called the Source-Routed
Bridge.
Computer Science [9618 ] By Mr Saem
Remote Bridge: - This Bridge connects with another Bridge over the WAN link.
Wireless Bridge: - This Bridge connects with another Bridge without using wires. It uses radio
signals for the connectivity.
In OSI Layers /TCP-IP networking models, the functionalities of the Bridges are defined in the
physical layer and data link layer.
Just like Hubs, Bridge no longer used in the computer network. Bridges have been replaced
by the Switches.
m
Page | 7
Switch
Just like Hub and Bridge, Switch is also used to connect the multiple devices together in a LAN
segment. Basically, a Switch is the upgraded version of the Bridge. Besides providing all the
functionalities of Bridge, it also offers several additional features.
The biggest advantage of Switch is that, it makes switching decisions in hardware by using
application specific integrated circuits (ASICs).
Unlike the generic processors that we use in our PC, ASICs are the specialized processors built
only to perform very few particular tasks. Usually, the ASICs in the Switches have single task
and that is the switching the frames as fast as possible.
An ASIC occupied switch performs this task blazingly fast. For example, an entry level Catalyst
Switch 2960 can process 2.7 million frames per second.
Computer Science [9618 ] By Mr Saem Page | 8
Modem
In simple language, a Modem is the device that is used to connect with the Internet.
Technically, it is the device that enables the digital data to be transmitted over the
telecommunication lines.
A Telco company uses entirely different data transmission technology from the technology
that a PC uses for the data transmission. A modem understands both technologies. It changes
the technology that a PC uses, in the technology which Telco Company understands.
It enables communication between the PC (Known as the DTE device) and the Telecom
company' office (Known as the DCE device).
Gateway
Gateway is used to forward the packets which are generated from the local host or network
and but intended for the remote network. If a data packet does not find its destination
address in the local network then it takes the help of the gateway device to find the
Page | 9
destination address in the remote network. A gateway device knows the path of the remote
destination address. If require, it also changes the encapsulation of the packet so it can travel
through the other networks to get its destination address.
Computer Science [9618 ] By Mr Saem
GSNW Gateway: - Allows Windows clients to access resources from the NetWare server.
Router
The router connects the different network segments. It switches the data packets between
those networks which are either located in the different logical segments or built with the
different network layer protocols.
When a router receives a data packet on any of its interface, it checks the destination address
of that packet and based on that destination address, it forwards that data packet from the
interface which is connected with the destination address.
To forward a data packet to its destination, router keeps the records of connected networks.
These records are maintained in a database table known as the routing table. Routing table
can be built statically or dynamically.
Computer Science [9618 ] By Mr Saem Page | 10
Proxy
Proxy is used to hide the internal network from external world. It can be a dedicate device or
can be an application software. Once it is configured, all communication goes through it. Since
external devices cannot access the internal devices directly, they cannot tamper with the
internal devices.
Computer Science [9618 ] By Mr Saem Page | 11
Transceiver
Transceiver is a small device that has the capability of receiving and sending both types of
signals; analog and digital. Usually, it is inbuilt in network interface card. But, it is also available
as an individual device. It detects the type of signal from the network wire and converts the
passing signal accordingly.
For example, a transceiver is attached with a device that transmits signal in digital form. Now
suppose, this device is connected with the network wire that uses analog form for data
transmission. In this case, transceiver converts digital signals in the analog signals before
placing them in the network wire.
That’s all for this tutorial. If you like this tutorial, please don’t forget to share it with friends
through your favorite social network
Page | 12
Types of Computer Network Explained in Easy
Language
This tutorial explains the different types of computer network such as LAN, MAN, WAN, PAN,
CAN, GAN, Internet, internet, Intranet, Extranet, VPN, Client/Server, Workgroup and
HomeGroup in detail. Learn the different types of computer network including their
definitions and characteristics in easy language.
A LAN is a computer network which spans over a small geographical area such as home,
building, office, etc. In LAN, computers are placed relatively close. Since computers are
located within small distance, they do not need special devices and cables to connect with
each other.
Page | 13
MAN (Metropolitan area networks)
A MAN is a computer network which connects two or more LAN networks within same city.
When due to distance connecting two LANs is not possible, MAN network is used. It is larger
than LAN but smaller than WAN. It deploys special devices and cables to connect the LANs.
WAN is a computer network which spans over a large geographical area such as state, region,
country etc. WANs are typically used to connect two or more LANs or MANs which are located
relatively very far from each other. To provide connectivity, this network uses special devices,
cables and technologies.
Above categorization (LAN, MAN and WAN) of computer network is purely based on
geographical location. It has nothing to do with the number of computers in each network.
For example, if one computer is located in Delhi and other computer is located in Mumbai,
connecting these two computers is the example of WAN networking. Just like this, if a
company starts a new branch office with 500 computers and all these computers are installed
within a building, this network will be considered as a LAN network.
There are three more types of computer network based on geographical location but they are
rarely used to define the network. In real life you may skip these but if you preparing for job
interview or for any networking exam, you should learn these also.
Page | 14
PAN (Pearson Area Network)
Same as LAN network, but it is limited to a specific person or location such as home network.
This network is usually setup for sharing resources such as internet and printer within
personal computers.
Same as MAN network, but it is limited to a university or an academy. This network is usually
setup for educational activities such as classroom updates, practices labs, emails, exams,
notifications, polls, etc.
Page | 15
GAN (Global Area Networks)
Same as WAN network, but it covers unlimited geographical area. For example a company
has an office in Delhi and another one Washington D.C., connecting these two offices will be
considered as a GAN network. In other words, GAN is a computer network which connects
two or more WANs. This network is increasingly gaining popularity as many companies are
expending their working area beyond their native countries.
So far, we have discussed the types of computer based on geographical location. In following
section we will understand the types of computer network based on characteristic.
Internet
This is the largest computer network ever created by mankind. It interconnects thousands of
millions of computing devices including PCs, Laptops, Workstations, Server, Smartphones,
tablets, TVs, Webcams, Environmental devices, Automobiles, Security cameras and many
mores. According to a report published in January 2018, there were 2150 million end systems
connected with the Internet. To connect these devices, a lot of technologies and
infrastructure are used. Internet is open for everyone. Anyone can connect with it. Since
anyone can connect with it, it is also considered as the most insecure network.
Page | 16
internet
The internet sounds similar to Internet but it is different. The word Internet starts with
capital I, while the word internet begins with small i. Any group of network which is connected
with external network through a gateway such as BGP is considered as internet. Usually this
type of network is setup to provide the connectivity between two companies.
Intranet
Intranet is a computer network which is controlled and administered by a single entity such
as company or organization. In Intranet, external users are not allowed to connect. Usually in
this network, proper authorization is required to access any resources. Further each access is
monitored and logged to ensure that only authorized users get access.
Extranet
An Extranet is an extended Intranet where external users are allowed to access a small portion
of network. Normally this access is filtered and secured by several security implementations
on both hardware and software levels.
VPN is the cost effective solution to utilize the goodies of Internet. Companies which can’t
afford their own infrastructure for connectivity can use VPN. VPN provides a secure
connection over the Internet. For example a company has two offices; one in Delhi and other
in Mumbai. Now suppose, company can’t afford a dedicate line to connect these two offices.
In this case company can use VPN to connect both offices. VPN creates a secure line over the
Internet and uses it for data transmission.
Page | 17
Client/Server Network
In this network, a dedicate computer known as server provides sharing resources. All other
computers know as clients are used to access the shared resources. This type of network is
commonly used in company environment. It provides great security features but requires
special hardware and software to setup.
Workgroup Network
In this network, all computers are equal. Any computer can provide and access shared
resources. This type of network is usually used in small office or home network. It is easy to
Page | 18
setup and does not require any special hardware and software. The downside of this network
is that it provides very less security.
That’s all for this tutorial. For any suggestion, feedback or comment about this tutorial, please
mail me. I really love to listen from you. If you like this tutorial, please share it with friends.
Stateless firewalls have packet-filtering capabilities but cannot make more complex decisions
on what stage communications between hosts have reached. Stateless firewalls therefore
offer less security. Stateless firewalls somewhat resemble a router in their ability to filter
packets.
Any normal computer running an operating system which supports packet filtering and
routing can function as a network layer firewall. Appropriate operating systems for such a
configuration include Linux, Solaris, BSDs or Windows Server.
Page | 19
Authentication
The process of identifying an individual, usually based on a username and password. In
security systems, authentication is distinct from authorization , which is the process of giving
individuals access to system objects based on their identity. Authentication merely ensures
that the individual is who he or she claims to be, but says nothing about the access rights of
the individual.
Encryption
Encryption is part of a larger process of encoding and decoding messages to keep information
secure. This process, though commonly called encryption, is more correctly called
cryptography, is the use of mathematical transformations to protect data. Cryptography is
primarily a software-based solution and, in most cases, should not include significant
hardware costs. It is a key tool in protecting privacy as it allows only authorized parties to
view the data. Encryption is also used to ensure data integrity, as it protects data from being
modified or corrupted.
Routers, or layer 3 devices, provide this boundary function. Each of these subnets requires a
unique network number. And to move from one network number to another, you need a
router. In the case of broadcast domains and switches, each of these separate broadcast
domains is a separate VLAN; therefore, you still need a routing function to move traffic
between different VLANs.
Extranets
An extranet is a private network that uses Internet protocols, network connectivity, to
securely share part of an organization's information or operations with suppliers, vendors,
partners, customers or other businesses. An extranet can be viewed as part of a company's
Intranet that is extended to users outside the company normally over the Internet. An
extranet requires security and privacy. These can include firewalls, server management, the
issuance and use of digital certificates or similar means of user authentication, encryption of
messages, and the use of virtual private networks (VPNs) that tunnel through the public
network.
Page | 20
Advantages
Extranets can improve organization productivity by automating processes that were previously done
manually.
Extranets allow organization or project information to be viewed at times convenient for business
partners, customers, employees, suppliers and other stake-holders.
Information on an extranet can be updated, edited and changed instantly. All authorised users
therefore have immediate access to the most up-to-date information.
Disadvantages
Intranet
Intranets differ from "Extranets" in that the former is generally restricted to employees of the
organization while extranets can generally be accessed by customers, suppliers, or other
approved parties. An intranet is a private computer network that uses Internet protocols,
network connectivity, to securely share part of an organization's information or operations
with its employees. Sometimes the term refers only to the most visible service, the internal
website. The same concepts and technologies of the Internet such as clients and servers
running on the Internet protocol suite are used to build an intranet. HTTP and other Internet
protocols are commonly used as well, especially FTP and e-mail.
Antivirus Software.
Antivirus software consists of computer programs that attempt to identify, thwart and
eliminate computer viruses and other malicious software. Antivirus software typically uses
two different techniques to accomplish this:
Examining files to look for known viruses matching definitions in a virus dictionary
Identifying suspicious behavior from any computer program which might indicate infection. Such
analysis may include data captures, port monitoring and other methods.
Most commercial antivirus software uses both of these approaches, with an emphasis on the
virus dictionary approach.
Dictionary Approach:
When the antivirus software looks at a file, it refers to a dictionary of known viruses that the
authors of the antivirus software have identified. If a piece of code in the file matches any
virus identified in the dictionary, then the antivirus software can take one of the following
actions:
attempt to repair the file by removing the virus itself from the file
quarantine the file
delete the infected file.
Page | 21
Suspicious Behavior Approach:
Unlike the dictionary approach, the suspicious behavior approach therefore provides
protection against brand-new viruses that do not yet exist in any virus dictionaries. Most
antivirus software are not using this approach much today. Using this approach the antivirus
software:
Analysis Approach:
Antivirus software could try to emulate the beginning of the code of each new executable that the
system invokes before transferring control to that executable.
If the program seems to use self-modifying code or otherwise appears as a virus, one could assume
that a virus has infected the executable. However, this method could result in a lot of false positives.
Fault Tolerance:
Fault tolerance is the ability of a system to continue functioning when part of the system fails.
Normally, fault tolerance is used in describing disk subsystems, but it can also apply to other
parts of the system or the entire system. Fully fault-tolerant systems use redundant disk
controllers and power supplies as well as fault-tolerant disk subsystems. You can also use an
uninterruptible power supply (UPS) to safeguard against local power failure. Although the
data is always available in a fault-tolerant system, you still need to make backups that are
stored offsite to protect the data against disasters such as a fire.
Network Redundancy
Service interruptions on a network are not always the result of a computer or drive failure.
Sometimes the network itself is to blame. For this reason, many larger internetworks are
designed with redundant components that enable traffic to reach a given destination in more
than one way. If a network cable is cut or broken, or if a router or switch fails, redundant
equipment enables data to take another path to its destination. There are several ways to
provide redundant paths. Typically, you have at least two routers or switches connected to
each network, so that the computers can use either one as a gateway to the other segments.
Example, you can build a network with two backbones. Each workstation can use either of
the routers on its local segment as a gateway. You can also use this arrangement to balance
the traffic on the two backbones by configuring half of the computers on each local area
network (LAN) to use one of the routers as its default gateway and the other half to use the
other router.
Page | 22
Disaster recovery
Fault Tolerance
Most people think about disaster recovery in terms of restoration of the damaged network,
but it’s actually less expensive to prevent a disaster than to restore one.
Fault tolerance is another term for redundancy. You can have redundant components within
a server, redundant servers, and even redundant networks, in the case of a hot site. A fault-
tolerant system simply has a spare part that takes over if another part fails. Fault tolerance
can work for the following:
Memory
Some servers support error-correcting memory with a spare memory module to use in case
of memory failure.
RAID 1:
Mirroring disks connected to a single hard disk controller, or duplexing disks connected to
two different hard disk controllers.
RAID 5:
A group of three or more disks is combined into a volume with the disk striped across the
disks, and parity is used to ensure that if any one of the disks fails, the remaining disks will
still have all data available.
Power supplies.
One power supply takes over if the original fails.
Page | 23
Clusters.
Two or more servers are grouped to provide services as if the group were a single server. A
cluster is transparent to end users. Usually, a server member of a cluster can take over for a
failed partner with no impact on the network.
Backup / restore
Offsite storage
A remote backup service, online backup service or managed backup service is a service that
provides users with an online system for backing up and storing computer files. Managed
backup providers are companies that have the software and server space for storing files.
A hot spare disk is running, ready to start working in the case of a failure.
A cold spare disk is not running.
Hot Site is a duplicate of the original site of the business, with full computer systems as well
as near-complete backups of user data. Following a disaster, the hot site exists so that the
business can relocate with minimal losses to normal operations. Ideally, a hot site will be up
and running within a matter of hours. This type of backup site is the most expensive to
operate.
Warm Site is a location where the business can relocate to after the disaster that is already
stocked with computer hardware similar to that of the original site, but does not contain
backed up copies of data and information.
Page | 24
Cold Site is the most inexpensive type of backup site for a business to operate. It does not
include backed up copies of data and information from the its original location, nor does it
include hardware already set up. The lack of hardware contributes to the minimal startup
costs of the cold site, but requires additional time following the disaster to have the operation
running at a capacity close to that prior to the disaster.
Security protocols protect a computer from attacks. To understand how security protocols
work, you must first understand what types of attacks they protect against. Networks and
data are vulnerable to both active attacks, in which information is altered or destroyed, and
passive attacks, in which information is monitored. Attacks that you might encounter include
the following:
Altering data
This active attack takes place when data is interrupted in transit and modified before it
reaches its destination, or when stored data is altered. This passive attack takes advantage of
network traffic that is transmitted across the wire in clear text. The attacker simply uses a
device that monitors traffic and "listens in" to discover information. You'll hear this term
referred to as sniffing the wire, and sometimes as snooping.
IP address spoofing
One way to authenticate data is to check the IP address in data packets. If the IP address is
valid, that data is allowed to pass into the private network. IP address spoofing is the process
of changing the IP address so that data packets will be accepted. IP address spoofing can be
used to modify or delete data, or to perpetuate an additional type of attack.
Password pilfering
A hacker will obtain user IDs and passwords, or even encryption keys, to gain access to
network data, which can then be altered, deleted, or even used to create another attack. This
type of attack is usually done by asking unsuspecting users, reading sticky notes containing
passwords that are posted next to computers, or sniffing the wire for password information.
Sometimes a hacker will attempt to get hired at a company merely to obtain an ID and
password with access rights to the network.
Denial of service
This active attack is intended to cause full or partial network outages so that people will not
be able to use network resources and productivity will be affected. The attacker floods so
many packets through the network or through specific resources that other users can't access
those resources. The denial-of-service attack can also serve as a diversion while the hacker
alters information or damages systems.
Page | 25
Virus
A virus is an attack on a system. It is a piece of software code that is buried inside a trusted
application (or even an e-mail message) that invokes some action to wreak havoc on the
computer or other network resources.
Access control Password pilfering Protects sensitive data from access by the average user
Encryption Data alteration Prevents the content of the packets from being tampered
with
Firewalls Denial of service (as When configured correctly, can prevent many denial-of-
well as others) service attacks
Public key Spoofing Ensures that data received is from correct sender
infrastructure
Code Virus and other code Protects the computer from altered executables
authentication attacks
Password Password pilfering Ensures that passwords are difficult to guess or otherwise
policies decipher
Transport mode encrypts only the data portion of each packet, but leaves the header
untouched.
The more secure Tunnel mode encrypts both the header and the data portion.
For IPsec to work, the sending and receiving devices must share a public key. This is
accomplished through a protocol known as Internet Security Association and Key
Management Protocol/Oakley, which allows the receiver to obtain a public key and
authenticate the sender using digital certificates. IPsec protocols operate at the network
layer, layer 3 of the OSI model. Other Internet security protocols in widespread use, such as
Page | 26
SSL and TLS, operate from the transport layer up (OSI layers 4 - 7). This makes IPsec more
flexible, as it can be used for protecting both TCP and UDP based protocols
802.11x
IEEE 802.11 also known by the brand Wi-Fi, denotes a set of Wireless LAN/WLAN standards
developed by working group 11 of the IEEE LAN/MAN Standards Committee (IEEE 802). The
term 802.11x is also used to denote this set of standards and is not to be mistaken for any
one of its elements. There is no single 802.11x standard.
Computer networking is one of the most complex subjects. Describing all of its topics requires
an encyclopedia. Learning and understanding all these topics at the primary stage are neither
required nor recommended. It is just like learning the vocabulary from the dictionary. Unless
you know what you need to know, you would not learn what you should learn.
Page | 27
I have already explained the definition, purpose and benefits of the computer networking in
the following article.
In this tutorial, I will discuss two essential topics that you should learn at the elementary level.
Understanding these topics will set the foundation for the rest of your studies.
End devices
An end device is the device that sends or receives the data or service in the network. An end
device might be a PC, Laptop, Smartphone or any other device that is capable of the sending
and receiving data the data and connected with the network. To build a network, at least two
end devices are required.
Broadly end devices are categorized in two types; server end device and client end device.
Server end device is the device which provides data or service. Client end device is the device
which receives the offered data or service from the server end device.
Media
The media provides connectivity between the end devices. Unless end devices are connected
through the any kind of media, they cannot exchange the data or service. Mainly there are
two types of media; Wireless media and wired media.
In wireless media, radio signals are used to transfer the data between end devices, whereas
in wired media, the data is transferred through cables.
Both media types are further classified into several subtypes. Subtypes are categorized based
on the various factors such as length, data transfer speed, used metal, frequency band, etc.
Subtypes are defined as the media standards. Two common media standards are the Ethernet
and the IEEE802.11 or Wi-Fi standards.
The Ethernet defines the standards for the wired media. The IEEE802.11 or Wi-Fi defines the
standards for the wireless media.
Protocols
Protocols enable communication between two or more end devices. A protocol is a set of
predefined rules that specifies standards for a particular stage or all stages of the
communication.
Two popular networking models; OSI Reference model and TCP/IP model describe the
functionalities of the most common protocols. Both models divide the entire communication
process in logical layers. Further, they explain how the protocols work in each layer to enable
the communication process.
Networking device
A networking device works between the end devices. It controls and forwards the flow of
data. Based on the functionalities, a networking device can be categorized in three types;
forwarding device, connecting device and the securing device.
A forwarding device forwards the data. This device usually has multiple ports which are used
to connect more than two end devices in a single network. Hub, bridge and Ethernet switch
provide this functionality.
A connecting device connects two or more different types of media and protocols. If two end
devices are located in the different logical networks or connected through the different types
of media, they need a connecting device to exchange the data. Router and Multilayer switch
provide this functionality.
A securing device secures the data from unauthorized access. When data packet arrives to it,
based on pre-defined rules it performs security checks and takes the forwarding decision.
Common devices which provide this functionality are the Firewall and NAT.
Cabling depends on
Often used across the types of
Hybrid Mesh long distances. Often created when Connection devices Troubleshooting is networks.
Information transfer expanding an make combining most difficult in this Expensive, large, Can use twisted pair
Combines two or more can happen in existing network. different networks topology because of and usually and coaxial cable.
different structures. different ways, Can use a variety of and different the variety of complicated. Also incorporates
depending on the connection devices. topologies easy. technologies. fiber optic cabling
other topologies. over long distances.
www.mrsaem.com |
Ring Network Topology Bus Network Topology
www.mrsaem.com |
Tree Network Topology
Extranet
An intranet that allows customers, vendors or other partners to access resources or information is called an extranet. Most companies
extend their intranets into extranets when they see the benefits of giving customers and vendors quick access to current information.
For example, companies that once relied on regular mail-outs can now make the same information available via an extranet to save
printing and postage costs.
What is Extranet?
is an intranet for outside authorized users using same internet technologies. The
outside users are trusted partners of the organization who have access to
information of their interest & concern.
It extends the intranet concept to provide a network that connects a company‟s
network to the networks of its business partners, selected customers, or suppliers.
www.mrsaem.com |
How it is different from Intranets?
Intranets differ from extranet in that the former are generally restricted to employees of the organization while extranets may also be
accessed by customers, suppliers, or other approved parties. Extranets extend a private network onto the Internet with special
provisions for access, authorization and authentication.
Types of Extranet
Public Network Extranet
Exists when an organization allows the public to access its intranet from any public network. Security is an issue in this
configuration, because a public network does not provide any security protection.
www.mrsaem.com |
Virtual Private Network (VPN)
The technologies used in Intranet and Internet may be same but the main difference between them is that the information shared in
intranet can be access only by authorized persons especially members or employees of the organization or company where as in
internet the information is shared world wide with any public user to explain in simple terms, intranet is private, within the organization
while internet is public available for global access requirement. Thus, Intranet is like a private Internet.
www.mrsaem.com |
Benefits of intranets
Workforce productivity:
Intranets can help users to locate and view information faster and use app. relevant to their roles and responsibilities. With
the help of a web browser interface, users can access data held in any database the organization wants to make available, anytime and
- subject to security provisions – from anywhere within the company workstations, increasing employees' ability to perform their jobs
faster, more accurately, and with confidence that they have the right information. It also helps to improve the services provided to the
users.
Time:
With intranets, organizations can make more information available to employees on a "pull" basis (i.e., employees can link
to relevant information at a time which suits them) rather than being deluged indiscriminately by emails.
Communication:
Intranets can serve as powerful tools for communication within an organization, vertically and horizontally. From a
communications standpoint, intranets are useful to communicate strategic initiatives that have a global reach throughout the
organization. The type of information that can easily be conveyed is the purpose of the initiative and what the initiative is aiming to
achieve, who is driving the initiative, results achieved to date, and who to speak to for more information. By providing this information on
the intranet, staff has the opportunity to keep up-to-date with the strategic focus of the organization.
Cost-effective:
Most organizations have already established TCP/IP networks, and the incremental infrastructure cost of adding Web
servers to the network is well within even departmental-level budgets. Users can view information and data via web-browser rather than
maintaining physical documents such as procedure manuals, internal phone list and requisition forms.
Low maintenance
With information residing in only one place - the Web server - it is relatively easy and affordable to add new information or
to update existing information and make it instantly available.
information without any physical connection, i.e. fiber optics, copper wires, phone lines, etc.
www.mrsaem.com |