ITM Networking and Communication 1
ITM Networking and Communication 1
Communication
Network Fundamentals
Internet, Intranet and Extranet
Chapter 7 (Text Book)
Are Networks really required?
• Technology the root of all problems
• Access data
• Improved Communication capabilities
• Supply chain –
• Organization, Logistics, warehouse, customers, suppliers and 3PL
• Products and information
• Organization
• Human resources, Finance, R&D, Marketing, Manufacturing and sales
positions
• Social Media
Networks in the real world
• Banks and Retail organizations – • Telemedicines
mobile payment apps and systems • Government
• • National Health Portal (NHP)
Paypal
• National Digital Health Authority of India
• Walmart pay (NDHAI)
• Amazon Pay • National e-health authority (NeHA)
• Apple Pay • AROGYASREE - An initiative of Indian
Council of Medical Research (ICMR)
• Online Education
• Coursera • Private
• Narayana Hrudayalaya
• Khan Academy
• Apollo Telemedicine Enterprises
• Harvard • Asia Heart Foundation
• MIT • Escorts Heart Institute
• Yale • Amrita Institute of Medical Sciences
• Aravind Eye Care.
What are networks?
• In information technology, a network is defined as the
connection of at least two computer systems, either by a cable
or a wireless connection.
• A network is a group of two or more computers or other
electronic devices that are interconnected for the purpose of
exchanging data and sharing resources.
• A computer network consists of communication media, devices
and software connecting 2 or more computer systems and
devices.
Why use computer networks?
• Efficient data transfer
• Networking enables every form of digital communication, including
email, messaging, file sharing, video calls and streaming.
• Networking connects all the servers, interfaces and transmission
media that make business communication possible.
• More data storage
• Without networking, organizations would have to store data in
individual data repositories, which is unsustainable in the age
of big data.
• Computer networks help teams keep centralized data stores that
serve the entire network, freeing up valuable storage capacity for
other tasks.
Why use computer networks?
• Streamlined knowledge sharing
• Users, network administrators and developers alike stand to benefit from
how networking simplifies resource and knowledge sharing.
• Networked data is easier to request and fetch, so users and clients get
faster responses from network devices.
• And for those on the business side, networked data makes it easier for
teams to collaborate and share information as technologies and
enterprises evolve.
• Stronger network security
• Not only are well-built networking solutions more resilient, but they also
offer businesses more options for cybersecurity and network security.
• Most network providers offer built-in encryption protocols and access
controls (such as multifactor authentication) to protect sensitive data and
keep bad actors off the network.
Networking components and devices
• IP address:
• An IP address is the unique number assigned to every network device in an Internet Protocol
(IP) network
• Each IP address identifies the device’s host network and its location on the network.
• Nodes:
• A node is a network connection point that can receive, send, create or store data.
• It’s essentially any network device—computers, printers, modems, bridges or switches—that
can recognize, process and transmit information to another network node.
• Each node requires some form of identification (such an IP or MAC address) to receive
access to the network.
• Routers:
• A router is a physical or virtual device that sends data “packets” between networks.
• Routers analyze the data within packets to determine the best transmission path and use
sophisticated routing algorithms to forward data packets until they reach their destination
node.
Networking components and devices
• Ports:
• A port indicates a specific connection between network devices, with each port
identified by a number.
• If an IP address is analogous to a hotel address, then ports are the suites and
room numbers.
• Computers use port numbers to determine which application, service or
process should receive which messages.
• Gateways:
• Gateways are hardware devices that facilitate communication between two
different networks.
• Routers, firewalls and other gateway devices use rate converters, protocol
translators and other technologies to make inter-network communication
possible between otherwise incompatible devices.
Networking components and devices
• Switches:
• A switch is a device that connects network devices and manages node-
to-node communication across a network, making sure that data
packets reach their intended destination.
• Unlike routers, which send information between networks, switches
send information between nodes within a network.
• Networks rely on three main types of switching:
• Circuit switching
• Message switching
• Packet switching
Circuit switching
• It establishes a dedicated
data communication path
between nodes in a
network, so no other traffic
can traverse the same
path.
• Circuit switching sees to it
that full bandwidth is
available during every
transmission
Message Switching
• It sends whole messages
from the source node to
the destination node, with
the message traveling
from switch to switch until
it reaches the destination.
Packet Switching
• It involves breaking down
data into independent
components to make data
transmission less
demanding of network
resources.
• With packet switching,
packets—instead of entire
data streams—travel
through the network to
their end destination.
Circuit Switching Message Switching Packet Switching
A dedicated communication path In message switching, the entire Data is divided into smaller
(circuit) is established between message is sent to a node packets, which are sent
two endpoints for the duration of (intermediate device) before independently through the
the entire communication being forwarded to the next network and reassembled at the
session. node, eventually reaching the destination.
destination.
Consistent and predictable More efficient use of network Efficient use of bandwidth as
performance because the path is resources compared to circuit packets can take different routes
dedicated. switching because the entire and network paths.
path doesn’t need to be
dedicated.
Low latency once the circuit is Good for handling large More robust and resilient to
established. messages or data. network failures because if one
path is down, packets can be
rerouted.
Inefficient use of resources High latency due to the store- Potential for variable delays
because the circuit remains and-forward nature. (latency) due to different paths
reserved even when no data is taken by packets.
being transmitted.
Time is required to set up and Messages might be delayed if Requires complex protocols to
tear down the connection. intermediate nodes are busy. ensure proper ordering and error
handling.
Channel Bandwidth
• The capacity of a communications channel to carry traffic.
• Measured, usually, in Megabits per second (Mbps) i.e. 1 million
bits per second.
• Higher the bandwidth capability to carry more traffic i.e.,
capability to carry more communications simultaneously
• It does not refer to speed of communication.
• During higher traffic, some packets of data gets discarded and re-
transmitted later, degrading the performance of the network.
Network Latency
• It refers to the measurement of how long it takes for a into of data to
get to its destination and back again.
• It depends on :
• the distance between the sender and the receiver
• The transmission medium being used
• Number and speed of intermediate switches and/or routers
• Measured in milliseconds (ms) or thousandth of a second
• Low latency networks
• Networks connections with small delays
• Eg: 4G network – 60ms
• High latency networks
• Networks connections with long delays
• Datellite network – 800ms
Types of Networks
• Based on Geographical area
• Local area network (LAN)
• A LAN connects computers over a relatively short distance, such as those within an office building,
school or hospital. LANs are typically privately owned and managed.
• Wide area network (WAN)
• As the name implies, a WAN connects computers across large geographical areas, such as regions and
continents. WANs often have collective or distributed ownership models for network management
purposes. Cloud networks serve as one example, since they’re hosted and delivered by public and
private cloud infrastructures across the globe.
• A software-defined wide area network (SD-WAN) is a virtualized WAN architecture that uses SDN
principles to centralize the management of disconnected WAN networks and optimize network
performance.
• Metropolitan area network (MAN)
• MANs are larger than LANs but smaller than WANs. Cities and government entities typically own and
manage MANs.
• Personal area network (PAN)
• A PAN serves one person. If a user has multiple devices from the same manufacturer (an iPhone and a
MacBook, for instance), it’s likely they've set up a PAN that shares and syncs content—text messages,
emails, photos and more—across devices.
Types of Networks
• Based on Transmission medium
• Wired networks
• Wired network devices are connected by physical wires and cables, including copper wires and Ethernet, twisted
pair, coaxial or fiber optic cables. Network size and speed requirements typically dictate the choice of cable, the
arrangement of network elements and the physical distance between devices.
• Wireless networks
• Wireless networks forgo cables for infrared, radio or electromagnetic wave transmission across wireless devices
with built-in antennae and sensors.
• Based on Communication type
• Multipoint networks
• In a multipoint network, multiple devices share channel capacity and network links.
• Point-to-point networks
• Network devices establish a direct node-to-node link to transmit data.
• Broadcast networks
• On broadcast networks, several interested “parties” (devices) can receive one-way transmissions from a single
sending device. Television stations are a great example of broadcast networks.
• Virtual private networks (VPNs)
• A VPN is a secure, point-to-point connection between two network endpoints. It establishes an encrypted
channel that keeps a user’s identity and access credentials, as well as any data transferred, inaccessible to
hackers.
Network topology
• Network topology refers to the arrangement of different elements
like nodes, links, or devices in a computer network.
• It defines how these components are connected and interact with
each other.
• Network topology describes the physical and logical arrangement of
nodes and links on a network, including all hardware (routers,
switches, cables), software (apps and operating systems) and
transmission media (wired or wireless connections).
• Understanding various types of network topologies helps in
designing efficient and robust networks.
• Common types include bus, star, ring, mesh, and tree topologies,
each with its own advantages and disadvantages.
Network topology
• Point to Point Topology
• Point-to-Point Topology is a type
of topology that works on the
functionality of the sender and
receiver.
• It is the simplest communication
between two nodes, in which one
is the sender and the other one
is the receiver.
• Point-to-Point provides high
bandwidth.
Network topology
Advantages of Point-to- Disadvantages of Point-to-
Point Topology Point Topology
• P2P networks are highly efficient as • P2P networks are not scalable as adding
they allow for direct communication new devices requires establishing a
between two devices without any separate link between each new device
intermediate devices or network and the existing network, which can be
components. time-consuming and expensive.
• P2P networks can be difficult to maintain
• P2P networks are relatively more
as each device has to be managed
secure than other topologies as they separately.
do not rely on intermediate devices
that can be compromised or • P2P networks do not provide
attacked. redundancy, which can be a problem if a
link fails or a device goes offline. with a
• P2P networks are easy to configure dedicated communication connection
and require minimal management or between two systems.
administration.
Network Topology
• Daisy Chain Topology
• The daisy chain topology
connects nodes along a chain
of connections.
• Data is transported from one
node to the next until it
reaches its intended
destination.
• There are two types of daisy
chain network topologies:
linear daisy chains and ring
daisy chains.
Network topology
Advantages of Daisy Chain Disadvantages of Daisy
Topology Chain Topology
• Easy to create and • It provide slow data
maintain transmission.
• Less cable usage • Easy failure, particularly in
• Cost-Effective linear daisy chain
topologies
• Every nodes needs two
transmitters and two
receivers for successful
data transmission.
Network topology
• Star Topology
• All the devices are connected to a single
hub through a cable.
• This hub is the central node and all other
nodes are connected to the central node.
• The hub can be passive in nature i.e., not
an intelligent hub such as broadcasting
devices, at the same time the hub can
be intelligent known as an active hub.
• Active hubs have repeaters in them.
• In Star Topology, many popular Ethernet
LAN protocols are used as CD(Collision
Detection), CSMA (Carrier Sense Multiple
Access), etc.
Network topology
Advantages Disadvantages
• If N devices are connected to each other • If the concentrator (hub) on
in a star topology, then the number of
cables required to connect them is N. which the whole topology
So, it is easy to set up. relies fails, the whole
• Each device requires only 1 port i.e. to system will crash down.
connect to the hub, therefore the total
number of ports required is N. • The cost of installation is
• It is Robust. If one link fails only that link
will affect and not other than that.
high.
• Easy to fault identification and fault • Performance is based on
isolation.
the single concentrator i.e.
• Star topology is cost-effective as it uses
inexpensive coaxial cable. hub.
Network topology
• Mesh Topology
• In a mesh topology, every
device is connected to another
device via a particular channel.
• Every device is connected to
another via dedicated channels.
These channels are known as
links.
• The protocols used are AHCP
(Ad Hoc Configuration
Protocols), DHCP (Dynamic Host
Configuration Protocol), etc.
Mesh topology
• Full mesh topology
• Every network node connects to every other network node,
providing the highest level of network resilience.
• These can be expensive and time-consuming to run, which is
why they’re often reserved for networks that require high
redundancy.
• Partial Mesh topology
• In a partial mesh topology, only some network nodes connect,
typically those that exchange data most frequently.
• Partial mesh, on the other hand, provides less redundancy but
is more cost-effective and simpler to run.
Network topology
• Mesh Topology
• Suppose, the N number of devices are connected with each
other in a mesh topology,
• The total number of ports that are required by each device is
N-1.
• The total number of ports required in a mesh topology = N *
(N-1).
• The total number of dedicated links required to connect them
is
N
C 2 i.e. N(N-1)/2.
• If there are 5 devices connected to each other, then the total
number of links required is 5*4/2 = 10.
Network topology
Advantages of Mesh Disadvantages of Mesh
Topology Topology
• Communication is very fast • Installation and
between the nodes. configuration are difficult.
• Mesh Topology is robust. • The cost of cables is high
• The fault is diagnosed easily. as bulk wiring is required,
Data is reliable because data hence suitable for less
is transferred among the
number of devices.
devices through dedicated
channels or links. • The cost of maintenance
• Provides security and privacy. is high.
Network topology
• Bus Topology is a network type in
which every computer and network
device is connected to a single cable.
• It is bi-directional.
• It is a multi-point connection and a non-
robust topology because if the backbone
fails the topology crashes.
• In Bus Topology, various MAC (Media
Access Control) protocols are followed
by LAN ethernet connections like TDMA ,
Pure Aloha , CDMA, Slotted Aloha , etc.
Network topology
Disadvantages of Bus
Advantages of Bus Topology Topology
• If N devices are connected to each • A bus topology is quite simpler, but
other in a bus topology, then the still, it requires a lot of cabling.
number of cables required to • If the common cable fails, then the
connect them is 1, known as whole system will crash down.
backbone cable, and N drop lines • If the network traffic is heavy, it
are required. increases collisions in the network. To
• Coaxial or twisted pair cables are avoid this, various protocols are used
mainly used in bus-based networks in the MAC layer known as Pure
that support up to 10 Mbps. Aloha, Slotted Aloha, CSMA/CD, etc.
• The cost of the cable is less • Adding new devices to the network
compared to other topologies, but would slow down networks.
it is used to build small networks. • Security is very low.
Network topology
• Ring Topology
• All the nodes in a Ring Topology are
connected in a closed circle of cable.
• Messages that are transmitted travel around
the ring unit they are addressed to, the
signal being refreshed by each node.
• In a ring network, every device has exactly
two neighbors for communication purposes.
• The most common access method of ring
topology is token passing.
• Token: It is a frame that circulates around the
network.
• Token passing: It is a network access method in
which a token is passed from one node to
another node.
Network topology
Advantages of Ring Disadvantages of Ring
Topology Topology
• The data transmission is • The failure of a single node in
high-speed. the network can cause the
entire network to fail.
• The possibility of collision
is minimum in this type of • Troubleshooting is difficult in
this topology.
topology.
• The addition of stations in
• Cheap to install and between or the removal of
expand. stations can disturb the whole
• It is less costly than a star topology.
topology. • Less secure.
Network topology
• Tree Topology
• In tree topology nodes are connected in a
hierarchical structure to form a tree.
• There is a root node in tree topology and
the remaining nodes are considered as
child (or leaf) nodes, basically it is a
combination of star and bus topology.
• The central bus works as a communication
pathway, and each star-configured
network represents a level in the tree.
• In tree topology, a hierarchy is formed by
the branching cable having no loops that
connect the root with all other nodes for
communication.
Network topology
Disadvantages of Tree
Advantages of Tree Topology Topology
• Security is high in Tree Topology • If the central hub fails,
• Tree Topology is more reliable the entire system fails.
• Tree topology is more scalable
• It allows more devices to be
• The cost is high because
attached to a single central hub thus of the cabling.
it decreases the distance that is
traveled by the signal to come to the • If new devices are added,
devices. it becomes difficult to
• We can add new devices to the reconfigure.
existing network.
• Error detection and error correction
are very easy in a tree topology.
Network topology
• Hybrid Topology
• It is the combination of two
or more types of topology
• They arise from the
integration of multiple
network topologies that is
why called Hybrid Network
Topology.
Network topology
Advantages of Hybrid Disadvantage of Hybrid
Topology Topology
• Hybrid Topology provides • It is challenging to design the
more flexibility than architecture of the Hybrid
others topologies. Network.
• Hybrid topology is more • Hubs used in this topology
are very expensive.
robust than the other.
• The infrastructure cost is
• Hybrid Topology provides very high as a hybrid
optimized performance network requires a lot of
cabling and network devices.
Types of Communication media
• The communication media selected for a network
depends on
• the information being exchanged
• The level of data privacy
• Users are stationary or mobile
• Other business requirements
• Broadly categorized into
• Guided transmission media (Wired) – communication signals
are guided along a solid medium
• Wireless – communication signals broadcast over airwaves as
a form of electromagnetic radiation.
Guided Transmission Media
Media Form Description Advantages Disadvantages
Twisted pairs of
Limitations on
copper wire, shielded
Twisted-pair wire Widely available transmission speed
or unshielded; used
and distance
for telephone service
• Spectrum is limited
• Governments oversee appropriate licensing of bands
• Strict rules to prevent one type of transmission from interfering with others.
Wireless
Technology Description Advantages Disadvantages
Radio frequency Operates in the 3 Supports mobile users; Signal is highly
range KHz–300 MHz range costs are dropping susceptible to interception
Microwave— High-frequency radio Avoids cost and effort to Must have unobstructed
terrestrial and signal (300 MHz–300 lay cable or wires; line of sight between
satellite GHz) sent through capable of high-speed sender and receiver;
frequency range the atmosphere and transmission signal is highly
space (often involves susceptible to interception
communications
satellites)
Infrared Signals in the 300 Let’s you move, Must have unobstructed
frequency range GHz–400 THz remove, and install line of sight between
frequency range devices without sender and receiver;
expensive wiring transmission is effective
only for short distances
Wireless
• Near field communication (NFC)
• Very short-range wireless connectivity technology
• Enables 2 devices placed within a few inches of each other to exchange data
• Bluetooth
• Devices interconnected over distances of 10 to 30 feet at a rate of about 2
Mbps
• Wi-Fi
• Wireless network brand owned by the Wi-Fi Alliance (300 technology
companies)
• Wi-Fi Alliance helps in improving the interoperability of WLAN products based on IEEE
802.11 series of communication standards.
• Improves interoperability of wireless local area network products
• Based on the IEEE 802.11 standard
Wireless
Wireless Maximum
Networking Data Rate per Comments
Protocol Data Stream
Transmits at 5 GHz, which means it is incompatible with
IEEE 802.11a 54 Mbps
802.11b and 802.11g
First widely accepted wireless network standard and
transmits at 2.4 GHz; equipment using this protocol may
IEEE 802.11b 11 Mbps
occasionally suffer from interference from microwave ovens,
cordless telephones, and Bluetooth devices
Equipment using this protocol transmits at 2.4 GHz and may
IEEE 802.11g 54 Mbps occasionally suffer from interference from microwave ovens,
cordless telephones, and Bluetooth devices
Employs multiple input, multiple output (MIMO) technology,
which allows multiple data streams to be transmitted over
IEEE 802.11n 300 Mbps
the same channel using the same bandwidth that is used for
only a single data stream in 802.11a/b/g
An 802.11 standard that provides higher data transmission
400 Mbps–1.3
IEEE 802.11ac speeds and more stable connections; it can transmit at
Gbps
either 2.4 GHz or 5 GHz
Microwave transmission
• High-frequency air signal
• (300 MHz to 300 GHz)
• Terrestrial (earth-bound)
microwaves
• Line of sight must be unobstructed
• Microwave stations are placed in a
series approx. 48 – 50 km apart
before the curvature of the Earth is
impossible to “see” one another.
• Communications satellite
• Operates in the microwave frequency range
• Receives weak signal from Earth and
amplifies it
• Rebroadcasts it at a different frequency
• Types include geostationary, low earth orbit,
small mobile satellite stations
• Geostationary satellite orbit the Earth
directly over the equator (approx. 35888 km
above the Earth’s surface)
Wireless
• 4G wireless communications
• Delivers more advanced features over 3G (2 – 4 Mbps)
• 3-20 times the speed of 3G networks
• Based on the Long Term Evolution (LTE) standard
• LTE is a standard for wireless communications for mobile phones based on
packet switching
• 5G wireless communications
• Advantages over 4G networks
• More bandwidth
• Lower latency
• Supports many more devices
• Enables exciting new applications
Communications Software
• Network operating system (NOS)
• Controls network computer systems and devices
• Network-management software
• Desktop manager monitors individual computers and shared hardware use,
scans for viruses, and ensures software license compliance
• Mobile device management (MDM) software
• Remotely manages and troubleshoots devices
• Software-Defined Networking (SDN)
• Emerging approach to networking
• Network administrators manage a network through a controller
• No physical access required
• Automates tasks
• Enables dynamic response to application requirements
Internet, Intranet and
Extranet
Internet
• Internet
• Worldwide collection of millions of
computers and networks
• Derived from the term “internetworking”
• No one actually owns or runs the
Internet
• Started in 1969 as a U.S. Department of
Defense (DoD) project called Advanced
Research Projects Agency Network
(ARPANET)
• Evolved into National Science Foundation
Network (NSFNET) in 1987
• ARPANET – MILNET and ARPANET Number of Internet users worldwide
(smaller version)
Internet
• Internet
• Communication media, routers, switches, communication towers
and satellite make up this network
• Internet backbone
• High-speed, long-distance communication link which span the
globe formed by combined hardware of network service
providers.
• Foundation network linked with fiber-optic cables
• Can support very high bandwidth
• Several private companies operate their own Internet backbones
• Connect network access points (NAPs)
Internet
• Transmission Control Protocol/Internet Protocol (TCP/IP)
• Collection of communication protocols used to interconnect network
devices on a packet switching network such as the internet.
• Defines how applications can create communication channels across a
network
• It managers how a message is assembled into smaller packets before they
are transmitted over the internet and reassembled into the proper
sequence at the destination.
• NIC
• Network interface card – is a circuit board or a card that is installed not a
hardware device so that it can be connected ot a network
• MAC address
• Media Access Control address is “burnt” into the ROM of each network card
Accessing the internet
• World Wide Web (WWW, or “the Web”)
• Developed by Tim Berners-Lee at CERN, Geneva as an internal
document-management system.
• Graphical interface to the largely text-based Internet in 1989
• WWW consists of server and client software, http (hyper text
transfer protocol), standards and markup language.
• Client Server Architecture
• IT is a networking approach wherein many clients (end-user
computing devices) request and receive services (host
computers) on the network.
• Servers receive client user requests, process them and obtain
the requested data.
Client/Server Architecture
Accessing the internet
• Uniform resource locators (URLs)
• Identify a Web page; the address of a document or site on the
Internet
• Suffix indicating the top-level domain (TLD) it belongs to
• Hypermedia
• Documents can include embedded references to audio, text,
images, video, and other documents
• Hypertext
• Embedded references in hypermedia documents
• Links users can click to follow a particular thread
How the internet works
Domain Name System
• Domain names
• Unique identifiers of computer or network addresses on the Internet
• Internet Protocol (IP) address
• 208.77.188.166
• Assigned by the Internet Corporation for Assigned Names and
Numbers (ICANN)
• IP indicates how to address and route each packet to make sure the
message reaches the desired destination.
• IP (Internet Protocol) address – a 32-bit number that identifies a
computer on the internet
• Domain Name System (DNS)
• Domain names are converted to IP addresses
Affiliation ID Affiliation
Biz Business sites
All types of entities
including nonprofits,
Com
schools, and private
individuals
Post-secondary
Edu
educational sites
Gov Government sites
Net Networking sites
Number of domains in U.S. top-level domainorganization
Nonprofit affiliations
Org
sites
Internet and Web Applications
• The original Web—Web 1.0
• One-directional resource
• Published information was for viewing only
• Web 2.0 and the social Web
• Web 2.0
• Computing platform
• Software applications and information sharing
• Social networking Web sites
• Users use Web-based tools to share information
• Enterprise 2.0: using social media in business
Internet and Web Applications
• Search engines and Web research
• Search engine
• Enables a user to find information on the Web
• Specify keywords related to a topic of interest
• Search engine optimization (SEO)
• Process for driving traffic to a Web site
• Improves the site’s ranking in search results
• Instant messaging
• Online, real-time communication
• Between two or more people connected via the Internet
Internet and Web Applications
• Microblogging, status updates, and news feeds
• Twitter is a microblogging service
• Used by users and businesses
• Twitter-like news or blog post feeds included on Web pages
• Conferencing
• Real-time online conferencing available
• Users share computer desktops
• Free software makes video chat easy to use
Internet and Web Applications
• Blogging and podcasting
• Blog
• Web site to share observations, experiences, and opinions on a wide
range of topics
• Podcast
• Audio broadcast a user can listen to over the Internet
• Online media and entertainment
• Content streaming
• Method of transferring large media files over the Internet
• Data stream of voice and pictures plays more or less continuously as
the file downloads
Intranet and Extranet
• Intranet
• Internal corporate network
• Uses Internet and WWW standards and products
• Extranet
• Built using Web technologies
• Links selected company intranet resources with customers, suppliers, or other business partners
• Virtual private network (VPN)
• Secure connection between two Internet points
• Encapsulates traffic using IP packets
• Sends packets over the Internet
Need User ID
Type User
and Password?
Internet Anyone No
Intranet Employees Yes
Business
Extranet Yes
partners
Intranet and Extranet
• Intranet
• An Internal corporate network built using Internet and WWW standards and
products
• Extranet
• A network built using Web technologies that links selected company intranet
resources with its customers, suppliers, or other business partners
• Virtual private network (VPN)
• A Secure connection between two points on the internet
• Transfer information by encapsulating traffic in IP packets and sending packets
over the Internet
Need User ID
Type User
and Password?
Internet Anyone No
Intranet Employees Yes
Business
Extranet Yes
partners
Resources
• https://pmc.ncbi.nlm.nih.gov/articles/PMC6618173/