Академический Документы
Профессиональный Документы
Культура Документы
@An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences. @An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet.
Advantages of Intranet
@Intranets offering workforce productivity which can help user to find and observe information very fast. User may also use applications according to their roles and tasks. Through web browser a user can get access to entire contents of any website from anywhere or any time. @Intranet also increase the ability of employees by performing their job confidently very fast, and accurately. @ Intranet permits business companies to share out information to employees according to their need or requirements. Employees may also link to appropriate data at their expediency. @Intranet offering their user to write applications on their browser without crossbrowser compatibility issues. @Intranet is a Web-based tool that permits users to produce a customized site according their requirements. You can pull all Internet actions and most wanted contented into a single page which make easier to access. @ Intranet providing cross platform capability for UNIX, Mac, Windows. @Through Intranet common corporate culture every user can view the similar information. @ Now intranet facilitates their user o view and gets information and data via web browser. Intranet also save the money of any organization on printing, publishing and overall maintenance
Types of intranet Intranets classified into three types Bulletin Board :@This type of Intranet in an organization
extends to everyone the capability to review or update information that would normally be placed on an organization Bulletin Board, such as, a calendar of events, a status board, pictures of events or employees, policy changes, etc.
Internet
@Slow access speeds (e.g. 56Kbps dial up connectivity) @Different types of web browsers are used to view the website (e.g. Netscape, IE, Opera) @Different types of operating systems are used to view the website (e.g. Windows, Mac) @Global audience (e.g. multilingual, different cultures)
Database Management:This type of Intranet provides everyone in an organization with the capability to maintain a real-time interactive database. The database can be used to support the tracking of products, inventories, bidding, or provide information on a particular subject any time of day, from any location.
Intranets
@Faster access speeds (e.g. 100Mbps LAN connectivity). @Standardized type of browser. Minimal or no compatibility issues @Standardized type of operating systems. @Primarily local audience
Information Access :This type of Intranet is the type commonly found on the World Wide Web. The static web page may include information on any subject. The static page can then be accessed from a simple search engine provided free as part of the Internet. Such free service networks are now-a-days making good money through advertisements
Disadvantages of Intranet
@Intranet has great features for interconnected
manners but has some disadvantages too @Management does need to stop control of specific information, this problem can be minimized but with appropriate prudence. @The other disadvantage of Intranet is security issue @Intranet gathered everything in one location which is really good but if it is not prearranged then you will spoil everything. @The cost of intranet is very high but has lots of advantages after implementing.
Client/server
A network architecture in which each computer or process on the network is either a client or a server. Servers are powerful computers or processes dedicated to managing disk drives (file servers), printers (print servers), or network traffic (network servers ). Clients are PCs or workstations on which users run applications. Clients rely on servers for resources, such as files, devices, and even processing power. Another type of network architecture is known as a peer-to-peer architecture because each node has equivalent responsibilities. Both client/server and peer-to-peer architectures are widely used, and each has unique advantages and disadvantages. Client-server architectures are sometimes called two-tier architectures.
Threats
It must be clearly understood that the source of threat and the likely target could be many in number but all of them can be classified as either major or minor threats Similarly, they can be organized into two groups viz., internal or external threats. Details of threats have been dealt with in subsequent paragraphs
Firewall
@A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. @Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.@ All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Communication cables
Coaxial cable
@Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield @ The metal shield helps to block any outside interference from Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable.@ The two types of coaxial Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable has been popular in Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters
Encryption/Decryption methods
@Public Key Infrastructure (PKI)
A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. @The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. @Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret or private key system has the significant flaw that if the key is discovered or intercepted by someone else, messages can easily be decrypted
A public key infrastructure consists of: @A certificate authority (CA) that issues and verifies digital certificate. A certificate includes the public key or information about the public key @A registration authority (RA) that acts as the verifier for the certificate @authority before a digital certificate is issued to a requestor @One or more directories where the certificates (with their public keys) are held @A certificate management system
Internal threats:
Internal attacks originate from dissatisfied or unhappy inside employees or contractors. Internal attackers have some form of access to the system and usually try to hide their attack as a normal process. For instance, internal disgruntled employees have local access to some resources on the internal network already. They could also have some administrative rights on the network. One of the best means to protect against internal attacks is to implement an Intrusion Detection System, and to configure it to scan for both external and internal attacks. All forms of attacks should be logged and the logs should be reviewed and followed up.With respect to network attacks, the core components which should be included when you design network security are:
Network attack prevention. Network attack detection. Network attack isolation. Network attack recovery.
Proxy servers
Most modern firewalls distinguish between packet filtering and proxy server services. A firewall proxy server is an application that acts as an intermediary between tow end systems. Firewall proxy servers operate at the application layer of the firewall, where both ends of a connection are forced to conduct the session through the proxy. They do this by creating and running a process on the firewall that mirrors a service as if it were running on the end host. A firewall proxy server essentially turns a two-party session into a four-party session, with the middle process emulating the two real hosts. Because they operate at the application layer, proxy servers are also referred to as application layer firewalls.
External threats:
External threats or network attacks are carried out by individuals with no assistance from internal employees or contractors. These attacks are typically performed by a malicious experienced individual, a group of experienced individuals, an experienced malicious organization, or by inexperienced attackers (script kiddies). External threats are usually performed by using a predefined plan and the technologies (tools) or techniques of the attacker(s). One of the main characteristics of external threats is that it usually involves scanning and gathering information. You can therefore detect an external attack by scrutinizing existing firewall logs. You can also install an Intrusion Detection System to quickly identify external threats. External threats can be further categorized into either structured threats or unstructured threats:
Socks
Web servers
Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address and possibly a domain name. For example, if you enter the URL http://www.pcwebopedia.com/indexhtml in your browser, this sends a request to the Web server whose domain name is pcwebopedia.com. The server then fetches the page named index.html and sends it to your browser Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet. There are many Web server software applications, including public domain software from NCSA and Apache, and commercial packages from Microsoft, Netscape and others.
@ SOCKS combine powerful features of circuit-level proxies without the programming overhead of traditional application-level firewalls. A number of companies, including IBM, DEC, Cyber guard, etc. have commercial firewall products deploying the SOCKS protocol @SOCKS are an open, industry-standard protocol advanced by the Authenticated Firewall Traversal working group of the IETF (Internet Engineering Task Force). @SOCKS are a networking middleware: a circuit-level gateway, acting as a proxy and is placed at the session layer to mediate client/server connections. @There are a number of products based on SOCKS specifications such as Auto SOCKS available in the market. The latest version is SOCKS 5, which is backward compatible with previous versions as well as supporting key features such as authentication, encryption, the UDP protocol, DNS and IP addressing
Security Policy
@The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of users accessing the site.@ Each policy is based on a number of parameters like the companies business rules, objectives, Intranet type, content, and existing security infrastructure.@ It should be noted that a security policy made for some other Intranet cannot be used for a different intranet by merely changing the name. @Although, an Intranet security policy is a very broad topic and it cannot be covered easily in few pages since it differs from situation to situation, there are some general principles that can be found similar in almost all policies. Some of them are as follows: @Identification of The content, and needs to be secured User groups or categories @ Procedures Access authorization procedure Backup procedures Disaster recovery procedures @Action against misuse Course of action in the event of misuse or attacks Ensuring employees exercise proper etiquette so that they do not misrepresent the company Handling sensitive or secured documents stored on the intranet site Copyright policies for intellectual properties developed by the company.
(JDBC)
@JDBC is an application programmer's interface for accessing relational databases from Java programs. @Oracle Late supplies a native JDBC driver that allows Java applications to communicate directly with Oracle Lite's object-relational database engine. Oracle Lite's implementation of JDBC complies with JDBC 1.22. In addition, Oracle Lite provides certain extensions specified by JDBC 2.0. Oracle Lite's extensions are compatible with the Oracle8i JDBC implementation.@ For a complete JDBC reference, see the Sun Microsystems Web site.
Web browsers
Web browsers support two graphic formats: GIF and JPEG. Both formats use internal compression routines that make the graphics smaller, thus decreasing download times. When it is decided to put a graphic on the Web, it is important to decide whether to use GIF or JPEG.
What is Telnet?
Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else's computer remotely. On the Web, HTTP and FTP protocols allow you to request specific files from remote computers, but not to actually be logged on as a user of that computer. With Telnet, you log on as a regular user with whatever privileges you may have been granted to the specific application and data on that computer. A Telnet command request looks like this (the computer name is made-up): telnet the.libraryat.whatis.edu
SQL/API
@The Structured Query Language/Application Programming Interface (SQL/API) is a function library designed for use with the C programming language, and development environments that support C-style external function calling conventions. SQL/API is a Call Level Interface (CLI) analogous to SQL*Net in Oracle environments and CT-LIB in Sybase environments. @One can make calls to SQL/API functions throughout the application to interact with SQL Base. @Typical function calls include connecting and disconnecting to a database, passing SQL statements to the server for compilation and execution, providing bind variable data, and retrieving result sets. Additionally, the SQL/API provides functions to perform administrative tasks such as performing database backups and restorations
Groupware
@Groupware are a collection of software tools that encompass a broad range of applications. Even though groupware broadly consists of applications like calendars, project planning, sharing documents, emails, etc
SMTP
simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an email client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your email application.
Service Protocols
Many Internet users are familiar with the protocols such as TCP/IP to connect to the Internet. These include those protocols that permit the users to logon to remote computers, such as the following: World Wide Webs Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP) Telnet (Telnet) User Datagram Protocol (UDP) Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a suite. Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of TCP for special purposes. In combination with the IP, it is known as the UDP/IP suite. Though not very well known otherwise, other protocols are used by network host computers for exchanging router information such as: Internet Control Message Protocol (ICMP) Interior Gateway Protocol (IGP) Exterior Gateway Protocol (EGP) Border Gateway Protocol (BGP). Personal computer users connect to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP).
@the use of groupware, users can easily do most of the office related management work, which otherwise would be extremely difficult. For instance, it would be possible to edit, analyse, share, store and retrieve document. @The downside of groupware is that they are very costly and with the increase in complexity or additional features, the cost increases proportionately. @However, since Intranets work purely on inexpensive browsers as front-ends and actual applications on the Web server as back-end, many a time the groupware proves to be cheaper, but such implementations are rare. @As long as the same operating system and hardware were used, there were no problems, but maintenance and technical support cost was extremely high.
Agora
Agora is a simple and inexpensive Web protocol for electronic commerce. The feature that makes the protocol most attractive is that it supports a high volume of transactions with low incurred cost. It has the following properties:
Distributed:
Since Agora is fully distributed, traders and merchants can permit customers without access to a central authority. It becomes possible for the customers to purchase from any merchant provided that they have valid accounts.
On-line arbitration: It is
obvious that a number of disputes may arise in trade and commerce. With this property, an on-line arbitrator can settle certain customer/merchant disputes
Internet Protocol.
the Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. When you send or receive data (for example, an email note or a Web page), the message gets divided into little chunks called packets. Each of these packets contains both the sender's Internet address and the receiver's address. Any packet is sent first to a gateway computer that understands a small part of the Internet. The gateway computer reads the destination address and forwards the packet to an adjacent gateway that in turn reads the destination address and so forth across the Internet until one gateway recognizes the packet as belonging to a computer within its immediate neighborhood or domain. That gateway then forwards the packet directly to the computer whose address is specified.
GPRS
@GPRS stands for General Packet Radio Service and is a second generation (2G) and third generation (3G)--or sometimes referred to as inbetween both generations, 2.5G-wireless data service that extends GSM data capabilities for Internet access, multimedia messaging services, and early mobile Internet applications via the wireless application protocol (WAP), as well as other wireless data services.
Address Translation
When a Web site address or URL is typed in the Web browser, as www.startv.com and not as a series of numbers, it is essential for the server to know where exactly the data has to be sent to or received from. This address is mapped on to (or translated into) a series of numbers. The translation is called domain name resolving, host name resolving or name server lookup. For instance, the VSNL site address www.vsnl.net.in would translate to a group of four octets like 202.30.15.30. The translation is done on the whole name and not on each byte between the periods. The task of number translation is done solely by a domain name server (DNS) on the Intranet server. Like all devices, it has its own IP address (e.g., 194.62.15.20
Features of GPRS
@2G (second generation) GPRS service had data rates of 56-114 kit/second--akin to dial-up modem speeds. @GPRS wireless networks were later enhancing faster 3G (third generation) throughput speeds. TMobile's EDGE (enhanced Data Rates for Global Evolution), for example, delivers up to 4 times the GPRS rate.@Both GPRS and Edge, however, are quickly being surpassed by even faster 4G (fourth generation) mobile data networks
Applications of WAP
Corporate applications that are being enhanced and enabled with a WAP interface include: Remote Point of Sale Customer Service Remote Monitoring such as Meter Reading Vehicle Positioning Corporate Email Remote LAN Access File Transfer Web Browsing Document Sharing/ Collaborative Working Audio Still Images Moving Images Home Automation Consumer Applications that are being enhanced and enabled with a WAP interface include: Simple Person to Person Messaging Voice and Fax Mail Notifications Unified Messaging Internet Email Prepayment Ringtones Mobile Commerce Mobile Banking Chat Information Services. Days are not far when WAP would be used to control airconditioners and refrigerators installed at home directly from anywhere in the world. Users would be able to switch on and regulate airconditioners much before coming back home. Similarly, it would be possible to program washing machines remotely.
WAP Technology
@The basic philosophy behind the WAP approach is to utilise fewest resources possible on the handheld terminals and to utilise all the functionality of the network.@ Micro browser-based services and applications reside temporarily on servers as well as on phones. In the design of the WAP the standard, application part has been kept separate from the bearer being used. This separation helps greatly in the switching over from ordinary applications like SMS or CSD to GPRS. In addition, the most important features of WAP are given below: @Compatibility with any mobile network standard such as Code Division Multiple Access (CDMA), Global System for Mobiles (GSM), or Universal Mobile Telephone System (3GSM). WAP has been designed to work with all cellular standards and is supported by almost all major wireless leaders such as Siemens, AT&T and NTT DoCoMo.
Wireless Application Protocol Wireless Application Protocol (WAP) is a suite of communication protocols for the wireless and mobile devices designed to access the internet independent of manufacturer, vendor, and technology. @The WAP was developed by the WAP Forum, a consortium of device manufacturers, service providers, content providers, and application developers. @WAP bridges the gap between the mobile world and the Internet as well as corporate intranets and offers the ability to deliver an unlimited range of mobile valueadded services to subscribersindependent of their network, bearer, and terminal. @Mobile subscribers can access the same wealth of information from a pocket-sized device as they can from the desktop. WAP is a global standard and is not controlled by any single company.
@An HTTP server is often used as a gateway to a legacy information system; for example, an existing body of documents or an existing database application. The Common Gateway Interface is an agreement between HTTP server implementers about how to integrate such gateway scripts and programs. @It is typically used in conjunction with HTML forms to build database applications
@ Increased connectivity time for portables @Bandwidth available on demand. @Near-universal geographical coverage. @Low equipment cost, both subscriber stations and fixed plant. @ Reduced installation time, error rates, inventory of components, maintenance, and many other related benefits. @ Enhanced privacy. @Improved coverage characteristics, allowing for possibility of fewer cell sites or minimum number of fixed radio sites.
Wireless Session Protocol (WSP): A layer that links the WAE and
the Wireless Transaction Protocol.
Wireless Datagram Protocol (WDP): This is a protocol very much similar to the UDP except that the WDP uses wireless communication techniques. @The SMS, CSD and the USSD are the three most important of the WAPs underlying bearers: Short Message Service: Supports a maximum length of 160 characters per short message. @ Circuit Switched Data: Since CSD has very few users as of today, the WAP could not have a good start with the CSD as well.
What is an IP address?
user datagram
header:
Gateway
@A node on a network that serves as an entrance to another network.@ In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages.@ In homes, the gateway is the ISP that connects the user to the internet. @In enterprises, the gateway node often acts as a proxy server and a firewall. @The gateway is also associated with both a router, which use headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway. @A computer system located on earth that switches data signals and voice signals between satellites and terrestrial networks. @An earlier term for router, though now obsolete in this sense as router is commonly used.
Source Port. 16 bits. The port number of the sender. Cleared to zero if not used. Destination Port. 16 bits. The port this packet is addressed to. Length. 16 bits. The length in bytes of the UDP header and the encapsulated data. The minimum value for this field is 8. Checksum. 16 bits. Computed as the 16-bit one's complement of the one's complement sum of a pseudo header of information from the IP header, the UDP header, and the data, padded as needed with zero bytes at the end to make a multiple of two bytesData. Variable length.
GSM
Global System for Mobile
GSM stands for Global System for Mobile Communications. Just like computers, mobile phones have evolved over time. @There were first generation mobile phones in the 70's, there are 2nd generation mobile phones in the 80's and 90's, and now there are 3rd gen phones which are about to enter the Indian market@. GSM is called a 2nd generation, or 2G communications technology. @Now, GSM makes use of two principles. The first called Time division Multiplexing is very simple. Let's say that one of your friends possesses the new and sleek Apple's IPhone. @ On the same lines, in GSM, the radio frequency say 890 Mhz is shared by different users in time Now, GSM uses a combination of TDMA and FDMA. @This means that users A and B are not only sharing the channel in time but also frequency. @This means that user A is on the channel 890Mhz for 2 seconds, then jumps to 900Mhz channel for the next to seconds, then jumps to 910Mhz for the next 2 seconds and so on... Thus, each user is uses a different frequency at different time slots.@ This is called Frequency Hopping
generates a session key using public-key encryption to exchange information between the client and server. @This key is used to encrypt the transaction for both request as well as the response. It would be extremely difficult for the attacker to get into the system since each transaction uses a different session key. @Hence, even if the attacker succeeds in cracking the code of a transaction, he cannot use the same key every time for cracking and will have to spend an enormous amount of time as he did for decrypting the first key. @Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit secret key. It is felt that using a 40-bit key could be insecure since any possible combination of 2^40 can be computed easily using modern day computers.@ Compared to this, the use of a 128-bit key eliminates this problem as there would be 2^128 possible combinations instead of just 2^40. @Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is the Netscape, in which the user can select from available encryption methods and size of key.
What is a Protocol ? List any two protocols That are supported by Intranet
There are rules governing how data is transferred over networks, how they are compressed, how they are presented on the screen and so on. These set of rules are called protocols. There are many protocols, each one governing the way a certain technology works. For example, the IP protocol defines a set of rules governing the way computers use IP packets to send data over the Internet or any other IP-based network. It also defines addressing in IP
TCP: Transmission Control Protocol, used for the reliable transmission of data over a network. HTTP: Hypertext Transfer Protocol, used for transmitting and displaying information in the form of web pages on browsers. FTP: File Transfer Protocol, used for file transfer (uploading and downloading) over the Internet SMTP: Simple Mail Transfer Protocol, used for email Ethernet: Used for data transmission over a LAN. Wi-Fi: One of the wireless protocols.
Webmaster
A Webmaster is a person who either: @Creates and manages the information content (words and pictures) and organization of a Web site @Manages the computer server and technical programming aspects of a Web site @Companies advertising for a Webmaster vary in their use of the term. In a smaller company, a Webmaster typically "does it all."@ In a larger company, a Webmaster tends to be someone with either a writing and/or graphics design background who has acquired Web site creation skills (mainly knowledge and experience with HTML ) or a more technical person with some programming skills. @The "technical" Webmaster runs the server (for example, by managing the creation and authorization associated with file systems) and writes programs or Practical Extraction and Reporting Language scripts required by the Web site
AOL server
AOLserver, America Onlines own Web server, is the backbone of one of the largest and busiest production environments in the world. AOLserver is a multithreaded, Tcl-enabled Web server used for large scale, dynamic Websites. AOLserver powers America Online properties such as AOL.COM, Digital City, AOLMail, AOL Hometown, Helping.org, AOL Search, and much, much more.WYSIWYG kind of
output: The software tool should generate output exactly as designed and laid out by the developers. If the developer designs the page in a particular format, it is essential for the editor to provide coding in a manner to generate the same output.
iServer
iServer was developed by Servertec, written entirely in Java for any Javaenabled operating system. It has the dual purpose of serving both Web pages as well as Java servlets. In other words, this is a special kind of product that offers the functionality of both a Web server as well as an application server.
Support:
New properties and methods to provide a tighter integration with the editor tools should be provided. Popular Web authoring tools (e.g., Macromedias Dreamweaver UltraDev, Adobe GoLive!) give this support. Site map: A proper view or estimate of how the Web site is organised and how massive it is makes the Web site more attractive. Editors should provide a broad view of the Web in the form of an GIF or JPG image whereas some even provide this as a Web page.
with a huge gallery of clipart and some even provide a collection of sounds, music and multimedia clips. Though, this is optional, it is desirable to provide one such library to enable the developers to use ready available objects
Samba server