Вы находитесь на странице: 1из 34

Seminar by

D.LEO FRANCIS
 Intranet history is bound up with the
development of Internet – the global network.
The idea of WWW, proposed in 1989 by Tim
Berners-Lee and others, which aim was to
enable the connection and access to many
various sources, became the prototype for
the first internal networks.
 E BUSINESS REQUIRES A NETWORK
 PROBLEM,WHICH IS SEAMLESS AND ALLOWS
 SMOOTH FLOW OF DATA AND INFORMATION
 IN ANY FORM FROM ANY LOCATION TO ANY
 OTHER DESTINATION (S).
 INTRANET IS A VERSION OF INTERNET CONFINED
TO AN ORGANISATION
 IT USES INTERNET STANDARDS LIKE HTML,HTTP, &
TCP/IP.
 INTRANET USES INTERNET STANDARDS
NAMELY HTML(HYPER TEXT MARKUP
LANGUAGE),HTTP(HYPER TEXT TRANSFER
PROTOCOL) ANDTCP/IP(TRANSMISSION
CONTROL PROTOCOL/INTERNET PROTOCOL).
 ACCESS MANUALS,CONTRACTS,DIRECTORIES
 ACCESS PRODUCT,CUSTOMER DATA
 REVISION,VALIDATION & APPROVAL OF
DOCUMENTS
 ACCESS EMPLOYEE DATA BASE
 Intranet Security: External Threats
 Even though the intranet is a closed, private
network, it is still susceptible to external
threats from hackers or malicious software
including worms, viruses, and malware. Below
we examine some of the external threats to
the intranet and how to address them.

 Various threats are:
 Network Security Threats:
It’s best to use a firewall to mitigate against
external threats. In simple terms, a firewall is
a protective barrier between the intranet and
the internet.
 Viruses
 Security breaches
 Weak password selection
 Access control
 Encryption
 Remote access
 If your organization is hosting the office
intranet via a company server, then the
responsibility for intranet security rests
entirely with you as an organization. Making
sure you have firewalls with the right rules,
SSL connections, HIPPA compliance, updates,
and backups will be down to you. Keeping
abreast of the latest threats and technologies
is also all down to you.
With a cloud-hosted intranet solution in comparison, the intranet
software provider has the responsibility for intranet security.
Important and sensitive company data remains secure as it
is hosted in a private cloud with the content delivered securely
via SSL and the web browser. The cloud’s security features
regularly undergo independent security audits to ensure the
security and confidentiality of your data.
Furthermore, the intranet provider will have a level of expertise
that is unlikely to be matched in a corporate setting. It is in their
interests – indeed, their reputation and brand depend on their
ability to deliver in terms of security. You would be unlikely to try
and repair an electrical fault in the office without using the
expertise of a qualified electrician. In a similar way, why risk the
security of your intranet when you can have the assurance and
expertise of a cloud hosted solution.
 In Intranet, each client must have an IP address.
IP address is written in four segments divided by
periods.
 Example: 219.44.189.10
 Install TCP/IP for server, clients and routers.
 Select an Intranet web server.
 Web servers are available on Windows NT, Novel
and IBM platforms.
 The servers have features like encryption of text,
database connectivity, search engine and HTML
tools.
 Publishing – Manuals, Directories
 Distribution – Multiple users, User groups
 Form processing – Leave application,
Admission application
 Interactive – Test and certification
 Transaction processing – Order processing
and delivery billing
 Collaborative processing – Work group and
workflow applications
 Information Sharing – Messaging
applications
 Query processing – Database queries and
queries on status of order, balance, value etc.
 A wireless network enables people to
 communicate and access applications and
 information without wires.
 Employ radio waves and/or microwaves to
maintain communication channels
 one of two topologies
 Infrastructure mode:

 Connected to a computer with an access


 point on the network
 Ad-hoc mode: peer-to-peer network

 Connected to a wireless adapter broadcasts


capable computer
 without an access point within about 300 feet
 Bluetooth (802.15)
 Wi-Fi (802.11)
 Wimax (worldwide interoperability for
microwave access)
 Small PAN, employs Radio Frequency (RF)
 eight devices can connect, 722Kbps
 short range in operation- under 10-meter area
 very low cost, low power requirement
 Devices that Use Bluetooth
 Printers
 Cell Phones
 Laptops
 Keyboards and Mice
 Headsets
 Example-FedEx
 wireless LAN, transmit 54Mbps
 Access point – box radio receiver/transmitter
antennas link to wired network, router, or hub
Infrastructure and ad hoc
 radio frequency
 20 meters indoors
 Devices Uses Wi-Fi:
 personal computer
 Smartphone,
 digital cameras
 modern printers.
 Broadband internet connectivity
 Uses MAN
 75 Mbps, at a distance of 50 kilometres
 Mobility
 Device use WiMax like Dongle, laptop
 4G network
 Voice calling
 Video calling

Вам также может понравиться