Transcript intranet

The Management of Telecommunications
Houston H. Carr and Charles A. Snyder
The Internet Connects to
the World; the Intranet
Connects the Organization
Chapter 9
Introduction
The Internet is a phenomenon that started
in the early 1970s and came to full bloom
in the early 1990s.
 The Internet is a vast global open
information meta-network (i.e. a network of
networks) of computer hosts.

Chapter 9
2
ARAPANET and BITNET



ARPANET (Advanced Research Projects
Agency Network) was a developed by the U.S.
Government to demonstrate the feasibility of a
packet-switched network.
BITNET was a network supported by IBM to
provide connectivity to academic institutions.
NSFNet, created by the National Science
Foundation (NSF), absorbed APANET in the late
1980s.
Chapter 9
3
Internet
The Internet is a network of networks.
 The Internet is two things:

 Connectivity
 Access
Chapter 9
4
Digital Divide
The “Digital Divide” describes the
separation between those with access to
the Internet and those without.
 As of the end of 2002, ninety percent of
school children had some access to the
Internet.

Chapter 9
5
Internet Services
LISTSERV – Internet discussion groups.
 File Transfer Protocol (FTP) – allows file
access on remote computers
 Telnet – enables communication and
remote access with other computers
 Usenet – discussion groups.

Chapter 9
6
Internet based applications

World Wide Web (WWW) –
 The
maze of interconnections from the
graphical view

HyperText Markup Language (HTML) –
 The
code that creates text and graphical
“pages” on the Internet

HyperText Transfer Protocol (HTTP) –
 The
coding that allows the browser to access
and open files written in HTML
Chapter 9
7
Internet based applications

Mosaic –
 The

Netscape®  The

first WWW browser
evolution of Mosaic
Internet Explorer (IE)®  Microsoft’s

answer to Netscape
Java –
 A platform
Chapter 9
independent language for applications
8
Access to the Internet

Individuals wanting access to the Internet
have two choices;
 Through
an on-line service, such as America
Online®, or
 Via an Internet service provider (ISP), such as
Earthlink.net® or Bellsouth.net®.
Chapter 9
9
Protocols

TCP/IP (Transmission Control Protocol/Internet Protocol)

The primary set of rules for the Internet.



SLIP (Serial Line Internet Protocol) –


Modem protocol
PPP (Point-to-Point Protocol) –


TCP manages the assembling of a message or file into smaller
packets.
IP handles the addressing part of each packet so that it gets to the
right destination.
Modem protocol
MAE East, MAE West, and MAE Central –

Chapter 9
Primary access points to the Internet Backbone.
10
Business on the Internet
Direct selling or marketing of a firm’s
existing products or services.
 Selling advertising space.
 Charging fees for the actual content
accessible on a WWW site.
 Charging fees for online transactions or
links.

Chapter 9
11
Electronic commerce’s impact

Electronic commerce is more than a
different form of marketing and selling; it is
a change in the players and the roles
played.
Chapter 9
12
Cost of Creating A Web Home Page
Own Web Site
Third Party Web Site
Item
1st year costs
1st year costs
Servers and software
$5,000-$20,000
Set-up fees
High speed link
$25,000-$40,000
Monthly charge
Personnel
$30,000-$60,000
Personnel
Total
$60,000-$120,000
Total
Item
$2,000-$4,000
$300-$500
Included
$5,000-$10,000
Source: Forrester Research, Inc.
Chapter 9
13
Internet Security
One of the problems with electronic
commerce to many is the perception of the
lack of a minimum level of security for
transactions.
 Online criminal activity has been estimated
at US$10 billion per year.

Chapter 9
14
Internet security


A second security concern on the internet is the
growing number accessing it via high-speed
methods (xDSL and cable modems).
Conditions which allow security intrusion into a
users machine include;
 They
are always connected.
 They often have a static IP address.

To combat intrusion, users are installing
firewalls.
Chapter 9
15
Firewalls
A firewall is a hardware and software
combination that serves as a gateway
between the user’s or organization’s
internal network and the Internet.
 Designed to prevent unauthorized access
to or from a private network.
 Firewalls do not protect from all risk.

Chapter 9
16
Security and defense

A first line defense for an always-on
connection is to turn off file and printer
sharing.
 Does
Chapter 9
not provide a high level of security
17
Firewall Techniques

There are several types of firewall
techniques:
 Packet
filter
 Application gateway
 Circuit-level gateway
 Proxy server
Chapter 9
18
Comparison of the Internet and a VAN


The Internet is a conduit and has resources only
to the extent that they are attached to the
conduit.
A Value Added Network (VAN) are both conduits
and services.
 VANs
can be used to store a file and have another
organization access the same VAN to retrieve that
file.
 Primary method for EDI transfer
 VAN offers each party connectivity to its servers,
which are services.
Chapter 9
19
Storage Networks
Storage Area Networks
A Storage Area Network (SAN) is a
specialized network that deals with blocks
of data.
 Storage Area Networks (SANs)
consolidate an organization's storage
requirements into a common repository.
 SANs help satisfy an organization's
growing demand for storage and the
enhanced need to access the data.

Chapter 9
21
Network-attached data storage (NAS)
Network-attached data storage (NAS) is a
system for file sharing.
 A NAS is a specialized server, dedicated
to serving files.
 Invented for the Internet
 Seems to be tailor-made for eBusiness

Chapter 9
22
Storage Options

SAN Attached
Fiber Channel
SCSI Protocol
S
A
N
Application
Server
Chapter 9
23
Storage Options

Network Attached Storage
Clients & Servers
IP Network
NAS Appliance
File Protocol
(CIFS, NFS, HTTP, FTP, Novell, AppleTalk)
Chapter 9
24
Storage Options

NAS Gateway
Clients & Servers
IP Network
NAS Gateway
File Protocol
S
A
N
(CIFS, NFS, HTTP, FTP, Novell, AppleTalk)
SCSI Protocol
Chapter 9
25
Storage Options

iSCSI (SCSI over IP) Target
Clients & Servers
IP Network
iSCSI Appliance
SCSI Protocol
Chapter 9
26
eBusiness and
eCommerce
eCommerce

Electronic commerce (eCommerce) is a
set of technologies, applications, and
business processes that link enterprises,
consumers, and communities through
electronic transactions and the electronic
and physical exchange of goods, services,
information, and capital.
Chapter 9
28
eBusiness

Electronic commerce (eCommerce)
involves buying and selling goods and
services online, usually in the form of B2C
(business-to-consumers) or B2B
(business-to-business)
Chapter 9
29
Electronic Business

Electronic business (eBusiness) involves
the larger concept of conducting business
electronically.
Chapter 9
30
Electronic data interchange (EDI)
Electronic funds transfer (EFT) provided
the banking industry a means for
transferring funds electronically.
 EDI allows the transfer of standard
business documents between computers
as data files.

 EDI
works best when there is no human
intervention, e.g., computer-to-computer.
Chapter 9
31
Mobile Commerce

Mobile commerce (M-commerce) includes
the selling of goods and services through
wireless devices such as personal digital
assistants (PDAs) and cellular phones.
Chapter 9
32
Digital Cash
Ecash or electronic cash allows an
individual to make payment for purchases
online through their checking or credit
account.
 It is not the same as an automatic bank
draft for, say, your power bill.

Chapter 9
33
eBusiness Security
In 2000, over 60% of organizations had
experienced some sort of security breach
within the previous two years.
 At that same time 82% of networks did ot
use firewall protection.

Chapter 9
34
eBusiness Security Threats

Kinds of security threats
 Viruses
 Data
theft
 Data manipulation
Chapter 9
35
PKI – Public Key Infrastructure
The concept of electronic or digital
signatures promises to be the way of
replacing paper for many legally binding
documents.
 The infrastructure that supports digital
signatures is public key infrastructure
(PKI).

Chapter 9
36
PKI – Public Key Infrastructure
Certificate
Authority (CA)
Repository
(3) DC
(A trusted third
party)
(1)
(2) DC
(CAs and
CRLs)
Verification (5)
Subscriber
(6) Results of
status check
Relying Party
(4) Private
key
Source: Modified from the Burton Group
and Digital Signature Trust (2000)
Chapter 9
37
Intranet
An intranet is the implementation of
Internet technologies within an
organization, rather than for an external
connection to the Internet.
 The impact of an internet affects an
organization's operation, efficiency,
development, and culture.

Chapter 9
38
Technology Components of the Internet

The main technology components of the
Internet are:
 Communications
 File
protocol
transfer
 Mail
 Web
browsing
 Terminal emulation
 User interfaces
Chapter 9
39
Intranet

Reasons why Internet technologies have
an impact on Intranet business networking
applications.
 Universal
communication
 Performance
 Reliability
 Cost
 Standards
Chapter 9
40
Intranet

Corporate uses of Intranets
 Publishing
corporate documents
 Access into searchable directories
 Corporate/department/individual pages
 Simple groupware applications
 Software distribution
 Mail
 User interface
Chapter 9
41
Pressures on business

New pressures on business include;
 Shortened
product life cycle
 Increased cost pressures
 Increased demand for quality and customer
service
 Changing markets
 New business models
Chapter 9
42
Extranets
An extranet is an intranet that is partially
accessible to authorized outsiders.
 Provides various levels of accessibility to
those outside of the organization.

Chapter 9
43
Network-level Firewall

A network-level firewall is typically a
screening router that examines packet
addresses to determine whether to pass
the packet to the local network or to take a
blocking action, such as denying access to
the system or passing it to a protected
area called the honey pot.
Chapter 9
44
Application-level Firewall
An application-level firewall is a host
computer running proxy-server software.
 Communicates for network users with
severs outside the network.
 Controls traffic between two networks.

Chapter 9
45
Circuit-level Firewall
A circuit-level firewall is similar to
application-level firewalls in that both are
proxy servers.
 Does not require special proxy-client
applications.

Chapter 9
46
Security Ratings

Department of Defense (DOD) provides of network
security ratings.

Division D Security Rating (D1)



Division C Security Rating (Sub categories C1 and C2



Must have mandatory protection (system access rules)
Division A Security Rating (A1)



Chapter 9
Provides discretionary (need-to-know) protection
Audit capabilities to track user actions and accountability
Division B Security Rating (Sub categories B1, B2, and B3)


Lowest rating
Basically no security at all
Highest ratings
Formal security verification methods
Requires extensive documentation
47
The Management of Telecommunications:
Houston H. Carr and Charles A. Snyder
End of Chapter 9