Intranets and Extranets

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

INTRANETS

AND
EXTRANETS
By-
JALADHI SONAGARA
1991106
INTRANETS
 An intranet is a TCP/IP network located within a single organization for purposes
of communications and information processing.
 Internet technologies are generally far less expensive than proprietary networks,
and there is a global source of new applications that can run on intranets.
 The largest provider of local area network software is Microsoft, followed by
open source Linux, both of which use TCP/ IP networking protocols.
EXTRANETS
 An extranet is a website that allows controlled access to partners, vendors and
suppliers or an authorized set of customers – normally to a subset of the
information accessible from an organization's intranet.
 Anextranet is similar to a DMZ in that it provides access to needed services for
authorized parties, without granting access to an organization's entire network.
 Historically
the term was occasionally also used in the sense of two
organizations sharing their internal networks over a VPN.
PUBLIC NETWORKS
A public network is a type of network wherein anyone, namely the general public,
has access and through it can connect to other networks or the Internet.
 Thisis in contrast to a private network, where restrictions and access rules are
established in order to relegate access to a select few. Since a public network
has few or no restrictions, users need to be wary of possible security risks when
accessing it.
 Because any user can connect to a public network, its level of security needs to
be heightened and various anti-threat and 61 malicious act precautions must be
put in place.
PRIVATE NETWORKS
A private network is any connection within a specified network wherein
restrictions are established to promote a secured environment.
 Thistype of network can be configured in such a way that devices outside the
network cannot access it. Only a selected set of devices can access this type of
network depending on the settings encoded in the network routers and access
points.
 There
are some factors that need to be addressed in order to have a secured
connection, making private networks more complicated to set up.
THANK YOU

You might also like