Anda di halaman 1dari 11

Section 7: Computer networks

(a) Network type

LAN: Intranet Local email Business network

Name of presentation
An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences. An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet. With tunneling, companies can send private messages through the public network, using the public network with special encryption/decryption and other security safeguards to connect one part of their intranet to another.

FTP
FTP allows you to transfer files between two computers on the Internet. FTP is a simple network protocol based on Internet Protocol and also a term used when referring to the process of copying files when using FTP technology.

HTTP (Hypertext Transfer Protocol)


HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web user opens their Web browser, the user is indirectly making use of HTTP.

HTTP (Hypertext Transfer Protocol)


A one word answer to this question is Encryption. Basically both Telnet and SSH are terminal emulators and are used to access your system remotely, means that you can login you system through internet or over a network and issue commands. SSH just encrypts your connection to the remote machine so when you send your password or commands over the network someone else cannot sniff the packets and interpret your password as it in encoded while if you are using Telnet than all your passwords and information will be transferred over the network as plain text and some rogue party can easily interpret that ssh (secure shell) -- Named "secure" because everything you key in is encrypted during transport and cannot be easily deciphered and read by anyone else. It is only decrypted at the receiving hosts. telnet -- All traffic is in "plaintext" and can be read by anyone intercepting the message during transport between endpoints.

Summary:

1. SSH and Telnet commonly serves the same purpose 2. SSH is more secure compared to Telnet 3. SSH encrypts the data while Telnet sends data in plain text 4. SSH uses a public key for authentication while Telnet does not use any authentication 5. SSH adds a bit more overhead to the bandwidth compared to Telnet

6. Telnet has been all but replaced by SSH in almost all uses

extranet
An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. Companies can use an extranet to:
Exchange large volumes of data using Electronic Data Interchange (EDI) Share product catalogs exclusively with wholesalers or those "in the trade" Collaborate with other companies on joint development efforts Jointly develop and use training programs with other companies Provide or access services provided by one company to a group of other companies, such as an online banking application managed by one company on behalf of affiliated banks Share news of common interest exclusively with partner companies

The entire Story


The basic communication starts with the physical layer that includes that modem. Later the data is sent to the data link layer that resides between the network and physical layer. This is done with the help of wifi or Ethernet. Internet protocol or IP , manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. The next transport layer consists of the UDP (User Datagram Protocol) which sits next to TCP and can be used directly to support fast, connectionless, unreliable transport of packets. There is no handshaking done before or after the communication. FTP protocol layer is responsible for the transfer of data to and from the server to the client.

The entire Story---Another category in this will be the HTTP. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. In the application layer there is a protocol Know as the Telnet and SSH. Telnet offers users the capability of running programs remotely and facilitates remote administration. SSH is a popular protocol used to connect from one computer to another. The main use of SSH is to establish an encrypted connection so that nobody in between can read the traffic, especially for sensitive items such as passwords. SSH can also establish encrypted data tunnels underneath, which allow users to forward traffic such as a graphical program's

modems } Examples: basic communication - wifi/Ethernet } Examples go between from network layer to physical layer or acts on requests for services from network. - internet protocol (IP) } Examples forwarding packets (data gets to source) - transmission control protocol (TCP) } Examples also responsible for routing - user datagram protocol (UDP) } Examples divides data into packets for transmission and adds addresses of source device - file transfer protocol (FTP) } - hypertext transfer protocol (HTTP) } - telecommunications network (TelNet) } - secure shell (SSH) } Examples delivers services to network/internet layer

Anda mungkin juga menyukai