1
© Prentice Hall, 2000
Chapter 7
The Intranets and Extranets
2
© Prentice Hall, 2000
Learning Objectives
❚
Describe the relationship among the Internet, an
intranet and an extranet
❚
Discuss the role of firewalls for intranets and
extranets
❚
Discuss the functions of intranets
❚
Discuss the applications of intranets
❚
Describe the industries that use intranets
❚
Discover typical cases of intranet applications
3
© Prentice Hall, 2000
❚
Identify the key element of extranets
❚
Identify the key technologies for tunneling
❚
Discuss the applications of extranets
❚
Describe typical industries that use extranets
❚
Discuss the business models for extranet
applications
❚
Describe the concept of embedded extranets
Learning Objectives (cont.)
Automotive Network Exchange -
the Largest Extranet
❚
Companies in the automotive market swap supply
and manufacturing data
❚
Involve 10,000+ companies
❚
Include CAD/CAM file transfers, Electronic Data
Interchange (EDI), e-mail, and groupware
❚
The network’s EDI element alone will slice $71
from the cost of designing and building each car
❚
Savings of $1 billion a year for the Industry
4
© Prentice Hall, 2000
❚
Chrysler will pay for fewer T1 Lines and satellite
connections
❚
Standardizing one protocol-IP will reduce support
costs
❚
The time it takes to turn around an order will be much
shorter
❚
The faster the parts come in, the faster the cars
leave the assembly line, the larger the customer
satisfaction and manufacturer’s profit
❚
Business-to-business virtual private networks (VPN)
are used
Automotive Network Exchange -
the Largest Extranet (cont.)
5
© Prentice Hall, 2000
The Internet
6
❙
The Internet is a public and global
communication network that provides direct
connectivity to anyone via a Local Area Network
(LAN) and an Internet Service provider (ISP).
Access to the Internet is not restricted to anyone.
This lack of control may result in an information
overload. Due to its vast scope and openness,
the information is difficult to locate. Users need
effective and efficient search engines to navigate
the sea of information . There is no centralized
control of network and information.
© Prentice Hall, 2000
7
The Intranets
❙
An intranet is a corporate LAN and/or Wide Area
Network (WAN) that is secured behind company’s
firewalls and it uses Internet technologies.
Although intranets are developed using the same
TCP/IP protocol as the Internet, they operate as
private networks with limited access. Only
employees who are issued passwords and access
codes are able to use them. So, intranets are
limited to information pertinent to the company and
contain exclusive and often proprietary and
sensitive information. Firewalls protect intranets
from unauthorized outside access.
© Prentice Hall, 2000
Public/External
Internet Users
Intranet
Clients
Servers
ERP
Legacy
systems
E-mail
servers
Web
servers
Databases
Firewalls
8
The Intranet (cont.)
© Prentice Hall, 2000
9
The Extranet
❙
An extranet implies an “extended intranet”, which
uses TCP/IP protocol networks (like the Internet) to
link intranets in different locations. Extranet
transmissions are conducted over the Internet to
save money. But it offers no privacy or transmission
security. By creating tunnels of secure data flows
using cryptography and authorization algorithms,
called VPNs, the security can be improved.
❙
Extranets provide secure connectivity between a
corporation’s intranets and intranets of its business
partners, material suppliers, financial services, and
customers.
© Prentice Hall, 2000
Tunneling Internet
Extranet
Intranet
Firewall
Intranet
Firewall
10
The Extranet (cont.)
Suppliers
VPN
Distributors
VPN
Customers
VPN
© Prentice Hall, 2000
11
Summary : Internet, Intranet, and Extranet
Network Typical Type of
Type Users Access Information
Internet
Any individual
with dial-up
access or LAN
Unlimited,
public; no
restrictions
General, public
and advertisement
Intranet
Authorized
employees
ONLY
Private and
restricted
Specific,
corporate and
proprietary
Extranet
Authorized
groups from
collaborating
companies
Private and
outside
authorized
partners
Shared in
authorized
collaborating
group
© Prentice Hall, 2000
12
© Prentice Hall, 2000
Firewalls
❚
Definition of Firewall
❙
Software and hardware that allows only those
external users with specific characteristics to
access a protected network
❙
Provides potential customers with secured
account, credit card, and loan information
❙
Usually located at a gateway point and controls
traffic between internal and external networks
Generic Functions of an Intranet
❚
Corporate/department/individual Web-pages
❚
Database access: Web-based databases
❚
Search engines and directory: Assist key word-based search
❚
Interactive communication: Chatting, audio and videoconferencing
❚
Document distribution and workflow: Web-based download and routing of
documents
❚
Groupware: Enhanced e-mail and a bulletin board
❚
Telephony: Intranets are the perfect conduit for computer-based telephony
❚
Integration with electronic commerce: Interface with Internet-based electronic
sales and purchasing
❚
Extranet: Link geographically dispersed branches, customers and suppliers to
authorize sections of Internets. Can create happier customers, more efficient suppliers,
and reduce operating costs
13
© Prentice Hall, 2000
14
© Prentice Hall, 2000
Categories of Intranet Application Purposes
0 10 20 30 40 50
Accounts Payable
Accounts receivable
Logistics and transportation
Sales records
Data warehouse
Document routing
Inventory
Legacy systems access
Policies and procedures
Customer records
Document sharing
Purchase orders or order entry
Product catalogs and manuals
% of respondent
❚
Electronic Commerce: sales and purchasing online
❚
Customer Service: UPS, FedEx and other shippers have proved that
information about product shipments and availability makes customers happier
❚
Reduced Time to Market: Easy online access for product development
speeds teamwork
15
© Prentice Hall, 2000
❚
Enhanced Knowledge Sharing: Web pages can enhance knowledge
sharing
❚
Enhanced Group Decision and Business Processes: Web-
based groupware and workflow is becoming the standard intranet
platform
❚
Empowerment: All information should be available to everyone with the
ability to know and act independently
❚
Virtual Organizations: Web technology at participating companies
removes the barrier of incompatible communication technology
❚
Software Distribution: Using the intranet server as the application
warehouse and avoid many maintenance and support problems
❚
Project Management: Share reports and monitor projects’ progress
Categories of Intranet Application Purposes (cont.)
16
© Prentice Hall, 2000
Industry Specific Intranet Solutions
❚
Financial Services: Banking, brokerages and other
financial services, insurance
❚
Information Technology
❚
Manufacturing: Chemicals and oil, consumer goods,
food and beverages, general manufacturing, and
pharmaceuticals
❚
Retailing
❚
Services: Construction and engineering, education,
environmental, healthcare, media, entertainment,
telecommunications, transportation, and utilities
17
© Prentice Hall, 2000
Intranet Case Studies with ROI Analysis
❚
The cases are organized in the following format:
❙
Background of company
❙
Business challenges
❙
Before the intranet technology
❙
Intranet cost
❙
Intranet strategy
❙
After intranet technology
❙
Subjective (intangible) benefits (optional)
❙
Lessons learned
❙
Analyzing the ROI
18
© Prentice Hall, 2000
❚
Federal Express - Package Tracking
Intranet Case Studies with ROI Analysis (cont.)
❙
60 internal web sites allow communication
worldwide between divisions and corporate
headquarters on all issues of importance to the
employees and customers
❙
The package tracking system allows customers
to contact FedEx and go into the intranet to find
the status of a package that they have shipped
or one that they are expecting
❙
The intranet has gone to retailers that ship
products directly to customers and set up
computer systems that will place and ship orders
19
© Prentice Hall, 2000
Intranet Deployment Strategy
❚
The intranet server platform has to meet 10
evaluation criteria
1. Scalability
: The efficient transaction read/write capability
should be ensured as the number of users and access increases.
2. Interoperability
: Enterprise Web, data warehouse, message
and mail manager, online transaction processing and other
nodes will form the enterprise server platform cloud, which will
require each node to have a high interoperability presence on
the network.
3. Configurability
: Vendors just provide a broadly configurable
array of enterprise servers that do not require major box swaps
as enterprise requirements change. Parts must be modular and offer
commodity component substitution with other devices from
third parties.
20
© Prentice Hall, 2000
Intranet Deployment Strategy (cont.)
❚
The intranet server platform has to meet 10
evaluation criteria
4. Compatibility
expandable configuration requirements, but also standard
industry specifications to protect application investment.
: The server family must not only meet
5. Manageability
: As the trend increases, enterprise systems
must be operational from any point on the network and address
the major operational management problems concerning configuration,
fault and problem diagnosis and installation.
6. Availability
: As enterprise servers assume a larger role in the
electronic channel and the enterprise wide Web, these systems
must be able to sustain tens to hundreds of thousands of
accesses and transactions with minimal downtime.
7. Reliability
: The hardware reliability, data integrity, systems
integration, and operational error immunity are essential.
21
© Prentice Hall, 2000
Intranet Deployment Strategy (cont.)
❚
The intranet server platform has to meet 10
evaluation criteria
8. Distributeability
: Whether in two- or three-tier client/server
architectures, the enterprise server must embrace the client,
assume a high degree of desktop affinity and must enable
resources to be proportioned between server and client
appropriately.
9. Serviceability
: The increased value placed on uptime will
mandate online serviceability through the use of hot-swappable
components, remote diagnostics directly connected to vendor
service centers and pre-failure predictive diagnostics.
10. Stability
: The generation changes in technology, and
architecture that may include changes to instruction sets,
migration from 32-bit to 64-bit computing and operating-
system enhancements for clustering and advanced symmetric
multiprocessing must minimize upgrade disruption and
preserve investment protection.
22
© Prentice Hall, 2000
Enterprise
Consumers
Suppliers
Clients
Business Partners
Distributors
VPN
Internet
Intranet
Extranet
Intranet
Intranet
Intranet
Intranet
VPN VPN
VPN
VPN
Remote
Employees
Basic Concept of Extranets Revisited
© Prentice Hall, 2000
23
© Prentice Hall, 2000
Elements of Extranets
❚
Components of Extranets
❙
Intranets
❙
Web server
❙
Firewalls
❙
Internet Service Provider (ISP)
❙
Tunneling technology
❙
Interface software
❙
Business application
❚
Methods to Configure Extranets
❙
They can be implemented using a direct leased
line with full control over it, linking all intranets
❙
A secure link can be created across the Internet,
which can be used by the corporation as a
virtually private network (VPN)
24
© Prentice Hall, 2000
Virtually Private Network (VPN)
❚
VPN is a secure network on the Internet using the
tunneling schemes
❚
The major objective of a VPN is to use the Internet as
an inexpensive WAN backbone
❚
When two sites are connected across a VPN, each
must have a VPN-capable router, firewall, or VPN
access device installed
❚
When VPN is used to link mobile clients with Internet
dial-up connections, the laptops must be equipped with
VPN client software equipped with the addresses and
associated encryption keys for corporate host sites
Four Categories of Extranet
Products and Services
❚
Extranet development tools
❚
Extranet hosting and network
connectivity
❚
Extranet services
❚
VPNs
25
© Prentice Hall, 2000