internetworked enterprise

Upload: vidhi-agrawal

Post on 18-Oct-2015

29 views

Category:

Documents


0 download

DESCRIPTION

Internetworked Enterprise

TRANSCRIPT

  • 5/28/2018 Internetworked Enterprise

    1/51

    Internetworked Enterprise

  • 5/28/2018 Internetworked Enterprise

    2/51

    Internetworked EnterpriseBusinesses are becoming internetworked enterprises. The Internet and Internet-like networks inside the

    enterprise (intranets), between an enterprise and its trading partners (extranets), and other types of networks

    have become the primary information technology infrastructure of many organizations. Telecommunications

    networks enable managers, end users, and their teams and workgroups to electronically exchange data and

    information anywhere in the world with other end users, customers, suppliers, and other organizations. By

    using such networks, companies can:

    Coordinate their work activities

    Manage their business operations and organizational resources

    Compete successfully in todaysfast changing global economy

    Many organizations today could not survive without a variety of interconnected computer networks to service

    the information processing and communications needs.The success of the electronic commerce systems among business and their customers and suppliers and

    enterprise collaboration systems are all based on Internetworked enterprise.

    Electronic commerce or e-commerce has been defined as the ability to perform transactions involving the

    exchange of goods or services between two or more parties using electronic tools and technique. The

    explosion of E-commerce has created new phenomena in our lifestyle especially in shopping activities.

    Consumers can easily buy products or services like magazines and airlines tickets via Internet. An

    internetworked enterprise uses the internet, intranets, extranets and other networks to support every step of

    the commercial process.

    Enterprise Collaboration systems uses the groupware tools to support communication, coordination and

    collaboration among the members of networked teams and workgroups.

  • 5/28/2018 Internetworked Enterprise

    3/51

    What is Internet

    The Internetis the largest network of networks today, and the

    closest model we have to the information superhighway of tomorrow.According to the definition provided by Oxford dictionary, the Internet

    is an arrangement of connected computers, which lets the computer

    users all over the globe exchange data.

    The Internet is an extraordinary entertainment and learning tool that

    may be utilized in a number of modes to increase the ability of a userto collect information.

    The principal components of the Internet are the World Wide Web

    (WWW) and e-mail.

    With the passage of time, the Internet has become the most effective

    business tool in the contemporary world. It can be described as aglobal meeting place where people from every corner of the world can

    come simultaneously.

  • 5/28/2018 Internetworked Enterprise

    4/51

    Characteristics of Internet

    Complex Network: With the simplified

    definition as a network of networks that

    comprises of over 150 million computers

    World-wide acceptance

    Used for :

    information searching and access

    information interchange

    commercial exchanges

  • 5/28/2018 Internetworked Enterprise

    5/51

    Internet Infrastructure

    Every computer that is connected to the Internet is part of a network, even the one in yourhome. For example, you may use a modemand dial a local number to connect to an InternetService Provider(ISP).

    A computer or computer network is attached with the device called Modem(Short formodulator or demodulator) that converts the digital data coming from a computer intoanalog voice form. This converted voice form is transmitted to the local Internet ServiceProvider through telephone links where a modem converts it back into digital form.

    At work, you may be part of a local area network(LAN), but you most likely still connect tothe Internet using an ISP that your company has contracted with. When you connect to yourISP, you become part of their network. The ISP may then connect to a larger network andbecome part of their network. The Internet is simply a network of networks.

    Internet Service Provider is the Organization ,which allows consumers to access internetservices. The ISP is equipped with all the tools and the technology to provide you theinternet services.

    Most large communications companies have their own dedicated backbones connecting

    various regions. In each region, the company has a Point of Presence(POP). The POP is aplace for local users to access the company's network, often through a local phone numberor dedicated line. The amazing thing here is that there is no overall controlling network.Instead, there are several high-level networks connecting to each other through NetworkAccess Pointsor NAPs.

    http://computer.howstuffworks.com/home-network.htmhttp://computer.howstuffworks.com/modem.htmhttp://computer.howstuffworks.com/home-network.htmhttp://computer.howstuffworks.com/home-network.htmhttp://computer.howstuffworks.com/modem.htmhttp://computer.howstuffworks.com/lan-switch.htmhttp://computer.howstuffworks.com/lan-switch.htmhttp://computer.howstuffworks.com/modem.htmhttp://computer.howstuffworks.com/home-network.htmhttp://computer.howstuffworks.com/home-network.htm
  • 5/28/2018 Internetworked Enterprise

    6/51

    Advantages of Internet

    Following are the advantages provided by the Internet:

    1) Information The biggest benefit offered by the Internet is information. It functions as a valuableresource of information. You can find any type of information on any subject with the help of thesearch engines like Yahoo and Google.2) Communication The primary goal of the Internet is communication. It has done extremely well inthis field, however the development process is still going on to make it more dependable and quick.By sending an e-mail, we can contact a person who is physically present thousand miles awaywithin the fraction of a seconds time.

    3) Entertainment Internet functions as a popular medium of entertainment. A wide variety ofentertainment including video games, music, movies, chat room, news and others can be accessedthrough the Internet.4) E-commerceE-commerce is the idea that is implemented for any form of commercial strategy orbusiness transactions that entails transmission of data from one corner of the world to another. E-commerce has become a fantastic option through which you can shop anything.5) Formation of communities Internet helps in formation of communities or forums. Here anumber of people can participate in different types of debates and discussions, express their viewsand gather valuable knowledge.6) Services A variety of services are offered via Internet, for example job searching, online banking,buying movie tickets, hotel reservations and consultation services etc. When you avail theseservices offline, they become more expensive.

  • 5/28/2018 Internetworked Enterprise

    7/51

    Disadvantages of Internet

    1) Spamming: Spamming denotes distribution ofunsolicited e-mails in large numbers. They are meaninglessand they unnecessarily block the whole system. Theseactivities are treated as illegal.2) Theft of personal details While using the Internet, thereis high probability that your personal details like name,address and credit card number may be accessed by conartists and used for fraudulent purposes.3) Virus threat Virus is a program that interrupts the usualoperation of your personal computer system. PCs linked to

    the Internet have high probability of virus attacks and as aresult of this your hard disk can crash, giving you a lot oftrouble.

  • 5/28/2018 Internetworked Enterprise

    8/51

    Internet Services

    Email

    E-Chatting

    Video Conferencing

    E-Government

    E-Commerce

    E-News

    E-Recruitment

    E-Education

  • 5/28/2018 Internetworked Enterprise

    9/51

    Intranets

    Intranet is kind of computer network which is used by the businesses to workeffectively and efficiently by using the internet protocols. Some time the Intranet isused in contrast to the internet because Intranet network use the internet, but it isonly accessible to the inside the members of organizations. The Intranet network isprivate network which is highly secured and safe; it has the firewall so it cannot beaccessed by the external people.

    An intranet is a network inside an organization that uses Internet technologies toprovide an Internet-like environment within the enterprise for information sharing,communications, collaboration and the support of business process. An intranet isprotected by security measures such as passwords, encryption and firewalls and thuscan be accessed by authorized users through the Internet.

    An intranet is an information portal designed specifically for the internal

    communications of small, medium or large businesses, enterprises, governments,industries or financial institutions of any size or complexity. Intranets can be custom-designed to fit the exact needs of businesses no matter where they are situated. Usersof intranets consists mainly of Members of the executive team, Accounting and orderbilling. Managers and directors, Sales people and support staff Customer service, helpdesk, etc..

    http://www.mywebservices.ca/intranet.htmlhttp://www.mywebservices.ca/intranet.html
  • 5/28/2018 Internetworked Enterprise

    10/51

    Role of Intranet

    Communicate and collaborate

    with e-mail, discussion

    forums,

    chat andconferencing.

    Secure , universal

    access to view

    and use corporate

    and external data.

    Author, publish and

    Share hypermedia

    documents

    Centrally administer

    Clients , servers,

    Security, directory

    And traffic

    Existing

    E-mail, voice-

    Mail Systems

    Existing

    Databases

    And

    Enterprise

    Applications

    HTML, MS Office

    XML, Java and

    Other Document

    Types

    Existing

    Hardware

    And

    Networks

    Intranet

    Enterprise

    Information

    Portal

    F

    I

    R

    E

    W

    A

    L

    L

    Internet

    Extranet

    Customers,

    Suppliers,

    And Partners

    Communication and Collaboration

    Business Operations and

    management

    Web Publishing

    Intranet Portal Management

    Employees

  • 5/28/2018 Internetworked Enterprise

    11/51

    Characteristics of Intranet

    1. An open, multi-way communication vehicle: Top Down, Bottom Up, Peer-to-Peer

    An enterprise has a host of communication channels available, but the intranet is a critical one. Agreat intranet must facilitate all communication routes: Top Down, Bottom Up, Peer-to-Peer. An2.Executor of business transactions

    A great intranet is a place of action and should be a part of business processes.

    3.Transparent governance, management and strategy

    Its all well and good having this great intranet, but if no one knows the strategy, who governs and controls this

    space and what the rules of engagement are, then theres still clear space for improvement.

    4.CommunicationThe intranet must support various communication channels, such as information from themanagement team concerning strategic aspects of their organisation or collaboration amongst project teams and

    departments. These formal and informal methods of communication are equally important. Therefore essential to

    have an in-depth look at the communication tools on offer.

    5.SearchAn effective search function is important in building and maintaining trust with the corporate intranet.

    Hopeless search queries which do not render anything helpful can be both frustrating and inefficient.

    6.Access flexibilityAccessibility by either a laptop or desktop is no longer acceptable, as not all employees

    perform tasks and activities at their desks. Certain job roles require employees to visit clients, and regular off-sitemeetings are becoming more common. Therefore flexibility in accessing their intranet on mobile devices and

    tablets should facilitate and not compromise their ability to perform tasks on their intranet.

  • 5/28/2018 Internetworked Enterprise

    12/51

    Advantages of Intranet

    Easy and Economical System of communication--Intranet is an easy, economical and fast system of

    communication within the enterprise. It offers opportunities to keep every concerned individual informed

    irrespective of the location. It also helps in reducing travel time as the communication between people in

    the business enterprise can be more frequent and less expensive, particularly when the persons desiring

    to communicate are located far away from each other.

    Replaces Grapevine-Intranet replaces grapevine as it permits inter employee communication with more

    transparency and free expression of views. It enables employees at various levels to pose problems/ques-

    tions, participate in discussions and contribute answers to thorny problems of the company. The concept

    of collective expertise can be given a concrete shape with the help of Intranet.

    Improves Productivity- It improves productivity of the manager. With Intranet, the manager can spend

    more time in analysing information and not in seeking information and waiting for its delivery.

    Eliminates latency of information- Intranet helps in eliminating the latency of information in the

    enterprise and makes the flow of information need-driven than availability-driven.

  • 5/28/2018 Internetworked Enterprise

    13/51

    Disadvantages of Intranet

    Security-One of the major disadvantages is the risk of security to the corporate information resource. The

    intranet exposes the corporate information resource to the risk of loss of privacy and even unauthorised

    alteration. The Intranet technology is still quite fragile and the risk of security and privacy of informationon Intranet is higher.

    Less Face to Face Interaction - Another fear that is being talked about these days is the danger of reduced

    face-to-face interaction between employees leading to impersonalisation of the enterprise.

    Training- proper training is required for the staff or personnel to operate the systems with intranet

    .Ineffective use of the system can create the serious problems.

    Other Disadvantages-

  • 5/28/2018 Internetworked Enterprise

    14/51

    Extranet

    Extranet is an Intranet for outside authorized users usingsame internet technology.

    Inter-organizational information system.

    enable outsiders to work together with companysemployees.

    open to selected suppliers, customers & other business partners

    An extranetis somewhat very similar to an intranet.

    Extranets are designed specifically to give external, limitedaccess to certain files of your computer systems to Certainlarge or priviledged customers, Selected industry partners,Suppliers and subcontractors... etc.

    http://www.mywebservices.ca/extranet.htmlhttp://www.mywebservices.ca/extranet.html
  • 5/28/2018 Internetworked Enterprise

    15/51

    Extranets connect the interconnected enterprises to consumers, business

    customers, suppliers and other business partners

    (Role of Extranet)

    PartnersConsultants

    Contractors

    Joint designOutsourcing

    Suppliers and

    Distributers

    Distributer managementSCM

    Procurement

    Consumers

    Customer Self-ServiceOnline Sales and

    MarketingSales Force AutomationBuild-to-Order productsJust-in-Time Ordering

    Business Customers

    InternetworkedEnterprise

  • 5/28/2018 Internetworked Enterprise

    16/51

    Advantages of Extranet

    Improves Efficiency-Extranet helps in improve company efficiency and output by automatingprocedures that were done manually in the past. Automation can also decrease the scope ofmistake.

    Fast and Quick Working-- Work is done quickly as compared to past manual systems.

    Timely access of the Required Information- Extranets permit company information to be analyzedat period suitable for business customers, partners, suppliers, employees, and other stake-holders.

    This helps in cutting down the conference/meeting times and is also helpful when doingmultinational business having with partners located in different countries and in different timezones.

    Updated Information- Information can be modified, updated and changed immediately onanextranet. All approved members thus have instant access to the most advanced information.

    Improved Relationship with business stakeholders- Extranets can help in improving relationshipswith main or potential customers by giving them correct, precise and efficient information.

  • 5/28/2018 Internetworked Enterprise

    17/51

    Disadvantages of Extranet

    Costly-Extranets can be costly to apply and maintain within an organization.

    Security- One of big problem is the protection of extranets when dealing with

    precious information. System access should be controlled and checkedproperly to

    protect the system and information going into the incorrect hands.

    Reduce face to face interaction with clients and business partners- Extranets can

    decrease personal face-to-face contact with clients and business partners. This can

    cause a lack of communication between employees, clients and organization.

  • 5/28/2018 Internetworked Enterprise

    18/51

    Difference between Intranet and Extranet

    Point of Difference Intranet Extranet

    Definition An intranetis an information portal

    designed specifically for the internalcommunications of small, medium or

    large businesses, enterprises,

    governments, industries or financial

    institutions of any size or complexity

    Extranet is an Intranet for outside authorized

    users using same internet technology.

    Design Intranets can be custom-designed to

    fit the exact needs of businesses no

    matter where they are situated.

    Extranets are designed specifically to

    give external, limited access to certain files of

    your computer systems to Certain large orpriviledged customers, Selected industry

    partners, Suppliers and subcontractors... etc.

    Geographical Distance Within an organization Between an organization and a supplier

    Entities Employees Clients, Suppliers, contractors,subcontractors

    Security Internal Risk Risk from the parties involved

    Communication Intra-Firm Inter-Firm

    Users Users of intranets consists mainly

    of Members of the executive

    team, Accounting and order billing.Managers and directors, Sales people

    Certain large or priviledged customers, Selected

    industry partners, Suppliers and

    subcontractors... etc.

    http://www.mywebservices.ca/intranet.htmlhttp://www.mywebservices.ca/intranet.html
  • 5/28/2018 Internetworked Enterprise

    19/51

    What is Network

    A network consists of two or more computers that are linked in order to share

    resources (such as printers and CDs), exchange files, or allow electronic

    communications. The computers on a network may be linked through cables,

    telephone lines, radio waves, satellites.

    Telecommunication Network

    Generally a communication network is an arrangement in which a sender transmits a

    message to a receiver over a channel consisting of some type of medium. Figure given

    below shows a simple conceptual model of a telecommunication network ,which

    shows that it consists of five basic categories of components:

  • 5/28/2018 Internetworked Enterprise

    20/51

  • 5/28/2018 Internetworked Enterprise

    21/51

    Key Telecommunications Network Component categories and

    examples

  • 5/28/2018 Internetworked Enterprise

    22/51

    Types of Telecommunications networks.

    There are many different types of telecommunications

    networks. However, from an end user point of view,

    there are only a few basic types, such as:

    1.Wide area networks2.Local area networks

    3.Interconnected networks like the Internet, Internets,

    and extranets

    4.Client/server and interorganizational networks

  • 5/28/2018 Internetworked Enterprise

    23/51

    Types of Telecommunications networks.

    Local Area Network

    A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally

    limited to a geographic area such as a writing lab, school, or building.A LANconnects network devices over a relatively short distance. A networked office building,

    school, or home usually contains a single LAN, though sometimes one building will contain a few

    small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings.

    In addition to operating in a limited space, LANs are also typically owned, controlled, and

    managed by a single person or organization. They also tend to use certain connectivity

    technologies, primarily Ethernetand Token Ring.

    Wide Area Network

    Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the

    United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to

    connect this type of global network.

    Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds,without paying enormous phone bills. Two users a half-world apart with workstations equipped

    with microphones and a webcams might teleconference in real time. A WAN is complicated. It

    uses multiplexers, bridges, and routers to connect local and metropolitan networks to global

    communications networks like the Internet. To users, however, a WAN will not appear to be much

    different than a LAN.

    http://compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htmhttp://compnetworking.about.com/cs/ethernet1/g/bldef_ethernet.htmhttp://compnetworking.about.com/od/networkprotocols/g/token-ring-networks.htmhttp://compnetworking.about.com/od/networkprotocols/g/token-ring-networks.htmhttp://compnetworking.about.com/cs/ethernet1/g/bldef_ethernet.htmhttp://compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htm
  • 5/28/2018 Internetworked Enterprise

    24/51

    Types of Telecommunications networks.

    Metropolitan Area Network

    A network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically

    owned an operated by a single entity such as a government body or large corporation.

    A metropolitan area network(MAN) is a computer networkin which two or more computers or

    communicating devices or networks which are geographically separated but in same metropolitan city and are

    connected to each other are said to be connected on MAN. Metropolitan limits are determined by local

    municipal corporations; the larger the city, the bigger the MAN, the smaller a metro city, smaller the MAN.

    Kenneth C. Laudan and Jane P. Laudon define a metropolitan area network as:

    A Metropolitan Area Network (MAN) is a large computer network that spans a metropolitan area or campus. Its

    geographic scope falls between a WAN and LAN. MANs provide Internet connectivity for LANs in a metropolitan

    region, and connect them to wider area networks like the Internet.

    Campus Area Network

    A network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus.

    A campus network, campus area network, corporate area networkor CANis a computer networkmade up of

    an interconnection of local area networks(LANs) within a limited geographical area. The networking

    equipments (switches, routers) and transmission media (optical fiber,.) are almost entirely owned by

    the campustenant / owner: an enterprise, university, government etc

    http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Campushttp://en.wikipedia.org/wiki/Campushttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_network
  • 5/28/2018 Internetworked Enterprise

    25/51

    Client/server networks

    Client/server networkshave become the predominate

    information architecture of enterprise computing. Computingpower has rapidly become distributed and interconnected

    throughout many organizations by networked computer

    systems that take the form of client/server networks.

    Characteristics of a client/server network are:

    1.End user PC or NC workstations are the clients.

    2.Clients are interconnected by local area networks and share

    application processing with network servers, which alsomanage the networks.

    3.LANs may be interconnected to other LANs and wide area

    networks of client workstations and servers.

  • 5/28/2018 Internetworked Enterprise

    26/51

    Virtual Private NetworkMany organizations use Virtual Private Network to establish secure intranets and extranets.A virtualPrivate network is a secure network that uses the Internet as its main backbone network but relies onnetwork firewalls, encryption,and other security features of its Internet and intranet connections Thus,for example, VPNs would enable a company to use the Internet to establish secure intranets between itsdistant branch offices and the manufacturing plants, and secure extranets between itself and itscustomers and suppliers. Virtual private networks (VPN) provide an encrypted connection between a

    user's distributed sites over a public network (e.g., the Internet). By contrast, a private network usesdedicated circuits and possibly encryption.For the time being ,we can think of a VPN as a pipe travelling through the Internet. Through this pipe,we can send and receive our data without anyone outside the pipe being able to see or access ourtransmissions . Using this approach we can create a private network without incurring the high cost of aseparate proprietory connection scheme.An example of a Virtual Private Network protected by network firewalls.

  • 5/28/2018 Internetworked Enterprise

    27/51

    Peer to Peer Networks

    In a P2P network it creates a computing environment where end users computers connect,

    communicate, and collaborate directly with each other via Internet or other telecommunications

    network links.

    The emergence of peer-to-peer (P2P) networking technologies and applications is being hailed as a

    development that will revolutionize e-business and e-commerce and the Internet itself. Peer-to-peer

    network is a powerful telecommunications networking tool for many business applications .

    There can be two major models of peer to peer networking

    In the central server architecture ,P2P file sharing software connects your PC to a central server that

    contains a directory of all other users(peers) in the network . When you request a file ,the softwaresearches the directory for any other users who have that file and are online at that moment . It then

    sends you alist of usernames that are activelinks to all such users.Clicking on one of these user mames

    prompts the software to connect your PC to that users PC (making a peer to peer connection)and

    automatically transfers the file you want from his or her hard drive to yours.

    The Pure peer to peer networks architecture has no central directory or server .First the file sharing

    software in the P2P network connects your PC with one of the online users in the network .Then anactive link to your user name is transmitted from peer to peer to all the online users in the network

    that the first user (and the other online users ) encountered in previous sessions.In this way ,active links

    to more and more peers spread throughout the network the more it is used.When you request a file

    ,the software searches every online user and sends you a list of active file names related to your request

    .Clicking on one of these automatically transfers the file from that users hard drive to yours.

  • 5/28/2018 Internetworked Enterprise

    28/51

    The two major forms of Peer to Peer Network.

  • 5/28/2018 Internetworked Enterprise

    29/51

    a. Twisted Pair wire b. Coaxial Cable c. Fiber-optic cable

    a.

    b.

  • 5/28/2018 Internetworked Enterprise

    30/51

    Fiber Optics: Fiber optics- These cables are made up of plastic or glass fibre core covered by a claddingof lower refractive index.The signals in these cables are carried in the form of light .

    use cables consisting of one or more hair-thin filaments of glass fiber wrapped in a protective jacket.

    1.Relatively low cost

    2.Can carry digital signals, as well as analog thus increase communications and capability.

    3..Provide substantial size and weight reductions

    4.Provide increased speed and greater carrying capacity than coaxial cable and twisted-pair lines.

    5..Speed of communications is 10,000 times faster than that of microwave and satellite systems.6.Message security as fiber optics communications is very resistant to illegal data theft, taps can

    be easily detected.

  • 5/28/2018 Internetworked Enterprise

    31/51

    Telecommunications Processors

    Telecommunications Processors such as modems ,multiplexers ,switches and routers performa variety of support functions between the computers and other devices in atelecommunications network.

    ModemsA special device called modem (modulator/demodulator ) is used to carry out theprocess of modulation and demodulation(conversion of digital data to analog form and viceversa ).

    Hence when an analog facility is used for data communication between two digital devices(say two computers interconnected by a telephone line ),two modems are required ,one neareach device .Digital signal generated at sender computers end is converted to analog formby modulator of the modem placed near it.The analog signal is transmitted throughtelephone line and is converted to digital form by demodulator of the modem placed nearreceiver computer.The receiver computer processes the data,and thjen the modem near itmodulates the processed data to analog form .the analog data is returned via telephone lineto the sender computer end ,where analog signals are demodulated to digital form first bythe modem there ,and then the digital data is passed on to the sender computer.

    Multiplexer-A mutiplexer takes several data communication lines or signals ,and converts them

  • 5/28/2018 Internetworked Enterprise

    32/51

    into one data communication line or signal at the sending end .For example ,the multiplexer

    takes the signals from the four terminals and converts them into one large signal that is

    transmitted over one communication line.Then,at the receiving end ,another multiplexer breaks

    the single large signal into the four original signals .Without multiplexers ,four separate

    communication lines would be required.

    A multiplexer is a communication process or that allows a single communication channel to carrysimultaneous data transmission from many terminals.

    For example if we need to have eight telephone numbers for a small business,we could have

    eight individual lines come into the buildingone for each telephone number .using a digital

    multiplexer however,we can have one line handle all eight telephone numbers (assuming we have

    an eight channel multiplexer).

    ROUTER- A routeris a device that forwards data packetsbetween computer networks. This

    creates an overlay internetwork. A router is connected to two or more data lines from different

    networks. When a data packet comes in one of the lines, the router reads the address

    information in the packet to determine its ultimate destination. Then, using information in

    its routing tableor routing policy, it directs the packet to the next network on its journey. Routers

    perform the "traffic directing" functions on the Internet. A data packet is typically forwarded fromone router to another through the networks that constitute the internetwork until it reaches its

    destination node

    http://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internetworkhttp://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Internetworkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Data_packet
  • 5/28/2018 Internetworked Enterprise

    33/51

    Digital And Analog Signals

    Analogand digitalsignals are used to transmit information, usually through electric

    signals. In both these technologies, the information, such as any audio or video, is

    transformed into electric signals.

    When data is propagated by means of electrical signals ,the signals may be either in

    digital or analog form

    Analog signal : Transmitted power varies over a continuous range .Example sound,light

    and radio waves.

    Digital signal: Sequence of voltage pulses represented in binary form

    Computer generated data signal is digital, whereas telephone line carry analog signals.

  • 5/28/2018 Internetworked Enterprise

    34/51

  • 5/28/2018 Internetworked Enterprise

    35/51

    Communication ProtocolsA protocol is a set of formal operating rules ,procedures ,or conventions that govern a given

    process. A communication or network protocol, therefore describes rules that govern

    transmission of data over communication networks.These rules provide a method for orderly

    and efficient exchange of data between sender and receiver.These rules are embedded in datacommunication software.

    Roles of A communication Protocol

    1.Data Sequencing- It refers to breaking a long message into small packets of fixed size

    2. Data Routing- Routing is designed to find the most efficient path between source and

    destinations nodes of a message.

    3. Data Formatting- These rules define which bits or characters within a packet constitutes data,control,addressing ,or other information

    4. Flow Control- A communication protocol also prevents a fast sender from flooding a slow

    receiver with data

    5. Error Control- These rules are designed to detecty error in messages and to ensure

    transmission of correct messages.

    6.Precedence and order of transmission- these rules ensures that all nodes get a chance to usecommunication lines and other resources of a network based on priorities assigned to them.

    7. Connection establishment and termination- These rules define how connections are

    established ,maintained and terminated when two nodes of a network want to communicate

    with each other.

    8.Data Security- Providing data security and privacy is also built into most communication

    software packages .It prevents access of data by unauthorized users.

  • 5/28/2018 Internetworked Enterprise

    36/51

    The OSI Model

    OSI (Open Systems Interconnection) is a standard description or "reference model" for how

    messages should be transmitted between any two points in a telecommunication network.Its purpose is to guide product implementors so that their products will consistently workwith other products. The reference model defines seven layers of functions that take placeat each end of a communication.

    The main idea in OSI is that the process of communication between two end points in atelecommunication network can be divided into layers, with each layer adding its own set ofspecial, related functions. Each communicating user or program is at a computer equipped

    with these seven layers of function. So, in a given message between users, there will be aflow of data through each layer at one end down through the layers in that computer and, atthe other end, when the message arrives, another flow of data up through the layers in thereceiving computer and ultimately to the end user or program.

    OSI divides telecommunication into seven layers. The layers are in two groups. The upper

    four layers are used whenever a message passes from or to a user. The lower three layers(up to the network layer) are used when any message passes through the host computer.Messages intended for this computer pass to the upper layers

    http://searchnetworking.techtarget.com/definition/networkhttp://searchnetworking.techtarget.com/definition/network
  • 5/28/2018 Internetworked Enterprise

    37/51

    The OSI Model

    The seven layers are: Layer 7: The application layer...This is the layer at which communication partners are identified,

    quality of service is identified, user authentication and privacy are considered, and any constraintson data syntax are identified. (This layer is notthe application itself, although some applicationsmay perform application layer functions.)

    Layer 6: The presentation layer...This is a layer, usually part of an operating system, that convertsincoming and outgoing data from one presentation format to another.

    Layer 5: The session layer...This layer sets up, coordinates, and terminates conversations,

    exchanges, and dialogs between the applications at each end. It deals with session and connectioncoordination.

    Layer 4: The transport layer...This layer manages the end-to-end control (for example, determiningwhether all packets have arrived) and error-checking. It ensures complete data transfer.

    Layer 3: The network layer...This layer handles the routing of the data (sending it in the rightdirection to the right destination on outgoing transmissions and receiving incoming transmissionsat the packet level). The network layer does routing and forwarding.

    Layer 2: The data-link layer...This layer provides synchronization for the physical level and does bit-

    stuffing for strings of 1's in excess of 5. It furnishes transmission protocol knowledge andmanagement.

    Layer 1: The physical layer...This layer conveys the bit stream through the network at the electricaland mechanical level. It provides the hardware means of sending and receiving data on a carrier.

  • 5/28/2018 Internetworked Enterprise

    38/51

    Use of Extranet to streamline supply chain management

  • 5/28/2018 Internetworked Enterprise

    39/51

    Use of Extranet to streamline supply chain management

    The supply chain according to Laudon and Laudon is a collection of physical entities linked

    together into processes that supply goods or services from source through consumption

    (2000). The physical entities in the supply chain consist of suppliers, manufacturers,

    distributors, retail outlets, and consumers. The following diagram demonstrates the flow ofgoods through the supply chain starting with the supplier and ending with the consumer.

  • 5/28/2018 Internetworked Enterprise

    40/51

  • 5/28/2018 Internetworked Enterprise

    41/51

    Explain Malware, Adware and Spyware

    Spyware is software that gathers information about you, your browsing

    and Internet usage habits, as well as other data. Adware is software that

    displays advertising banners, re-directs you to websites, and otherwiseconducts advertising on your computer (not to be confused with popup ads,

    which come from the websites that you visit). Malware is malicious software

    that is intended to do harm to your computer or software. Malware includes

    viruses, Trojans, and worms.

    Many users inadvertently download spyware or adware when downloading

    other programs. Many popular peer to peer applications and other software

    packages include adware or spyware packages. Even seemingly innocuous

    programs such as special cursors can contain spyware.

  • 5/28/2018 Internetworked Enterprise

    42/51

    What do you mean by e commerce ? Differentiate it with e-

    business giving practical examples

    Electronic commerce or e-commerce has been defined as the ability to performtransactions involving the exchange of goods or services between two or moreparties using electronic tools and technique. The explosion of E-commerce hascreated new phenomena in our lifestyle especially in shopping activities.Consumers can easily buy products or services like magazines and airlines ticketsvia Internet.

    Kalakota and Whintons in 1997 defined the term E-commerce from different

    perspectives. These perspectives are: Communication Perspective:According to this perspective, E-commerce is the

    delivery of information, product/services or payments over tele-communicationchannels, computer networks or any other electronic mode of communication.

    Business Process Perspective:This says that E-commerce is the application oftechnology towards the automation of business transactions and work flow.

    Service Perspective:E-commerce is defines as a tool that addresses the desire offirms, consumers and management to cut service cost while improving the qualityof goods/services and increasing the speed of service delivery.

    Online Perspective:E-commerce provides the capability of buying and sellingproducts and information on the internet and other online services.

    Types of E-Commerce

  • 5/28/2018 Internetworked Enterprise

    43/51

    There are five major segments under the broader category of e-business. However, the following are some

    popular e-commerce models used by companies engaged in ecommerce:-

    Business to Business E-commerce (B2B)

    Business to business e-commerce is smart business. The opportunity for business to business e-commerce is

    even greater. In a B2B transaction, the interaction is between businesses. For example, a website that is

    catching for the steel industry might have facility for buyers and sellers to list their requirements and post their

    products. It helps them in quickly closing the transactions and the buyer can get quality, material and can

    choose from different suppliers.

    Business to Consumers E-commerce (B2C)

    It is for the customers to buy stores from the web. The problem to be recognized in this is to secure payment,

    using encryption, transaction integrity, quick response, time and reliability.

    B2C e-commerce involves selling of goods and services to consumers or end users. It allows them to browse theproduct catalogue, select products or services and complete the order online.

    In a B2C transaction, the interaction is between a consumer and the preferred business. For example, the most

    popular site is amazon.com, which is the first online bookseller which has proved a potential competitor to the

    traditional bricks and mortar booksellers such as Barrens and Noble.

    Consumer to Consumer E-commerce (C2C)

    Here interaction is between consumer to consumer. For example, in sites like e-Buy Bid or Buy.com, Baazi.com

    which are auction sites, one can virtually sell and buy any goods (either used or new ones). This form of e-

    commerce is nothing but the cyber version of the good old auction houses. If anyone wants to sell anything, all

    one has to do is post a message on the site, giving details of the product and the expected price and wait for an

    interested customer to turn up and buy it. The buyer gets in touch with the seller through the Internet and the

    deal is crossed once the amount is finalised.

  • 5/28/2018 Internetworked Enterprise

    44/51

    Consumer-to-Business E-commerce (C2B)

    E-commerce, by empowering the customer, has been strategically

    redefining business. An example of C2B model of e-commerce is the

    site Price line.Com, which allows prospective airline travellers, tourists

    in need of hotel reservations etc. to visit its websites and indicate theirpreferred price for travel between any two cities. If an airline is willing

    to issue a ticket on the customers offered price, the consumer can

    then travel to the mentioned destination at his terms.

    Business to Employees E-commerce (B2E)

    This is concerned more with marketing a corporation's internalprocesses more efficiently. Customer care and support activities also

    hold ground. The requirement is that are all self-service with

    applications on the web that the employees can use themselves.

  • 5/28/2018 Internetworked Enterprise

    45/51

    Difference Between E commerce And E BusinessThe terms e-business and e-commerce are now often seen and used interchangeably. However, though

    related, they have different meanings. The e prefix means electronic which connotes any activity or

    transaction done without any physical exchanges or contact. E-commerce implies business transactions over

    the internet where the parties involve are either selling or buying. The transactions conducted in e-commerce

    basically involve the transfer or handing over ownership and rights to products or services.E-commerce principally involves money exchanges in the transactions. In e-business, as it is broader, it is not

    limited to monetary transactions. All aspects in business are included like marketing, product design, supply

    management, etc. E-business is more about making great products, brainstorming and giving quality service,

    planning about product exposure and executing it. Many companies have an eCommerce site but are not yet

    an eBusiness. eCommerce is the online selling component of a web site. eBusiness is the integration of a

    company's activities including products, procedures, and services with the Internet. You turn your company

    from a business into an eBusiness when you integrate your sales, marketing, accounting, manufacturing, and

    operations with your web site activities. An eBusiness uses the Internet as fully integrated channel for all

    business activities.

    The following is an example of a company that has not yet become an eBusiness: You visit a retailer's web site

    and buy a shirt. When the shirt arrives it is in the wrong size. You decide to return the shirt at the store's retail

    outlet instead of mailing it back to the vendor. However, when you go to the store you are told that they cannot

    take returns from their web site. Since the web site is not integrated with the rest of their business activities

    this company is not yet an eBusiness. If the company had integrated their web site with their stores byproviding access to their web site from within the store, by accepting exchanges for sales made online, and by

    training their people to support customers from/with their web site, they would be an eBusiness. eBusinesses

    do not consider the web site as a separate activity from their core businesses: The web site is integral to all

    activities at an eBusiness.

  • 5/28/2018 Internetworked Enterprise

    46/51

    What do you mean by software Packages? Describe six

    software packages in brief.

    .A software package is a group of programs which are bundled together to serve a commonpurpose. Often, a software package will also include the source code that built the executableprograms as well as a variety of documentation for the programs themselves. Some softwarepackages will also include example files that can further illustrate how the other components of thepackage work.

    The components of a software package can do significantly different things, but all the componentsof the package come together in a unified whole. Some software packages have one main programthat encapsulates all the smaller programs, while others take a more fragmented approach and

    have multiple small, specialized executables for different purposes. There are advantages anddisadvantages to each approach, as well as specific audiences that benefit from each.

    Packages that encapsulate all their functionality into one large program are useful for mostcomputer users. They are usually easy to install, relatively easy to understand, and fairly easy torun. At times, a user can downloadadd-ons for them, but this is all done behind the scenes withminimal interaction and effort from that user. All-in-one softwarepackages like these are availablefor many purposes, from document management to 3D modelingand image rendering.

    Software packagemay refer to: Package (package management system),

    A piece of application softwareor utility software

    A software suite or collection of related application or utility software.

    http://www.wisegeek.com/what-is-a-download.htmhttp://www.wisegeek.com/what-is-a-download.htmhttp://www.wisegeek.com/what-is-3d-modeling.htmhttp://www.wisegeek.com/what-is-3d-modeling.htmhttp://en.wikipedia.org/wiki/Package_(package_management_system)http://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Package_(package_management_system)http://www.wisegeek.com/what-is-3d-modeling.htmhttp://www.wisegeek.com/what-is-a-download.htm
  • 5/28/2018 Internetworked Enterprise

    47/51

    Types of Software Packages 1.Word processor -Word processing is usually what leads people to using a computer for their work. Word processors will normally have the

    following capabilities built into them:

    Spell checking

    Standard layouts for normal documents

    Have some characters appear in bold print, italics, or underlined

    Center lines, make text line up on the left side of the paper, or the right side of the paper

    Save the document so it can be used again

    print the document.

    Two of the most common word processing programs are WordPerfect and Microsoft Word.

    2.Spreadsheets- The spreadsheet packages are designed to use numbers and formulas to do calculations with ease. Examples of spreadsheetsinclude:

    Budgets

    Payrolls

    Grade Calculations

    Address Lists

    The most commonly used spreadsheet programs are Microsoft Excel and Lotus 123.

    3.Databases- Database programs are designed for these types of applications:

    Membership lists

    Student lists

    Grade reports

    Instructor schedules

    All of these have to be maintained so you can find what you need quickly and accurately. Some of the most commonly used database programs areMicrosoft Access and dBASE.

  • 5/28/2018 Internetworked Enterprise

    48/51

    4.Graphic presentations-The presentation programs can make giving presentations and usingoverheads easier. Other uses include:

    Slide Shows

    Repeating Computer Presentations on a computer monitor

    Using Sound and animation in slide shows

    The most recognized graphic presentation programs are Microsoft PowerPoint and HarvardGraphics.

    5.Web Browsers -Web Browsers provide an easy to surf the Internet. Use search engines to find people, places, and things world-wide.

    Create your own web page to tell the world about you and your job.

    Advertise your company and special activities.

    To date, no other planet has placed web pages on the webbut nothing should surprise you!Thetwo most popular web browsers are Netscape and Microsoft Internet Explorer.

    6.Groupware- Groupware is a software that helps workgroups and teams collaborate to accomplishgroup assignments.Groupware is a category of general purpose application software that combines

    a variety of software features and functions to facilitate collaboration.Groupware products rely onthe internet and corporate intranets and extranets to make collaboration possible on a global scaleby virtual teams located anywhere in the world.For example team members might use the Internetfor global email,project discussion forums and joint web page development

    What do you mean by operating system? Describe three

  • 5/28/2018 Internetworked Enterprise

    49/51

    operating systems in detail. The most important system software package for any computer is its operating system. An

    operating system is an integrated system of programs that manages the operations of theCPU, controls the input/output and storage resources and activities of the computer system,

    and provides various support services as the computer executes the application programs of

    users.

    The primary purpose of an operating system is to maximize the productivity of a computer

    system by operating it in the most efficient manner. An operating system minimizes the

    amount of human intervention required during processing. It helps your application

    programs perform common operations such as accessing a network,entering data, saving and

    retrieving files, and printing or displaying output. If you have any hands-on experience on a

    computer, you know that the operating system must be loaded and activated before you can

    accomplish other tasks. This emphasizes the fact that operating systems are the most

    indispensable components of the software interface between users and the hardware of

    their computer systems.

    Th O i S

  • 5/28/2018 Internetworked Enterprise

    50/51

    Three Operating Systems

    UNIX

    Originally developed by AT&T, UNIX now is also offered by other vendors, including Solaris by Sun

    Microsystems and AIX by IBM. UNIX is a multitasking, multiuser, network-managing operating systemwhose portability allows it to run on mainframes, midrange computers, and microcomputers. UNIX is

    still a popular choice for Web and other network servers.

    LINUX

    Linux is a low-cost, powerful, and reliable UNIX-like operating system that is rapidly gaining market

    share from UNIX and Windows servers as a high-performance operating system for network servers and

    Web servers in both small and large networks. Linux was developed as free or low-cost shareware or

    open-source software over the Internet in the 1990s by Linus Torvald of Finland and millions ofprogrammers around the world. Linux is still being enhanced in this way, but is sold with extra features

    and support services by software vendors such as Red Hat, Caldera, and SUSE Linux. PC versions, which

    support office software suites, Web browsers, and other application software, are also available.

    Mac OS X

    Actually based on a form of UNIX, the Mac OS X is the latest operating system from Apple for the iMac

    and other Macintosh microcomputers. The Mac OS X version 10.2 Jaguar has an advanced graphical

    user interface and multitasking and multimedia capabilities, along with an integrated Web browser, e-mail, instant messaging, search engine, digital media player, and many other features.

  • 5/28/2018 Internetworked Enterprise

    51/51

    Assignment

    What do you mean by Microsoft office?

    Define its attributes in detail with its use and

    importance.

    Define contemporary issues of e-commerce

    in India with its counterparts in ASIA.