- UNIT-I

































Architecture of the Internet




Extranet products & services


Electronic Payments & Protocols




Managerial Issues
The Largest Extranet, Architecture of the Internet
An Extranet is a restricted public network that is shared on a limited basis. Extranets are typically constructed. internet with security features that restrict access to authorized individuals and digital entities.
The following examples largest extranet.
Project Extranet
A construction project uses an extranet to share documents with stakeholders such as project management tea subcontractors. The extranet consists of a document management system connected to the internet with secure that limit access to authorized individuals.
Supplier Extranet
A retailer offers an extranet to supply chain partners to facilitate processes such as invoice payment and revere The extranet consists of a custom built website that is restricted to authorized partners with techniques such authentication.
Integration
An ecommerce site integrates with a major retail partner to automatically exchange inventory data using a sec network on top of the internet.
Employee Extranet
A restaurant chain offers employees an extranet that allows them to view their timesheets and other data. The allows employees to submit any concerns or recommendations they have without their manager seeing it. The allows the restaurant's corporate functions such as human resources to connect directly to employees.
Architecture of the Internet
The Internet architecture is based on a simple idea: ask all networks want to be part of carrying a single packet type, a specific format the IP protocol. In addition, this IP packet must carry an address defined with sufficient generality in order to identify each computer and terminals scattered throughout the world
To complete the IP, the US Defense added the TCP protocol; specify the nature of the interface with the user. This protocol further determines how to transform a stream of bytes in an IP packet, while ensuring quality of transport this IP packet. Both protocols, assembled under the TCP / IP abbreviation, are in the form of a layered architecture. They correspond to the packet level and message-level reference model.
The Internet model is completed with a third layer, called the application level, which includes different protocols on which to build Internet services. Email (SMTP), the file transfer (FTP), the transfer of hypermedia pages, transfer of distributed databases (World Wide Web), etc., are some of these services. Figure shows the three layers of the Internet architecture
IP packets are independent of each other and are individually routed in the network by interconnecting devices subnets, routers. The quality of service offered by IP is very small and offers no detection of lost or possibility of error recovery packages.
TCP combines the functionality of message-level reference model. This is a fairly complex protocol, which has many options for solving all packet loss problems in the lower levels. In particular, a lost fragment can be recovered by retransmission on the stream of bytes. TCP uses a connection-oriented mode.
An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network.[1]The application layer abstraction is used in both of the standard models of computer networking: the Internet Protocol Suite (TCP/IP) and the OSI model.
कोई टिप्पणी नहीं:
एक टिप्पणी भेजें