Views of networks
Users and network administrators typically
have different views of their networks. Users can share printers and some
servers from a work group, which usually means they are in the same geographic
location and are on the same LAN, whereas a Network Administrator is
responsible to keep that network up and running. A community of interest has less of a connection of
being in a local area, and should be thought of as a set of arbitrarily located
users who share a set of servers, and possibly also communicate via peer-to-peer technologies.
Network administrators can see networks from
both physical and logical perspectives. The physical perspective involves
geographic locations, physical cabling, and the network elements (e.g., routers, bridges and application layer gateways)
that interconnect the physical media. Logical networks, called, in the TCP/IP
architecture, subnets, map onto one or more physical media. For example, a
common practice in a campus of buildings is to make a set of LAN cables in each
building appear to be a common subnet, using virtual LAN (VLAN) technology.
Both users and administrators are aware, to
varying extents, of the trust and scope characteristics of a network. Again
using TCP/IP architectural terminology, an intranet is a community of interest under private
administration usually by an enterprise, and is only accessible by authorized
users (e.g. employees). Intranets do not have to be connected to the
Internet, but generally have a limited connection. An extranet is an extension of an intranet that allows
secure communications to users outside of the intranet (e.g. business partners,
customers).
Unofficially, the Internet is the set of
users, enterprises, and content providers that are interconnected by Internet Service Providers (ISP). From an engineering
viewpoint, the Internet is the set of subnets, and aggregates of
subnets, which share the registered IP address space and exchange information about the
reachability of those IP addresses using the Border Gateway Protocol.
Typically, the human-readable names of servers are translated to IP
addresses, transparently to users, via the directory function of the Domain Name System (DNS).
Over the Internet, there can be business-to-business (B2B), business-to-consumer (B2C) and consumer-to-consumer
(C2C) communications. When money or sensitive
information is exchanged, the communications are apt to be protected by some
form of communications security mechanism. Intranets and
extranets can be securely superimposed onto the Internet, without any access by
general Internet users and administrators, using secure Virtual Private Network (VPN) technology.
No comments:
Post a Comment