Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Need an argumentative essay on Assignment Communications and networks. Needs to be 12 pages. Please no plagiarism.Download file to see previous pages... The unauthorized access from internet users mus

Need an argumentative essay on Assignment Communications and networks. Needs to be 12 pages. Please no plagiarism.

Download file to see previous pages...

The unauthorized access from internet users must be barred through access rules.

Security procedures like VPN or SSL, digital signatures, authentication etc on Extranet provide extra security to the information transported on the extranet as compared to open internet.

Extranet security can be enhanced with leased line connections.

B2B

The automation of the organization procedure e.g. demand-supply, object tracking system.

There could be security issues in terms of sharing employee /branch information.

Not used for B2B.

Security of the business processes must be ensured.

Secure VPN tunnels can be established over internet to connect B2B sites without additional external infrastructure.

Additional external infrastructure and maintenance is required if Extranet is not run over internet.

The extranet is more secure than VPN over internet for B2B when deployed on leased lines.

e-commerce

The VAN services are limited to the intranet users.

The output/input of VAN procedures is input/output to online e-commerce site.

Not used for e-commerce.

Not used for e-commerce.

Privacy of User information e-mail, credit cards etc)

Competition amongst business.

Internet provides the infrastructure backbone for e-commerce.

E-commerce is the revenue earning source in terms of more business for ISPs and e-commerce providers.

The extranet customer base is not as wide as internet.

The extranet can be run over secure VPN tunnels or leased lines to other business partners for e-commerce.

Define each following term and state their negative and positive

LAN - Local Area Network, NETBIOS protocol based physical network systems limited to a building. The protocol used could be IBM/NBF, Internet TCP/IP, or Novell IPX/BPX.

WAN - Wide Area Network,...

extranet provides for employee to employee communication, employee to customer and organization to organization.

Ring - The computing systems connected such that the cable runs from one system to another and thus forming a closed circuit. Thin-wire Ethernet cable is used for the ring networks. E.g. IBM/NBF token ring LAN.

Mesh - A network of computing systems where each system is connected to all other systems. The connection could be either through external physical media like cable or a switch. 10Base-T/100BaseTX Ethernet or gigabit Ethernet cables are used.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question