Skip to main content

Structure of Extranets

An extranet uses the TCP/IP protocol to link intranets in different locations (figure 3.4)



Extranet transmissions are usually conducted over the internet, which offers little privacy or transmission security. Therefore, it is necessary to add security features. This is done by creating tunnels of secured data flows, using cryptography and authorisation algorithms, to provide secure transport of private communications. An internet with tunneling technology is known as a Virtual Private Network (VPN)

Extranets provide secured connectivity between a corporation's intranets and the intranets of its business partners, materials suppliers, financial services, government, and customers. Access to an extranet is usually limited by agreements of the collaborating parties, is strictly controlled, and is available only to authorised personnel. The protected environment of an extranet allows partners to collaborate and share information and to perform these activities securely. 

An extranet allows connectivity between businesses through the internet; it is an open and flexible platform suitable for supply chain activities. To further increase security, many companies replicate the portions of their databases that they are willing to share with their business partners and separate them physically from their regular intranets.

Previous Next



Comments

Popular Post

Procurement Management Using Buyer's Internal Market Place

Improvements to procurement have been attempted for decades, usually by using information technologies. The real opportunity for improvement lies in the use of e-procurement, the electronic acquisition of goods and services for organisations. The general e-procurement process (with the exception of tendering) is shown in figure 2.8 .  One effective solution to the procurement problem in large organisations is to aggregate the catalogues of all approved suppliers, combining them into a single internal electronic catalogue. Prices can be negotiated in advance or determined by a tendering, so that the buyers do not have to negotiate each time they place an order. By aggregating the suppliers' catalogues on the buyer's server, it is also easier to centralise and control all procurement. Such an aggregation of catalogues is called an internal procurement marketplace .  Benefits of Internal Marketplaces   1) Corporate buyers can use search engines to look through internal aggre...

Infrastructure for EC

Introduction The e-commerce infrastructure is defined here as the supporting capabilities for online trading between multiple companies which include hardware, software, networks, online payment technologies, security and encryption technologies, online trading business models, legal and regulatory framework, and managerial and organisation capabilities.  Infrastructure is the shared human, informational , and technical resources on which the work system relies in order to operate, even though these resources exist and are managed outside of the work system.  To evaluate the interdisciplinary aspects of construction e-commerce infrastructure, one proposes using a four pillar approach. Figure 5.1 illustrates the skeleton for the proposed integrated construction e-commerce infrastructure. The proposed integrated e-business infrastructure can be broken down into the following four groups of components:  1) Technological Infrastructure : Technology infrastructure is a work...

What is COVID-19 ?

COVID-19 is a disease caused due to the infection of novel coronavirus. The first case of COVID-19 disease was founded at Wuhan, China in December 2019. It also named as severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). COVID-19 is the most widely spread disease ever in the world. In most cases it infects the respiratory system that causes fever, dry cough, and shortness of breath. Previous : What is the difference between coronavirus and COVID-19 ?