An extranet uses the TCP/IP protocol to link intranets in different locations (figure 3.4)
Extranet transmissions are usually conducted over the internet, which offers little privacy or transmission security. Therefore, it is necessary to add security features. This is done by creating tunnels of secured data flows, using cryptography and authorisation algorithms, to provide secure transport of private communications. An internet with tunneling technology is known as a Virtual Private Network (VPN).
Extranets provide secured connectivity between a corporation's intranets and the intranets of its business partners, materials suppliers, financial services, government, and customers. Access to an extranet is usually limited by agreements of the collaborating parties, is strictly controlled, and is available only to authorised personnel. The protected environment of an extranet allows partners to collaborate and share information and to perform these activities securely.
An extranet allows connectivity between businesses through the internet; it is an open and flexible platform suitable for supply chain activities. To further increase security, many companies replicate the portions of their databases that they are willing to share with their business partners and separate them physically from their regular intranets.
| Previous | Next |
|---|

Comments
Post a Comment