Professional Documents
Culture Documents
Data network
A data network is a group of computers connected to one another by communication
paths, as well as the standards that allow communication. A network can connect to
other networks, allowing virtually worldwide communication between two endpoints.
Many networks share information among one another, creating larger networks.
Figure 1-1 is an example of a segment of a network.
how data can be shared by the medical profession. Lab work can be returned more
quickly, allowing for a more immediate diagnosis. Many hospitals are now allowing xrays and other data to be viewed over a network.
The Internet
The Internet was developed mainly upon its predecessor, the Advanced Research
Projects Agency Network (ARPANET). In addition to the Web, it encompasses a
worldwide collection of networks, including academic institutions, government
organizations, various public networks, as well as private networks (hopefully with
the appropriate security measures in place).
Intranets
An intranet is an IP-based network that is administered and controlled by a single
entity. An intranet is a controlled network, with only users who have authorization to
be on the network granted access to it (both remotely and physically onsite). A
corporate LAN is an example of an intranet.Although intranets are based on (and
operate like) the Internet, they are not widely available to just anyone who needs to
access them. Security is in place (firewalls, encryption and authentication measures,
etc.) that will restrict access to only those who need the access. This allows remote
users to access work applications over the Internet, while preventing unauthorized
users from gaining access.
Extranets
An extranetis an intranet that is opened up to allow outside users (e.g., vendors,
suppliers, employees, customers) access to the intranet (or any portion thereof). The
access normally is provided by a server, which clients access over the Internet. An
extranet operates securely to ensure that only authorized users are entitled access
to the intranet. An extranet may comprise any of the following for security and
privacy purposes
Firewall Network hardware and/or software that captures data passing
through it and determines whether to pass or drop the data. Firewalls are
configurable, and filters can be applied to provide the appropriate security for
the LAN.
Public key certificate An electronic document that can verify and authorize
an individual by public key cryptography. Public key cryptog-raphy uses two
keys (one public key and one private key) to encrypt and then decrypt data to
ensure that a message can be transported securely
Authentication encryp-tion (AE) A system that is able to protect both the
secrecy and the integrity of data communication.
Virtual private network (VPN) A network that is created when one net-work
connects to another by a secure tunnel.