Characteristics of extranet
Not long ago, FedEx showed its freight tracking system to the public.
Generally speaking, FedEx customers can visit FedEx's website, browse the freight list and fill in the necessary forms.
You can even track the running route of your own goods. FedEx has the earliest and most websites.
A famous example of extranet. Extranet is an option for external users.
Intranet of sexual services, but strictly speaking, it is not an intranet application, do its best.
Although anyone can visit Fd ex's website, only its customers are interested in it.
The exact definition of Extranet is still under discussion, but most people can accept Ext.
Ranet is defined as: Extrn et is a company that uses Internet/Intranet technology to do business.
Connect its customers and other enterprises to complete their cooperation network with the same goal. The extranet may
As a bridge between public internet and private intranet, it can also be regarded as
Is a part of the intranet, which can be accessed by enterprise members or cooperated with other enterprises.
. Extranet is usually behind a firewall like Inr anet, but unlike the Internet, it is
The public only provides public communication services and intranet services for internal enterprises, not for the public.
Open, but open to some selective partners or provide selective services to the public. and
Ranet access is semi-private, users are groups composed of closely related enterprises, and information can be found in
Enjoy in the circle of trust. Exra net is very suitable for time-sensitive information sharing and enterprises.
Between the completion of * * * activities and interests.
Extranet has the following characteristics:
●Extranet is not limited to the members of the organization, it can go beyond the organization, especially including that.
Suppliers and customers that some organizations want to establish contact with;
●Extranet is not really open, it can provide enough access control.
Keep external users away from internal data;
● Extranet is an idea, not a technology. It uses standard Web and Int.
Ernet technology is different from other networks, and it is the viewpoint and strategy of establishing Extranet applications.
The essence of ●Extranet is application, just an integrated extension (not system design).
Some technical applications.
Application of extranet
Extranet can be used for all kinds of business activities, of course, extranet is not needed.
The only way to do business, but use extranet instead of private network for your business and
The income from other enterprises' business activities is enormous. Exta net puts the existing in the enterprise.
Now the network extends beyond the enterprise, which makes it possible to complete some cooperative business applications (such as enterprises)
E-commerce, supply management, etc. Between the industry and its customers and suppliers). The extranet may
Complete the following application:
Maintenance and dissemination of information: the latest sales information can be sent regularly through the external network.
Distribute it to salespeople all over the world in various forms, instead of the original copy and Ang.
Special delivery for you. Any authorized user can browse Extran all over the world.
Et access, update information and communication, so as to add/modify new messages that change every day,
Operations such as updating customer files become simple.
Online training: the click operation and intuitive function of the browser make it easy for users.
You can join online business activities. In addition, flexible online help and online user support.
This mechanism also makes it easy for users to find the answers they need.
Cooperation between enterprises: Extranet can provide more effective letters to enterprises through the Web.
The communication mechanism of information exchange channels can transmit more information to customers. Through the extranet
Compared with the traditional business information exchange, e-commerce can be carried out more effectively and economically.
And it can reduce costs and reduce cross-enterprise cooperation and business activities on a large scale.
The complexity of sports.
Sales and marketing: Extranet enables salespeople to know the latest information from all over the world.
Customer and market information is updated and maintained by enterprises and protected by powerful extranet.
The whole architecture protects its security. All information can be based on the rights and privileges of users.
Access and download through the network.
Customer service: Extranet can safely and effectively manage the transportation of the whole customer through the Web.
During the line process, it can provide customers with ordering information and the trajectory of goods, and can provide customers with solutions.
Solve basic problems, issue special technical announcements, and obtain the following customer information.
In the future, it will be easier to realize various forms of customers by using Extranet.
Support (desktop help, email and multimedia email, etc.). ).
Product, project management and control: Managers can quickly generate and release the latest products.
Product, project and training information can be carried out online by project team members in different regions.
Exchange, * * * enjoy documents and achievements, set up virtual laboratories on the Internet, and conduct cross-regional cooperation.
Work. Task management and team work tools provided in Extranet should be able to display work in time.
Bottleneck in the flow, and take corresponding measures.
Using extranet can bring the following benefits:
● Providing all kinds of timely and effective services to customers can improve customer satisfaction;
● Because employees don't have to spend time searching for information, productivity is improved;
● Because the cost of copying, printing, communication and distribution of paper is reduced, the production cost is greatly reduced.
Production cost;
● Cross-regional project cooperation can be realized through the Internet;
Different from the previous text information, the information in Extranet can be in various forms.
Formal embodiment;
● Various hardware, databases and operating systems from different manufacturers can be integrated together, and
And by using the openness of the browser, the application can be used on various platforms only once;
● Information in the original system can be referenced and browsed (still maintained by the original system).
The Architecture and Main Technologies of Extranet
Extranet is usually the logical coverage of intranet and Internet infrastructure, and only
Use access control and routing tables for control instead of building a new physical network. extranet
Usually, two or more existing intranets are connected together, and each intranet consists of distributed intranets.
Some networks and other facilities. The architecture of extranet needs standardization.
, flexibility, scalability and expansibility, to help enterprises build their own business and other applications.
Use:
Industrial standard: Special closed systems and equipment have great limitations and may be very strict.
It seriously hinders the flexibility of the interface with new applications, and the system goes to a large HTTP or database server.
Portability and extensibility combined with new elements, users or functions. Extranet is the most
It is best to build on the basis of industrial standards (such as HTTP or SQL protocol), which makes the system
Maximum growth and maintenance flexibility.
Software architecture: Extranet is built on the software runtime of a large number of parallel users.
On the basis of maximum efficiency. CGI, PERL and other general descriptive languages are common languages for tools.
The integration of Internet environment with a large number of users has serious limitations. Due to that mix of C++ dough
Object-oriented programming language is compatible and reliable, so it is recommended as Extranet software.
Software platform and application development.
Integration of various technologies: the successful Extranet technology should be to make Internet, Int.
Ranet and Extranet environment are closely and naturally combined. This makes the enterprise affected by the following factors.
Control network (Extranet), private closed network (Inta net), open network (Int
Ernet) and other environments.
The existing open application technologies and standards widely support the application of Internet technology, which makes
All extranet applications provide a wide range of features and functions. These technologies and standards are
The cornerstone of establishing extranet and network enterprises;
HTML and HTTP support the creation, publishing and information sharing of platform-independent content;
Java, JavaScript and CORBA (Common Object Request Agent A
Rchitecture) makes it possible to develop platform-independent software and access it using distributed objects.
Line development;
SMTP (simple mail transfer protocol), IMAP (internet Mes)
Sage access protocol), MIME (multipurpose internet mail extension)
S/MIME (secure MIME), NNTP(Netor kNews transport protocol
Ocol) and RTP (Real-time Protocol) are several ways to provide e-mail, discussion and meeting.
Protocols with application capabilities, etc. Which can be used to provide platform-independent communication and collaboration;
Ldap (lightweight directory access protocol), X.509 and SN.
Mp (Simple Network Aging Protocol) provides directory and security services.
Network management ability.
Network communication is an important technology in the process of establishing Extranet, and only by solving this problem well.
This problem can make Exr anet reach a higher level in efficiency, safety and application.
Ping. The network communication of extranet shall meet the following technical requirements:
Communication between all organizations should be connected through the public internet, not through.
Private line;
It should be able to carry out point-to-point and point-to-multipoint communication between multiple external network sites.
Letter;
All extranet participants will be able to use standard network protocols and applications.
Communication between projects;
For those users who need appropriate network bandwidth and low connection delay to support multimedia numbers.
Extranet will be able to use standards for specific applications, such as streaming, large file transfer and low response time.
Quasi-network protocol maintains corresponding bandwidth between sender and receiver;
All data communication between enterprises will pass through the firewall of enterprises and meet the requirements of local security.
All protocols required for communication.
In the external network environment, participants should not have mandatory requirements for specific products;
Secure private communication between enterprises will not depend on special mechanisms or products.
Extranet application technology
Extranet applications can provide useful tools for e-commerce or other commercial applications.
The integration ability enables Extrant to expand its functions to better meet the needs of enterprises. Ex-husband; Ex-wife; Ex-boyfriend; Ex-girlfriend
The application developed and integrated in the tranet must inherit the whole security architecture of the system and maintain the e.
Integration of existing elements in xtranet environment and provide it to system administrators and user groups.
A variety of application integration solutions, otherwise Extranet may become an application island, and
The combination is not tight. Extranet's web-based applications greatly enhance the website's
Ability enables it to complete a large number of functions of the Internet. Through online communication, collaboration and meetings
Discussion on integration of different platforms and systems in distributed network. Master in extranet
Application technologies include:
Transaction management: One of the keys of every extranet is transaction management. Is it in the system?
Any requirement is a transaction of some kind. Transactions include online products in the extranet environment.
Purchase, transmit error reports or other requests/submissions. Whatever the transaction, the extranet will
Must be able to manage these transactions and deliver the required results to satisfy users.
And the requirements of system administrators.
Dynamic Web Page Generation: An effective extranet solution should be based on dynamic websites.
Key points of design and application. Elements in the Web include HTML files, JavaApplet and ActiveX.
Control, application module, etc. It can easily integrate several Web elements into a compact and reliable application.
It can quickly generate a large-scale service-oriented extranet system. Extranet should
Can dynamically generate web content and user applications according to users' rights, privileges and preferences.
Interface, you can create web pages according to each user's requirements for the system, and you can base on
Queries for users to select their content, database, application or other work elements are dynamically generated.
. Therefore, users can not only see the latest system information, but also according to personal or Extrae.
Don't observe these contents in the way defined by the webmaster. Using this technology, multiple users can
Access the same system at the same time and get information from different or customized angles.
Site operation: the operation of Extranet requires powerful site and system management tools, as well as users.
Audit management, user registration, authorization system and encryption technology are adopted in the system for control.
Who can browse and manipulate data. Remote access to a website through a web browser
The ability of operation and maintenance eliminates the obstacle that extranet depends on customers and special software.
In addition, powerful system utilities such as error logging, system reporting, event monitoring and
Notification and other functions, etc. ), which can ensure the integrity of Extranet.
Compatibility of various platforms: due to the integration of various legacy systems and databases of enterprises.
Complexity, extranet software must be open to various platforms and different industrial standards.
Portable and interoperable. At the level of operating system, HTTP server and database.
It must be compatible with industrial standards, which makes it possible to complete the existing system in Extranet.
Maximize integration.
Name and directory service: Extranet environment will provide a set of methods to discover information about Ext.
Information about the registered object (person, location, etc. ) in the ranet environment. These services will provide
The highly transparent positioning mechanism enables users to make decisions without using specific navigation information.
Bit object, and provide a public * * * view for extranet participants.
Security technology in extranet
The establishment of extranet involves many technologies: Web, Internet, database access,
Groupware application and security (firewall), etc. Security is one of the central topics in extranet.
Security and auditing ability are crucial, and extranet can be regarded as many different enterprises.
Intranet convergence, system security, * * * enjoyment, standardized and reasonable technology.
At the same time, it takes a lot of time and manpower to open the architecture to the Internet.
. The security model in this architecture must be flexible enough for online content.
Maintain appropriate access control, and should be able to provide access control based on individuals, groups, communities and transmissions.
Types and other access controls. Members of an organization must be able to access and exchange information, but at the same time
It must be guaranteed that private information or content will not be obtained by the public or unauthorized extranet members.
. For example, the supplier may need to contact the distributor, but this information is confidential to the retailer.
. A successful safety formula model should be controllable at the level of a single user or user group.
And allow it to be modified according to the needs of the whole user or a specific user for effective implementation.
. Security in Extranet should be able to achieve the following aspects:
● Every user should have an identity certificate set to confirm the certificate. These users
Authorization will be carried out in the extranet environment;
● User's identity certificate should be able to be reconstructed and revoked;
● The created or modified data object should have the corresponding participant signature, which should be
The data object should have a timestamp;
● Access to resources within the group should be managed according to the identity certificate of the external network;
● All confirmation data transmitted between organizations shall be encrypted by standard encryption algorithm.
, the degree of confidentiality should ensure the high confidentiality and integrity of data;
● The external network system administrator is responsible for establishing the project security policy and user rights.
Responsibility for matching, and control the acquisition of project resources;
● All users' applications should be safe and do not need to modify the program.
In Extranet, the following measures can be taken to ensure the security of the system:
Confirmation and authorization: each user will get an identity certificate so that they can access this stage.
It should be resources. These credentials will be based on the user's private account X.509v3 credentials.
These credentials will be verified by the administrator.
The administrator of each site can manage the authorization decision of users according to local conditions. Ex-husband; Ex-wife; Ex-boyfriend; Ex-girlfriend
By creating a central authorization server, effective access control to the tranet environment can be achieved.
. The server must be able to control information access control in various organizations.
Firewall: the external network needs to have the security of transmission and reception between partners in the enterprise.
Ability to encrypt data. A virtual private network VPN that can provide this service (virtual)
Private network) must also have this function between different network devices. about
Most enterprises that have established an extranet prevent it by establishing a central firewall.
Illegal access, which can check incoming and outgoing information to prevent unauthorized information transmission and access.
. Firewalls can be based on IP address (source/destination address), information
Flow direction (inflow/outflow), inlet type, etc. Restrict the access of illegal users and unauthorized users.
Visiting rights.
Digital signature: Applications and data objects should be digitally signed to ensure that they are authorized.
Evidence of the right side. This signature on the application object will confirm that the application element has not been modified.
Which originate from the same receiving source.
Audit management: User management and audit (especially when there are a large number of users) are very time-consuming.
Hard work should provide an effective audit management tool.
Expenses related to audit management. How members in Extranet view information must be a
Define, control and support a strong audit management system and security system structure. This model must be
It must be flexible enough to synchronize with the dynamic characteristics and user set of the extranet.
At the same time, it should be powerful and make private information available to the public and unauthorized extranet members.
In addition, it is confidential, effective external network record and user behavior tracking of the whole system.
Trace will provide powerful analysis and system audit means for the system.
References:
Computer/Internet /039.htm