Wednesday, March 19, 2014

Uses and Characteristics of Extranet

Characteristics of Extranet

The following are the important characteristics of the Extranet.
a) It is an extended internet-private business networks located outside of the corporate firewall.
b) It can be referred to an intranet that is partially accessible to authorized outsiders.
c) It is a network that uses the internet to link businesses with others that share the common
goals.

Uses of Extranet

Companies can use an Extranet to:
a. Exchange large volumes of data using Electronic Data Interchange.
b. Share product catalogs exclusively with wholesalers or those in the Trade.
c. Collaborate with other companies on joint development efforts.
d. Jointly develop and use training programs with other companies.
e. Provide or access services provided by one company to a group of other companies, such as
an online banking application managed by one company on behalf or affiliated banks.
f. Share news of common interest exclusively with partner companies.
g. The manufacturing companies can coordinate the design manufacturing, scheduling and
delivery across supply chain.
h. With extranet the technology firms can support for their customers and partners and makes it
possible for remote access for employees.
i. The financial services firms by using extranet can reduce costs of proprietary networks.
j. With extranet the publishing companies can increase the speed of design and production
cycles.
k. Other benefits:
  1. Quicker turnaround time
  2. Improved communication
  3. Decreased paper flow
  4. Traceable correspondence
  5. Better service
  6. Lower overhead and expenses
  7. Improved employee morale
  8. Increased Margins
  9. Flexibility and scalability
  10. Reduced transitional barriers
  11. Versatility
A brief list of examples of extranet could include:
  • Allowing suppliers access to relevant inventory levels
  • Allowing clients to review their account records
  • Allowing students to update address information in real time.
As with intranet, access is granted only where you establish that it is required. User
access is controlled by the latest in security technologies, protecting sensitive material from
intrusion.

No comments:

Post a Comment