Showing posts with label Extranet and Email. Show all posts
Showing posts with label Extranet and Email. Show all posts

Wednesday, March 19, 2014

EXTRANET

An Extranet is a private network that uses the internet protocol and the public telecommunication system to securely share part of business information or operations with - suppliers, vendors, partners, customers, or other businesses.
Through e-mail, documents are prepared and sent electronically. The recipients need not
be present at the other end to send the message. The message gets stored in the electronic
mailbox of the addressee. The recipient can open the mailbox whenever he is free and can read
or print the message.

An Extranet can be viewed a-part of a company's intranet that is extended to users outside
the company. It has also been described as a "state of mind" in which the internet is perceived as
a way to do business with other companies as well as to sell products to customers. Extranet
extends the intranet from one location to another across the internet by securing data flow, to
another intranet to a business partner. In these way intranets of business partners, suppliers,
creditors, distributors, customers, and the like are connected to extranets by agreements.
An Extranet requires security and privacy. These require firewall server management, eissuance
and use of digital certificate or similar means of user authentication, encryption of
messages, and the use of virtual private networks that tunnel through the public network.

Uses and Characteristics of Extranet

Characteristics of Extranet

The following are the important characteristics of the Extranet.
a) It is an extended internet-private business networks located outside of the corporate firewall.
b) It can be referred to an intranet that is partially accessible to authorized outsiders.
c) It is a network that uses the internet to link businesses with others that share the common
goals.

Uses of Extranet

Companies can use an Extranet to:
a. Exchange large volumes of data using Electronic Data Interchange.
b. Share product catalogs exclusively with wholesalers or those in the Trade.
c. Collaborate with other companies on joint development efforts.
d. Jointly develop and use training programs with other companies.
e. Provide or access services provided by one company to a group of other companies, such as
an online banking application managed by one company on behalf or affiliated banks.
f. Share news of common interest exclusively with partner companies.
g. The manufacturing companies can coordinate the design manufacturing, scheduling and
delivery across supply chain.
h. With extranet the technology firms can support for their customers and partners and makes it
possible for remote access for employees.
i. The financial services firms by using extranet can reduce costs of proprietary networks.
j. With extranet the publishing companies can increase the speed of design and production
cycles.
k. Other benefits:
  1. Quicker turnaround time
  2. Improved communication
  3. Decreased paper flow
  4. Traceable correspondence
  5. Better service
  6. Lower overhead and expenses
  7. Improved employee morale
  8. Increased Margins
  9. Flexibility and scalability
  10. Reduced transitional barriers
  11. Versatility
A brief list of examples of extranet could include:
  • Allowing suppliers access to relevant inventory levels
  • Allowing clients to review their account records
  • Allowing students to update address information in real time.
As with intranet, access is granted only where you establish that it is required. User
access is controlled by the latest in security technologies, protecting sensitive material from
intrusion.

What is the relationship between intranets, Extranets and e–commerce?

The answer has three parts. First, intranets, extranets and e-commerce have in common
the use of Internet (predominantly web) protocols to connect business users. Second, intranets
are more localized and can therefore move data faster than more distributed extranets.
(Bandwidth limitations also apply to e-commerce.) Third, the amount of control that network
managers can exert over users is different for the three technologies.
On an Internet, administrators can narrowly prescribe access and policy for a fixed group
of users. For example, a company could specify Red Hat Linux as its standard desktop operating
system, and Netscape Communicator 5 as its standard browser and mail client. The company
could then write intranet workflow applications that leverage the uniform computing
environment, over which it exercises strong control.
On a business-to business Extranet, system architects at each of the participating
companies must collaborate to ensure a common interface and consistent semantics (data
meanings). Since one company cannot reasonably enforce standards on its trading partners,
extranet application developers must taken into account a wider range of technologies than is the
case for intranets. For example, one company participating in an extranet might be using
Microsoft Internet Explorer, another Netscape Navigator 4.5 and another Navigator Gold 3.x In
order to collaborate via extranet, the applications have to perform adequately on all represented
platforms.
The same is true, even more, for e-commerce, in which the trading partners may be
completely unknown to one another. This is the case when you walk into a supermarket: the
common interest in communication is based on the need to transact business, and not necessarily
on a long-term trust relationship. Thus, e-commerce applications often support a level of
security and transactional integrity (for instance, non-repudiation of orders) not present in
intranet or extranet applications.

E-MAIL

E-mail is an electronic message sent form one computer to another. We can send or
receive personal and business-related messages with attachments, such as pictures or formatted
documents. We can even send songs and computer programs.
The e-mail communication is incredibly simple. A person with a PC and a modem to
connect to the network can communicate with the other(s) so connected to the network. The
message can be prepared and sent instantly. The other person finds the e-mail when he checks
his mailbox and may replay to the message in the same way. The message sent is private and no
other person can read it.
Each user of e-mail service has a user ID or password serving as e-mail address. First
thing to do is to get online using modem and communication software. The system requires userid
and password. Now the user can prepare his message in the form of a document using a word
processor. The e-mail address of the recipient has to be typed in before the message is sent,
With e-mail each person connected to the system is allotted a mailbox and the software
required for sending and receiving e-mail. The mailbox is simply a file into which the e-mail
system stores electronic documents. The user can check his mailbox for messages over the
network. The sender specifies his identify and that of the recipient. The sender then prepares the
document or retrieves the stored document and sends it.
E-mail is a document communication facility. To ensure that the recipient also
understands the emotions as well, a set of special symbols is used to convey some non-verbal
signals. A few of such symbols are given below.
E-mail is the transmission of information electronically from terminal to terminal. The
document is prepared in a word processor and is mailed electronically. The basic facilities in e-
mail include message creation, message transfer and post delivery service. The e-mail service
may be traditional mainframe based or minicomputer based or LAN based system with PCS to
access from.

How E-Mail Works?

The first thing to be done is to type the message and the e-mail address of the recipient.
Once the ‘send’ button is clicked, this e-mail is sent through the telephone line after it’s
conversion into analog signal by the modem. The e-mail message arrives at our service
provider’s server. If the server recognizes the e-mail address as valid, the mail will be sent either
through the network of the service provider or through internet gateway to the service provider
of the recipient.

To send e-mail, we need a connection to the internet and access to a mail server that forwards the mail. The standard protocol used for sending internet e-mail is called SMTP, short for Simple Mail Transfer Protocol. It works in conjunction with POP servers. POP stands for Post Office Protocol.

 When we send an e-mail message, our computer routes it to an SMTP server. The server
looks at the e-mail address (similar to the address on an envelope), then forwards it to the
recipient’s mail server. Once the message arrives at the destination mail server, It’s stored until
the addressee retrieves it. We can send e-mail anywhere in the world to anyone who has an email
address.

With the advent of MIME, which stands for multipurpose Internet Mail Extension, and
other types of encoding schemes, we can not only send messages electronically, but we can also
send formatted documents, photos, sound files, and video files.

Advantages and Disadvantages of E-mail

Advantages of E-mail
  1. Messages can be prepared and sent any time convenient for the sender.
  2. Message can be received at the convenience of the recipient.
  3. The transmission takes place instantly and the message gets stored in the mailbox of the recipient.
  4. The system can confirm delivery of message.
  5. Copies of message can be sent to multiple recipients.
  6. It reduces paper work.
Disadvantages
  1. Recipients must be having e-mail connectivity. They must have computer terminals, modem and telephone.
  2. They must be subscribing to the same e-mail service provider. 
  3. Poor telecommunication affects the quality of message transmitted.
  4. Despite all the disadvantages e -mail is a cheap form of information transmission.
INDONET, NICNET, DARTMAIL and ICNET provide this service in India. A user can
be a subscriber to such e-mail service providing agencies and use their facility.

E-Mail Addressing Pattern and E-Mail Messages

Internet e-mail addresses typically have two main parts:
ibcocppd@satyammail.com
First there is the user name (ibcocppd) which refers to the recipients mailbox. Then
there’s an axon sign (@). Next comes the host name (satyammail), also called the domain name.
This refers to the mail server, the computer where the recipient ha an electronic mailbox. It’s
usually the name of a company or organization.
The end of the domain name consists of a dot (“.”) followed by two or three letters (such
as .com and .gov) that indicate the top-level domain. This part of the domain name indicates the
type of organization or the country where the host server is located.

E-Mail Messages

E-mail messages are similar to letters, with two main parts.  The header contains the name and address of the recipient, the name and address of anyone who is being copied, and the subject of the message. Some e-mail programs also display your name and address and the date of the message.
The body contains the message itself. Just like when sending letters, we need the correct address. If we use the wrong address or mistype it, our messages will bounce back with messages like – Return to Sender, Address Unknown routine.
When we receive an e-mail, the header tells us where it came from, how it was sent, and when. It’s like an electronic postmark.
Unlike a letter, which is sealed in an envelope, e-mail is not as private. It’s more like a post card. Messages can be intercepted and read by people who really shouldn’t be looking at it. We should therefore avoid including any confidential information unless we have a way to encrypt it.

Usage of Mails
  • Incoming mails can be checked on a daily basis at least 3 times a day.
  • We can use the e-mail facility judiciously and extensively for communicating with Circle Office / Head Office/ Service Branch / Customers.
  • Communicate e-mail id to all domestic and overseas customers and use the facility for
  • passing on information regarding new schemes launched by Bank and other important information to them.
  • Encourage customers to contact branch through e-mail for information regarding their urgent banking requirements. 
  • Use the facility as a marketing tool to attract new customers, exchange greetings with existing customers and also inform them about recent happenings in the locality.