Know and understand the differences and similarities between an extranet, intranet and the internet

4. Networks and the Effects of Using Them

Objective

Know and understand the differences and similarities between an extranet, intranet and the Internet, and be able to describe the key network devices, topologies, IP concepts, wireless technologies, cloud services, network types, performance metrics, security issues and electronic‑conferencing tools required by the Cambridge IGCSE ICT (0417) syllabus.

Key Definitions

  • Internet – The worldwide public network that interconnects millions of private, academic, business and government networks. It uses the TCP/IP protocol suite and is accessible to anyone with an appropriate connection.
  • Intranet – A private network that uses the same protocols as the Internet (TCP/IP, HTTP/HTTPS, DNS) but is restricted to members of an organisation. It supports internal communication, document sharing and business applications.
  • Extranet – A controlled extension of an intranet that gives selected external users (partners, suppliers, customers) limited access to specific resources. Access is secured by VPNs, firewalls and strong authentication.

Network Devices

These are the building blocks of any LAN, WLAN or WAN.

  • Network Interface Card (NIC) – Provides the physical link between a computer and a network (wired or wireless).
  • Hub – Layer 1 device that repeats incoming signals to all ports; creates a single collision domain.
  • Switch – Layer 2 device that forwards frames only to the destination port; each port has its own collision domain.
  • Bridge – Layer 2 device that connects two LAN segments and filters traffic by MAC address.
  • Router – Layer 3 device that forwards packets between different networks (e.g., LAN ↔ WAN) and performs IP addressing and routing.
  • Firewall – Can be hardware, software or a combination; inspects traffic and applies rules (packet‑filtering, stateful inspection, DMZ creation) to protect the internal network from unauthorised access.

Typical LAN layout showing NICs, hub, switch, router and firewall

Typical LAN layout – NICs connect to a switch, which links to a router and a firewall.

Network Topologies

Understanding the physical layout helps to predict performance and fault tolerance.

  • Star – All devices connect to a central switch or hub; easy to manage, a single cable failure isolates only one device.
  • Bus – All devices share a single backbone cable; simple but a break in the backbone disables the whole network.
  • Mesh – Devices are interconnected with multiple paths; high reliability but expensive and complex.

Simple star, bus and mesh topologies

Star, bus and mesh LAN topologies.

Basic IP Addressing

  • IP addresses are written as four octets (e.g., 192.168.12.45).
  • Public IP – Unique on the Internet; assigned by an ISP.
  • Private IP – Used inside organisations; not routable on the public Internet. Common ranges: 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255, 192.168.0.0 – 192.168.255.255.
  • Subnet mask (e.g., 255.255.255.0) determines which part of the address identifies the network and which part identifies the host.

Core Network Services

  • DNS (Domain Name System) – Translates human‑readable domain names (e.g., www.bbc.co.uk) into IP addresses.
  • DHCP (Dynamic Host Configuration Protocol) – Automatically assigns IP addresses, subnet masks, gateways and DNS servers to devices on a network.
  • File/Print Services – Centralised servers that store files and manage printers for LAN users.

Wireless Technologies

  • Wi‑Fi (WLAN) – Based on IEEE 802.11 standards (a/b/g/n/ac/ax). Used in schools, homes and cafés.

    Security: WPA2‑Personal (PSK) for small networks; WPA2‑Enterprise (or WPA3‑Enterprise) with 802.1X authentication for larger organisations.

  • Bluetooth – IEEE 802.15.1, short‑range (≤10 m) for peripherals (headsets, keyboards, mice). Security relies on pairing codes and device authentication.

Cloud Computing

Services delivered over the Internet, accessed through a web browser or thin client.

  • Cloud Storage – Files are stored on remote servers (e.g., Google Drive, OneDrive, Dropbox). Users upload, download and share documents.
  • Software‑as‑a‑Service (SaaS) – Complete applications run on the provider’s servers (e.g., Google Workspace, Microsoft 365, Salesforce). Users interact via a browser; no local installation required.
  • Advantages – Low upfront hardware cost, easy scalability, access from any device with Internet.
  • Disadvantages – Dependence on Internet connectivity, ongoing subscription fees, data‑security and data‑sovereignty concerns (organisation must know where the data is physically stored).

Network Types

Network TypeTypical ScaleCommon UsesExamples
Local Area Network (LAN)
LANSingle building or campusFile sharing, printers, internal web sitesSchool computer lab, office floor
Wireless LAN (WLAN)
WLANSame as LAN but uses Wi‑FiMobile device access, flexible seatingSchool Wi‑Fi, coffee‑shop hotspot
Wide Area Network (WAN)
WANGeographically dispersed sitesConnect multiple branches, remote accessCompany offices in different cities, Internet
LAN‑WAN Link
LAN‑WAN linkLAN connected to a WAN via a routerEnable Internet access, inter‑site communicationSchool LAN ↔ ISP router ↔ Internet

Network Performance Metrics

  • Bandwidth – Maximum amount of data that can be transferred per second (measured in Mbps or Gbps).
  • Latency – Time taken for a packet to travel from source to destination (measured in milliseconds).
  • Jitter – Variation in latency; important for real‑time applications such as video conferencing.

Security Considerations

Security measures differ for Internet, Intranet and Extranet, but the underlying principles are the same.

  • Authentication – Strong, unique passwords; two‑factor authentication (2FA); for Wi‑Fi, WPA2‑Enterprise/802.1X.
  • Encryption – SSL/TLS (HTTPS) for web traffic; VPNs for remote or extranet connections; WPA2/WPA3 for wireless.
  • Anti‑malware – Reputable antivirus/anti‑spyware on all devices; keep signatures up to date.
  • Firewalls – Hardware firewalls at network edges; host‑based firewalls on individual computers; can create a DMZ for public services.
  • VPN (Virtual Private Network) – Creates an encrypted tunnel for remote users or extranet partners.
  • e‑Safety – Awareness of phishing, social engineering, safe browsing habits and reporting suspicious activity.

Good‑Practice Checklist (Student Level)

  1. Use a password manager to generate and store complex passwords.
  2. Enable automatic updates for the operating system and applications.
  3. Connect to Wi‑Fi only if it uses WPA2‑Personal, WPA2‑Enterprise or WPA3.
  4. Never share login details with anyone outside the authorised group.
  5. Log out of cloud services when finished, especially on shared computers.
  6. Report any suspicious email or link to a teacher/IT staff immediately.

Electronic Conferencing

  • Video conferencing – Real‑time two‑way video and audio (e.g., Zoom, Microsoft Teams). Requires webcam, microphone and stable Internet.
  • Audio conferencing – Voice‑only calls, often via telephone or VoIP (e.g., Skype, Google Meet audio‑only).
  • Web‑conferencing – Shared screen, whiteboard, chat and file sharing within a browser (e.g., Google Meet, Cisco Webex).
  • Classroom example – A virtual lesson where the teacher shares a PowerPoint, students ask questions via chat, and the session is recorded for later review.

Comparison of Internet, Intranet and Extranet

FeatureInternetIntranetExtranet
Scope of usersPublic – anyone worldwidePrivate – employees and authorised internal staffRestricted – internal staff plus selected external parties (partners, suppliers, customers)
Access controlNone at network level – security is site‑specific (HTTPS, firewalls on individual servers)Strong – firewalls, authentication, internal security policiesStrong – VPN, firewalls, user‑level permissions, often a separate DMZ zone
Typical usesWeb browsing, email, social media, cloud services, public informationInternal portals, HR systems, file servers, internal email, intranet newsSupplier portals, customer support sites, joint project workspaces, B2B applications
Network infrastructurePublic service providers, backbone routers, DNS root serversOrganisation’s LAN/WAN, internal routers, private DNS, dedicated firewallOrganisation’s LAN/WAN plus secure gateway (VPN concentrator, DMZ, external firewalls)
Security concernsHigh – exposure to malware, phishing, DDoS attacksMedium – insider threats, accidental data loss, internal malware spreadMedium‑high – must protect internal data while allowing external access; risk of mis‑configured permissions
Cost of implementationLow for end‑user (subscription); high for ISPs and backbone providersModerate – hardware, software licences, maintenance, staff trainingHigher – additional security devices, VPN licences, monitoring tools, higher maintenance overhead

Similarities

  • All rely on the same core protocols (TCP/IP, HTTP/HTTPS, DNS).
  • Data is transmitted in packets through routers and switches.
  • Encryption (SSL/TLS) can be applied to any of them.
  • Each can host web‑based applications and services.

Advantages and Disadvantages

Network TypeAdvantagesDisadvantages
Internet

  • Universal access
  • Vast amount of information and services
  • Low cost for end users

  • High security risk (malware, phishing, DDoS)
  • Uncontrolled content
  • Potential bandwidth congestion

Intranet

  • Secure environment for sensitive data
  • Improved internal communication and collaboration
  • Customised applications for the organisation

  • Limited to internal users only
  • Requires ongoing maintenance and IT support
  • Risk of information silos if not integrated with other systems

Extranet

  • Facilitates collaboration with external partners
  • Reduces need for physical meetings and travel
  • Can improve supply‑chain and customer‑service efficiency

  • Complex security management
  • Higher implementation and maintenance cost
  • Risk of data leakage if permissions are mis‑configured

Key Points to Remember

  • Internet, intranet and extranet all use the same core technologies but differ in scope, access control and security requirements.
  • An intranet is completely internal; an extranet is a controlled bridge between internal and selected external users.
  • Effective use of an extranet requires robust authentication, encryption (VPN/SSL) and regular monitoring.
  • Choosing the right network type depends on the organisation’s need for openness versus control, cost considerations and security policies.

Venn diagram showing overlap of users and services among Internet, Intranet and Extranet

Venn diagram illustrating the shared and unique users/services of the Internet, Intranet and Extranet, with arrows indicating data flow and security boundaries.