At home, WLAN internet is often considered to be the ultimate – but this connection also has disadvantages in terms of data rates and security. Internet via Ethernet is a very good alternative that not only offers security from unfamiliar surfers, but also outperforms most WiFi networks in terms of speed.
- Ethernet is a network technology in which the connection is routed via a transmission cable.
- With the Ethernet, data transfer rates of 10 megabits per second (Mbit / s) up to 400 gigabits per second (Gbit / s) can be achieved.
- Compared to WLAN, Ethernet is significantly faster and more secure.
Technology and performance
Ethernet is a network technology. The data is usually transmitted via so-called twisted pair cables, copper or fiber optic cables . Ethernet enables fast and stable data exchange between all connected devices.
Nowadays, Ethernet achieves data transfer rates of 10 megabits per second ( Mbit / s ) up to 400 gigabits per second (Gbit / s). This means that Ethernet is significantly faster than WLAN . The data transmission by cable is still much faster and more reliable than the transmission by radio in the WLAN.
Security and requirements
In terms of security, Ethernet is highly recommended: Apart from attacks via the Internet connection, only those who are directly connected to it can access the Ethernet network. This is a clear advantage compared to WLAN technology, where in principle anyone can surf within a certain range if the WLAN is not encrypted. While WLAN can be installed relatively easily, surface-mounted network sockets may be required for Ethernet. You also need a so-called switch, which can also be found in almost all routers.
Intranet and extranet are computer networks based on the same technologies as the Internet, but unlike the Internet, they are not accessible to everyone. Both serve primarily to provide and exchange information.
- Every intranet consists of several internet services within a local network.
- The extranet works in the same way as the intranet.
- The data on the intranet are only intended for internal use and may not be leaked under any circumstances.
Intranet: exchange within the organization
Every intranet consists of several internet services within a local network. As a rule, it is only accessible via the workstations in the local network. The users of an intranet often have to log in with a user name and password, as this regulates the allocation of access rights to individual participants. The intranet uses the client-server standards of the Internet, so it is also based on TCP / IP protocols. The use of web browsers and servers thus creates an internal information system for an organization or a company.
Extranet: Exchange outside the organization
The extranet works in the same way as the intranet. The main difference, however, is that a group of users can also access the network from outside. Thus the extranet is an extension of the intranet. An extranet enables a company or an organization, for example, to make information accessible not only to internal users such as employees, but also to external users such as customers or partners.
Uses and advantages of intranet and extranet
By using an intranet or extranet, a comprehensive information system can be created without great effort. Intranet and extranet make it possible to exchange documents of all kinds and make them available to a specific group of people. In addition, they can also fulfill the function of a groupware, i.e. enable cooperative work. In addition, other functions can be integrated, such as a search engine, a personnel directory, project management, a messenger service, etc.
The intranet or extranet can thus be referred to as an information interface, depending on whether it is internal or external. The two networks enable simplified access to information, ensure that it is up-to-date (since the content can be maintained very easily) and thus also ensure increased transparency in the respective organization.
Requirements and conditions
In order for the use of an intranet or extranet to be successful, certain points should be observed: In addition to proper implementation and the corresponding investments in the system itself, the issue of data protection is primarily a sticking point. The data on the intranet are only intended for internal use and may not be leaked under any circumstances. Appropriate measures, such as the use of firewalls and proxy servers, however, enable a very high level of security to be achieved – although in times of increasing cyber attacks there can never be one hundred percent protection against digital break-ins.