Computer Network Tutorial

Introduction of Computer Network Types of Computer Network Network Topology Computer Networking Architecture Transmission Modes (Data Flow) Basic Networking Devices Integrate Services Digital Network (ISDN)


OSI Model TCP/IP Model

Physical Layer

Digital Transmission Analog Transmission Transmission Media Switching

Data Link Layer

Error detection and Error correction Data Link Control Multiple Access Aloha

Network Layer

Network Layer - Logical Address Address Mapping Unicast Routing Protocol

Transport Layer

Process to Process Delivery User Datagram Protocol Transmission Control Protocol Stream Control Transmission Protocol Session Layer and Presentation Layer

Application Layer

Domain Name System Application Protocol E-mail Cryptography


Classes of Routing Protocols Classification of Routing Algorithms Controlled Access Protocols in Computer Networks Differences between IPv4 and IPv6 Fixed and Flooding Routing Algorithms Advantages and Disadvantages of Fibre Optics Cable APIPA Difference between Active and Passive FTP Fiber Optics and its Types Method of Joining and Fusion of Fiber Optic Cable Define Framing in Computer Network Disadvantages of Computer Network Mesh Topology Diagram in Computer Network Ring Topology in Computer Network Star Topology in Computer Networks 4G Mobile Communication Technology Advantages and Disadvantages of LAN Advantages and Disadvantages of MAN Advantages and Disadvantages of WAN Application Layer in OSI Model Cyclic Redundancy Check Example Data link layer in OSI model Difference between Transport and Network Layer Hamming Code Example Network Layer in OSI Model Session Layer in OSI Model Transport Layer in OSI Model Two Port Network in Computer Networks Uses of Computer Networks What is Computer Network What is Framing in a Computer Network Advantages and Disadvantages of Bus Topology Difference between Star Topology and Bus Topology Subnetting in Computer Network Subnetting Questions and Answers What is Bus Topology What is Network Topology and Types in Computer Networks Access Control in Networking Basic Characteristics of Computer Network Benefits of SOCKS5 Proxy in Computer Networks Computer Network viva Questions Difference between BOOTP and RARP Difference Between Network Topologies and Network Protocols Difference between NFC and RFID Difference Between Point-to-Point Link and star Topology Network Differences Between MSS and MTU Differences Between Trunk Port and Access Port Different Modes of Communication in Computer Networks MIME Protocol in Computer Networks Modes of Communication in Computer Networks Network Attack in Computer Network Port Address in Networking Simplest Protocol in Computer Network Sliding Window Protocol in Computer Network Stop And Wait Protocol in Computer Networks TCP 3-Way Handshake Process in Computer Networks What is a Proxy Server What is APPN What is ICMP Protocol What is Point-to-Point Protocol What is Port Address in Networking What is the HDLC Protocol What is VRRP Protocol Difference Between Analog and Digital Signals Difference Between Hub and Repeater Difference between Repeater and Switch Difference Between Transparent Bridge and Source Routing Bridge Source Routing Bridge in Computer Networks Transparent Bridge in Computer Networks Transport Protocol in Computer Networks Types of CSMA in Computer Networks What is Wired and Wireless Networking Network Security in Computer Network Disadvantages of Extranet Difference Between TELNET and FTP Define Protocol in Computer Networks Guided Transmission Media in Computer Network What is a Gateway in a Computer Network IGMP in Computer Networks LAN Protocols in Computer Networks MAN Meaning in Computer Modulation Techniques in Computer Networks Switching in DCN TCP/IP Applications What is IGMP? What is Modem in Networking What is Non-Persistent CSMA Difference between Cell Splitting and Cell Sectoring Forouzen Computer Network Open Loop and Closed Loop Congestion Control Types of Cluster Computing WAP-Wireless Access Point What are the elements of the Transport Protocol Difference between Gateway and Switch Flow Control in Data Link Layer Body Area Network Flooding in Computer Network Token Ring in Computer Networks VoIP in Computer Networks What is Infrared Transmission Congestion Control Techniques Forward Error Correction (FEC) Switching Techniques What is Telnet in Computer Network

Disadvantages of Extranet

In the modern-day, rapid-paced commercial enterprise environment, technological innovations were a recreation-changer, enabling corporations to enhance their operations, conversation, and collaborative efforts. One of those innovations is the extranet, a flexible device that enables steady information sharing and collaboration with outside partners, such as suppliers and clients. However, like several eras, extranets include their share of dangers.

What is Extranet?

Before delving into the disadvantages, let's begin by defining what an extranet is. An extranet serves as a private network, allowing organizations to share information and collaborate with external parties safely. It acts as an extension of an intranet, an internal network within an organization. Extranets are typically accessed through the Internet and are designed to facilitate the sharing of specific resources and data.

1. Security Concerns

One of the primary concerns associated with extranets is the heightened security risks. Expanding an organization's network to encompass external partners or customers increases the potential points of vulnerability. The fear of unauthorized access, data breaches, and cyberattacks becomes more pronounced.

For instance, if a partner's network falls victim to a cyberattack, it could serve as an entry point for malicious actors to infiltrate your network through the extranet. Maintaining robust security on an extranet can be a formidable task, as it necessitates that all involved parties adhere to stringent security protocols and continuously update their systems to counter evolving threats.

2. Data Privacy and Compliance Challenges

Another notable drawback linked to extranets pertains to data privacy and compliance. Stringent regulations and compliance requirements, including GDPR, HIPAA, or industry-specific standards, govern many industries. Sharing sensitive data on an extranet can result in compliance issues and the legal consequences that follow.

Ensuring that all entities partaking in the extranet adhere to the requisite regulations and data protection standards is a complex and ongoing endeavor. In the event of a data breach or a breach of privacy regulations, organizations may face substantial penalties and damage to their reputation.

3. Technical Compatibility Issues

Extranets necessitate a high level of technical compatibility among the participating entities. Incompatibilities in terms of software, hardware, or network infrastructure can give rise to connectivity issues that impede the smooth exchange of information.

For example, one organization might employ a specific document management system while another utilizes a different platform. These disparities can lead to format conflicts, making effective collaboration a challenge. Furthermore, extranets often demand dedicated IT resources to ensure compatibility and address technical issues, which can be both costly and time-consuming.

4. Scalability Dilemmas

As organizations expand and their networks grow, maintaining an extranet that scales with the business can prove to be a significant challenge. Incorporating new partners or customers into the extranet can strain resources and lead to issues related to network performance and security.

Moreover, as more parties join the extranet, it can become increasingly complex, potentially leading to a need for more transparency regarding roles and responsibilities. Managing access and permissions becomes paramount as the extranet ecosystem grows, which can be a daunting task.

5. Implementation and Maintenance Costs

The initial setup and ongoing maintenance of an extranet can be financially burdensome. Organizations must invest in the necessary infrastructure, implement security measures, and provide technical support. These costs can pose a barrier, particularly for smaller businesses or organizations operating with limited budgets.

Additionally, ensuring the continued smooth operation of the extranet requires consistent maintenance and updates. This entails maintaining a dedicated IT team, which contributes to the overall operational costs.

6. Limited Control over External Systems

When employing an extranet, organizations must rely on external partners or customers to manage their systems and adhere to security standards. This lack of control can be a notable disadvantage, as your organization's security and operational efficiency are only as robust as the weakest link within the extranet.

A partner needs to implement essential security updates or follow best practices to ensure your organization runs smoothly. The absence of control can be a persistent source of concern for businesses that prioritize the integrity and security of their data.

7. Dependency on Internet Connectivity

Extranets heavily rely on internet connectivity, and while this may seem obvious, it's essential to consider the potential disruptions that may occur. Downtime, sluggish internet speeds, or connectivity issues can have a direct impact on the performance and reliability of the extranet.

Organizations may find themselves needing help accessing critical data or collaborating effectively during internet-related problems. These disruptions can have a cascading impact on operations, leading to delays and inefficiencies.

To successfully navigate the intricacies of extranets and harness their potential without succumbing to their disadvantages, organizations can implement several key strategies:

  • Prioritize Security: Security is paramount when dealing with extranets. Ensuring that robust security measures are in place, including encryption, access controls, and multi-factor authentication, is non-negotiable. Regular security audits and updates are essential to safeguard the extranet against evolving threats.
  • Regulatory Compliance: Adhering to data protection regulations and compliance standards is imperative. Conduct thorough due diligence to ensure all parties involved comply with the necessary legal and industry-specific requirements.
  • Technical Compatibility Planning: Before launching an extranet, establish clear technical compatibility guidelines and protocols. This includes defining standard software and hardware specifications, as well as communication protocols that all participants must follow.
  • Scalability Planning: As your business grows, so will your extranet. Implement a scalable infrastructure from the outset to accommodate new partners and customers seamlessly. This includes defining roles and responsibilities within the extranet ecosystem.
  • Cost Management: Clearly outline the costs associated with extranet implementation and maintenance. Ensure that budgeting factors in these expenses to avoid unwelcome surprises.
  • Internal Control Measures: While external systems and partners play a vital role in an extranet's success, internal controls must also be fortified. Train your personnel to be vigilant about security practices and to react swiftly to any potential breaches.
  • Alternative Connectivity Solutions: Recognize that internet connectivity issues can be disruptive. Have backup plans in place, such as failover connections or offline data access, to maintain operations during internet disruptions.
  • Regular Training and Awareness: Invest in ongoing training and awareness programs for your team members and external partners. Keep them informed about the latest security threats, best practices, and your organization's extranet policies. An educated team is your first line of defense against security breaches.
  • Incident Response Plan: Develop a comprehensive incident response plan that outlines the steps to take in case of a security breach or any unexpected issues. Having a well-defined plan can mitigate potential damage and help you recover faster.
  • Third-Party Security Audits: Regularly conduct security audits on your extranet or employ a third-party service to do so. These audits can uncover vulnerabilities, allowing you to address them proactively and ensure your extranet remains secure.
  • Effective Communication: Maintain open lines of communication with your external partners. Discuss security concerns, challenges, and best practices with them. A collaborative approach can lead to better security and smoother collaboration.
  • Data Encryption: Ensure all sensitive data is encrypted both in transit and at rest. Encryption adds an extra layer of security, making it more challenging for unauthorized individuals to access sensitive information.
  • Cloud-Based Solutions: Consider cloud-based extranet solutions. These solutions often have built-in security features and are managed by experienced professionals who focus on safeguarding data.
  • Regular Updates and Patching: Stay vigilant about updating software, firewalls, and security patches. Outdated software can be a weak link in your security chain.
  • Contingency Planning: Develop contingency plans for potential issues, such as a partner's network breach. Having a plan in place can minimize the impact of unexpected events.
  • Document and Share Best Practices: Create a document that outlines best practices and guidelines for all participants in your extranet. Sharing these guidelines can help everyone understand their roles in maintaining security.


Extranets have undoubtedly revolutionized the way organizations collaborate and share information with external partners. However, it's imperative to acknowledge the potential disadvantages that come with this technology. From security concerns and data privacy issues to technical compatibility challenges and scalability hurdles, extranets demand careful consideration and vigilant management.

Extranets have immense potential to enhance collaboration and information sharing. By being proactive, vigilant, and prepared, you can effectively navigate the challenges and make the most of the benefits they offer. Keep a sharp eye on the evolving landscape and adapt as needed, and your extranet can continue to be a valuable asset for your organization.

To mitigate these disadvantages, organizations must prioritize robust security measures, invest in ongoing maintenance and updates, and carefully evaluate the suitability of extranets for their specific needs and circumstances. With thorough planning and unwavering vigilance, organizations can harness the benefits of extranets while minimizing the associated risks and challenges.