Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Intranet vs Internet vs LAN
It is certainly possible that both Intranets and the Internet can coexist. As spelt theoretically, the entire Intranet could be located at a remote site and users who are spread over a number of geographical locations can be permitted to access the data using secure links. Though cutting off the Intranet from outside world physically would make it function like a local network, it has its own advantages. The main advantage being a higher level of security. The immediate disadvantage is that if the organisation has remote locations it will have to evolve methods for permitting the employees or users to log on to the Intranet.
When it comes to comparison between the Intranet and LAN, it can be clearly observed that an Intranet is a network within the organisation whereas LAN is a campus wide network; geography plays a vital role. Intranet maybe considered as a group of LAN's of an organisation connected together as shown in Figure 2. They could be connected through a WAN architecture. Naturally, all the facilities that are available in client/server architecture are also applicable here.
Figure: Intranet is a group of LANs interconnected (may be at different locations)
Full-Duplex Ethernet 10Base5 as well as 10Base2 are half-duplex Full-duplex raises capacity of each domain No require for CSMA/CD
How many timers does IGRP has
Layers, Massages, Segments, Datagram's and Frames Figure 2.15 show the physical path data takes down a sending end systems protocol stack up and down the protocol stac
Q. Explain the Communication Channel Threats? Secrecy Threat - Secrecy is the avoidance of unauthorized information disclosure - Privacy is the guard of individua
Question: a) In relation to network design, give two reasons why the building-block approach is favoured to the traditional approach. b) Explain the following steps in rela
The three phase of PPP session establishment are:- A. Link establishment phase B. Authentication phase C. Network layer protocol phase
Can you describe static and dynamic tunnels?
Questions: A signal of amplitude 10 mV is fed to the amplifier in the figure. What is the amplitude of the voltage at the output from the amplifier?
NetWare IPX addressing uses a network number and a node number. Which statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi
Q. Which steps are used at receiver end by check sum? The receiver follows these steps: The unit is divided into "k" sections each of "n" bits All sections are
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd