Compare Intranet with Internet and LAN, Computer Networking

Assignment Help:

Intranet vs Internet vs LAN

It is certainly possible that both Intranets and the Internet can coexist. As spelt theoretically, the entire Intranet could be located at a remote site and users who are spread over a number of geographical locations can be permitted to access the data using secure links. Though cutting off the Intranet from outside world physically would make it function like a local network, it has its own advantages. The main advantage being a higher level of security. The immediate disadvantage is that if the organisation has remote locations it will have to evolve methods for permitting the employees or users to log on to the Intranet.

When it comes to comparison between the Intranet and LAN, it can be clearly observed that an Intranet is a network within the organisation whereas LAN is a campus wide network; geography plays a vital role. Intranet maybe considered as a group of LAN's of an organisation connected together as shown in Figure 2. They could be connected through a WAN architecture. Naturally, all the facilities that are available in client/server architecture are also applicable here.

 

1520_intranet.png

    Figure: Intranet is a group of LANs interconnected (may be at different locations)

 


Related Discussions:- Compare Intranet with Internet and LAN

What is full-duplex ethernet, Full-Duplex Ethernet 10Base5 as well ...

Full-Duplex Ethernet 10Base5 as well as 10Base2 are half-duplex Full-duplex raises capacity of each domain No require for CSMA/CD

Layers, Layers, Massages, Segments, Datagram's and Frames Figure 2.15 ...

Layers, Massages, Segments, Datagram's and Frames Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stac

Explain the communication channel threats, Q. Explain the Communication Cha...

Q. Explain the Communication Channel Threats? Secrecy Threat - Secrecy is the avoidance of unauthorized information disclosure - Privacy is the guard of individua

How is a logical network diagram, Question: a) In relation to network ...

Question: a) In relation to network design, give two reasons why the building-block approach is favoured to the traditional approach. b) Explain the following steps in rela

Name the three phases of ppp session establishment, The three phase of PPP ...

The three phase of PPP session establishment are:-  A. Link establishment phase  B. Authentication phase  C. Network layer protocol phase

Find out the amplitude of the voltage, Questions: A signal of amplitude...

Questions: A signal of amplitude 10 mV is fed to the amplifier in the figure. What is the amplitude of the voltage at the output from the amplifier?

Netware ipx addressing uses a network number, NetWare IPX addressing uses a...

NetWare IPX addressing uses a network number and a node number. Which  statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi

Which steps are used at receiver end by check sum, Q. Which steps are used ...

Q. Which steps are used at receiver end by check sum? The receiver follows these steps: The unit is divided into "k" sections each of "n" bits All sections are

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd