Determine the task which should intranet require, Computer Networking

Assignment Help:

Determine the task which should intranet require

Intranet to work smoothly, the following tasks should be properly synchronised:

  • All computers connected together in a network must communicate using the same language and protocol. Inability to do so may leave the users disconnected to the repository of information and resources.
  • It must be always remembered that if the language used is Hyper Text Markup Language (HTML), everything that is developed for and intended to be hosted on the Intranet must follow HTML invariably.
  • The protocol suite applicable for both Intranets and the Internet are called Transmission Control Protocol/ Internet Protocol (TCP/IP) and every computer should be compatible with TCP/IP. Though, TCP/IP evolved initially on UNIX based computers, it became a standard for data communication and more recently for every type of communication across Intranets and the Internet, especially supported by every major operating system in use.
  • The Intranet is driven by a network server that uses a browser, like Netscape Navigator or Internet Explorer.

 


Related Discussions:- Determine the task which should intranet require

Determine about the tcp/ip, Determine about the TCP/IP Stands for Tr...

Determine about the TCP/IP Stands for Transmission Control Protocol/Internet Protocol. This is the group of protocols that define the Internet and communication method used

Plot way forms for the modulation schemes, Plot way forms for the following...

Plot way forms for the following modulation schemes using Mathlab: a) 2 ASK   4 ASK                       b)  BFSK     4 FSK                             c) BPSK 4

Tcp-ip routing architecture, Q. Explain TCP-IP Routing Architecture? ...

Q. Explain TCP-IP Routing Architecture? The TCP/IP routing architecture looks extremely much like the OSI routing architecture. Hosts utilize a discovery protocol to o

Briefly describe three security requirements of an agent, QUESTION (a) ...

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

Dns in the internet, DNS in the Internet -Domain name space is split i...

DNS in the Internet -Domain name space is split into three sections: country, generic and inverse -Generic domains define hosts by generic behavior -Country domains are

What are three ways to give login access to router, The three ways to give ...

The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)

Mail access protocols - application layer, Mail Access Protocols The e...

Mail Access Protocols The e mail  message  are usually  sent to  an email  server that stores received message  in the  recipient   e mail  mailbox.  The user  retrieves messa

Modify the tcp server and udp server in client server, Let's imagine that w...

Let's imagine that we have 2 TCP clients. A simple one (modTCPClient.c) like the one you wrote in the first part of project 2 and another one (modTCPClient1.c) that after it connec

Name the categories of multiplexing, Name the categories of Multiplexing? ...

Name the categories of Multiplexing? There are three categories of multiplexing a. Frequency Division Multiplexing (FDM) b. Time Division Multiplexing (TDM)    i. Sync

What do you mean by flow control, Q. What do you mean by Flow Control? ...

Q. What do you mean by Flow Control? - How much data sender is capable to transmit before receiving the ACK - Why flow control? - Limitation with receiver 1. Processin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd