Determine the task which should intranet require, Computer Networking

Assignment Help:

Determine the task which should intranet require

Intranet to work smoothly, the following tasks should be properly synchronised:

  • All computers connected together in a network must communicate using the same language and protocol. Inability to do so may leave the users disconnected to the repository of information and resources.
  • It must be always remembered that if the language used is Hyper Text Markup Language (HTML), everything that is developed for and intended to be hosted on the Intranet must follow HTML invariably.
  • The protocol suite applicable for both Intranets and the Internet are called Transmission Control Protocol/ Internet Protocol (TCP/IP) and every computer should be compatible with TCP/IP. Though, TCP/IP evolved initially on UNIX based computers, it became a standard for data communication and more recently for every type of communication across Intranets and the Internet, especially supported by every major operating system in use.
  • The Intranet is driven by a network server that uses a browser, like Netscape Navigator or Internet Explorer.

 


Related Discussions:- Determine the task which should intranet require

What do you mean by osi, What do you mean by OSI? The Open System Inter...

What do you mean by OSI? The Open System Interconnection (OSI) reference model explains how information from a software application in one computer moves by a network medium to

State ethernet frame format, Ethernet Frame Format Consists of sev...

Ethernet Frame Format Consists of seven fields There is No mechanism for acknowledging received frames considered an unreliable medium

Clos network, Clos network This network was organized by Clos (1953).  ...

Clos network This network was organized by Clos (1953).  It is a non-blocking network and gives full connectivity like crossbar network but it also requires significantly minim

Show the data encryption standard, Q. Show the Data Encryption Standard? ...

Q. Show the Data Encryption Standard? Data Encryption Standard - Bit-level encryption method designed by IBM - Adopted as standard for nonmilitary and nonclassified us

What are triggers and rules, What are Triggers and Rules? Triggers are...

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

Show the importance of security, Q. Show the Importance of Security? Th...

Q. Show the Importance of Security? The Internet presents enormous business opportunities. The Internet is open to public, vulnerable to various attacks. One of the major

Explain asynchronous FDDI, Explain Asynchronous FDDI Asynchronous bandw...

Explain Asynchronous FDDI Asynchronous bandwidth is allocated utilizing an eight-level priority scheme. Every station is assigned an asynchronous priority level. FDDI as wel

Explain any three most important gsm identifiers, Question 1 A) Explain br...

Question 1 A) Explain briefly the advantages wireless communication systems                   B) What is a cellular network? Question 2 Explain fundamental architecture of

Advantages of bridges - network layer and routing, Advantages of Bridges ...

Advantages of Bridges By forwarding  frames  only to  the segment  where  host  resides  a bridge server the  following  purpose. a.Unwanted  traffic  as well  as network  c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd