Determine the task which should intranet require, Computer Networking

Assignment Help:

Determine the task which should intranet require

Intranet to work smoothly, the following tasks should be properly synchronised:

  • All computers connected together in a network must communicate using the same language and protocol. Inability to do so may leave the users disconnected to the repository of information and resources.
  • It must be always remembered that if the language used is Hyper Text Markup Language (HTML), everything that is developed for and intended to be hosted on the Intranet must follow HTML invariably.
  • The protocol suite applicable for both Intranets and the Internet are called Transmission Control Protocol/ Internet Protocol (TCP/IP) and every computer should be compatible with TCP/IP. Though, TCP/IP evolved initially on UNIX based computers, it became a standard for data communication and more recently for every type of communication across Intranets and the Internet, especially supported by every major operating system in use.
  • The Intranet is driven by a network server that uses a browser, like Netscape Navigator or Internet Explorer.

 


Related Discussions:- Determine the task which should intranet require

Ports, It is an additional 16-bit number which uniquely identifies the spec...

It is an additional 16-bit number which uniquely identifies the specific service on any given machine on the Internet. Port numbers are 16 bit wide, so each of the computers on the

Explain mesh interconnection networks, Mesh : This is two dimensional netwo...

Mesh : This is two dimensional networks.  In this all processing elements are organised in a two dimensional grid. The processor in the row i and column j are indicated by PE i .

Describe techniques used in location based services, Question: a) Comp...

Question: a) Compare Bluetooth and WIFI based networks over the following factors: Data rate, Range, Application Focus, Battery Power, Frequency Band, Security. b) Differe

What command do we use to disable domain lookup, no ip domain-lookupcommand...

no ip domain-lookupcommand is use to disable domain lookup

describe the mips instructions - computer architecture, 1.  Detail for eac...

1.  Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps.  Do not forget to mention how and during which steps each in

Http request message, HTTP Request Message The first  line of  an HTTP...

HTTP Request Message The first  line of  an HTTP request message  is called the  line. The subsequent lines are called  the header lines. The  request  line has  fields the me

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Illustrate the bellman-ford algorithm, Illustrate the Bellman-Ford algorith...

Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd