Explain working of intranet, Computer Engineering

Assignment Help:

Intranets are mainly "small" Internets. They use same network facilities that Internet does, though access is restricted to a limited sphere. For example, a company can set up an intranet within confines of the company itself. Access can be tightly controlled and limited to authorized staff and employees. There is no connection to Internet or any other outside network. Functions such as web sites, downloads and file uploads and e-mail is available on intranets within confines of network. Because frivolous sites are no longer available, there is no employee time lost because of accessing them. There is, of course, limitation of the networking area. Very benefit of restricting access to all of facilities available on Internet also restricts communication to other desirable locations. This is where extranet steps in. An extranet is network which connects a number of intranets in a truly mini-Internet Access is extended to all intranets connected through extranet, though, again, not to Internet. Extranets requires a constant Internet connection as well as a hypertext transfer protocol (http) server.


Related Discussions:- Explain working of intranet

Write a program to find the area under the curve y = f(x) be, Write a progr...

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b

What is class invariant in c++, A class invariant is a condition that descr...

A class invariant is a condition that describes all valid states for an object. It is a logical condition to make sure the correct working of a class. Class invariants must hold wh

Ethernet 10 base 2 is an example of which topology, Ethernet 10 Base 2 is a...

Ethernet 10 Base 2 is an example of               network topology. (A)  Bus                                           (B)  Ring (C)  Star

Higher order predicate logic - artificial intelligence, Higher Order Predic...

Higher Order Predicate Logic: In first order predicate logic, we are allowed to quantify over objects only. If we let  ourselves  to  quantify  over  predicate  or  function  s

Describe some of applications of buffer, Describe some of applications of b...

Describe some of applications of buffer? Applications of buffer: a. They are utilized to introduce tiny delays. b. They are utilized to eliminate cross talk caused becaus

Why network layer is used, Network Layer is used for (A)  Breaking up ...

Network Layer is used for (A)  Breaking up the data in frames for transmission (B)  Deal with Error correction (C)  Automatic Recovery of Procedure (D)  Physica

What does wsdl stand for, What does WSDL stand for?  WSDL stands for We...

What does WSDL stand for?  WSDL stands for Web Services Description Language.  It is an XML representation of the web service interface. There are two parts of the operation

What is cmp instruction, What is CMP instruction Comparison instruction...

What is CMP instruction Comparison instruction (CMP) is a subtraction that changes only the flag bits; destination operand never changes. A comparison is useful for checking th

Inter suffer buffer and execute an instruction, What are the basic steps ne...

What are the basic steps needed to execute an instruction by the processor? Ans: The basic steps needed to execute an instruction by the processor are: A)    First fetch th

Register-to-register operands in RISC, Q. Register-to-register operands in ...

Q. Register-to-register operands in RISC? Register-to-register operands: In RISC machines operation which access memories are LOAD and STORE. All other operands are kept in reg

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd