How does intranet work, Computer Networking

Assignment Help:

How does Intranet Work?

An Intranet can be defined as a private network which uses Internet tools. The principal tool is the Web browser, but there are other Internet tools such as ftp and telnet that are useful. The resources defined as private maybe protected physically (with a firewall or a separate physical network), geographically (by restricting access to computers with a network address on the local network), or personally (by username and password).

Typically, resources will be private either because they are confidential to the organisation (for example, an internal telephone directory), or because they are covered by restrictive licenses (for example, if the Library subscribes to a bibliography whose license restricts tissue to members of the University).

1639_intranet.png

For an Intranet to work, all computers connected together in a network (as shown in Figure) must speak and understand the same language, or protocol. The language used is Hyper Text Mark-up Language (HTML) and the protocol that both Intranets and the Internet use are called Transmission Control Protocol/Internet Protocol or TCP/IP. A network server supports all the activities of an Intranet. On the clients' side, a software, known as a browser, is used. (The browser is usually either Netscape Navigator or Internet Explorer.)

The browser, when invoked, seeks a server computer through the communication medium that has the first page or Home Page of the Intranet, which is usually seen in the folders as 'index.htm'. This is the default page for accessing the Intranet from any computer attached to an internal network. This is what automatically appears on the screen when a user logs in and clicks on the browser icon on the desktop for accessing the Internet also. The hyperlinks to specific files or databases requests for files send the control from anywhere on the network to the browser. The server accesses the file and sends back a copy of what it contains tothe computer or client that has requested for it.

It is the simplicity of TCP/IP that makes Intranets so easy to set-up. Web browsers can be used to connect to virtually any information source, from Structured Query Language (SQL) databases to highly proprietary information systems.

 

 


Related Discussions:- How does intranet work

Explain the hubs and repeaters, Hubs/Repeaters Hubs/Repeaters are used ...

Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality starts to deteriorate as segment exc

Odd-even transposition algorithem, Algorithm:  Odd-Even Transposition //...

Algorithm:  Odd-Even Transposition //Input: N numbers that are in the unsorted form //Assume that element bi is assigned to pi for I=1 to N { If (I%2 != 0) //i.e Odd

Briefly describe three security requirements of an agent, QUESTION (a) ...

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

Link state packet - network layer and routing , Link State Packet When ...

Link State Packet When  a router floods  the network  with information about its  neighbourhood. It is said to  be advertising. The basis of this  advertising is  a short  pack

Explain fiber-optics cable, Explain Fiber-Optics cable. A cable with ce...

Explain Fiber-Optics cable. A cable with central glass tube covered with protective shield which transmit data using photons is fiber optics cable. These cables transmit data t

What happens in cdma systems, Question: (a) Suppose that you are a comm...

Question: (a) Suppose that you are a communication engineer and you have to construct a mobile telephone network with bandwidth W = 4.2 MHz in each link. The data rate is

Configure basic switch parameters- ccna, Configure basic switch parameters....

Configure basic switch parameters. Configure the S1, S2, and S3 switches according to the following guidelines: Configure the switch hostname. Disable DNS lookup.

Hierarchical routing strategy, i want a program of hierarchical programming...

i want a program of hierarchical programming in c language with its output. please help me .

Encryption authentication - point to point , Encryption Authentication ...

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Advantages of fiber optics, Q. Advantages of Fiber Optics? - Higher ban...

Q. Advantages of Fiber Optics? - Higher bandwidth in comparison to twisted-pair and coaxial cable is not limited by medium but by equipment used to generate and receive signals

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd