How does intranet work, Computer Networking

Assignment Help:

How does Intranet Work?

An Intranet can be defined as a private network which uses Internet tools. The principal tool is the Web browser, but there are other Internet tools such as ftp and telnet that are useful. The resources defined as private maybe protected physically (with a firewall or a separate physical network), geographically (by restricting access to computers with a network address on the local network), or personally (by username and password).

Typically, resources will be private either because they are confidential to the organisation (for example, an internal telephone directory), or because they are covered by restrictive licenses (for example, if the Library subscribes to a bibliography whose license restricts tissue to members of the University).

1639_intranet.png

For an Intranet to work, all computers connected together in a network (as shown in Figure) must speak and understand the same language, or protocol. The language used is Hyper Text Mark-up Language (HTML) and the protocol that both Intranets and the Internet use are called Transmission Control Protocol/Internet Protocol or TCP/IP. A network server supports all the activities of an Intranet. On the clients' side, a software, known as a browser, is used. (The browser is usually either Netscape Navigator or Internet Explorer.)

The browser, when invoked, seeks a server computer through the communication medium that has the first page or Home Page of the Intranet, which is usually seen in the folders as 'index.htm'. This is the default page for accessing the Intranet from any computer attached to an internal network. This is what automatically appears on the screen when a user logs in and clicks on the browser icon on the desktop for accessing the Internet also. The hyperlinks to specific files or databases requests for files send the control from anywhere on the network to the browser. The server accesses the file and sends back a copy of what it contains tothe computer or client that has requested for it.

It is the simplicity of TCP/IP that makes Intranets so easy to set-up. Web browsers can be used to connect to virtually any information source, from Structured Query Language (SQL) databases to highly proprietary information systems.

 

 


Related Discussions:- How does intranet work

Designing a network for a retail customer, You are designing a network for ...

You are designing a network for a retail customer; they plan to have 5 locations initially with the main store acting as the warehousing depot.  Within the next year they are plann

What are the working of software team, What are the working of software tea...

What are the working of software team The software team has to learn every bit of things related to computers. Since different users work on different platforms and application

Request to a server, If a client gives a 4096-byte request to a server loca...

If a client gives a 4096-byte request to a server located 50 km away on a 1 Gbps fiber optic, then what is the efficiency of the line during this time? Suppose that the server give

What is the catalogue intranet, What is the Catalogue Intranet Intra...

What is the Catalogue Intranet Intranets of this type are often more accurately described as Extranets. They are designed to give access to a large catalogue of information,

Discuss on the characteristics of agents, Question 1 Discuss on the cha...

Question 1 Discuss on the characteristics of agents 2 Belief, Desire and Intention architecture is the most popular agent architecture. Procedural Reasoning System (PRS) is

Try for selective repeat, - Lost as well as delayed ACKs - Bidirectional...

- Lost as well as delayed ACKs - Bidirectional transmission both side needs both sending and receiving windows Note: In selective repeat ARQ the size of the sender and rece

What is a database server, What is a Database Server? With a database s...

What is a Database Server? With a database server, the client passes SQL requests as messages to the database server. The results of every SQL command are returned over the net

Give the solutions to the threats, Give the solutions to the threats In...

Give the solutions to the threats In order to implement solutions to the threats, it is advisable that the company should maintain proper password protected hardware. Wherever

What are the key elements of protocols, What are the key elements of protoc...

What are the key elements of protocols? The key elements of protocols are a. Syntax   It refers to the structure or format of the data that is the order in which they a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd