Intranet, Computer Networking

Assignment Help:

Intranets are fundamentally "small" Internets. They employ the same network facilities which the Internet does, however access is limited to a restricted sphere. For example, a company can set up an intranet in the confines of the company itself. Access can be firmly controlled and restricted to authorized employees & staff. There is no connection to the Internet or any other outside network. Functions such as web sites, file uploads & downloads, and e-mail is accessible on intranets in the confines of the network.

As frivolous sites are no longer obtainable, there is no employee time lost because of accessing them. There is, certainly, the restriction of the networking area. The very benefit of limiting access to all of the facilities obtainable on the Internet also limits communication to other wanted locations. This is where the extranet steps in.

An extranet is network which connects a number of intranets in a truly mini-Internet Access is extended to all of the intranets linked through the extranet, however, again, not to the Internet. Extranets needs a constant Internet connection & a hypertext transfer protocol (http) server.


Related Discussions:- Intranet

Explain about wireless ethernet, Wireless Ethernet (802.11) a) Operates...

Wireless Ethernet (802.11) a) Operates on physical plus data link layers b) BSS (Basic service set) stationary or mobile wireless stations and a central base station known a

State synchronous FDDI, Synchronous Synchronous traffic is able to cons...

Synchronous Synchronous traffic is able to consume a portion of the 100 Mbps total bandwidth of an FDDI network while asynchronous traffic can consume the rest. Synchronous

Write a long note on internet and privacy, Question 1 Write a long note on...

Question 1 Write a long note on computers in television development Question 2 Write a long note on the ‘Steadicam' Question 3 Write a long note on Internet and pr

Firewalls, Firewalls Firewalls emerged as a new technology in 1990s but...

Firewalls Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to des

Advantages and disadvantages of public and private network, The disadvantag...

The disadvantages and advantages of Private and Public networks are shown in the table below:

Which statement is true regarding half duplex, Half duplex is analogous to ...

Half duplex is analogous to a one a lane bridge, it can handle traffic in both directions but no at the similar time.

Firewall architectures-screened host architecture, Screened Host Architectu...

Screened Host Architecture This architecture consists of two host machines: a Screening Router and a Screening Host. Screening Router is placed between a local network and the

TCP, TCP creates a reliable data transfer service, in addition to IP''s unr...

TCP creates a reliable data transfer service, in addition to IP''s unreliable best-effort service. Study the related sections of the text, and in your own words, summarize how TCP

Determine theoretical data capacity of the wireless channel, Consider a sim...

Consider a simple wireless data link using channel bandwidth of 40 kHz. The transmit power level is 20 dBm, the link attenuation is 40 dB and the SNRdB at the receiver is 20 dB.

What is ping, What is Ping? Ping is a utility program that permits you ...

What is Ping? Ping is a utility program that permits you to check connectivity among network devices on the network. You can ping a device by using its IP address or device nam

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd