Explain in dteail about the intranet, Computer Networking

Assignment Help:

Explain in dteail about the intranet

The first Web browser was called Mosaic, and the HTML concept, although not a new one, has accelerated data access and research. In short, the idea was that although books presented information in a linear fashion, people more often than not have a need to follow it in a three dimensional pattern. Taking an example of a person who might be reading a paragraph on fractals, and then came across a reference to an XYZ Company using this technique for developing software on artificial life. A lot of desired material could be obtained and the person doesn't have to even know what the XYZ Company is.

Before the advent of HTML, either the person would have turned tothe index page at the back of the book to look for XYZ Company, or even had to go to find another book to learn about the fractals. Now with the use of HTML, a simple click on the word XYZ Company would take him to an entirely different reference that explains what the company is and what it does. After reading, a hit on the back button would navigate him back to the exact place in the document he had been reading earlier.

Every portion of the Internet was designed with the forethought to make it robust and easy to use. Even though a number of mistakes had been made during the development and some backtracking has been necessary, but, generally speaking, Internet has proven to be one of the easiest way to use systems ever evolved. This could probably be the reason that the Internet has grown so fast and so vast. The Internet has grown to over 250 million users within 12 years and has already become an integral part of our daily lives.

 

1030_intranet.png


Related Discussions:- Explain in dteail about the intranet

What is the last step in data encapsulation, The Five steps to data encapsu...

The Five steps to data encapsulation (IN ORDER): 1) User information is changed into data. 2) Data is changed into segments. 3) Segments are changed into datagram and pack

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Statements about ppp and slip for wan communications, State the statements ...

State the statements about PPP and SLIP for WAN communications?  Ans)    a) PPP uses its Network Control Programs (NCPs) component to encapsulate many protocols.  b) SLIP

Define the term - handoff and dynamic configuration, Define the term - Hand...

Define the term - Handoff and Dynamic configuration Handoff/roaming  The MAC protocol used in the wireless LAN should enable mobile stations to move from one cell to anoth

Merits of a network based ids and a host based ids, Question: (a) Descr...

Question: (a) Describe the following biometric techniques:- (i) Retina scan, (ii) Fingerprint, (iii) Iris Scan. Your answer should consider the following: the data storage requ

Tcp segment structure - transport layer, TCP Segment Structure Figure ...

TCP Segment Structure Figure shows the format of the TCP segment. The  header consists  of a 20 bytes  fixed  part  plus a variable size  options fields. The description  o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd