What are the fundamentals of intranet, Computer Networking

Fundamentals of intranet

Introduction

The history of the Intranet starts right from the days when computer networks came in. However, it could find a name and place for itself quite late. Websters dictionary defines a network as -

Network ="The sharing of resources between two or more people" - Websters It is well known that the Internet has been in existence since the mid1970s, and was developed initially bythe governments as a medium of communication channels at the time of war. It did not gain substantially in popularity until 1989, when for the first time Web Browser software was introduced and the use of the HTML (or Hypertext Markup Language) came in. Slowly the concept of websites and web hosting picked up. The system was designed, from the very start, to be very robust, quick, and easy to use. Additionally, the system was built to be available cross-platform, a fancy way of saying that all computer systems would be able to understand it.

2472_intranet.png

 

Very quickly, this massive network was destined to become a milestone for the much talked about "information superhighway." This has led to an increasing number of commercial organisations struggling to use information technology services, and since the mid-1990, the number of businesses connecting to the Internet has multiplied several times.

 

 

Posted Date: 9/24/2013 3:23:08 AM | Location : United States







Related Discussions:- What are the fundamentals of intranet, Assignment Help, Ask Question on What are the fundamentals of intranet, Get Answer, Expert's Help, What are the fundamentals of intranet Discussions

Write discussion on What are the fundamentals of intranet
Your posts are moderated
Related Questions
List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It depends excellent throughput under high-load conditions. b. Token Ring

Virtual Private Network  ( VPNs) When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for

Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? Ans) 172.16.2 120 is a standard Class B address with a subnet mask that permit

Address Resolution Protocol resolves the MAC address if the IP address is known. It is a layer 3 protocol.

explain Learning Bridges in deatil.

Authentication in PPP PPP can support  authentication operations at the  beginning of a connection. In some  cases reauthentication is also  possible  during  a session.  Endpo

POWER SUPPLY SYSTEM IN  SATELLITE SYSTEM Satellite Earth Station relies on the public power supply system. Two generators (1+1) of 250 KVA each in parallel connection having fa

After studying this part the students will be able to understand about the following: Analysis of Parallel Algorithms; Different Models of Computation; o   Interco

What is Stop-and-Wait Protocol? In Stop and wait protocol, sender sends single frame, waits unless it receives confirmation from the receiver (okay to go ahead), and then sends

Q. Define Name Space in domain name system? - All names assigned to machines on an internet - Must be unique; either flat or hierarchical - Flat name space - name is assi