What are the fundamentals of intranet, Computer Networking

Fundamentals of intranet

Introduction

The history of the Intranet starts right from the days when computer networks came in. However, it could find a name and place for itself quite late. Websters dictionary defines a network as -

Network ="The sharing of resources between two or more people" - Websters It is well known that the Internet has been in existence since the mid1970s, and was developed initially bythe governments as a medium of communication channels at the time of war. It did not gain substantially in popularity until 1989, when for the first time Web Browser software was introduced and the use of the HTML (or Hypertext Markup Language) came in. Slowly the concept of websites and web hosting picked up. The system was designed, from the very start, to be very robust, quick, and easy to use. Additionally, the system was built to be available cross-platform, a fancy way of saying that all computer systems would be able to understand it.

2472_intranet.png

 

Very quickly, this massive network was destined to become a milestone for the much talked about "information superhighway." This has led to an increasing number of commercial organisations struggling to use information technology services, and since the mid-1990, the number of businesses connecting to the Internet has multiplied several times.

 

 

Posted Date: 9/24/2013 3:23:08 AM | Location : United States







Related Discussions:- What are the fundamentals of intranet, Assignment Help, Ask Question on What are the fundamentals of intranet, Get Answer, Expert's Help, What are the fundamentals of intranet Discussions

Write discussion on What are the fundamentals of intranet
Your posts are moderated
Related Questions
Determine the Difficulties arise with database connectivity A number of difficulties arise with database connectivity and the company may have to shell out an enormous amount

Transport Layer In computer networking it the transport  layer is where  sessions are  exchanged between  hosts. This layer resides  between  the application layer and  networ

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible? b. Suppose

Q. Show the Drawbacks of Go-back-N? Drawbacks of Go-back- N - Inefficient - Every out of order received packets are discarded (receiver side is simplified) - This


It's a Hybrid device that joins the features of both bridges and routers.

Perfect Shuffle Permutation This was advised by Harold Stone (1971). Consider N objects each characterized by n bit number say  X n-1, X n-2, X 0    (N is chosen such that N

It treats all processors as equivalent. Any processor can do the work of any other processor. Applications are separated into threads that can run simultaneously on any available p

Q Illustrate Unipolar line coding? - Simplest method is inexpensive - Utilizes only one voltage level - Polarity is habitually assigned to binary 1 a 0 is represented by

What is a Transaction server? With a transaction server, the client includes remote procedures that reside on the server with an SQL database engine. These remote processes on