Compare Intranet with Internet and LAN, Computer Networking

Assignment Help:

Intranet vs Internet vs LAN

It is certainly possible that both Intranets and the Internet can coexist. As spelt theoretically, the entire Intranet could be located at a remote site and users who are spread over a number of geographical locations can be permitted to access the data using secure links. Though cutting off the Intranet from outside world physically would make it function like a local network, it has its own advantages. The main advantage being a higher level of security. The immediate disadvantage is that if the organisation has remote locations it will have to evolve methods for permitting the employees or users to log on to the Intranet.

When it comes to comparison between the Intranet and LAN, it can be clearly observed that an Intranet is a network within the organisation whereas LAN is a campus wide network; geography plays a vital role. Intranet maybe considered as a group of LAN's of an organisation connected together as shown in Figure 2. They could be connected through a WAN architecture. Naturally, all the facilities that are available in client/server architecture are also applicable here.

 

1520_intranet.png

    Figure: Intranet is a group of LANs interconnected (may be at different locations)

 


Related Discussions:- Compare Intranet with Internet and LAN

Task of changing the ip address, 1. Bob has been given the task of changing...

1. Bob has been given the task of changing the IP address and enabling telnet access on a CISCO 2950 enterprise switch. The current IP address is 10.10.10.2/8 the new IP address

Define name space in domain name system, Q. Define Name Space in domain nam...

Q. Define Name Space in domain name system? - All names assigned to machines on an internet - Must be unique; either flat or hierarchical - Flat name space - name is assi

Password authentication protocols (pap), Password Authentication Protocols ...

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

Error detection-- crc, Error Detection-- CRC Powerful error detecti...

Error Detection-- CRC Powerful error detection system Rather than addition, binary division is utilized A series of redundant bits called "CRC" or else "CRC remai

How a token ring networks allows sharing of bandwidth, Question: (a) E...

Question: (a) Explain how a Token Ring networks allows sharing of bandwidth (access control). (b) (i) CSMA/CD is not appropriate for wireless communication. Explain wh

Definition of csma/cd, Definition of CSMA/CD CSMA/CD (Carrier Sense Mu...

Definition of CSMA/CD CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is used to minimize collisions, coordinate traffic and maximize number of frames deliver

User server interaction - application layer , User Server Interaction ...

User Server Interaction Cookies of the world  wide  web  was originally designed  as a stateess entity. A client  sends a request and the server responds. Their  relationship

#tit, objective practical questios answers

objective practical questios answers

Internet control message protocol layer, Simulate extremely limited forms o...

Simulate extremely limited forms of IP and ICMP. You will simulate 6 computers, 4 hosts and 2 routers, that are connected in an imaginary network with the topology as shown belo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd