Extranet, Computer Networking

Assignment Help:

Extranets can also be utilized to link an intranet to the Internet in order that remote offsite access can be built into a company's intranet through an authorized individual. It can facilitate through an extranet.

On the whole, it employs passwords & smart cards to log in to a gateway server which verify the requester's security credentials. If user checks out, he or she is allowed access in the company's intranet structure.

A number of URL address are set aside for intranet & extranet use. In essence since intranets are self-contained networks, the same set of addresses can be utilized through all intranets without conflict. Extranet addresses are designed to identify the intranets they link and correctly preface every intranet address along with an identifier. It allows two interconnected intranets to achieved the same set of address values and keep them from being wrong. One class A address, ranging from 10.0.0.0 to 10.255.255.255 is holed for intranet usage. Again, as an intranet is a self- contained system, it needs only one class A network to designate the major network. Subnetworks employ reserved class B & class C addresses. There are sixteen class B addresses, from 172.16.0.0 ti 172.31.255.255 & 256 class C addresses that range from 192.168.0.0 trhough 192.168.255.255.


Related Discussions:- Extranet

Explain how the LAN model be developed, Explain how the lan model be develo...

Explain how the lan model be developed The LAN model can be developed incrementally. If LAN is just a long cable. it cannot be brought down by single failure (if servers are re

Snort deployed in the dmz network, Let's consider the network shown in Figu...

Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or

IPV6, is DVMRP multicast prtocol supports IPV6?

is DVMRP multicast prtocol supports IPV6?

Interconnection networks and sorting, As in PRAM, there was no direct commu...

As in PRAM, there was no direct communication medium among the processors, therefore another model called as interconnection networks have been designed. In the interconnection net

Show the crc-performance, Q. Show the CRC-Performance ? CRC-Performanc...

Q. Show the CRC-Performance ? CRC-Performance CRC is able to detect all burst errors that affect an odd number of bits CRC is able to detect all burst errors of

Explain about domain name system, Q. Explain about Domain Name System? ...

Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN

Illustrate about the working of socks protocol, Illustrate about the workin...

Illustrate about the working of Socks protocol SOCKS is an open, industry-standard protocol advanced by the Authenticated Firewall Traversal working group of the IETF (Internet

Show the subnetting process, Q. Show the Subnetting process? Subnettin...

Q. Show the Subnetting process? Subnetting (cont) Subnetting creates an intermediary level of hierarchy IP datagram routing then involves three steps: delivery t

Enumerate about the virtual private network, Enumerate about the Virtual Pr...

Enumerate about the Virtual Private Network (VPN) Even though, many firewalls also include the features of the virtual private network, the functionality and capabilities of V

Ieee report, http://cseweb.ucsd.edu/~savage/papers/CCS12Exploit.pdf

http://cseweb.ucsd.edu/~savage/papers/CCS12Exploit.pdf

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd