How does intranet work, Computer Networking

Assignment Help:

How does Intranet Work?

An Intranet can be defined as a private network which uses Internet tools. The principal tool is the Web browser, but there are other Internet tools such as ftp and telnet that are useful. The resources defined as private maybe protected physically (with a firewall or a separate physical network), geographically (by restricting access to computers with a network address on the local network), or personally (by username and password).

Typically, resources will be private either because they are confidential to the organisation (for example, an internal telephone directory), or because they are covered by restrictive licenses (for example, if the Library subscribes to a bibliography whose license restricts tissue to members of the University).

1639_intranet.png

For an Intranet to work, all computers connected together in a network (as shown in Figure) must speak and understand the same language, or protocol. The language used is Hyper Text Mark-up Language (HTML) and the protocol that both Intranets and the Internet use are called Transmission Control Protocol/Internet Protocol or TCP/IP. A network server supports all the activities of an Intranet. On the clients' side, a software, known as a browser, is used. (The browser is usually either Netscape Navigator or Internet Explorer.)

The browser, when invoked, seeks a server computer through the communication medium that has the first page or Home Page of the Intranet, which is usually seen in the folders as 'index.htm'. This is the default page for accessing the Intranet from any computer attached to an internal network. This is what automatically appears on the screen when a user logs in and clicks on the browser icon on the desktop for accessing the Internet also. The hyperlinks to specific files or databases requests for files send the control from anywhere on the network to the browser. The server accesses the file and sends back a copy of what it contains tothe computer or client that has requested for it.

It is the simplicity of TCP/IP that makes Intranets so easy to set-up. Web browsers can be used to connect to virtually any information source, from Structured Query Language (SQL) databases to highly proprietary information systems.

 

 


Related Discussions:- How does intranet work

State the uses of groupware, State the uses of groupware With the use o...

State the uses of groupware With the use of groupware, users can easily do most of the office related management work, which otherwise would be extremely difficult. For instanc

Difference between routable and non- routable protocols, What is the differ...

What is the difference between routable and non- routable protocols? Routable protocols can work with a router and can be used to make huge networks. Non-Routable protocols

Define encoder, Define Encoder? A device or program that uses predefine...

Define Encoder? A device or program that uses predefined algorithms to encode, or compress audio or video data for storage or transmission use. A circuit that is used to change

Determine about the complete and proper security, Determine about the Compl...

Determine about the Complete and proper security Complete and proper security configuration and administration is indeed a complex issue. One should think carefully about the

Describe a basic communication model, NETWORK MANAGEMENT & SECURITY 1. ...

NETWORK MANAGEMENT & SECURITY 1. Describe a basic communication model. 2. State the following terms: a. Configuration Management b. Fault Management c. Security Management

Repeaters, REPEATERS:  Repeaters are needed when copper wire communica...

REPEATERS:  Repeaters are needed when copper wire communication is takes place. According to the fact that electrical signal goes weaker while travelling over copper lines. A

What is the beaconing, An FDDI frame or Token Ring frames those points to s...

An FDDI frame or Token Ring frames those points to serious problem with the ring, like a broken cable. The beacon frame carries the address of the station thought to be down.

Floating point representation in memory, Floating Point Representation in M...

Floating Point Representation in Memory 1. Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this rep

Define router. explain its type, Question 1 Define Router. Explain its typ...

Question 1 Define Router. Explain its type Question 2 List and discuss the different concepts of EIGRP Question 3 Explain the concept of autonomous system Autonomo

What is border gateway protocol, What is BGP (Border Gateway Protocol)? ...

What is BGP (Border Gateway Protocol)? It is a protocol used to promote the set of networks that can be reached within an autonomous system. BGP enable this information to be c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd