How does intranet work, Computer Networking

Assignment Help:

How does Intranet Work?

An Intranet can be defined as a private network which uses Internet tools. The principal tool is the Web browser, but there are other Internet tools such as ftp and telnet that are useful. The resources defined as private maybe protected physically (with a firewall or a separate physical network), geographically (by restricting access to computers with a network address on the local network), or personally (by username and password).

Typically, resources will be private either because they are confidential to the organisation (for example, an internal telephone directory), or because they are covered by restrictive licenses (for example, if the Library subscribes to a bibliography whose license restricts tissue to members of the University).

1639_intranet.png

For an Intranet to work, all computers connected together in a network (as shown in Figure) must speak and understand the same language, or protocol. The language used is Hyper Text Mark-up Language (HTML) and the protocol that both Intranets and the Internet use are called Transmission Control Protocol/Internet Protocol or TCP/IP. A network server supports all the activities of an Intranet. On the clients' side, a software, known as a browser, is used. (The browser is usually either Netscape Navigator or Internet Explorer.)

The browser, when invoked, seeks a server computer through the communication medium that has the first page or Home Page of the Intranet, which is usually seen in the folders as 'index.htm'. This is the default page for accessing the Intranet from any computer attached to an internal network. This is what automatically appears on the screen when a user logs in and clicks on the browser icon on the desktop for accessing the Internet also. The hyperlinks to specific files or databases requests for files send the control from anywhere on the network to the browser. The server accesses the file and sends back a copy of what it contains tothe computer or client that has requested for it.

It is the simplicity of TCP/IP that makes Intranets so easy to set-up. Web browsers can be used to connect to virtually any information source, from Structured Query Language (SQL) databases to highly proprietary information systems.

 

 


Related Discussions:- How does intranet work

Explain about horn antenna, Q. Explain about Horn Antenna? - Outgoing t...

Q. Explain about Horn Antenna? - Outgoing transmissions broadcast by a stem and deflected outward - Received transmissions collect by a scooped part of the horn and deflecte

Differentiate between ftp and tftp, Question 1 Explain the TCP/IP protocol...

Question 1 Explain the TCP/IP protocol suite. List (Network Interface Layer, Internet Layer, Transport Layer, Application Layer) Question 2 Write short note on

What does ''p'' mean when running a trace, When a P is returned when a Trac...

When a P is returned when a Trace is run, it means the Protocol is unreachable.

What do you mean by osi, What do you mean by OSI? The Open System Inter...

What do you mean by OSI? The Open System Interconnection (OSI) reference model explains how information from a software application in one computer moves by a network medium to

Briefly write functionalities of different osi layers, Briefly write functi...

Briefly write functionalities of different OSI layers? The OSI Reference Model includes seven layers. Basic functionality of each of them is as follows: 1. Physical Layer:

The ip addressing scheme, An Internet address (IP address) is a unique 32-b...

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 3

What is microwave, What is Microwave? Microwaves have been used in data...

What is Microwave? Microwaves have been used in data communications. Microwave has a higher frequency than radio waves and thus can handle larger amounts of data.

What are intrusion detection systems, Question : a) Give three example...

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Which statement is true regarding half duplex, Half duplex is analogous to ...

Half duplex is analogous to a one a lane bridge, it can handle traffic in both directions but no at the similar time.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd