What do you meant by extranets, Computer Engineering

Assignment Help:

Extranets can be also used to connect an intranet to Internet so that remote offsite access can be made in a company's intranet by an authorized individual. This can facilitate through an extranet.

Essentially, it uses smart cards and passwords to log in to a gateway server which checks requester's security credentials. If user checks out, she or he is allowed access into company's intranet structure.

A number of URL address are set aside for extranet and intranet use. Basically since intranets are self-contained networks, same set of addresses can be used by all intranets without conflict. Extranet addresses are designed such as to recognize intranets they connect and correctly preface every intranet address with an identifier. This enables two interconnected intranets to retain same set of address values and keep them from being mistaken. One class A address, ranging from 10.0.0.0 to 10.255.255.255 is reserved for intranet usage. Again, because an intranet is a self-contained system, it just needs one class A network to designate main network. Sub networks use reserved class B and class C addresses. There are total of 16 class B addresses, from 172.16.0.0 to 172.31.255.255 and 256 class C addresses that range from 192.168.0.0 to 192.168.255.255.


Related Discussions:- What do you meant by extranets

What is game playing ai, This covers a number of game playing methods, nota...

This covers a number of game playing methods, notably checkers and backgammon because so much good research has been completed on these problems and because so many different metho

What is the efi shell?, The EFI community has formed an open source shell e...

The EFI community has formed an open source shell environment. Rather than booting directly into a full OS, on some executions, the user can boot to the EFI shell. The shell is an

C, "Super ASCII", if it contains the character frequency equal to their asc...

"Super ASCII", if it contains the character frequency equal to their ascii values. String will contain only lower case alphabets (''a''-''z'') and the ascii values will starts from

Level of any node of a tree, Level of any node of a tree is :- Its distanc...

Level of any node of a tree is :- Its distance from the root

Define the concept of typing of object oriented analysis, Define the concep...

Define the concept of Typing of object oriented analysis Typing enforces object class such that objects of different classes cannot be interchanged.  Or we can say that, class

ANS, Smugglers are becoming very smart day by day. Now they have developed ...

Smugglers are becoming very smart day by day. Now they have developed a new technique of sending their messages from one smuggler to another. In their new technology, they are send

Pipe and filter , How to draw the pipe and filter using data flow and it co...

How to draw the pipe and filter using data flow and it components and connectors

Explain advantage of static storage class, Explain advantage of static stor...

Explain advantage of static storage class The second and more subtle use of 'static' is in connection with external declarations. With external constructs it provides a privacy

Data bus is bidirectional, Why address bus is unidirectional and data bus i...

Why address bus is unidirectional and data bus is bidirectional? Ans) Because there is no require address transaction among processor and peripheral device but data bus is req

Explain lan topologies, Explain LAN Topologies and its basic topologies. ...

Explain LAN Topologies and its basic topologies. LAN Topologies: Network topology is a physical schematic that shows interconnection of the various users. There are four fund

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd