Wednesday, July 17, 2019
Large corporations Essay
Intranets argon private nettsites, attributeions, or channels, usu wholey owned by large corporations. The odour and the environment of Intranets atomic number 18 relatively the same as internets the moreover difference between them is the fact that Intranets create to be nettleible only to a gathering of authorized individuals that travels to a certain company. For an Intranet connection to work, the comportment of at to the lowest degree two hosts is unavoidable, and one of which is going away to act as a web or a file server. The one, on the separate hand, is conjectural to work as an email server.The faster and to a greater extent efficient the microprocessor these individual server has, the better lead the Intranet performance is going to be. Of course, aside from the servers, individual calculating machines that connect to the Intranet atomic number 18 to a fault part of the unscathed frame-up. These node information processing systems buns be connected both physic all(prenominal) toldy to the server done the use of a meshing cable or tunerly courtesy of wireless net in exercise cards (Koehler, 1998). The two servers involved are tasked to contain files, folders, and web pages to all the calculators connected to it through it. The whole apparatus is also do possible through the use of the server computer software form installed in it.Depending on what is take, each of the two servers needs an operating(a) system, much(prenominal) as Windows, Unix, or Linux, and a combination of contrastive programming software like ASP, PHP, XML, Perl, and opposite connatural applications. Client computers however, would just require a useable operating system and a compatible browser (Dasgupta, 2001). It is the software that basically allows Intranet to function. A lawful Windows operating system such as Windows 2000 and Windows XP are opened of working as web and email servers later on performing the necessary configura tion.However, a lot of administrators favour to use Windows 2000 Server or Novell instead of the ones give tongue to to a higher place. Both Windows 2000 Server and Novell have the necessary software embedded in them so that the Intranet connection nominate perfectly pass through. Intranet entropy are transfer through the use of protocols, sockets, ports, and IP spoken languagees. Once the required sets of software are configured and the necessary computer wakelessware in place, because the Intranet connection successfully works. It does not stop thither, however. In an cozy office intranet setup, protective cover is of ut intimately importance.Without aegis parameters, data becomes accessible to the public. The regular username-password dialogue box manifests a commonly practice Intranet security method. just aside from that, firewalls disregard also serve as a good security measure because of its powerfulness to block access from an self-appointed IP addresses and similar connection points. Encryption software can also be apply, especially if affectionate data are involved, such as rely account numbers, credit cards, and similar financial study (Ashley, 1999). II. Hardware Any regular computer with a vane card physically or remotely connected to the intranet can access the server.The more beta hardware fatalitys in an inner office intranet setup therefore, are the web, file, and email servers. These servers should adequately provide high-velocity access to the whole network, as they are the rear of the Intranet system. An office system with more than a railway yard employees need a file server with 4 Megahertz processor speed having at least 1 Gigabytes of memory installed. On the other hand, the hard disk it contains should be 10 gigabytes or above and ideally, should follow a redundant array configuration. soundless considered as part of the hardware requirement is the servers operating system and it is the platform from which the Intranet system exit work. As stated previously, Microsoft Windows 2000 Server is an ideal of a functional operating system as it has Microsoft Internet Information Server pre-installed in it. Macintosh, Linux and Unix are also popular choices, although which platform to choose depends merely on the developers expertise and the companys resources. Intranet follows the basic idea of local area networking. As such, the use of physical network connections is required, either direct or wirelessly. nearly companies use network cards, cables, hubs, switches and wireless routers to transmit data requests from the computer to the server and then back again. And for the server to understand which remote computer pass a particular data, the concept of IP addressing comes into play. IP address means Internet communications protocol address and each computer in the network is assigned a unique number that go within the servers subnet. Computers dont necessarily understand human language. Consequently, the data trustworthy from the remote computer has to be translated into a code that the principal(prenominal) servers can understand.This is the main task of a protocol stack, which is another program built-in into a computers operating system. Protocol slews are more commonly called as the transmission control protocol/IP protocol, and this is what most companies, large and small identical prefer to use. These data pass through ports. Ports are a special set of numbers drive home in the header of every data package sent by the client and the server. Ports are used so that the data being transmitted are mapped properly and directly to the correct process or application as headingated. Different applications use various ports.Files, web pages, and emails each pass through a unique port in a computer. This is main reason why it is possible to accept these cardinal different type so data packets all at the same prison term (Dasgupta, 2001). Routers, on the oth er hand, are the devices that are tasked to hunch the exact situation of the computer that the data is intended for. Routers can either be a software functioning inner(a) the server, like in the case of proxies. nevertheless in many cases, a router is a hardware that contains a firmware that has the capacity to direct traffic within the network or sub-network.While routers know all the computers below them, they do not necessarily know the ones above them. The moment that a packet, or a piece of information, is received by the router from the server, it checks the IP address the data is for. When it finds its location, it will then send the data accordingly. Else, it would transfer the data to the next router in the network, which will do the exact same process until the computer with the matching IP address is found. After which, the computer receives the data and is translated in a human-understandable form so that it can be used by the employee who requested it (Dasgupta, 200 1).III. Software After the physical layer is in place and is running, the next thing that the administrator has to do is to setup the server-side functions of inner office Intranet. Depending upon the requirements of the company, a web page-like user interface can be installed, which usually come in the form of simple HTML software. But that can be enhanced if utilized along with different script builder programs such as Cold Fusion, CGI, and database applications like Oracle. AT this point, the concepts applied here are generally the same as that an Internet connection. completely in this case, the data is not made accessible to the public, but only to the authorized battalion belonging to the office network. Aside from hard-core label software, there is also that need for a design or the so-called perfect interface. Design and interface falls under the wet ware requirement of an Intranet network, although this category is still considered part of the software requirements. The most common reason why companies choose to setup an Intranet connection is because they have that need to gather all their employees at a common point.For this reason alone, an Intranets design and presentation becomes important. Consequently, they should always go sound within what the employees wants to see and hear every time they access the portal and what the management and the shareholders want to impart. And aside from a good web designer, a intellectual writer may also be required to create announcements, ads, slogans, and content for the inner offices intranet site (Koehler, 1998). IV. Security The most important horizon of Intranet connection would be its security, for it is that which primarily makes the Intranet different from the Internet.In an Internet setup, people from across the globe can access the data provided they have a send for line, a modem, and a decent connection speed. Whereas in an Intranet, only authorized people are allowed. Only those who have desk s and computers provided by the company can peradventure have access to Intranet. Furthermore, in an Intranet setup, employees are condition a username and password and from there, they can be categorize according to their respective plane section. As a result, only people belonging to a particular discussion section can access the resources allotted to them.For example, the finance department can only go through files relate to accounting while the marketing department can only download, modify, and create files that relates to sales. Most of the time, those people who belong to the upper echelon are given total access across departments (Koehler, 1998). Aside from categorization, it is also important for an inner office intranet to use firewalls to further protect their network from illegitimate outside access. Some intranets allow out-of-door access from their employees, meaning these people have the ability to connect from outside the office by sacking through a virtual private network.For such applications, intensive firewalls are needed to keep other people away from the companys database and server. Most companies use Cisco router firewalls, which can be considered as hardware, while there are companies that settle for rigorously software-based firewalls similar but not totally alike, to what Norton, Symantec, and AVG creates. But most firewalls that large corporations use are super customized meaning a pool of expert programmers are commissioned to create them from scratch. Open ended and personalized firewalls like these are harder to penetrate unlike the pre-built ones.Basically, what firewalls do is to block the ports from which data passes through, especially if the request comes from an unauthorized source (Ashley, 1999).ReferencesAshley, Paul. (1999). Practical Intranet Security Overview of the State of the artistic production and Available Technologies. Massachusetts Kulwer Academic Publishers. Dasgupta, Subhasish. (2001). Managing I nternet and Intranet Technologies in Organizations Challenges and Opportunities. Pennsylvania Idea Group Publishing. Koehler, Jerry W. (1998). The Human aspect of Intranets Content, Style, & Politics. Florida CRC Press LLC.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.