Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Extranets can be also used to connect an intranet to Internet so that remote offsite access can be made in a company's intranet by an authorized individual. This can facilitate through an extranet.

Essentially, it uses smart cards and passwords to log in to a gateway server which checks requester's security credentials. If user checks out, she or he is allowed access into company's intranet structure.

A number of URL address are set aside for extranet and intranet use. Basically since intranets are self-contained networks, same set of addresses can be used by all intranets without conflict. Extranet addresses are designed such as to recognize intranets they connect and correctly preface every intranet address with an identifier. This enables two interconnected intranets to retain same set of address values and keep them from being mistaken. One class A address, ranging from 10.0.0.0 to 10.255.255.255 is reserved for intranet usage. Again, because an intranet is a self-contained system, it just needs one class A network to designate main network. Sub networks use reserved class B and class C addresses. There are total of 16 class B addresses, from 172.16.0.0 to 172.31.255.255 and 256 class C addresses that range from 192.168.0.0 to 192.168.255.255.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9579909

Have any Question?


Related Questions in Computer Engineering

Discuss how the scope of computer security grew from

Discuss how the scope of computer security grew from physical security to include : Securing the data Limiting random and unauthorized access to that data. Involvement of personnel from multiple levels of the organizatio ...

Both the search and the insertion time for a b-tree are a

Both the search and the insertion time for a B-tree are a function of the height of the tree. We would like to develop a measure of the worst-case search or insertion time. Consider a B-tree of degree d that contains a t ...

A company is considering producing a new product based on

A company is considering producing a new product. Based on past records, management believes that there is a 70 percent chance that the new product will be successful, and a 30 percent chance it will not be successful. M ...

Can someone show me a working implementation in c source

Can someone show me a working implementation, in C source code, of a Linux shell that will use shared memory for command execution using pipes that read data from the shared memory region? For example: you type ls -1 | w ...

Question critical infrastructures -1discuss cybersecurity

Question: Critical Infrastructures - 1. Discuss cybersecurity policy issues affecting SCADA and ICS systems for Critical Infrastructure services for the public, and compare those issues to the policy issues that affect t ...

Question which register is allowed to be used as a pointer

Question : Which register Is allowed to be used as a pointer for register indirect addressing when accessing data stored in program ROM? Give the name and show how it is used Write a program that will read the following ...

The diet doctor claims that the average north american is

The diet doctor claims that the average North American is more than 20 pounds overweight. To test his claim, a random sample 30 Of north Americans was weighted, the difference between their actual weight and their ideal ...

A study was conducted of pleas made by 1032 criminals among

A study was conducted of pleas made by 1,032 criminals. Among those criminals, 954 pled guilty, and 394 of them were sentenced to prison. Among the 78 of the other criminals, who pled not quilty, 58 were sentenced to pri ...

Research the fire at the federal aviation administration

Research the fire at the Federal Aviation Administration (FAA) facility in Chicago, Illinois (2014). Provide insight into the following: What went wrong? What went right? Would a risk assessment strategy if employed miti ...

Scheduling algorithms are again becoming more important as

Scheduling algorithms are again becoming more important as we look at operating system that run on mobile devices. Are their scheduling algorithms different from those found on traditional interactive system? Compare and ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As