Internet Infrastructure Essay

837 words - 3 pages

In today's society, quick access to information is a vital commodity for the success of any corporation. Many corporations are now implementing computerized information systems to have fast and easy access to all prioritize information. The Internet provides corporations with a broad range of information, while the Intranet provides corporations specialized security that protects the entire network of the organization. In the past, the Intranet was an information system used for sharing policies, procedures, and forms. Today, with the mainstream of the Internet, the Intranet has evolved into a collaborative medium that provides employee's quick, comprehensive access to virtually all information pertaining to the organization. The purpose of this paper is to define the intranet, purpose, benefits, and examples of organization use.The Intranet is similar to the Internet and shares the same concepts and technologies such as: client-server computing and Internet protocol suite such as: HTTP for web services, SMTP for e-mail, and FTP for file transfer. The Internet and Intranet are similar, but have one exclusive difference; the Intranet is a private network. The Intranet is defined as "an interconnected network, usually one that uses the TCP/IP protocol set, and does not extend beyond the organization that created it" (Schneider, 2004). The Intranet can be best described as a private version of the Internet, confined to only the creating organization.The purpose of the Intranet is to allow an organization the ability to store and retrieve data, provide customer relationship management and project management tools, applications, corporate directories, video conferencing, and communication to name a few, all within a private network. The private network connects each facility of the organization, and their employee providing instant access to organizational information. In the past, a disadvantage was that only on-site employees could access the Intranet but today, employees can now access the Intranet through the Internet using virtual private network (VPN) connectivity providing more advantages.The Intranet provides several of advantages for corporations such as: communication, productivity and effectiveness, and cost reduction. Communication benefits include: better central communication of objectives and guidelines/best practices - outward/downward, better decentralized, ad-hoc, collaborative execution, opportunism, and learning - within and among teams, and enhanced decision quality, understanding, acceptance, and execution (Reisman, n.d.). Fortune 500 companies "project Intranet savings in information exchange amounting to 10% for all managers/professionals" (Reisman, n.d.). The Intranet increases communication productivity through faster, easier, more flexible, and open communication.A corporate Intranet can vastly benefit the organization by increasing productivity and effectiveness. The productivity "increases are results through better...

Find Another Essay On Internet Infrastructure

Information Technology Plan Essay

648 words - 3 pages Internet/web technology to deliver export services to HCI's clients, and includes upgrading overseas telecommunications services necessary to implement electronic commerce applications.*IT Infrastructure - provides replacement equipment necessary to support e-commerce applications and desktop Internet access throughout HCI's overseas infrastructure; implements an innovative distance-learning system for HCI's global workforce.*Document Management

State and Non-state Actors that Pose the Greatest Cyber Threat to the United States

2253 words - 10 pages Conduct giving both governments authority over content and information over the internet, an effort that is scrutinized. (Kirk, 2013). The private sector owns approximately 85-90% of our cyber infrastructure, there’s need for a cohesive private-government partnership to enforce security. Individuals (whether internal to the organization or agency), political groups, religious groups, and organized crime groups pose threat to the United States

Internet2-New Wave Of The Future

504 words - 2 pages tasks.Internet2, which is currently in development, is the new wave of the future. Unlike its predecessor before, Internet2 is far better planned. Internet2 shows what the net will do three to five years down the road. Internet2 is a high-performance network that uses an entirely different infrastructure than the public Internet. The heaps of bandwidth which Internet2 has the capacity to handle has opened up a new world of applications that are either

Cloud Computing

1669 words - 7 pages 1. Cloud Computing Cloud computing is becoming one of the key words of the IT industry. The cloud is a metaphor for the Internet or infrastructure of communication between the architectural components, based on an abstraction that hides the complexity of infrastructure. Each part of this infrastructure is provided as a service and they are normally allocated in data centres, using hardware shared computing and storage (Buyya et al. 2009b). To

Cloud Computing

1806 words - 7 pages its infancy, an introduction to cloud computing, defining its major components, with a focus on Software-as-a-Service (SaaS), is the foremost theme of this paper. There are three major elements of cloud computing - Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). Software as a Service (SaaS) is the process of remotely accessing software applications via the Internet circumventing the need to have

Market Analysis on Wireless Business Growth

1602 words - 6 pages The convergence of wireless technology and the Internet is creating new markets and new revenue streams, especially identifiable for three key vertical segments, i.e. wireless infrastructure vendors, wireless service providers and content portals, and it is reported that wireless portal revenue is set to grow from a figure of $747 million to $42 billion in 2005.There are two streams of revenue for wireless portals:* The first revenue stream of

The IT Department and Virtualization

994 words - 4 pages Introduction Virtualization has become an essential service that the IT department has offered to Access strategies internal users as a service. The result of this initiative has been a cost saving. As a result of the success, the company has mandated this approach to be adopted for our remote offices. However, our business need for expansion has resulted in the need for adopting new security strategies to protect our virtual infrastructure

E-commerce and its role in developing countries

3104 words - 12 pages technology. Example: interconnectivity among satellites, telecommunications, cables etc. E-commerce needs to keep in mind the process infrastructure, which involves the various means of making payment, distribution and delivery over the internet possible. Certain standards have to be maintained if a country wants to indulge in e-commerce . Example: privacy disclosure and maintaining connectivity standards. Countries like India, Africa will have to

Growth of, Control of, and Access to the Internet

4299 words - 17 pages protect the people. However, this protection may come at the cost of free speech.Historical PerspectiveThe history of the Internet revolves around four distinct aspects. There is the technological evolution that began with early research on packet switching and the ARPANET, and where current research continues to expand the horizons of the infrastructure along several dimensions. There is the operations and management aspect of a global and complex

The Internet and The Development of Computer Networks

1030 words - 4 pages NSFnet was the prototype for the national Internet backbones that we have today. It provided high-speed links among scientists and supercomputing facilities and served as the main Internet traffic arteries for the United States. People at universities and elsewhere immediately began using the increased speed for everything other than supercomputing, and this led to the birth of the national Internet infrastructure. In 1995, the NSF handed over

A Review Paper of Internet Banking Services

1815 words - 7 pages the web due to a limited number of banks using the Internet. • Data and network security, in addition privacy problems. • Lack and limitation of government policies, regulations and ecommerce laws. As well as legislation to protect workers and to make Internet secure. • Lack of infrastructure and weak telecommunications • Broken and slow internet connections. • Lack of internet awareness, this service is still widely unaccepted. It is

Similar Essays

Internet Infrastructure Essay

970 words - 4 pages ://, R. R. (n.d.). A "complete" checklist of the benefits obtained with intranet-based communications. Retrieved January 24, 2008, from, G. (2004). Technology Infrastructure: the Internet and the World Wide Web. In Electronic Commerce: the Second Wave.

Describe Malaysia And Singapore Basic Internet Infrastructure

773 words - 3 pages internet access is readily available to just about any would-be user anywhere in the country, with connectivity of over 99%.Singapore has aggressive plans for networking and a close relationship between government and industry. The government clearly sees the Internet as a strategic infrastructure and a segment to be nurtured (along with water, oil, power, telecommunications, housing, and others). Singapore's domestic market is small, soThey are

Network Neutrality: Protecting The Future Essay

1677 words - 7 pages function - represents a strain on the existing infrastructure supporting the internet. Similarly, the fact that Netflix makes up a third of internet traffic demonstrates the increasing popularity and demand for web content. At odds to this overarching trend is the ISPs claim that the current infrastructure on which the internet runs is inadequate. In order to understand this claim, a quick overview is needed. As the internet grew from its roots in

Critical Infrastructure Protection Essay

1217 words - 5 pages Introduction When it comes to protecting an infrastructure, careful planning and coordination needs to take place. Protecting an infrastructure takes an important security initiative called Critical Infrastructure Protection (CIP). The United States critical infrastructure is protected by the Department of Homeland Security. Examine three areas of the Department of Homeland Security: mission, operations and responsibilities The first area is