Unit 4-1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 26

Communication Systems

The communication system is a system which describes the information exchange between two
points. The process of transmission and reception of information is called communication. The major
elements of communication are the Transmitter of information, the Channel or medium of
communication and the Receiver of information.

Transmission of data from “Source to Destination”.

Table of Contents

 Types of Communication Systems

 Examples of Communication Systems

 Elements of Communication Systems

 Block Diagram of Communication Systems

 Objective Questions

Types of Communication Systems

Depending on signal specification or technology, the communication system is classified as follows:

(1) Analogue

Analogue technology communicates data as electronic signals of varying frequency or amplitude.


Broadcast and telephone transmission are common examples of analogue technology.

(2) Digital

In digital technology, the data are generated and processed in two states: High (represented as 1)
and low (represented as 0). Digital technology stores and transmits data in the form of 1s and 0s.
Depending on the communication channel, the communication system is categorised as follows:

1. Wired (Line communication)

 Parallel wire communication

 Twisted wire communication

 Coaxial cable communication

 Optical fibre communication

2. Wireless (Space communication)

 Ground wave communication

 Skywave communication

 Space wave communication

 Satellite communication

Examples of Communication Systems

The following are a few examples of communication systems:

1. Internet

2. Public Switched Telephone Network

3. Intranet and Extranet

4. Television

Elements of Communication Systems

The definitions of the terms used in the communication system are discussed below.
Information

Message or information is the entity that is to be transmitted. It can be in the form of audio, video,
temperature, picture, pressure, etc.

Signal

The single-valued function of time carries the information. The information is converted into an
electrical form for transmission.

Transducer

It is a device or an arrangement that converts one form of energy to the other. An electrical
transducer converts physical variables such as pressure, force, and temperature into corresponding
electrical signal variations. For example, a microphone converts audio signals into electrical signals.
The photodetector converts light signals into electrical signals.

Amplifier

The electronic circuit or device that increases the amplitude or the strength of the transmitted signal
is called an amplifier. When the signal strength becomes less than the required value, amplification
can be done anywhere between the transmitter and receiver. A DC power source will be provided for
the amplification.

Modulator

As the original message signal cannot be transmitted over a large distance because of their low
frequency and amplitude, they are superimposed with high frequency and amplitude waves called
carrier waves. This phenomenon of superimposing of message signals with a carrier wave is called
modulation, and the resultant wave is a modulated wave which is to be transmitted.

There are different types of modulation, and they are explained below:

i. Amplitude Modulation (AM)

The process of changing the amplitude of the signal wave by impressing or superimposing it on a
high-frequency carrier wave, keeping its frequency constant, is called amplitude modulation.

ii. Frequency Modulation (FM)

Frequency modulation is a technique in which the frequency of the message signal is varied by
modulating with a carrier wave. It is better than amplitude modulation because it eliminates noise
from various sources.

iii. Phase Modulation (PM)

The phase of the carrier wave changes the phase of the signal wave. The phase shift after modulation
is dependent on the frequency of the carrier wave as well. Phase modulated waves are immune to
noise to a greater extent.

Transmitter

It is the arrangement that processes the message signal into a suitable form for transmission and,
subsequently, reception.

Antenna
An antenna is a structure or a device that will radiate and receive electromagnetic waves. So, they
are used in both transmitters and receivers. An antenna is basically a metallic object, often a
collection of wires. The electromagnetic waves are polarised according to the position of the
antenna.

Channel

A channel refers to a physical medium such as wire, cables, or space through which the signal is
passed from the transmitter to the receiver. There are many channel impairments that affect channel
performance to a pronounced level. Noise, attenuation and distortion, to mention the major
impairments.

Noise

Noise is one of the channel imperfections or impairments in the received signal at the destination.
There are external and internal sources that cause noise. External sources include interference, i.e.
interference from nearby transmitted signals (cross talk), interference generated by a natural source
such as lightning, solar or cosmic radiation, automobile-generated radiation, etc. The external noise
can be minimised and eliminated by the appropriate design of the channel and shielding of cables.
Also, by digital transmission, external noise can be minimised.

Internal sources include noise due to random motion and collision of electrons in the conductors and
thermal noise due to diffusion and recombination of charge carriers in other electronic devices.
Internal noise can be minimised by cooling and using digital technology for transmission.

⎫ A different cable design.

⎫ Proper design of the channel.

⎫ Use digital transmission

⎫ Using BPF or LPF at the receiver side.

Learn More:

 Pulse Width Modulation

Attenuation

Attenuation is a problem caused by the medium. When the signal is propagating for a longer distance
through a medium, depending on the length of the medium, the initial power decreases. The loss in
initial power is directly proportional to the length of the medium. Using amplifiers, the signal power
is strengthened or amplified so as to reduce attenuation. Also, digital signals are comparatively less
prone to attenuation than analogue signals.
Distortion

It is also another type of channel problem. When the signal is distorted, the distorted signal may
have a frequency and bandwidth different from the transmitted signal. The variation in the signal
frequency can be linear or non-linear.

Receiver

An arrangement that extracts the message or information from the transmitted signal at the output
end of the channel and reproduces it in a suitable form as the original message signal is a receiver.

Demodulator

It is the inverse phenomenon of modulation, i.e., the process of separation of the message signal
from the carrier wave takes place in the demodulator. The information is retrieved from the
modulated wave.

Repeaters

Repeaters are placed at different locations in between the transmitter and receiver. A repeater
receives the transmitted signal, amplifies it and sends it to the next repeater without distorting the
original signal.
Block Diagram of Communication Systems

The block diagram given below represents the flow of the signal from the source to the destination.
The role of every device and arrangement discussed above will help to understand better.

Objective Questions

1. Which of the following is not an essential element of a communication system?

a) Transmitter b) Transducer

c) Receiver d) Communication Channel

2. A device which provides output in electrical form or it has input in electrical form is called a
____.
a) Transmitter b) Receiver

c) Repeater d) Transducer

3. Decrease in signal strength due to energy losses is called _____.

a) Distortion b) Interference

c) Attenuation d) Noise

4. The disturbance or distortion in the transmission and processing of message signals is called
______.

a) Noise b) Attenuation

c) Interference d) None of these

5. A repeater is a combination of _____.

a) Receiver b) Amplifier

c) Transmitter d) All of these

Answers

1. d

2. d

3. c

4. a

5. b

Types of Network Topology

Network topology refers to the arrangement of different elements like nodes, links, or devices in a
computer network. Common types of network topology include bus, star, ring, mesh, and tree
topologies, each with its advantages and disadvantages. In this article, we will discuss different types
of network topology in detail.

What is Network Topology?

Network topology is the way devices are connected in a network. It defines how these components
are connected and how data transfer between the network. Understanding the different types of
network topologies can help in choosing the right design for a specific network.

There are two major categories of Network Topology i.e. Physical Network topology and Logical
Network Topology. Physical Network Topology refers to the actual structure of the physical medium
for the transmission of data. Logical network Topology refers to the transmission of data between
devices present in the network irrespective of the way devices are connected. The structure of the
network is important for the proper functioning of the network. one must choose the most suitable
topology as per their requirement.

Types of Network Topology

Below mentioned are the types of Network Topology


 Point to Point Topology

 Mesh Topology

 Star Topology

 Bus Topology

 Ring Topology

 Tree Topology

 Hybrid Topology

A strong understanding of network topologies is essential for competitive exams like GATE, where
computer networks are a significant subject. To deepen your knowledge and enhance your exam
preparation, consider enrolling in the GATE CS Self-Paced Course . This course covers all critical
networking concepts, including detailed explanations of various network topologies, equipping you
with the expertise needed to excel in your exams.

Point to Point Topology

Point-to-point topology is a type of topology that works on the functionality of the sender and
receiver. It is the simplest communication between two nodes, in which one is the sender and the
other one is the receiver. Point-to-Point provides high bandwidth.

Point to Point Topology

Mesh Topology

In a mesh topology, every device is connected to another device via a particular channel. Every
device is connected to another via dedicated channels. These channels are known as links. In Mesh
Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic Host
Configuration Protocol), etc.
Mesh Topology

 Suppose, the N number of devices are connected with each other in a mesh topology, the
total number of ports that are required by each device is N-1. In Figure 1, there are 5 devices
connected to each other, hence the total number of ports required by each device is 4. The
total number of ports required = N * (N-1).

 Suppose, N number of devices are connected with each other in a mesh topology, then the
total number of dedicated links required to connect them is N C 2 i.e. N(N-1)/2. In Figure 1,
there are 5 devices connected to each other, hence the total number of links required is
5*4/2 = 10.

Advantages of Mesh Topology

 Communication is very fast between the nodes.

 Mesh Topology is robust.

 The fault is diagnosed easily. Data is reliable because data is transferred among the devices
through dedicated channels or links.

 Provides security and privacy.

Disadvantages of Mesh Topology

 Installation and configuration are difficult.

 The cost of cables is high as bulk wiring is required, hence suitable for less number of
devices.
 The cost of maintenance is high.

A common example of mesh topology is the internet backbone, where various internet service
providers are connected to each other via dedicated channels. This topology is also used in military
communication systems and aircraft navigation systems.

Star Topology

In Star Topology, all the devices are connected to a single hub through a cable. This hub is the central
node and all other nodes are connected to the central node. The hub can be passive in nature i.e.,
not an intelligent hub such as broadcasting devices, at the same time the hub can be intelligent
known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables are used
to connect the computers. In Star Topology, many popular Ethernet LAN protocols are used as
CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.

Star Topology

Advantages of Star Topology

 If N devices are connected to each other in a star topology, then the number of cables
required to connect them is N. So, it is easy to set up.

 Each device requires only 1 port i.e. to connect to the hub, therefore the total number of
ports required is N.

 It is Robust. If one link fails only that link will affect and not other than that.

 Easy to fault identification and fault isolation.


 Star topology is cost-effective as it uses inexpensive coaxial cable.

Disadvantages of Star Topology

 If the concentrator (hub) on which the whole topology relies fails, the whole system will
crash down.

 The cost of installation is high.

 Performance is based on the single concentrator i.e. hub.

A common example of star topology is a local area network (LAN) in an office where all computers
are connected to a central hub. This topology is also used in wireless networks where all devices are
connected to a wireless access point.

Bus Topology

Bus Topology is a network type in which every computer and network device is connected to a single
cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the
backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control) protocols
are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.

Bus Topology

Advantages of Bus Topology

 If N devices are connected to each other in a bus topology, then the number of cables
required to connect them is 1, known as backbone cable, and N drop lines are required.

 Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10
Mbps.

 The cost of the cable is less compared to other topologies, but it is used to build small
networks.

 Bus topology is familiar technology as installation and troubleshooting techniques are well
known.

 CSMA is the most common method for this type of topology.

Disadvantages of Bus Topology

 A bus topology is quite simpler, but still, it requires a lot of cabling.

 If the common cable fails, then the whole system will crash down.
 If the network traffic is heavy, it increases collisions in the network. To avoid this, various
protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc.

 Adding new devices to the network would slow down networks.

 Security is very low.

A common example of bus topology is the Ethernet LAN, where all devices are connected to a single
coaxial cable or twisted pair cable. This topology is also used in cable television networks.

Ring Topology

In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices. A
number of repeaters are used for Ring topology with a large number of nodes, because if someone
wants to send some data to the last node in the ring topology with 100 nodes, then the data will
have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are
used in the network.

The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology, the Token
Ring Passing protocol is used by the workstations to transmit the data.

Ring Topology

The most common access method of ring topology is token passing.

 Token passing: It is a network access method in which a token is passed from one node to
another node.

 Token: It is a frame that circulates around the network.


Operations of Ring Topology

 One station is known as a monitor station which takes all the responsibility for performing
the operations.

 To transmit the data, the station has to hold the token. After the transmission is done, the
token is to be released for other stations to use.

 When no station is transmitting the data, then the token will circulate in the ring.

 There are two types of token release techniques: Early token release releases the token just
after transmitting the data and Delayed token release releases the token after the
acknowledgment is received from the receiver.

Advantages of Ring Topology

 The data transmission is high-speed.

 The possibility of collision is minimum in this type of topology.

 Cheap to install and expand.

 It is less costly than a star topology.

Disadvantages of Ring Topology

 The failure of a single node in the network can cause the entire network to fail.

 Troubleshooting is difficult in this topology.

 The addition of stations in between or the removal of stations can disturb the whole
topology.

 Less secure.

Tree Topology

Tree topology is the variation of the Star topology. This topology has a hierarchical flow of data. In
Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration) are used.
Tree Topology

In tree topology, the various secondary hubs are connected to the central hub which contains the
repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to
the devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It is
a multi-point connection and a non-robust topology because if the backbone fails the topology
crashes.

Advantages of Tree Topology

 It allows more devices to be attached to a single central hub thus it decreases the distance
that is traveled by the signal to come to the devices.

 It allows the network to get isolated and also prioritize from different computers.

 We can add new devices to the existing network.

 Error detection and error correction are very easy in a tree topology.

Disadvantages of Tree Topology

 If the central hub gets fails the entire system fails.

 The cost is high because of the cabling.

 If new devices are added, it becomes difficult to reconfigure.

A common example of a tree topology is the hierarchy in a large organization. At the top of the tree
is the CEO, who is connected to the different departments or divisions (child nodes) of the company.
Each department has its own hierarchy, with managers overseeing different teams (grandchild
nodes). The team members (leaf nodes) are at the bottom of the hierarchy, connected to their
respective managers and departments.

Hybrid Topology

Hybrid Topology is the combination of all the various types of topologies we have studied above.
Hybrid Topology is used when the nodes are free to take any form. It means these can be individuals
such as Ring or Star topology or can be a combination of various types of topologies seen above.
Each individual topology uses the protocol that has been discussed earlier.
Hybrid Topology

The above figure shows the structure of the Hybrid topology. As seen it contains a combination of all
different types of networks.

Advantages of Hybrid Topology

 This topology is very flexible .

 The size of the network can be easily expanded by adding new devices.

Disadvantages of Hybrid Topology

 It is challenging to design the architecture of the Hybrid Network.

 Hubs used in this topology are very expensive.

 The infrastructure cost is very high as a hybrid network requires a lot of cabling and network
devices .

A common example of a hybrid topology is a university campus network. The network may have a
backbone of a star topology, with each building connected to the backbone through a switch or
router. Within each building, there may be a bus or ring topology connecting the different rooms and
offices. The wireless access points also create a mesh topology for wireless devices. This hybrid
topology allows for efficient communication between different buildings while providing flexibility
and redundancy within each building.

Why is Network Topology Important?

Network Topology is important because it defines how devices are connected and how they
communicate in the network. Here are some points that defines why network topology is important.

 Network Performance: Upon choosing the appropriate topology as per requirement, it helps
in running the network easily and hence increases network performance.

 Network Reliability: Some topologies like Star, Mesh are reliable as if one connection fails,
they provide an alternative for that connection, hence it works as a backup.

 Network Expansion: Chosing correct topology helps in easier expansion of Network as it


helps in adding more devices to the network without disrupting the actual network.

 Network Security: Network Topology helps in understanding how devices are connected and
hence provides a better security to the network.

Computer Network Types

A computer network is a group of computers linked to each other that enables the computer to
communicate with another computer and share their resources, data, and applications.

A computer network can be categorized by their size. A computer network is mainly of four types:

o LAN(Local Area Network)

o PAN(Personal Area Network)

o MAN(Metropolitan Area Network)

o WAN(Wide Area Network)

LAN(Local Area Network)

o Local Area Network is a group of computers connected to each other in a small area such as
building, office.

o LAN is used for connecting two or more personal computers through a communication
medium such as twisted pair, coaxial cable, etc.

o It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and
ethernet cables.
o The data is transferred at an extremely faster rate in Local Area Network.

o Local Area Network provides higher security.

PAN(Personal Area Network)

o Personal Area Network is a network arranged within an individual person, typically within a
range of 10 meters.

o Personal Area Network is used for connecting the computer devices of personal use is known
as Personal Area Network.

o Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area
Network.

o Personal Area Network covers an area of 30 feet.

o Personal computer devices that are used to develop the personal area network are the
laptop, mobile phones, media player and play stations.
There are two types of Personal Area Network:

o Wired Personal Area Network

o Wireless Personal Area Network

Wireless Personal Area Network: Wireless Personal Area Network is developed by simply using
wireless technologies such as WiFi, Bluetooth. It is a low range network.

Wired Personal Area Network: Wired Personal Area Network is created by using the USB.

Examples Of Personal Area Network:

o Body Area Network: Body Area Network is a network that moves with a person. For
example, a mobile network moves with a person. Suppose a person establishes a network
connection and then creates a connection with another device to share the information.

o Offline Network: An offline network can be created inside the home, so it is also known as
a home network. A home network is designed to integrate the devices such as printers,
computer, television but they are not connected to the internet.

o Small Home Office: It is used to connect a variety of devices to the internet and to a
corporate network using a VPN

MAN(Metropolitan Area Network)


o A metropolitan area network is a network that covers a larger geographic area by
interconnecting a different LAN to form a larger network.

o Government agencies use MAN to connect to the citizens and private industries.

o In MAN, various LANs are connected to each other through a telephone exchange line.

o The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL,
etc.

o It has a higher range than Local Area Network(LAN).

Uses Of Metropolitan Area Network:

o MAN is used in communication between the banks in a city.

o It can be used in an Airline Reservation.

o It can be used in a college within a city.

o It can also be used for communication in the military.

WAN(Wide Area Network)

o A Wide Area Network is a network that extends over a large geographical area such as states
or countries.

o A Wide Area Network is quite bigger network than the LAN.

o A Wide Area Network is not limited to a single location, but it spans over a large geographical
area through a telephone line, fibre optic cable or satellite links.
o The internet is one of the biggest WAN in the world.

o A Wide Area Network is widely used in the field of Business, government, and education.

Examples Of Wide Area Network:

o Mobile Broadband: A 4G network is widely used across a region or country.

o Last mile: A telecom company is used to provide the internet services to the customers in
hundreds of cities by connecting their home with fiber.

o Private network: A bank provides a private network that connects the 44 offices. This
network is made by using the telephone leased line provided by the telecom company.

Advantages Of Wide Area Network:

Following are the advantages of the Wide Area Network:

o Geographical area: A Wide Area Network provides a large geographical area. Suppose if the
branch of our office is in a different city then we can connect with them through WAN. The
internet provides a leased line through which we can connect with another branch.

o Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to
buy the emails, files or back up servers.

o Get updated files: Software companies work on the live server. Therefore, the programmers
get the updated files within seconds.

o Exchange messages: In a WAN network, messages are transmitted fast. The web application
like Facebook, Whatsapp, Skype allows you to communicate with friends.

o Sharing of software and resources: In WAN network, we can share the software and other
resources like a hard drive, RAM.
o Global business: We can do the business over the internet globally.

o High bandwidth: If we use the leased lines for our company then this gives the high
bandwidth. The high bandwidth increases the data transfer rate which in turn increases the
productivity of our company.

Disadvantages of Wide Area Network:

The following are the disadvantages of the Wide Area Network:

o Security issue: A WAN network has more security issues as compared to LAN and MAN
network as all the technologies are combined together that creates the security problem.

o Needs Firewall & antivirus software: The data is transferred on the internet which can be
changed or hacked by the hackers, so the firewall needs to be used. Some people can inject
the virus in our system so antivirus is needed to protect from such a virus.

o High Setup cost: An installation cost of the WAN network is high as it involves the purchasing
of routers, switches.

o Troubleshooting problems: It covers a large area so fixing the problem is difficult.

Difference between Internet and Intranet


Almost everyone is using the Internet in this technological era. But when it comes to distinguishing
the Internet and the Intranet, most people get confused because both the terms seem almost similar
in words. Although there is just a difference of one alphabet in their terms, they have many
noticeable differences in general.

In this article, we are discussing the significant differences between the Internet and the Intranet,
which will help understand the requirements of both. This will also help us decide which one of them
we need for personal use and commercial use. Let's first understand both with the definitions:
What is the Internet?

The Internet is a global network that uses TCP / IP protocols to connect millions of computers
worldwide. It can include different networks, such as private, public, organizational, academic,
government, etc. It allows users to communicate with each other and share massive amounts of data
in various formats. Internet is available in both modes, wired and wireless. In wired mode, the data
travels through fiber optic cables, whereas in wireless mode, the data travels through radio waves.

Some of the essential applications of the Internet are listed below:

o File sharing

o Downloading media files and software

o Sending and receiving emails

o Browsing any information

o Using social media platforms, forums, and communities

o E-Commerce, bill payments, online purchasing of food and medicines

o Voice Calls, Video Conferencing, and Chatting with friends, family members, and colleagues

How does the Internet work?

The internet is a network created by connecting a large number of computers or computer networks.
It is a type of network that cannot be owned by an entity. It is formed using networks of networks
configured using complex standards and rules (such as protocols). The Internet works through a
packet routing network following the protocols, where the packet routing is the technique of routing
data packets from source computer to a destination computer.

However, there are several protocols; the transmission and internet protocols are the primary
impelling agents that help build the Internet network. The other common protocols used by the
connected networks are HTTP, FTP, and SMTP. Besides, the protocols and applications like Telnet,
Gopher, WWW, Usenet News, Internet Relay Chat, etc. are also used throughout the working of the
Internet.

Advantages of Internet

Few advantages of the Internet are listed below:

o The Internet establishes a network of devices from different locations all around the world.

o It allows people to communicate easily from any location worldwide.

o The Internet is helping people to get information easily on different topics.

o It keeps the people updated on what's happening worldwide with the latest news and
technologies.

o It connects people through communities, forums, social networking sites and helps them
work together digitally.

o The Internet has made selling and purchasing of products and services easier.
o The Internet is the best platform for people to show their talent, such as singing, dancing,
drawing, etc.

What is Intranet?

An Intranet is a part of the Internet and is owned and used privately by an organization. It is mainly
used to connect all the computers and establish a private network of an organization to provide
employees the ability to collaborate on projects, manage or update information, share calendars,
and to-do list, etc. Organizations prefer using Intranet to keep their data inaccessible from outsiders,
making their suspicious data and project information secure. Intranet includes a firewall to prevent
unauthorized users from accessing the network.

The websites created over Intranet look almost similar and act like any other website on the Internet.
However, these websites are much more task-oriented than promotional design websites on the
Internet. Like the Internet, the intranet's websites can also provide the interface to form
communication in the shape of chatting, image sharing, audio-video conferencing, etc. All these
activities can only be used by authorized users who have permission to access the Intranet network.

Some other essential applications of the Intranet are listed below:

Advertisement

o Sharing the updates regarding the company's rules and regulations

o Accessing employees details

o Onboarding of employees and customer details

o Sharing project details

o Submission of projects and reports

o Submitting feedback or complaints

o Corporate telephone directories

How does Intranet work?

Intranet usually runs in a client/server environment where the computers are connected using local
area networks. Each computer is identified by the MAC address or an IP address, which remains
unique for every computer. As an Internet, the Intranet also uses the client-server model based on
the TCP / IP protocol suite. Because web browsers do not depend on the platform, they are also used
on Intranet to access and retrieve information from the server within the organization. Besides, there
is no need to install any special kind of software on the systems on the Intranet. But most companies
use customized software designed purposely for company-specific tasks.

In addition to the protocols, Intranet uses a firewall to filter unwanted elements to the network and
protects it from external intruders. It also includes network connectivity and the public
telecommunication system, which help access and share the company's data, projects, and
operations securely with the staff.

Advantages of Intranet

Few advantages of the Intranet are listed below:

o The intranet is helping organizations to access internal and external information securely.
o The intranet is fast, easy-to-use, and low-cost to implement.

o It enables employees to connect with other systems throughout the organization.

o The intranet is based on open standards.

o It has added improved communication and enhanced productivity to the operational


business processes.

o It encourages collaboration and reduces the error rate.

o It helps cut down the administration and the processing time.

Key Differences between Internet and Intranet

Few key differences between the Internet and the Intranet are listed below:

o The Internet is a global system of computer networks available for everyone, whereas
Intranet is a network of computers owned by any organization for a certain group of people.

o The Internet is a public network, while Intranet is a private network.

o The total number of users using the Internet is very high, whereas total users on Intranet are
limited.

o Information on the Internet is broad that involves almost every topic, category and field. In
contrast, Intranet includes limited information that refers to any group or organization, such
as the company's databases.

o The Internet can be accessed and used by anyone, whereas the Intranet is limited to
organization employees or admin with login details.

o The Internet is a public network that is not considered safe, while the Intranet is a safer
network.

o The intranet is usually owned by a firm, institution, or organization, but any single person or
an organization does not own the internet.

Major Differences between Internet and Intranet

The other major differences between the Internet and the Intranet can be explained in a tabulated
form, as below:

Attributes Internet Intranet

An Intranet is a private network of


computers designed for a certain
The Internet is a network of
group of people and owned by a
several computers connected
Definition particular firm or organization. It
worldwide using the Internet
can include several local area
protocol suite (TCP/ IP).
networks and also uses leased
lines in the wide-area network.
Because of a limited range, the
As stated above, the Internet is a
total numbers of users on Intranet
globally connected network;
Users are limited. When compared to
users' number is comparatively
the Internet, Intranet has very few
much higher than Intranet.
users.

Only certain people are


authorized to use Intranet
because it is a company's internal
Accessibility Anyone can access and use it.
network, so accessible by the
employees or admin who have
login credentials.

The intranet is a type of private


The Internet is a type of public
Type of Network network installed mainly for any
network.
organization operations.

Because the internet is a public Due to limited access, there is no


network, it is a considerab+ly less such possibility or very less
Security secure network. Cybercriminals possibility of cyber threats in
usually target people using the Intranet, making it more secure
Internet. compared to that of the Internet.

The intranet is limited to group-


Due to a wider range, the
specific information. That means
availability of information and the
the Intranet information and data
data is unlimited. People are free
are limited to any specific
to use the Internet and their
Information and Data company's records, operations,
knowledge. That is why more and
inventory, etc. In this case, only
more data is being added to
certain people with admin
different fields on the Internet
privileges are allowed to add or
regularly.
modify the information.

Intranet has limited users, and so


Due to a higher number of users
visitor's traffic is limited and
and a public network, the total
Traffic comparatively less than the
visitor's traffic very high. It is
Internet. In the case of Intranet,
almost uncountable.
traffic is countable.

The intranet is like a subset of the


Internet. Intranet can only be
The Internet includes several
Characteristic used using the Internet but with
intranets.
certain restrictions and security
practices.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy