Share
Explore BrainMass

Computer-Communication Networks

Networks in computing, like anywhere else, are the connections between units that allow them to transmit data between them. In telecommunications, these networks can be massively large. The physical connection between networked computing devices is established by using either cable media or wireless media. An example of a popular computer network is the internet.

Network devices that originate, route and terminate the data are called network nodes. Nodes can include host such as servers and personal computers as well as networking hardware. Two computers are said to be networked when a process in one device is able to exchange information with a process in another device.

Before computer networks, the communication between calculation machines and early computers was performed by human users by carrying instructions between them. Today, people do continue to transfer information to another person’s computer by hand by carrying removable storage media; although the transfer of information can take place through email and other networking application.

A network is characterized by its physical capacity or the purpose it was originally intended for. The network's functions and implementation will vary accordingly, in everything including user access rights and authorization. A personal area network is a computer network used for communication among computers and different information technological devices close to one person. Local networks widen the scope a little, connecting machines in a limited geographical area, such as a line of office buildings or a school. A home area network is a residential local area network which is used for communication between digital devices deployed in the home. A storage area network is a dedicated network that provides access to consolidated, block level data storage.  Storage networks are least seen by the everyday person - they are a web of access points to amalgamated block level stores of data. And finally, there are global networks, like the internet, which many are familiar with today.

Multimedia Positive and Negatives

Please answer two of the three following questions. Only two or three sentences each. Share experiences, positive and negative, you have had in using graphics, digital media, and multimedia or in being recorded by these technologies. Do you think hypermedia documents (or interactive multimedia in general) will eclipse cert

Evolution of Information technology

Identify and discuss the evolution of Information Technology and the impact it has had on businesses. Please provide sources: 400 words. Thank you for your help.

Bash scripts for payslip and grade display

I want to answer the following questions Q1)Write a shell script to to print the payslip of an Employee. Q2)Write a shell script to display grade of student according to his marks.

Considering User Datagram Protocols

Please help with the following problem. Provide step by step calculations. 1. Which of the following is NOT true about the UDP header shown (in hexadecimal format):  06 32 00 0D 00 1C E2 17 A. The destination port is 13 (decimal). B. All of the information given in the other answers is 

Average Wait Time and Turnaround Time

1. Suppose that the keyboard device stored keystrokes in a buffer until it was full then sent the entire buffer for processing. What would be some adverse consequences? (Two or three sentences should be adequate to answer this question) 2. Suppose that all programs in a particular CPU are given 50 clock cycles to process befo

Determining Subnet Address From Host Address

Fill in the following: Assume the address of a network host is 198.4.81.120/27. If the first address in the subnet range is the address of the network that address would be ........... Therefore the first available address for a host would be ............ And the last available address for a host would be .............

Quantitative Comparison of Packet Switching and Circuit Switching

Consider the two scenarios below: A circuit-switching scenario in which Ncs users, each requiring a bandwidth of 20 Mbps, must share a link of capacity 100 Mbps. A packet-switching scenario with Nps users sharing a 100 Mbps link, where each user again requires 20 Mbps when transmitting, but only needs to transmit 20 percen

Information Systems and Enterprise Resource Planning

1. Describe the importance of high quality (error-free) data entry. 2. What competitive advantages does agility provide to a manufacturing company? 3. What is the role of data mining? 4. What are two challenges of legacy systems? 5. Define ERP and describe its objectives. 6. Explain the difference between a project and oper

Network Monitoring Configuration

Illustrate, analyzed, and explain the functional architecture for network monitoring configuration. This illustration should include the following: Four major components of a network system then analyzed the four major components of a network system. Resources for each system, analyzed and provided the resources for e

Security Accounts Manager Networking

The security accounts manager (SAM) database contains information on all user profiles. User account set-up populates the database. Describe the fields and options associated with user account set-up.

Certificate vs Degree in Network Engineering

Is the importance of a certified network engineer going to be replaced with individuals that do not have a certificate but have much experience or a college degree? Please provide some reference

Help Desk Support

You have been asked to create a help desk for the computer support division of your company. What services will your help desk provide? How will you provide those services? What type of employees will you hire to work at the help desk?

Network Topology Design for a Single Building

You are to network a ten story building capable of supporting 100 computers on each floor. a. What topology would work best for this project? b. What network hardware will be needed to accomplish the networking project? c. Explain your choices for the topology and hardware chosen for this IT project.

Hamming distance

Devise a code set for the digits 0 to 9 that has a Hamming distance of 2.

Transmission Media

Discuss the evolution of transmission media up to now, and prediction of such evolution into the future, as the demand for bandwidth keeps rising. Also explore signal handling techniques, such as modulation, OFDM, and MIMO, particularly used in wireless systems.

LAN access methods

At the heart of a LAN is an access method whereby network nodes share access to the transmission medium. The access method is also known as the MAC protocol (MAC: medium access control). There are essentially 2 access methods: CSMA and token passing. The patriarch of LANs, the Ethernet, uses CSMA with collision detection (CSMA/C

VPN and LAN interconnection

Discuss the Virtual Private Network (VPN) solution for remote access. Research issues of configuration, implementation, applications, security, and any other important aspects of VPN.

Topic: DSL, Cable, Broadband Wireless and FTTH

The two "legacy" broadband Internet access methods are the DSL modem and the Cable modem. To meet the ever-rising demand for access capacity, FTTH (fiber-to-the-home) has emerged as a technology of choice for the ultra-fast Internet that the insatiable users seem to want. Verizon and AT&T have already deployed FTTH service in sp

Task Computer Networks

Your manager has asked you to prepare a 2 - 4-page written report including the following: Address the following points as they relate to Ethernet: Provide a diagram of an Ethernet packet. Describe the frame format of a typical Ethernet packet. Explain the significance of each field. For Manchester, 4B/5B, and 8B/10B en

Link Layer & LAN (Adapter/Node)

Many of the functions of an adapter can be performed in software that runs on the node's CPU. What are advantages and disadvantages of moving this functionality from the adapter to the node?

Computer Network Security

1. What is the one thing that a virus, a worm, spyware and malicious code have in common? What are the differences among these four threats? 2. How often should you update your anti-virus protection? 3. Why is a best practice to have and to carry an anti-virus boot-up disk or CD? 4. What other anti-malicious software and anti

Source to complete my paper.

Frank Fields Jr. January 02, 2011 ISSC 641 Week 4 Outline Dr. John Rhome This project is based on a home network that was made two years ago. The initial part of the service was based on the two desk tops and a printer. The task began with having an ISP which was conducted on resear

Network Concepts Simplex and Duplex

- Use short answers to explain the difference between: o Synchronous and asynchronous o Analog and digital o XON and XOFF o Simplex and duplex o Serial and parallel transmission o Baseband and broadband o Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP) o Hypertext Transfer Protocol (HTTP)

Telecommunication industry to ensure inter-interoperability

Standards are very essential in the telecommunication industry to ensure inter-interoperability. The class textbook/slides noted several benefits realized from standardization. It was also stated that "Although standards are intended to create unity, they can have the opposite effect". Identify and briefly discuss one