Explore BrainMass

Explore BrainMass

    Computer-Communication Networks

    Networks in computing, like anywhere else, are the connections between units that allow them to transmit data between them. In telecommunications, these networks can be massively large. The physical connection between networked computing devices is established by using either cable media or wireless media. An example of a popular computer network is the internet.

    Network devices that originate, route and terminate the data are called network nodes. Nodes can include host such as servers and personal computers as well as networking hardware. Two computers are said to be networked when a process in one device is able to exchange information with a process in another device.

    Before computer networks, the communication between calculation machines and early computers was performed by human users by carrying instructions between them. Today, people do continue to transfer information to another person’s computer by hand by carrying removable storage media; although the transfer of information can take place through email and other networking application.

    A network is characterized by its physical capacity or the purpose it was originally intended for. The network's functions and implementation will vary accordingly, in everything including user access rights and authorization. A personal area network is a computer network used for communication among computers and different information technological devices close to one person. Local networks widen the scope a little, connecting machines in a limited geographical area, such as a line of office buildings or a school. A home area network is a residential local area network which is used for communication between digital devices deployed in the home. A storage area network is a dedicated network that provides access to consolidated, block level data storage.  Storage networks are least seen by the everyday person - they are a web of access points to amalgamated block level stores of data. And finally, there are global networks, like the internet, which many are familiar with today.

    © BrainMass Inc. brainmass.com March 20, 2023, 12:53 pm ad1c9bdddf

    BrainMass Solutions Available for Instant Download

    Joint Optimization

    What do information technology managers need to know about how to improve the systems development process through joint optimization? Why?

    Multimedia Positive and Negatives

    Please answer two of the three following questions. Only two or three sentences each. Share experiences, positive and negative, you have had in using graphics, digital media, and multimedia or in being recorded by these technologies. Do you think hypermedia documents (or interactive multimedia in general) will eclipse cert

    Evolution of Information technology

    Identify and discuss the evolution of Information Technology and the impact it has had on businesses. Please provide sources: 400 words. Thank you for your help.

    Bash scripts for payslip and grade display

    I want to answer the following questions Q1)Write a shell script to to print the payslip of an Employee. Q2)Write a shell script to display grade of student according to his marks.

    Considering User Datagram Protocols

    Please help with the following problem. Provide step by step calculations. 1. Which of the following is NOT true about the UDP header shown (in hexadecimal format):  06 32 00 0D 00 1C E2 17 A. The destination port is 13 (decimal). B. All of the information given in the other answers is 

    Average Wait Time and Turnaround Time

    1. Suppose that the keyboard device stored keystrokes in a buffer until it was full then sent the entire buffer for processing. What would be some adverse consequences? (Two or three sentences should be adequate to answer this question) 2. Suppose that all programs in a particular CPU are given 50 clock cycles to process befo

    Broadcast Address For IP Address In CIDR Notation

    What is the broadcast address for a host with the address ...................... And the network address would be .............. This network could support ............hosts And the subnet mask is exactly............. bits long.

    Determining Subnet Address From Host Address

    Fill in the following: Assume the address of a network host is If the first address in the subnet range is the address of the network that address would be ........... Therefore the first available address for a host would be ............ And the last available address for a host would be .............

    ATM Cells and Overhead

    An ATM AAL5 layer is handed a 56,000 byte packet for transport. How many ATM cells are required to transport it and what is the total overhead? Assume the entire packet is data. A. None of the other answers. B. 1,167 ATM cells, 9.46% overhead C. 1,200 ATM cells, 10.6% overhead D. 1,518 ATM cells, 30.4% overhead E. 1,

    Quantitative Comparison of Packet Switching and Circuit Switching

    Consider the two scenarios below: A circuit-switching scenario in which Ncs users, each requiring a bandwidth of 20 Mbps, must share a link of capacity 100 Mbps. A packet-switching scenario with Nps users sharing a 100 Mbps link, where each user again requires 20 Mbps when transmitting, but only needs to transmit 20 percen

    Computing TCP's RTT and Timeout Values

    Suppose that TCP's current estimated values for the round trip time (estimatedRTT) and deviation in the RTT (DevRTT) are 350 msec and 40 msec, respectively. Suppose that the next three measured values of the RTT are 220, 240, and 240 respectively. Compute TCP's new value of estimatedRTT, DevRTT, and the TCP timeout value afte

    Information Systems and Enterprise Resource Planning

    1. Describe the importance of high quality (error-free) data entry. 2. What competitive advantages does agility provide to a manufacturing company? 3. What is the role of data mining? 4. What are two challenges of legacy systems? 5. Define ERP and describe its objectives. 6. Explain the difference between a project and oper

    Network Monitoring Configuration

    Illustrate, analyzed, and explain the functional architecture for network monitoring configuration. This illustration should include the following: Four major components of a network system then analyzed the four major components of a network system. Resources for each system, analyzed and provided the resources for e

    Security Accounts Manager Networking

    The security accounts manager (SAM) database contains information on all user profiles. User account set-up populates the database. Describe the fields and options associated with user account set-up.

    Certificate vs Degree in Network Engineering

    Is the importance of a certified network engineer going to be replaced with individuals that do not have a certificate but have much experience or a college degree? Please provide some reference

    Help Desk Support

    You have been asked to create a help desk for the computer support division of your company. What services will your help desk provide? How will you provide those services? What type of employees will you hire to work at the help desk?

    Image File Format Determination

    You are designing a web site. What image file format would you use for high quality photographic color reproduction? Why did you choose that format? What format would you prefer for simple graphic images such as a picture of a sign that contains only a few colors? Why did you choose that format?

    Network Topology Design for a Single Building

    You are to network a ten story building capable of supporting 100 computers on each floor. a. What topology would work best for this project? b. What network hardware will be needed to accomplish the networking project? c. Explain your choices for the topology and hardware chosen for this IT project.

    Hamming distance

    Devise a code set for the digits 0 to 9 that has a Hamming distance of 2.

    Transmission Media

    Discuss the evolution of transmission media up to now, and prediction of such evolution into the future, as the demand for bandwidth keeps rising. Also explore signal handling techniques, such as modulation, OFDM, and MIMO, particularly used in wireless systems.

    LAN access methods

    At the heart of a LAN is an access method whereby network nodes share access to the transmission medium. The access method is also known as the MAC protocol (MAC: medium access control). There are essentially 2 access methods: CSMA and token passing. The patriarch of LANs, the Ethernet, uses CSMA with collision detection (CSMA/C

    VPN and LAN interconnection

    Discuss the Virtual Private Network (VPN) solution for remote access. Research issues of configuration, implementation, applications, security, and any other important aspects of VPN.

    Topic: DSL, Cable, Broadband Wireless and FTTH

    The two "legacy" broadband Internet access methods are the DSL modem and the Cable modem. To meet the ever-rising demand for access capacity, FTTH (fiber-to-the-home) has emerged as a technology of choice for the ultra-fast Internet that the insatiable users seem to want. Verizon and AT&T have already deployed FTTH service in sp