Share
Explore BrainMass

Networking

In computing, a network is any set of computers that are link together in that they may send and recieve data from one another. More specifically, two devices are considered to be in the same network when a process in one may exchange data with a process in another. The individual devices within a network are known as 'nodes' whether they originate, route or terminate the data. Hosts (e.g. servers), user devices (desktops, laptops, tablets, smartphones, etc.) and any networking hardware that is needed all fall under the 'node' category as long as they are linked to each other. This link may be physical, like an HDMI cable from laptop to smart TV, or use wireless media, like smartphones. The internet is likely the biggest and most famous network system in heavy use today. 

In the time before computers could be networked together, information had to be physically carried by a human from one machine to the other. We still do this on occasion with flash drives/memory sticks/thumb drives today, though email and cloud transfers are at least equally common, and this human-machine network is often referred to as 'sneakernet'1

Now, our networks form the arteries and veins essential for modern communication. To be specific, it is computer-controlled networks that have accounted for the rapid expansion in use and scope of our communication devices today; most networks that previously ran through telephone means have switched, or are switching, over to internet protocols (note that this does not mean they will all be attached to the public internet). Computer networks today allow us even more instant and useful contact with each other in the form of printers, email, instant messaging, document sharing and even the faxes some still cling to. Importantly, they also allow our computers themselves to speak with each other behind the scenes, gaining access to more storage servers and application resources than a single computer would. Often, it seems like technological process as a whole goes hand in hand with the advancement of computer networks.

 

References:

1. Hudson, k. (2005). What is sneakernet?. [ONLINE] Available at: http://whatis.techtarget.com/definition/sneakernet. [Last Accessed 16/5/14].

Image credit: Calvinius

The Internet and the Intranet

1. Explain what the Internet is and how it differs from the Intranet. Provide at least two reasons why the Internet has a "problematic" future. Why is it important for information to travel across the Internet in small information packets? 2. Provide the URL of at least one site that discusses the impact of the Internet on fu

Web Application Vulnerability & Software Development Life Cycle

Scenario: UNFO traditionally has been a brick-and-mortar retailer, and the management has experienced associated business risks such as employee theft and shoplifting. However, as the organization moves into the e-commerce model, new risks will be introduced to the organization. As the information security analyst, it will be y

Computer networking issues

1. You are designing an application at work that transmits data record to another building within the same city. The data records are 500 bytes in length, and your application will send one record every 0.5 seconds. Is it more efficient to use a synchronous connection or an asynchronous connection? What speed transmission line i

Standards Organizations

Discuss whether there are too many standards organizations attempting to regulate the networking field. Take into consideration whether consultation is necessary, and whether governmental or larger international bodies should be formed to manage standards.

Mobile Computing and Social Networking

I need some advice on where to find the material for this assignment, also which approach I should use to construct this paper; Here is the assignment: Mobile computing has dramatically changed how information is accessed and shared. Wireless networking has been an enabler of mobile computing. One profession that mobile compu

Data communications

Discuss the advantages and disadvantages of Ethernet technology with other available networking architectures.

Information Technology

1. Are there any other examples of famous projects that have failed because of relatively simple errors? (Hubble, Mars probes) Were these transmission errors or simply data and calculation errors? 2. Are LANs a stable technology or are they changing just as quickly as other forms of communication technologies?

What are four basic network topologies, and what is the advantage and disadvantage of each one? Describe the cabling, connectors, and interfaces required for a 10base2 Ethernet network connecting 4 nodes spaced ten feet apart and arranged in a line on a service counter. List all the equipment required to connect the four nodes on a bus network.

What are four basic network topologies, and what is the advantage and disadvantage of each one? Describe the cabling, connectors, and interfaces required for a 10base2 Ethernet network connecting 4 nodes spaced ten feet apart and arranged in a line on a service counter. List all the equipment required to connect the four n

Networking

One of Nichol's network technicians says she doesn't believe the servers are capable of handling Windows Server 2008. She adds that Nichol has: Four servers that each contain 1 GHz processors, 256 MB of RAM, dual NICs, dual power supplies, DVD-ROM drives, and 20-GB hard drives. eight servers that each contain 2 GHz p

Effective communication strategy within an organization

An effective communication strategy is absolutely essential for achieving effective project integration management. Any time the goal is to integrate numerous concurrently operating activities, the role of communication becomes central. This is because independently operating activities all come with their own unique obstacles a

Passive and Active Intrusion Detection

What is the difference between passive and active intrusion detection? I know that the passive intrusion detection will detect and record intrusion attempts, but it does not take action. The active intrusion detection will detect the attacks and send an alert to the network administrator or take action to block the attack. With

WWW and cultural values

Is the WWW changing users collectively or individually in profound or superficial ways? Can we see new cultural values being shaped or sub-cultures being formed which may permanently affect our cultural values?

Networking Question WK3

I need your help in the below questions: 1. Based on the Beliles and Twinam (2008) article, what role does an Ethernet layer 2 switch play in virtual local-area networks (VLAN)? How can an Ethernet layer 2 switch be used to implement physical and data security policies? How does protecting a VLAN switch in a secure physical l

Encoding Schemes in OSI Layer Model

Details: Your manager has asked you to describe the frame format of a typical Ethernet packet. Prepare a written report. Be sure to discuss Manchester encoding, 4B/5B encoding, 8B/10B encoding, the cable grades required for different speeds of Ethernet, and Ethernet performance as more hosts are added to a network. Objective:

Wireless Networking

Details: You have been asked to produce a paper that compares and contrasts guided versus wireless media for inclusion in your company's knowledge database. Also indicate which type of network devices would be supported along with the associated interface type. The purpose of this paper is to quickly bring other information tech

The Future of Wireless

Imagine the future of wireless technology. Currently, the wireless network you install in your home can connect wirelessly to something as small as your cell phone or as large as a nationwide Internet Service Provider. Where is the future of wireless technology headed? This is a question that has yet to be answered, but you can

How to use Windows TCP/IP networking utilities

Take screens shots of the following results of using TCP/IP utilities Open a Command Prompt (MS-DOS Prompt) window and complete the following activities. As always, be sure to cite any sources you use in your response. Type in ipconfig /all and hit enter. Give a short blurb on each major parameter returned. How could you g

Advantages and Disadvantages of Wireless Networking

As wireless networks gain popularity there is an increasing number of households using them for their home networking needs. What advantages exist in having a wireless network in your home instead of a wired network? What are the disadvantages? An increasing number of businesses are also offering wireless Internet connections (h

Networking: DNS

Elaborate on the following about DNS: DNS is both a telephone "White Pages" and a "Yellow Pages." The DNS namespace The hierarchy of DNS servers and how they work as a team to resolve DNS queries. Concerning IP address assignment: Describe the four steps in the DHCP address assignment process. What is the 80/20 rul

Network Consultant Questions

The University of Hawaii campus is spanned over 2 miles. It has 7 colleges and each college building is separated from each other by at least 1000 feet. Each building has 4 floors. The University also has it's centers at London and Australia. You are hired as a network consultant who has to recommend the following: A layout pl

AI

Adjust the weights and threshold values in the artificial neuron network in Figure 10th edition: 11.18; 9th edition: 10.19 so that its output is 1 when both inputs are the same (both 0 or both 1) and 0 when the inputs are different (one being 0 while the other is 1). book: Glenn Brookshear, Computer Science: an overview (Ten

Creating a Network and Updating Computers

Bench Fitness Centers has eight separate locations in this area. Most of the centers have the same equipment and provide the same services, but some centers have different equipment and specialized trainers. Below is a summary of the services Bench Fitness Center is seeking from the a mid-sized IT consulting company. The net

IPv4 and IPv6 and protocol processing load

This solution explores and explains the requirement for routers to support both IPv4 and IPv6 protocol stacks and explains the various types of connections a dual stack router can support, and why such connections are necessary. Finally, included in this solution is a discussion on the overhead involved in handling dual stacks a

OSI Model and Network Protocols

Looking for help with the following. What are the advantages of standardized networking protocols? Why is TCP/IP such a complex protocol? What advantages accrue to TCP/IP's complexity? Compare and contrast the advantages and disadvantages of two protocols that perform similar functions at any layer of the OSI mode