Explore BrainMass

Explore BrainMass

    Networking

    In computing, a network is any set of computers that are link together in that they may send and recieve data from one another. More specifically, two devices are considered to be in the same network when a process in one may exchange data with a process in another. The individual devices within a network are known as 'nodes' whether they originate, route or terminate the data. Hosts (e.g. servers), user devices (desktops, laptops, tablets, smartphones, etc.) and any networking hardware that is needed all fall under the 'node' category as long as they are linked to each other. This link may be physical, like an HDMI cable from laptop to smart TV, or use wireless media, like smartphones. The internet is likely the biggest and most famous network system in heavy use today. 

    In the time before computers could be networked together, information had to be physically carried by a human from one machine to the other. We still do this on occasion with flash drives/memory sticks/thumb drives today, though email and cloud transfers are at least equally common, and this human-machine network is often referred to as 'sneakernet'1

    Now, our networks form the arteries and veins essential for modern communication. To be specific, it is computer-controlled networks that have accounted for the rapid expansion in use and scope of our communication devices today; most networks that previously ran through telephone means have switched, or are switching, over to internet protocols (note that this does not mean they will all be attached to the public internet). Computer networks today allow us even more instant and useful contact with each other in the form of printers, email, instant messaging, document sharing and even the faxes some still cling to. Importantly, they also allow our computers themselves to speak with each other behind the scenes, gaining access to more storage servers and application resources than a single computer would. Often, it seems like technological process as a whole goes hand in hand with the advancement of computer networks.

     

    References:

    1. Hudson, k. (2005). What is sneakernet?. [ONLINE] Available at: http://whatis.techtarget.com/definition/sneakernet. [Last Accessed 16/5/14].

    Image credit: Calvinius

    © BrainMass Inc. brainmass.com March 19, 2024, 2:05 am ad1c9bdddf

    BrainMass Solutions Available for Instant Download

    The Internet and the Intranet

    1. Explain what the Internet is and how it differs from the Intranet. Provide at least two reasons why the Internet has a "problematic" future. Why is it important for information to travel across the Internet in small information packets? 2. Provide the URL of at least one site that discusses the impact of the Internet on fu

    Web Application Vulnerability & Software Development Life Cycle

    Scenario: UNFO traditionally has been a brick-and-mortar retailer, and the management has experienced associated business risks such as employee theft and shoplifting. However, as the organization moves into the e-commerce model, new risks will be introduced to the organization. As the information security analyst, it will be y

    Computer networking issues

    1. You are designing an application at work that transmits data record to another building within the same city. The data records are 500 bytes in length, and your application will send one record every 0.5 seconds. Is it more efficient to use a synchronous connection or an asynchronous connection? What speed transmission line i

    Standards Organizations in Networking Fields

    Discuss whether there are too many standards organizations attempting to regulate the networking field. Take into consideration whether consultation is necessary, and whether governmental or larger international bodies should be formed to manage standards.

    Mobile Computing and Social Networking

    I need some advice on where to find the material for this assignment, also which approach I should use to construct this paper; Here is the assignment: Mobile computing has dramatically changed how information is accessed and shared. Wireless networking has been an enabler of mobile computing. One profession that mobile compu

    Data communications

    Discuss the advantages and disadvantages of Ethernet technology with other available networking architectures.

    Information Technology

    1. Are there any other examples of famous projects that have failed because of relatively simple errors? (Hubble, Mars probes) Were these transmission errors or simply data and calculation errors? 2. Are LANs a stable technology or are they changing just as quickly as other forms of communication technologies?

    What are four basic network topologies, and what is the advantage and disadvantage of each one? Describe the cabling, connectors, and interfaces required for a 10base2 Ethernet network connecting 4 nodes spaced ten feet apart and arranged in a line on a service counter. List all the equipment required to connect the four nodes on a bus network.

    What are four basic network topologies, and what is the advantage and disadvantage of each one? Describe the cabling, connectors, and interfaces required for a 10base2 Ethernet network connecting 4 nodes spaced ten feet apart and arranged in a line on a service counter. List all the equipment required to connect the four n

    Networking

    One of Nichol's network technicians says she doesn't believe the servers are capable of handling Windows Server 2008. She adds that Nichol has: Four servers that each contain 1 GHz processors, 256 MB of RAM, dual NICs, dual power supplies, DVD-ROM drives, and 20-GB hard drives. eight servers that each contain 2 GHz p

    Employee's Internet Usage

    Do you believe that an employee's internet usage at a company should be audited and governed by usage policy? Or, do you think that people should be able to use the internet however they would like on a company's internet connection? If a company did not want to audit usage for compliance, how could they protect themselves from

    Telecommunications and Networking..

    Consider a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk between each end office and the intermediate switch. The average telephone is used to make four phone calls per 8-hour workday, with a mean call duration of six minutes. Ten percent of the calls are long d

    Effective communication strategy within an organization

    An effective communication strategy is absolutely essential for achieving effective project integration management. Any time the goal is to integrate numerous concurrently operating activities, the role of communication becomes central. This is because independently operating activities all come with their own unique obstacles a

    Telecommunications

    Need help with the problem. Would you be able to show me how to solve this? Consider a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk between each end office and the intermediate switch. The average telephone is used to make four phone calls per 8-hour workday

    Passive and Active Intrusion Detection

    What is the difference between passive and active intrusion detection? I know that the passive intrusion detection will detect and record intrusion attempts, but it does not take action. The active intrusion detection will detect the attacks and send an alert to the network administrator or take action to block the attack. With

    WWW and cultural values

    Is the WWW changing users collectively or individually in profound or superficial ways? Can we see new cultural values being shaped or sub-cultures being formed which may permanently affect our cultural values?

    Sources of Information

    Does the source of information make any difference to you? If so, how would you rank the reliability of each of the sources listed? (Explain your answers.) 1. Online newspaper 2. Counterculture newspaper 3. Television network 4. Corporation 5. Non-profit organization 6. Individual

    Limitation for converting IP ver 4 to IP ver 6

    1. How does SNMP help to monitor a network? 2. What do you think is or going to be the greatest limitation to converting from IP ver 4 to IP ver 6? 3. What are some of the factors other then the network itself that can cause the network to seem slow?

    Wireless Networking for Local Hospitals

    Details: Some of the local hospital's administrators are questioning the privacy of patients' information with wireless transmission. Discuss the merits of their concerns. Objective: Identify wireless network architectures Explain mobile information management concepts Discuss wireless network security concepts

    Networking Concepts Differences

    Use short answers to explain the difference between: o Rotary and Dual Tone Multi-frequency (DTMF) o Wide Area Telecommunications Service (WATS) and leased lines o Private Branch eXchange (PBX) and Centrex o The layers of the International Organization for Standardization-Open Systems Interconnection (ISO-OSI) model

    Networking Question WK3

    I need your help in the below questions: 1. Based on the Beliles and Twinam (2008) article, what role does an Ethernet layer 2 switch play in virtual local-area networks (VLAN)? How can an Ethernet layer 2 switch be used to implement physical and data security policies? How does protecting a VLAN switch in a secure physical l

    Networking Example Questions

    Can someone help with the following questions I have done some research on the internet and found different meanings so I am looking for something different from the internet posting. I know what each of the following devices are however I am looking for how they deffer. What is the difference between a hub and a layer 2 swit

    Windows 2003 Server

    Details: In a Windows 2003 server network discuss several devices such as: repeaters, routers, hubs, and gateways. What are the functions for those devices? At which layer(s) of the OSI model do those devices operate? Objective: Discuss how to implement, manage and maintain network configuration including IP addressing and n

    VaryNet Inc. Networking Questions

    Details: VaryNet Inc. wants to create four separate office complexes across the globe. They want to be able to connect these complexes over the Internet, and they want to make sure that each network is available to each other, i.e., they want the routing information of all four networks to be available at each site, so that any