StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Data Communication Using the Top-Down Approach - Essay Example

Cite this document
Summary
This paper “Data Communication Using the Top-Down Approach” takes a look at Equity which is a mortgage broker company and their data communication using computer networks. This design also known as a step wise design is particularly common in the modern world…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Data Communication Using the Top-Down Approach
Read Text Preview

Extract of sample "Data Communication Using the Top-Down Approach"

Data Communication Using the Top-Down ApproachAbstractThis paper takes a look at Equity which is a mortgage broker company and their data communication using computer networks. This design also known as a step wise design is particularly common in the modern world which starts with an overview of the entire system before specifying any details the subsystems. Lately the business has adopted a top down approach which has proved to be more efficient and hugely less costly. This paper seeks to explain its advantages as well as disadvantages and in conclusion recommends whether they should continue with this approach or adopt a new one.

An over view of the system is established without going into details for any part of the system whereby each part of the system is refined though designing it in yet more detail and the process goes on until the entire specification is detailed enough to begin development. According to Hicks (2004) this the top down emphasizes on planning as well as a total understanding of the system and in this case coding does not begin until a sufficient level of detail has been attained. This design was promoted by Harlan Mils who was an IBM researcher and Niklaus Wirth in the 1970s.

Equity first a mortgage brokerage company located in New England has a centralized operations centre. This center which is located in Exeter, New Hampshire, is the centre of all operations and it therefore controls all the operations of the other ten branches in Maine and Massachusetts. It is also the administrative centre as it hosts departments such as accounting, human resources, executive management, and support staff. The operations center maintains a central database used to store customer information, such as loan applications, credit check information, and approval status.

This fulfills the first requirement that the top down model needs to have a central office that manages all the operations. Computer networking using the top down approach focuses on new short interlude and eventual ‘putting it all together’ that follows the coverage of network, data link layers, transport awe well as application (Hicks 2004). Each office at Equity first is now self reliant as they do not rely on the main office to ensure maintenance as well as efficient communication. It is also responsible for decrease in errors when it comes to operations hence no delays or break downs in communication takes place because each operation takes place separately.

It is also quite easy to maintain because the errors are few and are easy to identify and correct. The top down method is a much optimized way of communication because each employee gets to apply their own knowledge and experience to their parts so that eventually the entire process is an optimized one. In conclusion, the new approach to communication adopted by Equity first is highly recommended (Tourish & Hargie 2004). As already illustrated, it reduces cost which may be incurred through repairs.

Also it lets each branch develop in its own way as Equity first provides a router at each site which connects to the frame relay switch through a leased line provided by MCI. It also optimizes on available resources through the CIR which receives a significantly higher output. For this reason, Equity first is encouraged to maintain their new data communication approach.ReferencesHicks, D. L. (2004). Metainformatics: International symposium. MIS 2003, Graz, Austria, September 17-20, 2003: Revised papers.

Springer Publishers.Tourish, D. & Hargie, O. (2004). Key issues in organizational communication. Routledge publishers.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data Communication Using the Top-Down Approach Essay - 2”, n.d.)
Data Communication Using the Top-Down Approach Essay - 2. Retrieved from https://studentshare.org/business/1570132-case-study-4
(Data Communication Using the Top-Down Approach Essay - 2)
Data Communication Using the Top-Down Approach Essay - 2. https://studentshare.org/business/1570132-case-study-4.
“Data Communication Using the Top-Down Approach Essay - 2”, n.d. https://studentshare.org/business/1570132-case-study-4.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data Communication Using the Top-Down Approach

Computer Communication

Multiple prototypes can now be reproduced more economically by using the RP master as a pattern for creating molded or soft tooling.... The paper "Computer communication" tells us about the system of transferring information.... The communication methods involve many linguistic approaches.... These ten RIP packets would produce 5,120 bytes, or 41k bits, of data traffic, leaving only a fraction of a 56-kbps line available for one second out of every 30 for communications between LANs....
21 Pages (5250 words) Essay

Information Technology and the NHS

In addition to the size estimate the top-down approach requires the estimation of productivity and the efficiency.... o sum it up, the top-down estimation requiresGet the estimate of the total size of the software in terms of the function points.... The function points can be counted using the standard function point counting rules.... The basic approach is to start with the productivity levels of standard projects or use the productivity statistics....
10 Pages (2500 words) Case Study

Securing Data Using IPSec VPN

Virtual private network or VPN… For communication over long distances and with overseas destinations, a VPN must operate compatibly with satellite communications systems (Ground Control 2014).... A VPN is a kind of relatively secure network communication system.... Providers are now establishing VPN compatible with satellite communication systems (Siris, Ververidis, and Polyzos 2013).... This kind of network communication system is termed as the “VPN over satellite” (Bentley Walker 2012, paragraph 1; Ground Control 2014) technology, which has become a crucial necessity for remote users....
4 Pages (1000 words) Research Proposal

The Critical Success Factor of Data Warehousing Implementation: Key Challenges for a Company Like Offco

Based on the derived understanding it will attempt to suggest which approach may offer greater potential for Offco.... An empirical study by Ariyachandra and Watson (2008) where 454 companies were asked to respond to the surveys regarding the effectiveness of the particular data warehouse which was used by these companies, surprisingly, found no significant differences in preferences for enterprise data warehouse approach or data mart approach and both were thus found to be evenly efficient and effective....
15 Pages (3750 words) Research Paper

Inter-Departmental Communications In Organizations

Most of the above-listed channels of communication are used in a formal environment in a top-down approach.... The content of the communication is decided based on the internal and external needs of organizations.... The paper "Inter-Departmental Communications In Organizations" discusses how the selection of correct communication channels enables the organizations to be more effective.... Well laid out communication channels and that employ appropriate technology to support their internal and external communications are able to be more responsive to their customers' needs....
9 Pages (2250 words) Case Study

Installing and Administering IPSec

hellip; Each protocol plays its part in improving the security, integrity, and confidentiality of communication by using different algorithms for encryption and authentication.... he structure of the report is as follows: 1st section describes the IPSec standard and implementation of security in the network using IPSec.... This paper "Installing and Administering IPSec" presents an introduction of a security standard, called, IPSec and its capabilities in ensuring secure communication in the network....
9 Pages (2250 words) Term Paper

Integrated Library System for Top-Mark Library

This entails the ones using the computers and those arranging the books plus the management team.... For the past ten years, the top-mark library has been using a card file system in data storage and it is due to this that they need a new system that is integrated (Dennis & Roth, 2008).... A system that will come along with a data capture system as a solution to minimize delays in supplying materials to customers.... ObjectivesThe major objectives of the project would be first to come up with a computer database system to replace the current card file system for better service delivery and efficient data storage the system should be able to allow access for students and customers to more information regarding the books held within the library....
11 Pages (2750 words) Assignment

Nanotechnology and Future Networks

The author of the paper "Nanotechnology and Future Networks" states that nanotechnology can be utilized in innno8vating human mobility systems and thus fuse the physical and digital worlds together especially with reference to wireless communication technologies.... nbsp; The field of computer science and more specifically information communication and technology have advanced radically in the past few decades.... The recent mobile technology and associated devices are becoming embedded in human environments –public places, offices, and homes- and thus enabling a new platform that is facilitating ubiquitous sensing, communication, and computing....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us