StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Basic Network Technology, Structure, and Protocols - Research Paper Example

Cite this document
Summary
BASIC NETWORK TECHNOLOGY, STRUCTURE, AND PROTOCOLS Basic Network Technology, Structure, and Protocols Author Author Affiliation Date Networking is the way of linking two or more computer systems, devices or even networks jointly with the intention of distributing and sharing useful information and data…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Basic Network Technology, Structure, and Protocols
Read Text Preview

Extract of sample "Basic Network Technology, Structure, and Protocols"

Download file to see previous pages

Moreover, the Internet is known as the world’s biggest public WAN and it is too a type of network (Mitchell, 2011) and (FREETECHEXAMS, 2011). There are diverse kinds of networking, for example there are WANs (wide area networks) or LANs (local area networks). However, the dissimilarity among these two depends on their coverage. Additionally, networks can as well be dissimilar in their arrangement and design. In addition, there are various other types as well for instance server/client networks and peer-to-peer networks.

Moreover, in some scenarios client/server based networks are inclined to be central by means of the majority processes being maintained by the centralized or key system. On the other hand, the Peer-to-peer networks are composed of computers that facilitate the similar processes as well as are able to transmit data and information to each other (FREETECHEXAMS, 2011) and (Mitchell, 2011). The purpose of networks is to offer data sharing and communication services, for this reason there are some established communication standards those are implemented through protocols.

In this scenario, the protocols are similar to the policies and regulations for the processes of the network. In addition, a network can use different protocols depending on the situation, for example TCP/IP, the majority widespread protocol established for the communication on internet as well as in small level networks. Moreover, the networks can be classified as wireless or wired networks. In this scenario, the majority of protocols intended for wired networks are as well facilitated and corroborated by wireless networks.

Furthermore, wired networks have been established a long time ago as compared to wireless networks. However, with developments in technology wireless networks are improving and turning out to be more widespread and trustworthy (FREETECHEXAMS, 2011) and (Mitchell, 2011). At the present, networks are used everywhere. From our home telephone lines to TV connection we are surrounded with communication networks. These networks are able to offer us a lot of facilities and services in form of information and data sharing.

On the other hand, majority of the people still do not have any knowledge about the network technology and what are the basic skills behind the scene. In this scenario, there is an awful need of educating people about the network technology and teaching people about this technology based system. For this purpose, TV and internet are the prime means of technology based communication. In addition, through these means we communicate with people as well as transfer data and information. Moreover, we can develop a program based on the presentation which can offer a great deal of support regarding information sharing and data distribution at the network level for guiding the people (FREETECHEXAMS, 2011), (Nash, 2000) and (Mitchell, 2011).

However, there are some issues associated with each technology. In the same way, the latest network technologies are also experiencing some of the issues those are hindering in the overall progress and possible evolution of the technology. In this scenario, security in case of network environment is taken as one of the prime factors regarding the network technology and communication. Moreover, these issues become more critical in

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Basic Network Technology, Structure, and Protocols Research Paper - 1”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1425856-basic-network-technology-structure-and-protocols
(Basic Network Technology, Structure, and Protocols Research Paper - 1)
https://studentshare.org/family-consumer-science/1425856-basic-network-technology-structure-and-protocols.
“Basic Network Technology, Structure, and Protocols Research Paper - 1”, n.d. https://studentshare.org/family-consumer-science/1425856-basic-network-technology-structure-and-protocols.
  • Cited: 0 times

CHECK THESE SAMPLES OF Basic Network Technology, Structure, and Protocols

Communication Process with X-Stream Server

Various issues surrounding the communication processes need in-depth investigation of the entire channel to find out the technicalities and interoperability potential of these layers and protocols.... These layers and protocols are discussed at length in the following lines; A remote user starts this process by accessing the X-Stream Server through internet explorer.... On the other hand TCP/IP is a suite of protocols which operates over this hypothetical model....
5 Pages (1250 words) Essay

Network Analysis - What Is Networking

Through this, there will be a provision on the basis for mutual support and the opportunity in order to recognize partnerships as well as resource-sharing protocols (Andrew, 2006).... Networks can have no specific structure or management, thus being informal.... network Analysis Name: Instructor: Course: Date: network Analysis Networking What is networking?... These relationships will be strengthened and provide more cohesion within a sector during the course of the network development....
5 Pages (1250 words) Essay

Cryptographic Overhead of IPsec Protocol Suit

So to solve this issue researchers are trying to increase the network security at each layer by designing a range of security protocols.... The designed protocols include PGP, S/MIME, and SET which are specifically designed to ensure the security of the application layer.... IPSec IPSec is a complete suite of protocols, which carry out specific tasks.... In this race, IPSec is one of the most important security protocol, which is designed for dealing with the network layer security, ensuring the availability of security services like that data source authentication, access control, data confidentiality and integrity and processing data packages on the IP packet layer (Zheng & Zhang, 2009; Meng, et al....
5 Pages (1250 words) Research Paper

Quality of Service in WiMAX Based Broadband Wireless Networks

Existing protocols and solutionsIEEE's 802 LAN/MAN Standards Committee is almost anonymous with a wireless standards body.... hellip; WiMAX Forum a leading industry consortium and IEEE working groups are working in collaboration of research community to overcome current infrastructure, QoS and implementation issues that are restriction the adoption of WiMAX technology.... WiMAX technology promises a better, more robust and cost effective alternative to existing wireless networking technologies and traditional wire-based broadband Internet connections. IEEE 802....
9 Pages (2250 words) Essay

The New Version of the Internet Protocol

The paper entitled 'The New Version of the Internet Protocol' presents the emergence of information technology that has influenced all the fields of life such as business, health, engineering, manufacturing, communication, entertainment and news and so on.... hellip; Information technology implementations and revolutions are generally business-oriented, with few scholarly applications, some examples include e-mail, customer service, and virtual updates to software, new online multimedia....
7 Pages (1750 words) Term Paper

The Role of Network Topologies in Designing a Network

hellip; Communication protocols characterize rules and ways for exchanging information and data in a computer network.... One of the widely used protocols is the Ethernet, Today, computer networks have become an important aspect of present-day communication.... he network infrastructures like hubs and switches as well as network protocols that are means of accessing remote hosts for exchange of information poses a great risk on the network.... Further, adoption of peer-to-peer technology to reduce the expense of coaxial cables in Ethernet LAN, at the same gives unsecured networking because it bases its operation on the sharing of information....
8 Pages (2000 words) Essay

Computer Technology and the Networked Organization

This essay articulates on network setup and design of a medium-sized food store, the structure of securing, socio-technical linkages and maintaining the network.... Network structure design is compulsory for any computer network, whether it is small business or home network.... The network structure is designed earlier prior linking and installing the software and hardware components.... nbsp;… According to the paper the perfect network for medium-sized food store therefore must be candid and effortlessly controlled....
4 Pages (1000 words) Assignment

Common Use IP Networks: Should They Be Implemented in a Mall

In this report, I have also presented a brief but comprehensive overview of the IP based network implementation support, technology, overview, and data types at the network.... "Common Use IP Networks: Should They Be Implemented in a Mall" paper is about the detailed analysis of the IP network implementation at Mall.... This report provides a comprehensive overview of the main implementation overview of the IP network at Mall....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us