StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

CheckPoint: Types of Networks - Coursework Example

Cite this document
Summary
Q1.Compare and contrast LANs, WANs, CANs, MANs, and HANs in 200 to 350 words. Ans: LANs, WANs, CANs, MANs, and HANs are methods to provide three types of computer networks that are the internet, intranet and extranet. All of these methods aid communication and sharing of data between computers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
CheckPoint: Types of Networks
Read Text Preview

Extract of sample "CheckPoint: Types of Networks"

Download file to see previous pages

WAN (Wide Area Network) on the other hand is used to cover a huge geographical area such as a city, a state or may even span over intercontinental distances. This type of connection uses telephone carriers and cables to provide connectivity. CAN( Campus Network) is a network used to cover a university or enterprise. This connection is developed by connecting a number of LANS to cover a limited geographical area. Router may be used to ease access. MAN (Metropolitan Area Network) is a computer network that spans over a large campus or city.

HAN (Home Area Network) is a used to for communication between a house. This network usually connects a number of personal computers, laptops and accessories such as printers and scanner within a house building. These networks differ in terms of functionality. For instance LAN in designed to aid communication between employees of an organization working in physically close locations such as in offices within a building where as WAN is used to connect physically remote locations which is why WLAN uses wireless technology and remote bridges to make connection. Q.2 Most personal computers are equipped with a version of the Windows operating system, whereas Apple personal computers have a different operating system.

Other choices are also available, such as UNIX and Linux. Why do you think Windows is so prevalent? What do the other systems have to offer that Windows does not? Who uses the other systems?  Ans: Windows is the most widely used operating system because it is fast and convenient. Windows has three main advantages over other operating systems that are security, compatibility and support. Windows is closed source nature which means that its internal systems can only be accessed by a few windows employee where as other operating systems are opened source which suggests that anyone who has the knowledge to modify the system can do that.

Hence since windows share less information hackers cannot cause much damage. Considering compatibility, windows is on an upper level as compared to Linux and other systems because of its new hardware. Since Microsoft has widespread corporate contacts and network, it can easily get access to new hardware as soon as it is released. Hence it is compatible with a wider range of new software and hardware. Windows supports all other Microsoft software and services that are essential for daily use like Microsoft office, SQL server and other but while using other operating systems usage of these services requires additional programming.

(“All about operating systems Part3”, aplus.net) However there are many features that Windows does not offer. For instance Windows is a heavy operating system whereas Linux is not. Linux can be run on old computers with barely any ram. Linux also has a wide range of desktop looks and appearances unlike windows which usually offers a very limited variation in this regard.(“advantages of using Linux over windows”, Foogazi.com). Chrome OS on the other hand has the advantage of being able to rum Google based applications such as Google DOC to work even if one is offline.

Though Windows is most prevalent other operating systems are also being use by many. Linux for instance is used “by the government of Canada, parts of the U.S. Department of Defense, The City of Munich, Germany,  France's Parliament, the U.S. Federal Aviation Administration, Germany's Foreign Ministry, France's national police force; the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CheckPoint: Types of Networks Coursework Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/finance-accounting/1424943-checkpoint-types-of-networks
(CheckPoint: Types of Networks Coursework Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/finance-accounting/1424943-checkpoint-types-of-networks.
“CheckPoint: Types of Networks Coursework Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/finance-accounting/1424943-checkpoint-types-of-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF CheckPoint: Types of Networks

Unified Threat Management: A Defensive Suite for the 21st Century

It is no longer the 1990s, where the omnipresent and singular concern was… Even individual end-users behind home networks face a bevy of threats from spam, scammers, fraudulent offers, spyware (whether illicit or created by “legitimate” companies), malware, viruses, keyloggers, identity theft, credit and debit card interceptions and fraud, and Making distinctions between these threats is often an exercise in futility: Thus, the birth of the UTM movement.... SonicWall argues that the reason for UTM is because the vast majority of consumers, whether individual home networks or large corporate and government networks, are not just doing one thing online at any given time, or even through any one application (2008)!...
13 Pages (3250 words) Essay

Case Study: Solution to Network Security

 Since most organizations depend on computer networks to store, access and provide business information both internally and externally to customers and suppliers, this information plays a key role in daily operations of the organization (Harrington, 2005).... nbsp;A company that process credit cards is at great threats through computer networks and data....
5 Pages (1250 words) Case Study

Evaluation of Insecurity System

TIDIS will require several component systems such as XR-1000 biometrics/CCTV system for capturing biometrics data from traveling passengers at a checkpoint.... As tragic events of 9/11 painfully remind us, our inability and failure to accurately identify and track suspected terrorists movements and activities within our borders resulted in arguably the greatest catastrophe in American history and loss of thousands of lives....
12 Pages (3000 words) Essay

BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK

The Art of Wireless Sensor networks: Volume 1: Fundamentals.... Visual Information Processing in Wireless Sensor networks: Technology, Trends, and Applications.... Computer networks: 20th International Conference, Cn 2013, Lwówek Śląski, Poland, June 17-21, 2013, Proceedings.... Wireless Sensor networks and Applications.... Localization Algorithms and Strategies for Wireless Sensor networks....
1 Pages (250 words) Research Paper

Firewalls: Great Network Security Devices

hellip; This paper has discussed some of the types of a firewall, it's working, and its operational structure.... hen communication systems and computer networks are connected jointly a different level of trust frequently exists on various sides of the connection....
9 Pages (2250 words) Research Paper

Infrastructure and Security of Information Network

Information networks are flexible, thus allow adding, removal and changes from one network to another making the operations and structures of large networks dynamic (Anderson, 2005).... networks allow for access to routers, printers, switches, workstations and access points.... The functions carried out by various networks may range from word processing, routing, storage to data analyses.... The networks are structured together form the internet, which surpasses organizations and national boundaries....
7 Pages (1750 words) Coursework

DNA Repair Mechanisms

"DNA Repair Mechanisms" paper focuses on the current findings in the field including identification and analysis of DNA repair mechanisms that contribute to resistance against nucleoside analogs.... There are proofreading mechanisms that operate during DNA replication.... nbsp;… Telomere maintenance and genome stability involve the MRN complex as well as the repair kinases....
13 Pages (3250 words) Coursework

Interactive Game Playing and Network Quality

The possibility of playing socially interactive games via mobile networks has presented a plethora of different technological challenges even amidst the enormous success in commercial terms (Mishra et al, 2014).... … The paper "Interactive Game Playing and Network Quality" is an outstanding example of an essay on information technology....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us