StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Basic Network Technology, Structure, and Protocols - Essay Example

Cite this document
Summary
Basic Network Technology, Structure, and Protocols Author Institution Introduction The importance of computer technology in this age cannot be gainsaid. In essence, computers have been incorporated in almost every part of the society in such a way that living without them seems to be a mirage…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Basic Network Technology, Structure, and Protocols
Read Text Preview

Extract of sample "Basic Network Technology, Structure, and Protocols"

Download file to see previous pages

This is not excusable in the 21st century hence looking at the basic or fundamental things that an individual should know is imperative. Computer networks have been used in sharing resources and data as well as for communication purposes. In order for one to have optimized performance, maintenance, data protection, security and improved reliability knowing the basics of the computer networks is of utmost importance. This paper outlines most of the things that a computer user needs to know. Computer networks security For any computer network, security is of utmost importance.

Computer networks are always vulnerable to a number of security related threats which could be either external or internal. These include spyware, viruses, Trojan horses, web worms, hackers, adware, intruders and root kits. These security threats have a number of negative threats. Some of them impair certain computer applications and programs while others may modify, delete or corrupt files thereby making them inaccessible. They may also attack the data that you have in the hard disk causing it to crash hence necessitating reformatting.

While some may not necessarily harm the system’s integrity, they will always consume the system memory thereby slowing it down significantly. In some cases, you have computer malware which reinstalls itself in the computer system even when you have uninstalled them. Evidently, computer malware would have adverse effects on the computer networks. In this case, it is always important that an individual has a clear understanding as to the ways in which the computer security could be supplemented.

There are several ways in which this could be done; they include installation of antivirus software, regularly updating the anti-malware programs and having the whole system scanned. Knowing about the security of the computer networks allows individuals to keep their data and resources protected. In addition, they would keep their systems functioning in an optimum manner in which case maximization of output from the computer network will be the direct result. While there may not be a standard way of teaching individuals about the security aspect of the computer networks, I think that the best way to tech people about hem is to outline the threats posed to computer networks, the effects and the best way to safeguard the network against such threats.

Computer networks connectivity issues As stated earlier, computer networking is all about communication and sharing of data and other resources. This would only be accomplished when there is the appropriate connectivity. However, many are times when the connectivity of a computer network is impeded by varied factors. Connectivity problems emanate from faulty hardware, devices conflicts, improper configurations, faulty connectors or cables and even outdated drivers of the LAN card. This would call for troubleshooting by scanning the computer for spyware or viruses, checking the LAN card configurations and updating its drivers, properly inserting the STP/UTP cable or even replacing the LAN card then reconfiguring it.

Software troubleshooting issues For any computer system, software plays a very vital role in the whole operation process. Right from the operating system to the drivers, software and programs, their importance cannot be understated. This underlines the fact that when they are not operating in the appropriate manner, the whole system

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Basic Network Technology, Structure, and Protocols Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1441215-basic-network-technology-structure-and-protocols
(Basic Network Technology, Structure, and Protocols Essay)
https://studentshare.org/information-technology/1441215-basic-network-technology-structure-and-protocols.
“Basic Network Technology, Structure, and Protocols Essay”, n.d. https://studentshare.org/information-technology/1441215-basic-network-technology-structure-and-protocols.
  • Cited: 0 times

CHECK THESE SAMPLES OF Basic Network Technology, Structure, and Protocols

Routing Protocols for Ad-hoc Wireless Network

Chapter 3: Routing protocols for Ad-hoc Wireless Network 3.... Routing protocols As stated previously in this paper, an ad-hoc mobile network refers to a number of wireless mobile hosts linked together to form a network of temporary nature without using any centralized control or stand-alone infrastructure [18].... Various Network protocols in MANET's and their Comparisons Although the network protocols in MANETS can be classified in numerous ways however many of these are performed on the basis of both the routing mechanism and the network structure [20]....
20 Pages (5000 words) Dissertation

Communication Process with X-Stream Server

Various issues surrounding the communication processes need in-depth investigation of the entire channel to find out the technicalities and interoperability potential of these layers and protocols.... These layers and protocols are discussed at length in the following lines; A remote user starts this process by accessing the X-Stream Server through internet explorer.... On the other hand TCP/IP is a suite of protocols which operates over this hypothetical model....
5 Pages (1250 words) Essay

Network Analysis - What Is Networking

Through this, there will be a provision on the basis for mutual support and the opportunity in order to recognize partnerships as well as resource-sharing protocols (Andrew, 2006).... Networks can have no specific structure or management, thus being informal.... network Analysis Name: Instructor: Course: Date: network Analysis Networking What is networking?... These relationships will be strengthened and provide more cohesion within a sector during the course of the network development....
5 Pages (1250 words) Essay

Networking Funamentals

imulation ExperimentsSince a lot of the internal workings of the Ethernet protocol is incorporated in a chip and concealed from the normal users, Today simulation tools are able to educate the principles and protocols of LAN.... Both protocols are incorporated in VLSI chips and are not reachable to usual users.... This approach gives organizations equally a fine thoughtful of the LAN protocols and the exploit of LAN in today's data networking....
14 Pages (3500 words) Essay

The New Version of the Internet Protocol

The paper entitled 'The New Version of the Internet Protocol' presents the emergence of information technology that has influenced all the fields of life such as business, health, engineering, manufacturing, communication, entertainment and news and so on.... hellip; Information technology implementations and revolutions are generally business-oriented, with few scholarly applications, some examples include e-mail, customer service, and virtual updates to software, new online multimedia....
7 Pages (1750 words) Term Paper

The Role of Network Topologies in Designing a Network

hellip; Communication protocols characterize rules and ways for exchanging information and data in a computer network.... One of the widely used protocols is the Ethernet, Today, computer networks have become an important aspect of present-day communication.... he network infrastructures like hubs and switches as well as network protocols that are means of accessing remote hosts for exchange of information poses a great risk on the network.... Further, adoption of peer-to-peer technology to reduce the expense of coaxial cables in Ethernet LAN, at the same gives unsecured networking because it bases its operation on the sharing of information....
8 Pages (2000 words) Essay

Computer Technology and the Networked Organization

This essay articulates on network setup and design of a medium-sized food store, the structure of securing, socio-technical linkages and maintaining the network.... Network structure design is compulsory for any computer network, whether it is small business or home network.... The network structure is designed earlier prior linking and installing the software and hardware components.... nbsp;… According to the paper the perfect network for medium-sized food store therefore must be candid and effortlessly controlled....
4 Pages (1000 words) Assignment

Common Use IP Networks: Should They Be Implemented in a Mall

In this report, I have also presented a brief but comprehensive overview of the IP based network implementation support, technology, overview, and data types at the network.... "Common Use IP Networks: Should They Be Implemented in a Mall" paper is about the detailed analysis of the IP network implementation at Mall.... This report provides a comprehensive overview of the main implementation overview of the IP network at Mall....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us