Free

Net-centric Computing and Information Systems - Essay Example

Comments (0) Cite this document
Summary
Starting from the very basics of introduction to the concept of a LAN (Local Area Network) itself the tutorial progresses to define how it evolves into a wireless paradigm and then get named as a Wireless LAN!…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Net-centric Computing and Information Systems
Read TextPreview

Extract of sample "Net-centric Computing and Information Systems"

Net-centric Computing and Information Systems Submitted to, Submitted By, of the Submitted on, [January 29th, 2012]
TUTORIAL #1: WIRELESS LAN
A brief description of the tutorial
The tutorial about wireless LAN was comprehensive and interesting. Starting from the very basics of introduction to the concept of a LAN (Local Area Network) itself the tutorial progresses to define how it evolves into a wireless paradigm and then get named as a Wireless LAN! The technology of Wireless LAN is introduced as a comparatively newer technology in the world of networks and is universally recognized as 802.11 (Wi-Fi). The protocol under discussion is said to have increased the connectivity paradigm by manifolds. The usability of the Wireless connectivity protocol is extensive and is therefore referred to as being situated at the ‘edge’ of the internet.
While describing the structural details of the wireless networking protocol the tutorial also significantly addresses the issue of security vulnerability that is associated with the said protocol. Since the protocol is not guided or guarded by wires or fixed connections it is often said to have substantial susceptibility to noise and other unseen deflections. Similarly, the protocol also does not ensure secure data transfer because since it is prone to interferences, then it can also be prone to unauthorized access to private information being passed over it. Another drawback associated with the Wireless LAN protocol is that despite all the technological advancements, the current data transfer rate over it is comparatively significantly lesser than that over the Local Area Network (LAN).
Business Needs Addressed
The Wireless networking protocol 802.11has revolutionized the concept of connectivity among individuals. Thus this has had amazing effects on the corporate world as well. The need of the hour for businesses that involved the need to get network connectivity anytime and at any place within a particular set up without the restriction of physically laden networking wires in the premises have been addressed with the emergence of this protocol. Run time connectivity within business environments is not possible via wi-fi enabled computing devices that can be secured by binding the identity of hardware logged on to the system by pre-registering their MAC addresses.
Evaluation of and Experiences with Tutorial
It was interesting to realize the concept behind the much prevalent wireless internet connectivity that has become so very common the world over. It was an informative and interest capturing tutorial indeed.
TUTORIAL #1: COMPUTER SECURITY
A brief description of the tutorial
The tutorial studied addressed the most integral concepts of today’s world: ‘Computer Security’. Ever since the advent of the concept of connecting computing devices over a network the concept of computer security has risen. Any unauthorized access to the computing machines is termed as a security breach and attempts have been made continuously for years in order to secure the computing de vices and to completely eliminate the prospective chances of any security breach. The tutorial skillfully describes the concept of computer security breach and tells how viruses, worms and Trojan horses are a threat to the security of the data and the computing systems themselves. It also gives detailed introduction to how ‘stealing passwords’, ‘ authentication failures’ and ‘social engineering’ are also potential threats to the security of a system.
Business Needs Addressed
It is evident that the tutorial that was under study specifically addressed business needs as data and computer security are the basic and foremost requirements of any business setup.
Evaluation of and Experiences with Tutorial
The tutorial is of a god level and strength as it provides substantial information about computer threats and also glances into their history thus incredibly increasing general knowledge about them.
REFERENCES:
Local Area Network Portal (2011) Introduction to IEEE 802.11. Retrieved from http://www2.rad.com/networks/infrastructure/lans/wirelintro.htm
Rad (2011) Computer Security. Retrieved from http://www2.rad.com/networks/2005/computersecurity/main.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Net-centric Computing and Information Systems Essay - 1”, n.d.)
Net-centric Computing and Information Systems Essay - 1. Retrieved from https://studentshare.org/information-technology/1588278-net-centric-computing-and-information-systems
(Net-Centric Computing and Information Systems Essay - 1)
Net-Centric Computing and Information Systems Essay - 1. https://studentshare.org/information-technology/1588278-net-centric-computing-and-information-systems.
“Net-Centric Computing and Information Systems Essay - 1”, n.d. https://studentshare.org/information-technology/1588278-net-centric-computing-and-information-systems.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Net-centric Computing and Information Systems

Net-centric Computing and Information Systems

...? Paper on Net-centric Computing and Information Systems - By Harish Das What seemed new-fangled and smart yesterday is eyed as ‘something obvious’ today! That’s the scenario where the high-end technologies are outpaced by itself the next day. There was a time when people used to speak computers and systems; now the topic has changed to Information Management in state of the art organizational structures. This could only be possible due to fast elevation of Networking. The Open System Interconnection model identifies a networking framework for implementing protocols in 7-layers. Control...
2 Pages(500 words)Research Paper

Net-Centric Computing

...? Net-Centric computing Net-centric computing is the computing on a platform based on a distributed environment, which combines the, principles of communication and networking. This enables the sharing of data and application on a virtual web space which is accessible from local terminals. This is done through high speed network connections and low cost terminals to access the virtually portable applications running on multiple platforms. The concept resembles the early computing age of centralized data and services and mainframe computers. Net-centric...
3 Pages(750 words)Essay

Information and Network Centric Operations

...operation with bad data but to destroy the system itself. Because physical security is often the first line of an information systems defense, an attacker often attempts to compromise the facilities that house the input, networking, and documentation resources of a targeted information system. 5. Network Centric Operations Network centric operations enable exchange of information amongst a large number of heterogeneous nodes in a network. Thus 'information' can be created, distributed and exploited across a vast computing, environment. The Network...
13 Pages(3250 words)Essay

Information Systems

...Information Systems Article Review Malmsjo (2006) has researched the most appropriate methodology for designing of supportive information systems. In general use, there are two kinds of information systems, supportive and operative. The paper examines the difference in the two systems and their elements. A different phase of the methodology that was used in the design of the support system has been discussed and the conditions for designing both supportive and operative systems have been discussed. Malmsjo (p. 881-882) first speaks of hard and soft information...
2 Pages(500 words)Book Report/Review

Information Systems

...Information System Answer a: The revised DFD is as follows: Figure DFD Level The changes made in the DFD are as follows: The external entity requires to be in the symbol of source/ sink as specified by Demarco & Yourdon in their paradigm. It was erroneously done. The processes have also been corrected. The numbering of the processes was ambiguous and has been corrected. The flow towards “making the appointment” was not present. One cannot receive the appointment card unless she fixes an appointment. The flow regarding “patient reporting to clinic” was not present which has been added. Answer b: To read the level 1 DFD we require following the basic steps: 1. The overall structure must be studies...
5 Pages(1250 words)Coursework

Information Technology and Computing

...INFORMATION TECHNOLOGY AND ENVIRONMENTAL ISSUES TABLE OF CONTENTS Introduction: 2 2. Identifying the problem: 4 3. Toxic substances includedin the manufacture of hardware: 6 4. IT & Energy Conservation: 7 5. Solving the dilemma: 8 Initiatives to solve the problem: 8 HCL’s ecoSafe Program is such an initiative, to help promote recovery and recycling of EEE. This program encourages its customers to help recycle end-of-life products by facilitating separate collection and recycling by authorized recyclers in an environmentally friendly manner. 9 6. Conclusion: 13 1. Introduction: The effects accomplishments of Computing are innovative in many different fields of life. Over the last few decades,...
10 Pages(2500 words)Essay

Information Systems

...or individuals to achieve personal or business goals. Therefore, the basic motive behind the development and implementation of information systems is to attain facility and support in the above mentioned issues. In addition, in a firm an information system consists of hardware, data, telecommunications, software, operations and people (staff, management). However, in a large number of organizations these information systems are modules of a huge enterprise system, such as online web based system, ERP or SCM system (Laudon and Laudon; Worthington; Chaffey and Wood). Oz Effy (2008)...
12 Pages(3000 words)Essay

Enterprise Computing Systems

.... This was coupled with other factors such as rising customer dissatisfaction, changing trends, less techno-savvy consumers, rising preference for mobile computing and less need for customization. Market analysts realized that Dell’s problems focused more on cost competition without providing value added customer service, efficiency without innovation and a reluctance to change their Information systems and Information technology to support their business processes. It was said that Dell Inc had been a failure where maintenance of a strategic IS/IT is concerned The paper throws light on the strategic history of IS/IT of Dell, look into it’s current IS/IT and make...
13 Pages(3250 words)Essay

Cloud Computing and Information Systems in Business

...reasons. In this way, technology allows workaholics to work and slackers to slack. So, exactly how has technology changed the way we do business? In countless ways, but we'll highlight the major ones on the next page. B. C. Strategic information systems are those computer systems that implement business strategies; they are those systems where information services resources are applied to strategic business opportunities in such a way that the computer systems have an impact on the organization’s products and business operations. Strategic information systems are always...
7 Pages(1750 words)Article

Importance of Information Systems in Transforming Businesses. Cloud Computing

...Importance of Information Systems in Transforming Businesses Importance Of Information Systems Cloud computing is a new development in the networking of computers to facilitate communication and resource sharing. Information systems have been improved and have a major function when it comes to aiding the accessibility and usability of cloud computing. The integration of information systems has helped developers to be able to understand the needs of organizations and people who create, process, filter and distribute data using hardware and software...
10 Pages(2500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Net-centric Computing and Information Systems for FREE!

Contact Us