StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Understanding of how networks work - Assignment Example

Cite this document
Summary
The video entitled Warriors of The.Net, a film produced by Tomas Stephanson, presented a simplified visual framework of how the network works (jmatic, 2006). It began with an identification of major components such as the TCP packet, the ICMP Ping packet, the UDP packet, the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Understanding of how networks work
Read Text Preview

Extract of sample "Understanding of how networks work"

How Networks Work al Affiliation How Networks Work Summary of What the Video Covers The video en d Warriors of The.Net, a film produced by Tomas Stephanson, presented a simplified visual framework of how the network works (jmatic, 2006). It began with an identification of major components such as the TCP packet, the ICMP Ping packet, the UDP packet, the router, ping of death, and the router switch, among others. The process apparently begins with the user requesting for information and travels to a personal mailroom.

After which, information were reportedly labelled, addressed, and launched to area networks (LAN). The router allegedly works to classify and categorize information to supposed destinations; which were subsequently screened to the router switch for delivery of the packets to their intended destinations. The corporate firewall was identified to prevent unauthorized information to get in or to prevent classified information to get out. Further, the Internet was described as a spider web of interconnected networks where the packets travel to the intended interface.

Another firewall was supposed to serve as a bastion of security that allows only the packets which meet the criteria to reach the interface or the web server where packets are finally received, opened, and unpacked to reveal the information that was sought in the first place.What One has Learned One learned that the process seemed to be complex initially; but when it was described in a clear and vividly simple illustration, those who use the networks are provided with a summarized and concise overview of how it actually works.

One therefore understood why some information are not appropriately received and why sometimes, it takes quite a while before the information user seek are finally retrieved. The visual illustration provided an effective manner to apprise viewers of how the networks work in the simplest; yet effective manner.Referencejmatic. (2006, December 7). Warriors of The.Net . Retrieved from YouTube: http://www.youtube.com/watch?v=Ve7_4ot-Dzs

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Understanding of how networks work Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Understanding of how networks work Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1622596-understanding-of-how-networks-work
(Understanding of How Networks Work Assignment Example | Topics and Well Written Essays - 250 Words)
Understanding of How Networks Work Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1622596-understanding-of-how-networks-work.
“Understanding of How Networks Work Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1622596-understanding-of-how-networks-work.
  • Cited: 0 times

CHECK THESE SAMPLES OF Understanding of how networks work

What Works In Womens Networks

This article is an explicative account of how three organizations designed groups for female staff members, a move that clearly had profound impacts on the success of the organizations (Johns & Saks, p.... In the book Organizational Behaviour: Understanding and Managing Life at work (Johns & Saks, 2010), the authors focus on the understanding and the manageability of organizational behavior on a number of core factors… What Works In Women's Networks?... In the book Organizational Behaviour: Understanding and Managing Life at work (Johns & Saks, 2010), the authors focus on the understanding and the manageability of organizational behavior on a number of core factors....
6 Pages (1500 words) Research Paper

NETWORKING SKILLS FOR THE CREATIVE INDUSTRIES

Although this is not a difficult concept to grasp, it should be understood that the bulk of the education process, from kindergarten all the way to postgraduate work, is concentric upon the degree and extent to which information can be retained at a personal level (Kokkonen et al.... hellip; With that being said, the following paper will focus specifically upon the definition of networking, how is achieved, the benefits of performing it, the skills necessary for effective networking as well as a discussion and analysis of this student's own personal network; up to and including a discussion of what individuals or groups are currently included within the network, where potential future networks might lie, and how the network map might be altered or differentiated in the future in order to accommodate future needs....
7 Pages (1750 words) Essay

Biocapital by Kaushik Rajan and the Network culture of Terranova

hellip; Knowing something about the authors and the nature of their work would point the reader in the proper perspective.... He appeared to have found the taking out patents on gene sequences, where he said that the genome sequencing race was not just a race for credit, but was a race for ownership as well, and the legal, institutional and market contexts within which this research was being performed was evidently crucial to understanding the larger technoscientific event that was unfolding (Rajan, 2005) (Paraphrasing made)....
8 Pages (2000 words) Essay

Reservation and Non Reservation Based Ad Hoc Networks

This paper "Reservation and Non Reservation Based Ad Hoc networks" presents a reservation and non-reservation-based switching to makes sense in modern wireless ad hoc networks.... Due to active communications less characteristic and be lacking in the centralized monitoring points, the ad hoc networks are susceptible to attacks.... Wireless networks use radio waves to broadcast the signals and survive in essentially two dissimilar flavors, communications and ad-hoc....
9 Pages (2250 words) Term Paper

Creating Real Time Connections - Application of Scale Free and Random Networks

The networks mean an understanding of how technologies show the networking system.... This will be furthered by an understanding of how the theories are limited.... nbsp;    The representation of a network is one which is defined through several methodologies and theories, all which are able to create an understanding of how social patterns work.... Identifying the degree of effectiveness of these two theories and understanding if they work in real-world networks is one of the questions that arise when identifying these specific theories....
16 Pages (4000 words) Research Paper

Building a Personal Learning Network

These kinds of networks are there and will be there forever since no one can exist in isolation, we need to interact with others for one reason or the other.... An author of this research "Building a Personal Learning Network" will concern the use of a personal learning network or PLN....
5 Pages (1250 words) Coursework

Key Roles of Viruses in Social Networks

Fundamentally, the majority of the social network's computer viruses work by exploiting the trust that users of the networks have between each other.... The paper "Key Roles of Viruses in Social networks" discusses that the trend of computer virus propagation and the roles that different computer viruses play can best be examined through simulations.... hellip; Propagation of computer viruses in small-world-networks, propagation in scale-free network structures like mobile networks, IM networks, and e-mails have been of special importance....
6 Pages (1500 words) Essay

Virtual Private Network

nbsp;The paper will dig into the understanding of Virtual private network, describe three common topologies which are being used in the VPN and compare their strengths and weakness among others.... The paper will dig into the understanding of Virtual private network, describe three common topologies which are being used in the VPN and compare their strengths and weakness among others.... nbsp; The main aim of the virtual private networks is to help in providing organizations with similar capabilities but at lower costs....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us