StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Spanning Tree Issues - Essay Example

Cite this document
Summary
The essay "A Spanning Tree Issues" focuses on the critical analysis of the major issues in the spanning tree. A spanning tree is where bridges are used to connect two or more computers for the exchange of information. Only one computer will be able to handle a message…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
A Spanning Tree Issues
Read Text Preview

Extract of sample "A Spanning Tree Issues"

SPANNING Spanning tree is where bridges are used to connect two or more computers for the exchange of information. This has to be done in such a way that only one computer will be able to handle a message and to ensure that two computers will be able to get the information that is sent within the network. Spanning tree prevents a situation or condition known as bridge loop. Another angle to look at this would be to get information from a larger hard disk drive to a smaller hard disk drive (Gavish, 2005). While this may be a very efficient way of ensuring that information is put in one disk and thus ensuring that there is less confusion about where data is stored, it may have some detriments. This helps in storing the same or similar data in one hard disk and thus ensuring that less data is lost. It also makes the work of the technician much easier in terms of referrals and work in general. There is a software that is used for putting large data in a smaller capacity hard disk. However, most people refrain from using this because retrieving the data may be much more hectic. For a person to retrieve the data, they have to sue the same software that they used to remove it (Robins and Salowe, 2005). In the process, a lot of data may be lost or even corrupted and thus making the entire point of storing information useless or pointless. It is important to note that people do not like to be tied to any kind of software for either storing or retrieving their information. In this case, they look for versatility and efficiency at the same time. When people are looking for spanning. They have to take care of issues such a feasibility, efficiency and the uniqueness and multiplicity of the spanning tree. Feasibility For spanning to be effective, it has to consider how feasible it is and how possible it is to run and to maintain. There are other projects that are known to be not feasible. It would be useless to carrying out a spanning activity that would be detrimental to the actions that he wishes to perform. Issues of feasibility include cost, the acceptability and the appropriateness of the program. It would be useless to carry out an activity that is not appropriate for the action that is to be performed. In this case, the results would not be what is expected and thus make the whole work useless (Monma and Shallcross, 2009). Appropriate means that the action has to be compatible with the technology. For instance, it would be futile to try and use an outdated antivirus to eliminate a virus that has just surfaced. Chances are very high that the virus is beyond the antivirus and cannot be eliminated at all. This means that the person will have lost money when purchasing the antivirus, they will have wasted time and may even end up damaging the machine even more. In the case of storing information or data, it may mean that the data to be stored has to be appropriate to how it is stored. It is wrong to store very important information on discs that can be easily corrupted or on disks that break or be lost very easily (Salowe, 2009). One has to be careful on the choice of storage equipment that they will use. It also has to be compatible to the information that is stored on the disc. For information transfer from one computer, one has to ensure that all the features of the said computers are compatible to each other and that they are working together to ensure that the process is as feasible as possible. The information being transferred also has to be compatible with one another. Of any one of them is not compatible then the bridges may not work as efficiently as they should be and thus making the entire process not feasible. There is nothing that can be done when the computers features cannot work together (Suri, 2002). Even in the work places, all the employees should be able to understand each other, work together efficiently with very few wrangles and they should be able to come together to solve a problem whenever it arises in order to make the organization succeed. In an organization where the employees cannot agree or where they do not understand the information that is given to them and also when they are not committed to the organization, then it would mean that the organization will have a lot to lose (Salowe, 2009). The human resources manager has to ensure that the employees who are hired to work for the company can work together. All the employees have to blend into the culture of the organization for the goals of the company to be feasible. All the employees should ensure that they understand the goals and ensure that they work together to achieve them. In the same way, the bridge acts as the culture where all the computers connected have to be compatible with for the plan to be feasible (Suri, 2002). Efficiency For the spanning tree to be able to work effectively, it has to be efficient. This means that it has to use the minimum resources, time and energy to achieve as much as possible. This means that it has to produce more than what is given. It has to be cost efficient and it should be able to utilize as little as possible for it to make sure that it gives that desired returns. Anything that does not prove to be efficient should be one away with (Gavish, 2005). Data that is transferred from one hard drive to another should be able to be moved from one place to another effectively without any loss of data. An example of efficiency in the work place could be, in a construction company, machines are used to make work much easier and faster than using human hands or knowledge,. Therefore, if a machine that has cost the company money does not work as it is supposed to then it should be done away with. Businesses aim at making profits so any machine that is used to make work efficient should be able to do so (Salowe, 2009). In the same way, any employee who does not perform their duties as they are meant to do, then it would cost the company resources and time to keep them there. They should be fired from their jobs. In this same way, the spanning tree should be efficient enough to be able to transfer large amounts of data from one hard drive to another in the shortest period as possible. Otherwise, it would beat the whole purpose of transferring the files. The data should be able to get their destination in the shortest time possible and also to get there with as little corruption of the files as possible (Suri, 2002). The files should be readable in the other computers and should be transferred in a manner that ensures no data is lost. Efficiency should be one of the major issues to consider when coming up with a spanning method. For efficiency to be tested it has to be used overtime for different methods to ensure that it works perfectly. An efficient plan should be one that has a plan for inconveniences that may happen when the program is learning. It has to be able to counter any problems that may arise when the data is being transferred from one device to another. Problems that may arise include corruption of data, or possible interruption of files (Monma and Shallcross, 2009). A good system has to have methods of ensuring that the mistakes re able to counter such problems. A good employee should have a mechanism to counter any problems whenever they arise. Instead of the employee waiting for instructions from a senior manager, they should be able to make quick decisions that would enable the company to save time, resources and make much more profits. Instead of wasting time waiting for the management, the employees should quickly look for a solution that would averse the problem as fast as possible, that is what a good spanning system should be able to do (Salowe, 2009). It should be able to make to correct situations without the influencer of the operator. This should also be done in the minimal amount of time possible to ensure no data is lost. Uniqueness and Multiplicity The spanning system should be unique to the specific information that is being transferred from one device to another. It has to be sensitive to the type of information that is being dealt with. This ensures that the data that is passed from the device to another is not corrupted or lost but rather gets to the destination that they are meant to without any faults (Salowe, 2009). In the same way the spanning device should be able to be used for many other projects as well. It should have a wide range of abilities. This is because most of these software are usually very expensive and it would be very expensive for a company to buy each single one of them to deal with the various problems that the company may face. In the same way, an employee should have unique capabilities that would enable them to carry out their work efficiently and expertly. However, this employee should also possess skills that would enable him to do other things when the need arises (Robins and Salowe, 2005). The employees needs to be as versatile as possible so that they become indispensable by the company. In the same way, the spanning tree should be able to carry out various tasks and also should be unique to the tasks that they have been assigned at the particular time or on the particular device. The ability of it to be able to multitask makes it very attractive to the user and thus guaranteeing more usage and efficiency in the work place. With all these qualities, it has to be trustable and durable (Suri, 2002). By it being durable the user is guaranteed that they will get maximum usage and that they will be served for a long time to come. It is important to note that the amount of time that a software can last without getting corrupted or outdated should be considered when coming up with a spanning software. It has to be durable in the sense that it can withstand any type of viruses that may come into play. The world today is full of technology and there is a lot of malware and viruses that come up each new day. Good software should be able to detect the malware and viruses and stop them before they cause too much damage (Robins and Salowe, 2005). This will enable the data to remain as they are and to ensure that the data is not corrupted in any way. It has to remain relevant to the people needing it for a long period to come. However, people must understand that the software are bound to get corrupted at one point or another and therefore, they should crate extra ways of dealing with viruses especially the very heavy ones that cannot be handled by any other software other that the anti-viruses. The work of spanning is not to prevent viruses but rather to transfer information from one device to another. However, this does not mean that measures cannot be put in place to ensure that this data is not corrupted or lost while it is being transferred (Robins and Salowe, 2005). All these qualities must be present when dealing with spanning and the various issues of cost, efficiency, legality, uniqueness, multiplicity and feasibility have to be considered when coming up with a plan. References B. Gavish. (2005). Topological design of centralized computer networks}formulations and algorithms, . Networks, 355-357. C. L. Monma and D. Shallcross. (2009). Methods for designing communication networks with certain two-connected survivability constraints, . Oper. Res., 531-541. G. Robins and J. S. Salowe. (2005). Low-degree minimum spanning trees,. Discrete Comput.Geom, 151-166. Salowe, J. S. (2009). Euclidean spanner graphs with degree four. Discrete Appl. Math, 55-66. Suri, C. L. (2002). Transitions in geometric minimum spanning tree. Discrete Comput. Geom, 265-293. . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Spanning Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1665970-spanning
(Spanning Essay Example | Topics and Well Written Essays - 2250 Words)
https://studentshare.org/information-technology/1665970-spanning.
“Spanning Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1665970-spanning.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Spanning Tree Issues

Case Brief

Legal Questions/issues The main legal questions/issues were: Is the claimant entitled to the commission?... On the last day of his term as president, John Adams appointed 16 Federal circuit court judges and 42 justices of the peace to the District of Columbia.... William Marbury, the claimant, had been one of the appointees....
20 Pages (5000 words) Research Paper

Credit Cards in the UAE from the Legal Perspective

The paper "Credit Cards in the UAE from the Legal Perspective" analyzes the major issues concerning credit cards with particular emphasis on the legal issues arising out of the credit card business in the UAE.... The credit card offers not only convenience but also has substituted checks....
17 Pages (4250 words) Research Paper

The Organizations Strategic and Environmental Requirements

Boundary spanning, with its function of information management, has been shown as a determinant of influence in organizations, and we suggest that this is a possible answer.... hile many specific boundary-spanning roles have been examined, such as sales representatives, purchasing agents, boards of directors, and legal departments, the HRM function has not been systematically analyzed from this perspective.... In addition, our current conceptualization is incomplete and must be supplemented by what happens after the creation of boundary-spanning roles....
14 Pages (3500 words) Essay

The Mountain Pine Beetle Infestation in Robson Provincial Park

It is significant to note that BC Parks has addressed all vegetation management issues by following the long-term ecosystem saving concerns.... This paper considers the BC Parks Vegetation Management Policy and the tree Removal Policy, and related conservation management policies in order to write a specific management policy addressing the Mountain Pine Beetle infestation in Robson Provincial Park.... Treatment options have been suggested for single tree fall and burn, prescribed burning and selective tree removal, considering the overall ecosystem and environment at the heart of every decision to be taken and reviewed, and if needed, changed annually for the policy management of Robson Park mountain pine beetle infestation spanning a period of 10 years....
16 Pages (4000 words) Research Paper

Spanning Tree Protocol Issues

The essay "spanning tree Protocol Issues" focuses on the critical analysis of the major issues in the spanning tree protocol (STP).... The spanning tree concept ensures loop-free through the creation of a redundant link acting as a backup when the active network links fail (Huang, Li, & He, 2006).... The rapid spanning tree protocol (RSTP) can be described as an extension of the STP that resulted from the evolution of the STP network protocol....
1 Pages (250 words) Essay

Spalting Wood History

This essay "Spalting Wood History" shows that in keeping spalting alive, the Arts and Crafts movement, both in Europe and the United States an important role even if it depended on an artist's interest.... The movement-based its ideas on going back to unique styles of crafting in Europe.... ... ... ...
31 Pages (7750 words) Essay

Environmental Scanning Strategy of AlienVault

The author of the paper "Environmental Scanning Strategy of AlienVault" will begin with the statement that when it comes to network and internet security, AlienVault has made a name for being one of the most trusted names in security industry.... ... ... ... This paper tells that started by founders who loved hacking and finding solutions around computer problems, AlienVault has emerged as one of the leading computer security firms that specialize in creating vital security solutions that are not only affordable but also effective in combating present and future threats....
16 Pages (4000 words) Case Study

Administrative Issues in Multihoming

The object of analysis for the purpose of this paper "Administrative issues in Multihoming" is multihoming is a configuration technique that provides a number of network-based interfaces or Internet protocol addresses on a particular computer.... ... ... ... Multi-homing offers an extra tool to keep network linking active and well in the case of natural disasters or other occasions that would usually render a host out of action for a comprehensive period of time (Tatum)....
13 Pages (3250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us