StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Networks - Essay Example

Comments (1) Cite this document
Summary
In order to have a network of computers working and serving the required purpose of data storage and retrieval, several computers need to be connected to each other in a specific format so as to have a network of computer. Specifically designed norms have be laid down in the form of layered architecture with the description of the devices used for connectivity at each and every layer in order for the system to work efficiently and without any difficulty.
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Computer Networks
Read TextPreview

Extract of sample "Computer Networks"

Download file to see previous pages The larger firms have their own computers connected in the topology suiting best to their requirements. They choose for themselves from the different options available like bus, ring, star, mesh and the like. The protocols used for the data transfer stays to be the same.
We take the example of the call center, as they require a large number of computers for providing online support to a large number of people utilizing the services provided by the firm. The protocols used for the data transfer are standard and are generated utilizing the international standards for communication languages. The call center backbone should be strong enough so as to meet the pressing requirements of online support to millions of users staying far and wide and utilizing the services of the organizations. The critical issue in the call center stays to be that the information and the calls need to be routed to the lines which are free at that very moment and these lines should be relieved back to the pool when they are no more used.
Next, the information needs to be collected in the central database so as to store the information and personal details about the scheme offered to the clients and their personal information too. The financial system at the back needs to be connected to the front end Customer relationship and maintenance software package, so that the information updated by the CRM department directly gets recorded in the back end ERP system. This saves a considerable amount of time and effort by eradicating the factor for double data entry in both the front end and the back end.
For this the cutting edge technology is utilized to develop new softwares and other data integration and migration utilities which connect both the financial system as well as the front end CRM. Next important factor is to maintain the connectivity of the database with the financial system, so as to maintain the records in the system and all the information in a systematic format following the specific schema.
The topology preferred for the call center is the bus topology wherein several computers need to be bifurcated in the form of branches from the central bus which is stronger enough to provide the connectivity to a wide number of computers. The chief advantage of the bus topology stays to be that the network is never disconnected even if a single computer is not upright in the channel i.e. it doesn't affect the connectivity of the other computers connected together in the firm.
[Computer Networks]
The connection stays to be the same for the complete network of the organization as well as the subnet of it. All the smaller subnets are connected with each other via an instrument called a router which routes the call to the desired departments within the organization. These routers and the gateways are the interconnecting devices which can be either active or passive depending on the amount of the power they consume. This connecting device helps in connecting and forming a bigger network.
The whole network is protected with the firewalls so as to maintain the security and integrity of the system. The protocols for the network stay to be the same whether it is a small firm or a large wide area network. The protocol used for the call ce ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Networks Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Computer Networks Essay Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/miscellaneous/1502558-computer-networks
(Computer Networks Essay Example | Topics and Well Written Essays - 2250 Words)
Computer Networks Essay Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/miscellaneous/1502558-computer-networks.
“Computer Networks Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/miscellaneous/1502558-computer-networks.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
mo
mooresantos added comment 1 year ago
Student rated this paper as
Perfect work done on the "Computer Networks". I think it is the best document I have seen so far.

CHECK THESE SAMPLES OF Computer Networks

Computer networks

...?Local Area Network Information and communication technology ICT has facilitated us with endless communication interfaces and opportunities. Likewise, a skeleton for transfer and exchanging blood within different parts of the body is considered veins. Similarly, for exchanging and communicating data within different computers and applications, computer network is an essential component. There are various types of computer networks such as Local Area Network, Wide Area Network and Metropolitan Area Network. These networks operates on different topologies, however, star topology is generally adopted by organizations because it supports centralized administration and management. Likewise, enterprise wide applications such as, enterprise...
14 Pages(3500 words)Essay

Computer networks

IP version 4. The protocol operates the network layer that is a third layer of the Open System Interconnection (OSI) model. Likewise, network layer incorporates addressing information and control information that enables data packets to be routed within the computer network ("Internet Protocol Version 6." 255-255). Moreover, IP version 6 is also considered or called as the next generation IP, as specified by the IEFT: RFC 2460 ("Internet Protocol Version 6." 255-255). However, the primary reason for upgrading the IP version 4 to IP version 6 is address space limitations. Moreover, other issues such as performance, security and auto configuration are considered secondary (Loshin 305). Likewise, address space limitations are linked...
14 Pages(3500 words)Essay

Computers and Computer Networks

Parameters for this layer are the destination addresses. The Network Layer is associated with routing and directing data to different networks. Likewise, Local area networks, Wide area networks and Metropolitan Area Networks. The Transport layer is associated with check and balance of data packets. It ensures complete delivery of data in terms of files or messages. The Session Layer is associated with maintaining data sessions between different nodes on the network. It also analyzes and prevents collisions between data channels by prioritizing them. The Presentation Layer is associated with presenting the data by converting protocols from data conversion techniques, encryption techniques, binary conversion techniques etc. The App...
8 Pages(2000 words)Essay

Security in Computer Networks

... and techniques used as control mechanism. The discussion provides a comparative analysis of these control mechanism and their relative effectiveness in implementing computer network security. Introduction Computer security is the "protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)" (NIST, 2008). Some of the threats facing the computer networks include spywares, viruses, and hacking codes or programs that expose the users to potential dangers of data loss and fraud activities. Most of the computer users are unaware...
6 Pages(1500 words)Research Paper

Introduction to Computer Networks TCPIP

... technology. Although the protocol was defined before the commercial usage of LAN technologies, the original design has continued to work well through several generations of hardware technologies. IP is now used over networks that operate several orders of magnitude faster than the networks that were in use when IP was designed. The Motivation for Change In TCP/IP If IP works so well, why a need is felt to change The primary motivation for change arises from the limited address space. When IP was defined, only a few compute networks existed. The designers decided to use 32 bits for an IP address because doing so allowed the Internet to include over a million networks. However, with a rapid exponential growth in the global Internet...
6 Pages(1500 words)Essay

Computer Networks and Operating systems

...RFC 2030 Network Time Protocol (NTP Network Time Protocol is used to synchronize computer clocks in World Wide Web scenario. It has been describedby Network Working Group in their Request for Comments: 1305 specifications. NTP standardize the process of time synchronization between national time and frequency dissemination services helps in time synchronization of subnet of a network. It helps in adjusting the local clock in each participating subnet peer in a local network. It promises the accuracies of 1-50 ms, depending on the characteristics of the synchronization source and network paths. RFC-1305 specifies the NTP Version 3 protocol machine in terms of events, states, transition unctions and actions and, in addition, engineered...
10 Pages(2500 words)Essay

Three Main Approaches to improve TCP/IP in Wireless Networks, Computer Networks

...) of the United States Department of Defense (DOD) was first intended to study and demonstrate computer resource sharing (Stallings 281). By 1975, it was no longer an experimental network and has been transformed to Defense Data Network, which met the DOD’s need demand for “secure command and control communications network and for ordinary unclassified communications” (Stallings 281). The outgrowth of ARPANET is what we know to be TCP/IP today. It is the communications protocol that unlike the Open Systems Interconnection (OSI) reference model recognizes the need for hierarchy. Its launch was a success because it delivered basic services that everyone needs like file transfer, electronic mail, and remote logon across a large number...
18 Pages(4500 words)Research Paper

Computer networks

... that was received. This is the same situation that happens in a basic acknowledgement. In this mode, the acknowledgement specifies the SACK blocks and they are then conveyed through starting and ending sequence numbers. Question 2 In trying to locate a certain server on the internet, a computer communicates to a series of DNS servers around the internet. The process involves the domain resolver determining the most appropriate domain name through queries that start with the top level label of the domain. The process entails some steps as follows; - On sending the message after the composition, the email client connects to the domains SMTP server The senders email communicates SMTP with email address of the recipient. It hands over...
4 Pages(1000 words)Essay

Hardening Computer Networks

... can deal with these security threats by adopting an appropriate security procedure. In fact, there are numerous guidelines and security measures that can be adopted by organizations in order to secure their computer networks (Nash, 1999; Shelly, Cashman, & Vermaat, 2005; Singhal, 2013). In this scenario, the National Institute of Standards and Technology (NIST) is a well-known organization that establishes and provides effective guidelines for promoting information technology (IT) security. In addition, NIST has established a wide variety of standards for securing all kinds of IT resources such as networks, computers, and equipment and so on (Scarfone & Souppaya, 2009). This paper discusses a standard operating procedure on how to properly...
5 Pages(1250 words)Essay

Computer Networks

... and major upon this control mode which helps in implementing flow control, reliability , sequencing , reliability and the manner in which data streaming is rooted with TCP(Tanenbaum, Andrew,103). The TCP provides a channel of communication between different processes on every host system. The channel is usually very reliable and streaming. In order to achieve this functionality, the drivers in the TPC breaks up the running session DataStream into small segments and then attach them to the TCP header (Tanenbaum, Andrew, 112). Work cited Tanenbaum, Andrew S. Computer Networks. Boston: Pearson Education, 2011. Print.... Computer networks Q1. Some of the computer applications that require...
1 Pages(250 words)Essay

Strategy and Transformation in Dell Computer Corporation

The management principles,  strategy, and vision are responsible for all the success of Dell. It was founded in the year 1984 as PC’s limited. In June 1988, when its first stock offering entered the market,  the name officially changed to Dell Computer Corporation. The year 1986 was a memorable year for Michael Dell and his corporation when Dell entered the European market. By the year 1989, Dell acquired sales of $50 million. The last four quarters earned revenue of around $57.9 millions2. Dell always aims to deliver innovative technology and services. This company sells the maximum number of systems than any other computer company.

The main principle of Dell is selling computers directly to the custome...
10 Pages(2500 words)Case Study

How Can CRM Strategies Improve Efficiency and Effectiveness in Supply Chain Networks to Enhance Competitive Advantage

... CRM and Supply Chains How can CRM strategies improve efficiency and effectiveness in supply chain networks to enhance competitive advantage? Provide real life example to support your case With globalisation and the growth of a shared market across the world, it is very important for all brands to have individual recognition and be accepted as a part of the local scene as much a small business would be (Harker and Esan, 2006). While this is often the target of marketing executives, it is often found that customers may have different relationships with brands and the strongest customer relationships survive even when if product quality goes down or even if the competition offers a better deal (Tenser, 2006). In essence, the relationship...
6 Pages(1500 words)Assignment

Computer Privacy Issue

The requirement has increased because there are unscrupulous computer attacks and private details are being stolen now more and more. These malicious data attacks have left the computers worldwide at a risk and hence the need to have privacy is of fundamental significance. If these privacy regimes are not taken care of, one could guarantee that problems would come about quickly and the computer networks would crash down instantly, thus providing fatal for the businesses and individuals alike. It goes to show without any doubt that privacy forms up as the most essential ingredient of success within a business entity and any organization would absolutely cherish the idea of having privacy within their networks to keep away the negat...
6 Pages(1500 words)Essay

Computer Crimes in the Modern World

.... According to Laudon & Laudon (1999), the computer security is a group of activities which encompass the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported with an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). Since, in the modern age of the information technology, various threats have appeared for the organizational information and personal information. Therefore, there is need of a security model that has the ability to manage and secure information reserves. However, technical administrative safety /security measures...
8 Pages(2000 words)Term Paper

How to Use a Wood Material in Computer Hard Disk Drives

...How to use a Wood Material in Computer Hard Disk Drives Number Report on How to use a Wood Material in Computer Hard Disk Drives. Introduction Hard Disk Drive commonly referred to HDD or Hard drive are the primary devices for storing all data in a computer. They are the devices storing virtually everything in a computer from the operating system up to your regular files (Warwick, 2010). A hard disk drive is one of the most expensive components in a computer and comprises mostly of aluminium and other non-biodegradable materials (Bifano and Bierden, 1997). Therefore, coming up with new and easily available materials for the manufacture of hard disks would lower the cost of their installation. This report aims at coming...
8 Pages(2000 words)Essay

The Impact of Wireless Technology on the Field of Communication and Computer Engineering

In this paper, it has been discussed how big the impact of wireless technology on communication and computer is engineering.

Communication is a conversation, interaction, or change of words, ideas, or messages between two or more than two people at the same time. For a long time in history, when there used to be no wireless technology or even wired technology, people used to send a letter to each other through the post. That was a very time-consuming process. The postman delivered the letters by hand. It took even more time for the sender to get the reply from the person through a letter. Then came wired technology. The history of wireless technology can be traced back to “1896 [when] Marconi took his apparatus t...
6 Pages(1500 words)Essay

Gulf Carriers Alliances and Networks

...Gulf Carriers Alliances and Networks How to shift the center of gravity of the global aviation industry into a newly created aviation district and how could ATR aircrafts be positioned in the long –term strategic fleet planning of Emirates, Qatar Airways and Etihad Airways? By ALA JEFRI Supervised by: Prof., Dr., Mr., Mrs, Miss First name, Last name A research project Submitted in partial fulfillment for the degree of Master of Business Administration In Aerospace Management At Toulouse Business School Toulouse, France Month / Day / Year Executive Summary This report aims to look into the changing nature of aviation in the Middle East especially with respect to the larger Gulf aviation carriers. In order to understand...
52 Pages(13000 words)Dissertation

The Effect of Using Computer-Assisted Language Learning

... The effect of using Computer-Assisted Language Learning (CALL) to Assess Listening Skill for ESL Learners INTRODUCTION Computer Assisted Language Learning (CALL) refers to the use of computer in the process of language learning. The objective of CALL is to explain about the process of language learning through the help of computer. It assists in creating an autonomous learner. In this regard, it can be stated that the significance of computers with regard to CALL has changed from being an “Input – control- feedback” to management of communication. In other words, CALL methodology in the initial years was based on the behavioral approach so that the inputs of the students could be checked and than a feedback was to be provided...
6 Pages(1500 words)Assignment

Computer Dependency

... Computer Dependency Technology is advancing at a tremendous speed globally and both individuals and organizations are trying to cope with the emerging challenges arising from significant changes in the technology industry. People of all ages have started embracing the use of computers at an alarming rate to keep pace with technology advancements and to accomplish different tasks that were traditionally performed by manual methods. Children today are being exposed to the use of computers at a very tender age because the computers have become a basic commodity both in the learning and playing environment (Eaton, et al. 2). The adults have also not been left behind; they have significantly become too depended on computers for almost all...
6 Pages(1500 words)Essay

Proliferation of Social Media Networks

...Introduction The use of Internet is increasing now a days. These are the tool for contacting people, relatives, and friends and are commonly known as social media (SM). It is start of new age of online progress as it involves wikis, virtual world, social networking, blogs and online communities are created called as social media (SM) are more and more people are connected with other people all over the world and the number is increase everyday (Davila, et al. 2003). SM has many types such as Facebook, twitter, etc. where people post their photos and their information about their trips and events. It is visible to all the pople from all over the world. These new way of contact and talk decreases in person talk and contact. People like...
8 Pages(2000 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Computer Networks for FREE!

Contact Us