Nobody downloaded yet

Networking 2 - Essay Example

Comments (0) Cite this document
Summary
With the massive expansion of the internet and with networking and the use of computers in offices around the world their responsibilities are numerous and vital for the continuance of our way of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Networking 2
Read TextPreview

Extract of sample "Networking 2"

Download file to see previous pages This was a big revolutionary change. Information could be shared at extremely rapid rates. It could be said that this was the beginning of the information age. Nowadays we think nothing of transferring massive amounts of information, be they databases or images, across telephone or optical wires. Much of our economy is dependent on these tools. And who looks after all of these apparatuses and functions? The computer networker. The position is becoming more and more important as the field and our reliance on information technology continues to expand.
What sort of education is required by someone seeking a career in this exciting field? There are varying degrees of specialization and education, each requiring different amount of time and different kinds of aptitude. People have to know the hardware that they’re dealing with because this can be incredibly important when resolving problems. Another big issue is security. With the huge amount of viruses and worms out there, people need to know how to protect themselves. If you get a job working on the networks in a bank or at the government, for example, security is going to be a major concern because these kinds of institutions rely on confidentiality.
Day to day, what do these people do with networks? The key aspect of computer networking is to share resources and to allow computers to communicate—not just from room to room but across oceans and continents. For any viable business in today’s world these are necessary facts of life. Another important thing to do is maintain the system. Computers need to be taken care of. They need updates, they need to be checked out, they need to be replaced when they get old or are no longer functional. All of these fall under the purview of the computer networker.
Salary ranges across the field vary depending on the level of responsibility. Some positions play a very important role in designing networks or ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking 2 Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Networking 2 Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/miscellaneous/1561317-networking-2
(Networking 2 Essay Example | Topics and Well Written Essays - 750 Words)
Networking 2 Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/miscellaneous/1561317-networking-2.
“Networking 2 Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/miscellaneous/1561317-networking-2.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Networking 2

Networking

...the following text about how a wireless network works: “let say you have 2 computers each equipped with wireless adapter and you have set up wireless router. When the computer sends out the data, the binary data will be encoded to radio frequency and transmitted via wireless router. The receiving computer will then decode the signal back to binary data.” (home-network-help, n.d.) Figure 3: Typical small scale wireless network (Home-Network-Help, n.d.) 802.11 The Wireless Protocol The Wireless Network is governed by the 802.11 standard protocol approved by the IEEE governing body. 802.11n is the latest version of the standard wireless...
13 Pages(3250 words)Assignment

Networking

...Network’s Tolerance Fault Introduction In the world of today, networking or linking of different computing devices in order for them to share data has become the convenient way to people who want to share their files or send their e-mails from different parts of the country. Most networks are built hand in hand with both the computer hardware and computer software (Cook, 2003, p103). This paper tries to analyze the network’s fault tolerance, the cabling and how to configure the basic router commands and the basic router configuration in a networking environment. Portfolio 2 Activity 1 - Addressing Scheme (The packet tracer) No Subnet...
4 Pages(1000 words)Essay

Networking

.... The Internet Protocol Journal , 2(3). Kurose, J.F. & Ross, K.W., 2010. Computer Networking: A Top-Down Approach. 5th ed. Boston, MA: Pearson Education. Microsoft, 2012. TCP Connection States and Netstat Output. [Online] Available at: HYPERLINK "http://support.microsoft.com/kb/137984" http://support.microsoft.com/kb/137984 [Accessed 29 August 2012]. Peterson, L.L. & Davie, B.S., 2000. Computer Networks: A Systems Approach. Morgan Kaufmann. Rose India, 2007. UDP Server in Java. [Online] Available at: HYPERLINK "http://www.roseindia.net/java/example/java/net/udp/udp-server.shtml" http://www.roseindia.net/java/example/java/net/udp/udp-server.shtml [Accessed 28 August 2012]. Stoica, I.,...
4 Pages(1000 words)Assignment

Networking

...and bus topology. Moreover, tree topology facilitates the network administrator to expand the network easily. However, if the network expands, it becomes more difficult for the network engineers to manage the network. 2 Issues of Tree Topology As there is no centralized provision of services, it is difficult for the network engineers to tackle issues related hardware, software and network services. Physical intervention is required as the hub backs up each network segment, if the hub become nonoperational, the workstations of the entire department becomes unavailable on the...
11 Pages(2750 words)Statistics Project

Networking

...are presently using DNSSSEC. Despite there being several DNSSEC-related tools for network administration, only a few options are available for regular users on a computer. Opportunities The deployment of the DNSSEC technology offers a great opportunity for those operating their own DNS servers. This is because there are plenty of documentation regarding how configure DNSSEC for any DNS server being used. Additionally, sites like the DNSSEC-Tools project (16) are also in existence that provides tools that help in the process and software like OpenDNSSEC (17) capable of automating a significant portion of the process (Daley, 2011). The other significant opportunity in the deployment of DNSSEC is that the market demand for...
11 Pages(2750 words)Term Paper

Networking

...?NETWORKING Networking Affiliation Describe the features of telecommunications networks, including key networking technologies. Cover the Open Systems Interconnection (OSI) model, including each logical layer. Telecommunication networks provide the mechanism to support the electronic transmission of data over geographically dispersed locations. Additionally, these networks can be used to transfer any kind of data such as voice telephone calls, text, videos or images. A telecommunication network consists of a variety of components and features that collectively work to support this communication process. Some of the major...
3 Pages(750 words)Essay

Networking

...NETW-204 Assignment #3 Week 5 Refering to figure below: You are the network administrator for the network depicted in the diagram. You have beenassigned the address space 10.1.16.0/21 to create the LANs you need, and the 172.16.1.0/28 space for your WAN links. LAN: 10.1.16.0/21 WAN: 172.16.1.0/28 Assign addresses LAN Subnets Begin by creating and assigning the LAN subnets you will use. In order to make the most efficient use of your address space you should start by creating the subnet needed for the LAN with the most hosts and then work you down to the smallest LAN. Using the address space 10.1.16.0/21, create subnets for the LANs shown in the diagram and fill in the table 1 below. Notice that the...
2 Pages(500 words)Assignment

Networking 2

...Network 2 Designing of the LAN network LAN refers to a Large Area Network. In the case highlighted, the LAN is to be established in an area of over 100m. To start with, coaxial cable is mostly used for video and is no longer a priority in networking. Fiber optic cables are the quickest way transmission for devices currently, and their speeds depend on their diameter, distance of transmission, and light source used to transmit the signals. Twisted pair cables comprise of differently colored wires twisted into a cable. Wireless networks comprise of signals that are broadcasted by the use of a wireless transmitter. A deeper comparison is as...
2 Pages(500 words)Essay

Networking

...The internet connection speed in South Korea is considered as the fastest in the world (Smith According to a recent research, Korea has an intention of connecting every home in the country to an internet speed of one gigabit per second. Some of the other countries that are ranked in the top list in internet speeds include Bulgaria, Latvia, Japan, Romania and Lithuania. In this study, the United States is ranked 26th in the list. This paper will analyze the internet speed between South Korea and the United States. This study was conducted based on 27 million downloads using 20 million in 2011 from January till June. This study also encompassed the fastest net providers in every country. In the United States, Verizon and the FiOS...
1 Pages(250 words)Essay

Networking

...Introduction Border Gateway Protocol (BGP) is the routing protocol that necessitates the Internet to operate. This comes into existence as the address provision in the Internet is not in comparison as hierarchical to telephone dialing strategy, a number of the routers contained in the service provider main networks partake in exchanging of information around a number of IP prefixes. BGP is a procedure for exchanging routing information amid gateways hosts (Beijnum, 2002). The hosts should have its peculiar router in a network of automatic functioning systems. BGP is frequently the protocol but into consideration between gateway hosts contained in the Internet. The routing board comprises of a list of...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Networking 2 for FREE!

Contact Us