Networking Computers Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Computer Networking

In today's society, more people and businesses rely on computers and networks to store vital information and technology.

Networking is the process of moving information via computers rather than via any other medium, such as paper media or mere human communication. In addition to sharing information via networks, computers can share hardware, e.g., laser printers, and software in the networking process. This can save businesses and individuals large sums of money.

The computers or devices on a network are often referred to as "nodes."

To visualize a network, the easiest image is that of two computers hooked together by a cable, transmitting information between the two machines.

There are actually a variety of kinds of networks, e.g., local area networks (LANs) and wide area networks (WANs).

LAN is a relatively localized network:

LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications."

By contrast, a wide area network is a less centralized network, allowing computers that are located in remote locations to be connected. In essence, a WAN is:

group of devices located remotely and connected via some electronic means, i.e. telephone system, satellite link, etc. What this really means is a large group of computers linked together via hardware and software in an unlimited area. This network may be across town, between cities or between continents. Generally, the network has one or more LANs containing servers for file and print applications, printers for document output and a number of workstations for the end users. All of these resources are normally physically connected locally via some form of cable (i.e. coaxial, twisted pair, etc.) to a hub and/or router which is then connected to a telephone system, satellite link or other form of electronic transmission."

II. Home Networks, Intranets, and the Internet

Three different kinds of networks -- the home network, intranets, and the Internet -- will now be discussed. The home network is the simplest of the networks to be discussed, and the Internet connects the widest range of people. The corporate "intranet" is built on the same technology as the Internet. However, an intranet is designed to be utilized for a company's internal purposes.

A. Home Networks home network essentially allows individuals to link together all of the computers in their home. A home network can allow a family to save money on multiple peripherals such as printers and fax machines and allow the family to access all of the computers and software stored within the computers linked in the household.

In addition, "one of the most compelling reasons to set up a home network is that everyone can be on the Internet at the same time."

More than half of the homes in the United States have a computer, and a significant number of those have more than one computer in the household. (International Data Corp.) Therefore, home networking is becoming increasingly common and beneficial in the United States.

However, as is the case with larger networks, there are security risks associated with home networks, especially with "always on" broadband Internet services such as DSL and cable modems. Common forms of security attacks include email spoofing, Trojan horses, and email born viruses.

Therefore, home users must weigh the benefits and risks of setting up a home networking system. Relatively simply ways of protecting the security of a network include building a firewall to protect internal computers and servers, using virus protection software, making routine backups of crucial data, and turning off the network when it is not being used.

The Internet

By far, however, the largest and most global network is the Internet. Most people do not think of the Internet as a network, but it is the most wide-reaching and revolutionary type of network that exists today.

The Internet is built using underlying network protocols called Transmission Control Protocol (TCP) and Internet Protocol (IP).

TCP and IP were designed by the United States Department of Defense to connect a multitude of different networks.

Today, these are the network protocols used worldwide to connect people via the Internet:

The TCP/IP protocol suite has become the de facto standard for computer communications in today's networked world.

The protocols can be run on multiple hardware platforms across the globe.

For computers to network via the Internet, they must each have a unique "address" and be on an "IP" network.

IP "handles the transmission of data from an originating computer to the computer specified by the IP address. It does so by breaking up large, unwieldy chunks of data into easily manageable IP packets that it can deliver across the network."

An IP address locates the computer and the computer's network adapter. Moreover:

a]n IP address can be private, for use on a LAN, or public, for use on the Internet or other WAN. IP addresses can be determined statically (assigned to a computer by a system administrator) or dynamically (assigned by another device on the network on demand). IP addresses consist of four bytes (32 bits). Each byte of an IP address is known as an octet. Octets can take any value between 0 and 255, but various rules exist for ensuring IP addresses are valid."

Most of us are familiar with IP addresses that look something like, butthese IP addresses correspond to numerical counterparts - such as -- which are not used for marketing purposes because they are difficult to remember.

IP addresses are basically the online equivalent of offline mailing addresses.

In terms of impact, the Internet is the most significant of all types of networks because of its global reach. Anyone, anywhere on the globe can connect to anyone located anywhere else on the globe so long as both people have access to a computer that is Internet enabled.


Many corporations have a need for their employees and/or clients to communicate privately via the Internet. In the past, to set up such a proprietary communication network, they would have to set up an extremely expensive, tailor-made database system that would generally not be accessible to external clients unless they were provided with software to access the database. Today, however, corporations can simply build a corporate intranet.

An intranet is a private, secure space on the Web where all members of [a] group can communicate with each other, share information, and collaborate on projects."

An intranet is basically just a private web site for a company's intended users, such as employees, vendors, independent contractors, consultants, and clients. Only those to whom the company grants access (through a password) may enter the intranet through any computer that is Internet-capable.

Again, network security is an issue with intranets, but it is even more an issue with intranets because outsiders are being granted access to a company's internal data. Therefore, it is advisable that company's build separate pages for internal use, i.e., for employees, and for external use, e.g., for suppliers and clients.

Works Cited

Computer Networking." July 4, 2002.

CERT Coordination Center, "Home Network Security." July 4, 2002

Gilbert, H., "Introduction to TCP/IP," February 6, 1995. Yale University. July 6, 2002

IBM Redbook Abstract, "TCP/IP Tutorial and Technical Overview." July 5, 2002. IBM, Inc., "What is an Intranet?" July 4, 2002.

Ivens, Kathy, Home Networking for Dummies, (John Wiley & Sons, 2002) p.20.

Sol, Selena. "Internet Protocol." August 16, 2000. July 5, 2002

Tyson, Jeff. "How Home Networking Works."

Marshall Brain's How Stuff Works.

What is a LAN?."

July 4, 2002. Cisco, Inc.

Cisco Documentation "What…[continue]

Cite This Term Paper:

"Networking Computers" (2002, July 07) Retrieved October 24, 2016, from

"Networking Computers" 07 July 2002. Web.24 October. 2016. <>

"Networking Computers", 07 July 2002, Accessed.24 October. 2016,

Other Documents Pertaining To This Topic

  • Computer Mediated Communication CMC Throughout the Years

    Computer mediated Communication (CMC) Throughout the years, people used different means of communication to pass information from one source to another. The type of communication involved face-to-face, writing letters then sending to people, using telegrams which was the quickest means of communication, and use of telephones, although telephones were invented some years back. Today, the world has become computerized and there are new technologies that most firms have acquired to ease

  • Telecom Networking Infrastructure

    Networking Training Proposal Assume that you are a Telecom Analyst at company and you would like to either improve or overhaul their current telecom/networking infrastructure. My paper will concern the implementation of a network training program for employees in a medium-sized company known as Anycompany. What we have noticed is that Anytown, in order to meet up to ISO 9000, must implement a systematicized training program in networking for its employees. Through

  • Networking System Support and Virtualization

    Ethical Concerns of the Research This research would adhere to the ethical aspect of studies in order to come up with quality information. One of the main ethical aspects of this research would entail integrity. This involves keeping promises and agreement during the administration of questionnaires and execution of interviews. This relates to the maintenance of confidentiality of the information by the population sample with reference to the agreement terms. The

  • Computer Network for Bistro Bookstore Computer Network

    Computer Network for Bistro Bookstore Computer Network Planning for Bistro Bookstore Launching a new bistro and bookstore is going to require three specific tasks be completed to ensure the stability, security and continued reliability of the network which over time will become the backbone of the information system and infrastructure of the store. These three tasks include the development of the new network, defining and implementing best practices and procedures for ensuring

  • Computers VPN as a Company Grows it

    Computers VPN As a company grows, it might increase to multiple shops or offices across the nation and around the world. In order to keep things running proficiently, the people working in those locations need a quick, secure and reliable way to share information across computer networks. In addition, travelling workers like salespeople need a regularly protected and reliable way to connect to their business's computer network from distant locations. One well-liked

  • Computer Ethics the Internet s Rapid

    Clearly from this case and others there is a critical need for the development of safeguards on consumer data captured over the Internet, both of the opt-in (where the customer approves the data being captured) and the non-opt-in variety. An Explicit Requirement for Transparency and Ethical Use of Data Consumers have become increasingly concerned that their data, however acquired, will eventually be sold without their knowledge, eventually leading to the potential

  • Networking Practical Networking in the Modern Business

    Networking Practical Networking in the Modern Business Environment Networking architecture is vital in the organisation of any business firm in today's globalised world. RFID, Cloud Computing, Intranet Network Architecture and Digital Rights Management (DRM) are major fields of endeavour that require the resources of companies. Increasingly, all aspects of an organisation are linked via the Internet and various other technologies in ways of connectivity that we did not even imagine before. Radio Frequency

Read Full Term Paper
Copyright 2016 . All Rights Reserved