Computer Network Term Paper

PAGES
1
WORDS
366
Cite

Networking

The advent of the Internet, wireless and satellite communication and both computing hardware and software improvements continue to make our world a very small place. Ever since these combined methodologies have allowed us to integrate single or 'dumb' computer terminals that once only accepted data from large mainframes, computer networking has become an integral part of our everyday professional and personal lives. Even the most basic networking infrastructure today can contain an extremely large number of individual nodes that are far more powerful than even the most dominant mainframe of just a few decades ago. This new found networking muscle provides anyone and everyone access to an infinite and global spectrum of information in seconds.

We can look at any business entity and see change: Consider the banking industry. A typical day entails large international banks literally moving trillions of dollars around the globe in seconds while at the same time a typical person can log on to one of those same international banks to use a 'bill pay' service to pay a home's utility bill. The beauty of these vast networks used by both business and individuals is that no one has to know how the networks work to use them. How many kids today, even those failing English or Math, use the text feature of their cell phone network to communicate with their parents who have their business Blackberry?

This seamless network communication is possible because of standardization. The Internet is nothing more than an ad hoc network founded on standardized communication protocols. By standardizing computing and networking protocols, global communication has evolved. This standardized evolution process is what allows governmental, private and business networking to become a homogeneous environment that thrives. There are many organizations that help develop the standards we take for granted today such as the American National Standards Institute (ANSI), the Institute of Electrical and Electronic Engineers (IEEE) and the Organization for Standardization (ISO). To demonstrate just how important organizations like these are, consider that Local Area Networking (LAN) Project 802 or the 802 series. These were literally the blueprints for network communication. In other words, if there were no standardization systems in place there would never have been an Internet.

Cite this Document:

"Computer Network" (2009, October 17) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/computer-network-18547

"Computer Network" 17 October 2009. Web.25 April. 2024. <
https://www.paperdue.com/essay/computer-network-18547>

"Computer Network", 17 October 2009, Accessed.25 April. 2024,
https://www.paperdue.com/essay/computer-network-18547

Related Documents

Computer Network for Bistro Bookstore Computer Network Planning for Bistro Bookstore Launching a new bistro and bookstore is going to require three specific tasks be completed to ensure the stability, security and continued reliability of the network which over time will become the backbone of the information system and infrastructure of the store. These three tasks include the development of the new network, defining and implementing best practices and procedures for ensuring

In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in

Discussion Question 2 - Security Awareness Training and IA Training In general, security awareness training consists of periodic classes and online tutorials and related quizzes that promote understanding of the nature of different types of threats to information security (Boyce, 2008; Kizza, 2009). That training addresses threats in the nature of malicious intrusion from external entities, malicious intrusion and misuse of information access or system credentials from the inside; and malicious

computer networks understood. Please start reviewing articles discussing stranger requests received IT personnel: Jennifer Mears & Denise Dubie, Funny tech support stories, CD-ROM coffee holders, homemade cookies, frozen computers, The seven most important things about computer networks that should be understood by everyone who uses one Principle one: Know how to 'talk the talk' In the article "They've heard them all," two of the most humorous stories detailing naive users' confusion about

Computing networks are certainly changing. There are a couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the most part, these drivers are resulting in positive changes for computer networks. One of the fundamental ways in which computer networks are changing is that they are incorporating Virtual Private Networks (VPNs). VPNs provide an additional computing network inside of an external

Cyber Terrorism: The Greatest Risk in the U.S. Tremendous technological advancements have been made in the last few decades. Today, humans depend more on computer networks and information technology (IT) systems than on other means for information. From business to government, computer networks are relied upon to store, process, retrieve, and transfer critical information. Increased dependence on computer networks has, however, posed a major threat. Cyber terrorism is now arguably the