Network


Length: 446 words (1.3 double-spaced pages)
Rating: Excellent
Open Document
Need writing help? Check your paper »

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

A computer network is a group of interconnected computers that can accomplish many important tasks. To define computer networking you should define networks. A network is composed of two or people or objects, using a common language, and they have something to share. In computer networking the two or more objects are the computer or terminal. This can consist; have an IBM 3270 terminal and accompanying mainframe, to a stand-alone computer. The computer is usually an IBM PC personal computer or clone licensed copy of a PC, usually cheaply made. The common language or protocol is necessary for the communicators to be able to understand each other. We take for granted simple things like who talks first, how long they talk, and how to end a conversation. A protocol addresses these and more. The common protocol is Transmission Control Protocol (TCP/IP). TCP/IP is the protocol of the Internet. Internet is actually the short form of the word Internet work. Internet work means a network of networks. At one time, all of the different networks used different protocols. A user could talk to others on their network, but not to someone on a different network. The protocol TCP/IP solves this problem. It is what allows a person on one network to communicate with a person on a different network.

When I mentioned something to share in the network definition, it can be anything, an idea, document, or greeting. Networking allows use of applications on other computers, electronic mail (email), and real time discussions in chat rooms. The types of networks are classified as distributive or centralized. In a centralized network, processing occurs at one place and requests are made of the processing from terminals. A mainframe computer with attached terminals is a great example of centralized network. The terminals communicate with the mainframe to accomplish tasks. A distributive network spreads processing power to the individual computers. Networked PCs are a great example. Tasks are accomplished at the computer and at other computers using communication. In the definition of a network the computer hardware is considered part of the user in this definition. The hardware used to connect to other computers is considered part of the protocol.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

How to Cite this Page

MLA Citation:
"Network." 123HelpMe.com. 18 Dec 2017
    <http://www.123HelpMe.com/view.asp?id=78897>.
Title Length Color Rating  
Multiple Access Relay Network Essay - We consider a multiple access relay network where each source transmit channel coded packets, relay decode the transmitted packet, generate network coded parity symbol, and retransmit it. We assume the relay has multiple antennas, so relay to destination link is MIMO channel. We consider two MIMO transmission mode at the relay, spatial multiplexing (SM) and beamforming as transmit diversity (TD), and assume that the relay use different network coding scheme depending on the MIMO transmission mode....   [tags: Technology, Network] 654 words
(1.9 pages)
Strong Essays [preview]
Network Management Essay - In the following report I will discuss the role of network management and how the network manager contributes to the network security of an organisation. Network security will be discussed in full to inform on how big of an impact network attacks can have on an organisation. Once the impact of network security has been covered I will go through all possible threats that can harm an organisation and the steps network managers should go through to secure a network to the best of their ability. The importance of network tools will be introduced last along with benefits they can provide....   [tags: Technology, Network Security]
:: 5 Works Cited
1212 words
(3.5 pages)
Strong Essays [preview]
Essay on Network Configuration at MKS Instruments - In this paper we will examine the network configuration used at MKS Instruments. The areas covered will range from the network infrastructure, how it is implemented and how it is used. This paper will also include the technology, hardware involved and a small scale network diagram example. There are many classes of IP addresses ranging from A all the way to E. Most large scale companies and offices use a Class A IP address schema while smaller locations use Class C. The MKS office in San Jose uses a Class B IP schema....   [tags: Network Analysis] 1283 words
(3.7 pages)
Strong Essays [preview]
Essay about Network Topologies Analysis and Comparison - Network Topologies Analysis and Comparison The bus topology connects several computers, or nodes, with a communication channel, often a single cable. Computers on a bus either transmit data to other computers on the network or listen for data from other computers on the network. They are not responsible for moving data from one computer to the next. Consequently, if one computer fails, it does not affect the rest of the network. Because the data, or electronic signal, is sent to the entire network, it travels from one end of the cable to the other....   [tags: Network Topology] 1022 words
(2.9 pages)
Strong Essays [preview]
Network Designs Essay - Introduction Logical Network Design and Physical Network Design are different but depend on each other when implementing. The logical network design pertains more to a high-level view as opposed to the physical network design which is more of a low-level view. Logical Network Design A logical network design is the way the devices appear connected to the user. The logical network design is the way the data will be accessing the medium which is considered to be the logical topology, helping to provide the network backbone requirements and the overall systems and performance criteria....   [tags: Network Design] 763 words
(2.2 pages)
Strong Essays [preview]
Network Topologies Essay example - Mesh, Bus, Ring and Star topologies The term Topology refers to the physical or logical shape or layout of a network. Communication between different nodes within a network is determined by its topology. Mesh, Bus, Ring and Star are four of the most common network topologies, each with advantages and disadvantages in relation to each other. Mesh Topology The Mesh topology is true to its name in that there are multiple redundant interconnections between network nodes. A mesh network can employ one of two connection arrangements, full mesh or partial mesh....   [tags: Network Topology] 1391 words
(4 pages)
Strong Essays [preview]
Network Design Essay - Network Design Table of Contents Introduction 3 Mesh 3 Bus 4 Ring 4 Star 5 Ethernet 6 Token Ring 6 Fiber Distributed Data Interface (FDDI) 7 Wireless 7 Reference List 8 Introduction This paper is an overview of some aspects of network architecture. Network architecture is defined as the communication products and services that ensure the various components can work together. I will discuss the different physical LAN topologies and how they work. Lastly, I will discuss several of the LAN Standards such as Ethernet and Token Ring....   [tags: Network Technology] 1267 words
(3.6 pages)
Strong Essays [preview]
Network Security Essays - Network Security 1. What is network security. Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself. Threats to your network is becoming more complex and it is requiring lots of money, time and sacrifices to keep up with the growing amount of potential attacks....   [tags: Technology Security Network] 1619 words
(4.6 pages)
Powerful Essays [preview]
Network Security Essays - Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. • Explain the difference between historical and statistical logging. Logging is a simple way of keeping a record of activity on a network. There are several types of logs that can be kept, each providing different data that can be analyzed to provide information on potential ways of improving security over time....   [tags: Network Security Hacking ] 932 words
(2.7 pages)
Better Essays [preview]
Network Security Essays - Network Security Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems. Purpose and Scope To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI)....   [tags: Security Network Technology] 980 words
(2.8 pages)
Strong Essays [preview]

Related Searches




This includes cabling, modes, and the phone company connection. Computer networking is group connected together sharing information. The public phone system is a good example of a network. The Public Switched Telephone Network (PSTN) uses its own protocols to establish a link between two or more people to exchange voiced information. This voice network is also used for carrying the data being transmitted by the Internet. Networks are prevalent in every part of society and are especially important in computer networking.


Return to 123HelpMe.com