The chapter begins with a brief introduction to the coming of age of the computer network – which is a collection of autonomous computers interconnected by a single technology. It also details how each of the last few centuries has been dominated mainly by the introduction of a single new technology. Overall, it specifies what this book will entail, networking information, while mentioning several high-level topics we will go over – much like the World Wide Web.
1.1 – Uses of Computer Networks:
Section 1.1 provides us with a fairly broad look at the current and potential uses for computer networks. In other words, it addresses why we care about such systems in the first place. The author seeks to address four major areas of use for networks: business applications, home applications, mobile users, and lastly social issues that arise when dealing with such interconnected networks.
After the brief introduction, they open by talking about the business applications of computer networks. To summarize, they mainly address how companies have developed a need to be able to share resources across their entire company. This can include things like printers, digital files, databases, and other digital and physicalized objects. Networks have allowed companies to escape the geological boundaries that were ever-present in the past. Now, they are able to communicate with branches nearly instantaneously all over the world. This is accomplished using things like VPNs (Virtual Private Networks) which can be used to join individual networks into on extended network.
Next, they talk about home applications. In this area, the writer talks about how the internet has opened many doors for individuals at home. For example, they disc...
... middle of paper ...
... connection, uses the connection, and then releases the connection. On the flip side, connectionless service carries the full address and then travels through the intermediate nodes in the system independent of all subsequent messages. Next up, we are introduced to service primitives which are a set of operations available that are created to access the network. Primitives consist of operations like listen, connect, accept, receive, send, and disconnect. Such primitives can be used for a request-reply interaction with a client-server environment.
At the end of this section, the author details the relation of services to protocols, or more so how both are different concepts. Namely, a service handles the interface between two layers. The protocol sets the rules governing the format and meaning of the packets between transfers. Understanding this difference is crucial.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- 1. Computer hardware is the physical pieces of a computer. It’s the equipment that makes up the computer. 2. A piece of computer hardware is a mouse. A mouse is a pointer for your screen. Clicking the left button, right button, or scrolling with the wheel performs different actions on your screen/with your software. 3. The CPU is the central processing part of your computer; the processor performs the instructions given from programs. 4. The system unit is the outside case of your computer. It holds the CPU and other circuitry/components that run your computer.... [tags: Computer program, Computer, Computer software]
1070 words (3.1 pages)
- Networking Computer Systems A network is a group of two or more computer systems sharing services and interacting in some manner. In most cases, this interaction is accomplished through a shared communication link, with the shared components being data. Put simply, a network is a collection of machines that have been linked both physically and through software components to soothe communication and the sharing of information. To make the communications between two or more computers work, several things need to be in place.... [tags: Computer Networks]
2759 words (7.9 pages)
- A network is a collection of entities that exchange information or good. Few examples of networks are nervous system, traffic light system, railway system etc. Computer Network is normally known as a system of interconnected computers & communication devices that can communicate with one another and share resources. At the most elementary level computer consist of two computers connected with each other by a cable to allow them to share data .A device connected to a network is called a node. A node may be a device such as a computer, a printer, workstation etc.... [tags: arpanet, protocols, internet]
1144 words (3.3 pages)
- Positive and Negative Impact of Computer in Society Almost a century ago, a large number of inventions took place during the first industrial revolution. Within a short span of time, many countries became industrialized. Now we are in the beginning of another industrial revolution. The major cause of the second industrial revolution is the invention of computers. Computer is the most versatile machine humans have ever created. It plays an important role in our everyday life. It covers huge area of application including education, industries, government, medicine, and scientific research, law and even music and arts.... [tags: Computer, Computer-aided design]
1070 words (3.1 pages)
- Microcomputers: (Notebook, Laptop, Desktop and Tablet PC) Microcomputers are the smallest systems in the market. The size range is from calculator to desktop size. Its CPU is microprocessor. It also known as PC, their aim is to satisfy the needs of public and are single-user computers. They are used for common applications such as gaming, social networking, and internet research. Justify the performance, limitations Justify why this type is suitable to a particular environment Desktop: Desktop wasn’t designed to be portable.... [tags: Personal computer, Computer, Minicomputer]
1212 words (3.5 pages)
- INTRODUCTION The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that it's virtual. There are closed networks and open networks. The closed networks are available for a person who belongs to that entity. On the other hand, open networks are available for the rest of the people.... [tags: open networks, closed networks]
1126 words (3.2 pages)
- The Internet and The Development of Computer Networks The Internet is the name for a group of worldwide information resources. These resources are so vast as to be well beyond the comprehension of a single human being. "Not only is there no one who understands all of the Internet, there is no one who even understands most of the Internet" (Harley 2). The Internet is often thought of as a computer network, or sometimes a group of computer networks connected to one another. The computer networks are simply the medium that carries the information.... [tags: Papers]
829 words (2.4 pages)
- What Are The Computer Generations First Generation (1940-1956) Vacuum Tubes The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms. They were very expensive to operate and in addition to using a great deal of electricity, they generated a lot of heat, which was often the cause of malfunctions. First generation computers relied on machine language, the lowest-level programming language understood by computers, to perform operations, and they could only solve one problem at a time.... [tags: Computer, Integrated circuit]
747 words (2.1 pages)
- “In HYPERLINK "https://en.wikipedia.org/wiki/Computer_security" computer security, a vulnerability is a weakness which allows an HYPERLINK "https://en.wikipedia.org/wiki/Hacker_(computer_security)" attacker to reduce a system 's HYPERLINK "https://en.wikipedia.org/wiki/Information_assurance" information assurance”. In other words some entity you may or may not have done direct business with has a flaw in their data flow or storage that allows an attacker access and the ability to move forward a secure level without invitation or permission.... [tags: Computer security, Internet, Attack]
843 words (2.4 pages)
- In today's technological world there are many vulnerabilities to the computer networks. If a malicious attacker exposes these vulnerabilities your business could be interrupted causing you thousands of dollars in damage. Not only could you lose business by your network going down but also by the lack in consumer confidence, and the possible penalties imposed on you by the government for not properly securing your customers vital information. There are several methods or concepts available to the network administrators to help them in securing their networks.... [tags: essays research papers fc]
1512 words (4.3 pages)
- Why I Want Become A Pharmacist
- My Personal Contribution Of My Freshman Year Of College
- Logistics Systems : A Warehouse Management System
- The Laws Known As Jim Crow Law Article On Pbs
- My Experience During The Past Two Simulations
- How Do I Fit And Training Documentation, And From The Manager 's Perspective