This website uses cookies to ensure you have the best experience. Learn more

Understanding Computer Networks Essay

2219 words - 9 pages

Understanding Computer Networks

Each day, students and faculty at State University sit down in front of a PC or UNIX workstation and eagerly check their electronic mail, surf the World Wide Web, or run applications such as word processors and analysis packages. To most users, the magical wire which carries all of this information is nothing more than an electrical construct; two pair of wires twisted together and crimped at the end with phone connectors. Our world today is built on networking in every field from cable television to telephone systems, yet many engineers, old and young alike, have no idea what constructs enable them to communicate seamlessly across the globe.

Computer technology is constantly evolving. Fifteen years ago, computers were connected via simple serial interfaces communicating at 9600 bits per second. Today, workstations pump out data at rates in excess of 100,000,000 bits per second, and the road to improvement seems endless. The networking industry is filled with jargon which make it difficult to understand. While the concept of networking is not difficult to grasp, it is often difficult to fully explain. This text will enable the reader to understand the basic hardware that allows a computer network to function.

Computer networks consist of five major components. Two of these components are probably familiar to you: the workstation and the network server. When you sit down at a networked computer, the first thing you do is type in your name and a password. This process allows the computer to recognize you, and verify you are who you say you are by means of a password. When the login process is complete, you are connected to a network server; a device that simultaneously manages the disk space and computing resources for every user on the network. These resources might include electronic mail, file storage space, and CPU time, for example.

Other pieces of the network take care of connecting workstations and network servers together. These devices are called repeaters, switches, and routers. These devices form the network infrastructure that allows you to communicate to servers, to other workstations, and to other computers connected via the internet.


The repeater, or hub, is the simplest piece of networking infrastructure. A repeater has a certain number of ports, each of which is attached via a cable to your computer. The repeater functions much as its name implies; whatever is received on any one port is simultaneously repeated to all the other ports on the repeater.

When a computer wants to talk to the network, it listens to the wire to see if anyone else is talking. If it detects no traffic on the wire, the computer sends out a signal indicating that it is about to start a conversation. At the same time, it listens to make sure no one else is about to begin talking. This signal is repeated to every computer connected to the repeater, and is called a carrier. If two computers decide to talk at...

Find Another Essay On Understanding Computer Networks

Computer Crimes Essay

1101 words - 4 pages traditional crimes are fraud, theft, blackmail, forgery, and embezzlement when the computers or networks are used to facilitate the illicit activity. There are a lot of different criminal activities that can be considered computer crime. Some examples of these activities are misuse of devices, forgery (theft id), electronic fraud, illegal access (unauthorized access), Trojan horses, cyberterrorism, email abuse/harassment, and data interference

Statement Of Purpose Essay

1017 words - 5 pages have thus developed an aspiration to work on frontiers of Computer Science research. My passion towards academics has fetched me rewards in the form of Endowment Award and Merit Scholarships throughout the four years in college. With a desire to discover more about Intelligent Systems and Networks, I want to pursue my graduation at your university. Being an avid Chess player, I first played against the computer when I was in high school. It was my

Securing the Computer Network

1251 words - 5 pages going through any sort of electronic device they are passing through some type of communications network. Whether the information is traveling around the world or just across the room to another computer this information is at risk. Safeguards must be implemented to the computers and networks that they use to protect them from viruses, intruders, and system failures. “A computer security risk is any event or action that could cause a loss of or

privacy issues with social networks - BIS3400 - paper

1779 words - 8 pages employer profiling an employee on social networks is seen as a sort of discrimination and may be taken up in the court of law. According to the computer fraud and abuse act (CFAA), 18, USC. S1030 et sq which states that any individual who has access into a computer system without due permission and obtains classified information from any protected computer is liable to be punished. In the UK, access to data and modification of data which are

Ethical Issues In Information Systems

4412 words - 18 pages Sources on Databases and GIS (Ethical Issues) Ethical Issues in Information Systems 1. Introduction A New Technology New Ethical Dilemmas New computer technologies for gathering, storing, manipulating, and communicating data are revolutionizing the use and spread of information. Along the way, they are also creating ethical dilemmas. The speed and efficiency of information systems, which include local and global networks, databases, and programs

The Affects of the Personal Computer

513 words - 2 pages dollars because there is no way to police millions of people sharing illegal files. But the internet and the computer has also introduced harmful components that are designed to get embedded to any computer out there. Things like Trojans, viruses, can potentially harm computers, servers, and whole networks. These infectious files can affect a business costing them thousands and maybe millions of dollars of repairs, and possible sales, the workplace

TCP/IP Overview

1573 words - 6 pages or TCP. The second protocol is IP which stands for Internet Protocol. These two combined provide the basis for the virtual level of most of the networks we use today. The roots of the protocols reach back into the 1970’s. At that time networks were built by wires connecting one computer to the next directly. This is called direct connect. If you wanted information to get to a computer that yours was not direct connected to you would have to

Marketing Through Social Media

3843 words - 15 pages life of people: on their computer, their mobile phone and many of new concepts incite them to use the social networks for other things. The advent of the Web 2.0 and social networks contributed to make of every Internet user a potential media, by offering him simple tools allowing him to express himself on the Internet. Consequently, the brands realized that they had from now on no more the monopoly of the speaking on their subject. As explains

Does online social networking hinder the development of teenagers?

1209 words - 5 pages than 20 hours every week on Facebook (Robb). This amount of time spent on social networks could also be used to meet up with friends, have fun at the park or even work on school projects with peers. In this way, they get to better connect and understand different reactions or trends that their friends have. “A little technology isn’t bad, but if you are spending hours on the computer, you start to lose connection,” says teen Lauren Mullins of

Problem Based Learning as an Effective Tool for Teaching

967 words - 4 pages academic year. This course is introduced mainly because the usage of modern computer networking technology is using most business organizations. Even personal computer and Internet usage also increased. Network Architecture and Design: A two threaded approach is used for effective teaching of this subject. The two threads that are involved are Lecture thread and PBL thread. In lecture thread we have theoretical understanding of network operation

Networking or Software Development

903 words - 4 pages computer language (Gladwell, 2012). With practice you will eventually be able to think in these languages. Writing an application is much like writing a book. It requires creativity and a firm understanding of the language that you are using and your intended audience. While some knowledge of the functioning of computers is necessary, it is often necessary to have knowledge outside the IT field (Gladwell, 2012). A software developer will spend

Similar Essays

A Computer Engineering Careers Essay

508 words - 2 pages with new software and hardware, and also applying algorithmic and object-oriented problem solving skills and techniques. Having a clear understanding of the way data and computer structures operate is an important aspect in computer engineering. As a career, computer engineering is used in different industries including manufacturing, industrial, media, web development, and many others. A computer engineer can also work in other programming

Discovering Computer Networks Today Essay

1964 words - 8 pages mainframes, greater flexibility because of possibility to connect devices from various vendors. Because of the importance of this technology, there is a great need for technical staff that has a great understanding of the technology of computer networks, how to maintain them and how to repair them if anything was to go wrong (IT & e-commerce, 2011). Computer networking is not perfect. There are still some down sides to using computer networks

Computer Ethics Awareness Among University Students

930 words - 4 pages Introduction 1.1 Background Computers are the core technology of our times and apparently, the most important technology to be invented and used by man . Without computers and computer networks, especially, the Internet, activities of most organizations, such as banks, schools, government agencies would simply grind to a halt. Modern society's dependence on the use of information technology, make it more vulnerable to computer malfunction

Computer Support Specialist Essay

1287 words - 5 pages with local area networks. They maintain daily records of their communications. Also they train users on how to use their hardware and software. Computer support specialists stay busy with all their tasks. Also it is important to back up data in case the computer crashes or something happens. Also computer support specialist help people to reset passwords that they have forgotten. Also getting information is important. Computer support specialist