Advantage And Disadvantage Of A Network Essay

Improved Essays
INTRODUCTION
A network refers to a group of computers and other devices that are connected together usually by communication lines. The internet is a global network connecting millions of computers throughout the world allowing them to send and receive information. When it comes to multimedia communication both the internet and the network are vital platforms since multimedia elements such as graphics, videos, texts and audio need to be sent from one computer to another. As we know sending a file through the network or the internet is always faster and minimizes the chances of it getting infected. Sending and receiving these elements via the network or the internet has several advantages but also faces some challenges.

Advantages comprises of:
Speed - Sharing and transferring of elements
…show more content…
However to overcome this, a back-up server can be switched into action when the main server fails. A fault on a network may also stop users from being able to access shared peripherals such as printers. To minimize this, a network is normally segmented so that a failure in one part of it does not affect other parts.
For networks to be efficient a skillful systems manager is needed. A badly managed network may operate less efficiently than non-networked computers. Also, a badly run network may allow unauthorized users (hackers) into it with little protection against them causing damage, such as deleting or manipulating important files. Also the larger the network the harder it is to manage.
If a user was working on a file and the network faults, data may be lost since the file was not saved.
Some of the multimedia elements’ extensions produce files with large sizes which makes it slower to pass along the network or even attach to an email on the

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    I would install the Star topology which is the most common type of network topology that is used in offices. Star topology is the best since each node is connected by more than one link basically two connection to reach a node. The speed of most star configurations is hundred megabits of data per second with gigabit hub or switches and NIC cards speeds can be at one thousand megabits per second. In a star topology is possible to have all the important data back ups on the hub in a private folder so if the computers fails, the employees can still use the data using the next computer in the network and accessing the backup files on the hub. If the hub adds a device like a printer all the other computers on the network can access the new device by simple accessing the hub.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Fact is, access it the network grants access to more than just the internet. Not everyone should be able to access the network. Infinite amount of trouble can come from unauthorized persons accessing the organization’s network. If it is a guest network that is needed, that should be added to the organization. That’s only part of the solution.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    This ultimately reduces latency and ensures that each service has the maximum amount of system resources to operate. Having services distributed also minimizes areas of outage if a machine were to go down. If all services were to be running on a single server and that server goes down, the entire network would be affected. In the current configuration if one server goes down, all other network services will remain available.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Schools, colleges and office buildings would all use a LAN to interconnect their computer systems. They typically range from 1 – 10km. They are able to transmit data much faster than what can be transmitted over a phone line usually around 100kbps – 100mbps, they are cheap to set up compared to the other networks needing a switch and a hub. MAN – (Metropolitan Area Network) A MAN is similar to a LAN but able to cover an entire city.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Discuss which technologies can help address the bandwidth and server lag time issues affecting users in the scenario. The proper use of Ajax, JavaScript, and XHTML technologies can address the bandwidth and sever lag time that has affected users in the past. To minimize the network traffic between the user and the site, a shorter name in the element in XML will shorten server requests and response to the devices. At other times, older language will be use over XML when fewer words are required. Combine multiple requests from the same device, so the common header of the request data is sent once to end user.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    In the profession of IT a key component in your job will be looking after networks keeping them operational (for the users whom use the network), safe (clean out any corrupt files, check security measures, look for a virus. Etc…) and secure (making sure only authorise users are accessing the network). But first what is a network in a general meaning? A network consists of two or more computers that are connected in order to share resources (such as printers), exchange files, or electronically communicate. The computers on a network can be linked through various ways such as cables, telephone lines, radio waves, satellites, or infrared light beams.…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Qualitative Research Article Critique In the article Interstate Partnerships in Emergency Management: Emergency Management Assistance Compact in Response to Catastrophic Disasters, Kapucu et al. (2009) discusses the Emergency Management Assistance Compact (EMAC) response to Hurricanes Katrina and Rita in 2005. This study focused on a need to address efforts for emergency management at the state level. Throughout the study, certain themes emerged from the data which support the idea that EMAC networks were not adequately trained for the situations.…

    • 1245 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays