Two Main Reasons For Communication Methods: Network Congestion

Brilliant Essays
Register to read the introduction… Network congestion involves the overflow of information. This could be due to the odd use of user communication methods and malware infestation. Hardware failure and damage during a crisis is usually caused by some of the same factors that they are trying to mitigate. These include natural disasters such as hurricanes, earthquakes, and electrical storms. Human error plays a big role in communication failures by entering the wrong information, or accidentally turning off a router. Based on our studies of chapters two, four and five, we believe that the chance of network latency and jitter can be reduced by setting the hot zone as a priority for communication. We are sure that this would already be done if it is deemed acceptable, but wouldn’t it be possible to greatly reduce the chance of network congestion and latency by using multiple network topologies.
Network Congestion: Solutions using topologies We have learned about multiple topologies this year. This includes the bus, ring, star and mesh topologies. But the most notable one for our purpose is the wireless mesh network. A wireless mesh network makes it to the top of the list because it is wireless. Other topologies like the bus, ring and star networks require physical connections to the
…show more content…
(n.d.).http://www.nap.edu/openbook.php?record_id=13076&page=2. Retrieved from http://www.nap.edu/openbook.php?record_id=13076&page=2
Raheleh B. Dilmaghani, R. R. R. (n.d.). A Systematic Approach to Improve Communication for Emergency Response. http://ieeexplore.ieee.org.ezaccess.libraries.psu.edu/stamp/stamp.jsp?tp=&arnumber=4755387&isnum&tag=1. Retrieved from http://ieeexplore.ieee.org.ezaccess.libraries.psu.edu/stamp/stamp.jsp?tp=&arnumber=4755387&isnum
Vassiliadis, D., Garbi, A., Calarco, G., Casoni, M., Paganelli, A., Morera, R., Chen, C.-M., et al. (2010). Wireless networks at the service of effective first response work: The E-SPONDER vision. 2010 5th IEEE International Symposium on Wireless Pervasive Computing (ISWPC) (pp. 210-214). Presented at the 2010 5th IEEE International Symposium on Wireless Pervasive Computing (ISWPC), IEEE. doi:10.1109/ISWPC.2010.5483797

Related Documents

  • Decent Essays

    Effective communication is the type of communication that is quickly and easily understood. Positive relationships benefit everyone involved. Verbal communication is often the starting point for any relationship; this can be shown through a personâ€TMs tone of voice, body language and eye contact.it is also important to listen so that your response is appropriate. To communicate effectively it is vital to see each person as an individual and adapt the communication to equal out the power. It is important to always have and show equal power when trying to communicate effectively with a child, young person or adult.…

    • 227 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    SIP Trunking BroadConnect boasts its many years of experience and emphasis on customization. We take every business and design the best phone systems content for it, based on your needs and budget. Since we understand that communication is a major component of a successful business, you will never receive excessive or useless features that will only hinder your company’s ability to grow. Our network is prevalent throughout North America, and it uses converged T1 that is fast and reliable.…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Pm3110 Unit 4 Test Paper

    • 1148 Words
    • 5 Pages

    Each virtual way is dispensed an altered measure of transfer speed. Virtual ways don't powerfully change their data transfer capacities past what has been assigned. 4. What are the three layers of IEEE 802 reference models? What are their major functions?…

    • 1148 Words
    • 5 Pages
    Great Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    List the classification of network in detail according to the area covered. Also explain each classification of network in detail with its application. LAN – (Local Area Network) A LAN is a network that covers a relatively small area. It is a network that mostly links computers within a single building.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Itc431 Unit 1 Assignment

    • 1697 Words
    • 7 Pages

    Assignment 2 ITC431 - Networks and Communications Sidharth Arangadan House Jayarajan 11538368 1 1. Define and explain the following terminologies:  Computer networks: A computer network is a group of computer systems or other hardware computing devices which are linked together through a channel called communication channel to establishing communication between wide number of users and also for resource sharing between them.  Personal area networks (PANs): A personal area system - PAN - is a machine system sorted out around a distinctive individual.…

    • 1697 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Here, an evaluation including 40 graphs from the Internet Topology Zoo is carried out. For each graph,…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 7 Lab 1

    • 211 Words
    • 1 Pages

    1. PROBLEM DEFINITION Let S be a network distribution that maintain the integrity of flow of current or data. Such that, S= {G; F; L;C;R | S} G = Represents the Input Signal G = {G0 | G} Where G0 input signal: F = Represents the Faults F = {F0|F} Where F0 fault in cable: L = Represents the Loaction of fault L = fL0;L1; :::Lnj_Lg Where L0-Ln location of areas where faults occur.…

    • 211 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    There are 7 different types of networks that you could work with, such as A LAN network (Local Area Network) or WAN network (Wide area network) those are the two most commonly used networks. The other included seven types are; • LAN (Local area network) this network is one that operates over and is limited to a relatively small area such as a school or office building. • WAN (Wide area network)…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    New optimization and management services for 3G wireless networks using CELNET Xplorer. Bell Labs Technical Journal, 9(4), 101-115. Retrieved Tuesday, October 10, 2006 from the Academic Search Premier database. Cohen, L., Finn, R., Wilkinson, A. & Arnold, J., (2002). Professional Work and Management.…

    • 3010 Words
    • 13 Pages
    Brilliant Essays
  • Improved Essays

    In Intra-body communication the transmission medium used is human body, which has made much attention in personal area network(PAN).Since the signals pass through human body, the noise or the disturbances that interrups,obstructs,or the limits that effect the performance and interference is less to wireless technologies because the data is largely contained /transmitted with help of human skin. The characteristics of intra body communication are superior to those of other radio-based network technologies. A Personal area network (PAN) is communication system that allows electronic devices to exchange digital information near the human body through short-range communication. The technologies suitable for establishing a pan…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    OSI And TCP/IP Model

    • 771 Words
    • 4 Pages

    In order for network devices and applications to communicate with each other, they must follow protocols and specific rules that are laid out by the Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) model. In order for data to travel from one device to another, seven layers were created for the OSI & TCP/IP model. These seven layers are a basic standard, utilized by most networks today and are based on the OSI. Even though the OSI model is standard and widely used, it does have some drawbacks.…

    • 771 Words
    • 4 Pages
    Improved Essays