Thursday, June 13, 2019

Strengths and Weaknesses of Wireless Networking Essay

Strengths and Weaknesses of Wireless Networking - Essay ExampleComputer is a wonderful machine which is employ in all field of life to perform different kind of tasks. At the present, almost all the organizations use electronic computers to perform their business operations and daily tasks. When the number of users increases they excessively need to increase number of computers. In many cases, organizations need to process a large amount of data entered by different users simultaneously. In this scenario, the execution of instrument of a web becomes essential. A meshwork is a set of computers connected with each other to share data and other resources (i.e. peripherals like printer). In addition, numerous tools and techniques are available to establish a network. These days the trend of wireless networking is emerging quickly. In a wireless network, computers are connected without using wires (through carriage or waves) (Nash, 2000 Turban et al., 2005). This paper presents a detailed analysis of wireless networking technology. This research will outline advantages and disadvantages of wireless networking. Computer Networks An Overview The importance of computer networks is increase day-by-day. At the present, there are a large number of modern network technologies available which offer an excellent support for businesses as well as individuals to communicate and collaborate with each other. Like other technologies computers networks are also classified into different categories. Normally, we classify them on the basis of geographical area. Different classes of computer networks are outlined below Local Area Networks (LANs) This category of networks is very commonly used in our business and corporate areas. Usually, the local area network (LAN) is small and limited areas network that offer a greater capability to share resource and information on the network. LAN (local area network) is a typecast of network which is established for short geographical distance. This distance could be between homes or offices. Normally, this capacity is usable for short distance users (Mitchell, 2012). Wide area networks brainsick is considerably bigger as compared to LAN. This technology based network system makes use of small LAN network to build a large network. This network is used by some large organizations, universities or multinational corporations. Usually wide area networks (WANs) are used to connected computers located in nonadjacent locations. These locations can be among cities, states, countries or among far geographical locations. In addition, this kind of network is established using internet (Mitchell, 2012). Network Designs The network technology varies in a number of ways. The implementation of a network heavily depends on its image. For this purpose, we have different network topologies, which can be used to design a network. The basic purpose of this design is to shown how systems will work and interact in physical arrangem ents. However, they are based on two major designs. One design is known as client server design while other is known as peer to peer design. Peer to peer design is the handed-down telephone lines with dedicated links and communication arrangements. It is a network architecture, in which computers on the network have equal status and no one has chink over others. Additionally, in such kind of network arrangement, each computer is called peer and each peer can act as both a server and client simultaneously. In simple words, in peer-to-peer network, none of the computers can have control over other computers. In addition, a any computer in a network can share devices (i.e. printer) or resources of other computers. For example, a printer connected with a computer can be used by other computers connected in a network. Figure 1Peer-to-Peer Network, Image Source http//www.doubleeagleservicesinc.com/images/graphics/peertopeer.gif On the other hand, client-server is a network design intri gue in which one of more computers act as servers and remaining act as client computers. In this

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.