StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Net-centric Computing and Information Systems - Essay Example

Cite this document
Summary
Starting from the very basics of introduction to the concept of a LAN (Local Area Network) itself the tutorial progresses to define how it evolves into a wireless paradigm and then get named as a Wireless LAN!…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Net-centric Computing and Information Systems
Read Text Preview

Extract of sample "Net-centric Computing and Information Systems"

Net-centric Computing and Information Systems Submitted to, Submitted By, of the Submitted on, [January 29th, 2012]TUTORIAL #1: WIRELESS LANA brief description of the tutorialThe tutorial about wireless LAN was comprehensive and interesting. Starting from the very basics of introduction to the concept of a LAN (Local Area Network) itself the tutorial progresses to define how it evolves into a wireless paradigm and then get named as a Wireless LAN! The technology of Wireless LAN is introduced as a comparatively newer technology in the world of networks and is universally recognized as 802.11 (Wi-Fi).

The protocol under discussion is said to have increased the connectivity paradigm by manifolds. The usability of the Wireless connectivity protocol is extensive and is therefore referred to as being situated at the ‘edge’ of the internet. While describing the structural details of the wireless networking protocol the tutorial also significantly addresses the issue of security vulnerability that is associated with the said protocol. Since the protocol is not guided or guarded by wires or fixed connections it is often said to have substantial susceptibility to noise and other unseen deflections.

Similarly, the protocol also does not ensure secure data transfer because since it is prone to interferences, then it can also be prone to unauthorized access to private information being passed over it. Another drawback associated with the Wireless LAN protocol is that despite all the technological advancements, the current data transfer rate over it is comparatively significantly lesser than that over the Local Area Network (LAN). Business Needs AddressedThe Wireless networking protocol 802.

11has revolutionized the concept of connectivity among individuals. Thus this has had amazing effects on the corporate world as well. The need of the hour for businesses that involved the need to get network connectivity anytime and at any place within a particular set up without the restriction of physically laden networking wires in the premises have been addressed with the emergence of this protocol. Run time connectivity within business environments is not possible via wi-fi enabled computing devices that can be secured by binding the identity of hardware logged on to the system by pre-registering their MAC addresses.

Evaluation of and Experiences with TutorialIt was interesting to realize the concept behind the much prevalent wireless internet connectivity that has become so very common the world over. It was an informative and interest capturing tutorial indeed.TUTORIAL #1: COMPUTER SECURITYA brief description of the tutorialThe tutorial studied addressed the most integral concepts of today’s world: ‘Computer Security’. Ever since the advent of the concept of connecting computing devices over a network the concept of computer security has risen.

Any unauthorized access to the computing machines is termed as a security breach and attempts have been made continuously for years in order to secure the computing de vices and to completely eliminate the prospective chances of any security breach. The tutorial skillfully describes the concept of computer security breach and tells how viruses, worms and Trojan horses are a threat to the security of the data and the computing systems themselves. It also gives detailed introduction to how ‘stealing passwords’, ‘ authentication failures’ and ‘social engineering’ are also potential threats to the security of a system.

Business Needs AddressedIt is evident that the tutorial that was under study specifically addressed business needs as data and computer security are the basic and foremost requirements of any business setup.Evaluation of and Experiences with TutorialThe tutorial is of a god level and strength as it provides substantial information about computer threats and also glances into their history thus incredibly increasing general knowledge about them. REFERENCES:Local Area Network Portal (2011) Introduction to IEEE 802.11. Retrieved from http://www2.rad.com/networks/infrastructure/lans/wirelintro.

htmRad (2011) Computer Security. Retrieved from http://www2.rad.com/networks/2005/computersecurity/main.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Net-centric Computing and Information Systems Essay - 1”, n.d.)
Net-centric Computing and Information Systems Essay - 1. Retrieved from https://studentshare.org/information-technology/1588278-net-centric-computing-and-information-systems
(Net-Centric Computing and Information Systems Essay - 1)
Net-Centric Computing and Information Systems Essay - 1. https://studentshare.org/information-technology/1588278-net-centric-computing-and-information-systems.
“Net-Centric Computing and Information Systems Essay - 1”, n.d. https://studentshare.org/information-technology/1588278-net-centric-computing-and-information-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Net-centric Computing and Information Systems

Net-Centric Computing

net-centric computing Name: Institution: Abstract net-centric computing is the computing on a platform based on a distributed environment, which combines the, principles of communication and networking.... net-centric computing is designed to achieve optimal performance of all the resources.... James Robertson, the founder of Step Two designs, a vendor neutral consultancy located in Australia has an article on 10 principles of effective information management (KM....
3 Pages (750 words) Essay

Computerized Information Systems in Healthcare

Computerized information systems in Healthcare Contents Introduction 2 Research Question 5 Literature Review 5 Hypotheses 8 Findings 8 Conclusion 10 Works Cited 14 Computerized information systems in Healthcare Introduction The computer has become an integral part of human life and younger people cannot even imagine a life without handheld and shouldered devices.... The use of information systems in several walks of life has made scientific development possible in human history....
13 Pages (3250 words) Research Paper

Information and Network Centric Operations

This book aims at the Network Centric Warfare concept; to explain how it embodies the characteristics of the information Age; to identify the challenges in transforming this concept into a real operational capability; and to suggest a prudent approach to meeting these challenges.... Stein are top thought-leaders in information Age innovation and published pioneering work in the application of New Science techniques to military problems and lectures internationally on the future of military forces....
13 Pages (3250 words) Essay

W4:Telecommunication and Distributed Connectivity Technology Systems

There are different kinds of distributed connectivity in systems, such as (a) distributed computing systems (b) distributed information systems or (c) distributed pervasive/embedded systems.... Distribution information systems work on the principle of provision of information services at many different locations rather than being confined to a single location.... Telecommunications Distributed systems represent a further development in telecommunications, whereby the various connections within a telecommunications system are distributed out into a network (www....
5 Pages (1250 words) Essay

Impact of Mobile Computing in Information Management

information management is a crucial part in the performance of any organization.... information is viewed as an asset in the current times as it helps organizations… Mobile computing is done using small size portable computers and other small wearable devices through wireless networks by nomadic and obile users (Goswami, 2013).... he purpose of the report is to evaluate the impact of mobile computing in information management and also the importance of information management in the modern world....
6 Pages (1500 words) Coursework

How Can Small Businesses Practically Benefit from Cloud Computing

Cloud computing systems can provide smaller companies the same level of software as large companies at lower costs.... Cloud computing systems have better security systems and are better at managing and processing data.... The cloud service provider can retain and use information about the business and is not held responsible for data security.... This paper, How Can Small Businesses Practically Benefit from Cloud computing, declares that the advent of cloud computing has taken the IT world by storm....
17 Pages (4250 words) Research Paper

Enabling Technologies and Technological Innovations Used to Construct Cloud-Computing Solutions

The prerequisite of hardware clustering is the fact that component systems have almost identical hardware and operating system.... Grid computing involves systems that are loosely coupled and distributed than clustering.... This is not possible with the cluster computing systems (WhatIsCloud.... At the moment, the data centres appear as specialised IT infrastructure where centralised IT resources are housed including the servers, databases and software systems (WhatIsCloud....
8 Pages (2000 words) Assignment

Mobile Computing and its Business Implications

Believe it or not, inside a matter of the multi-week, the New York Times and Money Road Diary joined Bloomberg in sharing stories and information about Apple's alleged thing.... This essay is about the "Mobile computing and it's Business Implications".... Keeping awake with the most recent is a test on a very basic level because of the quick pace of progress in this reasonably adolescent space and the various systems that unique vendors take to making value....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us