Free Essay

My Own Creation

In:

Submitted By gokulmanoj
Words 6344
Pages 26
Gokul Manoj
B.com Finance 3 rd semester
Submitted to,
Santhosh Thannikatt,
Department of Commerce,Naipunnya Institute of Management and Information Technology

Submission date : 15thjuly 2015

By
Gokul Manoj
B.com Finance 3 rd semester
Submitted to,
Santhosh Thannikatt,
Department of Commerce,Naipunnya Institute of Management and Information Technology

Submission date : 15thjuly 2015

By
Wireless communication
Wireless communication

Wireless technology exists to enhance the human sensory feelings to give people the opportunity to be heard, to listen and be educated, to recognize and be recognized. It is a type of technology that allows you to express yourself anywhere, anytime toward achieving a greater level of communication. The objective in this paper is to become familiar with the concept of wireless technology. Various topics are covered to include Wireless history, standards, basic principles, regulatory change, and global implications.
There was a time when you could easily count all the men in the country who even pretended to know anything about wireless. No one of the few who were working with wireless then, knew whether a set carefully put together would work at all or how far the signals could be heard. Transmissions of a hundred miles or more were hailed as remarkable. Present-day radio listeners are quite prone to think of radio as nothing more than telephonic broadcasting. But before the wireless telephone, came tremendous amounts of hard, sometimes discouraging, but always fascinating and essentially romantic work. Wireless first startled the world’s fair in 1904. At that time there was, of course, no radio public, and the range of wireless was only a few miles. The sending and receiving instruments were unbelievably crude, resembling in no way the marvels of today. Messages were sent at the snail-like pace of a few words per minute, in the dots, spaces, and dashes of the Morse code, instead of the International code that is now generally used. Sending music or talking by wireless was then undreamed of. There were many mountainous obstacles to meet and conquer before we even had the vision of a wireless telephone, which was the forerunner of radio.
Wireless services represent a progression of technology, and perhaps a new era of telecommunications, but these services have been used for over a century and remain synonymous with "rad

Wireless technology progressed as an invaluable tool used by the U.S. Military during WWII when the Army began sending battle plans over enemy lines and when Navy ships instructed their fleets from shore to shore. Wireless proved so valuable as a secure communications medium many businesses and schools thought it could expand their computing arena by expanding their wired local area networks (LAN) using wireless LANs. The first wireless LAN came together in 1971 when networking technologies met radio communications at the University of Hawaii as a research project called ALOHNET. The bi-directional star topology of the system included seven computers deployed over four islands to communicate with the central computer on the Oahu Island without using phone lines. And so, wireless technology, as we know it, began its journey into every house, classroom, and business around the world. * Digital wireless and cellular communications can trace its roots to a series of discoveries and innovation in the mid to late 1940’s. Though, the argument could be made that its roots reach as far back as the original discovery on February 22,1880 by Alexander Graham Bell and his cousin Charles Bell when they communicated over the Photophone. This device transmitted voice over a light beam. A person's voice projected through a glass test tube toward a thin mirror which acted as a transmitter. Acoustical vibrations caused by the voice produced like or sympathetic vibrations in the mirror. From the time of Graham Bell’s discoveries on through the nineteen thirties, various technological breakthroughs continued to build the foundation for what would later become the wireless network. In 1935, Edwin Howard Armstrong unveiled his invention, Frequency Modulation (FM) to improve radio broadcasting. Because of the urgency for battlefield communications that were spawned from World War II, companies like AT&T (Bell Labs), Motorola and General El * ectric focused on refining mobile and portable communications. * 1947 marked the largest effort to date to create a true cellular wireless infrastructure as AT&T engineers scattered multiple low-power transmitters throughout a metropolitan area and actually began “handing off” radio calls from transmitter to transmitter. All of this was done from a vehicle while it moved throughout the area. From these early tests, it took almost another 20 years before the handoff was an efficient method of transferring calls along a route. It was also at that time that the FCC gave tentative approval for this new “cellular service.” In 1977, the FCC authorized two experimental licenses, one to AT&T in Chicago and another to Motorola and American Radio Telephone Service, Inc. in the Baltimore/Washington D.C. corridor. Shortly thereafter, in 1981 the FCC finally announced that there would be two licenses in every market; one for the “wireline” carriers and one for “non-wireline” carriers * Wireless communications are becoming increasingly popular in today’s fast paced world. Mobility, portability, and instant access (via the Internet) to unlimited information have become the mantra of businesses and individuals alike. The evolution of wireless communications has been incredibly quick and the future of this technology is unlimited. The impact of this technology on our lives will be tremendous and allow us to do things we never imagined. * The two main wireless services in use today are cellular and private packet radio. The service that is chosen will depend on the application(s) that a company or individual wants to run. * Cellular technology is commonplace in both the business and private sector. * There are two types of cellular technology: 1) circuit-switched cellular, and 2) Cellular Digital Packet Data (CDPD). One of circuit-switched cellular’s biggest advantages is its nationwide availability. Another advantage is the ability to send voice and data over the cellular phone network. Circuit-switched cellular is ideal if the application requires the exchange of long text messages, large files, or faxes because it typically charges by the minute of connect time, not by the number of bytes transferred. A practical application for this technology is the transfer of data from a laptop by means of a cellular modem and phone. The initial cost to outfit a laptop to connect to a cellular network is about $400. A disadvantage of this type of service is the long set-up time each connection requires (about 30 seconds). * Cellular Digital Packet Data is best suited for transaction processing and database queries. This service offers fast call setup (about 5 seconds), and is inexpensive for short messages, such as sending e-mail. The main disadvantages of CDPD are the expense of large file transfers, and the limited availability of the service (currently it is available in about 40 cities nationwide).
Private packet radio, though not as common as cellular, offers businesses widespread connectivity. The two major private packet radio providers in the U.S. are Ardis and RAM Mobile Data. These services can be connected to from virtually anywhere in the country. Private packet radio offers quick call setup and is well suited to communications that generate short, bursty messages, such as e-mail, database queries and point of sale applications. Since private package radio has been around for several years, there are many applications that use the network. Some of the commercial applications being used handle messaging, scheduling, electronic filing of expense reports, and even allow for insurance agents to process accident claim forms from a customer’s house or office (Salamone 96). The disadvantage with private packet radio, like CDPD, is that it is expensive for large file transfers.
The fundamental problem that wireless communications faces is that none of the major wireless data services is ideal for all applications. The stumbling blocks to widespread adoption of data connections for laptops and personal digital assistants (PDAs) include the lack of compatibility betwe * Wireless communication is defined as "electronic products and systems that interact by using electromagnetic energy, to carry information between them, so they can communicate with each other." (Wireless Technology Advisor). Everywhere we look, the wireless technology is being utilized. We have become a society that is highly dependent on wireless technologies. We use wireless communication to send information that is transmitted into the universe. The use of wireless communications over the years has grown and the technology advancing at a rapid pace. This paper will discuss various forms of this technology and its history. * The advent of the first form of wireless technology began many years ago. Below you will find a short timeline on the history of wireless technology: * Digital spread spectrum radios, developed in the 1960s and 1970s, fostered the development of today's wireless local area networks (WLANs). * In the 1980's through the early 1990's, based on a partnership between Motorola and IBM, narrow band ultra high frequency (UHF) was utilized, yielding the first commercially available radios for wireless bar-coding this is also known as cellular digital packet data, familiar to the many who use cell phones. * In the early 1990's the Federal Communications Commission created the industrial scientific medical band by opening to the public the wireless spectrum. * In 1993, the use of wireless in the healthcare environment made its debut. * In the late 1990s the Institute of Electrical and Electronics Engineers (IEEE) ratified the important WLAN standard which regulated the speed in which data was transmitted the turning point for wireless device use and for interoperability as we know it today. (AHIMA.org).
Wireless technology allows people to communicate to anyone in the world via the use of various devices. It allows us to remain connected and our lives more convenient. This Wireless Communications has become a major part of our everyday lifestyle. It has been embedded into our daily routines. We use it at work or at home, for fun or for necessity. The world has seen many benefits from this technology in the last couple of decades. Today I would like to discuss where this segment of telecommunication has evolved from, the pros and cons of the technology, and how it will continue to play an important role in our lives.
As far back as time can be recalled man has always had the need to share information with others over long distances. Tele-communications was taking place way before electricity and magnetism was even acknowledged. For example ancient tribes used drums to signal oncoming danger and communicate with one another. Indians used smoke signals from fires as a medium for communication. The press and the US postal service were also methods commonly used to help people communicate and share news.
The telegraph, which was invented in 1837, played a major role in the advancement of telecommunications, (communication that takes place by electrical or electromagnetic means). For the first time ever people were able to communicate and send messages across the US without having to worry about limitations set by great distances. The telephone, which was invented by Alexander Graham Bell in 1876, also helps to pave the way towards a brighter future in telecommunications. Now people were able to have their voice transmitted over a pair of wires over long distances. This enabled two remote individuals to interact w/ one another without distance being a factor.
We have come a long way since smoke signals and beating drums. Nowadays there is a wide range of implementations of Wireless technology. These communication peripherals render a convenience for those who have to interact and keep in touch with the rest of the world throughout the course of the day. Busy businessmen can now cl * technology is used in laptops, rem * Cellphones In Third World Nations
We will now talk about the marketing techniques of Cable & Wireless, Digicel, and AT&T, but before we do that we will give you a brief overview of the interconnect war.In modern telecommunication AT&T and Digicel are considered "cherry pickers". ... We will now talk about the marketing techniques of Cable & Wireless, Digicel, and AT&T, but before we do that we will give you a brief overview of the interconnect war.
In modern telecommunication AT&T and Digicel are considered ‘cherry pickers’. They are after a very attractive segment of the business, in short the cellular phone market. This is a market, which Cable & Wireless have created locally setting up an expensive network of required technical infrastructure. Therefore, it is understandable that Cable & Wireless would not want to enter into an interconnection agreement that may work to its disadvantage.
Digicel, the Irish-based Company, appears to be ready to assert its position as the new kid on the block, eager to compete in the new business environment. The other newcomer, AT&T, is actually already a household name around the world, thanks to cultural penetration from American satellite TV. While AT&T packs the clout to pursue a more vigorous, if not forceful public campaign for the interconnection with Cable & Wireless, it is instead “entering our domain with the kind of care and caution that bespeaks respect for our cultural sensibilities…,” according to an article in The Weekend Voice featuring AT&T Wireless Roving General Manager for the Caribbean, Nichole Bereaux. But Bereaux to feels that an interconnection agreement is long overdue. She told RSL’s Dave Samuels two weeks ago that AT&T would have liked to get an interconnection agreement.
AT&T appears to be as disappointed as Digicel; only Digicel has a much different approach to this issue.
Digicel seems to be determined to make Cable & Wireless answer to its commitment to competition in the court of public opinion. As Digicel sees it, the ultimate test of Cable &Wireless’ commitment is the ability of a Digicel customer to call a Cable & Wireless customer. And the sooner that happens, the better. CEO of * This is a market, which Cable & Wireless have created locally setting up an exp... * Digicel, Donal O’Shaughnessy, said at a TV interview that his company had invited the National Telecommunications Regulatory Commission (NTRC) to intervene in what he claims is stalling tactics by Cable &Wireless on an interconnection agreement. The interesting thing is that Cable & Wireless is claiming the opposite.
Since we are talking about Digicel let’s talk about their marketing techniques. For starters there call rates have fallen dramatically since they first started. It used to cost over five dollars to make an international call, now on weekends its ninety-five cents. 11. Wireless Security (LANLock Design)
Design of LAN-Lock,A System for Securing Wireless NetworksThis article talked about the design of a secure wireless network. ... The KG authenticates the wireless host, wraps the key based on the certificate ID, and issues a "wrappedaE key to the host based on certain rights the user has. ... Encryption of information going out over the ... * They also felt keeping their market share a secret wa * A System for Securing Wireless Networks * This article talked about the design of a secure wireless network. The designers wanted to create a wireless network that: ran under Windows 95 or NT, is compatible with the Raylink WLAN product, uses Fortezza cryptographic PCMCIA cards, provides communication between wireless hosts using Fortezza cards and wired hosts not using Fortezza cards, compatible with all Windows applications, transparent, and have minimal impact on communication performance. * To design this system the group had to determine which level they were going to use to encrypt and decrypt packets. The group decided to use the LSP (Layered Service Provide) level. They did not use the data link level because it would have had to modify the WLAN interface driver on the interface card of all users and when drivers were updated they would have to be modified for everyone. They decided not to use the IP or TCP levels because they did not have access to the protocol source code used by Microsoft. The LSP level is below the WinSock-- an application programming interface that lets a Windows program send data over any network transport protocol-- and above the transport layer. The LSP was developed by Intel to provide a way in which third party vendors could insert new capabilities into the protocol stack without altering applications or the network kernel. This level provided the transparency needed with the least amount of maintenance.
The LAN-Lock system uses Fortezza cards to hold and use keys for authentication. The Fortezza cards must be activated using a GUI. Users enter a username and PIN into the GUI. The Fortezza cards then use the unique x.509 certificates to request keys from the Key Generator (KG). The KG authenticates the wireless host, wraps the key based on the certificate ID, and issues a “wrapped” key to the host based on certain rights the user ha2. An overview of Wireless Networks WLAN
Reliability, security and productivityaE"the same requirements that led users to adopt LANs more than 20 years agoaE"are compelling them to use wireless LAN (WLAN) technology today (Trapeze).Another reason why WLAN is attractive is that today's standards-based wireless LANs operate at high speeds. ... While HomeRF is designed exclusively for the home ... * An overview of Wireless Networks WLAN
The purpose of this paper is to present the reader with a brief description of the requirements for a combined wired and wireless network, the importance of the capacity of a wireless network, and to solidify the authors knowledge in the area of telecommunication gained in the last four weeks. The paper includes an overview of wireless network and general terminology needed to understand the issues. The topic of the paper has been substituted from the original topic: Describe the LAN of your company. The paper is the result of a study of several white papers retrieved from the World Wide Web.
In recent years there has been increasing interest shown in wireless technologies for subscriber access, as an alternative to traditional twisted-pair local loop. A logical question is why this increase interest? Tom Fout in his paper titled Wireless LAN Technologies and Windows XP reports that the availability of wireless networking and wireless LANs can extend the freedom of a network user, solve various problems associated with hard-wired networks and even reduce network deployment costs in some cases.
Why a Wireless LAN? Fout elaborates that high-speed wireless LANs can provide the benefits of network connectivity without the restrictions of being tied to a location or tethered by wires. Wireless connections can extend or replace a wired infrastructure in situations where it is costly or prohibitive to lay cables. Temporary installations represent one example of when a wireless network might make sense or even be required. Some types of buildings or building codes may prohibit the use of wiring, making wireless networking an important alternative. Reliability, security and productivity ”the same requirements that led users to adopt LANs more than 20 years ago ”are compelling them to use wireless LAN (WLAN) technology today (Trapeze).
Another reason why WLAN is attractive is that today's standards-based wireless LANs operate at high speeds. The access the user has is typically more than 11 MBs or about 30 to 100 times faster than standard dial up or wireless WAN technologies. This bandwidth is certainly adequate to deliver a great user experience for a number of applications or services via the PC or mobile device. In addition, ongoing advancements with these wireless standards continue to increase bandwidth, with speeds of 22 MB.
There are currently two prevalent wireless LAN technologies being deployed. These technologies are the IEEE 802.11standards, primarily 802.11b and 802.11a, and the technology proposed by the HomeRF working group. These technologies are not interoperable with each other or with other wireless LAN solutions. While HomeRF is designed exclusively for the home environment, 802.11b is designed and is being deployed in homes, small and medium businesses, and large enterprises and in a growing number of public wireless networking hot spots. Several major laptop vendors are shipping or have plans to ship laptops with internal 802.11b NICs.
Designing for wireless network requires new considerations than designing for wired network. An important factor is the tradeoff between radio-frequency (RF) coverage and capacity. Planning for both capacity and coverage is one of the key design issues for wireless LANs. WLANs use radio-frequency signals to communicate from a PC to an access point. This makes standards particularly important, since they reduce the risk that WLANs will interfere with or be affected by adjacent radio spectrum employed by public safety, military and commercial users (Trapeze). Another factor that plays in the design of wireless networks is the user expectations. Users expect applications to be as responsive on the WLAN as on a switched Ethernet network and to gain added benefits of wireless, such as mobility. Applications demands of an enterprise network make bandwidth capacity an important design requirement.
A white paper written by Trapeze Networks: Capacity is Critical “ Designing Enterprise Wireless LAN for Capacity vs. Coverage, emphasizes that designing for capacity rather than coverage is critical to delivering enterprise-quality throughput. The authors assured that designing for optimal capacity, complete coverage would follow automatically. Before elaborating further on this subject I would like to elaborate on the real throughput in a wireless network.
The white paper aforementioned, Capacity is Critical, describes that IEEE 802.11 systems are time-division duplexed: the upstream and downstream communications use the same frequency over the air and thus cannot occur simultaneously. The throughput on a wireless system is reduced due to the overhead from the media-access control method in 802.11 networks, called carrier sense multiple access with a collision avoidance (CSMA/CA). If the media is busy, it waits a random amount of time before it resends. In addition, even if the media is believed to be clear, a collision may occur because not all clients can hear all other clients. These collisions cause additional throughput decline. 802.11a devices have other sources of inefficiency, including orthogonal frequency division multiplexing (OFDM) modulation, since only 48 of the 64 tones are used for data. The rest are used for protocol overhead and signal protection. Error-correction coding adds further overhead.
Coverage is another design issues of a wireless network, the data rate is a function of distance, and the further a user is form the AP, the weaker the signal and the lower the data rate. Therefore, designing smaller cells with higher throughput, one can create an enterprise-quality experience. The number of users and their applications, which are the major drivers of bandwidth, dictates cells sizes. Walls and other objects will not naturally define cells.
Another important issue involve in the design of a WLAN is the impact of user's applications on radio activity. Radio activity occurs when data is being transmitted and received by the user. For example, reading a web page entails no radio activity; however, a large enterprise resource planning or customer relationship management application has much more interaction between the clients and servers and will cause much more radio activity than office applications such as e-mail.
A white paper written by Extreme Networks, explains that for organizations with wired networks well established, a wireless and wired networks can be deployed and managed properly together in a unified access model. A unified architecture supports both networks in a single node, using access switch. Access switches are Layer 2/Layer 3/WLAN switches that support existing wired and wireless applications, and are upgradeable to support emerging mobile applications. Access switches provide extensive encryption and security services, such as 802.11i-based Advanced Encryption Standard, Wired Equivalent Privacy, Temporal Key Integration Protocol, and Wi-Fi Protected Access, to wireless ports.
According to this article, the benefits for this approach can be summarized as follows. The security of the unified access model is as tight or tighter than the security of wired networks: an IT manager can "secure the air  in the same way that a physical port can be secured. With more flexible authentication and encryption services available, rigid tunneling approaches such as Virtual Private Networks (VPN) are no longer necessary. A unified architecture could support policies that manage based on user, time or location. For example, wireless ports may be disabled in the evenings, and the cafeteria may allow Internet access for employees and guests. There is no need for dedicated RF probes to monitor a large campus environment. 24x7 operation can be maintained with end-to-end reliability. Software and configuration are available with fallback capabilities in case a configuration becomes corrupted. Mobility is provided in several forms: persistence within the same cell, within a subnet, and between subnets.
In closing, the material researched helped me to understand material covered in class, I found the relevance to many of the discussion questions (DQ). Many of the white papers read elaborated on topics discussed in the DQ like the importance of bandwidth, 2.4 GHz interference, and standards. A point that caught my attention after researching for my team paper was the proliferation of wireless technologies, and the question how can one incorporates this raising technologies into a well established wired network prompt me to look for an answer. A solution to this dilemma could be to integrate both a wired and wireless networks into a unified access model. Allowing for a system that could be easy to manage, scales well, and has the benefic of the reliability and flexibility of the wired LAN already in place.

References:
Network World online magazine white paper: "The Next Generation of LAN Access: Addressing the Requirements of Mobile Networking , retrieved from the World Wide Web at http://www.nwfusion.com/whitepapers/extreme/
Tom Fout, "Wireless LAN Technologies and Windows XP , retrieved from the World Wide Web at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/winxppro/evaluate/wrlsxp.asp

Trapeze Network online white paper: "Capacity is Critical: Designing Enterprise Wireless LANs for Capacity vs. Coverage , retrieved from the World Wide Web at http://www.trapezenetworks.com/tech/tech_cvc.htmls. Only the Fortez
7. Wireless Network Technology
Many companies, such as Bluetooth Technology, are expanding our networking capabilities to wireless. Wireless networking has its pros and cons, which will be discussed.Why go wireless? Someone may ask what the purpose of adapting and changing to wireless networking is necessary. ... Wireless networking would eliminate all the wasted spending as well as the h...
Networking computers greatly benefits computer users. Networking enables sharing, sending, and receiving information. Whether you are hooked up to a local area network (LAN) or a wide area network (WAN), hooked up to a intranet or the internet, networking is one of today’s most essential products of technology. Many companies, such as Bluetooth Technology, are expanding our networking capabilities to wireless. Wireless networking has its pros and cons, which will be discussed.
Why go wireless? Someone may ask what the purpose of adapting and changing to wireless networking is necessary. To start with, it’s simply easier. It is hassle free. Can’t you imagine yourself lying at the beach with your laptop while surfing the net?
Money would also be saved in the long run. For a simple home network, the current wiring may not sound so complicated. After all, what’s the big deal about connecting a few computers to a hub? However, schools, companies, buildings, and anything other than a small home network would greatly save money. I walk down the halls of the dormitory or in my school building, and I see wires everywhere - some places they’re hidden better than others. The point is that there are hundreds and maybe, in some cases, thousands of computers hooked up by all types of networks. Can you imagine the cost of installation of those networks? The hardware that it takes to maintain these networks are a fortune. After some time wires need to be changed, and that too is very costly. Wireless networking would eliminate all the wasted spending as well as the hassle.
Another benefit of wireless networking is that its configurations are easily changed and range from peer-to-peer networks suitable for a small number of users, to full infrastructure networks of thousands of users that enable roaming over a broad area.
The subject of wireless networking is a very broad subject, and therefore without g
The purpose of this report is to analyse the current John Paul College network with the objective of improving the system. The report will contain information regarding the present system in place covering the advantages and disadvantages of the network. It will also address the changes that will be implemented to enhance the current network.
The John Paul College network is almost completely wireless. Exceptions to this include staff, desktop computers in the primary school and senior school, all being connected by CAT5 cable. The wireless network reaches all parts of the college campus from the Coleman Centre to Sick Bay to the JPIC. (Refer to Appendix A)
The current data transfer rate present throughout the campus is 11Mbps (MegaBits Per Second). A typical installation would have a wireless access point connected to a classroom network point, usually mounted upon a wall near the roof of the room. Currently the school employs two types of wireless connections points, one for 64 persons and more recently, 128 person wireless access points. Each portable computer that wishes to connect to the college network has to have a wireless card, usually in the PCMCIA (Personal Computer Memory Card International Association) slot.
At the moment the hierarchical structure of the school involves five servers, each handling a different aspect of the network from mail to file storage. Recently the school purchased a SAN (Storage Area Network) increasing the storage capacity of the school to just over 1.5 terabytes. Connected to the servers are switches, which transfer the information to the appropriate wireless connection points. The wireless connection points distribute the signal to all the individual nodes. At present the school has over 50 wireless connection points and over 30 switches. The network at the school can accommodate for over 1100 students with 1400 students having access to the network. The software the network runs under
Networking is one of the most significant steps in the electronic evolution since the invention of the PC. A computer network is a group of connected computers that allow the sharing of information and peripherals. The most basic network is made up of two computers connected by some kind of cable in order to exchange information more quickly and efficiently. A standalone computer is very useful to many businesses, but without a network, those businesses would have to spend twice the amount of money on computerization than they would have to by implementing a network.
A network allows many computers to share peripheral devices such as printers and facsimile machines. The two primary benefits of computer networks are sharing of devices and data. There are two basic types of networks: peer-to-peer and server-based. On a peer-to-peer network, any computer can act as a server to share resources with other machines and as a client to access these resources. On the other hand, server-based networks require a server computer whose job is to respond to requests for services or resources from clients elsewhere on the network. Server-based networks are used in most organizations today. There is an advantage to server-based networks such that it centralizes user accounts and eases maintenance with less need for administration. There are some disadvantages as well. Two of the largest and most common disadvantages are server failure and initial start up cost. When the server fails, the whole system is considered useless until the server is fixed. Servers can also be very expensive, ranging from $5000.00 to $150,000.00. Also, in order to cut down on server failure, special-purpose server software, hardware and expert staff is required. This will increase cost, but in the long run networks have proven to be very profitable by cutting down on day-to-day office expenditures.
Networks play an extremely important role in today's business, school, and home communications needs. Designed for communication, networks allow data transfer between two or more computers over long distances. Installing a network in a home, school or business would be a vital move because it will allow a user to transfer information via the network instead of being physically transferred. In turn allocating more useful time for other important factors in the days assigned task. Knowing which network to install is essentially the most important factor when making the transition to a communication based network. Several different types of networks exist in technology today but the three major types of networks are LANS, MANS, and WANS.

LANS (Local Area Network) would be considered the smallest of the three and its primary use would be for home, school, and businesses. LANS, being the basic building block of any computer network, can range from two computers being connected by a cable to the complexity of hundreds of connected computers and peripherals throughout a major corporation. Local Area Networks provides organizations with abilities essential for today's business needs. For example, a LAN gives access to important data bases that host email, printer, mass storage servers and other important aspects needed in today's growing industry. The distinguishing feature of a LAN would be its confinement to a limited geographic area and its size. Primarily used in single buildings due to limited size and structure, Local Area Networks would not be your answer for all networking needs due to deprivation of signal over long distances.

MANS (Metropolitan Area Network) would be consider the second largest network used. Metropolitan Area Networks would be considered the basic backbone of local area networks. Defined as a data network intended to serve an area the size of a large city, Metropolitan Area Networks are used to connect an unlimited amount of
LANS together to form one large network. Such networks are being implemented by innovative techniques, such as running optical fiber through subway tunnels and along telephone poles thus allowing businesses and schools to link their networks together over long distances. In other circumstances a Metropolitan Area Networks might not be essential to your communication requirements in turn making you proceed a step further in the networking topology.

WANS (Wide Area Networks), being the largest of all networks, defines as a geographically dispersed network created by linking various Metropolitan Area Networks and Local Area Networks over long distances, generally using leased phone lines or satellites. The most popular WAN in the world today is the Internet. Many smaller portions of the Internet, such as extranets, are also WANs. WANs differ from LAN and
MANS in several important ways. Like the Internet, most WANs are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs generally utilize different and much more expensive networking equipment than LANS or MANS also. When implementing a WAN one must obtain rights through the owner and its cost usually varies between $400 - $1000 dollars a month depending on speed and bandwidth used. A Wide Area Network, being a crucial tool for major corporations, allows companies to link their networks all throughout the world as one local network thus making communication and data transfer more adequate.
In essence, all networks have the same basic function. Their designed to link multiple computers together to form what someone could call a neighborhood of computers. The main characteristic that sets them apart is their size. Networking will always play a critical role in today's industry and educational needs. A necessity would be to know which network suits the demand of the business, home, or school.
With the right research and knowledge implementing a network would be an unproblematic obstacle to overcome.Before a server can be incorporated into a business, a net
Network theory can be traced back to Simmel (Aldrich and Kim, 2007), who develops a structural analytical approach to delineate the properties of small groups and social situations that affect behavior across a range of social contents. Network studies thrive across sociology, anthropology, political science, strategic and organizational studies, and entrepreneurship. In sociology, network theory seeks to understand social life through the patterns and process of social relations. A social relationship can be viewed as an opportunity for social interaction, a history of shared experience, and a means of need-satisfaction.
A social network is a collection of connected social relationships. If a set of relationships is connected in a regular way in the pursuit of common ends, so that a significant portion of actors' shared experience and memory stems from these activities, one speaks more precisely of a corporation or organization. Take “friends” as an example of network, the accommodation of personal interest as a form of collective ends is central to the existence and extension of the network.
One of the main characteristics that make the social network a distinct level of social structure above social relationships could be the enhancement of power, prestige, and opportunity that accrues to different positions within a social network. Moreover, scholars across various disciplines apply the concepts and frameworks of network to organizations, extending network theory to inter-organizational and intra-organizational levels of analysis.
Antecedents of social networks can be found in social psychology and anthropology (Borgatti et al., 2009). Network analysis in social science develops graphical, theoretic, and numeral/mathematical approaches for studying the intricacies of network structures (Moreno, 1934). The use of mathematically based models facilitates the representation of and understandings on the linkages among

Similar Documents

Premium Essay

Monologue For Frankenstein

...Frankenstein walks slowly though a cemetery with a torch light in his hands. He looks forth and sees Elizabeth and Clerval’s graves, a look of sickness fills his face. I wasn't sure I'd be able to face your graves. My regret very nearly kept me away. I didn’t think my work would kill. A problem solver I thought, like a loved one. I thought my creation would solve my problems, the loss of my mother. The one who loved, when love wasn’t seen to be needed. Frankenstein pauses in thought. My creation, a murderer. A murderer of innocent. I thought its species would one day bless me as it creator and source but instead it is now seeking hatred upon me. I wanted my creation to be new life a perfect species not a monster. I wanted others to see...

Words: 418 - Pages: 2

Premium Essay

What Is The Maternal Archetype In Frankenstein

...Indeed - whether implicitly or explicitly stated - every maternal character in her seminal work is conspicuously absent. The knowledge that Victor’s mother, Elizabeth, and Justine are all orphans implies the existence of a maternal absence in their lives. Where the three women once had a mother, they now have no one. Conversely, Victor’s mother (Caroline Frankenstein) is the only mother whose absence is explicitly stated in the novel: the beginning of the third chapter is dedicated to her untimely death. This explicit loss of a mother figure is perhaps most notable in Caroline’s request that Elizabeth “…supply my place to my younger children” (Shelley 44). The exchange between the true mother and the mere substitute serves as Shelley’s acknowledgement that a maternal role will soon be essentially unoccupied; a substitute mother does not satisfy the absence of an authentic...

Words: 1196 - Pages: 5

Premium Essay

Big Bang Theory Argument

...perfectly in sync, come from? The ongoing debate on the creation of the universe usually falls under two categories: religious belief and scientific theories. I, too, have come to develop an untamed curiosity about this subject. I believe that there is middle ground that can be found between religion and science. Denying the existence of a supreme being and being inconsiderate of the field of science is irrational. Followers of religion construct the largest population in the world in comparison to...

Words: 963 - Pages: 4

Premium Essay

Frankenstien

...the family the monster had been observing, it burned their house down. This is important because the monster felt that its place was in the ‘dark and scary forest’, it finally thought of itself as a monster that everyone else saw it as. Another example is when Frankenstein finds out that his brother has been murdered, the use of a gothic ‘scary’ setting is apparent. "I quitted my seat and walked on, although the darkness and storm increased every minute and the thunder burst with a terrific burst with a terrific crash over my head" (59). During this journey Frankenstein is very angry at his creation who he knows is to blame. Without the thunderstorm in the background, Frankenstein’s inner thoughts would not have been as easy to decipher. Being in the time period that Frankenstein was set also helped build the story. If Frankenstein had been a modern day novel, the impact of this terrifying monster would have given the reader a much lesser impact. Another use of gothic genre is Frankenstein’s irrational fear of his monster. Throughout the novel we see examples of Frankenstein’s fear of his own creation....

Words: 712 - Pages: 3

Premium Essay

Sacco And Vanzetti Analysis

...Dorothy: I totally agree humility is important in the creation of communion. Yet, I think communion can also be formed through the marginalized. I am sure both of you remember this, but an impactful event in my life was the execution of Italian Catholic Radicals, Sacco and Vanzetti. More than likely, these two men were innocent and this horrified myself and a lot of the country. Yet, Sacco’s and Vanzetti’s death symbolized a much bigger picture in the United States. They represented all the people who were influenced by injustices in the world. I remember how “all [of] the nation mourned. All the nation, that is, that is made up of the poor, the worker, the trade unionist- those who felt most keenly the sense of solidarity- that very sense...

Words: 1970 - Pages: 8

Premium Essay

How Does Victor Influence Frankenstein

...on to pursue the secret of life. His obsession with the project turns Victor from a healthy, happily family man to an obsessed sickly man who separates himself from my family. Mary Shelley portrays Victor as an unstable man, who was meddling with something unknown and dangerous. But she also portrayed him as somebody who was educated, and wanted to make a difference. He was interested in pursuing the boundaries of life and death.He felt as though if his experiment came out successful, that he could solve many of the world's problems. In the end Victor was not successful. Despite the fact that he infused life from death his intentions were not pure. “ A new species would bless me as its creator source, many happy and excellent natures would owe their being to me”.He allowed his personal needs and wants to interfere with the reason he started the project to begin with. Victor created the monster in hopes of glory and remembrance to contributing to scientific advancements. The story of Frankenstein can be described as a dichotomy. Victor could be described as a God in Frankenstein. He gives life to an immobile body, through the works of science. By taking this action he performed a power that only God himself possessed, and used it for his own purpose. Only to find out by using God's power he began to get his own stripped away in the process. The curiosity of Victor’s fascination with resurrecting the dead, caused the death of his loved ones. Victor’s pursuit of this project...

Words: 1444 - Pages: 6

Free Essay

Religion

...Create Your Own Religion “I created you and the world on which you live. I created the realm in which your world exists and it in my hand. I control that which you cannot stop or escape and under which all is bound. I am all knowing and understanding. I know that by nature you cannot achieve perfection and I do not hold that against you. I am your father Largesse and I love you.” These are the first words Largesse wrote to his devote followers the Pragmatics in the Tomes of Creation. Largesse is the sovering god of the Lucid religion. Worship of Goddess Durga is based on myths where Durga symbolizes the divine power. She is depicted as a large fat man who holds a sphere in his right hand and a scribe in his left. The sphere that he holds contains the universe in which we live. The scribe is used to write in her Tomes Of Creation “I give on to you twelve holy temples in which I have placed the vassal of my will, The Tomes Of Creation. To keep my Tomes free of human corruption I have made it so that only the scribe that I posses may write with in the Tomes. The temples are your sanctuaries while in them no harm will come to you. Use the locations of my twelve temples as the beginning of the twelve holy cities. All are free to come visit and read of the Tomes and I will damn all who attempt to stop my people from reading its truth for them self’s. ” After Largesse created man he gave them twelve great temples that he distributed about the earth as dwelling for his Tomes and...

Words: 1785 - Pages: 8

Premium Essay

Why Is Frankenstein Unethical

...A Modern Perspective on the Unethical Making of our own Monsters With the ongoing and advanced progress of scientific technology, we have the opportunity to create anything we want. However, in Mary Shelley's novel ‘Frankenstein’ and the Canadian Space Arm, we went beyond the boundaries of ethics, where we created objects which were incredulous, yet at the same time, they were monsters of our own making. Both creators were nothing less than admirable in their intentions. Nonetheless, in providing both creations with human- like names and features, they violated what I believe to be ethical limits, and as a result they ended up with unethical monsters. I do not believe that it is right to give inanimate objects human like features; when we...

Words: 1822 - Pages: 8

Free Essay

Victor Frankenstien

...Frankenstein is a flawed character by alienation. Instead of embracing his family, and allowing them to embrace him in his troubles, he alienates everyone - his father, his friend, Elizabeth, and his creation. He continues to try to run away, and by doing so, he forges the path to his failure. Had he accepted parental responsibility for his creation, the creation would not have sought vengeance. William, Justin, Elizabeth -- all of these characters might have been spared their fate. However, Victor abandons his family at every turn, and suffers for it. Shelley idealizes family in the same way she does nature. The deprived life could be interpreted as the ignorant life. The more knowledge that a person gains, the more complexity he/she also gains. The more wealth, the more responsibility; Victor is blessed with intelligence and education and wealth - and look what happens to him. After losing his mother he becomes obsessed with the idea of life. While in college a professor, sparks the idea of recreating life. Frankenstein becomes very consumed in the idea of bringing back life. “As he went on I felt as if my soul were grappling with a palpable enemy; one by one the various keys were touched which formed the mechanism of my being; chord after chord was sounded, and soon my mind was filled with one thought, one conception, one purpose.” He felt it was his purpose to go farther than any other scientist had ever gone before him. "A new species would bless me as its creator...

Words: 773 - Pages: 4

Premium Essay

Biblical Studies

...Worldview Carolyn Hopkins Liberty University Biblical Worldview The Bible, God’s word, gives mankind stories of creation and the history of the world. It is a guide book in which we are to lives our lives. Without God’s word we would not know how to gauge right and wrong. The Bible also identifies who we are and shows us that God created us from the love for us. What does Genesis 1-11 teach regarding the natural world? In Genesis, God describes man as good. This notion of creation being good is different than other worldwide mythologies, which begin life from chaos and violence (Bruckner, 2014). On the first day of creation God said “Let there be light” and there was light, He saw that the light was good (Genesis 1:3). Then God formed the earth in the midst of the waters on the second day and he saw that it was good. The third day God created the plants and saw that it was good. The fourth day He created the Sun. moon and stars, and it was good. On the fifth day He create the birds and the livestock, and it was good. Then finally on the sixth day, God created mankind, and it was good. Everything that God created in the beginning was good. What does Genesis 1-11 teach regarding human identity? On the sixth day God created man (Genesis 1:27). He created man in his own image and likeness and He saw what he made and said it was very good. Man’s creation in the beginning was very good. After Adam and Eve partook in the fruit from the tree of knowledge of good and evil their...

Words: 1026 - Pages: 5

Premium Essay

Bible Story

...Journal #1 Module 1 - Part 1 – Bible Story Worksheet For Part 1 of this assignment, you will complete this worksheet by reviewing the "The Story of the Bible" "flags" and fulfill each writing requirement. http://lc.gcumedia.com/zwebassets/courseMaterialPages/cwv101_biblical-timeline-v1.1.php Please keep your answers brief. Solid academic writing is expected. Refer to the GCU Academic Writing Guidelines in the Student Success Center. Briefly answer each section from "The Story of the Bible": ------------------------------------------------- Write 2-3 sentences explaining why the Creation account is so significant to the Christian worldview. ------------------------------------------------- The creation account is so important to the Christian worldview because it identifies in depth how man was created out of nothing. In addition the creation account signifies that God’s creation was made valuable. ------------------------------------------------- Write 2-3 sentences explaining what the Fall reveals about humanity and human morality. ------------------------------------------------- The Fall reveals that the fall of man had an impact on all humanity and that man did not live up to God’s expectations. The Fall relates to the human ethics as it signifies that God’s initial plan did not waver but required a deviation due to the choice man made. ------------------------------------------------- Write 2-3 sentences explaining the importance of God revealing...

Words: 1189 - Pages: 5

Premium Essay

Theodicy

...Theodicy A theodicy is simply a justification of God’s ways. Theists are generally compelled to express a theodicy in response to the unfortunate, painful, evil events and circumstances found in our world. A theodicy is necessary only if we believe in a God who is inherently good, thus requiring an explanation of the apparent discontinuity between a good God and evil in the world. In order to express my own theodicy, I will discuss the forms of evil in the world and their various manifestations as well as whether or not creation as a whole is a “good” expression of the creator God. I will also discuss how eschatology affects our view of evil and God’s part in allowing or interfering with evil. Finally, I will discuss which theodicy I find most complete and why, as well as some of the strengths and weaknesses of my own theodicy. Evil in the World Expressing a theodicy requires a basic understanding of evil which can be referred to in light of that expression. The problem of evil has been dealt with in three separate classifications during our class time and reading; moral, natural and gratuitous evil. Moral evil is an evil event or circumstance caused by a human. Examples of moral evil would be murder, lying, stealing and greed. Moral evil results as the consequence of the decisions made by human beings exerting their free will. War, oppression and slavery are prime examples of moral evil perpetrated by human beings. Natural evil includes the pain and suffering resulting...

Words: 1951 - Pages: 8

Free Essay

Frankenstein Loss

...Frankenstein Notes ------------------------------------------------- Some Interesting Points * There is a chilling logic in the creature's arguments. Why should he not respond in kind to the way that he has been treated by both his maker, who should have cared for him and looked after him, and by mankind as a whole? If the creature is inhuman, it is only because he is imitating the inhumanity of the human species. Therefore, I think that the novel presents Victor as being more inhuman. * Victor is alien in his society in the way that he removes himself from others, for example when he goes about creating the daemon/creation. Victor is very secretive and seems to like it that way... he doesn't really try to understand people like the creation does. The creation tries again and again to belong in the community, its his greatest desire. With Victor, on the other hand, there seems to be a gulf between him and the rest of society. * Justine’s trial testifies to the inhumanity of man. What is important to note is the way this links in to a vital theme of the novel, which is the presentation of the creature himself. He starts off innocent and wanting a relationship with his maker. It is the way that he is shunned by his maker and by humanity and treated cruelly that forces him into cruelty, but this cruelty is only paralleled by the monstrous nature of humanity as displayed in incidents such as the trial of Justine. We cannot expect the creature to be good when...

Words: 5247 - Pages: 21

Premium Essay

G'Day

...Year 10 English - 2015 Alternate Realities – Task 2 Task: Create a narrative style response that delves into some of the big ideas you have encountered in the texts during our study of the Context ‘Alternate Realities’. You must draw on ideas from at least one text that was explored together in class. Possible forms: * a short story or reflection, * a series of diary entries or letters, * a personal article for a newspaper or magazine, * a memoir Prompts: You will need to respond to the concepts in one of the following prompts: 1. The world we see around us is shaped by our society. 2. Memories from our societal past can influence our reality 3. Relationships with others and our resulting emotions can shape our view of the world. 4. Conflict arises with different views of the world. 5. Reality can never be totally manipulated. 6. A new understanding of reality can change everything. Word limit: 600+ (not including the Statement of Intention) Statement of Intention: Before writing, you will need to complete a Statement of Intention. This will be submitted along with your final piece. **See mystpauls to access the template for the Statement of Intention. Assessment Criteria for Year 10 Context Task 2 Criteria | 5 | 4 | 3 | 2 | 1 | Planning and drafting process. | Well planned with careful attention to structural features. Thoroughly proof-read. | Effectively planned with clear attention to...

Words: 1147 - Pages: 5

Premium Essay

Theo 104 Reflection Paper 2

...Paper 2 I. Introduction For my second reflection paper, similar to my first, I am choosing two topics in which can somewhat go hand in hand with each other. The two topics I am choosing are: Creation and the Fall of Man. In today’s primarily secular culture, the teachings of creation and the fall of man are topics that are too commonly misrepresented and misunderstood amongst many. Both creation and the fall of man are fundamental foundations to establishing a Christian biblical worldview. In two separate sections, I will present creation and the fall of man, while going in-depth into the theological definitions, biblical foundations, and practical applications for both. I will tackle these topics in the order in which they happened, and discuss how this relates to myself and how this class has helped me to get to this point of a better understanding of the scriptures teachings. II. Part One – Creation a. Theological Definition The ideology of creation preaches that the one true God created ex nihilo, or out of nothing, the universe and everything within it. God created the “heavens, the earth, the fish, the various kinds of species of animals, and man as the crown of His creation” (Townes, Origin). This doctrine claims that there was nothing before His creation; no time, substance, space, energy, beings, area or etc. God’s existence alone stood before creation and is solely responsible for everything there is and continues to be. Creation is continuous, it does not just...

Words: 1410 - Pages: 6