Thursday, September 26, 2019

Case #5 Essay Example | Topics and Well Written Essays - 2000 words

Case #5 - Essay Example This entails a thorough scrutiny of the subject of interconnection of computers, which facilitates flow of computer data from point to another via a well-designed set of network protocols. A significant set of sub topics have been considered for this agenda. This is to ascertain that they add great value to the final objective of this training session, which is to enhance employee knowledge of key notions behind data communication (Banzal 18). The top sub topic is definition of computer networks. In simple terms, computer networks refer to the interconnection of computers over the internet to facilitate sharing of data from one computer to another. Computer networks are of great importance to an organization in that they play a huge role in ensuring that there is a quality information-sharing platform among staff members. The second sub topic is data communication, which entails electronic transmission of computer data from one point (source) to another (destination). In essence, data communication acts as the building to enhancing the quality of the day-to-day business operations of an organization (Banzal 102). Thirdly, it is on the subject of importance of computer networks. As stipulated earlier, computer networks are of great importance to the operations of an organization. This is because they play a very important role in the delivery of fast, accurate and secure sharing of organizational data amongst the staff members. Consequently, it creates a quality platform for coming up and sharing of sound business decisions. Types of computer networks is the fourth sub topic. To be exact, there are many types of computer network in use in most successful organizations. These include the LAN, WAN, MAN, WLAN, SAN, PAN and VPN. LAN stands for Local Area Network, WAN IS Wide Area Network, MAN is Metropolitan Area Network, WLAN is Wireless Local Area Network, SAN is Storage Area Network while VPN refers to a Virtual Private

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.