Search Our Essay Database

Computer Network Essays and Research Papers

Instructions for Computer Network College Essay Examples

Essay Instructions: I WOULD LIKE INFOCEO FOR THIS ORDER.
The case for this module intends to ensure that you can: (a) describe the general structure of a computer network, (b) present some typical procedures for securing and maintaining networks, and (c) identify the links between the technological components and the overall sociotechnical framework of the firm.

Before writing-up this case, read and review the following documents (we recommend reading in this same order):
1. Network Structure: http://www.pcmech.com/article/network-structure/
2. Network Structure Design: http://www.geeksnerds.co.uk/it-support/computer-network/
3. Securing your network with Policies and Procedures: http://www.brighthub.com/computing/smb-security/articles/4776.aspx
4. Ten steps to securing Networks: http://howto.techworld.com/security/1862/ten-steps-to-secure-networking/
5. Sociotechnical systems in the 21st century: http://www.bayswaterinst.org/storage/Sociotechnical%20systems%20theory%20in%20the%2021st%20Century.pdf
6. Sociotechnical knowledge creation and storage in organizations: http://www.iriboffice.com/LinkClick.aspx?fileticket=6n0yNKnHr5A%3D&tabid=245&mid=636
Now, imagine you are starting a new business; you are opening a medium-sized food store in your hometown. (if a food store does not suit you, then any similar-sized business is fine for this assignment.) Specifically, you now must design the technology and networking architecture for your business.
For this case, write a 5 page description and justification for the technology and network architecture you decide upon and design. Be sure to articulate the structure, your procedure for securing and maintaining the network, and discuss and rationalize the sociotechnical linkages that you design between your organization and the technology.
Case assignment expectations:
Your assignment will be graded following these expectations:
- Precision: the questions asked are answered.
- Clarity: Your answers are clear and show your good understanding of the topic.
- Breadth and depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.
- Critical thinking: It is important to read the ?required readings? posted in the background material plus others you find relevant. Your paper should include important concepts from these readings and incorporate YOUR reactions and examples that illustrate your reflective judgment and good understanding of the concepts.
- Your paper is well written and the references are properly cited and listed.
- Your paper meets the page requirements not counting the cover page or the references pages.

Excerpt From Essay:

Essay Instructions: Write a paper about the five to seven most important things about computer networks that should be understood by everyone who uses one.

Please start by reviewing the following two articles discussing some of the stranger requests for help received by IT personnel:

Jennifer Mears & Denise Dubie, Funny tech support stories, CD-ROM coffee holders, homemade cookies, frozen computers, and more. Network World, 02/13/06

Strange user requests from the NetworkWorld.com Community

While humorous, the level of ignorance revealed in these anecdotes costs organizations substantial amounts of money, time, and expertise. Figuring out what to do about this situation is a major challenge to IT personnel. As your case assignment for this module, you are to distill from the anecdotes presented and other sources what seem to you to be critical training needs -- that is, the kinds of recurring ignorance reflected in the anecdotes that could be reduced with a little basic training

Excerpt From Essay:

Title: Protecting a network from intrusion and data loss

Total Pages: 6 Words: 1894 References: 12 Citation Style: APA Document Type: Essay

Essay Instructions: set in the apa writing style. It also needs to answer three specific questions. 1. What are some methods a person or business can use to protect their computer network? 2. Can a company go too far in securing its data? 3. How important are people in protecting the network? it needs to be in times new roman, 12 font and double spaced.

Excerpt From Essay:

Title: Basic Network Technology Structure and Protocols

Total Pages: 3 Words: 999 Works Cited: 3 Citation Style: MLA Document Type: Research Paper

Essay Instructions: BACKGROUND INFORMATION:

Required Readings
Mears, J. & Dubie, D. (2006) Funny tech support stories, CD-ROM coffee holders, homemade cookies, frozen computers, and more. NetworkWorld, 02/13/06 Retrieved on December 1, 2011 from http://www.networkworld.com/news/2006/021306widernetusers.html

Strange user requests from the NetworkWorld.com Community. NetworkWorld. Retrieved on December 1, 2011 from http://www.networkworld.com/community/?q=node/4528

Optional Readings
Client-Server Architecture. informationsphere.com. Retrieved on December 1, 2011 from http://www.informationsphere.com/html/57.htm

Yemini, Y. A Driver's-Ed Introduction to Networks The Network Book. Retrieved on December 1, 2011 from http://homepages.uel.ac.uk/u0213760/homepage.html


INFORMATION REQUIRED TO COMPLETE THE PAPER:

This module is about what networks do by, with, to or for organizations, public and private. The bottom line is that information technology ultimately is used by people, and computer networks, whatever their technical complexity, are ultimately about the networking of people, particularly people in their organizational settings. Part of the problem, unfortunately, is that a lot of people are not particularly smart when it comes to understanding information technology. Like most things in life, IT knowledge tends to follow what is called a "Pareto distribution" -- that is, about 80% of the knowledge is concentrated in about 20% of the people, while the other 80% of the people possess only about 20% of the total knowledge. Inevitably, this means that a lot of the demands made upon IT personnel, particularly those supervising networks and network-based applications, reflect a relatively high level of ignorance about how systems work and even about the basic technology. The case for this module explores this issue, and while part of it is pretty funny, the underlying problems are pretty serious.

Please start by reviewing the following two articles discussing some of the stranger requests for help received by IT personnel:

Jennifer Mears & Denise Dubie, Funny tech support stories, CD-ROM coffee holders, homemade cookies, frozen computers, and more. Network World, 02/13/06

Strange user requests from the NetworkWorld.com Community

While humorous, the level of ignorance revealed in these anecdotes costs organizations substantial amounts of money, time, and expertise. Figuring out what to do about this situation is a major challenge to IT personnel. As your case assignment for this module, you are to distill from the anecdotes presented and other sources what seem to you to be critical training needs -- that is, the kinds of recurring ignorance reflected in the anecdotes that could be reduced with a little basic training.

Specifically, when you have reviewed this material, any items from the background information that seem helpful, and any other sources that you care to draw upon, please prepare a 3-5 page paper on the topic:

The five to seven most important things about computer networks that should be understood by everyone who uses one

For each of your items, please identify

What you think people should know and why they should know it

What you think is the best way to teach people about it



Case assignment expectations:
Use information from the modular background readings as well as any good quality resource you can find. Please cite all sources and provide a reference list at the end of your paper.

LENGTH: 3-5 pages typed and double-spaced.

The following items will be assessed in particular:

1.Your ability to demonstrate your understanding of networks and the issues basic users have;

2.Your ability to apply your knowledge of networks to train users;

2.Some in-text references to modular background readings (APA formatting not required)

Excerpt From Essay:

Request A Custom Essay On This Topic

Testimonials

I really do appreciate HelpMyEssay.com. I'm not a good writer and the service really gets me going in the right direction. The staff gets back to me quickly with any concerns that I might have and they are always on time.

Tiffany R

I have had all positive experiences with HelpMyEssay.com. I will recommend your service to everyone I know. Thank you!

Charlotte H

I am finished with school thanks to HelpMyEssay.com. They really did help me graduate college..

Bill K