General

General

Distance-Vector Routing Protocols – RIP Versions

This paper discusses the distance-vector routing protocols with more emphasis on RIP versions.  Routing protocols basically entails network protocols used to advertise and learn connected networks and available network paths or routes. The main purpose of a routing protocol is to learn routes for Routed protocols (RP) and Internet Protocols (IP). A routed protocol is […]

General

The Greatest Motivator of Terrorism

The terrorists are the main enemies in the war against terrorism. Terrorism has seen a recent growth and much attention towards the subject, which has led to many researches done on the major causes of the now global threat to security. According to (Miller, 2007), terrorism has been defined as system of battle, where typical

General

Critique and Discussion of BIPAI Case Study

The article “Baylor Pediatric AIDS Initiative Expands It Reach – Update” was published by the Alliance for Case Studies for Global Health on May 4, 2012 as an update of an earlier article “Growing Network Extends HIV Treatment to Children in Developing Countries” published on October 30, 2009. The articles look at Dr. Mark Kline’s

General

Congestion In Networks

Definition             In the context of networks, congestion is defines as a network state where a link or node carries so much data, hence reducing the network service quality. This leads to queuing delay, data packet or frame loss as well as blocking of new connections (Lu, et al., 2017). The internet is designed as

General

Wireless Security Best Practices For End-Users

There are several best practices that the end user can use in order to ensure that the data in the portable devices that they use access wireless network such as mobile phones, iPads, tables and laptops are secure. This portable devices access network through hot spot connections. Some of the best practices include: the deployment

General

Spanning Tree Protocol (STP)

Introduction             Spanning Tree Protocol (STP) is described as a Layer 2 link management protocol which provides path redundancy while preventing loops in the network. In order for a Layer 2 Ethernet network to function effectively, there must be only one active path existing between any two stations (Balchunas, 2014). Many active paths at the

General

Radio Frequency Identification (RFID)

RFID technology is described as an automatic identification technology which is a non-contact using radio signals to detect, sort, track and identify different objects such as goods, vehicles, people as well as assets that do not need direct line of sight contacts such as bar code or those which does not need direct contact such

General

Trunking – Information Technology

Trunk is a computer terminology that is used to describe the communication line conveying multiple signal simultaneously thus facilitating the network access between two points. In simple terms trunk facilitate a connection in the switching center in a communication system (Garimella, et al., 2007). The signal that which is convey can be any type of

Scroll to Top