In “Data Commutations in a Global Environment,” this course provides knowledge on the foundations of computers to open network usage. The professor for this course is Doctor Robert Hogan. He is able to deliver insight through metaphors, examples, and in-class exercises. From the start of class to current, we have in a matter of speaking seen the beginnings of the computer age. We have learned the basic computer components and what is their purpose in a computer. We have seen a hard disk drive with the spindle and disk intact. The course provided the question of what a person can do with a computer to help with daily operation. It can store data, perform calculations, etc. We have moved into modern computing. Understanding the amount of data people and companies use for research, uploading pictures, filing reports, and much more. Once we understood the modern computing uses, this brought other questions about how can we recover lost information if we place it on our computer or deleted it. There are many directories that store information such as the recycle bin that holds files or programs once it is first uninstall or deleted. On that note: one thing most people do not fully understand is information gather or use on the computer has not disappeared. If someone could not find the file, there are traces or records of the file on the hard drive, especially if they allow their computer go into sleep mode. Moreover, when a file is “deleted” the data is not “deleted,” simply the directory to get to the file is erased It could be recovered.
Next, we learned how computers can send data to each other and how the amount of traffic is controlled to avoid collisions over the network. We explored the advantages between using hubs or switches on a network with either more or less than twenty computers operating on them. We learn the five types of network layers and what is the function or each one. We studied the types of networks used such as WiFi, WiMAX, Bluetoooth, VPN, MAN, and LAN. We compared and contrast them form multiple factors such as range, data usage, and others. We have reviewed the advantages for companies using the internet to stay connected with customers, track data over distances, record data from multiple locations. However, we learn there are disadvantages with security and no control of how much bandwidth a company can use at one time. This led us into the VPNs and encrypted protocols for information being sent over the network. We are still are learning more aspects of network security.
From this we are able to apply the larger picture that there are many things to consider when connecting, storing, and, sharing information. Many companies conduct business operations on line. For an example, Wal-Mart tracks transactions, sales, deliveries, stock-levels, and other things from all of its properties through networks. A person cannot consider Wal-Mart without networks. Around this as well Wal-Mart has to consider what servers to use, determine how they are connected, what networks to use, and how to prevent data loss or security breaches. I have enjoyed learning the different parts and functions of network environments and what to consider when I am using my computer or internet for business or personal use. The information obtained from this course will be utilized throughout my career.
-Deshawn Omar Allen, Junior