Preview

Different Methods of Connecting to the Internet

Satisfactory Essays
Open Document
Open Document
280 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Different Methods of Connecting to the Internet
Different Methods Of Connecting To The Internet
DSL/ADSL Broadband
Advantages:
* Wide variety of speeds and prices. * Large choice of service providers * Always on connection * Can use a telephone and Internet simultaneously

Disadvantages: * Requires special termination equipment to be fitted by the telecom company at both ends of the telephone line, expensive and may cause trouble * Exposes computer to Internet so you need to install firewall software in case of viruses * Available only in limited areas * Speed vary widely, can be very slow * Some providers have monthly download limits, may not be enough

Wireless Broadband
Advantages:
* Always on connection (when connected.) * Requires you to be in a wireless hotspot. * Does not support wireless roaming. * Large choice of service providers * Easy to access * Cheap, sometimes free in various areas

Disadvantages: * Available only in limited areas usually public areas like airports, train stations etc. * Speed varies depending on signal quality. * Exposes computer to Internet so you need to install firewall software.

Cable Broadband
Advantages:
* Wide availability on cable networks * Relatively Cheap

Disadvantages: * Sharing with neighbours poses some unique security risks and congestion problems * Router required for more than one computer * Primarily for home users, cannot be used in public

Mobile Broadband
Advantages:
* Wide availability * Can be used when on the move

Disadvantages: * Slow in comparison with ADSL * Can be expensive

ISDN
Advantages:
* Let’s you talk and surf simultaneously. * Fast * Suitable for attaching more than 1 PC to the Internet without congestion

Disadvantages: * Outdated being replaced by DSL * Not practical for more than 6 computers * Security danger * difficult to setup * Available only in limited areas

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    There are two types of firewalls, hardware firewalls and software firewalls. Software firewalls provide another coating of security, software firewalls prohibit malware on your computer from being sent to others. Hardware firewalls treat any kind of traffic from travelling from a local network out to the internet as safe. An example of a threat entering your computer could be, you visit a website that contains a hidden malicious program that’s designed to secretly install itself on your machine and then send information out via the internet, this maybe to steal personal information, this is one method of infection. It is very dangerous to operate the internet without a firewall because then you will not be notified if a malicious program is trying to enter your computer and if you do not have a firewall it will not be able to protect you from malicious programs that will damage your computer. A hardware firewall is a physical device that connects to a computer and is configurable through connection to it or either through using the internet browser or through a command line…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 12

    • 348 Words
    • 2 Pages

    Telephone public exchange lines will be brought into the premises by the local telephone authority to the location shown on the drawings and/or as agreed with the authority.…

    • 348 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lkt2 - Task 3

    • 871 Words
    • 4 Pages

    connection to the internet. While this provides fewer points of entry for malicious activity, it…

    • 871 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Security software will be required for the new location to create user authentication, virus protection, and data protection (Cooper, n.d.). User authentication will require users to provide a username and password to access accounts. This authentication prevents unauthorized use on an account, and records activity by users. Virus protection is necessary. The security software will guard against viruses, adware, or malware from stealing or destroying information. A firewall will block incoming connections to the network. Data protection involves encrypting data transferred between locations on a network…

    • 2001 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    With computers and IT exploding as it has over the past few years, so has the individuals that try to gain access to your machine. A firewall is a device that applies the security to your network. They come in all different sizes for different setups. Firewalls have two connections. One is to the computer/network and the other is connected to your Internet connection.…

    • 1097 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Telephone systems have many different features this allows us to handle and manage calls in a professional manner.…

    • 3590 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If you have a more than one computer connects in home. It is important to protect every computer. You should have a hardware firewall (such as router) to protect your network, but you should also use software firewall on each computer to prevent the spread of virus your network.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    LYT2 Task 2

    • 2054 Words
    • 8 Pages

    T carriers, e.g., T1 and T3, are digital, leased twisted-pair lines, designed to carry voice…

    • 2054 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    week 1 assignment 1

    • 256 Words
    • 2 Pages

    A landline telephone (also known as land line, land-line, main line, homophone, landline, fixed-line, and wire line) refers to a phone that uses a solid medium line such as a copper wire or fiber optical wire for transmission…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The past couple of decades have seen a tremendous growth in technology. Phones, phone calls, and how we make them, are no exception - a lot has changed since the days of the PBX operator. Today a lot of phone calls being made are being made over the internet –vs- over traditional phone lines. Just like everything else on the internet, there are protocols in place when it comes to making and receiving phone calls.…

    • 698 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    It automatically scans the computer for viruses, Trojans, worms, and spyware on a regular basis. It also protects the computer from suspicious files.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    A firewall is software or a device that blocks hackers, viruses, and malware from accessing to your network system. Second, you should create strong passwords that nobody can guess. Third, you can hide your browsing activities from others by opening an Incognito window on Google Chrome, Private Browsing on Firefox, and InPrivate on Internet Explorer. These private windows don't record your browsing history. Fourth, when you are using a public computer, you can use a portable privacy device such as the Ironkey Personal Flash Drive or take Linux OS with you on a flash drive. Ironkey Personal Flash Drive is an encrypted flash drive that stores sensitive data and passwords and they are safe from viruses and malware.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Starting with the first action, installing firewalls and anti-virus, the article "Firewalls" goes in-depth about how these are important here "While firewalls filter and limit incoming transmission of data that tries to access the system, anti-virus software looks at how the data affects your system". This shows why it's critical to have both a firewall and anti-virus software installed. If you install only a firewall then as soon as its been breached, whoever invaded your system has access to all of your files and personal info with no anti-virus to stop them. It's the same for firewalls, if you are without one, the virus can access your device much easier than a device with both anti-virus and a firewall installed. It's very important to have both installed for maximum security to deter hackers, scammers, and spy…

    • 601 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A telephone is used to call different clients; it also allows me to receive important calls and allows me to divert calls to my colleagues.…

    • 1920 Words
    • 8 Pages
    Powerful Essays