Date First Published: 12th October 2023
Topic: Computer Networking
Subtopic: Network Setups
Article Type: Computer Questions & Answers
Difficulty: EasyDifficulty Level: 3/10
Learn about what factors affect the choice of a network.
Before choosing a network, it is important to carefully consider various factors so that you choose one suitable for your needs and make an informed decision. This article is about the things you should consider when choosing a network.
Each of the factors below have different levels of importance to different users. For example, security may be most important to a bank as it stores sensitive information and doesn't want theft through its network. Below are 10 key factors that affect the choice of a network.
User experience (UX) is the overall feeling a user gets when using a network. Several factors can affect the user experience, including:
User needs are related to the tasks the users want to complete using the network. Different users will have different needs from their network and most networks are designed to meet specific user needs. For example, users who want to perform bandwidth-intensive tasks, like uploading large video files will need a high bandwidth.
Specifications refer to the list of requirements a network needs in order for users to perform the tasks they want. Examples of specifications include data transfer rate, bandwidth, power consumption, and functionality. The specifications also include the required standards and can vary a lot.
Connectivity refers to how the network will be connected to, such as Wi-Fi or broadband. Before choosing a network, users will need to consider whether they can connect wirelessly, using a wired connection, and the wired and wireless technologies the network supports. Connectivity is balanced over other needs, such as speed, capacity, user experience, and reliability.
The cost of a network varies depending on the technologies used, the bandwidth, the type of network, and the support level from the ISP. For example, a dedicated private WAN will be much more expensive than a LAN and possibly cost over £1000 a month.
Efficiency refers to how efficiently tasks can be completed using the network. A well-designed network should allow users to complete tasks efficiently with as little wastage of resources as possible. The resources used are often time, energy, consumables, and staff. Over the years, networks have become more efficient. For example, Wi-Fi allows people to connect wirelessly without any cables and more portably. This is unlike dial-up networks which take a long time to wait for the computer to dial in to the network. This wasted time and was inefficient.
Compatibility refers to whether network equipment can communicate with other devices it is being used with. Any new hardware, software, or devices need to be compatible with existing networks. For example, a smartphone with the latest Wi-Fi standard or 5G would not be any faster if the access point or mobile network doesn't support it.
Implementation refers to the time involved with putting a new network in effect. This involves the following:
Productivity refers to how quickly tasks can be completed when using the network. Downtime would have a great impact on productivity as it wouldn't be possible to access the resources of the network whilst it is down.
Security refers to how safe the network is from security threats and attacks, such as viruses, malware, and hacking. When transmitting confidential data across large distances, security is an important consideration. Networks can be made secure using encryption, user access restrictions, firewalls, two-factor authentication, and physical security measures.
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection