返回 历史论文 首页
Advantages of Computer Network Resource Sharing

  Abstract. Resource sharing is based on network resource sharing, in which many Internet enthusiasts share the information collected by themselves with the world through some platforms for not pursuing any interests. Along with the wide application of computer network in the groups of users, a good communication platform between the Internet and users has begun to be produced, and also network resources gradually trend to the development of resources sharing, but are no longer simply enjoyed by a certain user. To analyze and further know the advantages of computer network resource sharing, it is necessary to combine with their actual application conditions. This is analyzed in this paper.
  Key words: Computer; Network resources; Sharing; Advantages
  In China, the number of computer users is increasing continuously. This gives a symbol to the arrival of the information age, and computer has changed into one of the indispensable parts of people's daily life now. Virtual network is the main platform of computer technology application, and the computer operations based on the Internet can give full play to more functions. The sharing of resources is the biggest characteristic of network application: resource information can be scientifically acquired by users in network operations, and also optimal allocation of network resources can be realized.
  1.Disadvantages of Using Traditional Network Resources
  Because the conditions of science and technology were limited, the application advantages of computer technology were not fully played when computer equipments were introduced in China in early days. This constrained the normal playing of the Internet's functions, and simultaneously the operation modules implemented by users in the virtual network were few. This directly gave rise to a series of bad problems in the utilization of network resources. These problems can be mainly concluded as follows.
  1.1 Collection Problem
  Computer network is a virtualized operation platform, and increasingly more resources can be collected only if network resources were collected in early days. The traditional Internet has not yet been complete in structural layout, and still encounters a certain number of limitations in the collection of many network resources, thus resulting in the restrictions on the functions of information collection in the Internet. This is mainly reflected in the limited amount of collected resources and the unsatisfied requirements of users on actual operating applications. The effective play of the allocation functions of the Internet resources is also restricted by all these.   1.2 Processing Problem
  Data processing is a very important task of network operation. Generally, the original data, which is collected by users, will be used not directly, but will be processed relevantly. Thus, the ideal executive functions can be played according to the results. In the past, the hardware and software system facilities of computer were insufficient, and also the functional characteristics of data processing flow were not ideal. For example, when data was operated with the aid of network platform, server was often in a dead state once very complex data was processed, thus severely reducing the efficiency of users in controlling network.
  1.3 Storage Problem
  Database is closely interrelated with computer network, and can provide users with subsequent processing storages, so that information resources can be called repeatedly. Former network database possesses obvious disadvantages as follows: (1) memory space was small, and the play of database storage functions was affected if the memory capacity of computer was low; (2) storage time was short and also database was required to regularly clean and change data, and the data placed by users in database was only applicable to short-term storing, but not long-term storing.
  2. Advantages of Sharing Computer Network Resources
  Resource sharing is based on network resource sharing, in which many Internet enthusiasts share the information collected by themselves with the world through some platforms for not pursuing any interests. Along with the wide application of computer network in the groups of users, a good communication platform between the Internet and users has begun to be produced, and also network resources gradually trend to the development of resources sharing, but are no longer simply enjoyed by a certain user, as shown in figure 1. To analyze and further know the advantages of computer network resource sharing, it is necessary to combine with their actual application conditions. In this study, the following applications are introduced by the author.
  2.1 Application
  This is mainly aimed at some data and application sharing. This is also the biggest characteristic of computer Internet network. A print server is set up within the LAN of sharing print can provide all users in the LAN with printing services. Mail functions and mail server can provide all employees in an enterprise with e-mail forwarding, distributing, copying and other services, and also can help employees easily finish management, back-up, deleting, and recovery tasks on the server. In the network chat, applications such as Whiteboard, Netmeeting and WebEx are the most common, and can rapidly realize the voice and video communication between users in different physical locations in the real time.   Fig.1: Network resource sharing
  2.2 File Services
  Information exchange is an essential part of peoples' life, and the latest information dynamics can be known well through the interaction between information. Computer network provide users with file services, and also occupies very good sharing advantages in the storage and distribution of files. For example, file sharing services are also the most common in network storage, and the resources on the server can be conveniently and securely accessed by users at the computers of working group with the application of FTP and TFTP services, and also most FTP resources are free. With this resource sharing model, some difficult problems can be solved for uses in file operations, and also the security of network services is maintained.
  2.3 Resource Backup
  Resource backup, along with network attacks and virus development, also has changed into one of the indispensable parts of resource sharing. Favorable conditions have been created by resource backup for the office automation of enterprises, as shown in figure 2. For example, real-time and efficient resource backup ways are applied by the modern enterprises mostly, so that company information can be protected to the maximum once the network is collapsed, or a biggest role can be played in disaster recovery time. After a period of network use, resource sharing will become an important way of users to allocate resources, because it can not only satisfy the use requirements of individual users, but also can transfer increasingly more resources to other users. Thus, resources can be mutually transferred and used in the Internet platforms.
  Fig.2: Topology of enterprise resource sharing network
  2.4 Other Resources
  In addition to the above-mentioned application advantages, network resource sharing also possesses the functional characteristics of other aspects, which can be mainly reflected as follows: enterprise users can properly allocate customer resources, human resources, and market resources with the aid of computer network, thus providing scientific guidance for daily operation; individual users can coordinate the allocation of resources in the practical application process relying on the characteristic of network resource sharing, and query increasingly more data information with computer server, so as to meet the requirements in life, work, consumption, entertainment, etc. The computer network in the future will certainly become an information platform of the official business of enterprises from all industries, and also resource sharing provides users with the resources of multiple aspects, thus making it easy for many users to use and operate resources.   3. Standardization of Network Resource Sharing
  On the one hand, virtualization operation platforms are provided by network for users, thus allowing different users to select different resource information according to demands. On the other hand, there also exist many bad hidden troubles in resource sharing, making the security of the Internet environment damaged. For example, resource sharing drives some resources carrying virus to enter the Internet, making the whole virtual resource space interfered by virus and also reducing the security coefficients of user's operations; resource sharing also provides bad information communication with a platform, in which all kinds of information such as theft, sex, religion and illegal behaviors can be transferred. Social unrest will be caused if resources are improperly managed.
  3.1 Setting up Privileges
  Resource sharing is one of the application characteristics of the Internet, and the fixed resources can be effectively mined by users through uploading, transferring, search, download and other operations. Thus, the efficiency of processing and operating the daily resources is increased. When the characteristic of computer network resource sharing is fully played, users also need to take necessary security protection measures for the purpose of solving the potential risk problems in resource sharing. For example, network privilege can be set up, and security check is required for any network visitors, and thus malicious calling of shared resources by illegal persons can be prevented.
  3.2 Optimizing Management
  For users, database is a very important area in which information resources are stored, and the processed data results can be regularly recorded. Thus, it will be easier for users to call data next time. Database management is another major difficult problem in the traditional network; resources will be stolen because of the insufficient privileges setting and improper management of database. For example, the database of small memory space can only store a small amount of data, and it will be difficult to complete storage operations if the data amount exceeds the standard, thus making the operation efficiency of users reduced.
  4. Conclusion
  From the above analysis, network resource sharing is an important advantage of computer technology application, and requires users to reasonably allocate and control resources in the specified scope, so as to prevent the abnormal interference caused by the external risks. According to the hidden dangers in the Internet, necessary privilege management measures can be taken, so that the malicious attacks from the illegal persons on the network can be prevented.
  References
  1.Hongjian Gao. Improving Bone Fracture Teaching Quality based on Network Resource Sharing. Education for Chinese After-school, 2009, (11).
  2.Junbo Zhang, Xiaoli Gu. Four Steps for Realizing the Sharing of Star Network Resource. Modern Communication, 2001, (08).
  3.Min Yuan, Shuguang Cao. Sharing Methods and Implementation of Heterogeneous Network Resource. Computer Knowledge and Technology, 2010, (16).
  4.Li Li. Difficulties of the Sharing of Network Resources in College and University Libraries. Journal of XIANGTAN University (Social Sciences), 2000, (02).


【相关论文推荐】
  • The Sharing Management of Digital Communication Network Resource
  • Network Resource Search System Applying Cluster Architecture
  • 基于Android Resource sharing APP系统设计与实现
  • Research on Computer Network Security and Protection
  • Explorations into Computer Network Auxiliary Scaffolding Teaching Instruction
  • Study on the Computer Network Intruder Alarm System
  • Study on Centralized Management of Distributed Computer Network
  • Treatment and Maintenance Strategies for Common Faults in Computer Network