Open Always
Email: Call Now! +1-315 515-4588
Open Always
Email: Call Now! +1-315 515-4588

Sample Research Paper on Garmin Activity Tracker

This sample paper on (Sample Research Paper on Garmin Activity Tracker) was uploaded by one our contributors and does not necessarily reflect how our professionals write our papers. If you would like this paper removed from our website, please contact us via our Contact Us Page.

A Database of over Million Scholarly Resources. Start your Search Now

Sample Research Paper on Garmin Activity Tracker

In computing, file synchronization is defined as the process of keeping computer files in two or more locations as a way of creating backup against security threats. This method is commonly used as backup mechanism especially on external hard drives or USB flash drives. File synchronization uses a wide range of technologies to store, synchronize, as well as share data on different computer hardware. Basically, there are two technologies used in storing, synchronizing, and sharing data namely (1) the Synchronous Peer-to-Peer (S–P2P) and (2) the Synchronous Client-Server (S–CS) as discussed below.

  • The Synchronous Peer-to-Peer (S–P2P)

Actually, the S–P2P technology was the first to be broadly adopted and used in computer file sharing, storing, and synchronization. It was first used across different peripheral devices such as PDAs, iTunes, and iPods to store and share data. The implementation of this technology tends to be very simple as it boosts the speed of local networks. The primary advantage of this method is that it allows storage and sharing of large quantities of data: the S–P2P directly synchronizes and transfer files from one device to another. This method actually involves on device sending or transferring its data to another device (Malhotra and Anjali 78).


  • The Synchronous Client-Server (S–CS)

The Synchronous Client-Server is the second technology to be developed for the use of storing, synchronizing, and sharing files. This technology eventually grew in popularity due to the improvement of networks and the development of cloud services started becoming popular – this is probably the most common method of data synchronization and sharing across all networks. It works using a similar approach as developing a web service. The difference with S–P2P is that S–CS sues programming stacks, which are not related to the client applications.


Security for ensuring communication and connection

The two methods discussed above use different approaches to ensure the security personal data in communication and connection. First, the Synchronous Peer-to-Peer (S–P2P) technology is developed to communicate synchronously with the device via Bluetooth, USB, or Wi-Fi to allow connection and communication. When the two devicessynchronize, theydiscover each other thus allowing the application to zip up its entire store while sending the resulting file to the other device via a socket, which would in turn unzip and install it. This process is designed to enhance security while sending and transferring personal data across the two devices. When a user makes changes to the existing data such as giving it a rating, the application on the device would indicate the new changes and sends the entire data store to the original sender during the next sync. The original sender loads the store and looks for the modified instances then sends back a full copy of the updated store.

The process is a little different when it comes to the Synchronous Client-Server (S–CS) technology. In this technology, a server is added to the equation to offer more flexibility in terms of data communication and connection. In this case, when the client application synchronizes, it downloads data from the server using a serial format. This allows it to build a local store consisting of data from the server. When the client applications are changed, the last modified timestamp is updated and communicated to the server. To guarantee security and protection of the personal data, the server sends back all changes made on the timestamp to the client (Stefano 99).

Limitations and security vulnerability to malicious activities

There are some limitations of both Synchronous Client-Server (S–CS) and Synchronous Peer-to-Peer (S–P2P) technologies as well as some security vulnerability to malicious activities. These technologies are limited to the extent of identification of objects by row index in a database. Every store has a unique identity, which may not be suitable for identifying the corresponding object stored on a different device. Another limitation of these technologies is that there is potential of conflict existing when there are two or more stores representing the set of logical data. As a result, it is possible for a change of an object in one device to occur simultaneously in other devices (Du 102).

The two methods do not have fixed rules and policies of enforcing data security during storage and sharing. With the Synchronous Peer-to-Peer (S–P2P), the overall data security generally depends on the system or device being used. In essence, this technology is more vulnerable to security threat of malicious activities during the file transfer. In both approaches, the security of the personal data must be maintained at the sources of data capture and information access privileges. However, there are few threats of data security due to malicious activities when using the Synchronous Client-Server (S–CS) because the server controls access of information during the synchronization process (Cao 56).For anybody who or organization who uses a computer, human beings are the greatest known threats to their computer systems and information – this can be either through ignorant or malicious activities. For instances, human beings can perform some malicious activities such as disrupting the normal business operations thereby interfering with the process of data availability as well as production. Security threats to a computer also come from sharing and transferring of information inform of virus and worm attacks through internet or use of external storage devices.


Work Cited

Cao, Jian. Network and Parallel Computing: Ifip International Conference, Npc 2008, Shanghai, China, October 18-20, 2008: Proceedings. Berlin: Springer, 2008. Print.

Du, Wenjiang. Informatics and Management Science I. London: Springer London, 2013. Print.

Malhotra, Naveen, and Anjali Chaudhary. “Implementation of Database Synchronization Technique between Client and Server.” International Journal of Engineering Science and Innovative Technology (2014).

Stefano, Michael D. Distributed Data Management for Grid Computing. Hoboken: John Wiley & Sons, 2005. Print.

Sharing is: CARING

Are you looking for homework writing help? Click on Order Now button below to Submit your assignment details.

Homework Writing Help
We Can Help you with this Assignment right now!
Sample Research Paper on Garmin Activity Tracker

Are you looking for homework writing help on (Sample Research Paper on Garmin Activity Tracker)?Well, you can either use the sample paper provided to write your paper or you could contact us today for an original paper. If you are looking for an assignment to submit, then click on ORDER NOW button or contact u today. Our Professional Writers will be glad to write your paper from scratch.




We ensure that assignment instructions are followed, the paper is written from scratch. If you are not satisfied by our service, you can either request for refund or unlimited revisions for your order at absolutely no extra pay. Once the writer has completed your paper, the editors check your paper for any grammar/formatting/plagiarism mistakes, then the final paper is sent to your email.

Privacy| Confidentiality

Sample Research Paper on Garmin Activity Tracker

We do not share your personal information with any company or person. We have also ensured that the ordering process is secure; you can check the security feature in the browser. For confidentiality purposes, all papers are sent to your personal email. If you have any questions, contact us any time via email, live chat or our phone number.

Our Clients Testimonials

  • I appreciate help on the assignment. It was hard for me but am good to go now

    Impact of pollution on Environment
  • Am happy now having completed the very difficult assignment

    Creative Message Strategies
  • Your writer did a fine job on the revisions. The paper is now ok

    Ethics: Theory and Practice
  • The paper was so involving but am happy it is done. Will reach you with more assignments

    Title: Privatization in or of America
  • I expected perfection in terms of grammar and I am happy. Lecturer is always on our head but was pleased with my paper. Once again, thanks a lot

    Title: Bundaberg Inquiry
  • The paper looks perfect now, thank to the writer

    Health Care Systems
  • You helped me complete several other tasks as you handled paper. wonna thank you

    Critique Paper on Political Change

Related Articles

Sample Research Paper on Garmin Activity Tracker

Analyze the Nursing Roles in providing Comprehensive care in a Variety of Community Health Settings

Community Settings This week’s graded topics relate to the following Course Outcomes (COs). CO3: Plan prevention and population-focused interventions for vulnerable populations using professional clinical judgment and evidence-based practice. (POs...
Read More

Case Study Assignment on Ethical Issues in Asia-Pacific business

Case study assignment on Ethical Issues in Asia-Pacific business For this assignment, students will write a case study report in 2,000 words based on a case identified with circumstance or...
Read More

Sample Report Paper on The proposed reward system and strategy for the big city university

A good reward system should motivate workers. It should also attract and retain the same workers. On the contrary, a bad reward system does not do either of these things....
Read More

Management of PCOS through Homoeopathy-A case report

Introduction PCOS is the acronym for Polycystic Ovarian Syndrome. It is the most common endocrine disorder of women in their reproductive period manifested by irregular menstrual cycles and polycystic ovaries,...
Read More

Get more from us…

Would you like this sample paper to be sent to your email or would you like to receive weekly articles on how to write your assignments? You can simply send us your request on how to write your paper and we will email you a free guide within 24-36 hours. Kindly subscribe below!

Email Address: