Complexity of network systems, Computer Network Security

 

Computer networks is a complex subject due to the given reasons:

  • MANY DIFFERENT TECHNOLOGIES EXIST:

The first reason for the complexity of networks is that there are several different technologies exist for networking and each method features are differ from the other one. This is because many companies have discover networking standards, which are not compatible with other one. In this way multiple methods exist that are need to connect different networks.

  • NO SINGLE UNDERLYING THEORY OR MODEL:

The second reason for the complexity of networks is that there is no single relying model or theory, which defines or specifies different prospects of networking. Rather, several organizations and research groups have discovered conceptual models that may be used to illustrate similarities and differences between network software and hardware.

  • MODELS ARE EITHER SO SIMPLISTIC OR SO COMPLEX:

Another reason for the complexity of networks is that the conceptual models prepared by organization are either so simple that they do not distinguish between details, or they are so complex that they do not modify the subject.

  • NO SIMPLE OR UNIFORM TERMINOLOGY:

One reason for the complexity of networks is that there is no uniform or simple method that can be used for the similar feature. Different methods use different terminologies.

 

Posted Date: 7/30/2012 3:32:45 AM | Location : United States







Related Discussions:- Complexity of network systems, Assignment Help, Ask Question on Complexity of network systems, Get Answer, Expert's Help, Complexity of network systems Discussions

Write discussion on Complexity of network systems
Your posts are moderated
Related Questions
Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Innovative nature of triple key management The triple key management scheme provides secure services by combining different techniques whic contribute to the security and priv

UDP ENCAPSULATION As given in the figure below, UDP packet is included in IP datagram and the IP datagram is then attached in the Frame.

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m