Complexity of network systems, Computer Network Security

 

Computer networks is a complex subject due to the given reasons:

  • MANY DIFFERENT TECHNOLOGIES EXIST:

The first reason for the complexity of networks is that there are several different technologies exist for networking and each method features are differ from the other one. This is because many companies have discover networking standards, which are not compatible with other one. In this way multiple methods exist that are need to connect different networks.

  • NO SINGLE UNDERLYING THEORY OR MODEL:

The second reason for the complexity of networks is that there is no single relying model or theory, which defines or specifies different prospects of networking. Rather, several organizations and research groups have discovered conceptual models that may be used to illustrate similarities and differences between network software and hardware.

  • MODELS ARE EITHER SO SIMPLISTIC OR SO COMPLEX:

Another reason for the complexity of networks is that the conceptual models prepared by organization are either so simple that they do not distinguish between details, or they are so complex that they do not modify the subject.

  • NO SIMPLE OR UNIFORM TERMINOLOGY:

One reason for the complexity of networks is that there is no uniform or simple method that can be used for the similar feature. Different methods use different terminologies.

 

Posted Date: 7/30/2012 3:32:45 AM | Location : United States







Related Discussions:- Complexity of network systems, Assignment Help, Ask Question on Complexity of network systems, Get Answer, Expert's Help, Complexity of network systems Discussions

Write discussion on Complexity of network systems
Your posts are moderated
Related Questions
Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

how did slavery influence life in the colonies

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

INTRODUCTION TO CRYPTOGRAPHY Cryptography The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

ERROR REPORTING MECHANISM (ICMP) INTRODUCTION:  IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Me

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m