Complexity of network systems, Computer Network Security

 

Computer networks is a complex subject due to the given reasons:

  • MANY DIFFERENT TECHNOLOGIES EXIST:

The first reason for the complexity of networks is that there are several different technologies exist for networking and each method features are differ from the other one. This is because many companies have discover networking standards, which are not compatible with other one. In this way multiple methods exist that are need to connect different networks.

  • NO SINGLE UNDERLYING THEORY OR MODEL:

The second reason for the complexity of networks is that there is no single relying model or theory, which defines or specifies different prospects of networking. Rather, several organizations and research groups have discovered conceptual models that may be used to illustrate similarities and differences between network software and hardware.

  • MODELS ARE EITHER SO SIMPLISTIC OR SO COMPLEX:

Another reason for the complexity of networks is that the conceptual models prepared by organization are either so simple that they do not distinguish between details, or they are so complex that they do not modify the subject.

  • NO SIMPLE OR UNIFORM TERMINOLOGY:

One reason for the complexity of networks is that there is no uniform or simple method that can be used for the similar feature. Different methods use different terminologies.

 

Posted Date: 7/30/2012 3:32:45 AM | Location : United States







Related Discussions:- Complexity of network systems, Assignment Help, Ask Question on Complexity of network systems, Get Answer, Expert's Help, Complexity of network systems Discussions

Write discussion on Complexity of network systems
Your posts are moderated
Related Questions
a) Explain the contents of the Cost Assessment. b) Various Documents are needed for Configuration Management. State three of them, and describe their importance. c) Given tha

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

CRC in matlab

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

(a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of the above, expla

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

Write Pseudocode for the password guessing algorithm: Consider the following authentication protocol: Client Transmission Host