First Wireless Communication Network in Ancient Greece
Networks change the way we
External factors affecting the success of communication include:
all networks have four basic elements in common:
Converged networks & Unified Communications
Technology advances are enabling us to consolidate these disparate networks onto one platform - a platform defined as a converged network. The flow of voice, video, and data traveling over the same network eliminates the need to create and maintain separate networks. On a converged network there are still many points of contact and many specialized devices - for example, personal computers, phones, TVs, personal assistants, and retail point-of-sale registers - but only one common network infrastructure.
The underlying architectures of a Network needs to address:
Packet Switched and Circuit Switched Networks
Network bandwidth is the measure of the data carrying capacity of the network.
Classification of Data traffic to achieve QoS
QoS mechanisms enable the establishment of queue management strategies that enforce priorities for different classifications of application data. Without properly designed and implemented QoS mechanisms, data packets will be dropped without consideration of the application characteristics or priority. Examples of priority decisions for an organization might include:
Security measures taken in a network should:
Means to achieve these goals include:
Data privacy is maintained by allowing only the intended and authorized recipients - individuals, processes, or devices - to read the data.
Having a strong system for user authentication, enforcing passwords that are difficult to guess, and requiring users to change them frequently helps restrict access to communications and to data stored on network attached devices. Where appropriate, encrypting content ensures confidentiality and minimizes unauthorized disclosure or theft of information.
2.Maintaining Communication Integrity
Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Data integrity can be compromised when information has been corrupted - willfully or accidentally - before the intended recipient receives it.
Source integrity is the assurance that the identity of the sender has been validated. Source integrity is compromised when a user or device fakes its identity and supplies incorrect information to a recipient.
The use of digital signatures, hashing algorithms and check sum mechanisms are ways to provide source and data integrity across a network to prevent unauthorized modification of information.
Ensuring confidentiality and integrity are irrelevant if network resources become over burdened, or not available at all. Availability means having the assurance of timely and reliable access to data services for authorized users. Resources can be unavailable during a Denial of Service (DoS) attack or due to the spread of a computer virus. Network firewall devices, along with desktop and server anti-virus software can ensure system reliability and the robustness to detect, repel, and cope with such attacks. Building fully redundant network infrastructures, with few single points of failure, can reduce the impact of these threats.