Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
external factors affecting communication??
|
1--The quality of the pathway between the sender and the recipient
2--The number of times the message has to change form 3--The number of times the message has to be redirected or readressed 4--The number of other messages being transmitted simultaneously on the communication network The amount of time allotted for successful communication |
|
Internal factors that interfere with network communication are related to the nature of the message itself.
|
Internal factors affecting the successful communication across the network include:
1--The size of the message 2--The complexity of the message 3--The importance of the message |
|
These data or information networks vary in size and capabilities, but all networks have four basic elements in common:
|
1--Rules or agreements to govern how the messages are sent, directed, received and interpreted.
2--The messages or units of information that travel from one device to another 3-A means of interconnecting these devices - a medium that can transport the messages from one device to another 4-Devices on the network that exchange messages with each other |
|
Four elements of a network
|
Rules
Medium Messages Devices |
|
Switch
|
the most common device for interconnecting local area networks
|
|
Firewall
|
provides security to networks
|
|
Router
|
helps direct messages as they travel across a network
|
|
Wireless Router
|
a specific type of router often found in home networks
|
|
Cloud
|
used to summarize a group of networking devices, the details of which may be unimportant to the discussion at hand
|
|
Serial Link
|
one form of WAN interconnection, represented by the lightning bolt-shaped line
|
|
Protocals--
Http SMTP&POP3 XMPP&OSCAR SIP |
World wide web
Instant messenger IP Tepephone |
|
Phone,TV,Internet all had there own network in a?
|
Multiple services==multiple networks
|
|
Pnone,TV,internet can all use the same network in a?
|
Converged network
|
|
These rules, or protocols, must be followed in order for the message to be successfully delivered and understood. Among the protocols that govern successful human communication are:
|
1--An identified sender and receiver
2--Agreed upon method of communicating (face-to-face, telephone, letter, photograph) 3--Common language and grammar 4--Speed and timing of delivery 5--Confirmation or acknowledgement requirements |
|
we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:
|
fault tolerance, scalability, quality of service, and security.
|
|
fault tolerance
|
If one link or path fails, processes ensure that messages can be instantly routed over a different link transparent to the users on either end
|
|
scalability
|
A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.
|
|
quality of service(QOS)
|
Different layers
1-live video feeds 2-phone 3-web sites-- if the website has a lower priority than the phone it can drop and the user just clicks again to get the website a phone call can not drop |
|
Security
|
umm securing the network from unauthorized ppl i.e. EX CONS like me
|
|
Circuit Switched Connection-oriented Networks
|
OLD PHONE LINES-once a circuit is established, even if no communication is occurring between the persons on either end of the call, the circuit remains connected and resources reserved until one of the parties disconnects the call
|
|
Packet Switched Connectionless Networks
|
The premise for this type of networks is that a single message can be broken into multiple message blocks. The premise for this type of networks is that a single message can be broken into multiple message blocks
|
|
Data integrity
|
Having the assurance that the information has not been altered in transmission, from origin to destination.
|
|
Source integrity
|
is the assurance that the identity of the sender has been validated. Source integrity is compromised when a user or device fakes its identity and supplies incorrect information to a recipient.
|
|
The use of what provide source and data integrity across a network to prevent unauthorized modification of information.
|
digital signatures, hashing algorithms and check sum
|
|
three major trends that are contributing to the future shape of complex information networks:
|
Increasing number of mobile users
Proliferation of network capable devices Expanding range of services |