Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

25 Cards in this Set

  • Front
  • Back
external factors affecting communication??
1--The quality of the pathway between the sender and the recipient

2--The number of times the message has to change form

3--The number of times the message has to be redirected or readressed

4--The number of other messages being transmitted simultaneously on the communication network
The amount of time allotted for successful communication
Internal factors that interfere with network communication are related to the nature of the message itself.
Internal factors affecting the successful communication across the network include:

1--The size of the message

2--The complexity of the message

3--The importance of the message
These data or information networks vary in size and capabilities, but all networks have four basic elements in common:
1--Rules or agreements to govern how the messages are sent, directed, received and interpreted.

2--The messages or units of information that travel from one device to another

3-A means of interconnecting these devices - a medium that can transport the messages from one device to another

4-Devices on the network that exchange messages with each other
Four elements of a network
the most common device for interconnecting local area networks
provides security to networks
helps direct messages as they travel across a network
Wireless Router
a specific type of router often found in home networks
used to summarize a group of networking devices, the details of which may be unimportant to the discussion at hand
Serial Link
one form of WAN interconnection, represented by the lightning bolt-shaped line
World wide web
Instant messenger
IP Tepephone
Phone,TV,Internet all had there own network in a?
Multiple services==multiple networks
Pnone,TV,internet can all use the same network in a?
Converged network
These rules, or protocols, must be followed in order for the message to be successfully delivered and understood. Among the protocols that govern successful human communication are:
1--An identified sender and receiver

2--Agreed upon method of communicating (face-to-face, telephone, letter, photograph)

3--Common language and grammar

4--Speed and timing of delivery

5--Confirmation or acknowledgement requirements
we are discovering that there are four basic characteristics that the underlying architectures need to address in order to meet user expectations:
fault tolerance, scalability, quality of service, and security.
fault tolerance
If one link or path fails, processes ensure that messages can be instantly routed over a different link transparent to the users on either end
A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.
quality of service(QOS)
Different layers
1-live video feeds
3-web sites-- if the website has a lower priority than the phone it can drop and the user just clicks again to get the website a phone call can not drop
umm securing the network from unauthorized ppl i.e. EX CONS like me
Circuit Switched Connection-oriented Networks
OLD PHONE LINES-once a circuit is established, even if no communication is occurring between the persons on either end of the call, the circuit remains connected and resources reserved until one of the parties disconnects the call
Packet Switched Connectionless Networks
The premise for this type of networks is that a single message can be broken into multiple message blocks. The premise for this type of networks is that a single message can be broken into multiple message blocks
Data integrity
Having the assurance that the information has not been altered in transmission, from origin to destination.
Source integrity
is the assurance that the identity of the sender has been validated. Source integrity is compromised when a user or device fakes its identity and supplies incorrect information to a recipient.
The use of what provide source and data integrity across a network to prevent unauthorized modification of information.
digital signatures, hashing algorithms and check sum
three major trends that are contributing to the future shape of complex information networks:
Increasing number of mobile users

Proliferation of network capable devices

Expanding range of services