Computer Networking and Wireless Communication
Computer Networking and Wireless Communication
Computer Networking and Wireless Communication
A wireless communication model is described that can serve as a basis for a highly efficient
communication subsystem for local networks. The model contains a taxonomy of
communication instructions that can be implemented efficiently and can be a good basis for
interprocessor communication. These communication instructions, called remote references,
cause an operation to be performed by a remote process and, optionally, cause a value to be
returned.
Computer and network security, or cybersecurity, are critical issues. But merely protecting the
systems that hold data about citizens, corporations, and government agencies it is not enough.
The infrastructure of networks, routers, domain name servers, and switches that glue these
systems together must not fail, or computers will no longer be able to communicate accurately or
reliably. Given the magnitude of securing cyberspace, a reflection on what we are trying to do
seems in order. Several questions arise, such as what exactly the infrastructure is, what threats it
must be secured against, and how protection can be provided on a cost-effective basis. But
underlying all these questions is how to define a secure system. The computer network
technology is developing rapidly, and the development of internet technology is more quickly,
people more aware of the importance of the network security. Network security is main issue of
computing because many types of attacks are increasing day by day. In mobile ad-hoc network
the nodes are independent. Protecting computer and network security are critical issues. The
malicious nodes create a problem in the network. This malicious node acts as selfishness, it can
use the resources of other nodes and preserve the resources of its own. After analyzing and
quantifying the network information security elements confidentiality, integrity and availability,
this paper describes the network security confidentiality vector, network security integrity vector
and network security availability vector; also, we present some major type of attacks in MANET.
References
M. A. Aydın, A. H. Zaim, and K. G. Ceylan, “A hybrid intrusion detection system design for
computer network security,” Computers & Electrical Engineering, 08-Feb-2009. [Online].
Available: https://www.sciencedirect.com/science/article/abs/pii/S0045790609000020.
[Accessed: 05-Jun-2021].
A. authors and G. K. & K. Kumar, “Network security – an updated perspective,” Taylor &
Francis. [Online]. Available:
https://www.tandfonline.com/doi/full/10.1080/21642583.2014.895969. [Accessed: 05-Jun-
2021].
Wegner, D. M., & University of Virginia.Correspondence concerning this article may be sent to
Daniel M. Wegner. (2011, January 1). A Computer Network Model of Human Transactive
Memory. A Computer Network Model of Human Transactive Memory | Social Cognition.
https://guilfordjournals.com/doi/abs/10.1521/soco.1995.13.3.319
. Univ., A. Z. S. C.-M., Spector, A. Z., Univ., C.-M., Chicago, U. of, Contributor MetricsExpand
All Alfred Zalmon Spector Carnegie Mellon University Publication Years1980 - 2012,
Alfred Zalmon Spector Carnegie Mellon University Publication Years1980 -
2012Publication counts36Available for Download23Citation count1, & Author: Alfred Z.
Spector Carnegie-Mellon Univ. (1982, April 1). Performing remote operations efficiently
on a local computer network. Communications of the ACM.
https://dl.acm.org/doi/abs/10.1145/358468.358478.
Mishra, B. K., & Pandey, S. K. (2011, March 24). Dynamic model of worms with vertical
transmission in computer network. Applied Mathematics and Computation.
https://www.sciencedirect.com/science/article/abs/pii/S0096300311004073.
M. V. Pawar and J. Anuradha, “Network Security and Types of Attacks in Network,” Procedia
Computer Science, 22-May-2015. [Online]. Available:
https://www.sciencedirect.com/science/article/pii/S1877050915006353. [Accessed: 05-
Jun-2021].
Consulting, C.-C., Contributor Metrics Expand All William Haj Stallings Honeywell
International Inc. Publication Years1971- 2016Publication counts114Available for
Download6Citation count1. (1993, March 1). Local and metropolitan area networks (4th
ed.): Guide books. Local and metropolitan area networks (4th ed.) | Guide books.
https://dl.acm.org/doi/abs/10.5555/105886.