Computer Networking and Wireless Communication

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Computer Networking and Wireless Communication

A computer network is defined to be a set of autonomous, independent computer systems,


interconnected so as to permit interactive resource sharing between any pair of systems. An
overview of the need for a computer network, the requirements of a computer communication
system, a description of the properties of the communication system chosen, and the potential
uses of such a network are described in this paper. Several of the design factors that must be
considered in linking computers together into networks are also relevant to the ways in which
individual human memory systems are linked into group memory systems. These factors include
directory updating (learning who knows what in the group), information allocation (assigning
memory items to group members), and retrieval coordination (planning how to find items in a
way that takes advantage of who knows what). When these processes operate effectively in a
group, the group's transactive memory is likely to be effective.

A wireless communication model is described that can serve as a basis for a highly efficient
communication subsystem for local networks. The model contains a taxonomy of
communication instructions that can be implemented efficiently and can be a good basis for
interprocessor communication. These communication instructions, called remote references,
cause an operation to be performed by a remote process and, optionally, cause a value to be
returned.

Security and Computer Networks

Computer and network security, or cybersecurity, are critical issues. But merely protecting the
systems that hold data about citizens, corporations, and government agencies it is not enough.
The infrastructure of networks, routers, domain name servers, and switches that glue these
systems together must not fail, or computers will no longer be able to communicate accurately or
reliably. Given the magnitude of securing cyberspace, a reflection on what we are trying to do
seems in order. Several questions arise, such as what exactly the infrastructure is, what threats it
must be secured against, and how protection can be provided on a cost-effective basis. But
underlying all these questions is how to define a secure system. The computer network
technology is developing rapidly, and the development of internet technology is more quickly,
people more aware of the importance of the network security. Network security is main issue of
computing because many types of attacks are increasing day by day. In mobile ad-hoc network
the nodes are independent. Protecting computer and network security are critical issues. The
malicious nodes create a problem in the network. This malicious node acts as selfishness, it can
use the resources of other nodes and preserve the resources of its own. After analyzing and
quantifying the network information security elements confidentiality, integrity and availability,
this paper describes the network security confidentiality vector, network security integrity vector
and network security availability vector; also, we present some major type of attacks in MANET.
References

M. A. Aydın, A. H. Zaim, and K. G. Ceylan, “A hybrid intrusion detection system design for
computer network security,” Computers & Electrical Engineering, 08-Feb-2009. [Online].
Available: https://www.sciencedirect.com/science/article/abs/pii/S0045790609000020.
[Accessed: 05-Jun-2021].

“Network security basics,” IEEE Xplore. [Online]. Available:


https://ieeexplore.ieee.org/abstract/document/1556540. [Accessed: 05-Jun-2021].

L. T. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood, and D. Wolber, “A network


security monitor,” A network security monitor (Technical Report) | OSTI.GOV, 01-Nov-
1989. [Online]. Available: https://www.osti.gov/biblio/6223037. [Accessed: 05-Jun-2021].

“What is computer security?,” IEEE Xplore. [Online]. Available:


https://ieeexplore.ieee.org/abstract/document/1176998. [Accessed: 05-Jun-2021].

L. T. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood, and D. Wolber, “A network


security monitor,” A network security monitor (Technical Report) | OSTI.GOV, 01-Nov-
1989. [Online]. Available: https://www.osti.gov/biblio/6223037. [Accessed: 05-Jun-2021].

A. authors and G. K. & K. Kumar, “Network security – an updated perspective,” Taylor &
Francis. [Online]. Available:
https://www.tandfonline.com/doi/full/10.1080/21642583.2014.895969. [Accessed: 05-Jun-
2021].

Wegner, D. M., & University of Virginia.Correspondence concerning this article may be sent to
Daniel M. Wegner. (2011, January 1). A Computer Network Model of Human Transactive
Memory. A Computer Network Model of Human Transactive Memory | Social Cognition.
https://guilfordjournals.com/doi/abs/10.1521/soco.1995.13.3.319

. Univ., A. Z. S. C.-M., Spector, A. Z., Univ., C.-M., Chicago, U. of, Contributor MetricsExpand
All Alfred Zalmon Spector Carnegie Mellon University Publication Years1980 - 2012,
Alfred Zalmon Spector Carnegie Mellon University Publication Years1980 -
2012Publication counts36Available for Download23Citation count1, & Author: Alfred Z.
Spector Carnegie-Mellon Univ. (1982, April 1). Performing remote operations efficiently
on a local computer network. Communications of the ACM.
https://dl.acm.org/doi/abs/10.1145/358468.358478.

Mishra, B. K., & Pandey, S. K. (2011, March 24). Dynamic model of worms with vertical
transmission in computer network. Applied Mathematics and Computation.
https://www.sciencedirect.com/science/article/abs/pii/S0096300311004073.
M. V. Pawar and J. Anuradha, “Network Security and Types of Attacks in Network,” Procedia
Computer Science, 22-May-2015. [Online]. Available:
https://www.sciencedirect.com/science/article/pii/S1877050915006353. [Accessed: 05-
Jun-2021].

Lawrence G. Roberts Advanced Research Projects Agency, Roberts, L. G., Agency, A. R.


P.2009Publication counts18Available for Download13Citation count1, & Authors:
Lawrence G. Roberts Advanced Research Projects Agency. (1970, May 1). Computer
network development to achieve resource sharing. Computer network development to
achieve resource sharing | Proceedings of the May 5-7, 1970, spring joint computer
conference. https://dl.acm.org/doi/abs/10.1145/1476936.1477020

Consulting, C.-C., Contributor Metrics Expand All William Haj Stallings Honeywell
International Inc. Publication Years1971- 2016Publication counts114Available for
Download6Citation count1. (1993, March 1). Local and metropolitan area networks (4th
ed.): Guide books. Local and metropolitan area networks (4th ed.) | Guide books.
https://dl.acm.org/doi/abs/10.5555/105886.

You might also like