Explore chapters and articles related to this topic
Network Security for EIS and ECS Systems
Published in Barney L. Capehart, Timothy Middelkoop, Paul J. Allen, David C. Green, Handbook of Web Based Energy Information and Control Systems, 2020
Networks by their very nature have several nodes, each of which may need to communicate with other nodes on the same network or with nodes on separate, outside networks. In networks with multiple segments using different protocols, the best device to use for efficient communications is a router.[19] A router is an intermediary device on a communications network that expedites message delivery. On a single network linking many computers through a mesh of possible connections, a router receives transmitted messages and forwards them to their correct destinations over the most efficient available route. On an interconnected set of local area networks using the same communications protocols, a router serves the somewhat different function of acting as a link between these local area networks, enabling messages to be sent from one network to another.[20] Because a router essentially handles all traffic across a network, it is a logical target for an attacker. Therefore, all routers used within an organization’s computer network must have firewall capability.
Digital Audio and Computer Networks
Published in Andy Bailey, Network Technology for Digital Audio, 2013
A LAN is generally installed within a single building or campus, whereas a WAN extends the concept to cover connections between towns, cities, and countries. A MAN is a newer term that can have two possible variations on meaning. The first is a network installed internally to an organization, where the parts of the organization remain within a municipal area. The second interpretation is a high capacity general network, offered as a service within a town or city, probably connecting to the Internet. Each of these types of network needs to consider different design aspects.
Network Protocol Architectures
Published in Mário Marques da Silva, Cable and Wireless Networks, 2018
A switch is responsible for the distribution of frames (instead of packets) within a LAN, based on the destination MAC address† (instead of the IP address). Note that the MAC address is composed of 48 bits and represented by six groups of two hexadecimal digits (e.g., 00-1f-33-ac-c5-bb). In fact, a switch learns the MAC address of each device connected to each interface. Every time a frame is received in a certain interface, if this interface is not associated with any MAC address, the mapping is added to the table. Such a MAC address table maps interfaces to MAC addresses.
The advanced wireless sensor networks’ routing protocol to detect malicious nodes and behavior
Published in Journal of the Chinese Institute of Engineers, 2023
Previously, computer networks endeavored to route data transfer faster over local or regional networks with the token-ring technique. A token ring technique is based on a small frame that circulates among all stations. A station wishing to transmit the must wait until it detects a token ring. The principal advantage of a computer network with a token ring is its flexible control over access to the token ring. Bux and colleagues analyzed the architecture, performance, transmission system, and wiring strategy of a token-ring local area network implemented at the IBM Zurich Research Laboratory. In the design of the system, they placed a particular emphasis on high reliability, availability, and serviceability (Bux et al. 1983). However, with the advancement of technology and the penetration of modern computer networks and the Internet in all aspects of life, the issue of data transfer security has also become important (Ometov et al. 2021). The fundamental characteristics of a computer network are the interchange of data between two or more parties, multi-shear communications, direct and indirect trustworthiness, and reliable routing (Din et al. 2018; Salehi et al. 2016).
Design and implementation of a VoIP PBX integrated Vietnamese virtual assistant: a case study
Published in Journal of Information and Telecommunication, 2023
Hai Son Hoang, Anh Khoa Tran, Thanh Phong Doan, Huu Khoa Tran, Ngoc Minh Duc Dang, Hoang Nam Nguyen
VoIP is a technology used to transmit the human voice over a computer network with the Transmission Control Protocol/ Internet Protocol (TCP/IP) protocol set (Giambene, 2014; Karapantazis & Pavlidou, 2009; Packer & Reuschel, 2018). It uses IP data packets (on the Local Area Network (LAN), Wide Area Network (WAN), and the Internet) to transmit information as encrypted by sound. This technology is based on packet switching, which replaces the use of channel switching by previous voice transmission technology. It compresses (splits) multiple voice channels on a single transmission line. These signals are transmitted over the Internet, thus reducing costs. VoIP allows calls to be made using a broadband connection instead of an analogue phone line, and many VoIP services only allow users to call others using the same service. However, some services allow users to call other people using local, long-distance, mobile, or international numbers. While some services only work through computers, others use a traditional phone through an adapter. The principles of VoIP operation include: Digitizing the voice signal.Compressing the digital signal.Splitting the packets if needed.Transmitting the packets over the network to the destination where they are reassembled.
Missing data filling algorithm in OA (office automation) cooperative office system
Published in International Journal of Computers and Applications, 2022
Office automation (OA) system has been gradually applied, and due to the rapid development of the Internet network and other network technology, these management systems are gradually moving from independent single machine to network. Various types of local area network, metropolitan area network and wide area network connect thousands of computers together. Users can obtain a variety of literature information through the network, but also through the network to publish their own information and data to the world. The OA system in the network environment makes the sending and receiving of all kinds of documents, the transmission of data, the storage and retrieval very easy, which is convenient and fast to operate, and can be greatly improved. The efficiency of people’s office work has undoubtedly brought a new revolution to the office [1].