Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

What criterias are necessary for an effective and efficient network?

user-image
Question added by Noman Abdul Hadi Memon , IT Specialist , Wael Fouad Jamjoom Co. For Umrah
Date Posted: 2015/12/05

It all depends on you my friend. There is no such theory to build a network, just keep one thing in mind, try keeping everything simple, like using less patch cables, using such cables which are currently available and are used by many others for cabling, time to time maintenance of server, etc.

 

 

Regards,

Umang

Anish Purkoti
by Anish Purkoti , IT Officer , Syakar Trading Company Pvt.Ltd (Jyoti Group of Company) HONDA

criteria necessary for an effective and efficient networkPerformancePerformance can be measured in many ways, including transit time and response time. Transit time is the amount of time required for a message to travel fromone device to another. Response time is the elapsed time between an enquiry and a response.Reliability:In addition to accuracy of delivery, network reliability ismeasured frequency of failure, the time it takes a link to recover from a failure, and the network’s robustness in a catastrophe.Frequency of failure:All networks fail occasionally. A network that fails often, however, is of little value to a user.Recovery time of a network after a failure:Security:Network security issues include protecting data from unauthorized access and viruses.Unauthorized access:For a network to be useful, sensitive data must be protected from unauthorized access. Protection can be accomplished at a number of levels. At the lowest level are user identification codes and passwords. At a higher level are encryption techniques. In these mechanisms, data are systematically altered in such a way that if an unauthorized user intercepts them, they will be unintelligible.Viruses:Because a network is accessible from many points, it can be susceptible to computer viruses. A virus is an illicitly introduced code that damages the system. A good network is protected from viruses by hardware and software designed specifically for that purpose.

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.