Access Millions of academic & study documents

Communication protocols summary Template

Content type
User Generated
Type
Study Guide
Showing Page:
1/5
Communication protocols
Communication protocols are arrangements that facilitate the communication of electronic
devices within a network. Therefore they are procedures that aid in communication between the
different devices. They thus offer instructions on the way different media integrate and are
transmitted through a network.
Protocols in Integrative Network Design include, the Internet Protocol, Transfer Control
Protocol, and the File Transfer Protocol
The overall network architecture.
The overall network architecture is made up of the following;
Media for data transmission
These are the physical aspects of transmission involving the use of coaxial cables, optic fiber
cables, twisted pairs and other means used to relay data.
Shared data
These are the shared information and files regarding the access to files and printers.
Servers
These are the computers that hold the shared files for access by the clients.
Clients
These are the electronic devices that use the information that is shared and as well available
through the server.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
The usefulness of a traffic analysis.
Traffic analysis is the monitoring of data sent across networks to get meaningful information for
security purposes. This process can be used on information that is encrypted as well as the one
that is not encrypted. It is thus useful due to the following reasons;
Network security
Traffic analysis helps detect anomalies that are about to occur in a network in order to avert any
further damage and security interference with the network system. This aids in reducing the cost
of taking corrective measures such as recovery to the system. This is achieved through observing
abnormal patterns within the communication network which could be an indication of an attack.
Network management and engineering
Through the observation of the usage level of links and the nature and the size of data traffic
within the system, the technician may be able to plan ahead on the number of extra links that are
needed to ease congestion thereby helping in developing the system so that it can be able to
adapt to the changing conditions and level of needs.
Billing purposes
The monitoring of the usage of a network by a service provider will help in the determination of
the billing and the submission of cost obligations to the users. This helps in bringing
transparency to the users of network services regarding the services that they have used and the
charges upon them.
Control over websites and bandwidth

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Communication protocols Communication protocols are arrangements that facilitate the communication of electronic devices within a network. Therefore they are procedures that aid in communication between the different devices. They thus offer instructions on the way different media integrate and are transmitted through a network. Protocols in Integrative Network Design include, the Internet Protocol, Transfer Control Protocol, and the File Transfer Protocol The overall network architecture. The overall network architecture is made up of the following; Media for data transmission These are the physical aspects of transmission involving the use of coaxial cables, optic fiber cables, twisted pairs and other means used to relay data. Shared data These are the shared information and files regarding the access to files and printers. Servers These are the computers that hold the shared files for access by the clients. Clients These are the electronic devices that use the information that is shared and as well available through the server. The usefulness of a traffic analysis. Traffic analysis is the monitoring of data sent across networks to get meaningful information for security purposes. This process can be used on information that is encrypted as well as the one that is not encrypted. It is thus useful due to the following reasons; Network security Traffic analysis helps detect anomalies that are about to occur in a network in order to avert any further damage and security inter ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4