Communication protocols summary Template

Apr 22nd, 2015
Studypool Tutor
Brunel University, Uxbridge and London
Price: $30 USD

Tutor description

Communication protocols are arrangements that facilitate the communication of electronic devices within a network. Therefore they are procedures that aid in communication between the different devices. They thus offer instructions on the way different media integrate and are transmitted through a network. Protocols in Integrative Network Design include, the Internet Protocol, Transfer Control Protocol, and the File Transfer Protocol The overall network architecture. The overall network architecture is made up of the following; Media for data transmission These are the physical aspects of transmission involving the use of coaxial cables, optic fiber cables, twisted pairs and other means used to relay data.

Word Count: 1020
Showing Page: 1/5
Communication protocolsCommunication protocols are arrangements that facilitate the communication of electronic devices within a network. Therefore they are procedures that aid in communication between the different devices. They thus offer instructions on the way different media integrate and are transmitted through a network.Protocols in Integrative Network Design include, the Internet Protocol, Transfer Control Protocol, and the File Transfer ProtocolThe overall network architecture.The overall network architecture is made up of the following;Media for data transmissionThese are the physical aspects of transmission involving the use of coaxial cables, optic fiber cables, twisted pairs and other means used to relay data.Shared dataThese are the shared information and files regarding the access to files and printers.ServersThese are the computers that hold the shared files for access by the clients.ClientsThese are the electronic devices that use the information that is shared and as well available through the server.The usefulness of a traffic analysis.Traffic analysis is the monitoring of data sent across networks to get meaningful information for security purposes. This process can be used on information that is encrypted as well as the one that is not encrypted. It is thus useful due to the following reasons;Network securityTraffic analysis helps detect anomalies that are about to occur in a network in order to avert any further damage and security inter

Review from student

Studypool Student
" awesome work thanks "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1827 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors