Abstract
In network analysis, communication protocols are necessary because they are reusable. Firstly, if communication protocols exist for one system, it is easier to model them to fit others, which saves on effort duplication. Secondly, they promote independent development, which allows different developers to use specific protocols for cooperative components without dependence. Thirdly, the existence of communication protocols supports and enhances technological advancements. For example, if several systems share the same protocol, it serves to incentivize developers to advance them technologically for efficiency (Habermas, 2015). Finally, the existence of protocols in communication forms a basis of study and research. It helps in pooling several ideas on how best to use and advance protocols.
Explain The Importance of Communication Protocols
Firstly, in network analysis, communication protocols are necessary because they are reusable. If communication protocols exist for one system, it is easier to model them to fit others, which saves on effort duplication. Secondly, they promote independent development, which allows different developers to use specific protocols for cooperative components without dependence. Thirdly, the existence of communication protocols supports and enhances technological advancements. For example, if several systems share the same protocol, it serves to incentivize developers to advance them technologically for efficiency (Habermas, 2015). Finally, the existence of protocols in communication forms a basis of study and research. It helps in pooling several ideas on how best to use and advance protocols.
Identify The Protocols in Your Design and Provide Rationale for Your Decision
The designs have links to protocols of communication, which include corporate headquarters. Because of their use of hypertext, they are useful in viewing various files from other networked computers in a system (Aarts, Jonsson, Uijen, & Vaandrager, 2015). The internet connection between the computers enables the sharing of files. Having a headquarter control allows ease of scrutiny of both security and data flow. Secondly, a record plant protocol allows free communication with the headquarter station. It ensures that employees or users who do not have headquarter access can receive and send files to the headquarters.
Define The Overall Network Architecture
A network architecture is a layout, which consists of software, hardware, communication protocols, connectivity, and transmission modes such as wireless or wired. In modern network architecture, for example, layering helps to divide communication into small and manageable bits. An open network architecture, for instance, allows the vendors to share information freely without any particular source of control. For example, TCP/IP system that forms the basis of the internet is open and allows free access and sharing of data. In a local area network (LAN), for example, several computers are interconnected, and the administrator can either regulate the information visible to others within the network or open it to allow free control and share (Argenti, 2015).
Explain The Usefulness of a Traffic Analysis
Traffic analysis serves to evaluate the patterns of communication between related entities in a system. It provides the administrator with the information to make a decision regarding the usage of the network. For example, network analysis paints a picture of the bandwidth usage and allows the regulation of heavy users who overload the system during working hours. Moreover, it helps in monitoring a network security (Le Blond et al., 2013). For example, a heavy flow of data from a single user can paint a possible portal network breach thereby preventing anomalies before they occur. Furthermore, traffic analysis helps in engineering a network to reduce lag. For example, analysis of traffic provides the developer with an idea of how to direct the data flow to avoid sluggishness in communication.
Define The Terms Latency, Response Time, And Jitter, And Describe Their Effect On Overall Network Performance and the Performance of Your Chosen Organization’s Network
Latency refers to the amount of time that a packet of data needs to move from one port to another. It explains the delay in information transmission from its source to outcome point in a network. Response time is the period elapsed between when a service demand or inquiry ends and when the system responds. For example, it is the time between the last search words typed and the first result displayed at the terminal. Jitter is the displacement or variation of signal pulses. It describes the difference between the rates of arrival of data flow packets. Latency, response time, and jitter affect the working of networks. For example, an abnormal jitter slows down real-time applications such as IP telephony while a system with prolonged latency or response time determines the processes that can run at the same time. Moreover, in a hosted network such as desktops in LAN connection, abnormal jitters, latency, and response time can diversely alter video and audio effects, which lead to poor quality of communication.
Explain The Effect of Data Rates On Each Part of the Network
Data transfer rate refers to the digital information amount that moves from one location to another in a given period. For example, a high bandwidth is an indication of a fast rate of data transfer. System and protocols determine the speed of data transfer. For example, an internet connection in a system might present slower rates than a local area network (LAN). Moreover, the processor power, speed, and application running simultaneously in a system directly affect the rate of transfer.
Describe strategies to ensure the availability of network access in switched and routed networks
Virtualization, redundancy, high availability, disaster recovery sites, and planned outages are examples of strategies that guarantee and improve the availability and access in both routed and switched networks. They are essential in ensuring that a network design has backup options to guarantee data availability and is cost effective. In network redundancy, for example, alternate or additional devices, communication mediums, and equipment in an infrastructure increase availability in the event of path or device failure (Sterbenz et al., 2013). Additionally, a strategy such as virtualization helps in moving the old hardware-dependent services, for example, Web server, into virtual systems, which share resources and increase the speed and ability to communicate in switched and routed networks. Moreover, virtualization provides a platform for migration of applications in a network, which increases availability.