Partial preview of the text
Download Introduction to Information Networks TECH2100 - T1 2024 Assessment Title Tutorial Evaluati and more Exams Information Technology in PDF only on Docsity!
Introduction to Information Networks TECH2100 - T1 2024 Assessment Title: Tutorial evaluation REGEDOR G. AGUJAR 1813355 Introduction Demystifying the Network: A Deep Dive into Network Protocols Network protocols are an essential element that stands out in the huge field of data transmission and networking. Devices may interact and exchange data across networks with ease thanks to these protocols, which serve as the unwritten language. Consider an international team attempting to work together on a project. If there was no common language, anarchy would result. Similar in function, network protocols define a set of guidelines and standards that devices must follow when transferring data. The following explains why network protocols are so important to networking and data communications: e Structured Communication: Data is divided into small portions, sent quickly, and precisely put back together at the other end thanks to protocols. e Error Detection and Correction: Data integrity is ensured by protocols’ built-in features, which enable the identification and rectification of potential transmission faults. ¢ Interoperability: Standardised protocols allow different hardware and software to communicate with each other even when the underlying technology vary. ¢ Scalability and Efficiency: Effective information flow is made possible even in huge and complicated networks by protocols, which specify how data is managed and routed inside them. Understanding network protocols empowers individuals to: ¢ Diagnose network issues: The core cause of communication issues can be identified with the aid of protocol behavior analysis. * Configure network devices: Understanding protocols makes it easier to set up switches, routers, and other network hardware for best performance. e Evaluate network security: Some protocols are created with consideration for security, which enables well-informed choices on network security. e Stay informed about emerging trends: In order to meet changing needs, new protocols are continuously established. It is easier to traverse the always shifting protocol environment when one is aware of the fundamentals. Delving Deeper: A Critical Analysis of Network Protocols Synthesis: The Interplay of Research and Development with Real-World Implications Research plays a vital role in the development of new protocols to address real- world challenges. Consider the burgeoning field of telemedicine, where remote consultations with doctors are becoming increasingly common. Due to possible delays in transferring crucial medical data, such as patient vitals or real-time video consultations, traditional protocols, such as TCP, may not be appropriate. Telemedicine requires research about new protocols like the Real-time Transport Protocol (RTP) . RTP gives time-sensitive data delivery top priority, guaranteeing uninterrupted audio and video stream transmission for productive remote consultations. Because of the possibility of transmission delays, traditional protocols like TCP may not be appropriate for transmitting essential medical data, such as patient vitals or real-time video consultations. For telemedicine, research on novel protocols such as Real-time Transport Protocol (RTP) is essential. Time-sensitive data delivery is given priority via RTP, which guarantees the uninterrupted transmission of audio and video streams for productive remote consultations. Critical Analysis: One example of how research has a direct impact on the provision of medical services is the healthcare industry's embrace of RTP. Researchers might potentially improve patient outcomes in remote places and facilitate greater access to healthcare by creating protocols tailored to the unique requirements of telemedicine. However, strong security measures are also required due to the growing use of modern protocols like RTP in telemedicine. It is essential to do research on authentication methods and encryption algorithms to safeguard private patient information against cyberattacks. In Conclusion: The fundamental components of data communication are network protocols. Their ability to function seamlessly across a variety of networks is made possible by their layered structure, clearly defined functionalities, and ongoing evolution. The field of network protocols is always evolving, guaranteeing a more dependable, safe, and effective flow of information in our globally interconnected society, by critically evaluating real-world scenarios and incorporating the most recent research developments. Network protocols have an enormous influence on more than just our gadgets; they also have an impact on how we do business, obtain healthcare, and even create new technologies that enhance our lives. Introduction to Information Networks TECH2100 - T1 2024 Assessment Title: Tutorial EvaluationIntroduction to Information Computer Network Models (OS! Model Explained, 2024) A communication subsystem is composed of complex hardware and software. Initially, the software for these subsystems was created using a single, intricate, unstructured programme with several interconnected parts. Testing and modifying the resultant programme proved a little difficult. In order to handle these problems, the ISO has developed a tiered approach. A specific task is assigned to each layer of the tiered method that breaks down the networking concept into many tiers. We may thus conclude that the layers are required for networking functions. Layered Architecture > The primary objective of the design into digestible sections using the layered architecture. > Each lower layer contributes its services to the top layer in order to provide a whole set of services for controlling communications and running the applications. > It allows for subsystem interaction by offering modularity and distinct interfaces. > By delivering It keeps services independent between levels by transferring them from lower to higher layers without dictating how they should be implemented. As a result, modifications applied to one layer will not affect the other layers. > Every network will have a distinct collection of layers, each with a distinct set of contents and functions. However, the function of each layer is to transfer a service from the lowest level to a greater tier while concealing the technical details of the services from view. > Interfaces, protocols, and services are the three main components of layered architecture. * Service: A layer offers a higher layer a collection of operations. * Protocol: A layer uses a set of rules defined by protocol to share data with peer entities. These guidelines primarily address the substance. and sequence of the communications that are used. ¢ Interface: This is how information is passed from one layer to another. > A protocol with layer-n refers to the rules used in a conversation. One computer's layer n will speak with another machine's layer n through a la} tet’s take an example af the five-layered architecture. Layer 5 protocol Let's look at a five-lay: — — Layer 3 protece! Layer 2 protocol Introduction to Information Networks TECH2100 - T1 2024 Assessment Title: Tutorial EvaluationIntroduction to Information Introduction to Information Networks TECH2100 - T1 2024 Assessment Title: Tutorial EvaluationIntroduction to Information