Thursday, August 8, 2019

INDP, Part 2 Essay Example | Topics and Well Written Essays - 500 words

INDP, Part 2 - Essay Example The design is TCP/IP protocol and Distributed network protocol. TCP/IP protocol is supported by many software applications and has universally accepted terms. In TCP, data is divided into manageable bits and the protocol ensures that secure and appropriate routines are in place to oversee data correctly arrives to its destination. Then IP enforces logical addressing and routing of data which brings in the reliability factor (Garduno & Diaz, 2011). TCP/IP supports ASCII standards that help in formatting information transmitted into a range of supported formats such as JPEG, text and MP3 standards among others. Distributed network protocol on the other hand supports communication in process automation systems and supports peer-to-peer and master-to-slave communications. Above all, this protocol is reliable in terms of security; it contains secure authentication features and does not require heavy infrastructure. Cost wise, both protocols are fairly affordable to implement due to fair i nfrastructural costs (Garduno & Diaz, 2011). Other features that make these protocols appropriate include both are open protocols, they support interoperability between different platforms and they can be optimized According to this design, the adopted network architecture defines secure, interpretable infrastructure that provides reliable and open-standard based communication for distribution of information. The architecture also defines technologies required to support communications between various client machines and servers on the network (Garduno & Diaz,2011). There are established network standards that coordinate secure implementation of network architecture as well as supporting traditional data such as voice and video. The architecture is based on open standards In explaining the usefulness of a traffic analysis, When some work has been done for ISPs net flow can be used to determine PPS (Packets per second) to detect instances of DOS (Denial of Service) attacks.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.