The Benefits of TCP Protocol

The Benefits of TCP Protocol
The Benefits of TCP Protocol

TCP Protocol

The benefits of TCP Protocol include: control of flow the rate of data exchange, segment size, network control and flow control. On the other hand, the benefits of UDP Protocol include its time sensitivity and ability of its servers towards answering small queries from a large pool of clients (McKeen & Smith, 2014). The differences between TCP and UDP include:  TCP is more reliable than UDP; TCP transmissions are ordered in a sequence whereas messages sent through UDP may not be in a sequence; and finally TCP connection is heavyweight while that of UDP is lightweight (McNurlin, 2009).

TCP Protocol is used in remote surgery because of its preferred in a procedure that requires error correction facilities at network interface level. UDP Protocol is the choice for online gaming and online shopping, which are time sensitive applications for online gaming and the servers are requiring the ability of answering small queries from a large pool of clients for online shopping (O’Brien, 2013).

Basic Data Transfer: The TCP is able to transfer a continuous stream of octets in each direction between its users by packaging some number of octets intosegments for transmission through the internet system. In general, the TCPs decide when to block and forward data at their own convenience.

Reliability: The TCP must recover from data that is damaged, lost, duplicated, or delivered out of order by the internet communication system. This is achieved by assigning a sequence number to each octet transmitted, and requiring a positive acknowledgment (ACK) from the receiving TCP.

The Transmission Control Protocol (TCP) is intended for use as a highly reliable host-to-host protocol between hosts in packet-switched computer communication networks, and in interconnected systems of such networks.

Precedence and Security: The users of TCP may indicate the security and precedence of their communication. Provision is made for default values to be used when these features are not needed.

References

Matthews, H. S. & Williams, E. (2012). Telework Adoption and Energy Use in Building and Transport Sectors in the United States and Japan. Journal of Infrastructural Systems, 11(1), 21-30. doi:10.1061/(ASCE)1076-0342(2005)11:1(21)

McKeen, J. D. & Smith, H. A. (2014). Making IT Happen: Critical Issues in IT Management, Wiley Series in Information Systems. New York, NY: Prentice Hall.

McNurlin, B. (2009). Information Systems Management in Practice (8th ed.). New York, NY: Prentice Hall.

O’Brien, J. (2013). Management Information Systems: Managing Information Technology in the Internetworked Enterprise. Boston, MA: Irwin McGraw-Hill. ISBN 0-07-112373-3

Sardeshmukh, S. R., Sharma, D., & Golden, T. (2012). Impact of Telework on exhaustion and job engagement: A job demands and resources model. New Technology, Work and Employment, 27(3), 193-207. doi:10.1111/j.1468-005X.2012.00284.x

Want help to write your Essay or Assignments? Click here

Implications for Cyber security Stakeholders

Cyber security
Cyber security

Implications for Cyber security Stakeholders

The implications of the cyber security raise several questions that need an exhaustive examination from governments and other stakeholders.  Some of these questions have been noted by the project 2020 initiative of the International Cyber Security Protection Alliance (ICSPA), such as who owns the data in networks and who secures the joins between services, applications, and systems (Cyber Security Protection Alliance, n.d ).

Perhaps the most crucial to answer is who covers and recovers the losses both financial and regarding data recovery. Understanding who covers the loss of cyber-attack in terms of finance and data can help prepare and formulate strategic solutions for cyber security. This is the most important question to examine given that the worst effects of a cyber-attack are loss of money, tarnishing of the organization’s name and loss of customers. The increased cyber-attacks have resulted to a faster growing cyber insurance industry as high profile attacks fuel demand.

Insurance plans like the First Cyber Risk Insurance allows the victim to recover information and income that may have been lost due to a data breach.  This policy includes theft and fraud and covers the loss of the policy holder’s data resulting from cyber-attacks. A forensic investigation on the other hand covers the legal and technical forensic services and examines the impact of the breach while business interruption insurance covers lost income when the insurer is capable of doing business after an attack.

Another type of first-party cyber risk insurance is the computer data loss and restoration that covers any physical damage experienced during cyber-attack. There are several third party insurance covers that insure the policyholder of the liability to a client’s or government after an attack. These types of cover range from litigation and regulatory and notification costs insurance

References

International Cyber Security Protection Alliance. (n.d). Project 2020. Scenarios for the Future of Cybercrime -White Paper for Decision Makers\ European Cyber Crime Center

Want help to write your Essay or Assignments? Click here

Understanding Frame Relay

Understanding Frame Relay
Understanding Frame Relay

Understanding Frame Relay

            Frame relay is one of the inventions in the computer technology industry that have significantly transformed transmission of data among different devices. According to Mir and Sharma (2014), frame relay is a transmission service that has been designed into a packet-mode, and that helps to minimize the degree of data recovery and detection of an error within a network. In this respect, frame relay assists organizations to achieve a higher throughput by reorganizing the communication process. Frame relay allows for the transmission of data between Wide Area Networks (WANs) and local area network (LANs) (Basu, Jha, and Mohanty, 2015).

            Frame relay works by placing data into a small variable unit known as a frame. For instance, the network that has been created by a frame relay tends to create a permanent virtual circuit (PVC), which allows the customer to easily view a continuous connection without making a full payment (Basu, Jha, and Mohanty, 2015). To achieve maximum success from frame relay technology, an organization must choose a high level of service quality, and prioritize some frames while at the same time making others less relevant. Frame relay works by minimizing error detection rate between WANs and LANs, which makes it very efficient for interconnecting these networks (Walton, 1998).

Understanding frame relays: How they work

            Frame relay has a link-layer service that is connection-oriented to give rise to one functional unit. Being that frame relay falls on layer two protocol of X.25, it comprises of features that increase its ability to reduce error detection rates between LANs and WANs (Walton, 1998). These characteristics include; multiplexing, an indication of the most important and less important frames, insertion of zero bits, and frame delineation, nonduplication of frames preservation of frames, and protection of the probability of frame loss. These layer characteristics resemble those of OSI network layer protocol which frame relay is made up of (Basu, Jha, and Mohanty, 2015).

 Frame relay is used by today’s organizations to speed up the transmission of data among networks. According to Basu, Jha, and Mohanty (2015), the use of frame relay to improve networking performance is common in many organizations today. An example of one organization that utilizes frame relay is AT&T.

As Alexander, Alexander, Zhang, and Zhang, (2000), point out, frame relay that has been designed in the form of an integrated service is rapidly gaining strategic importance in both private and public sectors. These authors further assert that frame relay is mostly used by modern organizations to increase the worth of services that they offer and to achieve competitive advantage.

An integrated service that incorporates frame relay is used by today’s organizations to give customers what they desire as far as network connection and speed are concerned (Mir and Sharma, 2014).

There are many reasons why frame relay is still used today. when understanding frame relay, the reasons are provided. First, it assists organizations to minimize costs of internetworking. Second, today’s organizations can increase performance and minimize the complexity of networks. Third, companies which have successfully implemented frame relay can enjoy protocol independence and to increase interoperability (Basu, Jha, and Mohanty, 2015). Based on these benefits, contemporary organizations should consider utilizing frame relay with other technologies such as ATM and IP, to maximize network performance (Alexander et al., 2000).

Reference List

Alexander, H., Alexander, R. B., Zhang, J. & Zhang, Q. (2000). Value added service-voice, data, frame relay, ATM, IP all on one. Communication Technology Proceedings,  doi:10.1109/ICCT.2000.889280

Basu, A., Jha, K., & Mohanty, S. (2015). Wide area networking using frame relay cloud. International Journal of Computer & Mathematical Science, 4(7): 1-6.

Mir, S., A. & Sharma, M. (2014). A comparative study of x.25, frame relay and ATM in high speed networks. International Journal for Research in Applied Science and Engineering Technology, 2 (IV): 243-245.

Walton, D. (1998). Frame relay to ATM interworking. BT Technology Journal, 16(1): 96-105.

Want help to write your Essay or Assignments? Click here.