Order Now

Individual: Network Analysis Paper

Category:

No matching category found.

0 / 5. 0

Words: 1100

Pages: 4

117

Network Analysis
<Name>
<College>
<Course>
Professor: <>
Date: <>
Network Analysis
The importance of communication protocols.
Communication protocols refer to the official portrayals of digital data layouts and guidelines. The protocols are essential in the exchange of information amid computing systems and are necessary for telecommunications. Communication rules are applied in both hardware and software systems and are used in both analog and digital messages. Whole food market network has communication procedures which are vital in covering verification, fault detection, and rectification and signaling (Kerschbaum, 2009). Also, the communication guidelines describe the harmonization and syntax of the system. Conclusively, communication protocols organize everything when the computers are communicating with each other.
Protocols in the design and rationale for the decision.
Communication protocols are standard ways of transferring and processing information from one location to another. The whole food market network uses Transmission Control Protocol and Internet Protocol (TCP/IP). The two protocols are different, but they are linked together since their individual function are complementary, and therefore they carry out the complete task. This process of joining some protocols to carry out a specific activity is known as a stack. TCP refers to the process of creating data packets and putting them together in the correct manner. And ensuring that no data packets are lost during the transmission process (Fall, 2011).

Wait! Individual: Network Analysis Paper paper is just an example!

Normally, when data is transferred through the internet, it is usually broken into smaller pieces, a process that enables speedy transmission. Transmission Control Protocol ensures this process is successful and no data packet is lost on the way. Internet Protocol (IP), refers to the method used to route data to the appropriate address. Every computer connected to the Internet have its exceptional address referred to as the IP address. Therefore each data packet sent have an IP address showing its endpoint. The IP ensure that the data packet gets to the designated computer, although it may pass through several PCs before arriving at the final destination.
Overall network architecture
Whole Foods Market network runs on Open Systems Interconnection (OSI) architecture. The OSI architecture is a conceptual framework that typifies and regulates the communication purposes of a networking system without concern to their fundamental internal organization and technology. The OSI model defines a networking arrangement that implements protocols in seven layers. The first layer in OSI architecture model is known physical layer. This layer offers the hardware a way of transferring and receiving information on the carrier comprising of the data cables and cards (Li, 2011). Data link is the second layer, which supplies transmission protocol information and rectifies errors in the physical layer. Layer three is known as the network, and it offers to switch and to route technologies by creating logical paths for transferring data from one node to another. Transport is the fourth layer and offers transparent transmission of information among the end systems. The fifth layer is known as a session, and it creates, manages and ends links among applications. The presentation is the sixth layer, and it converts data in the manner which the application layer can accept. The last layer is known as the application layer, and it supports the end-users procedures. The layer offers application services for file transfer and emails.
Usefulness of a traffic analysis
Network traffic analysis refers to the procedure of recording, reviewing and examining network traffic with the determination of performance, security, and organization. The analysis is conducted to get an in-depth understanding of the type of data packets flowing through a network. It is very vital when Whole Foods Market conduct traffic analysis as they can comprehend and assess the network utilization. Also, the analysis helps to examine the network download and upload speeds and to identify any malicious packets within the traffic.
Defining the terms
Latency: In networking, this term refers to the total period taken for information to be transferred from the sending node to the endpoint. For example, latency refers to the time it takes for data to move from the administration to the human resource departments. When combined with bandwidth, latency is used to define the speed of a network.
Response time: This term refers to the elapsed time of inquiry into a computer system and the start of a response. In other words, it refers to the amount of time a system takes to respond to a request (Fall, 2011). If the response time is shorter, it shows that the network is faster and therefore major activities in the organization can take place. However, if the response time is longer, it shows that the network is slow and therefore this will affect the overall office performance
Jitter: This term refers to the difference in the delay of received data packets. The source usually transmits data packets in a continuous stream and due to network congestion the interval in the packets can vary instead of remaining constant. The variation results in problems for audio playback at the destination.
Effect of data rates on each part of the network.
Network cabling: the speed of data transmission on the cables critically affects the overall network performance. The data rates show the amount of time information is expected to consume while traveling from source node to the endpoint. High data speeds are preferable because the help minimizes congestion on the network and also make the performance efficient (Sang, 2002). For optimal network performance, Whole Foods Market should employ high-speed cables such as fiber optic.
Network adapter cards: Transmission speed in the network adapters affect the period in which the adapters organize packets from the computer to the network cable. This issue also affects the time incurred in transferring packets to another computer and the flow of data among the computer and cabling system. Therefore high data rates result in faster network adapter card functionality.
Wireless network communication: data speeds in the wireless networks is higher compared to that of wired networks. This is because the traffic in wireless networks is controllable and hence the network performance is consistent.
Strategies to ensure the availability of network access in switched and routed networks.
There are numerous vital policies to guarantee the accessibility of net access in switched and routed systems. The policies comprise of redundancy, virtualization, high availability and tragedy recovery (Hui, 2004). These strategies help in ensuring that the company has good network design that is reliable and cost effective. Virtualization assists the company to minimize power consumption and hence reduce the costs of settling enormous power bills. Other important policies to guarantee the availability of net access in switched and routed systems include; identifying the network requirements, creating a hierarchical network and using load balancing method. Lastly, the use of high-speed links such as fiber optic cables will help to ensure that network access is available in all points of the organization.
References
Kerschbaum, F., Dahlmeier, D., Schröpfer, A., & Biswas, D. (2009, March). On the practical importance of communication complexity for secure multi-party computation protocols. In Proceedings of the 2009 ACM Symposium on Applied Computing (pp. 2008-2015). ACM.
Fall, K. R., & Stevens, W. R. (2011). TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley.
Li, Y., Li, D., Cui, W., & Zhang, R. (2011, May). Research based on OSI model. In 2011 IEEE 3rd International Conference on Communication Software and Networks.
Sang, A., & Li, S. Q. (2002). A predictability analysis of network traffic. Computer Networks, 39(4), 329-345.
Hui, J. W., & Culler, D. (2004, November). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd International Conference on Embedded networked sensor systems(pp. 81-94). ACM.

Get quality help now

Henry Butler

5.0 (427 reviews)

Recent reviews about this Writer

If you still have any doubts about AnyCustomWriting.com, just forget about them. I’m the best in my class now because I’ve ordered their editing services one day. The whole team is just awesome.

View profile

Related Essays