Question

In: Computer Science

Discuss the best type of network and protocol to use in organizations to ensure protection of...

Discuss the best type of network and protocol to use in organizations to ensure protection of customer information. Justify your selection with specific reasons, facts, and examples.

Solutions

Expert Solution

Answer)

Some of the type of network protocols are as follows:

1) Local Talk

2) Ethernet

3) Token Ring

4) ATM

5) FDDI

The ethernet protocol is most widely used one in the current market as it uses the access method referred to as CSMA/CD and also is where the computer listens to the cable much before it sends anything via the network.

In case if the network is clear then it would transmit or if any node would be transmitted to the system or the network.

When more than 1 computer is attempting to transmit the value at the same time/instance then the collision happens and each individual computer gets to wait and try again once the line is clear. Here the retransmission is very small and is not mostly affecting the speed of the transmission of the network. Also the data could be made to be transmitted via the wireless access points or twisted pair, coaxial or the fiber optic cable with the speed of 10 Mbps to that of 1000 Mbps.

Fast Ethernet

This helps in allowing the increased speed transmission and this is a new standard which helps in supporting 100 Mbps which needs a 5 twisted pair or fiber optic cable which is needed.

Example:

It is mostly being used in the corporate offices and school for better internet connectivity and seamless network connection.

If you found the answer useful, hit like

Hope this answer helps.

Thanks


Related Solutions

1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an...
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an IT professional who works in the networked world describe the professional, social, economic, and cultural issues of computer networks. 3) As an IT professional who works in the networked world describe the ethical issues and your social responsibility.
Discuss telecommunication operations and three (3) security measures to ensure     protection of information.
Discuss telecommunication operations and three (3) security measures to ensure     protection of information.
What is the use of simple network management protocol in enterprise networks? Give examples.
What is the use of simple network management protocol in enterprise networks? Give examples.
What is a network protocol? What is a network service? What is the difference between a...
What is a network protocol? What is a network service? What is the difference between a service interface and implementation of a service? Discuss these concepts in the context of layered network architecture.
Topic: DCS What is the difference between DCS Network Communication Protocol and Field Communication Protocol?
Topic: DCS What is the difference between DCS Network Communication Protocol and Field Communication Protocol?
Why is it important to have a Network Security? Discuss the use of network security components....
Why is it important to have a Network Security? Discuss the use of network security components. Why is it important to use Firewall for Computer Networks?
what is the best argument in favor of increased use of technology in medical organizations, and...
what is the best argument in favor of increased use of technology in medical organizations, and what is the best argument against increasing the use of technology in medical organizations?
The following questions relate to the protocol used to manage the health of the network and...
The following questions relate to the protocol used to manage the health of the network and allow network devices to communicate to each other to keep network traffic flowing freely. An example of a common command that uses this protocol is ‘ping’. (10 marks total) What is the name of this protocol? (1 mark) What layer of the TCP/IP network model does this protocol belong? (1 mark) What is the command used to display a path that network traffic takes...
Explain the sliding window flow protocol and discuss the advantages of this protocol.
Explain the sliding window flow protocol and discuss the advantages of this protocol.
Create a list of how organizations use common safeguards to protect other users on the network,...
Create a list of how organizations use common safeguards to protect other users on the network, such as firewalls, proxy servers, user names and passwords, access controls, and audit trails.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT