Let's start a new assignment project together, Get Exclusive Free Assistance Now!

Need Help? Call Us :

Place Order

Importance Of Communication Protocol

Jan 31,22

Importance Of Communication Protocol

Question:

The importance of communication protocol in todays world?

• How important is it to know about network security threats such as identity theft and password theft? (250) Please provide the way we can prevent these threats

• The importance of WiMAX in today’s world?

Answer:

Introduction

Communication protocols are similar to traffic directors. They maintain all organized during computers are communicate to each other. A protocol has the main role in communication and without it is not possible for one computer to converse with another computer (Hercog, 2020). This report is prepared to define the importance of communication protocol in today’s world. This report also describes network security threats such as identity theft and password theft along with the process to prevent possible threats. In last, the report describes the importance of WiMAX in today’s world.

Importance of communication protocol

For example just thought that a person is in USA but he does not know how to English. So it’s not possible to speak to a man who doesn’t understand any other language except English? Not, although that person could try to speak with him non-verbally again we would be unable to let him know our though (Knapp and Langill, 2014). To get it to work either he requires learning English or he requires knowing the language that others speak then both would be capable to talk contentedly. This similar analogy is appropriated to the Protocol of the Internet, if one machine or computer want to receive or send data to another computer, then both of the computers should use a similar protocol for completing the task. Thus it can describe the Protocol as” The Rules which govern communication among more than two of the two computers” (Hercog, 2020). The general protocols of the Internet are as below:

  • HyperText Transfer Protocols (HTTP) supports us to see pages that are residing on another computer;
  • File Transfer Protocol (FTP) supports us to receive or send a file from one file to another;
  • Post office Protocol and Simple Mail Transfer Protocol (POP3/SMTP) supports us to receive and send emails (Popovic, 2018);

Network Security

System and network security is a wide word that encompasses a variety of technologies, equipment, and procedures. IT security may be defined as a collection of rules and settings aimed to safeguard the integrity, accessibility and confidentiality of computer networks and data via the use of hardware and software technologies (Popovic, 2018). To keep stored sensitive information securely, network security is essential, and private data is kept and exchanged on susceptible devices, security of the network will only increase in relevance and need (Perlman, Kaufman and Speciner, 2016). The following are important physical safety issues that must be kept in mind:

  • Keeping devices and network servers in a safe place is important (Griffor, 2016).
  • Members of the organisation are being denied admission to this place regularly.
  • Anyone attempting to gain entry to this site will be deterred and detected via the use of video monitoring (Castiglione et al, 2018).
  • Network security threats and Way to Prevent from Threats

Taking care to keep the network’s physical security in good condition helps guarantee that it runs as efficiently and securely as possible. Followings are possible threats for the Network Security that are:

Identity theft

Someone pretending to be someone else by assuming that person’s identity is known as an identity. Phishing is the term used to describe identity theft that occurs via the use of an online identity. It makes use of phishing email and websites messages that are aimed to steal information of individual or data such as numbers of credit cards, passwords, account information, and other similar information (Castiglione et al, 2018). Network hackers may send bogus emails to hacked ids that include links to phoney websites that seem to originate from credible websites, such as bank companies, credit cards and demand that provide personal information.

Password Theft

The theft of a password is considered as “Holy Grail” of network system hacking. Once a hacker has discovered the username and password combination, he or she should use that user account to conduct their attacks. Security techniques such as firewalls, intrusion detection, encryption, and a variety of other countermeasures are useless against accounts that have been stolen — precisely because it is not feasible to distinguish between a genuine user and a fictitious user (Griffor, 2016).

Processes to Secure Network

Followings are some steps to secure Network security that are:

  • To check the network for harmful applications, antivirus software should be installed in every IT or network device that must be up to date for addressing any security flaws or holes.
  • A decryption password or key is required to decipher encrypted data, and only authorized parties are given access to the password or decryption key. As a result of this process, unauthorized users will be unable in reading the data (Castiglione et al, 2018).
  • Hardware, the software or a mix of the two, may be used to restrict unwanted traffic from entering a network via a firewall, while genuine requests may still be accessed, suspect or unauthorised traffic can be filtered out. Segmentation is the process of dividing a big network into smaller, more manageable networks (Perlman, Kaufman and Speciner, 2016). Because the sub-networks exist independently of one another, if one is hacked, the others are unaffected.

Importance of WiMAX in today’s world

Worldwide Interoperability for Microwave Access (WiMAX) is the name of the initiative. This makes it possible to give wireless broadband connectivity as a last-mile alternative for ADSL and cable broadband (Hincapie and Sierra, 2012). As a result, it has the potential to replace a significant number of present communication infrastructures throughout the globe. Fixed wireless networks may be used to replace the cellular zone, telephone copper wire networks and cable TV coaxial cables in areas where they are not available on the go. It can fill in the gaps left by present cellular networks (Hincapie and Sierra, 2012).

Most importantly, you may acquire all of its services at a lower cost than those provided by other well-known technologies such as cable, fibre optics, and ADSL, among other things (Ahson and Ilyas, 2018).

Reach of WiMAX

The magnitude of WiMAX and its bandwidth helps in developing WiMAX for uses of broadband in customers’. Wireless internet is a strong substitute for cable broadband connection and digital subscriber line (DSL). Further, it can be linked to existing Wi-Fi hotspots and other types of Internet facilities, as well. It has the ability to provide high-quality mobile communication services (Nuaymi, 2007). The WiMax services and capabilities may be used inside the local loop, according to some reports.

Importance of the WiMAX

  1. This system provides internet access services via the use of a WiMax receiver and a WiMax transmitter. This tower has the capability of covering a larger region in the range of eight thousand square kilometres or more. It is analogous to a mobile phone tower.
  2. The receiver and antenna of WiMax operate similarly to the WiFi network in terms of direction. It comes with built-in capabilities for connecting to the network. The PCMCIA card is integrated inside the laptop and is used to transmit and receive signals.
  3. A tower station of WiMax provides high-bandwidth services like T3 lines, to its customers. It is possible to connect it through a wired connection (Ahson and Ilyas, 2018).
  4. WiMax provides two types of wireless services for connecting to the internet. There are two types of sightlines available in WiMax services that are non-line sightlines and sightlines. In addition to being static, line-of-sight provides an excellent connection.
  5. With a non-line-of-sight network, a user may work on the same line as he or she would with a WiFi network. In this situation, a tiny antenna in the computer is required in order to establish a remote connection (Ahson and Ilyas, 2018). WiMax provides services in the frequency band of GHz 2 to 11.

Conclusion

As per the above discussion, it concluded that the communication protocols are being imported in the present world to direct the traffic of communication. This report also describes the benefits of communication protocol that must be secure through the above-defined solutions to stop the threat of identity and password.

References

Ahson, S. and Ilyas, M. (2018). WiMAX: Technologies, Performance Analysis, and QoS. CRC Press.

Castiglione et al. (2018). Cyberspace Safety and Security: 10th International Symposium. Springer.

Griffor, E. (2016). Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems. Syngress.

Hercog, D. (2020). Communication Protocols: Principles, Methods and Specifications. Springer International Publishing.

Hincapie, R. and Sierra, J. (2012). Advanced Transmission Techniques in WiMAX. BoD – Books on Demand.

Knapp, E. and Langill, J. (2014). Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress.

Nuaymi, L. (2007). WiMAX: Technology for Broadband Wireless Access. John Wiley & Sons.

Perlman, R., Kaufman, C. and Speciner, M. (2016). Network Security : PRIVATE Communication in a PUBLIC World. Pearson Education India.

Popovic, M. (2018). Communication Protocol Engineering. CRC Press.