You are on page 1of 3

The investigation of the various technologies, devices and communication can be given as the TCP is the

important protocol which we required in the entire communication and with their specific areas which
needed to be filled up There is a need to fill them with the switches, routers, optical fiber cables along
with the access point wherever required with the hubs and you should be able and this will be all very
helpful in the communication protocol as that will be helping in the telecommunication networks as the
Internet protocols will be transferring data between the terminals and the connection points and this
will help in the network to be consisting of various nodes that will be linked together for any link
telecommunication between this links and this will be helpful in the circuit to be switching and the
message switching or in towards passing signals through the proper links and each network terminal will
be having its own unique address. Moreover the TCP protocol is used as a standard and various
networks such as LAN and WAN are operating.

The connectivity from the RAO office and the student to the web server can be done with the help of the
proposed devices and the protocols and there are various communication setup which are being
involved and that is very helpful in communication process as it is seen that with the help of the
enterprise communication technology and the unified communication this will help in the employees to
connect and communicate with each other through the protocols and then there is also IP
communication protocol which will be integrating with real-time communication facilities and that will
be helpful in the service providers to collaborate and that will help in a greater efficiency and
organization also will be leading to greater productivity which would be integrating with office networks
and that will be helpful for selecting the products which will be required at that time.

Introduction

It can be introduced that this project will be revolving around the missing technologies or the
connections in specific areas and to investigate how these possible technologies or devices can be
placed in this messaging area to achieve the ideal security or connectivity and it is also important to
consider he calls or defectiveness for the required data rates and there is also a need for providing the
investigation for the security threats that are a possibility by hackers and how can these be used in this
specific areas and along with the other devices.

Problem statement

To find simulation for the various network technologies on the application scenario and then to use the
plan or design of various networks along with routers and switches.
To experience the use of the several network and the protocols which will be involved in the network.

The proposed technologies and protocols can be given along with the devices as Initially the Internet
protocols is being used as the community protocols are used for determining the format and the way
the data will be transmitted. Then the transmission control protocol (TCP) is also being used for
transmission of data along with the user datagram protocol (UDP) which is being used for sending the
short messages of datagram. Internet Control Message Protocol (ICMP) Is used for diagnostic or the
purposes of error generation.
The justification for using the TCP is that it is one of the primary protocols of the Internet suit and it is
also being used for to be pairing with TCP and IP and this is very useful as it is used in the protocols for
the communication and also preparing and forwarding the data packets across the network like
Ethernet. The TCP IP is also being used as the standard for all local area and the other type of networks
as these networks and the Internet protocols along with the various technologies and devices is helpful
forward communication between the terminals and this network also is helpful for enabling between
the notes and each network terminal has its own unique address so that any terminal will have its own
address so that the connections can be easily go to the correct destination. The various network
addresses or the address spaces are located in the system memory and various types of networks are
the world over the years along with the technologies and protocols and devices which are been used.

The chosen communication media used between all Buildings is Co axial cables , Cat 5 UTP, Cat 6 UTP
and fiber optic cables which is to be connected in the middle of switches as that will be ideal for
connecting the latest switches.

Type Data rate Cost. Distance

Cat 5 UTP 1 omr / m. 100 omr 100 m

Fiber optic cables 5 omr / 10000 m 2000 m

Cat 6 UTP 1.5 omr/ m 150 omr 100 m

Co axial cables 1.3 omr/ m 650 omr 500 m

Protocols used:

Transmission Control Protocol (TCP)


User Datagram Protocol (UDP)
Internet Control Message Protocol (ICMP)
Hypertext Transfer Protocol (HTTP)
Post Office Protocol (POP)
TCP IP
File Transfer Protocol (FTP)
Internet Message Access Protocol (IMAP)

The security threats that can be possible in the communication media are the possible software attacks
and the identity theft's along with sabotage and extortion of information.
The security devices that is being used to prevent this security threats are initially using firewall and then
having an device of anti virus along with an anti spyware device which will be helping to prevent such
kind of security threats which usually occur in the communication media where there are lots of devices
and these will help them as they will not allow extortion of information or it’s possible threats.

Conclusions

The devices such as the fiber optic cables worked in this setup of communication media as there were
lots of fire networks and they require its extension to reach to various other networks therefore it was a
need of to build the fiber optic cables throughout the set-up and with the help of this the entire protocol
and the other devices are also working and this help the entire communication media to be of great use
and it also helped in eliminating certain kinds of hazards which take place due to faulty cables. The
limitations of the technologies of the protocols can be given as some of the protocols are directly linked
to transmission whereas some are not linked therefore these are certain and specific drawbacks for the
entire communication media as these protocols will be lowering the efficiency of the devices and that
will make them to be of not that great use and that will cause very less work efficiency in the
communication media. These also help in the connectivity draw packs as it does not result in the ideal
connectivity which has been looked upon by the people and that will be impacting the connectivity
levels. The challenges faced while working with the topology is that there were limited hardware
resources while working with it and there was very lesser applicational patterns as these were also
difficult as there was lesser individual scalability requirements along with lesser administrative effort.

You might also like