StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Evolution of Information Transfer Protocols - Assignment Example

Cite this document
Summary
"Evolution of Information Transfer Protocols" paper states that information transfer has been seen to change and evolve with time. The technologies used for data and information transfer have been seen to evolve with time. The Internet has been seen to catapult the growth of these technologies…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful

Extract of sample "Evolution of Information Transfer Protocols"

Running head: EVOLUTION OF INFORMATION TRANSFER PROTOCOLS Student name: Student number: Course title: Lecturer: Date: Abstract Information transfer has been seen to change and evolve with time. The technologies that are used for data and information transfer have been seen to evolve with time. The Internet has been seen to catapult the growth and evolution of these technologies. Given the fact that file are very vital resources in data communication, it is therefore important that remote access is available to enable file sharing and creation of files remotely. For this reason, there have been developments to make data transfer effective and efficient. The Internet has been seen to be the driver of this evolution. Table of Contents Table of Contents 3 Introduction to file transfer 4 Problems of FTP 4 Drivers of change 5 Security 5 Regulatory compliance 6 New security features of protocols 6 File transfer and mobile computing 7 References 13 Introduction to file transfer Customers, employees, and business partners are required to exchange very vital information over the Internet. For this reason, there is need for organizations to have reliable and efficient information transfer. With the competition being fierce by the day, organizations are gearing up by making sure that they have reliable, safe and efficient data transfer. There is important information that regard the company that need to be exchanged (Simon, 1996). There is need to have reliable, and efficient data transfer so that the organization attains a strategic and tactical implementation of the data and file transfer process. There should be a bid to maintain trust with the partners by ensuring that they get the important updates through sensing the required files and documents as expected. In the whole process, caution should be taken to make sure that the data gets to the right hands so that trust may be maintained. It is then required that organizations should look for a very efficient and reliable data transfer as much as possible. The trust of business partners, loyalty of your customers, and efficiency of the operations of the business will all depend on the strategic implementation of the file transfer process (Simon, 1996). One of the de facto methods of achieving this has been the use of file transfer protocol. This method has been in use for many years. Problems of FTP FTP has been a very simple solution that has been implemented to allow the transfer of information and data between the different entities of a business. Transfer of files over the open Internet has been so popular that it has been estimated that about 83% of business around the world are using this method to transfer data. The use of the Internet to transfer information has been has found universal acceptance (Simon, 1996). Drivers of change Security Security has been found to be a very important issue that should be looked upon in data and information. The specifications that have been specified for FTP initially have had minimal security, if any. As the use of FTP has increased, and the evolution that are seen on the Internet, the security concern of FTP is becoming more and more pronounced (Stallings, 1996). The problem that is found with this method is that it is not regarded as secure. It is only used if the data that is being transferred is not that critical and does not require any form of security; it is hard to find such data with the rate of competition that is seen in the business world. FTP is not reliable when transferring confidential information because there is no effort that has been done that concern security and data management. It is therefore regarded as a weak link. There is no advocacy to use strong passwords as means of authentication. The login credentials are sent in clear-clear text, which makes intruders to have easy access to these credentials and have an easy access to the information that is regarded as confidential (Stallings, 1997). The worst part is the fact that ftps does not encrypt the connection, which is used to send files and information, thus makes the security of the files that are sent to be compromised. Unsecured connections can allow intruders to have access to either information while still in transit or when stored in the server. This is a huge issue of major concern today. Regulatory compliance Another driver of the revolutions that are seen in the data transfer protocol is that of legal requirements. For data to meet the standards that have been set by compliance regulations, they are supposed to be managed in the whole process of file transfer. Organizations are required to protect information from harm whether the data is health records, account information or the intellectual property (Stallings, 1997). There should be audit trails, which should be pursued to confirm that there is safe management of information; this is a requirement that is required by auditors. In such cases, the provisions of FTP are not sufficient as they lack strong data management and monitoring. The whole process of data management is not that secure. This is the reason why the data transfer protocols are improved daily. New security features of protocols One of the most important features and improvements that have been made on the data transfer is that of integrating the security features to protocols. The most important protocols, which have been developed to ensure that there is safe data transfer is Secure Socket Layer (SSL) and Secure Shell (SSH). They have been especially designed to ensure that files are encrypted while they are being transferred on the network. With these protocols, files are securely transferred without any form of interception while they are in the transfer process. Given the fact that the Internet is an open place where this information is sent, there is therefore a need to protect the transfer of such information here (Stallings, 1997). SSL is a set of rules that provide security over TCP/IP networks for communication using cryptographic methodology to also attain data integrity. Cryptography involves encryption and decryption of the information in form of plain text. This protocol therefore can dictate and bring about secure communication between two endpoints such as two computers transacting via the internet. Microsoft, IBM and Netscape are some of the companies using SSL as part of its secure channel. SSL and SET are both implemented over the network model, they provide authentications and confidentiality for information therefore identity and non-repudiation is ensured (Naik, 1998). Data integrity is adhered to since it cannot be altered at storage or during transit. They are both securing protocols used for e-commerce. SSL does not only protect data from access, it also mitigates the attempts to alter the data while they are being transmitted. SSL is integrated into the file transfer protocols to form SFTP (Stallings, 1997). SSH is considered the best protocol that has been developed to enable the attainment of security while data is being transferred. It is deployed in many operating systems. It uses a secure tunneling protocol called Secure Shell 2 (SSH2), which is used to emulate FTP connection, and provides a firewall friendly and encrypted channel that is used for file transfer. It makes use of the popular TCP port 22. The reliability and security of SSH is seen in the fact that the entire session of file transfer is encrypted including the fact that all the commands which are used to get the connection. They are all encrypted to ensure that the connection is attained. At the user end, it is required that one port be opened against two for SSH and FTP. File transfer and mobile computing As more emphasis is given to micro computing, there is a major concern for developments in this field also. It is worth mentioning that mobile computing should be considered as a potential area where attackers will target next. This is so because many smart gadgets are being developed with the advent of information technologies. What with the introduction of PC Tablets, laptops, and palmtops. All these are gadgets that are being used to transfer information in the current organization. Mobility is the overriding factor that is driving the orientation of information transfer using this means. Mobile computing provides exchange of information across the existing networks. This can be referred as Data communication that allows sending and receiving of information. The data being transmitted normally covers a wide range of areas and processes like FT that is the File Transfer, and the link that is provided between the WAN (Wide Area Network), FAX (Facsimiles) WWW (World Wide Web) and electronic mail that are provided in the internet’s websites. It has been easier for information to be mobile through the implementation of mobile phones that have been allowing the users to move from one place to another, conveying their messages to the destined people by talking. The new technology has not only provided communication through the mobile phones but also mobility of data communication through emails, social site, and Skype’s. This has been providing one on one talk making it easier and cheaper as compared to earlier methods of communication. For a network to be reliable, there are things that must be put into consideration such as user anonymity that uses International Mobile Subscriber Identity-IMIS that provides a link with a to the mobile subscriber instead of using the usual phone book that provides the numbers provided. In addition, the user data must be protected by use of form of passwords in order to provide security to the signals transmitting the data. So helps in making the data not to be accessible not just to anyone and to avoid hacking of networks. That is why it is always important to provide the users with an identity in order to make sure that the internet is only accessible to those who have only subscribed it. This is referred to User Authentication. It is also prior to prevent fraud over the internet by protecting unauthorized users that have not paid for it or has no access to the network from impersonalizing it (Stallings, 1997). The secured information needed to provide this protection over the networks is stored in the data bases.fo the immobile station on the network; Home Location Registers are normally used to store the data for these stations. More a times, the information protected is for each mobile station on the subscription levels and the stations that are used as alternatives to offer the services and frequently used Networks. Other kind of information provided by the authentication center is used to protect fraud on the network and those who fail to pay the network charges. There are also other features like the Visitor Location Register that keeps count of the people who have visited a network, their location and the identity of the person who is on the network and who has already been there. This helps to note number of people on the network and to identify their locations and any moment they leave in order to avoid delay on the network by switching immediately when a subscriber leaves or when he has not active. It provides fast access of information on the network and better services (Simon, 1996). It has been also a challenging question that most people have been asking themselves on the application of the mobile computers. What should one consider when buying a mobile computer? Will it give you the services that u wants or will it meet you expectations. Mobile computing is found to be very important when working on the field since one needs to be mobile and so it is. This has also made communication within a business to be effective and smooth running of operations. There are quite a number of importance’s of mobile computers that are described according to the places they are applicable, the people who use them and when they normally use them. Mobile computers can be use for estates Agents in managing their work, whether at home or on the field. This helps them ease their work by just login in and accessing the information on current issues about the real estate management and what is currently happening, they can be able to access this in whatever they are in, at work, at home or out on field with their clients (Pfleeger, & Ch, 1997). This can also be able to respond to the issues arising and provide answers to the questions asked by their customers at that time. When they want to apply for a loan or some financial assistants, it can be easier doing it online by filling the details required for an approval. It has been helpful to the agents since they are not tied up in one location like an office making it possible for them to attend to their business more effectively. Mobile computers have also become very important in emergency services, as it is normally used by hospitals and fire extinguishers, it easier for them to locate the people and the place where help is needed ,this is done by requesting for the address of the location, details about what kind of an accident that has happened in order for them to know that kind of requirements they need to have during the rescue process, such things could be ambulances that needs to be sent over, the number of people required to be on the rescue operation. This is done via the CDPD system by the help of mobile computers (Fellenstein, & Wood, 2000). Defense counsels in courts also find it be easier to deal with matters with the help of their mobile computers .when defending their cases, they need to refer to previous cases that will give the correct information on when the case was done, the date and the year. This also provides them the with the precedent of that case hence making it possible for them to be aware of what happened. This makes the handler of the case to be well informed. Managers have been in a position of being able to keep track of things in the company by using mobile computers. This has helped them to know when they require adding more stock in the business, when they are running out of stock and how much it would cost them to buy more stock. In their manufacturing industries, it becomes easier for them by doing a research on the best raw materials and the suppliers that offer better services to them (Comer, 2006). They can be able to locate their potential customers at their esteemed places this helps them to even provide them with their products through the mails and online presentation. In addition, it has been easier for them to arrange meetings and communicate to their staffs and various departments informing of the time and the date of the meeting. This can also be possible when they need immediate meetings. By using the mobile computers at least, they can be able to get feedback and receive any grievances that the employees might offer. This way the company gets a competitive advantage on the market due to its competitive advantage. Another use of the mobile computing is the control of stock information collation. During the stock counting, it is prior to use a central database that is connected to a central network that can act as the server in sending the information to all other computers on the network. This way there will be no delay in giving the accurate data of the stock and the information will be provided to every client. CDPD network links the data on the mobile computers and the central database (Comer, 2006). The mobile computers do a very quick verification of the credit cards normally used supermarkets and various shops. When the card is passed through the point of sale terminals, the information is sent to the bank computers for verification at the same time a response is given back after verifying. This same thing happens with the visa cards and ATM’s. With the integrated technology of mobile computers, taxis have been made in a way that there is a system gives the details of it whereabouts,this has made it for the cabs business to thrive so well since it gives some seriousness to the drivers by avoiding them from taking the advantage of using the companies car for their own leisure. The mobile computing can also be used for alerting the user when it is low on fuel and even how to measure the amount of fuel to be used in a given period. In case of stealing these cars, it can be easier to track them using the track system in them (Naik, 1998). For the electronic Mail, it has been one of the best ways of receiving and sending mails across the network. It is a feature that is used by many businesses and many people worldwide. This helps also friends, relatives and families to connect to each other and keep in touch. Mobile computing has been helpful to many people since they can learn, and gain knowledge over the internet in whatever places they are. References Comer, D. (2006). Internetworking with TCP/IP: Principles, protocols, and architecture. NY: Prentice Hall. Fellenstein, C., & Wood, R. (2000). Exploring E-commerce, Global E-business, and E-societies. London: Prentice-Hall, Inc., ISBN 0-13-084846-8 Naik, D. C. (1998). Internet Standards and Protocols. Washington: Microsoft Press, ISBN 1-57231-692-6 Pfleeger, Ch. P. (1997). Security in Computing. London: Prentice-Hall, Inc., ISBN 0-13-337486-6 Simon, E. (1996). Distributed Information Systems. NY: McGraw-Hill Publishing Company, ISBN 0-07-709076-4 Stallings, W. (1997). Data and Computer Communications, Prentice-Hall, Inc., ISBN 0-13-571274-2 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Evolution of Information Transfer Protocols Assignment, n.d.)
Evolution of Information Transfer Protocols Assignment. https://studentshare.org/logic-programming/2058747-please-choose-the-appropriate-topic-for-the-essay
(Evolution of Information Transfer Protocols Assignment)
Evolution of Information Transfer Protocols Assignment. https://studentshare.org/logic-programming/2058747-please-choose-the-appropriate-topic-for-the-essay.
“Evolution of Information Transfer Protocols Assignment”. https://studentshare.org/logic-programming/2058747-please-choose-the-appropriate-topic-for-the-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Evolution of Information Transfer Protocols

How to Extract Evidence in Relation to HTTP, FTP, and SMTP Application Layer Protocols

How to extract evidence in relation to HTTP, FTP and SMTP application layer protocols Name Institution Instructor Date Abstract Digital investigation methods are becoming more and more important due to the proliferation of digital crimes and crimes involving digital evidence.... Unfortunately, not only are criminals exploiting this medium to an unprecedented degree but we are now looking at the potential of cyber-warfare or cyber-terrorism who are communicating through these protocols hence need for methods of extracting data from these protocols as a source of evidence....
7 Pages (1750 words) Research Paper

Internet protocol and VoIP security

There are a lots of other protocols which are used in VoIP technology such as UDP etc.... SIP calls can be either established over UDP or TCP protocols.... Presently most of the internet infrastructure supports only best effort service which means there are no guarantees if the information will be delivered....
15 Pages (3750 words) Essay

Network Infrastructure Basics

protocols are sets of standards that facilitate communication between network hosts.... Most protocols are not designed to use independently but with interaction with other independent or complementary protocols (Graziani and Johnson, 2008).... protocols are sets of standards that facilitate communication between network hosts.... Most protocols are not designed to use independently but with interaction with other independent or complementary protocols (Graziani and Johnson, 2008)....
4 Pages (1000 words) Assignment

Design and Implementation of Networking Plan

hapter 2- The Role of Government in the evolution of the Internet; Revolution in the U.... Design and Implementation of Networking PlanA plan to integrate routing protocols into a new network designRouting can be defined as the process of directing data packets from a source to a destination node within different network systems.... nformation to be redistributed between routing protocolsOn a network of a number of routing protocols, rout distribution process is involved to help broaden various sections of network learned routs under the support of configured protocol in sequences adaptable to other segments too within the network system....
2 Pages (500 words) Essay

Transmission Control Protocol and Internet Protocol

In this scenario, some of the well-known applications and services that were supported by these protocols included remote login, file transfer, and electronic mail (email) to a large number of users as well as server systems.... In fact, a number of different systems located in a small building or office can employ TCP/IP (in conjunction with additional protocols) on a single local area network (LAN).... Basically, this is a combination of two protocols, in which the internet protocol (IP) was established to fulfill a need for consistency of distinctiveness....
4 Pages (1000 words) Essay

How Packet Data Travels through the Networks

The paper 'How Packet Data Travels through the Networks' presents the computer system that relies on a set of protocols namely the TCP/IP protocol suite for information exchange, storage, and communication.... This report is intended to provide an insight into how packet data travels through the networks, the role of various protocols, and about various processes that occur within the network.... o organize the networking architecture, the network protocols, and the software and hardware that implement these protocols are organized into several layers called protocol stack (Oracle System Administration Guide: IP Services, 2011....
8 Pages (2000 words) Case Study

File Transfer Protocol

This report "File transfer Protocol" presents the ability of FTP to access files from remote locations is an absolute necessity in this changing business environment.... File transfer Protocol (FTP) is regarded as a standard networking protocol that is utilized for transferring files from a particular host to another host.... The SSH File transfer Protocol (SFTP) is utilized but it is technologically different.... Every other business meeting, conversations, seminars, and conference require access to data and information....
12 Pages (3000 words) Report

Solutions to Performance Problems in VoIP over a Wireless LAN

With the continued adoption of TCP as the most preferred transport layer protocols, studies have continued to assess the effectiveness of other transport layer protocols.... This study has been picked as it assesses the effectiveness of other protocols with regard to TCP.... In particular, it reviews Datagram Congestion Control Protocol (DCCP) to understand how its usage in the carriage of VOIP traffic can rival other protocols....
13 Pages (3250 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us