Critically Analysing (E)

Candidates who were awarded Excellence commonly:

Drawing insightful conclusions about NETWORK COMMUNICATION PROTOCOLS

To answer a question about drawing insightful conclusions about network communication protocols, while meeting the provided grading criteria above, follow this approach:

1. Recap Key Points:

2. Accurate Conclusions:

3. Link to Earlier Responses:

4. Argument for Validity:

5. Objective Critique:

6. Avoid Postulating New Technologies or Outcomes:

7. Comprehensive Understanding:

8. Recap Insights:

By following this structured approach, you will fulfill the grading criteria by drawing accurate, well-founded conclusions that are deeply connected to your earlier responses and demonstrate your thorough understanding of the subject matter.

Less obvious implications.

A problem of UDP is done incorrectly is that since it has a lack of security protocols it means it could be spoofed easier than some other protocols. One example of such forms of illegal activity is the UDP denial-of-service attack (DDoS) more specifically called a UDP flood. 

Since the UDP does not require a handshake process this means that the hacker can send a great amount of packets to a device to overwhelm it. Leading to a forced “server shutdown” as it can't process that much information quickly.

Therefore, by the creation of a less secure yet faster method of package transfer it also created a breeding ground for exploitation of mechanics.


Possible improvements

A possible improvement of the UDP and TCP protocols would be the creation of something save, reliable, good carrying capacity and that is fast. Realistically speaking this would be almost impossible to achieve with the current technology.

Figuratively speaking we could create a protocol based in UDP in which the header would be heavier, but allowing for a greater security and stability, and the total amount of bytes carried would probably decrease, but if balanced correctly we could find a middle ground where we could have a good reliability and delivery of packets, decent speed and a good amount of bytes stored. This could be used for things that require packets to arrive uncorrupted and in order yet maintaining a relatively good speed.

RESOURCES