Critically Analysing (E)
Candidates who were awarded Excellence commonly:
drew accurate conclusions linked to their earlier responses
argued why their conclusions were valid, true, applicable or correct
drew conclusions that showed the candidate comprehensively understood the area they were discussing
criticised the area objectively
linked their insightful conclusions to their previous answers rather than postulating new technologies, or knowledges, or outcomes, without providing a premise for a train of reasoning.
Drawing insightful conclusions about NETWORK COMMUNICATION PROTOCOLS
To answer a question about drawing insightful conclusions about network communication protocols, while meeting the provided grading criteria above, follow this approach:
1. Recap Key Points:
Begin by summarizing the key points you've discussed earlier regarding network communication protocols.
Briefly touch upon the fundamental understanding of protocols, their relation to people, technical components, and examples provided.
2. Accurate Conclusions:
Draw accurate conclusions based on the information you've presented. For example, you could conclude that network communication protocols are the backbone of modern digital communication, enabling seamless data exchange. Mention how protocols like TCP/IP ensure reliable data delivery, while application-specific protocols like HTTP facilitate various online activities.
3. Link to Earlier Responses:
Explicitly connect your conclusions to the earlier responses you provided.
Explain how your earlier explanations about the technical components of protocols and their human relevance have led you to the conclusions you're drawing now.
Emphasize how these conclusions stem from a comprehensive understanding of the topic.
4. Argument for Validity:
Provide a solid argument for the validity of your conclusions.
Discuss why these conclusions hold true based on the technical intricacies you've covered. For instance, elaborate on how the reliable nature of TCP/IP ensures accurate data transfer, which is vital for critical applications like online banking or telemedicine.
5. Objective Critique:
Offer an objective critique of the area of network communication protocols.
Highlight potential challenges such as security vulnerabilities, scalability issues, or the evolving nature of technology. This demonstrates that your conclusions aren't solely biased towards the positive aspects.
6. Avoid Postulating New Technologies or Outcomes:
Ensure your conclusions are grounded in the information you've already presented, rather than introducing new technologies or outcomes without proper reasoning. For instance, instead of speculating on futuristic protocols, focus on conclusions that directly stem from the discussed concepts.
7. Comprehensive Understanding:
Reiterate how your conclusions showcase your comprehensive understanding of network communication protocols. By connecting all the dots and drawing logical inferences, you demonstrate that you've grasped the topic holistically.
8. Recap Insights:
Summarize the insightful conclusions you've drawn, reiterating their significance in the context of network communication protocols and their impact on technology and society.
By following this structured approach, you will fulfill the grading criteria by drawing accurate, well-founded conclusions that are deeply connected to your earlier responses and demonstrate your thorough understanding of the subject matter.
Less obvious implications.
A problem of UDP is done incorrectly is that since it has a lack of security protocols it means it could be spoofed easier than some other protocols. One example of such forms of illegal activity is the UDP denial-of-service attack (DDoS) more specifically called a UDP flood.
Since the UDP does not require a handshake process this means that the hacker can send a great amount of packets to a device to overwhelm it. Leading to a forced “server shutdown” as it can't process that much information quickly.
Therefore, by the creation of a less secure yet faster method of package transfer it also created a breeding ground for exploitation of mechanics.
Possible improvements
A possible improvement of the UDP and TCP protocols would be the creation of something save, reliable, good carrying capacity and that is fast. Realistically speaking this would be almost impossible to achieve with the current technology.
Figuratively speaking we could create a protocol based in UDP in which the header would be heavier, but allowing for a greater security and stability, and the total amount of bytes carried would probably decrease, but if balanced correctly we could find a middle ground where we could have a good reliability and delivery of packets, decent speed and a good amount of bytes stored. This could be used for things that require packets to arrive uncorrupted and in order yet maintaining a relatively good speed.