SlideShare a Scribd company logo
1 of 39
Download to read offline
Essay on NT1210 Labs 3.1-3.4
NT1210 Labs 3.1 to 3.4 3.1.1 What would happen if wireless devices were not governed by the Wi–
Fi Alliance and each vendor had its own standards and protocols? What impact would this have on
your personal life or business communications? Personal information and business will slow down
due to each vendor having its own standards/protocols. It will also be more vulnerable to attacks and
make accessing more difficult. 3.1.2 Give another example of a model that is used to visualize
something that is difficult to observe or perceive. How does the model make it easier to understand?
Another way of displaying information for easier understanding is to use a flow chart. A flow chart
can be used as a step by step guide. 3.1.3 Based on ... Show more content on Helpwriting.net ...
Host A will use application for the OS while allowing the PC to still communicate to other devices.
Transport will control the data sent and received. The network will place IP addresses to the packets
allowing data to be added to the MAC addresses and physical link between host and lines. Exercise
3.2.4 Explain why routing devices do not need the upper layer of the OSI model to route traffic.
What is the highest layer of the OSI model used by the router to decide where to forward traffic?
The first three layers of the OSI is typically what a router needs to route traffic. The first three layer
are physical, data link and network. The highest level the OSI decide where to forward traffic to is
the transport layer which is located in the host layers. Lab 3.2 Review 1. How does the abstraction
of the physical layer facilitate interoperability across networks using different types of physical
wires? IP terminals might be located in different parts of the build making it complex. There are
lines coming in and out of the build that might be different than that issued to a company. To try and
replace one will be complex, confusing and time consuming if unsure. 2. The OSI model is not
directly implemented in networking and often the distinction between the layers will blur in
implementation. Why does it endure despite these
... Get more on HelpWriting.net ...
Lan Topologies
LAN Topologies Jason Smith IT/240 September 7 2014 TAMMY FLEMONS LAN Topologies
Case Project 2–1 You have been hired to upgrade a network of 50 computers currently connected to
10 Mbps hubs. This long–overdue upgrade is necessary because of poor network response time
caused by a lot of collisions occurring during long file transfers between clients and servers. How
do you recommend upgrading this network? What interconnecting devices will you use, and what
benefit will you get from using these devices? Write a short memo describing the upgrade and, if
possible, include a drawing of the new network. This system ought to have a central server that can
control approaching and cordial transmissions. A central server would prevent ... Show more content
on Helpwriting.net ...
After an irregular time interim, the stations that impacted endeavor to transmit once more. In the
event that an alternate impact happens, the time interims from which the irregular holding up time is
chosen are expanded orderly. This is known as exponential once again off. Write a short explanation
(two to three sentences) of each concept and be prepared to discuss it with the class. References
Guide to Networking Essentials
... Get more on HelpWriting.net ...
The Argument Against Gay Marriges
Arguments against gay marriges Though there are differences in the views of different faiths,
conservative Protestants, the Catholic Church, Mormons, traditional Jews, and Muslims share two
fundamental antigay arguments. The first is that homosexuality is wrong because it involves sex that
doesn 't create life. In the case of Judaism, a key Bible passage is the story of Onan (Links to an
external site.), who sleeps with his dead brother 's wife but, to avoid giving his brother offspring,
doesn 't ejaculate inside her. Instead, he "spilt the seed on the ground." God slew him, which some
might view as a sign of disapproval (Links to an external site.).The Catholic catechism decries
(Links to an external site.) homosexual acts because "they close the sexual act to the gift of life."
Early American antisodomy laws discouraged all forms of non–procreative sex (including,
incidentally, heterosexual oral and anal sex). Islam shares a similar view. One Islamic hadith
explains that Allah "will not look at the man who commits sodomy with a man or a woman." But if
non–procreative sex is the issue, society started down the slippery slope not with the recent Supreme
Court ruling but with production of the pill–or, really, even earlier, when birth control became
common. We 've been into the non–procreative sex thing for some time now. Even most religious
conservatives don 't have the heart to go after this. If sex without the possibility of creating life is
wrong, then religious
... Get more on HelpWriting.net ...
Frequent Shopper Program : Technical Specifications
Kudler Frequent Shopper Program – Technical Specifications BSA/385 Linda Modiste Kudler
Frequent Shopper Program – Technical Specifications Kudler Fine Foods (KFF) is a specialty food
store chain with three retail stores in the San Diego, California area. KFF has engaged Smith
Systems Consulting (SSC) to develop their new Frequent Shopper Program (FSP). The FSP will
collect customer–purchasing history and accumulate them as redeemable loyalty points which
customers can use for gift items and other products or services available through external partner
companies. The Sales and Marketing page section of KFF's intranet site describes the strategic plan
for the Frequent Shopper Program. (Apollo Group, 2011). SSC provides information technology
(IT) services and consulting, including developmental solutions, IT integration, system analysis,
design, and implementation. SSC will has submitted a proposal to KFF that details the development
processes for the FSP project. This paper is a technical specification that lists the project's logical
and physical models, including hardware, network, software, database, controls, and other
development related requirements. Logical and Physical Models Logical and physical models
represent the key elements and processes of the software development. The logical model describes
the processes, and data, in as much detail as possible, without giving regard to how the system will
be implemented. Logical data models include
... Get more on HelpWriting.net ...
Effect Of Smoke Regulation On Hospitality Industry
INTRODUCTION:
Scientific research article should be presented as logical arguments and in such a way that sequence
of the article sections will correspond to a model or chain of reasoning that applies to such article
(Krathwohl, 2009, P.62). However, the research article by Hyland, et al (2003) does not seem to
have the framework or follow this model or organized in "chain–of–reasoning sequence/format for
some reasons best known by the authors'. Beside, Krathwohl, (2009) pointed out that this chain–
chain–of reasoning model applies differently to preplanned and emergent studies.
The authors' justification of the need for the study, including the degree to which the authors
synthesized and critically analyzed existing research to show that this study is the next logical step
in the line of research.
Hyland, et al (2003) wanted to carry out this research because they believed that there was gap in
the previous studies which policy makers, tobacco industries and restaurant owners' cite while
making arguments that smoke–regulation in hospitality industry will hurt their business and
decrease revenues. They implied that complicity and conflict of interest between the researchers and
stakeholders in hospitality industry together with tobacco industry might have influenced the
research results which lead to the conclusion that smoke–free regulation in the hospitality industry
will negatively impact their sales and revenues. The authors also suggested that data collection
methods
... Get more on HelpWriting.net ...
The Surf Shoppe
MegaCorp is a rising star in the provisioning of cloud computing services. Its primary offerings are
in the area of infrastructure as a service (IaaS) and it is quickly gaining a very positive national
presence in the IS industry. MegaCorp provides all the standard cloud IaaS offerings, including on–
demand and long–term processing, storage, and virtual machine management systems. MegaCorp is
now considering offering a variety of new services and has decided to set up a dedicated business
intelligence (BI) operation to provide assessments of the marketability and competitive capability of
specific cloud services. Because MegaCorp believes the proper utilization of this BI system will
provide significant competitive advantage, it is willing ... Show more content on Helpwriting.net ...
Setting Active Directory Controls and permissions for Surf Shoppe Staff or set AD security. The
Active Directory is a very useful tool from an end user's perspective, which means that it can
provide various bits of information about each user. This is why we should change permissions
within the AD per Surf Shoppe Staff by their job title, and this will determine who gets what type of
access. (The Surf Shoppe building is a three–story building, with a long–term tenant on the second
floor. You plan to divide the 20 Surf Shoppe staff evenly between the first and third floors, each of
whom requires a secure workstation. You must maintain secure highly available services, between
both the first and third floor staff and the main MegaCorp headquarter building. Briefly explain the
options for providing a link between the floors that will meet the requirement (i.e., provide a list of
the minimum equipment necessary to accomplish this). The Surf Shoppe building is a three–story
building, with a long–term tenant on the second floor. You plan to divide the 20 Surf Shoppe staff
evenly between the first and third floors, each of whom requires a secure workstation. You must
maintain secure highly available services, between both the first and third floor staff and the main
MegaCorp
... Get more on HelpWriting.net ...
Nt1310 Unit 1 Assignment
Unit I Assignment: Open System Interconnection Reference Model
As we all know, the growth of computer networks continues to rapidly grow. The digital revolution
has changed the way we work and communicate almost beyond recognition. Provided that,
foreseeing the changes and potential compatibility problems, in the mid nineteen eighties, the
international standard organization (ISO) developed a networking reference model to standardize
how network systems communicate with each other. It is a logical model for how network systems
are supposed to communicate with each other. It breaks down the different components of the
network communication and puts them into layers which reduce complexity. This reference model
consists of seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer,
Network Layer, Data Link Layer, and the Physical Layer. Each layer provides a service to the layer
above it in the protocol specification and then communicates with the same layer's software or
hardware on other computers. It's important to realize, that these layers are separated into 2 sets:
Transportation Set (Laters 1– 4) and Application Set (Layers 5 – 7). More importantly, the OSI
model is 7 logical ... Show more content on Helpwriting.net ...
The Application layer within the OSI reference model is where the application and the user
communicates. In other words, the application layer is the ending of data that is transferred in visual
form to the user. This layer provides the interface between the applications we use to communicate
and the underlying network over which our messages are transmitted. The Application Layer
functions are to provide the interface for application–specific protocols commonly used such as
HyperText Transfer (HTTP), file transfer (FTP), Simple mail transfer (SMTP), Internet message
Access (IMAP),
... Get more on HelpWriting.net ...
The Basic Characteristics Of Ip V4
Throughout chapters 5 through 8, many topics have been discussed in class and practiced on lab
days. Starting off with chapter 5, OSI Network Layer: various topics are discussed which include; IP
v4, the Network Layer, to routing tables. The basic characteristics of IP v4 are that it is
connectionless, the best effort is unreliable and is unaware of the quality of its job, and it is also
media independent. Time to Live (TTL) is the 8–bit TTL field that describes the maximum hops that
a packet can take before it is considered "lost", which means that the packet is undeliverable. Each
time a packet visits a router, the TTL decreases by 1. If the packet reaches a 0 TTL, it is dropped.
When a packet is dropped this helps the internet ... Show more content on Helpwriting.net ...
The routing table is a table that stores information about connected and remote networks, and it has
three features. The three features of a routing table are 1) destination network, 2) next–hop and 3)
metric. Packets are unable to be forwarded by the router without a route. If a route that is
representing the destination network is not on the routing table, the packet will not be forwarded,
and instead will be dropped. When the router is forwarding a packet, it uses the default route, which
is used when the network is not represented by any other route in the routing table. On the other
hand, static routing is the route that information can be manually configured on in the router. Static
routes are reliable and the router does not need to use much overhead to process the packets that are
being transferred viz static routing. However the static routes do not update automatically, and they
have a higher continuing administrative cost. Dynamic routing was another routing type that was
taught in chapter 5. Dynamic routing is when routers can also learn about routes automatically from
other routers in the same internetwork Dynamic routing has higher router processing overhead but
little administrative cost after initial setup. The following chapter that was taught was chapter 6,
addressing the Network IPv4. There are three types of communication that were talked about at the
beginning of the chapter, Unicast, Broadcast, and
... Get more on HelpWriting.net ...
Support for High-Definition Ip Cameras
Assignment Background Information
DeVry University has decided to enhance security by installing high–definition IP cameras
throughout its campus network. After evaluating different products, the Cisco 4300 Video
Surveillance camera was chosen as DeVry's standard.
DeVry recognizes that the additional camera traffic, along with its management, will require a major
upgrade to the network infrastructure. A phased project was created to enable NETW206 students to
design and implement the network infrastructure within a single session. The four project phases
are:
1. Phase 1 (Weeks 1 – 2): Design Network Switching Infrastructure
2. Phase 2 (Week 3): Standardize Network Configurations
3. Phase 3 (Week 5): Network Assessment
4. Phase ... Show more content on Helpwriting.net ...
In order to select the proper switches key characteristics on which you should focus are:
Port Density
Forwarding Rates
Uplink Rates
Ability to Support PoE (at the access layer) and Link Aggregation (all layers)
When you see the term "segmented" you need to think VLANs and their corresponding IP address
memberships. Be sure that you remember to use routers (or better yet, layer 3 switches) to
interconnect the VLANs.
The implementation of physical redundancy will be described and an overview provided in chapter
1. However, the underlying control structure and loop prevention system STP will not be discussed
in detail until chapter 5. At this point in your design you only need to realize that it is important to
the design. Details of its implementation and configuration will be added to your design later in the
process.
Use the links below, especially the link to datasheets for the cameras to discover the bandwidth
requirements.
Your report should include a list of equipment that you have determined will support the network
requirements as well as a logical diagram showing how the devices are interconnected. Your
diagrams can be created with Microsoft's Visio design package or a similar product.
The following websites are available to assist in your research and design for this
... Get more on HelpWriting.net ...
Security Information Security Plan
Because of the increasing of Cyber–attacks in these days, companies should apply and develop the
information security plan. Not only the large companies but also small companies should think
about the security before facing a lot of issues such as losing data or crashing the system. This paper
will advise some security planning and techniques to assist Voit Tool & Die company strengthen and
improve their security protection plan. 1. Introduction: Security data and information is very
important for any company in the world. Indeed, high technology environment, and organizations
become more and more subordinate on their information systems. The public worry about the
appropriate use of information, specifically personal data. Cybercrime are increasing rapidly. Many
organizations have operations that need to be protected. According to Merriam–Webster Dictionary,
security in general is the quality or state of being secure. Many companies try to secure their
systems and they spend a lot of money for the security. As the result, most company try to define
what they needed. Each security has rules and principle which connect with the protection of the
system. The rules of the security will assist company to decrease the level of the risk. Many
company need to protect their data, system, and hardware. In these days, many companies use a
strong system and update the system each year to secure valuable data. security is to integrate
systems, operations, and internal controls to
... Get more on HelpWriting.net ...
Essay on Renewable Energy: Wind Energy
Chapter 1 Introduction
1.1 Motivation
Recently, wind power has gained greater attention with respect to sources of renewable energy due
to the maturity of the technology and its relative cost competitiveness. Wind power farms (WPFs)
are scattered in remote areas (onshore and offshore) selected by the wind speed, water depth, and
distance to shore. It is important to develop technology to monitor WPFs with higher capacities as
the size and number of wind turbines in a WPF is continuously increasing. In order to provide real–
time control and monitoring, reliable bi–directional communication infrastructure is needed.
According to their needs, most turbine manufacturers have developed their own monitoring and
control systems due to an absence ... Show more content on Helpwriting.net ...
1.2 Scope of the work
The dissertation is divided into three main parts. In the first part, we proposed the hierarchical
communication network architectures that consist of a turbine area network (TAN), farm area
network (FAN), and control area network (CAN) for WPFs. The wind turbines are modelled based
on the logical nodes (LN) concepts of the IEC 61400–25 standard. The WPF communication
network is configured with a switch–based architecture where each wind turbine has a dedicated
link to the wind farm main switch. Servers at the control center are used to store and process the
data received from the WPF. The network architecture is modelled and evaluated via OPNET. We
investigated the end–to–end (ETE) delay for different WPF applications, and our network
architecture is validated by analyzing the simulation results.
In order to meet the growing demand of large–scale WPFs, integration of high reliability, high
speed, cost effectiveness and secure communication networks are needed. In the second part of this
dissertation, we proposed the Ethernet passive optical network (EPON) as one of promising
candidates for next generation WPF. Critical communication network characteristics such as
reliability, mean downtime, optical power budget, path loss and network cost are evaluated and
compared with conventional switched–based architectures for five different architectures.
... Get more on HelpWriting.net ...
OSI Model Essay
OSI Model
Introduction
Successful communication of any type contains four key characteristics. These characteristics
follow: 1. A sender: This is the person who is sending information. 2. A receiver: This is the person
the sender is sending the information to. 3. A common language: If the sender and receiver are going
to understand each other, they will need a common language and protocol, or specific method of
communicating. 4. A common medium: The sender and receiver could choose whether to
communicate in person, by telephone, writing or any other method ... Show more content on
Helpwriting.net ...
For this reason, it is sometimes referred to as the highest level in the model. The application level is
where network requests originate. For example, this is the level where someone using a word
processing program will originate the command to print using a network computer. Thus, the
application level is the link between the user and the network.
Some of the required processes at this level include: 1,2
1. Handling different terminal types and file systems. 2. Identification of the incoming
communication process. 3. Handling general network access, flow control and error recovery.. 4.
Labeling transmitted information by identifying the process, its origin and destination application.
Presentation
The presentation layer is primarily responsible for the format that will be used to exchange data
between two computers.1 In other words, just as the name suggests, this layer makes sure that the
other computers in the network can understand what is being sent.
The major responsibilities of this layer include:
1. Data encryption/decryption to keep unauthorized people from using accessing the data and make
that data available to authorized persons. 2. Data compression/decompression results in faster
transmission by reducing the amount of space the data requires. An example of this is removing
water from coffee, resulting in "freeze–dried" coffee which is easier to
... Get more on HelpWriting.net ...
Open System Interconnection Model Essay
Open System Interconnection Model OSI is short for Open System Interconnection, which is an ISO
standard for worldwide communications that defines a networking framework for implementing
protocols in seven layers. History and Reasoning for… –––––––––––––––––––––––––– The early
development of networks was disorganised. And by the early 80's there was a great increase in the
number and size of networks. Companies started to realise how useful networks could be and started
to add and expand networks as quickly as new network technologies were introduced. But by the
mid 80's the companies start to experience problems as it was found that it was difficult to exchange
information ... Show more content on Helpwriting.net ...
It gave creators of networks a set of standards that ensured greater compatibility among various
network technologies produced by companies around the world. The OSI reference model has
become the primary model for network communications and is considered the best tool available for
teaching people about sending and receiving data on a network. The 7 Layers Of the OSI
––––––––––––––––––––––– The OSI reference model is a framework that is used to understand
how information travels throughout a network. This model explains how packets travel through the
various layers to another device on a network, even if the sender and destination have different types
of network media. In the OSI reference model, there are seven numbered layers, each of which
illustrates a particular network function. Layer 7 is the Application Layer…This layer supports
application and end–user processes. Layer 6 is the Presentation Layer…This layer provides
independence from differences in data (e.g., encryption) by translating from application to network
format, and vice versa. Layer 5 is the Session Layer…This layer establishes, manages and
terminates connections between applications. Layer 4 is the Transport Layer…This layer provides
transparent transfer of data between systems, or hosts, and is responsible for end–to–end error
recovery and
... Get more on HelpWriting.net ...
Designing A Computer Network -such
There are many things to consider when designing a computer network –such as costs of
components, software and labor; communication, cohesion, expandability and many others.
However, the end goal in such an enterprise is to have a fully functional, harmonious, and cohesive
tiered system where duties and actions are divided, and delineated accordingly. One of the major
network architectures used to facilitate this process is known as the TCP/IP Protocol Suite. The
TCP/IP Protocol Suite was designed by scientists in the effort to support a new type of network
known as the ARAPNET that was being installed across the US in the late 60's to 70's. (White,
2013, p. 15) The challenge was to create an open system whereby all networks could freely
communicate with each other. The design was based on a layered system whereby the user would
connect at the topmost (or application) layer, while at the same time being removed or separated
from the lower (physical) layer. Although the number of layers is not exactly set, depending on the
source this number can range between five and seven layers, with each layer providing services to
the layer above it. For the purposes of this discussion however, we will address the five layer model.
The five layers of the TCP/IP Protocol Suite are: Application, Transport, Network, Network Access
(or Data Link), and Physical. (White, 2013, p. 15) Application This layer supports all of the
applications on the network. Some of the most frequent
... Get more on HelpWriting.net ...
Nt1310 Unit 3 Data Analysis Essay
1. What is the primary difference between a 3G UMTS core network and a 4G LTE core network?
Answer in one or two sentences. Ans. The 3G UMTS systems have two logical entities – the Node–
B (the radio base station) and the Radio Network Controller (RNC) while the 4G LTE systems have
only one logical node – the evolved Node–B (eNode–B). 2. What are the components of E–
UTRAN? Very briefly describe the functions of each component. Ans. E–UTRAN is the Evolved
Universal Terrestrial Radio Access Network. The E–UTRAN consists of UE and eNode–B. UE: The
mobile terminal. eNode–B: The eNode–B is additionally called the base station which disengages
the air interface protocol and it is the first contact point for the UE. The eNode–B is the main
intelligent hub in the E–UTRAN, so it incorporate some capacity beforehand characterized in the
RNC of the UTRAN, for example, uplink and downlink dynamic radio resource management and
data packet scheduling, and mobility management. 3. What are ... Show more content on
Helpwriting.net ...
The functions for supporting the control plane is integrity protection and ciphering. For the user
plane PDCP offers ciphering, header compression and reordering and retransmission during
handover. Radio Link Control (RLC): The RLC (Radio Link Control) layer is responsible for
delivery of upper layer SDUs. RLC can work in 3 different modes, depending on the requirement of
the data to be transported; Transparent Mode (TM), Unacknowledged Mode (UM) and
Acknowledged Mode (AM). AM has functions for retransmission of erroneous received PDUs. The
RLC working in UM or AM also has functions for segmentation and concatenation of SDUs sent
over the LTE air interface. For received PDUs RLC support functions for re–ordering, duplicate
detection and
... Get more on HelpWriting.net ...
7 Layers Of The OSI Model
OSI Layers The OSI model shows how the hardware and software function together in order to
enable communication between the computers. The OSI model is basically a framework of how the
device operate on the network. Assume that user 'A' sends data to user 'B' through internet, the data
has to travel the network to reach user B computer. During the data transfer, the data has to navigate
through many intermediate nodes. To ensure the data transfer from user A to user B correctly and
securely, so we need protocols to guide these data. These group of protocols are called
communication model. OSI model is one of the communication model. Open System
Interconnection (OSI) is made up of 7 layers, each layer has their own unique functions and
protocols. Control is passed from one layer to another layer, start at application layer which is layer
7 to physical layer which is layer 1. The framework for the OSI model is design of network systems
that ... Show more content on Helpwriting.net ...
The transport layer also able to specify a service address to identify the source or the destination
computer to specify the application that the request came from and where it is going to. In the
proposal situation, there will be many network application which is running on a computer
simultaneously, so there will be a mechanism which helps identify the application that needs to
receive the date. All incoming data are multiplexed at the transport layer and then sent to the bottom
layer. The data which is received from the bottom layer will then de–multiplexed at the transport
layer and be transported to the correct application by using the Port numbers. Port numbers are to
identify the original network of the application and the source so as the destination of the network
application on the receiving
... Get more on HelpWriting.net ...
Essay on Security and the OSI Model
Abstract The Open Systems Interconnect (OSI) model is a standard reference model for the
communication between two end users. Seven different layers make up the OSI model: physical,
data link, network, transport, session, presentation, and application. This paper will cover the type of
security that is associated with each level of the OSI model. Physical Layer The physical layer is
where the actual communication occurs between devices. The security of the physical layer pertains
to the actual hardware. The vulnerabilities of the physical layer include: • Power outage •
Environmental control loss • Hardware theft, damage or destruction • Unauthorized hardware
changes (i.e.; removable media, data connections) • Detachment ... Show more content on
Helpwriting.net ...
• Switches could flood all traffic to the VLAN ports and not forward to the proper port. This could
result in data being intercepted by any device that is connected to the VLAN. • Stations could be
force direct communication with other stations which ends up bypassing subnets and firewalls. •
Weak authentication and encryption on a wireless network could allow for unauthorized connections
to the network, data and devices. Data link layer controls can be implemented to ensure the security
of the transmissions. By using MAC address filtering the stations are identified by not only the
MAC address but are cross–referenced with the logical access or physical port. Firewalls should be
between layers, ensuring physical isolation from one another. Wireless application must be
monitored consistently and carefully for unauthorized access. In order to secure the wireless
network, the use of the built–in encryption, authentication, and MAC filtering must be implemented
with strong passwords. Network Layer The third layer of the OSI model is the network layer. This
layer is responsible for end to end packet delivery. The network layer issues request to the data link
layer and responds to requests from the transport layer and issues requests to the data link layer. The
procedural and functional process of sending different
... Get more on HelpWriting.net ...
Internal And External Locus Of Control
In the context of locus of control, internal and external locus of control are two characteristics that
influence students' success and failure. Those characteristics have been explained by some experts
and there are some comparisons which have been done related to the aspects of internal and external
locus of control. Obviously, there is no specific hypothesis related to aspects of locus of control, but
Burger (1983:76) categorizes three factors as the aspects of locus of control: perception of internal
control, perception of controlled by powerful others, and perception of chance. However,
Gihonsooly and Sihirvan (2011:240) have summarized some researches about locus of control
related on individuals behavior in some aspects such as anxiety, academic procrastination and so on
in table 5 below:
Those comparisons above represent the three aspects of locus of control; perception of internal
control, perception of LOC that is controlled by powerful others, and perception of chance, which
can be differentiated into 5 sub–aspects such as ability, responsibility, change, environment and
stress (student's stress). Those sub–aspects above will be the indicators of locus of control. ... Show
more content on Helpwriting.net ...
Thus, it can be summarized that locus of control is divided into two main aspects namely internal
locus of control and external locus of control. Internal locus of control can be influenced by some
factors such as ability, responsibility and effort, while external locus of control can be influenced by
change, environment and stress (students'
... Get more on HelpWriting.net ...
Seven Layers in the OSI Model
1. This class made me learn quite a lot. Though it was a course I have done in my under graduate,
this class helped me to learn more about the networking. The class was interactive and fun, the lab
sessions were very helpful. The project was one of the best parts of the whole course. It made me
look into and study about various new protocols in networking and finally I could get an idea on
how I could design a protocol by myself. The most important thing I learnt in this class is the
detailed functions and uses of every later in the OSI model, and I also realized that TCP is the most
important protocol of all that I learnt. It is very reliable and provides acknowledgement, and is a full
duplex process. It provides congestion control and flow control and is also a connection oriented
service. On an overall this class made me learn a lot that would always be very helpful to me. 2. The
seven Layers in the OSI model are Physical Layer, Link Layer, Network Layer, Transport Layer,
Session Layer, Application Layer and the presentation Layer. Each layer has a specific function to
perform and consist of different protocols. Physical layer is the lowest one and handles transmission
and reception of messages over the medium. Then comes the link layer , it allows error free
transmission of the data frames in the physical layer. The network layer takes care of processes like
routing, traffic control and fragmentation of the data. The next one is the transport layer, it takes
care of the
... Get more on HelpWriting.net ...
OSI MODEL Essay
Michael Rauseo IT310
OSI Model
In the early years of computer and network research and development many systems were designed
by a number of companies. Although each system had its rights and were sold across the world, it
became apparent as network usage grew, that it was difficult, to enable all of these systems to
communicate with each other.
In the ... Show more content on Helpwriting.net ...
It determines which physical path the data takes, based on the network conditions, the priority of
service, and other factors.
The network layer provides the following functions.
– Transferring the frame to a router if the network address of the destination does not indicate the
network to which the station is attached
– Controlling subnet traffic to allow an intermediate system to instruct a sending station not to
transmit its frame when the router's buffer fills up. If the router is busy, the network layer can
instruct the sending station to use an alternate destination station.
– Resolving the logical computer address with the physical network interface card address.
– Keeping an accounting record of frames forwarded to produce billing information
Transport Layer
The transport layer makes sure that messages are delivered in the order in which they were sent and
that there is no loss or duplication. It removes the concern from the higher layer protocols about data
transfer between the higher layer and its peers. The size and complexity of a transport protocol
depends on
... Get more on HelpWriting.net ...
The Purpose Of An OSI Model
What is the purpose of an OSI model? The purpose of an OSI model is a standard that was created
for networks to share information. This standard governs the way information is transmitted over
different networks. The model also sets guidelines to those in the manufacturing industry that create
and develop software and hardware that are all compatible with each other.
This paper will discuss and describe the 7 layers of the Open System Interconnection model (OSI
model) and the layers of the Transport Control Protocol/Internet Protocol model (TCP/IP model),
and explain the similarities and differences of each model.
The 7 layers of the OSI model consist of: The Application layer (layer 7), The Presentation layer
(layer 6), The Session ... Show more content on Helpwriting.net ...
The Transport layer
Transport layers exist in both TCP/IP and OSI model. Even though both models have Transport
layers they differ. The TCP/IP model consist of two standard transport protocols: Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP). TCP uses a reliable data–stream
protocol which is connected oriented and UDP uses a unreliable data–stream protocol which is
connectionless oriented.
The Internet layer
The Internet layer is a group of protocols and specifications that are used to transport packets from
the host across a network, the host specified by a network address (IP address)
The Link layer
The lower level layer of the TCP/IP model, this layer is used by a suite of protocols for the
"Internet". This is used to connect hosts or nodes to a network. This layer is compared to the "Data
Link" layer and "Physical " layer of the OSI model.
TCP/IP Application Layer VS OSI Application, Presentation and Session layer.
The similarities in both models are comparable but different at the same time. All though they exist
in both, the approach each uses to construct applications is different. In the OSI model the
Application layer, Presentation layer and Session layer correspond to the Application layer of the
TCP/IP model. They somewhat do the same job but use different protocols, TCP/IP uses: FTP,
SMTP, TELNET, DNS and SNMP where the OSI model uses: FTAM, VT, MHS,
... Get more on HelpWriting.net ...
Describe The 7 Layer Osi Model Of Communication Layers?
1. Describe the 7 layer OSI model of communication layers? Discuss Each Layer in detail. OSI
stands for Open Systems Interconnection; it is a reference model that provides a basis for
interconnection of systems. It is an overall framework that forms the basis to define protocols. [1]
OSI consists of 7 layers that can be divided into three subgroups; network support layers, user
support layers, and layer 4 which links the upper and lower layers. The network support layers help
in moving data from one device to another by taking care of physical connections, physical
addressing, electrical specification, transport timings, etc. The user support layers help in
interoperability among software systems that are different from each other. [1] Each layer is
discussed in detail below. Layer 1 is the Physical Layer; it receives data from the data link layer, and
deals with the physical and electrical specifications of the interface and the medium. It transforms
the bits into signal, i.e., how the 0's and 1's are to be encoded for transmission over the physical
medium. It defines the data rate or transmission rate of the bits. Its duty is to synchronize the
transmitter and receiver clocks. It defines the physical topology, i.e., how the devices are connected,
viz., mesh, star, ring, or hybrid. Line configuration, either point–to–point or multipoint
configuration of the devices is this layer's responsibility. It is concerned with the mode of
transmission; simplex, half duplex, or full
... Get more on HelpWriting.net ...
King Nebuchadnezzar II Of Babylon
Since the BC era, people have believed they are safe from harm. King Nebuchadnezzar II of
Babylon felt secure behind the walls that surrounded his city. He'd often feast while the Persian
army tried to destroy his city. The Persians once entered by wading along the riverbed that ran into
the city. King Nebuchadnezzar II didn't think that his city's water supply would become a threat to
his kingdom (Shenk, 2013). The river caused a weakness among the city and the Persians were able
to find it. King Nebuchadnezzar II had paid for this mistake and was killed by the Persians.
Technology has it's own walls to protect it from harm. We create layers of security, such as
antiviruses to protect it from harm. Unfortunately, there are weaknesses just like Babylon had. ...
Show more content on Helpwriting.net ...
There are always weaknesses in the walls and if an attacker is persistent, many times they can get
through it. Malicious people attack web applications, operating systems and go deeper into your
hardware to harm it (Shenk, 2013). Malicious people send viruses that can often be sent through
emails or even advertisements. Sometimes clicking on links that aren't legit harms a device. Most
attackers are able to get through the network security because of the person operating the device.
Sometimes clicking on links that aren't legit harms a device. The people using the devices are at
fault because they shouldn't feel secure with their malware. King Nebuchadnezzar II was too
comfortable with his wall (Shenk, 2013). We start to feel secure when layers are built because we
believe it can fully stop the problems, however, it's not made to eliminate the problem for good. In
modern day society, we have built seven layers of security to help eliminate attackers from harming
... Get more on HelpWriting.net ...
Osi Model
Michael Rauseo IT310 OSI Model In the early years of computer and network research and
development many systems were designed by a number of companies. Although each system had its
rights and were sold across the world, it became apparent as network usage grew, that it was
difficult, to enable all of these systems to communicate with each other. In the early 1980s, the
International Organization for Standardization (ISO) recognized the need for a network model that
would help companies create common network implementations. The OSI reference model, released
in 1984, addresses this need. The OSI reference model became the primary architectural model for
communications. Although other architectural models have ... Show more content on
Helpwriting.net ...
For a reliable network layer a minimal transport layer is required. Functions of the transport layer
include the following. – Accepting messages from the layer above and, if necessary, splitting them
into frames – Providing reliable, end–to–end message delivery with acknowledgments – Instructing
the transmitting computer not to transmit when no receive buffers are available – Multiplexing
several process–to–process message streams or sessions onto one logical link and keeping track of
which messages belong to which sessions Session Layer The session layer establishes a
communications session between processes running on different computers, and can support
message–mode data transfer. Functions of the session layer include: – Allowing application
processes to register unique process addresses. It provides the means by which these process
addresses can be resolved to the network–layer or data–link–layer NIC addresses, if necessary. –
Establishing, monitoring, and terminating a virtual–circuit session between two processes identified
by their unique process addresses. A virtual–circuit session is a direct link that seems to exist
between the sender and receiver• Delimiting messages, to add header information that indicates
where a message starts and ends. The receiving session layer can then refrain from indicating any
message data to the overlying application until the entire message has been received. – Informing
the
... Get more on HelpWriting.net ...
Difference Between Ethernet Frames And VLAN Tagging
Ethernet Frames & VLAN tagging
Inside of 802.1Q each VLAN frame is differently identified in comparison to common Ethernet
frames with what is known as a 4–byte VLAN tag on the Ethernet header. An Ethernet Frame
equates to being computer data packets that are broadcast as links then converts into a frame once
shipped. Each Ethernet Frame consists of a destination or source MAC address then payload data
relating to its type of Protocol e.g. Email Protocol, then lastly goes through a cyclic redundancy
check to distinguish any corruption of data. Additionally, we come across The Tag Protocol
Identifier which is assigned to 0×8100 to give the receiver permission to locate the supplemental
header. There is also the Priority Code Point ... Show more content on Helpwriting.net ...
The ISL has power to host up to 1000 VLANs although 802.1q can enforce up to 4096. (Cisco,
2006)
802.2 Logical Link Control
Moreover, the logical link control sublayer of layer 2 is the OSI model. It is surprising that Ethernet
functions near the top of the first two layers within the OSI model, these are the Physical and the
Data Link layers. Furthermore, the Data Link layer in Ethernet separates into two different layers
named as the LLC (Logical Link Control) and MAC (Mac Address Control) layers. LLC is relied
upon for the basis of communicating data through multiple end user systems over a LAN via a
MAC link. A major benefit of LLC is its ability to initiate addresses and data link control by
accepting data from the higher layers in the OSI model that are TCP/IP in order for effortless and
problem free transportation on a network. There are other benefits which would give assistance to
Chipset as it enforces successful control of flow, media exchange and attention to tracking. (Geier,
2002)
HSRP – Hot Standby Router Protocol*
In order to reach high network uptime networks can implement HSRP from Cisco to enable network
redundancy towards IP networks. This can be in place so that traffic from users is efficiently dealt
with straight away and the network can first hop failures from network devices.
... Get more on HelpWriting.net ...
Advanced Research Project Agency ( Arpa ) Of Defense ( Dod...
1. Introduction With the advanced in the field of computer networking and to compete with the ever
increasing internet technology, it becomes highly important to study and understand the basic theory
and concept behind this technology. Advanced Research Project Agency (ARPA) Depart of Defense
(DoD) and International Standard Organization (ISO) are the organizations which introduces us to
the two main protocol standards use for communication. This paper briefly explains the key aspects
of these two well known protocol suites namely; Open source Interconnection (OSI) and
Transmission Control Protocol/Internet Protocol. The former is also called as Basic Reference
model or the OSI model consisting of seven different layers where each layer ... Show more content
on Helpwriting.net ...
Moreover, it becomes easy to understand the network process as it can be explained through seven
different steps. It is important to note that each of these layers is inter related and acts as a support
for the respective upper layers. Below is the diagrammatic representation of the seven different
layers of the OSI model. Figure 1: OSI Model As shown in the above figure 1, these seven layers
can be segmented into two groups namely; Upper Layers and Lower Layers. Upper layers
comprises of top three layers such as Application, Presentation, and Session whereas lower layers
comprises of remaining layers such as Transport, Network, Data Link and Physical. In general, the
upper layers are mostly software programs running on a computer or some hardware device which
interacts with the user and are primarily concerned with implementing the application running over
the network whereas the lower layers are mostly hardware at physical layer and steadily involves
software as it moves closer to network layer and it mainly takes care of data formatting, data
encryption and data transmission over the network. 2.1. OSI Layering Layer 1 – Physical Layer It is
the bottom layer of the OSI protocol stack as shown in figure 1. It is termed as "physical", mainly
because it facilitates physical or hardware medium for sending and receiving data on a network. It
helps interconnect
... Get more on HelpWriting.net ...
The Media Access Control System Essay
This layer conveys the bit stream – electrical impulse, light or radio signal – through the network at
the electrical and mechanical level. It provides the hardware means of sending and receiving data on
a carrier, including defining cables, cards and physical aspects. Data Link (Layer 2) At this layer,
data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and
management and handles errors in the physical layer, flow control and frame synchronization. The
data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the
Logical Link Control (LLC) layer. Network (Layer 3) This layer provides switching and routing
technologies, creating logical paths, known as virtual circuits, for transmitting data from node to
node. Routing and forwarding are functions of this layer, as well as addressing,internetworking,
error handling, congestion control and packet sequencing. Transport (Layer 4) This layer provides
transparent transfer of data between end systems, or hosts, and is responsible for end–to–end error
recovery and flow control. It ensures complete data transfer. Session (Layer 5) This layer
establishes, manages and terminates connections between applications. The session layer sets up,
coordinates, and terminates conversations, exchanges, and dialogues between the applications at
each end. It deals with session and connection coordination. Presentation (Layer 6) This layer
provides independence from differences
... Get more on HelpWriting.net ...
Rational Choice Theory Research Paper
Why do people commit crimes? Some individuals only commit one crime and learn their lesson,
others however become repeat offenders. In the scientific study of criminology, one gains an
understanding of why a person commits a crime, and one can develop ways to control crime or
rehabilitate the criminal. Criminology is guided by dozens of existing theories, some more
distinguished than others.
The rational choice theory of criminology says that people make logical choices about under what
circumstances to commit crime. Rational choice theory originated during the late 18th century with
the work of Cesare Beccaria. The rational choice perspective has been applied to a wide range of
crimes, including robbery, drug use, vandalism, and white–collar
... Get more on HelpWriting.net ...
BSA 385 Week 3 Individual Assignment Essay
Technical Article Document: Frequent Shopper Program BSA385 Frequent Shopper Program:
Technical Article Document Kudler Fine Foods (KFF) is a specialty food store chain in California.
Smith Systems Consulting (SSC) was contacted by KFF to develop a Frequent Shopper Program
(FSP). The FSP will be able to monitor client purchasing history and accumulate the history as
redeemable loyalty points which clients can use for gift items and other products or services
available through external partner companies. The Sales and Marketing page section of KFF's
intranet site describes the strategic purpose of the FSP. SSC will provide IT services and of course
consulting. Some other things would be developmental solutions, strengthening, ... Show more
content on Helpwriting.net ...
Figure 3 Logical Data Flow Diagram for FSP Redemption Process Figure 4 Physical Model of
Frequent Shopper Program Hardware The hardware requirements are crucial to the system
development, consisting of physical servers and other peripherals. These components are the legs
and limbs of the system. The hardware section of the system will accept input, and process the input
in a way specified by the design, and returns an output (Blundell, 2008). Centralized Data
Management System and Database Server Hardware – This will be the central server in which data
gathered by the tracking software will be uploaded to and downloaded from. All locations will have
access to this hardware to share valuable customer information. This server will be used for
customer data verification as well. It will also be the central sever in which data such as rewards
program, points, purchases will be stored. The local database servers will have an Intel i5 processor,
8GB of RAM, and 2TB of storage to handle all the extra load and processing, while the central
database server will have 4TB of storage. Backup Servers – Each location will have a local backup
storage to ensure that customer information is safe, and can be retrieved in case of connectivity
issues such as broadband connection problems. Backup servers will only need little processing
power so an Intel Core 2 Duo will
... Get more on HelpWriting.net ...
Network Advantages And Disadvantages
A network is a group of computers and other devices (such as printers,phones,or a television) that
are connected by some type of transmission media. A network can be two computers connected by a
cable in a home office or as large as several thousand computers that are connected across the
world. Networks has two fundamentals known as the peer–to–peer and client/server. In a peer–to–
peer network, every computer can communicate with each other but no computer has more power
than another. Every computer is capable of sending and receiving information to and from every
other computer. They are simple to configure and they are often less expensive to set up. The
downside is that they are not flexible and they are not necessarily secure. Client/server network is
sometimes used to refer to the design of a network in which clients rely on servers for resource
sharing and processing. This network share some common elements, including clients, servers,
workstations. Clients take on the form of personal computers also known as smartphones and
workstations . A network that uses server to enable clients to share data is known as a client/server
network. A model that was use to understand and develop computer–computer communications over
network is known as OSI (Open Systems Interconnection) which is a model that divides network
communication into seven layers: Physical, Data Link, Network, Transport, Session, Presentation,
and Application. At each layer, protocols perform services
... Get more on HelpWriting.net ...
Advantages And Disadvantages Of Network Virtualization
.2 Network Virtualization
In computing, network virtualization is the process of combining hardware and software network
resources and network functionality into a single, software–based administrative entity, a virtual
network. Network virtualization involves platform virtualization, often combined with resource
virtualization.
Network virtualization is categorized as either external virtualization, combining many networks or
parts of networks into a virtual unit, or internal virtualization, providing network–like functionality
to software containers on a single network server.
In software testing, software developers use network virtualization to test software under
development in a simulation of the network environments in which the software ... Show more
content on Helpwriting.net ...
Obviously, we may utilize PVST or MST to give an unpleasant sharing of burden by part the
crossing tree inclinations for distinctive VLANs, however the outline still doesn't change generally
speaking. I've discussed this in East West and North South systems outlines. The fundamental point
is that there is a LOT of data transfer capacity that is never equally used – and that implies
squandered power, space and cooling (which cost more than the gear itself). When you move to a
Layer 2 MultiPath system, the intention is to evacuate the unused switches in your system and
expand the usage of every one of your benefits. This can be most successfully done by disposing of
the appropriation layer. Cisco FabricPath is a Cisco NX–OS programming development joining the
fitting and–play straightforwardness of Ethernet with the unwavering quality and adaptability of
Layer 3 directing. Utilizing FabricPath, you can construct exceedingly adaptable Layer 2 multipath
systems without the Spanning Tree Protocol. Such systems are especially suitable for extensive
virtualization organizations, private mists, and elite registering (HPC) situations. "Cisco turned on
yet another new component in the Nexus 7000 stage that essentially dispenses with the old and all
around sent crossing tree convention from system outlines, consequently empowering much bigger
... Get more on HelpWriting.net ...
Cis 333 Final Term Paper
Technical Project Paper: Information Systems Security
Information Systems Security
Haseeb Ahmed Khan
Mark O'Connell
CIS 333 Fundamentals of Information Security
March 12, 2012
Abstract
In today's IT world every organization has a responsibility to protect the information and sensitive
data they have. Protecting data is not only responsibility of security and IT staff but every individual
is involved in protecting the information. The risks to information security are not digital only, but it
involves technology, people and process that an organization may have. These threats may represent
the problems that are associated to complex and expensive solution, but doing nothing about these
risks is not the solution.
The case we ... Show more content on Helpwriting.net ...
(Georgia Institute of Technology).
As we read in the book, vulnerabilities are found in all seven domains of the network: * User
Domain: * Lack of awareness of security policy * Accidental acceptable use policy violation *
Intentional malicious activity * Social engineering * Workstation Domain: * Unauthorized user
access * Malicious software introduced * Weaknesses in installed software * LAN Domain *
Unauthorized network access * Transmitting private data unencrypted * Spreading malicious
software * LAN–to–WAN Domain * Exposure and unauthorized access of internal resources to the
public * Introduction of malicious software * Loss of productivity due to Internet access * WAN
Domain Transmitting private data unencrypted * Malicious attacks from anonymous sources *
Denial of Service attacks * Weaknesses in software * Remote Access Domain * Brute–force attacks
on access and private data * Unauthorized remote access to resources * Data leakage from remote
access or lost storage devices * System/Application Domain * Unauthorized physical or logical
access to resources * Weaknesses in server operating system or application software * Data loss
from errors, failures, or
... Get more on HelpWriting.net ...
Unit Sd 119465 Assessment Feedback
Assessment Feedback Candidate name: ID no: Date of assessment: Assessor name: Reg no: Specific
Outcome Write/present/sign texts for a range of communicative contexts Unit Std 119465 Credits: 5
Assessment Criteria Evidence Page No C/NYC Comments SO 1 Write/sign for a specified audience
and purpose 1. The purpose for writing/signing, the target audience and the context are clear in
relation to the learning task or activity 2. The text–type, style, and register selected are appropriate
to audience, purpose and context 3. Language appropriate to socio–cultural sensitivities is selected
and used in an appropriate manner without compromising own values or arguments 4.
Writing/signing is well–structured and conveys its message clearly 5. Critical
... Get more on HelpWriting.net ...
Changing The Physical Layer
The physical layer specifics the function details for initiating, keeping up and turning off the
physical link when moving the bits of data over the physical media such as copper, fibre or wireless.
So it will takes your data bits of ones and zeros covert them to what is needed to transfer over that
type of media so for example change bits into electrical signals for copper cables then will covert it
back to ones and zeros once it reaches its destination to send up OSI model layers.
When changing the bits so they can be sent over different types of media this is known as signalling.
Signalling will change the bits to what it needs to be for transmission then is read by the connections
at the other end.
Protocols of the physical layer ... Show more content on Helpwriting.net ...
If there is a difference a CRC frame error is generated to state there is a corruption either on the
sending device side or the destinations device packet transmission.
For detecting and troubleshooting these issues use the different types of show commands such as
show interface and show spanning–tree.
The data link layer is responsible for controlling access to the media and formatting the data for
transmission for going across the physical network link. So it encapsulates the packets from the
network layer to suitable frames for the network media to use for transferring data frames from one
place to another error free. The addressing used at this layer is physical addressing also known as
mac addressing which is how devices are addressed at this layer instead of IP addressing. The data
link layer also does error detection at this layer as well.
The data link layer has two sub layers which are logical link control and Mac. The logical link
control sub layer gives flexibility in services to the layers above so it will let the data link layer
known what to do with a packet when gets a frame. This works by it will check the header to
establish that the packet inside the frame it received is destined for the network layer. The MAC sub
layer keeps a table with the mac addresses of the devices because each device must have a unique
Mac to be identified on the network.
At the data link layer you also
... Get more on HelpWriting.net ...
Essay about Week 2 Assignment Lan Topology
Case Project 3–1
Old–Tech Corporation has 10 computers in its main office area, which is networked in a star
topology using 10 Mbps Ethernet hubs, and wants to add five computers in the manufacturing area.
One problem with the existing network is data throughput. Large files are transferred across the
network regularly, and the transfers take quite a while. In addition, when two or more computers are
transferring large files, the network becomes unbearably slow for users. Adding the manufacturing
computers will only make this problem worse and result in another problem. Because the ceiling is
more than 30 feet high, there's no easy way to run cables to computers, and providing a secure
pathway for cables is next to impossible. Devise a ... Show more content on Helpwriting.net ...
Because of a staggering influx of Internet business, the network administrator's task is to boost
network performance and availability as much as possible. The company also wants a network
design that's easy to reconfigure and change because workgroups form and disband frequently, and
their membership changes regularly. All computers must share sensitive data and control access to
customer files and databases. Aside from the customer information and billing databases, which run
on all servers, employees' desktop computers must run standard word–processing and spreadsheet
programs. Use the following write–on lines to evaluate the requirements for this network. After you
finish, determine the best network topology or topology combination for the company. On a blank
piece of paper, sketch the network design you think best suits EBiz.com's needs. Remember: High
performance and easy reconfiguration are your primary design goals!
What type of topology should be used in this network?
A Logical Topology should be used in this network because you could link the hub wirelessly to
each server that could bridge off to other PCs with all the files needed from the servers. Not to
mention you'll be able to link a new network and also remove a network if it's not needed.
Will the network be peer to peer or server based?
The network that I devised is both a peer to peer and a server based network. Reason
... Get more on HelpWriting.net ...
Nt1310 Data Link Layer
The Data link layer [also called layer 2] is responsible for moving a message from one computer or
network device to the next computer or network device in the overall path from sender or receiver. It
controls the way messages are sent on the physical media. Both the sender and receiver have to
agree on the rules or protocols that govern how they will communicate with each other. A data link
protocol determines who can transmit at what time, where a message begins and ends, and how a
receiver recognizes and corrects a transmission error.
The data link layer performs two main functions, and therefore is often divided into two sublayers.
Logical link control [LLC] sublayer – The first sublayer is the data link layer's connection to the
network layer above it. At the sending computer, the LLC sublayer software is responsible for
communicating with the network layer software ... Show more content on Helpwriting.net ...
The MAC sublayer software at the sending computer controls how and when the physical layer
converts bits into the physical symbols that are sent down the circuit. At the receiving computer, the
MAC sublayer software takes the data link layer PDU from the LLC sublayer, converts it into a
stream of bits, and controls when the physical layer actually transmits the bits over the circuit. At
the receiving computer, the MAC sublayer receives a stream of bits from the physical layer and
translates it into a coherent PDU, ensures that no errors have occurred in transmission, and passes
the data link layer PDU to the LLC sublayer.
Both the sender and receiver have to agree on the rules or protocols that govern how their data link
layers will communicate with each other. A data link protocol performs three functions:
Controls when computers transmit (media access control)
Detects and corrects transmission errors (error control)
Identifies the start and end of a message by using a PDU (message
... Get more on HelpWriting.net ...
Vocabulary Exercise: Matching
Vocabulary Exercise: Matching Term | Definition | a. Frame | a. Two or more devices connected to a
common medium | b. Node | d. A layer of the Open Systems Interconnection (OSI) model that
frames upper–layer data and controls how data is placed on a medium | c. Media | b. A device on a
network | d. Network | e. The physical means used to carry data signals | e. Data Link | c. The
protocol data unit (PDU) used in Layer 2 of the OSI model |
Concept Questions
1. What are the two main jobs of the data link layer? * Allows the upper layers to access the media
using techniques such as framing. * Controls how data is placed onto the media and is received from
the media using techniques such as media access control (MAC) and error ... Show more content on
Helpwriting.net ...
Congestion control | e. Indicates a particular type of communication service for special processing |
Protocol | Specification | a. Ethernet | c. A protocol for wireless networks that uses CSMA/CA | b.
Point–to–Point Protocol | a. Defined by the IEEE 802.3 standard | c. 802.11 | a. Includes
specifications for operation at 10, 100, 1000, and 10,000 Mbps | | b. Establishes a logical connection
(session) between two nodes | | c. Uses a preamble field at the beginning of the frame | | c. Often
found on WANs | | a. Provides unacknowledged connectionless service over a shared medium using
CSMA/CD | | b. Defined in a Request For Comments (RFC) document | | b. Uses a flag field at the
beginning of the frame | | c. Uses an acknowledgment to confirm that a frame was received
successfully |
Concept Questions
1. Compare and contract Layer 2 addresses with Layer 3 addresses
As compared to Layer 3, where addresses in the packet header are carried from source host to
destination host regardless of the number of network hops along the route, Layer 2 uses addressing
to transport the frame across the local media.
2. Why are Layer 2 addresses not needed in point–to–point topologies?
Point–to–Point topologies, with just two interconnected nodes, do not require addressing.
3. What is the purpose of the Frame Check Sequence (FCS) in a frame trailer?
FCS is used to determine whether errors occurred in the transmission and reception of the frame.
Vocabulary Exercise:
... Get more on HelpWriting.net ...
The Model Of The Osi Network Model
Five Layer Approach Abstract The current OSI network model has been around for a long time and
with the current transition of network use we need a model that has the ability to adapt. The ideas
which bought OSI into existence still apply today and even though it is having to keep up with new
technologies it is still the basis to our network models which are in place today. 1. Introduction The
OSI data model originated in 1977 and this model contained the original seven layer protocol. The
model has since been modified to be used with the changing protocols of the network whilst keeping
the seven layers. The seven layer OSI model has been able to cope with the updates but there are
duplications of operations which creates a redundancy in the model. 2. Proposed System The OSI
data model allows different operations to be performed in one layer but with the changing
technologies we are able perform more tasks simultaneously. The OSI model doesn't fully utilise
this technology, this is why the proposed system performs all the same operations whilst having less
layers. The system which is being proposed is a five layer system which still contains an
Application layer. The five layer system also has a Transport Layer, Network Layer and a physical
layer similar to the original OSI system. 3. Application Layer The Application Layer has been linked
with the Presentation and Session layer from the OSI model. These layers share a Protocol Data
Limit which allows them to now
... Get more on HelpWriting.net ...
Business Related Articles Essay
What does the network layer do? Where does it sit in relationship to the other four layers of our
simplified network model? Network layer is the third layer of the OSI model. It performs switching
and routing by creating logical paths, known as virtual circuits, for transferring data from one node
to another node. Routing and forwarding are the major functions of this layer. It also performs other
operations such as addressing, internetworking, error handling, congestion, control and packet
sequencing. It maintains the quality of service requested by the transportation layer. It determines
how data are transferred between network devices. It Routes packets according to unique network
device addresses and Provides flow and ... Show more content on Helpwriting.net ...
The Internet Protocol (IP) is the network layer protocol which is the best known example of network
layer and every machine consists of its own IP address. It manages the connectionless transfer of
data one hop at a time, from end system to ingress router, to router to router, and from egress router
to destination end system. It is not responsible for reliable delivery to a next hop, but only for the
detection of eroded packets so they may be removed.
Connection model:
The OSI Network Layer protocol can be either connection–oriented, or connectionless. In general,
the TCP/IP Internet Layer supports only the connectionless Internet Protocol (IP).
Message forwarding: This is the most important function of network layer. Since many networks are
partitioned into sub networks and connect to other networks for wide–area communications,
networks use specialized hosts, called gateways or routers to forward packets between networks.
Datagram Encapsulation:
Network layer performs encapsulation of messages received from higher layers by placing them into
datagrams which are also referred to as packets with a network layer header.
Fragmentation and Reassembly:
The major function of the network layer is transmitting messages down to the data link layer. Some
data link layer technologies consist of certain limitations on the length of any message that can be
sent. If the packet that the network layer wants to send is too large, the network
... Get more on HelpWriting.net ...

More Related Content

Similar to Essay On NT1210 Labs 3.1-3.4

PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxPLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxstilliegeorgiana
 
Information Centric Network And Developing Channel Coding...
Information Centric Network And Developing Channel Coding...Information Centric Network And Developing Channel Coding...
Information Centric Network And Developing Channel Coding...Kim Moore
 
CONSULTANTS ANALYSIS REPORT 1 Colorado Techn.docx
CONSULTANTS ANALYSIS REPORT  1 Colorado Techn.docxCONSULTANTS ANALYSIS REPORT  1 Colorado Techn.docx
CONSULTANTS ANALYSIS REPORT 1 Colorado Techn.docxdonnajames55
 
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMBLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMIRJET Journal
 
101001000 Etherner 2OzBluetooth 207Cable line 209Cloud.docx
101001000 Etherner 2OzBluetooth 207Cable line 209Cloud.docx101001000 Etherner 2OzBluetooth 207Cable line 209Cloud.docx
101001000 Etherner 2OzBluetooth 207Cable line 209Cloud.docxpaynetawnya
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayTara Smith
 
SMART COLLEGE CHATBOT USING NATURAL LANGUAGE UNDERSTANDING
SMART COLLEGE CHATBOT USING NATURAL LANGUAGE UNDERSTANDINGSMART COLLEGE CHATBOT USING NATURAL LANGUAGE UNDERSTANDING
SMART COLLEGE CHATBOT USING NATURAL LANGUAGE UNDERSTANDINGIRJET Journal
 
Business Continuity Plan Essay
Business Continuity Plan EssayBusiness Continuity Plan Essay
Business Continuity Plan EssayKristi Anderson
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security EssayJennifer Wood
 

Similar to Essay On NT1210 Labs 3.1-3.4 (9)

PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxPLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
 
Information Centric Network And Developing Channel Coding...
Information Centric Network And Developing Channel Coding...Information Centric Network And Developing Channel Coding...
Information Centric Network And Developing Channel Coding...
 
CONSULTANTS ANALYSIS REPORT 1 Colorado Techn.docx
CONSULTANTS ANALYSIS REPORT  1 Colorado Techn.docxCONSULTANTS ANALYSIS REPORT  1 Colorado Techn.docx
CONSULTANTS ANALYSIS REPORT 1 Colorado Techn.docx
 
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEMBLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
BLOCKCHAIN IMPLEMENTATION IN EDUCATIONAL SYSTEM
 
101001000 Etherner 2OzBluetooth 207Cable line 209Cloud.docx
101001000 Etherner 2OzBluetooth 207Cable line 209Cloud.docx101001000 Etherner 2OzBluetooth 207Cable line 209Cloud.docx
101001000 Etherner 2OzBluetooth 207Cable line 209Cloud.docx
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
 
SMART COLLEGE CHATBOT USING NATURAL LANGUAGE UNDERSTANDING
SMART COLLEGE CHATBOT USING NATURAL LANGUAGE UNDERSTANDINGSMART COLLEGE CHATBOT USING NATURAL LANGUAGE UNDERSTANDING
SMART COLLEGE CHATBOT USING NATURAL LANGUAGE UNDERSTANDING
 
Business Continuity Plan Essay
Business Continuity Plan EssayBusiness Continuity Plan Essay
Business Continuity Plan Essay
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 

More from Heather Bjugan

ESSAY WRITING.Pdf - Apdfbooks.Com Notes Nove
ESSAY WRITING.Pdf - Apdfbooks.Com Notes NoveESSAY WRITING.Pdf - Apdfbooks.Com Notes Nove
ESSAY WRITING.Pdf - Apdfbooks.Com Notes NoveHeather Bjugan
 
Literacy Minute Ocean Writing Paper Freebie
Literacy Minute Ocean Writing Paper FreebieLiteracy Minute Ocean Writing Paper Freebie
Literacy Minute Ocean Writing Paper FreebieHeather Bjugan
 
How To Write A Pursuasive Essay For The Rpraxis - A
How To Write A Pursuasive Essay For The Rpraxis - AHow To Write A Pursuasive Essay For The Rpraxis - A
How To Write A Pursuasive Essay For The Rpraxis - AHeather Bjugan
 
Sample Essay On Economic Policies And Practices
Sample Essay On Economic Policies And PracticesSample Essay On Economic Policies And Practices
Sample Essay On Economic Policies And PracticesHeather Bjugan
 
Cheap Essay Writing Services- For High-Quality Writing Assistance
Cheap Essay Writing Services- For High-Quality Writing AssistanceCheap Essay Writing Services- For High-Quality Writing Assistance
Cheap Essay Writing Services- For High-Quality Writing AssistanceHeather Bjugan
 
Pay Someone To Write My Essay - Can I Pay Someone To Do M
Pay Someone To Write My Essay - Can I Pay Someone To Do MPay Someone To Write My Essay - Can I Pay Someone To Do M
Pay Someone To Write My Essay - Can I Pay Someone To Do MHeather Bjugan
 
Essay Writing - Applied Scholastics Online
Essay Writing - Applied Scholastics OnlineEssay Writing - Applied Scholastics Online
Essay Writing - Applied Scholastics OnlineHeather Bjugan
 
Scholarship Essay Speech Sample Essay. Online assignment writing service.
Scholarship Essay Speech Sample Essay. Online assignment writing service.Scholarship Essay Speech Sample Essay. Online assignment writing service.
Scholarship Essay Speech Sample Essay. Online assignment writing service.Heather Bjugan
 
Printable Writing Paper For Handwriting - Get What Yo
Printable Writing Paper For Handwriting - Get What YoPrintable Writing Paper For Handwriting - Get What Yo
Printable Writing Paper For Handwriting - Get What YoHeather Bjugan
 
Personal Statement For Graduate School In Master
Personal Statement For Graduate School In MasterPersonal Statement For Graduate School In Master
Personal Statement For Graduate School In MasterHeather Bjugan
 
Common App Personal Essay Examples R Com
Common App Personal Essay Examples  R ComCommon App Personal Essay Examples  R Com
Common App Personal Essay Examples R ComHeather Bjugan
 
Help I Need To Write An Essay - Get Help Writing A
Help I Need To Write An Essay - Get Help Writing AHelp I Need To Write An Essay - Get Help Writing A
Help I Need To Write An Essay - Get Help Writing AHeather Bjugan
 
Online Essay Review. Book. Online assignment writing service.
Online Essay Review. Book. Online assignment writing service.Online Essay Review. Book. Online assignment writing service.
Online Essay Review. Book. Online assignment writing service.Heather Bjugan
 
Scholarship Essay Short Essay About Life
Scholarship Essay Short Essay About LifeScholarship Essay Short Essay About Life
Scholarship Essay Short Essay About LifeHeather Bjugan
 
Writing Help Description. Online assignment writing service.
Writing Help Description. Online assignment writing service.Writing Help Description. Online assignment writing service.
Writing Help Description. Online assignment writing service.Heather Bjugan
 
021 Essay Introduction Paragraph Example Argume
021 Essay Introduction Paragraph Example Argume021 Essay Introduction Paragraph Example Argume
021 Essay Introduction Paragraph Example ArgumeHeather Bjugan
 
With These 33 New Argumentative Essay Topic
With These 33 New Argumentative Essay TopicWith These 33 New Argumentative Essay Topic
With These 33 New Argumentative Essay TopicHeather Bjugan
 
PPT - Writing A Thesis Statement PowerPoint Prese
PPT - Writing A Thesis Statement PowerPoint PresePPT - Writing A Thesis Statement PowerPoint Prese
PPT - Writing A Thesis Statement PowerPoint PreseHeather Bjugan
 
Five Paragraph Essays How To Teach Grade E
Five Paragraph Essays  How To Teach  Grade  EFive Paragraph Essays  How To Teach  Grade  E
Five Paragraph Essays How To Teach Grade EHeather Bjugan
 
How To Write A Song - BrooklynnropWare. Online assignment writing service.
How To Write A Song - BrooklynnropWare. Online assignment writing service.How To Write A Song - BrooklynnropWare. Online assignment writing service.
How To Write A Song - BrooklynnropWare. Online assignment writing service.Heather Bjugan
 

More from Heather Bjugan (20)

ESSAY WRITING.Pdf - Apdfbooks.Com Notes Nove
ESSAY WRITING.Pdf - Apdfbooks.Com Notes NoveESSAY WRITING.Pdf - Apdfbooks.Com Notes Nove
ESSAY WRITING.Pdf - Apdfbooks.Com Notes Nove
 
Literacy Minute Ocean Writing Paper Freebie
Literacy Minute Ocean Writing Paper FreebieLiteracy Minute Ocean Writing Paper Freebie
Literacy Minute Ocean Writing Paper Freebie
 
How To Write A Pursuasive Essay For The Rpraxis - A
How To Write A Pursuasive Essay For The Rpraxis - AHow To Write A Pursuasive Essay For The Rpraxis - A
How To Write A Pursuasive Essay For The Rpraxis - A
 
Sample Essay On Economic Policies And Practices
Sample Essay On Economic Policies And PracticesSample Essay On Economic Policies And Practices
Sample Essay On Economic Policies And Practices
 
Cheap Essay Writing Services- For High-Quality Writing Assistance
Cheap Essay Writing Services- For High-Quality Writing AssistanceCheap Essay Writing Services- For High-Quality Writing Assistance
Cheap Essay Writing Services- For High-Quality Writing Assistance
 
Pay Someone To Write My Essay - Can I Pay Someone To Do M
Pay Someone To Write My Essay - Can I Pay Someone To Do MPay Someone To Write My Essay - Can I Pay Someone To Do M
Pay Someone To Write My Essay - Can I Pay Someone To Do M
 
Essay Writing - Applied Scholastics Online
Essay Writing - Applied Scholastics OnlineEssay Writing - Applied Scholastics Online
Essay Writing - Applied Scholastics Online
 
Scholarship Essay Speech Sample Essay. Online assignment writing service.
Scholarship Essay Speech Sample Essay. Online assignment writing service.Scholarship Essay Speech Sample Essay. Online assignment writing service.
Scholarship Essay Speech Sample Essay. Online assignment writing service.
 
Printable Writing Paper For Handwriting - Get What Yo
Printable Writing Paper For Handwriting - Get What YoPrintable Writing Paper For Handwriting - Get What Yo
Printable Writing Paper For Handwriting - Get What Yo
 
Personal Statement For Graduate School In Master
Personal Statement For Graduate School In MasterPersonal Statement For Graduate School In Master
Personal Statement For Graduate School In Master
 
Common App Personal Essay Examples R Com
Common App Personal Essay Examples  R ComCommon App Personal Essay Examples  R Com
Common App Personal Essay Examples R Com
 
Help I Need To Write An Essay - Get Help Writing A
Help I Need To Write An Essay - Get Help Writing AHelp I Need To Write An Essay - Get Help Writing A
Help I Need To Write An Essay - Get Help Writing A
 
Online Essay Review. Book. Online assignment writing service.
Online Essay Review. Book. Online assignment writing service.Online Essay Review. Book. Online assignment writing service.
Online Essay Review. Book. Online assignment writing service.
 
Scholarship Essay Short Essay About Life
Scholarship Essay Short Essay About LifeScholarship Essay Short Essay About Life
Scholarship Essay Short Essay About Life
 
Writing Help Description. Online assignment writing service.
Writing Help Description. Online assignment writing service.Writing Help Description. Online assignment writing service.
Writing Help Description. Online assignment writing service.
 
021 Essay Introduction Paragraph Example Argume
021 Essay Introduction Paragraph Example Argume021 Essay Introduction Paragraph Example Argume
021 Essay Introduction Paragraph Example Argume
 
With These 33 New Argumentative Essay Topic
With These 33 New Argumentative Essay TopicWith These 33 New Argumentative Essay Topic
With These 33 New Argumentative Essay Topic
 
PPT - Writing A Thesis Statement PowerPoint Prese
PPT - Writing A Thesis Statement PowerPoint PresePPT - Writing A Thesis Statement PowerPoint Prese
PPT - Writing A Thesis Statement PowerPoint Prese
 
Five Paragraph Essays How To Teach Grade E
Five Paragraph Essays  How To Teach  Grade  EFive Paragraph Essays  How To Teach  Grade  E
Five Paragraph Essays How To Teach Grade E
 
How To Write A Song - BrooklynnropWare. Online assignment writing service.
How To Write A Song - BrooklynnropWare. Online assignment writing service.How To Write A Song - BrooklynnropWare. Online assignment writing service.
How To Write A Song - BrooklynnropWare. Online assignment writing service.
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 

Essay On NT1210 Labs 3.1-3.4

  • 1. Essay on NT1210 Labs 3.1-3.4 NT1210 Labs 3.1 to 3.4 3.1.1 What would happen if wireless devices were not governed by the Wi– Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? Personal information and business will slow down due to each vendor having its own standards/protocols. It will also be more vulnerable to attacks and make accessing more difficult. 3.1.2 Give another example of a model that is used to visualize something that is difficult to observe or perceive. How does the model make it easier to understand? Another way of displaying information for easier understanding is to use a flow chart. A flow chart can be used as a step by step guide. 3.1.3 Based on ... Show more content on Helpwriting.net ... Host A will use application for the OS while allowing the PC to still communicate to other devices. Transport will control the data sent and received. The network will place IP addresses to the packets allowing data to be added to the MAC addresses and physical link between host and lines. Exercise 3.2.4 Explain why routing devices do not need the upper layer of the OSI model to route traffic. What is the highest layer of the OSI model used by the router to decide where to forward traffic? The first three layers of the OSI is typically what a router needs to route traffic. The first three layer are physical, data link and network. The highest level the OSI decide where to forward traffic to is the transport layer which is located in the host layers. Lab 3.2 Review 1. How does the abstraction of the physical layer facilitate interoperability across networks using different types of physical wires? IP terminals might be located in different parts of the build making it complex. There are lines coming in and out of the build that might be different than that issued to a company. To try and replace one will be complex, confusing and time consuming if unsure. 2. The OSI model is not directly implemented in networking and often the distinction between the layers will blur in implementation. Why does it endure despite these ... Get more on HelpWriting.net ...
  • 2. Lan Topologies LAN Topologies Jason Smith IT/240 September 7 2014 TAMMY FLEMONS LAN Topologies Case Project 2–1 You have been hired to upgrade a network of 50 computers currently connected to 10 Mbps hubs. This long–overdue upgrade is necessary because of poor network response time caused by a lot of collisions occurring during long file transfers between clients and servers. How do you recommend upgrading this network? What interconnecting devices will you use, and what benefit will you get from using these devices? Write a short memo describing the upgrade and, if possible, include a drawing of the new network. This system ought to have a central server that can control approaching and cordial transmissions. A central server would prevent ... Show more content on Helpwriting.net ... After an irregular time interim, the stations that impacted endeavor to transmit once more. In the event that an alternate impact happens, the time interims from which the irregular holding up time is chosen are expanded orderly. This is known as exponential once again off. Write a short explanation (two to three sentences) of each concept and be prepared to discuss it with the class. References Guide to Networking Essentials ... Get more on HelpWriting.net ...
  • 3. The Argument Against Gay Marriges Arguments against gay marriges Though there are differences in the views of different faiths, conservative Protestants, the Catholic Church, Mormons, traditional Jews, and Muslims share two fundamental antigay arguments. The first is that homosexuality is wrong because it involves sex that doesn 't create life. In the case of Judaism, a key Bible passage is the story of Onan (Links to an external site.), who sleeps with his dead brother 's wife but, to avoid giving his brother offspring, doesn 't ejaculate inside her. Instead, he "spilt the seed on the ground." God slew him, which some might view as a sign of disapproval (Links to an external site.).The Catholic catechism decries (Links to an external site.) homosexual acts because "they close the sexual act to the gift of life." Early American antisodomy laws discouraged all forms of non–procreative sex (including, incidentally, heterosexual oral and anal sex). Islam shares a similar view. One Islamic hadith explains that Allah "will not look at the man who commits sodomy with a man or a woman." But if non–procreative sex is the issue, society started down the slippery slope not with the recent Supreme Court ruling but with production of the pill–or, really, even earlier, when birth control became common. We 've been into the non–procreative sex thing for some time now. Even most religious conservatives don 't have the heart to go after this. If sex without the possibility of creating life is wrong, then religious ... Get more on HelpWriting.net ...
  • 4. Frequent Shopper Program : Technical Specifications Kudler Frequent Shopper Program – Technical Specifications BSA/385 Linda Modiste Kudler Frequent Shopper Program – Technical Specifications Kudler Fine Foods (KFF) is a specialty food store chain with three retail stores in the San Diego, California area. KFF has engaged Smith Systems Consulting (SSC) to develop their new Frequent Shopper Program (FSP). The FSP will collect customer–purchasing history and accumulate them as redeemable loyalty points which customers can use for gift items and other products or services available through external partner companies. The Sales and Marketing page section of KFF's intranet site describes the strategic plan for the Frequent Shopper Program. (Apollo Group, 2011). SSC provides information technology (IT) services and consulting, including developmental solutions, IT integration, system analysis, design, and implementation. SSC will has submitted a proposal to KFF that details the development processes for the FSP project. This paper is a technical specification that lists the project's logical and physical models, including hardware, network, software, database, controls, and other development related requirements. Logical and Physical Models Logical and physical models represent the key elements and processes of the software development. The logical model describes the processes, and data, in as much detail as possible, without giving regard to how the system will be implemented. Logical data models include ... Get more on HelpWriting.net ...
  • 5. Effect Of Smoke Regulation On Hospitality Industry INTRODUCTION: Scientific research article should be presented as logical arguments and in such a way that sequence of the article sections will correspond to a model or chain of reasoning that applies to such article (Krathwohl, 2009, P.62). However, the research article by Hyland, et al (2003) does not seem to have the framework or follow this model or organized in "chain–of–reasoning sequence/format for some reasons best known by the authors'. Beside, Krathwohl, (2009) pointed out that this chain– chain–of reasoning model applies differently to preplanned and emergent studies. The authors' justification of the need for the study, including the degree to which the authors synthesized and critically analyzed existing research to show that this study is the next logical step in the line of research. Hyland, et al (2003) wanted to carry out this research because they believed that there was gap in the previous studies which policy makers, tobacco industries and restaurant owners' cite while making arguments that smoke–regulation in hospitality industry will hurt their business and decrease revenues. They implied that complicity and conflict of interest between the researchers and stakeholders in hospitality industry together with tobacco industry might have influenced the research results which lead to the conclusion that smoke–free regulation in the hospitality industry will negatively impact their sales and revenues. The authors also suggested that data collection methods ... Get more on HelpWriting.net ...
  • 6. The Surf Shoppe MegaCorp is a rising star in the provisioning of cloud computing services. Its primary offerings are in the area of infrastructure as a service (IaaS) and it is quickly gaining a very positive national presence in the IS industry. MegaCorp provides all the standard cloud IaaS offerings, including on– demand and long–term processing, storage, and virtual machine management systems. MegaCorp is now considering offering a variety of new services and has decided to set up a dedicated business intelligence (BI) operation to provide assessments of the marketability and competitive capability of specific cloud services. Because MegaCorp believes the proper utilization of this BI system will provide significant competitive advantage, it is willing ... Show more content on Helpwriting.net ... Setting Active Directory Controls and permissions for Surf Shoppe Staff or set AD security. The Active Directory is a very useful tool from an end user's perspective, which means that it can provide various bits of information about each user. This is why we should change permissions within the AD per Surf Shoppe Staff by their job title, and this will determine who gets what type of access. (The Surf Shoppe building is a three–story building, with a long–term tenant on the second floor. You plan to divide the 20 Surf Shoppe staff evenly between the first and third floors, each of whom requires a secure workstation. You must maintain secure highly available services, between both the first and third floor staff and the main MegaCorp headquarter building. Briefly explain the options for providing a link between the floors that will meet the requirement (i.e., provide a list of the minimum equipment necessary to accomplish this). The Surf Shoppe building is a three–story building, with a long–term tenant on the second floor. You plan to divide the 20 Surf Shoppe staff evenly between the first and third floors, each of whom requires a secure workstation. You must maintain secure highly available services, between both the first and third floor staff and the main MegaCorp ... Get more on HelpWriting.net ...
  • 7. Nt1310 Unit 1 Assignment Unit I Assignment: Open System Interconnection Reference Model As we all know, the growth of computer networks continues to rapidly grow. The digital revolution has changed the way we work and communicate almost beyond recognition. Provided that, foreseeing the changes and potential compatibility problems, in the mid nineteen eighties, the international standard organization (ISO) developed a networking reference model to standardize how network systems communicate with each other. It is a logical model for how network systems are supposed to communicate with each other. It breaks down the different components of the network communication and puts them into layers which reduce complexity. This reference model consists of seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, and the Physical Layer. Each layer provides a service to the layer above it in the protocol specification and then communicates with the same layer's software or hardware on other computers. It's important to realize, that these layers are separated into 2 sets: Transportation Set (Laters 1– 4) and Application Set (Layers 5 – 7). More importantly, the OSI model is 7 logical ... Show more content on Helpwriting.net ... The Application layer within the OSI reference model is where the application and the user communicates. In other words, the application layer is the ending of data that is transferred in visual form to the user. This layer provides the interface between the applications we use to communicate and the underlying network over which our messages are transmitted. The Application Layer functions are to provide the interface for application–specific protocols commonly used such as HyperText Transfer (HTTP), file transfer (FTP), Simple mail transfer (SMTP), Internet message Access (IMAP), ... Get more on HelpWriting.net ...
  • 8. The Basic Characteristics Of Ip V4 Throughout chapters 5 through 8, many topics have been discussed in class and practiced on lab days. Starting off with chapter 5, OSI Network Layer: various topics are discussed which include; IP v4, the Network Layer, to routing tables. The basic characteristics of IP v4 are that it is connectionless, the best effort is unreliable and is unaware of the quality of its job, and it is also media independent. Time to Live (TTL) is the 8–bit TTL field that describes the maximum hops that a packet can take before it is considered "lost", which means that the packet is undeliverable. Each time a packet visits a router, the TTL decreases by 1. If the packet reaches a 0 TTL, it is dropped. When a packet is dropped this helps the internet ... Show more content on Helpwriting.net ... The routing table is a table that stores information about connected and remote networks, and it has three features. The three features of a routing table are 1) destination network, 2) next–hop and 3) metric. Packets are unable to be forwarded by the router without a route. If a route that is representing the destination network is not on the routing table, the packet will not be forwarded, and instead will be dropped. When the router is forwarding a packet, it uses the default route, which is used when the network is not represented by any other route in the routing table. On the other hand, static routing is the route that information can be manually configured on in the router. Static routes are reliable and the router does not need to use much overhead to process the packets that are being transferred viz static routing. However the static routes do not update automatically, and they have a higher continuing administrative cost. Dynamic routing was another routing type that was taught in chapter 5. Dynamic routing is when routers can also learn about routes automatically from other routers in the same internetwork Dynamic routing has higher router processing overhead but little administrative cost after initial setup. The following chapter that was taught was chapter 6, addressing the Network IPv4. There are three types of communication that were talked about at the beginning of the chapter, Unicast, Broadcast, and ... Get more on HelpWriting.net ...
  • 9. Support for High-Definition Ip Cameras Assignment Background Information DeVry University has decided to enhance security by installing high–definition IP cameras throughout its campus network. After evaluating different products, the Cisco 4300 Video Surveillance camera was chosen as DeVry's standard. DeVry recognizes that the additional camera traffic, along with its management, will require a major upgrade to the network infrastructure. A phased project was created to enable NETW206 students to design and implement the network infrastructure within a single session. The four project phases are: 1. Phase 1 (Weeks 1 – 2): Design Network Switching Infrastructure 2. Phase 2 (Week 3): Standardize Network Configurations 3. Phase 3 (Week 5): Network Assessment 4. Phase ... Show more content on Helpwriting.net ... In order to select the proper switches key characteristics on which you should focus are: Port Density Forwarding Rates Uplink Rates Ability to Support PoE (at the access layer) and Link Aggregation (all layers) When you see the term "segmented" you need to think VLANs and their corresponding IP address memberships. Be sure that you remember to use routers (or better yet, layer 3 switches) to interconnect the VLANs. The implementation of physical redundancy will be described and an overview provided in chapter 1. However, the underlying control structure and loop prevention system STP will not be discussed in detail until chapter 5. At this point in your design you only need to realize that it is important to the design. Details of its implementation and configuration will be added to your design later in the process. Use the links below, especially the link to datasheets for the cameras to discover the bandwidth requirements. Your report should include a list of equipment that you have determined will support the network requirements as well as a logical diagram showing how the devices are interconnected. Your diagrams can be created with Microsoft's Visio design package or a similar product. The following websites are available to assist in your research and design for this ... Get more on HelpWriting.net ...
  • 10. Security Information Security Plan Because of the increasing of Cyber–attacks in these days, companies should apply and develop the information security plan. Not only the large companies but also small companies should think about the security before facing a lot of issues such as losing data or crashing the system. This paper will advise some security planning and techniques to assist Voit Tool & Die company strengthen and improve their security protection plan. 1. Introduction: Security data and information is very important for any company in the world. Indeed, high technology environment, and organizations become more and more subordinate on their information systems. The public worry about the appropriate use of information, specifically personal data. Cybercrime are increasing rapidly. Many organizations have operations that need to be protected. According to Merriam–Webster Dictionary, security in general is the quality or state of being secure. Many companies try to secure their systems and they spend a lot of money for the security. As the result, most company try to define what they needed. Each security has rules and principle which connect with the protection of the system. The rules of the security will assist company to decrease the level of the risk. Many company need to protect their data, system, and hardware. In these days, many companies use a strong system and update the system each year to secure valuable data. security is to integrate systems, operations, and internal controls to ... Get more on HelpWriting.net ...
  • 11. Essay on Renewable Energy: Wind Energy Chapter 1 Introduction 1.1 Motivation Recently, wind power has gained greater attention with respect to sources of renewable energy due to the maturity of the technology and its relative cost competitiveness. Wind power farms (WPFs) are scattered in remote areas (onshore and offshore) selected by the wind speed, water depth, and distance to shore. It is important to develop technology to monitor WPFs with higher capacities as the size and number of wind turbines in a WPF is continuously increasing. In order to provide real– time control and monitoring, reliable bi–directional communication infrastructure is needed. According to their needs, most turbine manufacturers have developed their own monitoring and control systems due to an absence ... Show more content on Helpwriting.net ... 1.2 Scope of the work The dissertation is divided into three main parts. In the first part, we proposed the hierarchical communication network architectures that consist of a turbine area network (TAN), farm area network (FAN), and control area network (CAN) for WPFs. The wind turbines are modelled based on the logical nodes (LN) concepts of the IEC 61400–25 standard. The WPF communication network is configured with a switch–based architecture where each wind turbine has a dedicated link to the wind farm main switch. Servers at the control center are used to store and process the data received from the WPF. The network architecture is modelled and evaluated via OPNET. We investigated the end–to–end (ETE) delay for different WPF applications, and our network architecture is validated by analyzing the simulation results. In order to meet the growing demand of large–scale WPFs, integration of high reliability, high speed, cost effectiveness and secure communication networks are needed. In the second part of this dissertation, we proposed the Ethernet passive optical network (EPON) as one of promising candidates for next generation WPF. Critical communication network characteristics such as reliability, mean downtime, optical power budget, path loss and network cost are evaluated and compared with conventional switched–based architectures for five different architectures. ... Get more on HelpWriting.net ...
  • 12. OSI Model Essay OSI Model Introduction Successful communication of any type contains four key characteristics. These characteristics follow: 1. A sender: This is the person who is sending information. 2. A receiver: This is the person the sender is sending the information to. 3. A common language: If the sender and receiver are going to understand each other, they will need a common language and protocol, or specific method of communicating. 4. A common medium: The sender and receiver could choose whether to communicate in person, by telephone, writing or any other method ... Show more content on Helpwriting.net ... For this reason, it is sometimes referred to as the highest level in the model. The application level is where network requests originate. For example, this is the level where someone using a word processing program will originate the command to print using a network computer. Thus, the application level is the link between the user and the network. Some of the required processes at this level include: 1,2 1. Handling different terminal types and file systems. 2. Identification of the incoming communication process. 3. Handling general network access, flow control and error recovery.. 4. Labeling transmitted information by identifying the process, its origin and destination application. Presentation The presentation layer is primarily responsible for the format that will be used to exchange data between two computers.1 In other words, just as the name suggests, this layer makes sure that the other computers in the network can understand what is being sent. The major responsibilities of this layer include: 1. Data encryption/decryption to keep unauthorized people from using accessing the data and make that data available to authorized persons. 2. Data compression/decompression results in faster transmission by reducing the amount of space the data requires. An example of this is removing water from coffee, resulting in "freeze–dried" coffee which is easier to ... Get more on HelpWriting.net ...
  • 13. Open System Interconnection Model Essay Open System Interconnection Model OSI is short for Open System Interconnection, which is an ISO standard for worldwide communications that defines a networking framework for implementing protocols in seven layers. History and Reasoning for… –––––––––––––––––––––––––– The early development of networks was disorganised. And by the early 80's there was a great increase in the number and size of networks. Companies started to realise how useful networks could be and started to add and expand networks as quickly as new network technologies were introduced. But by the mid 80's the companies start to experience problems as it was found that it was difficult to exchange information ... Show more content on Helpwriting.net ... It gave creators of networks a set of standards that ensured greater compatibility among various network technologies produced by companies around the world. The OSI reference model has become the primary model for network communications and is considered the best tool available for teaching people about sending and receiving data on a network. The 7 Layers Of the OSI ––––––––––––––––––––––– The OSI reference model is a framework that is used to understand how information travels throughout a network. This model explains how packets travel through the various layers to another device on a network, even if the sender and destination have different types of network media. In the OSI reference model, there are seven numbered layers, each of which illustrates a particular network function. Layer 7 is the Application Layer…This layer supports application and end–user processes. Layer 6 is the Presentation Layer…This layer provides independence from differences in data (e.g., encryption) by translating from application to network format, and vice versa. Layer 5 is the Session Layer…This layer establishes, manages and terminates connections between applications. Layer 4 is the Transport Layer…This layer provides transparent transfer of data between systems, or hosts, and is responsible for end–to–end error recovery and ... Get more on HelpWriting.net ...
  • 14. Designing A Computer Network -such There are many things to consider when designing a computer network –such as costs of components, software and labor; communication, cohesion, expandability and many others. However, the end goal in such an enterprise is to have a fully functional, harmonious, and cohesive tiered system where duties and actions are divided, and delineated accordingly. One of the major network architectures used to facilitate this process is known as the TCP/IP Protocol Suite. The TCP/IP Protocol Suite was designed by scientists in the effort to support a new type of network known as the ARAPNET that was being installed across the US in the late 60's to 70's. (White, 2013, p. 15) The challenge was to create an open system whereby all networks could freely communicate with each other. The design was based on a layered system whereby the user would connect at the topmost (or application) layer, while at the same time being removed or separated from the lower (physical) layer. Although the number of layers is not exactly set, depending on the source this number can range between five and seven layers, with each layer providing services to the layer above it. For the purposes of this discussion however, we will address the five layer model. The five layers of the TCP/IP Protocol Suite are: Application, Transport, Network, Network Access (or Data Link), and Physical. (White, 2013, p. 15) Application This layer supports all of the applications on the network. Some of the most frequent ... Get more on HelpWriting.net ...
  • 15. Nt1310 Unit 3 Data Analysis Essay 1. What is the primary difference between a 3G UMTS core network and a 4G LTE core network? Answer in one or two sentences. Ans. The 3G UMTS systems have two logical entities – the Node– B (the radio base station) and the Radio Network Controller (RNC) while the 4G LTE systems have only one logical node – the evolved Node–B (eNode–B). 2. What are the components of E– UTRAN? Very briefly describe the functions of each component. Ans. E–UTRAN is the Evolved Universal Terrestrial Radio Access Network. The E–UTRAN consists of UE and eNode–B. UE: The mobile terminal. eNode–B: The eNode–B is additionally called the base station which disengages the air interface protocol and it is the first contact point for the UE. The eNode–B is the main intelligent hub in the E–UTRAN, so it incorporate some capacity beforehand characterized in the RNC of the UTRAN, for example, uplink and downlink dynamic radio resource management and data packet scheduling, and mobility management. 3. What are ... Show more content on Helpwriting.net ... The functions for supporting the control plane is integrity protection and ciphering. For the user plane PDCP offers ciphering, header compression and reordering and retransmission during handover. Radio Link Control (RLC): The RLC (Radio Link Control) layer is responsible for delivery of upper layer SDUs. RLC can work in 3 different modes, depending on the requirement of the data to be transported; Transparent Mode (TM), Unacknowledged Mode (UM) and Acknowledged Mode (AM). AM has functions for retransmission of erroneous received PDUs. The RLC working in UM or AM also has functions for segmentation and concatenation of SDUs sent over the LTE air interface. For received PDUs RLC support functions for re–ordering, duplicate detection and ... Get more on HelpWriting.net ...
  • 16. 7 Layers Of The OSI Model OSI Layers The OSI model shows how the hardware and software function together in order to enable communication between the computers. The OSI model is basically a framework of how the device operate on the network. Assume that user 'A' sends data to user 'B' through internet, the data has to travel the network to reach user B computer. During the data transfer, the data has to navigate through many intermediate nodes. To ensure the data transfer from user A to user B correctly and securely, so we need protocols to guide these data. These group of protocols are called communication model. OSI model is one of the communication model. Open System Interconnection (OSI) is made up of 7 layers, each layer has their own unique functions and protocols. Control is passed from one layer to another layer, start at application layer which is layer 7 to physical layer which is layer 1. The framework for the OSI model is design of network systems that ... Show more content on Helpwriting.net ... The transport layer also able to specify a service address to identify the source or the destination computer to specify the application that the request came from and where it is going to. In the proposal situation, there will be many network application which is running on a computer simultaneously, so there will be a mechanism which helps identify the application that needs to receive the date. All incoming data are multiplexed at the transport layer and then sent to the bottom layer. The data which is received from the bottom layer will then de–multiplexed at the transport layer and be transported to the correct application by using the Port numbers. Port numbers are to identify the original network of the application and the source so as the destination of the network application on the receiving ... Get more on HelpWriting.net ...
  • 17. Essay on Security and the OSI Model Abstract The Open Systems Interconnect (OSI) model is a standard reference model for the communication between two end users. Seven different layers make up the OSI model: physical, data link, network, transport, session, presentation, and application. This paper will cover the type of security that is associated with each level of the OSI model. Physical Layer The physical layer is where the actual communication occurs between devices. The security of the physical layer pertains to the actual hardware. The vulnerabilities of the physical layer include: • Power outage • Environmental control loss • Hardware theft, damage or destruction • Unauthorized hardware changes (i.e.; removable media, data connections) • Detachment ... Show more content on Helpwriting.net ... • Switches could flood all traffic to the VLAN ports and not forward to the proper port. This could result in data being intercepted by any device that is connected to the VLAN. • Stations could be force direct communication with other stations which ends up bypassing subnets and firewalls. • Weak authentication and encryption on a wireless network could allow for unauthorized connections to the network, data and devices. Data link layer controls can be implemented to ensure the security of the transmissions. By using MAC address filtering the stations are identified by not only the MAC address but are cross–referenced with the logical access or physical port. Firewalls should be between layers, ensuring physical isolation from one another. Wireless application must be monitored consistently and carefully for unauthorized access. In order to secure the wireless network, the use of the built–in encryption, authentication, and MAC filtering must be implemented with strong passwords. Network Layer The third layer of the OSI model is the network layer. This layer is responsible for end to end packet delivery. The network layer issues request to the data link layer and responds to requests from the transport layer and issues requests to the data link layer. The procedural and functional process of sending different ... Get more on HelpWriting.net ...
  • 18. Internal And External Locus Of Control In the context of locus of control, internal and external locus of control are two characteristics that influence students' success and failure. Those characteristics have been explained by some experts and there are some comparisons which have been done related to the aspects of internal and external locus of control. Obviously, there is no specific hypothesis related to aspects of locus of control, but Burger (1983:76) categorizes three factors as the aspects of locus of control: perception of internal control, perception of controlled by powerful others, and perception of chance. However, Gihonsooly and Sihirvan (2011:240) have summarized some researches about locus of control related on individuals behavior in some aspects such as anxiety, academic procrastination and so on in table 5 below: Those comparisons above represent the three aspects of locus of control; perception of internal control, perception of LOC that is controlled by powerful others, and perception of chance, which can be differentiated into 5 sub–aspects such as ability, responsibility, change, environment and stress (student's stress). Those sub–aspects above will be the indicators of locus of control. ... Show more content on Helpwriting.net ... Thus, it can be summarized that locus of control is divided into two main aspects namely internal locus of control and external locus of control. Internal locus of control can be influenced by some factors such as ability, responsibility and effort, while external locus of control can be influenced by change, environment and stress (students' ... Get more on HelpWriting.net ...
  • 19. Seven Layers in the OSI Model 1. This class made me learn quite a lot. Though it was a course I have done in my under graduate, this class helped me to learn more about the networking. The class was interactive and fun, the lab sessions were very helpful. The project was one of the best parts of the whole course. It made me look into and study about various new protocols in networking and finally I could get an idea on how I could design a protocol by myself. The most important thing I learnt in this class is the detailed functions and uses of every later in the OSI model, and I also realized that TCP is the most important protocol of all that I learnt. It is very reliable and provides acknowledgement, and is a full duplex process. It provides congestion control and flow control and is also a connection oriented service. On an overall this class made me learn a lot that would always be very helpful to me. 2. The seven Layers in the OSI model are Physical Layer, Link Layer, Network Layer, Transport Layer, Session Layer, Application Layer and the presentation Layer. Each layer has a specific function to perform and consist of different protocols. Physical layer is the lowest one and handles transmission and reception of messages over the medium. Then comes the link layer , it allows error free transmission of the data frames in the physical layer. The network layer takes care of processes like routing, traffic control and fragmentation of the data. The next one is the transport layer, it takes care of the ... Get more on HelpWriting.net ...
  • 20. OSI MODEL Essay Michael Rauseo IT310 OSI Model In the early years of computer and network research and development many systems were designed by a number of companies. Although each system had its rights and were sold across the world, it became apparent as network usage grew, that it was difficult, to enable all of these systems to communicate with each other. In the ... Show more content on Helpwriting.net ... It determines which physical path the data takes, based on the network conditions, the priority of service, and other factors. The network layer provides the following functions. – Transferring the frame to a router if the network address of the destination does not indicate the network to which the station is attached – Controlling subnet traffic to allow an intermediate system to instruct a sending station not to transmit its frame when the router's buffer fills up. If the router is busy, the network layer can instruct the sending station to use an alternate destination station. – Resolving the logical computer address with the physical network interface card address. – Keeping an accounting record of frames forwarded to produce billing information Transport Layer The transport layer makes sure that messages are delivered in the order in which they were sent and that there is no loss or duplication. It removes the concern from the higher layer protocols about data transfer between the higher layer and its peers. The size and complexity of a transport protocol depends on ... Get more on HelpWriting.net ...
  • 21. The Purpose Of An OSI Model What is the purpose of an OSI model? The purpose of an OSI model is a standard that was created for networks to share information. This standard governs the way information is transmitted over different networks. The model also sets guidelines to those in the manufacturing industry that create and develop software and hardware that are all compatible with each other. This paper will discuss and describe the 7 layers of the Open System Interconnection model (OSI model) and the layers of the Transport Control Protocol/Internet Protocol model (TCP/IP model), and explain the similarities and differences of each model. The 7 layers of the OSI model consist of: The Application layer (layer 7), The Presentation layer (layer 6), The Session ... Show more content on Helpwriting.net ... The Transport layer Transport layers exist in both TCP/IP and OSI model. Even though both models have Transport layers they differ. The TCP/IP model consist of two standard transport protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP uses a reliable data–stream protocol which is connected oriented and UDP uses a unreliable data–stream protocol which is connectionless oriented. The Internet layer The Internet layer is a group of protocols and specifications that are used to transport packets from the host across a network, the host specified by a network address (IP address) The Link layer The lower level layer of the TCP/IP model, this layer is used by a suite of protocols for the "Internet". This is used to connect hosts or nodes to a network. This layer is compared to the "Data Link" layer and "Physical " layer of the OSI model. TCP/IP Application Layer VS OSI Application, Presentation and Session layer. The similarities in both models are comparable but different at the same time. All though they exist in both, the approach each uses to construct applications is different. In the OSI model the Application layer, Presentation layer and Session layer correspond to the Application layer of the TCP/IP model. They somewhat do the same job but use different protocols, TCP/IP uses: FTP, SMTP, TELNET, DNS and SNMP where the OSI model uses: FTAM, VT, MHS, ... Get more on HelpWriting.net ...
  • 22. Describe The 7 Layer Osi Model Of Communication Layers? 1. Describe the 7 layer OSI model of communication layers? Discuss Each Layer in detail. OSI stands for Open Systems Interconnection; it is a reference model that provides a basis for interconnection of systems. It is an overall framework that forms the basis to define protocols. [1] OSI consists of 7 layers that can be divided into three subgroups; network support layers, user support layers, and layer 4 which links the upper and lower layers. The network support layers help in moving data from one device to another by taking care of physical connections, physical addressing, electrical specification, transport timings, etc. The user support layers help in interoperability among software systems that are different from each other. [1] Each layer is discussed in detail below. Layer 1 is the Physical Layer; it receives data from the data link layer, and deals with the physical and electrical specifications of the interface and the medium. It transforms the bits into signal, i.e., how the 0's and 1's are to be encoded for transmission over the physical medium. It defines the data rate or transmission rate of the bits. Its duty is to synchronize the transmitter and receiver clocks. It defines the physical topology, i.e., how the devices are connected, viz., mesh, star, ring, or hybrid. Line configuration, either point–to–point or multipoint configuration of the devices is this layer's responsibility. It is concerned with the mode of transmission; simplex, half duplex, or full ... Get more on HelpWriting.net ...
  • 23. King Nebuchadnezzar II Of Babylon Since the BC era, people have believed they are safe from harm. King Nebuchadnezzar II of Babylon felt secure behind the walls that surrounded his city. He'd often feast while the Persian army tried to destroy his city. The Persians once entered by wading along the riverbed that ran into the city. King Nebuchadnezzar II didn't think that his city's water supply would become a threat to his kingdom (Shenk, 2013). The river caused a weakness among the city and the Persians were able to find it. King Nebuchadnezzar II had paid for this mistake and was killed by the Persians. Technology has it's own walls to protect it from harm. We create layers of security, such as antiviruses to protect it from harm. Unfortunately, there are weaknesses just like Babylon had. ... Show more content on Helpwriting.net ... There are always weaknesses in the walls and if an attacker is persistent, many times they can get through it. Malicious people attack web applications, operating systems and go deeper into your hardware to harm it (Shenk, 2013). Malicious people send viruses that can often be sent through emails or even advertisements. Sometimes clicking on links that aren't legit harms a device. Most attackers are able to get through the network security because of the person operating the device. Sometimes clicking on links that aren't legit harms a device. The people using the devices are at fault because they shouldn't feel secure with their malware. King Nebuchadnezzar II was too comfortable with his wall (Shenk, 2013). We start to feel secure when layers are built because we believe it can fully stop the problems, however, it's not made to eliminate the problem for good. In modern day society, we have built seven layers of security to help eliminate attackers from harming ... Get more on HelpWriting.net ...
  • 24. Osi Model Michael Rauseo IT310 OSI Model In the early years of computer and network research and development many systems were designed by a number of companies. Although each system had its rights and were sold across the world, it became apparent as network usage grew, that it was difficult, to enable all of these systems to communicate with each other. In the early 1980s, the International Organization for Standardization (ISO) recognized the need for a network model that would help companies create common network implementations. The OSI reference model, released in 1984, addresses this need. The OSI reference model became the primary architectural model for communications. Although other architectural models have ... Show more content on Helpwriting.net ... For a reliable network layer a minimal transport layer is required. Functions of the transport layer include the following. – Accepting messages from the layer above and, if necessary, splitting them into frames – Providing reliable, end–to–end message delivery with acknowledgments – Instructing the transmitting computer not to transmit when no receive buffers are available – Multiplexing several process–to–process message streams or sessions onto one logical link and keeping track of which messages belong to which sessions Session Layer The session layer establishes a communications session between processes running on different computers, and can support message–mode data transfer. Functions of the session layer include: – Allowing application processes to register unique process addresses. It provides the means by which these process addresses can be resolved to the network–layer or data–link–layer NIC addresses, if necessary. – Establishing, monitoring, and terminating a virtual–circuit session between two processes identified by their unique process addresses. A virtual–circuit session is a direct link that seems to exist between the sender and receiver• Delimiting messages, to add header information that indicates where a message starts and ends. The receiving session layer can then refrain from indicating any message data to the overlying application until the entire message has been received. – Informing the ... Get more on HelpWriting.net ...
  • 25. Difference Between Ethernet Frames And VLAN Tagging Ethernet Frames & VLAN tagging Inside of 802.1Q each VLAN frame is differently identified in comparison to common Ethernet frames with what is known as a 4–byte VLAN tag on the Ethernet header. An Ethernet Frame equates to being computer data packets that are broadcast as links then converts into a frame once shipped. Each Ethernet Frame consists of a destination or source MAC address then payload data relating to its type of Protocol e.g. Email Protocol, then lastly goes through a cyclic redundancy check to distinguish any corruption of data. Additionally, we come across The Tag Protocol Identifier which is assigned to 0×8100 to give the receiver permission to locate the supplemental header. There is also the Priority Code Point ... Show more content on Helpwriting.net ... The ISL has power to host up to 1000 VLANs although 802.1q can enforce up to 4096. (Cisco, 2006) 802.2 Logical Link Control Moreover, the logical link control sublayer of layer 2 is the OSI model. It is surprising that Ethernet functions near the top of the first two layers within the OSI model, these are the Physical and the Data Link layers. Furthermore, the Data Link layer in Ethernet separates into two different layers named as the LLC (Logical Link Control) and MAC (Mac Address Control) layers. LLC is relied upon for the basis of communicating data through multiple end user systems over a LAN via a MAC link. A major benefit of LLC is its ability to initiate addresses and data link control by accepting data from the higher layers in the OSI model that are TCP/IP in order for effortless and problem free transportation on a network. There are other benefits which would give assistance to Chipset as it enforces successful control of flow, media exchange and attention to tracking. (Geier, 2002) HSRP – Hot Standby Router Protocol* In order to reach high network uptime networks can implement HSRP from Cisco to enable network redundancy towards IP networks. This can be in place so that traffic from users is efficiently dealt with straight away and the network can first hop failures from network devices. ... Get more on HelpWriting.net ...
  • 26. Advanced Research Project Agency ( Arpa ) Of Defense ( Dod... 1. Introduction With the advanced in the field of computer networking and to compete with the ever increasing internet technology, it becomes highly important to study and understand the basic theory and concept behind this technology. Advanced Research Project Agency (ARPA) Depart of Defense (DoD) and International Standard Organization (ISO) are the organizations which introduces us to the two main protocol standards use for communication. This paper briefly explains the key aspects of these two well known protocol suites namely; Open source Interconnection (OSI) and Transmission Control Protocol/Internet Protocol. The former is also called as Basic Reference model or the OSI model consisting of seven different layers where each layer ... Show more content on Helpwriting.net ... Moreover, it becomes easy to understand the network process as it can be explained through seven different steps. It is important to note that each of these layers is inter related and acts as a support for the respective upper layers. Below is the diagrammatic representation of the seven different layers of the OSI model. Figure 1: OSI Model As shown in the above figure 1, these seven layers can be segmented into two groups namely; Upper Layers and Lower Layers. Upper layers comprises of top three layers such as Application, Presentation, and Session whereas lower layers comprises of remaining layers such as Transport, Network, Data Link and Physical. In general, the upper layers are mostly software programs running on a computer or some hardware device which interacts with the user and are primarily concerned with implementing the application running over the network whereas the lower layers are mostly hardware at physical layer and steadily involves software as it moves closer to network layer and it mainly takes care of data formatting, data encryption and data transmission over the network. 2.1. OSI Layering Layer 1 – Physical Layer It is the bottom layer of the OSI protocol stack as shown in figure 1. It is termed as "physical", mainly because it facilitates physical or hardware medium for sending and receiving data on a network. It helps interconnect ... Get more on HelpWriting.net ...
  • 27. The Media Access Control System Essay This layer conveys the bit stream – electrical impulse, light or radio signal – through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Data Link (Layer 2) At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. Network (Layer 3) This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing,internetworking, error handling, congestion control and packet sequencing. Transport (Layer 4) This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end–to–end error recovery and flow control. It ensures complete data transfer. Session (Layer 5) This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. Presentation (Layer 6) This layer provides independence from differences ... Get more on HelpWriting.net ...
  • 28. Rational Choice Theory Research Paper Why do people commit crimes? Some individuals only commit one crime and learn their lesson, others however become repeat offenders. In the scientific study of criminology, one gains an understanding of why a person commits a crime, and one can develop ways to control crime or rehabilitate the criminal. Criminology is guided by dozens of existing theories, some more distinguished than others. The rational choice theory of criminology says that people make logical choices about under what circumstances to commit crime. Rational choice theory originated during the late 18th century with the work of Cesare Beccaria. The rational choice perspective has been applied to a wide range of crimes, including robbery, drug use, vandalism, and white–collar ... Get more on HelpWriting.net ...
  • 29. BSA 385 Week 3 Individual Assignment Essay Technical Article Document: Frequent Shopper Program BSA385 Frequent Shopper Program: Technical Article Document Kudler Fine Foods (KFF) is a specialty food store chain in California. Smith Systems Consulting (SSC) was contacted by KFF to develop a Frequent Shopper Program (FSP). The FSP will be able to monitor client purchasing history and accumulate the history as redeemable loyalty points which clients can use for gift items and other products or services available through external partner companies. The Sales and Marketing page section of KFF's intranet site describes the strategic purpose of the FSP. SSC will provide IT services and of course consulting. Some other things would be developmental solutions, strengthening, ... Show more content on Helpwriting.net ... Figure 3 Logical Data Flow Diagram for FSP Redemption Process Figure 4 Physical Model of Frequent Shopper Program Hardware The hardware requirements are crucial to the system development, consisting of physical servers and other peripherals. These components are the legs and limbs of the system. The hardware section of the system will accept input, and process the input in a way specified by the design, and returns an output (Blundell, 2008). Centralized Data Management System and Database Server Hardware – This will be the central server in which data gathered by the tracking software will be uploaded to and downloaded from. All locations will have access to this hardware to share valuable customer information. This server will be used for customer data verification as well. It will also be the central sever in which data such as rewards program, points, purchases will be stored. The local database servers will have an Intel i5 processor, 8GB of RAM, and 2TB of storage to handle all the extra load and processing, while the central database server will have 4TB of storage. Backup Servers – Each location will have a local backup storage to ensure that customer information is safe, and can be retrieved in case of connectivity issues such as broadband connection problems. Backup servers will only need little processing power so an Intel Core 2 Duo will ... Get more on HelpWriting.net ...
  • 30. Network Advantages And Disadvantages A network is a group of computers and other devices (such as printers,phones,or a television) that are connected by some type of transmission media. A network can be two computers connected by a cable in a home office or as large as several thousand computers that are connected across the world. Networks has two fundamentals known as the peer–to–peer and client/server. In a peer–to– peer network, every computer can communicate with each other but no computer has more power than another. Every computer is capable of sending and receiving information to and from every other computer. They are simple to configure and they are often less expensive to set up. The downside is that they are not flexible and they are not necessarily secure. Client/server network is sometimes used to refer to the design of a network in which clients rely on servers for resource sharing and processing. This network share some common elements, including clients, servers, workstations. Clients take on the form of personal computers also known as smartphones and workstations . A network that uses server to enable clients to share data is known as a client/server network. A model that was use to understand and develop computer–computer communications over network is known as OSI (Open Systems Interconnection) which is a model that divides network communication into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. At each layer, protocols perform services ... Get more on HelpWriting.net ...
  • 31. Advantages And Disadvantages Of Network Virtualization .2 Network Virtualization In computing, network virtualization is the process of combining hardware and software network resources and network functionality into a single, software–based administrative entity, a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization. Network virtualization is categorized as either external virtualization, combining many networks or parts of networks into a virtual unit, or internal virtualization, providing network–like functionality to software containers on a single network server. In software testing, software developers use network virtualization to test software under development in a simulation of the network environments in which the software ... Show more content on Helpwriting.net ... Obviously, we may utilize PVST or MST to give an unpleasant sharing of burden by part the crossing tree inclinations for distinctive VLANs, however the outline still doesn't change generally speaking. I've discussed this in East West and North South systems outlines. The fundamental point is that there is a LOT of data transfer capacity that is never equally used – and that implies squandered power, space and cooling (which cost more than the gear itself). When you move to a Layer 2 MultiPath system, the intention is to evacuate the unused switches in your system and expand the usage of every one of your benefits. This can be most successfully done by disposing of the appropriation layer. Cisco FabricPath is a Cisco NX–OS programming development joining the fitting and–play straightforwardness of Ethernet with the unwavering quality and adaptability of Layer 3 directing. Utilizing FabricPath, you can construct exceedingly adaptable Layer 2 multipath systems without the Spanning Tree Protocol. Such systems are especially suitable for extensive virtualization organizations, private mists, and elite registering (HPC) situations. "Cisco turned on yet another new component in the Nexus 7000 stage that essentially dispenses with the old and all around sent crossing tree convention from system outlines, consequently empowering much bigger ... Get more on HelpWriting.net ...
  • 32. Cis 333 Final Term Paper Technical Project Paper: Information Systems Security Information Systems Security Haseeb Ahmed Khan Mark O'Connell CIS 333 Fundamentals of Information Security March 12, 2012 Abstract In today's IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution. The case we ... Show more content on Helpwriting.net ... (Georgia Institute of Technology). As we read in the book, vulnerabilities are found in all seven domains of the network: * User Domain: * Lack of awareness of security policy * Accidental acceptable use policy violation * Intentional malicious activity * Social engineering * Workstation Domain: * Unauthorized user access * Malicious software introduced * Weaknesses in installed software * LAN Domain * Unauthorized network access * Transmitting private data unencrypted * Spreading malicious software * LAN–to–WAN Domain * Exposure and unauthorized access of internal resources to the public * Introduction of malicious software * Loss of productivity due to Internet access * WAN Domain Transmitting private data unencrypted * Malicious attacks from anonymous sources * Denial of Service attacks * Weaknesses in software * Remote Access Domain * Brute–force attacks on access and private data * Unauthorized remote access to resources * Data leakage from remote access or lost storage devices * System/Application Domain * Unauthorized physical or logical access to resources * Weaknesses in server operating system or application software * Data loss from errors, failures, or ... Get more on HelpWriting.net ...
  • 33. Unit Sd 119465 Assessment Feedback Assessment Feedback Candidate name: ID no: Date of assessment: Assessor name: Reg no: Specific Outcome Write/present/sign texts for a range of communicative contexts Unit Std 119465 Credits: 5 Assessment Criteria Evidence Page No C/NYC Comments SO 1 Write/sign for a specified audience and purpose 1. The purpose for writing/signing, the target audience and the context are clear in relation to the learning task or activity 2. The text–type, style, and register selected are appropriate to audience, purpose and context 3. Language appropriate to socio–cultural sensitivities is selected and used in an appropriate manner without compromising own values or arguments 4. Writing/signing is well–structured and conveys its message clearly 5. Critical ... Get more on HelpWriting.net ...
  • 34. Changing The Physical Layer The physical layer specifics the function details for initiating, keeping up and turning off the physical link when moving the bits of data over the physical media such as copper, fibre or wireless. So it will takes your data bits of ones and zeros covert them to what is needed to transfer over that type of media so for example change bits into electrical signals for copper cables then will covert it back to ones and zeros once it reaches its destination to send up OSI model layers. When changing the bits so they can be sent over different types of media this is known as signalling. Signalling will change the bits to what it needs to be for transmission then is read by the connections at the other end. Protocols of the physical layer ... Show more content on Helpwriting.net ... If there is a difference a CRC frame error is generated to state there is a corruption either on the sending device side or the destinations device packet transmission. For detecting and troubleshooting these issues use the different types of show commands such as show interface and show spanning–tree. The data link layer is responsible for controlling access to the media and formatting the data for transmission for going across the physical network link. So it encapsulates the packets from the network layer to suitable frames for the network media to use for transferring data frames from one place to another error free. The addressing used at this layer is physical addressing also known as mac addressing which is how devices are addressed at this layer instead of IP addressing. The data link layer also does error detection at this layer as well. The data link layer has two sub layers which are logical link control and Mac. The logical link control sub layer gives flexibility in services to the layers above so it will let the data link layer known what to do with a packet when gets a frame. This works by it will check the header to establish that the packet inside the frame it received is destined for the network layer. The MAC sub layer keeps a table with the mac addresses of the devices because each device must have a unique Mac to be identified on the network. At the data link layer you also ... Get more on HelpWriting.net ...
  • 35. Essay about Week 2 Assignment Lan Topology Case Project 3–1 Old–Tech Corporation has 10 computers in its main office area, which is networked in a star topology using 10 Mbps Ethernet hubs, and wants to add five computers in the manufacturing area. One problem with the existing network is data throughput. Large files are transferred across the network regularly, and the transfers take quite a while. In addition, when two or more computers are transferring large files, the network becomes unbearably slow for users. Adding the manufacturing computers will only make this problem worse and result in another problem. Because the ceiling is more than 30 feet high, there's no easy way to run cables to computers, and providing a secure pathway for cables is next to impossible. Devise a ... Show more content on Helpwriting.net ... Because of a staggering influx of Internet business, the network administrator's task is to boost network performance and availability as much as possible. The company also wants a network design that's easy to reconfigure and change because workgroups form and disband frequently, and their membership changes regularly. All computers must share sensitive data and control access to customer files and databases. Aside from the customer information and billing databases, which run on all servers, employees' desktop computers must run standard word–processing and spreadsheet programs. Use the following write–on lines to evaluate the requirements for this network. After you finish, determine the best network topology or topology combination for the company. On a blank piece of paper, sketch the network design you think best suits EBiz.com's needs. Remember: High performance and easy reconfiguration are your primary design goals! What type of topology should be used in this network? A Logical Topology should be used in this network because you could link the hub wirelessly to each server that could bridge off to other PCs with all the files needed from the servers. Not to mention you'll be able to link a new network and also remove a network if it's not needed. Will the network be peer to peer or server based? The network that I devised is both a peer to peer and a server based network. Reason ... Get more on HelpWriting.net ...
  • 36. Nt1310 Data Link Layer The Data link layer [also called layer 2] is responsible for moving a message from one computer or network device to the next computer or network device in the overall path from sender or receiver. It controls the way messages are sent on the physical media. Both the sender and receiver have to agree on the rules or protocols that govern how they will communicate with each other. A data link protocol determines who can transmit at what time, where a message begins and ends, and how a receiver recognizes and corrects a transmission error. The data link layer performs two main functions, and therefore is often divided into two sublayers. Logical link control [LLC] sublayer – The first sublayer is the data link layer's connection to the network layer above it. At the sending computer, the LLC sublayer software is responsible for communicating with the network layer software ... Show more content on Helpwriting.net ... The MAC sublayer software at the sending computer controls how and when the physical layer converts bits into the physical symbols that are sent down the circuit. At the receiving computer, the MAC sublayer software takes the data link layer PDU from the LLC sublayer, converts it into a stream of bits, and controls when the physical layer actually transmits the bits over the circuit. At the receiving computer, the MAC sublayer receives a stream of bits from the physical layer and translates it into a coherent PDU, ensures that no errors have occurred in transmission, and passes the data link layer PDU to the LLC sublayer. Both the sender and receiver have to agree on the rules or protocols that govern how their data link layers will communicate with each other. A data link protocol performs three functions: Controls when computers transmit (media access control) Detects and corrects transmission errors (error control) Identifies the start and end of a message by using a PDU (message ... Get more on HelpWriting.net ...
  • 37. Vocabulary Exercise: Matching Vocabulary Exercise: Matching Term | Definition | a. Frame | a. Two or more devices connected to a common medium | b. Node | d. A layer of the Open Systems Interconnection (OSI) model that frames upper–layer data and controls how data is placed on a medium | c. Media | b. A device on a network | d. Network | e. The physical means used to carry data signals | e. Data Link | c. The protocol data unit (PDU) used in Layer 2 of the OSI model | Concept Questions 1. What are the two main jobs of the data link layer? * Allows the upper layers to access the media using techniques such as framing. * Controls how data is placed onto the media and is received from the media using techniques such as media access control (MAC) and error ... Show more content on Helpwriting.net ... Congestion control | e. Indicates a particular type of communication service for special processing | Protocol | Specification | a. Ethernet | c. A protocol for wireless networks that uses CSMA/CA | b. Point–to–Point Protocol | a. Defined by the IEEE 802.3 standard | c. 802.11 | a. Includes specifications for operation at 10, 100, 1000, and 10,000 Mbps | | b. Establishes a logical connection (session) between two nodes | | c. Uses a preamble field at the beginning of the frame | | c. Often found on WANs | | a. Provides unacknowledged connectionless service over a shared medium using CSMA/CD | | b. Defined in a Request For Comments (RFC) document | | b. Uses a flag field at the beginning of the frame | | c. Uses an acknowledgment to confirm that a frame was received successfully | Concept Questions 1. Compare and contract Layer 2 addresses with Layer 3 addresses As compared to Layer 3, where addresses in the packet header are carried from source host to destination host regardless of the number of network hops along the route, Layer 2 uses addressing to transport the frame across the local media. 2. Why are Layer 2 addresses not needed in point–to–point topologies? Point–to–Point topologies, with just two interconnected nodes, do not require addressing. 3. What is the purpose of the Frame Check Sequence (FCS) in a frame trailer? FCS is used to determine whether errors occurred in the transmission and reception of the frame. Vocabulary Exercise: ... Get more on HelpWriting.net ...
  • 38. The Model Of The Osi Network Model Five Layer Approach Abstract The current OSI network model has been around for a long time and with the current transition of network use we need a model that has the ability to adapt. The ideas which bought OSI into existence still apply today and even though it is having to keep up with new technologies it is still the basis to our network models which are in place today. 1. Introduction The OSI data model originated in 1977 and this model contained the original seven layer protocol. The model has since been modified to be used with the changing protocols of the network whilst keeping the seven layers. The seven layer OSI model has been able to cope with the updates but there are duplications of operations which creates a redundancy in the model. 2. Proposed System The OSI data model allows different operations to be performed in one layer but with the changing technologies we are able perform more tasks simultaneously. The OSI model doesn't fully utilise this technology, this is why the proposed system performs all the same operations whilst having less layers. The system which is being proposed is a five layer system which still contains an Application layer. The five layer system also has a Transport Layer, Network Layer and a physical layer similar to the original OSI system. 3. Application Layer The Application Layer has been linked with the Presentation and Session layer from the OSI model. These layers share a Protocol Data Limit which allows them to now ... Get more on HelpWriting.net ...
  • 39. Business Related Articles Essay What does the network layer do? Where does it sit in relationship to the other four layers of our simplified network model? Network layer is the third layer of the OSI model. It performs switching and routing by creating logical paths, known as virtual circuits, for transferring data from one node to another node. Routing and forwarding are the major functions of this layer. It also performs other operations such as addressing, internetworking, error handling, congestion, control and packet sequencing. It maintains the quality of service requested by the transportation layer. It determines how data are transferred between network devices. It Routes packets according to unique network device addresses and Provides flow and ... Show more content on Helpwriting.net ... The Internet Protocol (IP) is the network layer protocol which is the best known example of network layer and every machine consists of its own IP address. It manages the connectionless transfer of data one hop at a time, from end system to ingress router, to router to router, and from egress router to destination end system. It is not responsible for reliable delivery to a next hop, but only for the detection of eroded packets so they may be removed. Connection model: The OSI Network Layer protocol can be either connection–oriented, or connectionless. In general, the TCP/IP Internet Layer supports only the connectionless Internet Protocol (IP). Message forwarding: This is the most important function of network layer. Since many networks are partitioned into sub networks and connect to other networks for wide–area communications, networks use specialized hosts, called gateways or routers to forward packets between networks. Datagram Encapsulation: Network layer performs encapsulation of messages received from higher layers by placing them into datagrams which are also referred to as packets with a network layer header. Fragmentation and Reassembly: The major function of the network layer is transmitting messages down to the data link layer. Some data link layer technologies consist of certain limitations on the length of any message that can be sent. If the packet that the network layer wants to send is too large, the network ... Get more on HelpWriting.net ...