SlideShare a Scribd company logo
1 of 46
Download to read offline
Osi Reference Model And The Osi Model
Data Networking
Assignment No–2
1. OSI REFERENCE MODEL
The OSI model is a reference model. It does not specify how a protocol or technology should work but it determines how and where to open its
standards. It consists of seven layers:
Physical layer: Cables, Wires, Voltages, boosting devices, Pin outs which are physical or physical in nature are all included in the Physical layer of the
OSI model. Here the transmission between two communicating devices or channels takes place in the form of bits or electrical signals.
Data Link Layer: Data link layers provides the facility to establish communication between two networked devices. It performs various tasks like error
correction, compression, correct transmission errors, synchronization of characters and frames etc. Some of the specified protocols on the layer 2
technology are PPP, HDLC, ATM etc.
Network layer: The network layer is responsible for routing the datagrams to particular destination. It learns all the path to reach a particular
destination and selects the best path to reach the destination. The IP Protocol stack has a lot of protocols like RIP, IGRP, BGP etc.
Transport layer: It is responsible for end to end delivery of segments. It is responsible for error free reliable delivery of packets. Flow control is the
responsibility of the Transport layer. TCP and UDP are the two protocols which are a part of the Transport layer for delivery of segments.
Session layer: Session layer manages the service
... Get more on HelpWriting.net ...
Thesis Statement On Digital Security
Digital Security
The 21st century has been described as the "Information Age", a period in human history characterized by the shift in traditional industry implemented
through the industrial revolution to an economy based on information computerization.
We have come a long way from paper based systems through the use of a computer for efficient data processing. The creation of local area networks
(LAN) all the way through opening channels for communication and knowledge sharing on a much larger scale. This is where the introduction to
connecting LAN networks to the internet came about. The internet allows for seamless communication to take place virtually right around the world.
Technology with the use of the internet has changed the way we ... Show more content on Helpwriting.net ...
More people with malicious intent are finding new ways to infiltrate our lives through the technology we use. While using the internet has become an
essential part of everyday life, there is an element of risk involved. We are exposing ourselves to a number of cybercrimes and need to educate
ourselves on how to identify these crimes and put the necessary protection policies and procedures in place.
Digital Security "is the protection of your digital identity – the network or internet equivalent of your physical identify. Digital security include the
tools you use to secure your identity assets and technology in the online and mobile world. "– Google definition
Main Statement: explaining the need for digital security when connecting your corporate computer network to the Internet
"Internet based Virtual Private Networks (VPNs), power line communications, satellite communications and wireless communications (wireless sensor
networks, WiMAX and wireless mesh networks) are discussed."
Malware
Malware also referred to as 'malicious software' is a piece of software that was designed to disrupt, damage, or gain unauthorised access to a computer
system.
There are various type of malware expertly designed for very specific
... Get more on HelpWriting.net ...
Local Area Network ( Wan )
LAN stands for local area network and is normally a group of computers that share a common communications line typically, connected devices
share the resources of a single processor or server within a small area such as an office. A LAN may serve as few as two or three users such as in a
home network or as many as thousands of users such as a FDDI network.
WAN
A Wide Area Network (WAN) is a communication network made up of computers that are far away from each other. The most common example of a
Wan is the Internet although a WAN doesn't need to be global to qualify as a wide area network.
MAN
A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger ... Show more
content on Helpwriting.net ...
The tree allows you to have many servers on the network and you can branch out the network in many ways. This is useful for colleges, universities
and schools so that each of the branches can identify the relevant systems in their own network.
Advantages
A Tree Topology is supported by many network vendors and even hardware vendors.
A point to point connection is possible with Tree Networks.
All the computers have access to the larger and their immediate networks.
Best topology for branched out networks.
Disadvantages
The Tree Topology network is reliant on the trunk which is the main backbone of the network. If that has to fail then the entire network would fail.
In a Network Topology the length of the network depends on the type of cable that is being used.
Star Star Topology is the most common type of network topology that is used in homes and offices. In the Star Topology there is a central connection
point called the hub which is a computer hub or sometimes just a switch.
Advantages
A Star Network Topology is very easy to manage because of its simplicity in functionality.
The problems can be easily located logically in a Star Topology and therefore is easy to troubleshoot also.
The Star Topology is very simple in format so it is very easy to expand on the Star Topology.
Disadvantages
The Star Topology has to fully rely on the hub and the whole working of the network depends on the hub.
If there are many nodes and the
... Get more on HelpWriting.net ...
Vocabulary Exercise: Matching
Vocabulary Exercise: Matching Term| Definition| a. Frame| a. Two or more devices connected to a common medium| b. Node| d. A layer of the Open
Systems Interconnection (OSI) model that frames upper–layer data and controls how data is placed on a medium| c. Media| b. A device on a network|
d. Network| e. The physical means used to carry data signals| e. Data Link| c. The protocol data unit (PDU) used in Layer 2 of the OSI model|
Concept Questions
1. What are the two main jobs of the data link layer? * Allows the upper layers to access the media using techniques such as framing. * Controls how
data is placed onto the media and is received from the media using techniques such as media access control (MAC) and error ... Show more content on
Helpwriting.net ...
Congestion control | e. Indicates a particular type of communication service for special processing|
Protocol| Specification| a. Ethernet| c. A protocol for wireless networks that uses CSMA/CA| b. Point–to–Point Protocol| a. Defined by the IEEE 802.3
standard| c. 802.11| a. Includes specifications for operation at 10, 100, 1000, and 10,000 Mbps| | b. Establishes a logical connection (session)
between two nodes| | c. Uses a preamble field at the beginning of the frame| | c. Often found on WANs| | a. Provides unacknowledged connectionless
service over a shared medium using CSMA/CD| | b. Defined in a Request For Comments (RFC) document| | b. Uses a flag field at the beginning of
the frame| | c. Uses an acknowledgment to confirm that a frame was received successfully|
Concept Questions
1. Compare and contract Layer 2 addresses with Layer 3 addresses
As compared to Layer 3, where addresses in the packet header are carried from source host to destination host regardless of the number of network
hops along the route, Layer 2 uses addressing to transport the frame across the local media.
2. Why are Layer 2 addresses not needed in point–to–point topologies?
Point–to–Point topologies, with just two interconnected nodes, do not require addressing.
3. What is the purpose of the Frame Check Sequence (FCS) in a frame trailer?
FCS is used to determine whether errors occurred in the transmission and reception of the frame.
Vocabulary Exercise:
... Get more on HelpWriting.net ...
Networking Standards ( Osi Layers )
ASA College CIS 125–M01: Network Concepts Networking Standards (OSI Layers) Joel Hernandez Vasquez joelvasquez@asa.edu 02/09/2016
Nowadays everybody can get access to the internet through networks, but according to Columbia University over the 37% of people do not know
what a network is. A network is a group of computers which are connected to share information, files, and performs tasks. A network is built using the
same common language. My purpose of this project is to explain what a network is, and let you know how important is to know it. The next
paragraphs will explain the introduction of networking, the disadvantages of networking, and the disadvantages. A network is a group of computer or
electronic devices connected... Show more content on Helpwriting.net ...
A wide local area network is used to link networks in vast geographic. For instance, you can use a WAN to connect to larger places such as the
United States, China, and Japan. Another type of network is Metropolitan area network (MAN) which is used to connect an entire city, a
particular region, and university campus. Moreover, a metropolitan area network is smaller than a wide area network but larger than a local area
network. Furthermore, there is another type of network, which is called PAN (Personal Area Network). A Personal Area network is defined as a
group of computers or electronic devices connected to a specific range of a user. For example, when we have a group of devices at home
interconnected such as laptops, printers, tablets, and cell phones. Networks have become a central issue for organizations, business, and universities
because it provides many advantages. One of the benefits of a network is the easiest way to share information. For example, in a company where
there are many offices around the world you can distribute information to all the offices in short time. Moreover, having a network will give you the
benefits to talking with people in real time in a larger distance. In addition, another advantage of a network is that allow you to share hardware. For
example, in an office that you only have a printer you can use this printer connected to multiple computers instead of having one printer for
... Get more on HelpWriting.net ...
Control of Virtual Networks Spanning Multiple...
6.2 Virtual network ID, Virtual link ID:
In order to control virtual networks spanning multiple infrastructure domains, the virtual networks must be identified by a virtual network ID.
Additionally the virtual links are also needed to be identified which can be done by using virtual link ID. One of the solution would consist of simply
mapping the virtual link ID to whatever data link layer specific tag is in use. A number of available link virtualization techniques such as ATM,
Ethernet VLAN could be used for this purpose. This Virtual link ID can be used for both virtual link identifier and a tag for data forwarding.
12
Scalability is a major requirement for virtual networks. For this reason, virtual link aggregation will constitute an important requirement for network
virtualization. Virtual link aggregation can be defined as a set of virtual links that follow a common path and are similarly treated between a pair of
virtual nodes. It can be performed by carrying at least two types of identifiers in the data plane, one for virtual network identification and another for
hop–by–hop forwarding. Hence, virtual link aggregation enhances scalability and also improves performance.
7. Building Virtual Networks
7.1 The VNP– InP interface:
The VNP (virtual network provider) / InP interface is a key component of network virtualization architecture. The virtual network provider is able to
request the establishment of a virtual network, the modification or the removal of a
... Get more on HelpWriting.net ...
Nt1310 Data Link Layer
The Data link layer [also called layer 2] is responsible for moving a message from one computer or network device to the next computer or network
device in the overall path from sender or receiver. It controls the way messages are sent on the physical media. Both the sender and receiver have to
agree on the rules or protocols that govern how they will communicate with each other. A data link protocol determines who can transmit at what time,
where a message begins and ends, and how a receiver recognizes and corrects a transmission error.
The data link layer performs two main functions, and therefore is often divided into two sublayers.
Logical link control [LLC] sublayer – The first sublayer is the data link layer's connection to the network layer above it. At the sending computer, the
LLC sublayer software is responsible for communicating with the network layer software ... Show more content on Helpwriting.net ...
The MAC sublayer software at the sending computer controls how and when the physical layer converts bits into the physical symbols that are sent
down the circuit. At the receiving computer, the MAC sublayer software takes the data link layer PDU from the LLC sublayer, converts it into a
stream of bits, and controls when the physical layer actually transmits the bits over the circuit. At the receiving computer, the MAC sublayer receives a
stream of bits from the physical layer and translates it into a coherent PDU, ensures that no errors have occurred in transmission, and passes the data
link layer PDU to the LLC sublayer.
Both the sender and receiver have to agree on the rules or protocols that govern how their data link layers will communicate with each other. A data link
protocol performs three functions:
Controls when computers transmit (media access control)
Detects and corrects transmission errors (error control)
Identifies the start and end of a message by using a PDU (message
... Get more on HelpWriting.net ...
Unit 3 Assignment 1 Osi Model
OSI Model OSI Model explains the transfer of data thru the network. The structure of the model help understands where some of the protocols in the
network are functioning, operating with other workstations, servers, and switches. Mainly, I will explain how the protocols are functioning
throughout each layer. Specific protocol functions and operations interpose two layers, knowing that part of their process start in one layer and
continue in the next layer. Layers 7,6 and 5 or Application Layer for TCP Protocol The first protocol explain is TCP. Starting with the Layer 7, 6,
and 5, the Application Layer is providing the payload (data and instructions). The web browser is an example of initiation of Layers 7,6,5 and the
payload flow. The Transport... Show more content on Helpwriting.net ...
Note that other servers not selected will receive the information by the requesting client to ignore the request. The device accepts the server answer
and reply to it. DHCP Acknowledgement The last phase is DHCP Acknowledgement. During this transmission, the client' message is accepted by the
DHCP server and the IP address and configuration are provided. DHCP protocol requires extra adjustment to be safe. There is the Option 82, which
is like a tattoo on the information sent from client to DHCP server. This information is attached to the packet and allowed the device to recognize the
message and retransmitted by the DHCP server. Both client and server, need to be configured for this safe feature effectiveness (Juniper, 2017).
Bluetooth Protocol I enjoy the capacity of my car to immediately transfer my phone functions and features. Listening to my favorites music, answering
phone calls while driving is something I saw in the movies in my youth (yes, the 90's). I am fascinating to learn that Bluetooth is a protocol. Link
Management Protocol (LMP) This operation creates a bond with the radio connections of the
... Get more on HelpWriting.net ...
Bcs/205 Final Paper
NeelKumar Patel CCS 205 Questions. 3.2 List and briefly define the possible states that define an instruction execution address calculation of
instructions – this determine the address of the next instruction to be processed. fetch – this is reading of instruction from its memory location where its
stored. operation decoding – this is analyzing instruction to determine type of operation to be performed and operand to be used. address calculation of
the operand – If the operation involves reference to an operand available via I/O or an operand in memory, then determine the address of the operand.
Operand fetch – get the operand from memory or read it in from I/O. Data Operation–Perform the operation indicated in the instruction. Operand store
– Write... Show more content on Helpwriting.net ...
Transmission: consumes data packets used to implement instructions and store data transfer mechanisms. Problems 3.3 a) (8 bits = 1 byte for
opcode).2^(32–8) = 2^24 = 16,777,216 bytes b).1. Instruction and data transfers would take three bus cycles each, one for the address and two for
the data. Since If the address bus is 32 bits, the whole address can be transferred to memory at once. 2. instruction and data transfers would take four
bus cycles each, two for the address and two for the data. Therefore, that will have the processor perform two transmissions in order to send to
memory the whole 32 bits. c) a program needs 24 bits (24–bit addresses), and for the IR needs 32 bits (32–bit addresses). 3.10 For any slot, only the
priority 16 device may transmit when none of the TR lines are assert. This provides it the lowest average wait time. We could say that when there is
much demand on the bus and most of the time having at least one pending request, that will prevent the priority 16 device to have the lowest average
wait time. 3.14
... Get more on HelpWriting.net ...
Data Link And Network Layer Protocols
Data Link and Network Layer Protocols in TCP/IP Protocol
Difference Between Ethernet II and Ethernet 802.2 LLC Frame Structures
Ethernet II framing structure is also commonly referred to as DIX Ethernet (Carrell, Chappell, Tittel & Pyles, 2013). This frame structure was
developed by DEC, Intel, and Xerox and thus the DIX acronym that represent these major players in its development (Carrell et al., 2013). The Ethernet
II defines a two–octet field of EtherType (Carrell et al., 2013). The MAC address and the destination come before this Ethernet frame. This
precedence helps in the identification of the upper layer of the encapsulating protocol (Carrell et al., 2013). This Ethernet standard has a unitary
data link layer. Besides, the type field in use in Ethernet II helps to extricate between different client protocols. Moreover, the Ethernet II applies
the MAC frame format in its TCP/ IP protocol (Carrell et al., 2013). The minimum frame size for Ethernet II is 64 bytes while the maximum frame
size for the same Ethernet II is 1518 bytes (Carrell et al., 2013). The introduction of VLAN made the maximum frame size to be increased to 1522
bytes to accommodate VLAN tagging (Pyles, Carrell, & Tittel, 2016). The preamble in Ethernet II is 8 bytes long while the destination address
contains a data link address field that is 6 bytes long (Carrell et al., 2013). Furthermore, the source address field and type field are 6 bytes and 2 bytes
respectively (Carrell et al., 2013).
... Get more on HelpWriting.net ...
OSI Model Essay
OSI Model
Introduction
Successful communication of any type contains four key characteristics. These characteristics follow: 1. A sender: This is the person who is sending
information. 2. A receiver: This is the person the sender is sending the information to. 3. A common language: If the sender and receiver are going to
understand each other, they will need a common language and protocol, or specific method of communicating. 4. A common medium: The sender and
receiver could choose whether to communicate in person, by telephone, writing or any other method ... Show more content on Helpwriting.net ...
For this reason, it is sometimes referred to as the highest level in the model. The application level is where network requests originate. For example, this
is the level where someone using a word processing program will originate the command to print using a network computer. Thus, the application level
is the link between the user and the network.
Some of the required processes at this level include: 1,2
1. Handling different terminal types and file systems. 2. Identification of the incoming communication process. 3. Handling general network access,
flow control and error recovery.. 4. Labeling transmitted information by identifying the process, its origin and destination application.
Presentation
The presentation layer is primarily responsible for the format that will be used to exchange data between two computers.1 In other words, just as the
name suggests, this layer makes sure that the other computers in the network can understand what is being sent.
The major responsibilities of this layer include:
1. Data encryption/decryption to keep unauthorized people from using accessing the data and make that data available to authorized persons. 2. Data
compression/decompression results in faster transmission by reducing the amount of space the data requires. An example of this is removing water
from coffee, resulting in "freeze–dried" coffee which is easier to
... Get more on HelpWriting.net ...
Wan Network Design For A Company Essay
1.Case Study It's a project on WAN network design for a company which is five year old and have multiple branches. It's a IT& Electronics
company located in Auckland named eServe. I am working for this company from last six months as a IT technician. The company have multiple
branches in other cities as well. They provide software and hardware related services to their clients and mainly concern with apple (Mac Book,
iMac, phone) products. The company have three branches in wellington, Christchurch and Hamilton cities. All these branches are controlled by main
head quarter located at Newmarket (Auckland).But the system is not well they are working on old documentary level .Each branch has their own
databases. They keep all the record of their clients and part lists individually. They provide online email communication and Chat facility to their
clients. But the problem is each branch provides these services individually and it's difficult for main head quarter office to collect that latest
information. They want to make a centralize control for all these branches. Moreover they are using a software system for stock entry and part order
lists this also needs to be centralized on a common file server. Because they are paying to more to hire staff for each branch .Because need to manage
the stocks and payments individually. But at this stage they want to reduce the staff and make a centralize control from their main branch. They want a
perfect online connectivity between
... Get more on HelpWriting.net ...
State Of Statement Of Purpose For Computer Science
Statement of Purpose
[Purpose]
During my under graduation, I nurtured an idea to shape my career in the way of doing research, in which period of time, has turned into my career
goal. I am convinced that I should pursue a career in research and teaching as my profession. I wasn't quite sure of what area of research I should get
involved in, since I was interested in multiple areas of study until my high school. Taking a multi disciplinary undergraduate major has helped me to
realize that computer science and logic are the areas which fascinates me the most when compared to others. By the end of under graduation I am
crystal clear and confident in setting my priorities over computer science. Research at PhD level would be the best bet to satisfy my long term goal. I
opine that completing masters and doing research at masters level would qualify me with the required skills in computer science and would set a
perfect platform for my entry into PhD. Thus, after a careful consideration of my interests, abilities & goals, I decided to pursue masters degree in the
field of Computer Science. [My Background]
Since childhood I always excelled at quantitative and logical abilities. Thus, I had a strong inclination for mathematics and physics. This led me to opt
for mathematics, physics and chemistry as my majors at higher secondary level (10+2). After completing high school with outstanding grades, I was
interested in pursuing my further studies ... Show more content on Helpwriting.net ...
I feel that I need much more enhanced knowledge. Infact, I am more interested in doing research. In the next five years I hope to complete PhD with
intense research experience. I have a strong passion for teaching which may lead me to take the path of teaching after PhD. But my immediate short
term goal is to complete masters with good grades and with research which would be a learning
... Get more on HelpWriting.net ...
The Osi Reference Model Inn A Data Communication Network
Q: 1 (a) explain the data encapsulation process in the OSI reference model inn a data communication network.
Ans:– The way toward going data through the layers of the OSI is called epitome. A convention information unit is a parcel of data made by a PC and
go starting with one layer of the OSI then onto the next.
b). identify the advantages of layered approach of OSI reference model.
1)It is really non–specific model which is considered as a standard model.
2)It backings association situated and also connectionless administrations.
3)This layer takes after reflection rule that is change in one layer does not affect much on other layer.
4)It is more secure and versatile than having all administrations packaged in a solitary layer. ... Show more content on Helpwriting.net ...
ARP: – : stands for address resolution protocol and it helps to find the hardware address of a host from its recognised ip address. IT facilitates data
exchange between computers on the same network. It is only used for one address request at a time. It operates as a interface between network and data
link layer. DNS: – : stands for domain Name Server. It converts more readily learnt domain names to the numerical IP address required for the purpose
of finding and classifying computer amenities and devices with the essential network protocols. This is used to resolve human readable hostname like
www.google.com.
Q.2
A). explain broadcast domain and collision domain with an example.
BROADCAST DOMAIN: Broadcast spaces have a place with an arrangement of gadgets in a similar IP system and works at layer three of the OSI
show. That communicate message goes to each PC and system gadget in the communicate area. Regardless of what number of hosts or gadgets are
associated together, in the event that they are associated with a repeater, center point, switch or extension, every one of these gadgets are in ONE
Broadcast domain.
Collision domain– is a piece of a network connected by common medium through repeaters where data packets can crash with one another by being
sent. It occur when more than one device efforts to send a packet on a network section at the similar time. Commonly we call media as shared
... Get more on HelpWriting.net ...
Main Types Of A Network
Part One: Hubs: Hubs are used to construct a network by connecting multiple computers in a star / hierarchical network topology, the most
common form of local networks now every day. A hub is a simple device when it is sent bits of computer data from A to B, it is not to examine the
purpose, instead, it sends the signal to all other computer (B, C, D ..) within the network. B will then get it, while rejecting the other nodes. This
confirms that the traffic is released. Hubs works in the Physical layer in TCP/IP protocol stack. There are two main types of stroke: 1. Liability:
The signal is transmitted as it is (it does not need power). 2. Active: The signal is amplified, so they function as a repeater. In fact, they were called a
multiport repeater. (PSU) Hubs can be connected to expand the network to other platforms with an uplink port. Switches: Switches place the other
side are more advanced then hubs, Instead of diffusion through the frame, a controlled switch makes for the destination MAC address and forwards
the appropriate port only reach the computer. In this way, switches reduce traffic and divide the collision domain into segments, which is very suitable
for busy LANs and protects photos, from other computers sniffed the same segment. A table with the MAC address belongs to which segment is built.
If a destination MAC address is not in the table, it sends all segments except the source segment. If the same objective as the source of the frame is
rejected.
... Get more on HelpWriting.net ...
Bridging Between Routing And Routing
Bridging versus routing
Introduction
"Routing control protocol is essential in order to dynamically determine the topology of the network and to detect failing links. Bridging control
protocols may be used similarly in smaller networks or may be used in combination with routing." Higginson & Shand (1997). Bridge and routers are
applied in computer networking as they both connect two or more interrelated Local Area Networks (LAN) therefore creating an extension of the Local
Area Network or a Wide Area Network. Bridges operates on MAC layer addresses and at thedata link layer of the Open System Interconnection (OSI)
model whereas routers operate on the network control layer – third layer of the OSI model. Since routers do not have the ... Show more content on
Helpwriting.net ...
On occasions where a protocol appears as unrecognizable by the router, the packet is just dropped. Non–routable protocols don't define any recognized
network information in the data packet. Routers are usually included as part of a network switch and can be located on any gateway which includes
any point of presence on the internet. Being connected on two or more networks, it sends information packet between terminals based on the current
status of the network in which it is connected to.
Bridges connect network of similar protocols thus allowing communication between them. They operate on the second (data link) layer of the open
system interconnection (OSI) model. The data link layer frames messages for transmission, establishes and error free communication path, ensures
sequence of transmitted data, manages access on channel use and check integrity of received messages.
While routers transmit only the relevant and required data packet to the end destination as required in the LAN, each bridge builds an internal list of
addresses of all the terminals attached to the network so as to allow for communication. Every packet is checked against the internal list of the bridge
and the information is forwarded if the opposite segment has the destination address or if the bridge doesn't have the address logged.
Routers have the ability to allow hosts that aren't practically on the same logical network, to be
... Get more on HelpWriting.net ...
Executive Summary for Network Design Project
Running Head: THE STAR TOPOLOGY
The Star Topology
Jon Jensen
IT/230
Cliff Krahenbill
10/25/09
Executive Summary
Link Systems was founded in 2005 as an Internet based self help center for people that are starting their own businesses. We have a proven track
record of business start up expertise. We have helped several hundred businesses get moving in the right direction. We are focused on improving the
position of small businesses, ultimately, helping them to reach the success that they are working on for their company. Link Systems is in business to
help your business succeed. Our products are a series of motivational e–books that are organized to help you start and run a successful business. Our
customer base ... Show more content on Helpwriting.net ...
It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart. In a typical
LAN configuration, one computer is designated as the file server. It stores all of the software that controls the network, as well as the software that
can be shared by the computers attached to the network. Computers connected to the file server are called workstations. The workstations can be
less powerful than the file server, and they may have additional software on their hard drives. On many LANs, cables are used to connect the
network interface cards in each computer; other LANs may be wireless. All stations are connected by cable or wireless to a central point, such as hub
or a switch. If the central node is operating in a broadcast fashion such as a Hub, transmission of a frame from one station to the node is retransmitted
on all of the outgoing links. In this case, although the arrangement is physically a star, it is logically a bus. In the case of the central node acting as
switch, an incoming frame is processed in the node and then retransmitted on an outgoing link to the destination station. Ethernet protocols IEEE 802.3
are often used in the Star topology LAN.
Wide Area Network(WAN) Design A Wide Area Network ( WAN) is a
computer network covering multiple distance areas, which may spread across
the entire world. WANs often connect
... Get more on HelpWriting.net ...
The Importance Of End Systems
In today's society networking is pivotal structure in the way information is transferred and received between people. In the business world we need
to send information to people to at fast rates to meet user satisfaction. Imagine places like wall street that is the mecca of business that constantly
send information back and forth to get the right information to keep investor aware or up to date on a forever changing stock market. Picture one the
biggest libraries in america the library of congress in washington dc that has network structure to accommodate millions of people that commute and
use resources such online biography and web capabilities every day. For system like this to exist we depend on a common network layer that is used all
... Show more content on Helpwriting.net ...
In the second and third layer of osi model it is called data link and network link. Data link is packaging data into frames and transmitting those frames
on the network and performing the error detection correction by uniquely identifying the network devices with an address, and handling the flow
control. Data link layer has two sub layer which is called media access control which is know as the computer unique identifier to which the network
is assigned The mac address comes with a 48 bit address that is assign to it devices network interface card/.Second sub layer is llc which stand for
logic link control, which is know as the multiplex functions that is process of over media access control To provide a means of exchanging data
between end users across a MAC–controlled link or a collection of LANs interconnected by MAC–level bridges. Layer 3 switching is another example
of fragment–free switching. Up to now, this discussion has concentrated on switching and bridging at the data link layer Layer 2 of the Open System
Interconnection OSI model. When bridge technology was first developed, it was not practical to build wire–speed bridges with large numbers of
high–speed ports because of the manufacturing cost involved. With improved technology, many functions previously implemented in software were
moved into the hardware, increasing performance and
... Get more on HelpWriting.net ...
Smartphone 's And Social Networking
Smartphone's and Social Networking Lafayette Fedrick Class: ISSC340 American Military University Class number: 4349756 Instructor: Professor
Venkatesh, Vijay Date: 19 October 2014 Introduction The topics that will be covering in this paper is Smartphone technology, Social Networking with
Virtual Private Networks, Security and TCP/IP Networks, App Technology and Social Apps Lack of Privacy. This paper will attempt to address the
security issues with each of these platforms and the future of these technologies. Smartphones The origin of smart phones, it began with Alexander
Graham Bell. Bell invented the telephone in 1878 he also made the the first phone call. Motorola later introduced some of the first cellphones to the...
Show more content on Helpwriting.net ...
The reason why people are beginning to use more apps and data on their smart phones is because the speed of data keeps increasing to the point
they have a home computer in their pocket. Nearly all of the smart phones in the world run on a Long Term Evolution (LTE) network or a (Fourth
generation) 4G network. Most Carriers are using (Code Division Multiple Access) CDMA or (Global System for Mobiles) GSM. Therefore
CDMA and GSM are the two basic technologies in smart phones networks. In the United States CDMA is mostly used and overseas/Europe uses
GSM. The reason GSM is most found in Europe is because in 1987 Europe mandated that law use the GSM technology (Trade, O, p. 05). There is
good and bad in both networks, but there are key differences in each one. GSM carrier put there costumer information on a remove able SIM
Card, so the consumer has complete power and control of what phone they choose to use. While CDMA network you would have to get
permission to use or access a difference phone on their networks. Back too 4G/LTE, these two network are the next stage in mobile networking that
is suppose to deliver much faster speed than there predecessors. Now some company's offer 4G only not the LTE, 4G is actually a High Speed
Packet Access network known as HSPA. The 4G HSPA offers down speeds between 5 megabits and 8 megabits per second. While 4G LTE is
considerably much faster than 4G alone, 4G LTE uses (Multiple Input Multiple Output) MIMO technology. MIMO
... Get more on HelpWriting.net ...
The Network Of A Network
Nowadays everybody can get access to the internet through networks, but according to Columbia University over the 37% of people do not know
what a network is. A network is a group of computers which are connected to share information, files, and performs tasks. A network is built using the
same common language. My purpose of this project is to explain what a network is, and let you know how important is to know it. The next
paragraphs will explain the introduction of networking, the disadvantages of networking, and the disadvantages. A network is a group of computers or
devices connected together in order to share information. The computers or electronic devices are connected to networks in many ways, such as
wireless connection, wired... Show more content on Helpwriting.net ...
Another type of network is Metropolitan area network (MAN) which is used to connect an entire city, a particular region, and university campus.
Moreover, a metropolitan area network is smaller than a wide area network but larger than a local area network. Furthermore, another type of
network, which is called PAN (Personal Area Network). A Personal Area network is defined as a group of computers or electronic devices
connected to a specific range of a user. For example, when we have a group of devices at home interconnected such as laptops, printers, tablets, and
cell phones. Networks have become a central issue for organizations, business, and universities because it provides many advantages. One of the
benefits of a network is the easiest way to share information. For example, in a company where there are many offices around the world you can
distribute information to all the offices in short time. Moreover, having a network will give you the benefits of talking with people in real time in a
larger distance. In addition, another advantage of a network is that allow you to share hardware. For example, in an office that you only have a printer
you can use this printer connected to multiple computers instead of having one printer for each computer. Another advantage of networking is that
allow users to communicate with people all over the world in a better and easy way. For example, we can communicate to
... Get more on HelpWriting.net ...
Wireless Security : Wireless Network Essay
Wireless Security Overview
Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and
the Internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: Wireless Wide
Area Networks (WWAN), Wireless Local Area Network (WLANs), Wireless Personal Area Network (WPAN )and etc.
WWAN includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile
Communications (GSM). WLAN, representing wireless local area networks, includes 802.11, HiperLAN, and several others. WPAN, represents
wireless personal area network technologies such as Bluetooth and IR
All of these represent potential threats in wireless networks as well. However, the more immediate concerns for wireless communications are:
Denial of service
Malicious hackers
Theft of service (Identity theft / MAC spoofing)
In wireless security, information must be protected from unauthorized, unanticipated, or unintentional modification. Security requirements include the
following:
Authenticity–A third party must be able to verify that the content of a message has not been changed in transit.
Nonrepudiation–The origin or the receipt of a specific message must be verifiable by a third party.
Accountability–The actions of an entity must be traceable uniquely to that entity.
As wireless communication and the
... Get more on HelpWriting.net ...
The Purpose Of An OSI Model
What is the purpose of an OSI model? The purpose of an OSI model is a standard that was created for networks to share information. This standard
governs the way information is transmitted over different networks. The model also sets guidelines to those in the manufacturing industry that create
and develop software and hardware that are all compatible with each other.
This paper will discuss and describe the 7 layers of the Open System Interconnection model (OSI model) and the layers of the Transport Control
Protocol/Internet Protocol model (TCP/IP model), and explain the similarities and differences of each model.
The 7 layers of the OSI model consist of: The Application layer (layer 7), The Presentation layer (layer 6), The Session... Show more content on
Helpwriting.net ...
The Transport layer
Transport layers exist in both TCP/IP and OSI model. Even though both models have Transport layers they differ. The TCP/IP model consist of two
standard transport protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP uses a reliable data–stream protocol
which is connected oriented and UDP uses a unreliable data–stream protocol which is connectionless oriented.
The Internet layer
The Internet layer is a group of protocols and specifications that are used to transport packets from the host across a network, the host specified by a
network address (IP address)
The Link layer
The lower level layer of the TCP/IP model, this layer is used by a suite of protocols for the "Internet". This is used to connect hosts or nodes to a
network. This layer is compared to the "Data Link" layer and "Physical " layer of the OSI model.
TCP/IP Application Layer VS OSI Application, Presentation and Session layer.
The similarities in both models are comparable but different at the same time. All though they exist in both, the approach each uses to construct
applications is different. In the OSI model the Application layer, Presentation layer and Session layer correspond to the Application layer of the TCP
/IP model. They somewhat do the same job but use different protocols, TCP/IP uses: FTP, SMTP, TELNET, DNS and SNMP where the OSI model
uses: FTAM, VT, MHS,
... Get more on HelpWriting.net ...
Introduction Of An Internet Of Things
Abstract– 6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices across IPv6 clouds. 6LowPAN
supports a QoS feature based on two priority bits. So far, little interest has been granted and this QoS feature and there are no implementations of
such feature in real networks. In this paper, we evaluate the effectiveness of these priority bits in various scenarios. We show that under very heavy
or very low network load, these bits have a limited effect on the delay. We will also study the effect of using of 802.15.4 frame in different cases on
QoS, Keys words: Internet of Things, Sensor Networks, Flow Label, Traffic Class, 6LowPAN, CSMA/CA, GTS. 1.Introduction An Internet of Things
(IoT) system connects the physical world into Internet via radio frequency identification (RFID) tags, sensors, and mobile devices. IoT is an intelligent
collaboration of tiny sensors and devices giving new challenges to the end to end communication of things. 6lowpan (IPv6 over Low–Power Wireless
Personal Area Networks) is a promising IoT IETF standard for connecting sensors across IPv6 clouds. Some sensing applications are time sensitive
and may require bounded delay in sending the sensed data. In particular, military, mission critical and safety domains generally require rapid and/or
real time data transfer. Therefore, some QoS feature would be required to give sensor network administrators the ability to control the overall network
performance.
... Get more on HelpWriting.net ...
The For Seed Germination Are Carried Out Under Controlled...
INTRODUCTION
The seed biology is known to be the most important stream of plant science. Various experiments for seed germination are carried out under controlled
environment. Researchers have experienced a need to maintain and monitor the relative humidity, temperature, water content of seeds kept in closed
containers. There exist some practices of using the super saturated solutions made by different chemicals to maintain the desired conditions for
effective seed germination and growth. wireless remote monitoring system that can be utilized to precisely monitor and measure the prerequisite
conditions of seedling germination. The rapid development and wide adaptability of wireless sensor networks in agriculture has increased the quality
of the crops produced. Many researchers have worked on real time monitoring systems. Aimed to design and develop a network integrated of sensors
to manage the agricultural water of sensors to manage the agricultural water. Now a days WSN(Wireless Sensor Network) ZigBee is one of the most
predictive, reliable and dominant standard. ZigBee model defines the first two layers as physical layer (a) and data–link layer (b) of OSI model.
ZigBee is specified for high level communication protocols using small, low–power digital radios signals based on IEEE 802 standard for Wireless
personal area networks. ZigBee is a low–cost wireless mesh network standard. The low cost of the ZigBee network enables the technology to be widely
used in
... Get more on HelpWriting.net ...
Computer Networks : Project Report On Csma Cd With Backoff...
ECE 5534
COMPUTER NETWORKS–1
PROJECT REPORT ON CSMA CD WITH BACKOFF ALGORITHM
Submitted To: Dr. Chul–Ho Lee
FLORIDA INSTITUTE OF TECHNOLOGY
2015 FALL
Project Members: Student Id
MUTHUKARTHIK CHANDRASEKAR : 902051523
SHARAT SRINIVAS SUBRHAMANYAM MATTA : 901939745
MANJUNATH SEKAR : 901827036
Introduction:
Computer networks connect two or more computers which are located anywhere geographically. The use of networks is for communication, resource
sharing and information sharing.
As per ISO standards, a network is divided into seven different layers:
1. Physical Layer: It is the lower most layer in OSI model, its purpose is transmission of data between the two system.
2. Data link layer: It connects the data from one system to the other by using a protocol of when to send the data over medium.
3. Network layer: It is used for routing, addressing and finding best route to transmit.
4. Transport layer: It holds all the problems of data deliver and transportation problems in the system.
5. Session layer: It manages all different application and keeps up with the synchronization point.
6. Presentation layer: It converts the data into the form which can send across the network to the application layer.
7. Application layer: It is the user interface point in which select specific
... Get more on HelpWriting.net ...
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM) A Case Study
Table of Contents:
Introduction ....................................... 3
Overview ....................................... 3
Innovative Aspects ......................................... 5
Advantages .......................................... 6
Disadvantages .......................................... 6
Conclusion .......................................... 7
Introduction:
Asynchronous Transfer Mode (ATM) is a high speed network technology which is designed to support both voice and data communications. It was
initially developed to meet the needs of the Broadband Integrated ... Show more content on Helpwriting.net ...
Each ATM cell contains exactly 53 octets, 5 octets for header 48 octets for data. As a core protocol, ATM is used in Synchronous Optical Networking
(SONET)/Synchronous Digital Hierarchy (SDH), which are backbone of Public Switched Telephone Network (PSTN). Internet Service Providers
(ISPs) use Asynchronous Transfer Mode on their long–distance private networks. ATMs operate at the Layer 2 (Data Link layer) of the OSI model, over
fiber cable or twisted–pair cable (http://www.wanredundancy.com).
The ATM transport hierarchy is shown in the figure below. The physical layer can be divided into three functional levels:
Transmission Path Level: This extends between network elements that assemble and disassemble the payload of a transmission system. For end–to–end
communication, the payload is end–user information. For user–to–network communication, the payload may be call–control signaling information (call
setup and call termination). Cell delineation and header error–control functions are required at the end points of each transmission path.
Digital Section Level: This refers to the exchanges or signal transfer points in a network that are involved in switching data streams.
Regenerator Section Level: This is a part of the digital section.
Virtual Channels and Virtual Paths
Logical connections in ATM are referred to as virtual channels. A virtual channel is analogous to a virtual circuit inX.25 or a frame–relay logical
connection. It's
... Get more on HelpWriting.net ...
Essay on NT1210 Labs 3.1-3.4
NT1210 Labs 3.1 to 3.4 3.1.1 What would happen if wireless devices were not governed by the Wi–Fi Alliance and each vendor had its own standards
and protocols? What impact would this have on your personal life or business communications? Personal information and business will slow down
due to each vendor having its own standards/protocols. It will also be more vulnerable to attacks and make accessing more difficult. 3.1.2 Give
another example of a model that is used to visualize something that is difficult to observe or perceive. How does the model make it easier to
understand? Another way of displaying information for easier understanding is to use a flow chart. A flow chart can be used as a step by step guide.
3.1.3 Based on... Show more content on Helpwriting.net ...
Host A will use application for the OS while allowing the PC to still communicate to other devices. Transport will control the data sent and
received. The network will place IP addresses to the packets allowing data to be added to the MAC addresses and physical link between host and
lines. Exercise 3.2.4 Explain why routing devices do not need the upper layer of the OSI model to route traffic. What is the highest layer of the
OSI model used by the router to decide where to forward traffic? The first three layers of the OSI is typically what a router needs to route traffic.
The first three layer are physical, data link and network. The highest level the OSI decide where to forward traffic to is the transport layer which is
located in the host layers. Lab 3.2 Review 1. How does the abstraction of the physical layer facilitate interoperability across networks using different
types of physical wires? IP terminals might be located in different parts of the build making it complex. There are lines coming in and out of the build
that might be different than that issued to a company. To try and replace one will be complex, confusing and time consuming if unsure. 2. The OSI
model is not directly implemented in networking and often the distinction between the layers will blur in implementation. Why does it endure despite
these
... Get more on HelpWriting.net ...
Changing The Physical Layer
The physical layer specifics the function details for initiating, keeping up and turning off the physical link when moving the bits of data over the
physical media such as copper, fibre or wireless. So it will takes your data bits of ones and zeros covert them to what is needed to transfer over that type
of media so for example change bits into electrical signals for copper cables then will covert it back to ones and zeros once it reaches its destination to
send up OSI model layers.
When changing the bits so they can be sent over different types of media this is known as signalling. Signalling will change the bits to what it needs to
be for transmission then is read by the connections at the other end.
Protocols of the physical layer ... Show more content on Helpwriting.net ...
If there is a difference a CRC frame error is generated to state there is a corruption either on the sending device side or the destinations device packet
transmission.
For detecting and troubleshooting these issues use the different types of show commands such as show interface and show spanning–tree.
The data link layer is responsible for controlling access to the media and formatting the data for transmission for going across the physical network
link. So it encapsulates the packets from the network layer to suitable frames for the network media to use for transferring data frames from one place
to another error free. The addressing used at this layer is physical addressing also known as mac addressing which is how devices are addressed at this
layer instead of IP addressing. The data link layer also does error detection at this layer as well.
The data link layer has two sub layers which are logical link control and Mac. The logical link control sub layer gives flexibility in services to the layers
above so it will let the data link layer known what to do with a packet when gets a frame. This works by it will check the header to establish that the
packet inside the frame it received is destined for the network layer. The MAC sub layer keeps a table with the mac addresses of the devices because
each device must have a unique Mac to be identified on the network.
At the data link layer you also
... Get more on HelpWriting.net ...
unit 3 assignment 3 Essay
Chapter 3 Review 1. Which of the following is true about a TCP/IP network? A) The network uses only standards defined in TCP/IP RFCs. 2.
Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) D) TCP/IP mapping and C) Ethernet 3. Think
generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a
standard? (Choose two answers.) B) It exists as a deployed network device, which people can visit on the Internet. C) It has been passed through some
form of review and approval or certification process. 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) B)
International... Show more content on Helpwriting.net ...
A) Vendor models 10. Which of the following statements is true when comparing the OSI and the TCP/IP model as defined in RFC 1122? B) The
lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI. 11. A network engineer connects two PCs
(PC1 and PC2) using Ethernet NICs and an Ethernet cable that has copper wires inside. The two PCs communicate successfully. Which of the
following happens when PC1 sends bits to PC2? D)PC1 converts the bits to sound waves, and the NIC uses an A/D converter to send the data over
the cable. 12. A TCP/IP network includes an Ethernet LAN with 10 PCs uses a LAN switch. PC1 sends data intended for an app running on PC2.
Which of the following mechanisms does Ethernet define so that PC2 receives and processes the data? A)The Ethernet header lists PC2's MAC
address so that PC2 will realize that the data is meant for PC2. 13. Two network pros are having a conversation about some issues in a network.
They discuss some issues related to how PPP forwards data, so they happen to be discussing the data structure that includes the PPP header and trailer.
Which of the following terms do they use? B) Packet 14. Which of the following are true facts about IP addresses? (Choose two answers.) C) Are
listed in the data–link trailer D) Used by routers to make a forwarding decision 15. Which of the following answers is true about Ethernet MAC
addresses? A) 48 bits in length C) Are listed
... Get more on HelpWriting.net ...
Open System Interconnection Model Essay
Open System Interconnection Model OSI is short for Open System Interconnection, which is an ISO standard for worldwide communications that
defines a networking framework for implementing protocols in seven layers. History and Reasoning for… –––––––––––––––––––––––––– The
early development of networks was disorganised. And by the early 80's there was a great increase in the number and size of networks. Companies
started to realise how useful networks could be and started to add and expand networks as quickly as new network technologies were introduced. But
by the mid 80's the companies start to experience problems as it was found that it was difficult to exchange information... Show more content on
Helpwriting.net ...
It gave creators of networks a set of standards that ensured greater compatibility among various network technologies produced by companies around
the world. The OSI reference model has become the primary model for network communications and is considered the best tool available for teaching
people about sending and receiving data on a network. The 7 Layers Of the OSI ––––––––––––––––––––––– The OSI reference model is a framework
that is used to understand how information travels throughout a network. This model explains how packets travel through the various layers to another
device on a network, even if the sender and destination have different types of network media. In the OSI reference model, there are seven numbered
layers, each of which illustrates a particular network function. Layer 7 is the Application Layer…This layer supports application and end–user
processes. Layer 6 is the Presentation Layer…This layer provides independence from differences in data (e.g., encryption) by translating from
application to network format, and vice versa. Layer 5 is the Session Layer…This layer establishes, manages and terminates connections between
applications. Layer 4 is the Transport Layer…This layer provides transparent transfer of data between systems, or hosts, and is responsible for
end–to–end error recovery and
... Get more on HelpWriting.net ...
Nt1310 Unit 7
DCC Homework CH 1& Ch2 Sai Kumar thumma 1004541 Q1) Ans The 5 components of DCS (Data communication sys) are A)Sender. B)Receiver.
C)Message. D)Transmissions Medium. E)Protocol. Q2) Ans Performance, reliability and security are the 3 necessary for efficient network. Q3) Ans In
a point–to–point connection, we connect 2 devices and in multi–point there are more than two devices which share the link. Thus, multi–point has
more reliability, less installation cost and easy to install. Q4) Ans Point–to–point and Multipoint are the two–line configuration. Q5) Ans In line
configuration, there are 4 topologies, Mesh, Bus, Ring & Star. Q6) Ans In a Half–duplex mode, it can either transmit the data or it can only receive
data, but not both at a time. For example, consider the radio channel where one can only receive the data via sound and another example is the walkie
talkies are based on these systems.... Show more content on Helpwriting.net ...
Example is a telephone, where user communicate each other. Q7) Ans The Basic Network topologies are Ring, Bus, Star, & Mesh topologies. The
advantage For ring is ease installation and reconfiguration. For mesh is eliminate traffic problem when connected to multiple system. For bus is
simple to install and require less cabling line. For Star is least expensive than other, requires only I/O port Q8) Ans For each network the required
number of cable links are Ring & Star – n number of links. Mesh – we use the equation – n(n–1) /
... Get more on HelpWriting.net ...
Physical, Data Link, Network Layers, Management...
MIS589 Project Milestone 2
Network Requirements 1
Physical, Data Link, Network Layers
Management Integration System
ClearLeaf MIS
Prepared by: Shams Bin Shahid Anaugh
Date: 01/23/2016 Approved by:
Physical media
Physical media is found on the physical layer of the OSI model. Therefore physical media includes cabling and equipment, wiring and the frequencies
defined to transfer data between two points.
Physical media is what physically connects the computers connected on the internet. For this network two physical media will be used to allow
access to the application layers of the system. The coaxial cables will be used to create a WAN. While a wireless protocol will be used in allowing
users to roam within the network. A LAN will be represented as follows;
Coaxial cable are classified according to it impedance. The one used in this exercise will use the impedance of 70 ohms with RG–58. This can be used
for the discussed high speed internet requirements discussed above.
The diagram above shows the high level LAN network design that could be implemented. Inter–office connections could be done using
Sate–590553175llite Communication or using a single point ISP provider to do the networking.
Twisted pair will also be used to plug computers to the main internet socket to aid the roaming of the wireless users.
Physical media selection: summary
Physical media selection is very daunting task given that there as many products ready in the market that offer wide range
... Get more on HelpWriting.net ...
Designing A Computer Network -such
There are many things to consider when designing a computer network –such as costs of components, software and labor; communication, cohesion,
expandability and many others. However, the end goal in such an enterprise is to have a fully functional, harmonious, and cohesive tiered system
where duties and actions are divided, and delineated accordingly. One of the major network architectures used to facilitate this process is known
as the TCP/IP Protocol Suite. The TCP/IP Protocol Suite was designed by scientists in the effort to support a new type of network known as the
ARAPNET that was being installed across the US in the late 60's to 70's. (White, 2013, p. 15) The challenge was to create an open system
whereby all networks could freely communicate with each other. The design was based on a layered system whereby the user would connect at
the topmost (or application) layer, while at the same time being removed or separated from the lower (physical) layer. Although the number of
layers is not exactly set, depending on the source this number can range between five and seven layers, with each layer providing services to the
layer above it. For the purposes of this discussion however, we will address the five layer model. The five layers of the TCP/IP Protocol Suite are:
Application, Transport, Network, Network Access (or Data Link), and Physical. (White, 2013, p. 15) Application This layer supports all of the
applications on the network. Some of the most frequent
... Get more on HelpWriting.net ...
Wireless Sensor Network Essay
I. INTRODUCTION
Wireless Sensor Network consists of highly distributed
Autonomous sensors nodes to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and
to cooperatively pass their data through the network to a receiver (destination) [1] [7].
A sensor node consist of a radio transceiver with internal antenna or connected to external antenna, a microcontroller and electronic circuits for
interfacing with the sensors and energy source such as battery[1][7].
A.Topologies:
Topologies used in Wireless Sensor Network are Mesh, Star, Ring, Tree, and Bus, Fully connected.
Mesh Network.
B.Characteristics:
Power consumption constrains for nodes using batteries or energy ... Show more content on Helpwriting.net ...
Wireless Sensor Network Protocols:
Physical layer: Sonet , ISDN
Data link Layer: Frame Relay, FDDI, Ethernet
Network Layer: RIP,OSPF, EGP,IPX,IPv6,ARP
Transport Layer: TCP, UDP, SPX
Application Layer: BOOTP, DHCP, HTTP, DNS
Classifications of the Protocols
Protocols are classified into the following major categories.
TCP/IP IP, TCP, UDP, SMTP, POP3, RIP, FTP, DHCP
Cellular GPRS, GSM, WAP and CDMA
VOIP SIP, RTP, MGCP and H.323
General Frame Relay, ATM, X.25, PPP[1].
II.OBSTACLES IN WIRELESS SENSOR SECURITY
Wireless sensor nodes[2] have limited resources such as limited memory and limited power. There is unreliable communication in wireless sensor
network that leads to threat to sensor security. The security of network depend on communication which relies on protocol.
Energy Constraint: Energy requires converting input to output (sensor transducer), communication among the sensor nodes and computation. Security
levels depend upon the cost of energy.
Memory Limitations: Sensor nodes have small amount of memory and storage. Sensor nodes require simple algo–rithms because they do not have
enough space to store complicated algorithms and executed them.
Unreliable communication: – Unreliable communication occurs due to unreliable transfer, conflict and latency. Unreliable communication occurs due
to connectionless packet based routing in wireless sensor network. Even if channel is
... Get more on HelpWriting.net ...
Nt1310 Unit 1 Network Analysis Paper
Each layer has a specific function and the layers work together to allow an application to send data over a computer network without really
specifying the exact protocols and/or physical wiring within each layer. In line with the figure above, when the first CEO sends an email message to
the second CEO, email 'application worker' firstly prompts the first CEO to enter a message and specify that the receiver is the second CEO. The
application worker then creates the necessary data package with message contents and the destination email address and send s this to a 'transport
worker'. The transport worker provides transport integrity. The transport worker may establish a connection with the receiver (second CEO); monitor
the overall flow between sender and receiver, and perform the overall error control to recover any lost data to protect... Show more content on
Helpwriting.net ...
The 'network worker' then takes the data package from the transport worker and adds routing information as to assign the package with a specific PO
BOX address or rather a network address (if you may) in order to navigate through the network. The 'network access worker' then inserts
error–checking information and prepares the data for transmission. The 'physical worker' finally transmits the data via a physical or wireless medium
so that the second CEO receives the message. The following figure shows how the data is transmitted from the application layer to the physical layer.
In the case of sending an email, in the same breadth, the OSI model follows similar logical and physical connections when transmitting the email from
one CEO's email mailbox to the other's. The other difference is that though the TCP/IP protocol suite has 5 layers, the OSI model has seven layers
which basically
... Get more on HelpWriting.net ...
Application And Application Of Cloud Computing
Introduction With the Internet, users have been able to access information faster than ever. Today, users have the ability to utilize cloud technologies
to access information and services. Users no longer have to rely on the processing power of their personal computer (PC) to complete task or limit the
ability of accessing pictures or document to a physical location such as their hard drive on their PC. The Internet is a large network that is continues to
provide more services and opportunities. The Internet is support by a large network of routers, switches, and servers. Understanding how to network
terms and utilization will continue to allow business and user to optimize the utilization of the Internet and cloud computing.
Ways users use applications in the cloud in today's business environment As information technology continues to improve, applications no longer are
limited to being installed locally on a physical computer or server. Cloud computing now allows applications be access via a virtual solution knows as
the "cloud". There are many essential characteristics of cloud computing such as on–demand access, pay per use, connectivity, and resource pooling
(Durkee, 2010). Users must be able to trust the connectivity when relying on access an application over the internet. Today 's cloud servers are
connected to high–speed networks that allow data to flow to the Internet. These high–speed networks improve reliability and expand accessibility.
Cloud computing offers
... Get more on HelpWriting.net ...
The Network Requirements Of Many Small Organizations
The networking requirements of many small organizations can be served by a single LAN with one or two servers. The design of a small
network should be simplistic, but practical, reliable and scalable. A good LAN network must easily expand as the business grows, even if the
scale of the original environment is small. Avoid making technology judgments that might limit the company as it grows. I will deal with the
physical and logical design of a LAN by building a network in a test laboratory, consisting of computers, an Appliance Security Appliance (ASA)
5505 firewall and switches. Network will consist of Fiber Optic Cable Modem, Nodes, Communication Media, Networking Devices A security
policy will be in place, or updated to reflect the goals of the company. Redundant Firewalls with VPNle Communication media (copper cable to
connect to the internet, fiber cable) Switch: Switches connect multiple devices, including computers and printers, on the same network. Router is
attached to a switch# routers connect a network to other networks, such as the Internet. They shield data from security threats using technologies
such as firewalls and virtual private networks (VPNs). They can even decide which computers get preference over others. A workstation connected
to a switch Storage server ( server with hard disk) The server will be acting as a print server backup Redundancy: is two chassis, two modules, two
links. It means you have a backup to take over the primary system if
... Get more on HelpWriting.net ...
Essay on NT1210- Unit 3 Assignment 1
Multiple Choice Questions
1. Which of the following is true about a TCP/IP network? The network uses standards defined in TCP/IP RFC's plus other standards.
2. Which of the following terms is not a common synonym for TCP/IP model? Ethernet / TCP/IP Mapping
3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically
true of a standard? It exists as a written document / it has been passed through some form of review and approval or certification process
4. Contrast an international standard as compared to a de facto standard? De facto standard documents have been reviewed more thoroughly. / De Facto
standards typically mean that the ... Show more content on Helpwriting.net ...
11. A network engineer connects two PCs (PC1 and PC2) using Ethernet NICs and an Ethernet cable that has copper wires inside. The two PCs
communicate successfully. Which of the following happens when PC1 sends bits to PC2?
12. A TCP/IP network includes an Ethernet LAN with 10 PCs uses a LAN switch. PC1 sends data intended for an app running on PC2. Which of the
following mechanisms does Ethernet define so that PC2 receives and processes the data? The Ethernet header lists PC2's MAC address so that PC2
will realize that the data is meant for PC2
13. Two network pros are having a conversation about some issues in a network. They discuss some issues related to how PPP forwards data, so they
happen to be discussing the data structure that includes the PPP header and trailer. Which of the following terms do they use? Packet
14. Which of the following are true facts about IP addresses? Are listed in the data–link trailer and used by routers to make a forwarding decision
15. Which of the following answers is true about Ethernet MAC addresses? All of the above.
16. Witch of the following statements is true comparing LANs and WANs? LANs generally connect devices that are nearer to each other, compared to
WANs. WANs are purchased, and LANs are leased.
17. Which of the following answers list true facts about the data link layer of the TCP/IP? Two TCP/IP data–link protocols are Ethernet and PPP.
Data–link protocols define addresses that
... Get more on HelpWriting.net ...
Patton-Fuller Community Hospital Network Project
Patton–Fuller Community Hospital Network Project
Harold Copeland
CMGT/554
11/11/13
Dean Mcintyre
Company Overview Patton–Fuller Community Hospital is a community hospital that provides healthcare services designed to meet the needs of
patients at every stage of life. The hospital was originally founded in 1975. Patton–Fuller Community Hospital has been an important part of the
community since its opening. Patton–Fuller Community Hospital is located on the corner of 61st. Street and Jump Street (Patton–Fuller Community
Hospital, 2013). Patton–Fuller Community Hospital has provided quality healthcare services for the entire family since its opening while keeping its
patients information and data secure even in this current ... Show more content on Helpwriting.net ...
These two layers perform routing and deals with end to end issues. The hospital currently uses a CISCO ASA 5510–VPN router to connect to the
internet. Finally the session layer, presentation layer, and application work together to make the network operational. These three layers actually make
all the data be visible to the end users. These layers also make the data and network usable to the operator. Patton–Fuller utilizes Windows Explorer and
its company's webpage for these layers (Patton–Fuller, 2013).
Recommended Protocols For Patton–Fuller to fully utilize their potential networking power, the following protocols should be utilized. Patton–Fuller
should utilize a Gigabyte Ethernet Network for all its hardwired LAN connections. Gigabyte Ethernet is part of the family of Ethernet computer
networking and communication standards. The Gigabit Ethernet standard supports a theoretic data rate of 1 gigabit per second. Gigabyte Ethernet
networks are connected by CAT5e and CAT6 cabling (Gigabit Ethernet, 2013). The Gigabyte Ethernet network should be accomplished by using layer
3 switch. A layer 3 switch is a high–performance device for network routing. Layer 3 switches actually differ very little from routers. A Layer 3 switch
can support the same routing protocols as network routers do. Both inspect incoming packets and make dynamic routing decisions based on the source
and destination addresses inside. Layer 3 switches improve on the performance of routers
... Get more on HelpWriting.net ...

More Related Content

Similar to Osi Reference Model And The Osi Model

934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networkstechbed
 
Computer-Networks-PPT.pptx
Computer-Networks-PPT.pptxComputer-Networks-PPT.pptx
Computer-Networks-PPT.pptxDebaComedyClub
 
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptxActionForyou
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1paolo374233
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Renee Jones
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
Computer networking project
Computer networking projectComputer networking project
Computer networking projectAshifimrankhan1
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networkingJyoti Kumari
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Lakeisha Jones
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, AbstractVictoria Burke
 
Project. Microsoft Windows Nt Networking
Project. Microsoft Windows Nt NetworkingProject. Microsoft Windows Nt Networking
Project. Microsoft Windows Nt Networkingbksp
 
How our network_works
How our network_worksHow our network_works
How our network_worksRobin Nappi
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 

Similar to Osi Reference Model And The Osi Model (20)

934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
Computer-Networks-PPT.pptx
Computer-Networks-PPT.pptxComputer-Networks-PPT.pptx
Computer-Networks-PPT.pptx
 
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
20221206084441_638f00f9abf2b_computer_networks_ppt.pptx
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Computer network
Computer networkComputer network
Computer network
 
Data Communication
Data Communication Data Communication
Data Communication
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
Internet
InternetInternet
Internet
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
Computer network
Computer network Computer network
Computer network
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
 
Project. Microsoft Windows Nt Networking
Project. Microsoft Windows Nt NetworkingProject. Microsoft Windows Nt Networking
Project. Microsoft Windows Nt Networking
 
How our network_works
How our network_worksHow our network_works
How our network_works
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
Network Notes
Network Notes Network Notes
Network Notes
 

More from Lori Mathers

Stock Photo Of Parchment, Paper, Writing, Write, Inside, Indoors
Stock Photo Of Parchment, Paper, Writing, Write, Inside, IndoorsStock Photo Of Parchment, Paper, Writing, Write, Inside, Indoors
Stock Photo Of Parchment, Paper, Writing, Write, Inside, IndoorsLori Mathers
 
Teaching Essay Writing Help, Teaching Persuasiv
Teaching Essay Writing Help, Teaching PersuasivTeaching Essay Writing Help, Teaching Persuasiv
Teaching Essay Writing Help, Teaching PersuasivLori Mathers
 
Essay Cloudstreet Narrative P.O.V. - GCSE Drama - M
Essay Cloudstreet Narrative P.O.V. - GCSE Drama - MEssay Cloudstreet Narrative P.O.V. - GCSE Drama - M
Essay Cloudstreet Narrative P.O.V. - GCSE Drama - MLori Mathers
 
How To Write A Report On A Disease. Research One Of T
How To Write A Report On A Disease. Research One Of THow To Write A Report On A Disease. Research One Of T
How To Write A Report On A Disease. Research One Of TLori Mathers
 
FastForward JusticeS 3Rd Na
FastForward JusticeS 3Rd NaFastForward JusticeS 3Rd Na
FastForward JusticeS 3Rd NaLori Mathers
 
Thesis Statement Research Paper. Thesis Statement Of Research Paper
Thesis Statement Research Paper. Thesis Statement Of Research PaperThesis Statement Research Paper. Thesis Statement Of Research Paper
Thesis Statement Research Paper. Thesis Statement Of Research PaperLori Mathers
 
Writing - Mr. BonaseraS Classroom Web Site
Writing - Mr. BonaseraS Classroom Web SiteWriting - Mr. BonaseraS Classroom Web Site
Writing - Mr. BonaseraS Classroom Web SiteLori Mathers
 
Gamsat Essay Collection Your Guide To E
Gamsat Essay Collection Your Guide To EGamsat Essay Collection Your Guide To E
Gamsat Essay Collection Your Guide To ELori Mathers
 
How To Write Lyrics On Paper Allcot Text
How To Write Lyrics On Paper Allcot TextHow To Write Lyrics On Paper Allcot Text
How To Write Lyrics On Paper Allcot TextLori Mathers
 
Buy Nothing Day Ap English Essay. Buy Nothing Day A
Buy Nothing Day Ap English Essay. Buy Nothing Day ABuy Nothing Day Ap English Essay. Buy Nothing Day A
Buy Nothing Day Ap English Essay. Buy Nothing Day ALori Mathers
 
Free Essay Writing Help, Essay Writi
Free Essay Writing Help, Essay WritiFree Essay Writing Help, Essay Writi
Free Essay Writing Help, Essay WritiLori Mathers
 
Essay Outline PowerPoint Template - SlideModel
Essay Outline PowerPoint Template - SlideModelEssay Outline PowerPoint Template - SlideModel
Essay Outline PowerPoint Template - SlideModelLori Mathers
 
How To Write A Response Paper Paperstime Respo
How To Write A Response Paper Paperstime RespoHow To Write A Response Paper Paperstime Respo
How To Write A Response Paper Paperstime RespoLori Mathers
 
Writing Toefl Essays - Academiccalendar.Web.Fc2
Writing Toefl Essays - Academiccalendar.Web.Fc2Writing Toefl Essays - Academiccalendar.Web.Fc2
Writing Toefl Essays - Academiccalendar.Web.Fc2Lori Mathers
 
Writing A Descriptive Essay The Structure Of A Descriptive Essay
Writing A Descriptive Essay The Structure Of A Descriptive EssayWriting A Descriptive Essay The Structure Of A Descriptive Essay
Writing A Descriptive Essay The Structure Of A Descriptive EssayLori Mathers
 
Biography Outline Template - 15 Formats, Samples An
Biography Outline Template - 15 Formats, Samples AnBiography Outline Template - 15 Formats, Samples An
Biography Outline Template - 15 Formats, Samples AnLori Mathers
 
600 Word Writing Sample
600 Word Writing Sample600 Word Writing Sample
600 Word Writing SampleLori Mathers
 
Electoral College Votes Explained What Are The Pros And Cons
Electoral College Votes Explained What Are The Pros And ConsElectoral College Votes Explained What Are The Pros And Cons
Electoral College Votes Explained What Are The Pros And ConsLori Mathers
 
Understanding Satire With Examples Satire, Gramm
Understanding Satire With Examples Satire, GrammUnderstanding Satire With Examples Satire, Gramm
Understanding Satire With Examples Satire, GrammLori Mathers
 

More from Lori Mathers (20)

Stock Photo Of Parchment, Paper, Writing, Write, Inside, Indoors
Stock Photo Of Parchment, Paper, Writing, Write, Inside, IndoorsStock Photo Of Parchment, Paper, Writing, Write, Inside, Indoors
Stock Photo Of Parchment, Paper, Writing, Write, Inside, Indoors
 
Teaching Essay Writing Help, Teaching Persuasiv
Teaching Essay Writing Help, Teaching PersuasivTeaching Essay Writing Help, Teaching Persuasiv
Teaching Essay Writing Help, Teaching Persuasiv
 
Essay Cloudstreet Narrative P.O.V. - GCSE Drama - M
Essay Cloudstreet Narrative P.O.V. - GCSE Drama - MEssay Cloudstreet Narrative P.O.V. - GCSE Drama - M
Essay Cloudstreet Narrative P.O.V. - GCSE Drama - M
 
How To Write A Report On A Disease. Research One Of T
How To Write A Report On A Disease. Research One Of THow To Write A Report On A Disease. Research One Of T
How To Write A Report On A Disease. Research One Of T
 
FastForward JusticeS 3Rd Na
FastForward JusticeS 3Rd NaFastForward JusticeS 3Rd Na
FastForward JusticeS 3Rd Na
 
Thesis Statement Research Paper. Thesis Statement Of Research Paper
Thesis Statement Research Paper. Thesis Statement Of Research PaperThesis Statement Research Paper. Thesis Statement Of Research Paper
Thesis Statement Research Paper. Thesis Statement Of Research Paper
 
Writing - Mr. BonaseraS Classroom Web Site
Writing - Mr. BonaseraS Classroom Web SiteWriting - Mr. BonaseraS Classroom Web Site
Writing - Mr. BonaseraS Classroom Web Site
 
Gamsat Essay Collection Your Guide To E
Gamsat Essay Collection Your Guide To EGamsat Essay Collection Your Guide To E
Gamsat Essay Collection Your Guide To E
 
How To Write Lyrics On Paper Allcot Text
How To Write Lyrics On Paper Allcot TextHow To Write Lyrics On Paper Allcot Text
How To Write Lyrics On Paper Allcot Text
 
Buy Nothing Day Ap English Essay. Buy Nothing Day A
Buy Nothing Day Ap English Essay. Buy Nothing Day ABuy Nothing Day Ap English Essay. Buy Nothing Day A
Buy Nothing Day Ap English Essay. Buy Nothing Day A
 
Free Essay Writing Help, Essay Writi
Free Essay Writing Help, Essay WritiFree Essay Writing Help, Essay Writi
Free Essay Writing Help, Essay Writi
 
Essay Outline PowerPoint Template - SlideModel
Essay Outline PowerPoint Template - SlideModelEssay Outline PowerPoint Template - SlideModel
Essay Outline PowerPoint Template - SlideModel
 
How To Write A Response Paper Paperstime Respo
How To Write A Response Paper Paperstime RespoHow To Write A Response Paper Paperstime Respo
How To Write A Response Paper Paperstime Respo
 
Writing Toefl Essays - Academiccalendar.Web.Fc2
Writing Toefl Essays - Academiccalendar.Web.Fc2Writing Toefl Essays - Academiccalendar.Web.Fc2
Writing Toefl Essays - Academiccalendar.Web.Fc2
 
Writing A Descriptive Essay The Structure Of A Descriptive Essay
Writing A Descriptive Essay The Structure Of A Descriptive EssayWriting A Descriptive Essay The Structure Of A Descriptive Essay
Writing A Descriptive Essay The Structure Of A Descriptive Essay
 
Biography Outline Template - 15 Formats, Samples An
Biography Outline Template - 15 Formats, Samples AnBiography Outline Template - 15 Formats, Samples An
Biography Outline Template - 15 Formats, Samples An
 
600 Word Writing Sample
600 Word Writing Sample600 Word Writing Sample
600 Word Writing Sample
 
Electoral College Votes Explained What Are The Pros And Cons
Electoral College Votes Explained What Are The Pros And ConsElectoral College Votes Explained What Are The Pros And Cons
Electoral College Votes Explained What Are The Pros And Cons
 
Dotted Line Paper
Dotted Line PaperDotted Line Paper
Dotted Line Paper
 
Understanding Satire With Examples Satire, Gramm
Understanding Satire With Examples Satire, GrammUnderstanding Satire With Examples Satire, Gramm
Understanding Satire With Examples Satire, Gramm
 

Recently uploaded

ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Osi Reference Model And The Osi Model

  • 1. Osi Reference Model And The Osi Model Data Networking Assignment No–2 1. OSI REFERENCE MODEL The OSI model is a reference model. It does not specify how a protocol or technology should work but it determines how and where to open its standards. It consists of seven layers: Physical layer: Cables, Wires, Voltages, boosting devices, Pin outs which are physical or physical in nature are all included in the Physical layer of the OSI model. Here the transmission between two communicating devices or channels takes place in the form of bits or electrical signals. Data Link Layer: Data link layers provides the facility to establish communication between two networked devices. It performs various tasks like error correction, compression, correct transmission errors, synchronization of characters and frames etc. Some of the specified protocols on the layer 2 technology are PPP, HDLC, ATM etc. Network layer: The network layer is responsible for routing the datagrams to particular destination. It learns all the path to reach a particular destination and selects the best path to reach the destination. The IP Protocol stack has a lot of protocols like RIP, IGRP, BGP etc. Transport layer: It is responsible for end to end delivery of segments. It is responsible for error free reliable delivery of packets. Flow control is the responsibility of the Transport layer. TCP and UDP are the two protocols which are a part of the Transport layer for delivery of segments. Session layer: Session layer manages the service ... Get more on HelpWriting.net ...
  • 2. Thesis Statement On Digital Security Digital Security The 21st century has been described as the "Information Age", a period in human history characterized by the shift in traditional industry implemented through the industrial revolution to an economy based on information computerization. We have come a long way from paper based systems through the use of a computer for efficient data processing. The creation of local area networks (LAN) all the way through opening channels for communication and knowledge sharing on a much larger scale. This is where the introduction to connecting LAN networks to the internet came about. The internet allows for seamless communication to take place virtually right around the world. Technology with the use of the internet has changed the way we ... Show more content on Helpwriting.net ... More people with malicious intent are finding new ways to infiltrate our lives through the technology we use. While using the internet has become an essential part of everyday life, there is an element of risk involved. We are exposing ourselves to a number of cybercrimes and need to educate ourselves on how to identify these crimes and put the necessary protection policies and procedures in place. Digital Security "is the protection of your digital identity – the network or internet equivalent of your physical identify. Digital security include the tools you use to secure your identity assets and technology in the online and mobile world. "– Google definition Main Statement: explaining the need for digital security when connecting your corporate computer network to the Internet "Internet based Virtual Private Networks (VPNs), power line communications, satellite communications and wireless communications (wireless sensor networks, WiMAX and wireless mesh networks) are discussed." Malware Malware also referred to as 'malicious software' is a piece of software that was designed to disrupt, damage, or gain unauthorised access to a computer system. There are various type of malware expertly designed for very specific ... Get more on HelpWriting.net ...
  • 3. Local Area Network ( Wan ) LAN stands for local area network and is normally a group of computers that share a common communications line typically, connected devices share the resources of a single processor or server within a small area such as an office. A LAN may serve as few as two or three users such as in a home network or as many as thousands of users such as a FDDI network. WAN A Wide Area Network (WAN) is a communication network made up of computers that are far away from each other. The most common example of a Wan is the Internet although a WAN doesn't need to be global to qualify as a wide area network. MAN A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger ... Show more content on Helpwriting.net ... The tree allows you to have many servers on the network and you can branch out the network in many ways. This is useful for colleges, universities and schools so that each of the branches can identify the relevant systems in their own network. Advantages A Tree Topology is supported by many network vendors and even hardware vendors. A point to point connection is possible with Tree Networks. All the computers have access to the larger and their immediate networks. Best topology for branched out networks. Disadvantages The Tree Topology network is reliant on the trunk which is the main backbone of the network. If that has to fail then the entire network would fail. In a Network Topology the length of the network depends on the type of cable that is being used. Star Star Topology is the most common type of network topology that is used in homes and offices. In the Star Topology there is a central connection point called the hub which is a computer hub or sometimes just a switch.
  • 4. Advantages A Star Network Topology is very easy to manage because of its simplicity in functionality. The problems can be easily located logically in a Star Topology and therefore is easy to troubleshoot also. The Star Topology is very simple in format so it is very easy to expand on the Star Topology. Disadvantages The Star Topology has to fully rely on the hub and the whole working of the network depends on the hub. If there are many nodes and the ... Get more on HelpWriting.net ...
  • 5. Vocabulary Exercise: Matching Vocabulary Exercise: Matching Term| Definition| a. Frame| a. Two or more devices connected to a common medium| b. Node| d. A layer of the Open Systems Interconnection (OSI) model that frames upper–layer data and controls how data is placed on a medium| c. Media| b. A device on a network| d. Network| e. The physical means used to carry data signals| e. Data Link| c. The protocol data unit (PDU) used in Layer 2 of the OSI model| Concept Questions 1. What are the two main jobs of the data link layer? * Allows the upper layers to access the media using techniques such as framing. * Controls how data is placed onto the media and is received from the media using techniques such as media access control (MAC) and error ... Show more content on Helpwriting.net ... Congestion control | e. Indicates a particular type of communication service for special processing| Protocol| Specification| a. Ethernet| c. A protocol for wireless networks that uses CSMA/CA| b. Point–to–Point Protocol| a. Defined by the IEEE 802.3 standard| c. 802.11| a. Includes specifications for operation at 10, 100, 1000, and 10,000 Mbps| | b. Establishes a logical connection (session) between two nodes| | c. Uses a preamble field at the beginning of the frame| | c. Often found on WANs| | a. Provides unacknowledged connectionless service over a shared medium using CSMA/CD| | b. Defined in a Request For Comments (RFC) document| | b. Uses a flag field at the beginning of the frame| | c. Uses an acknowledgment to confirm that a frame was received successfully| Concept Questions 1. Compare and contract Layer 2 addresses with Layer 3 addresses As compared to Layer 3, where addresses in the packet header are carried from source host to destination host regardless of the number of network hops along the route, Layer 2 uses addressing to transport the frame across the local media. 2. Why are Layer 2 addresses not needed in point–to–point topologies? Point–to–Point topologies, with just two interconnected nodes, do not require addressing. 3. What is the purpose of the Frame Check Sequence (FCS) in a frame trailer? FCS is used to determine whether errors occurred in the transmission and reception of the frame. Vocabulary Exercise:
  • 6. ... Get more on HelpWriting.net ...
  • 7. Networking Standards ( Osi Layers ) ASA College CIS 125–M01: Network Concepts Networking Standards (OSI Layers) Joel Hernandez Vasquez joelvasquez@asa.edu 02/09/2016 Nowadays everybody can get access to the internet through networks, but according to Columbia University over the 37% of people do not know what a network is. A network is a group of computers which are connected to share information, files, and performs tasks. A network is built using the same common language. My purpose of this project is to explain what a network is, and let you know how important is to know it. The next paragraphs will explain the introduction of networking, the disadvantages of networking, and the disadvantages. A network is a group of computer or electronic devices connected... Show more content on Helpwriting.net ... A wide local area network is used to link networks in vast geographic. For instance, you can use a WAN to connect to larger places such as the United States, China, and Japan. Another type of network is Metropolitan area network (MAN) which is used to connect an entire city, a particular region, and university campus. Moreover, a metropolitan area network is smaller than a wide area network but larger than a local area network. Furthermore, there is another type of network, which is called PAN (Personal Area Network). A Personal Area network is defined as a group of computers or electronic devices connected to a specific range of a user. For example, when we have a group of devices at home interconnected such as laptops, printers, tablets, and cell phones. Networks have become a central issue for organizations, business, and universities because it provides many advantages. One of the benefits of a network is the easiest way to share information. For example, in a company where there are many offices around the world you can distribute information to all the offices in short time. Moreover, having a network will give you the benefits to talking with people in real time in a larger distance. In addition, another advantage of a network is that allow you to share hardware. For example, in an office that you only have a printer you can use this printer connected to multiple computers instead of having one printer for ... Get more on HelpWriting.net ...
  • 8. Control of Virtual Networks Spanning Multiple... 6.2 Virtual network ID, Virtual link ID: In order to control virtual networks spanning multiple infrastructure domains, the virtual networks must be identified by a virtual network ID. Additionally the virtual links are also needed to be identified which can be done by using virtual link ID. One of the solution would consist of simply mapping the virtual link ID to whatever data link layer specific tag is in use. A number of available link virtualization techniques such as ATM, Ethernet VLAN could be used for this purpose. This Virtual link ID can be used for both virtual link identifier and a tag for data forwarding. 12 Scalability is a major requirement for virtual networks. For this reason, virtual link aggregation will constitute an important requirement for network virtualization. Virtual link aggregation can be defined as a set of virtual links that follow a common path and are similarly treated between a pair of virtual nodes. It can be performed by carrying at least two types of identifiers in the data plane, one for virtual network identification and another for hop–by–hop forwarding. Hence, virtual link aggregation enhances scalability and also improves performance. 7. Building Virtual Networks 7.1 The VNP– InP interface: The VNP (virtual network provider) / InP interface is a key component of network virtualization architecture. The virtual network provider is able to request the establishment of a virtual network, the modification or the removal of a ... Get more on HelpWriting.net ...
  • 9. Nt1310 Data Link Layer The Data link layer [also called layer 2] is responsible for moving a message from one computer or network device to the next computer or network device in the overall path from sender or receiver. It controls the way messages are sent on the physical media. Both the sender and receiver have to agree on the rules or protocols that govern how they will communicate with each other. A data link protocol determines who can transmit at what time, where a message begins and ends, and how a receiver recognizes and corrects a transmission error. The data link layer performs two main functions, and therefore is often divided into two sublayers. Logical link control [LLC] sublayer – The first sublayer is the data link layer's connection to the network layer above it. At the sending computer, the LLC sublayer software is responsible for communicating with the network layer software ... Show more content on Helpwriting.net ... The MAC sublayer software at the sending computer controls how and when the physical layer converts bits into the physical symbols that are sent down the circuit. At the receiving computer, the MAC sublayer software takes the data link layer PDU from the LLC sublayer, converts it into a stream of bits, and controls when the physical layer actually transmits the bits over the circuit. At the receiving computer, the MAC sublayer receives a stream of bits from the physical layer and translates it into a coherent PDU, ensures that no errors have occurred in transmission, and passes the data link layer PDU to the LLC sublayer. Both the sender and receiver have to agree on the rules or protocols that govern how their data link layers will communicate with each other. A data link protocol performs three functions: Controls when computers transmit (media access control) Detects and corrects transmission errors (error control) Identifies the start and end of a message by using a PDU (message ... Get more on HelpWriting.net ...
  • 10. Unit 3 Assignment 1 Osi Model OSI Model OSI Model explains the transfer of data thru the network. The structure of the model help understands where some of the protocols in the network are functioning, operating with other workstations, servers, and switches. Mainly, I will explain how the protocols are functioning throughout each layer. Specific protocol functions and operations interpose two layers, knowing that part of their process start in one layer and continue in the next layer. Layers 7,6 and 5 or Application Layer for TCP Protocol The first protocol explain is TCP. Starting with the Layer 7, 6, and 5, the Application Layer is providing the payload (data and instructions). The web browser is an example of initiation of Layers 7,6,5 and the payload flow. The Transport... Show more content on Helpwriting.net ... Note that other servers not selected will receive the information by the requesting client to ignore the request. The device accepts the server answer and reply to it. DHCP Acknowledgement The last phase is DHCP Acknowledgement. During this transmission, the client' message is accepted by the DHCP server and the IP address and configuration are provided. DHCP protocol requires extra adjustment to be safe. There is the Option 82, which is like a tattoo on the information sent from client to DHCP server. This information is attached to the packet and allowed the device to recognize the message and retransmitted by the DHCP server. Both client and server, need to be configured for this safe feature effectiveness (Juniper, 2017). Bluetooth Protocol I enjoy the capacity of my car to immediately transfer my phone functions and features. Listening to my favorites music, answering phone calls while driving is something I saw in the movies in my youth (yes, the 90's). I am fascinating to learn that Bluetooth is a protocol. Link Management Protocol (LMP) This operation creates a bond with the radio connections of the ... Get more on HelpWriting.net ...
  • 11. Bcs/205 Final Paper NeelKumar Patel CCS 205 Questions. 3.2 List and briefly define the possible states that define an instruction execution address calculation of instructions – this determine the address of the next instruction to be processed. fetch – this is reading of instruction from its memory location where its stored. operation decoding – this is analyzing instruction to determine type of operation to be performed and operand to be used. address calculation of the operand – If the operation involves reference to an operand available via I/O or an operand in memory, then determine the address of the operand. Operand fetch – get the operand from memory or read it in from I/O. Data Operation–Perform the operation indicated in the instruction. Operand store – Write... Show more content on Helpwriting.net ... Transmission: consumes data packets used to implement instructions and store data transfer mechanisms. Problems 3.3 a) (8 bits = 1 byte for opcode).2^(32–8) = 2^24 = 16,777,216 bytes b).1. Instruction and data transfers would take three bus cycles each, one for the address and two for the data. Since If the address bus is 32 bits, the whole address can be transferred to memory at once. 2. instruction and data transfers would take four bus cycles each, two for the address and two for the data. Therefore, that will have the processor perform two transmissions in order to send to memory the whole 32 bits. c) a program needs 24 bits (24–bit addresses), and for the IR needs 32 bits (32–bit addresses). 3.10 For any slot, only the priority 16 device may transmit when none of the TR lines are assert. This provides it the lowest average wait time. We could say that when there is much demand on the bus and most of the time having at least one pending request, that will prevent the priority 16 device to have the lowest average wait time. 3.14 ... Get more on HelpWriting.net ...
  • 12. Data Link And Network Layer Protocols Data Link and Network Layer Protocols in TCP/IP Protocol Difference Between Ethernet II and Ethernet 802.2 LLC Frame Structures Ethernet II framing structure is also commonly referred to as DIX Ethernet (Carrell, Chappell, Tittel & Pyles, 2013). This frame structure was developed by DEC, Intel, and Xerox and thus the DIX acronym that represent these major players in its development (Carrell et al., 2013). The Ethernet II defines a two–octet field of EtherType (Carrell et al., 2013). The MAC address and the destination come before this Ethernet frame. This precedence helps in the identification of the upper layer of the encapsulating protocol (Carrell et al., 2013). This Ethernet standard has a unitary data link layer. Besides, the type field in use in Ethernet II helps to extricate between different client protocols. Moreover, the Ethernet II applies the MAC frame format in its TCP/ IP protocol (Carrell et al., 2013). The minimum frame size for Ethernet II is 64 bytes while the maximum frame size for the same Ethernet II is 1518 bytes (Carrell et al., 2013). The introduction of VLAN made the maximum frame size to be increased to 1522 bytes to accommodate VLAN tagging (Pyles, Carrell, & Tittel, 2016). The preamble in Ethernet II is 8 bytes long while the destination address contains a data link address field that is 6 bytes long (Carrell et al., 2013). Furthermore, the source address field and type field are 6 bytes and 2 bytes respectively (Carrell et al., 2013). ... Get more on HelpWriting.net ...
  • 13. OSI Model Essay OSI Model Introduction Successful communication of any type contains four key characteristics. These characteristics follow: 1. A sender: This is the person who is sending information. 2. A receiver: This is the person the sender is sending the information to. 3. A common language: If the sender and receiver are going to understand each other, they will need a common language and protocol, or specific method of communicating. 4. A common medium: The sender and receiver could choose whether to communicate in person, by telephone, writing or any other method ... Show more content on Helpwriting.net ... For this reason, it is sometimes referred to as the highest level in the model. The application level is where network requests originate. For example, this is the level where someone using a word processing program will originate the command to print using a network computer. Thus, the application level is the link between the user and the network. Some of the required processes at this level include: 1,2 1. Handling different terminal types and file systems. 2. Identification of the incoming communication process. 3. Handling general network access, flow control and error recovery.. 4. Labeling transmitted information by identifying the process, its origin and destination application. Presentation The presentation layer is primarily responsible for the format that will be used to exchange data between two computers.1 In other words, just as the name suggests, this layer makes sure that the other computers in the network can understand what is being sent. The major responsibilities of this layer include: 1. Data encryption/decryption to keep unauthorized people from using accessing the data and make that data available to authorized persons. 2. Data compression/decompression results in faster transmission by reducing the amount of space the data requires. An example of this is removing water from coffee, resulting in "freeze–dried" coffee which is easier to
  • 14. ... Get more on HelpWriting.net ...
  • 15. Wan Network Design For A Company Essay 1.Case Study It's a project on WAN network design for a company which is five year old and have multiple branches. It's a IT& Electronics company located in Auckland named eServe. I am working for this company from last six months as a IT technician. The company have multiple branches in other cities as well. They provide software and hardware related services to their clients and mainly concern with apple (Mac Book, iMac, phone) products. The company have three branches in wellington, Christchurch and Hamilton cities. All these branches are controlled by main head quarter located at Newmarket (Auckland).But the system is not well they are working on old documentary level .Each branch has their own databases. They keep all the record of their clients and part lists individually. They provide online email communication and Chat facility to their clients. But the problem is each branch provides these services individually and it's difficult for main head quarter office to collect that latest information. They want to make a centralize control for all these branches. Moreover they are using a software system for stock entry and part order lists this also needs to be centralized on a common file server. Because they are paying to more to hire staff for each branch .Because need to manage the stocks and payments individually. But at this stage they want to reduce the staff and make a centralize control from their main branch. They want a perfect online connectivity between ... Get more on HelpWriting.net ...
  • 16. State Of Statement Of Purpose For Computer Science Statement of Purpose [Purpose] During my under graduation, I nurtured an idea to shape my career in the way of doing research, in which period of time, has turned into my career goal. I am convinced that I should pursue a career in research and teaching as my profession. I wasn't quite sure of what area of research I should get involved in, since I was interested in multiple areas of study until my high school. Taking a multi disciplinary undergraduate major has helped me to realize that computer science and logic are the areas which fascinates me the most when compared to others. By the end of under graduation I am crystal clear and confident in setting my priorities over computer science. Research at PhD level would be the best bet to satisfy my long term goal. I opine that completing masters and doing research at masters level would qualify me with the required skills in computer science and would set a perfect platform for my entry into PhD. Thus, after a careful consideration of my interests, abilities & goals, I decided to pursue masters degree in the field of Computer Science. [My Background] Since childhood I always excelled at quantitative and logical abilities. Thus, I had a strong inclination for mathematics and physics. This led me to opt for mathematics, physics and chemistry as my majors at higher secondary level (10+2). After completing high school with outstanding grades, I was interested in pursuing my further studies ... Show more content on Helpwriting.net ... I feel that I need much more enhanced knowledge. Infact, I am more interested in doing research. In the next five years I hope to complete PhD with intense research experience. I have a strong passion for teaching which may lead me to take the path of teaching after PhD. But my immediate short term goal is to complete masters with good grades and with research which would be a learning ... Get more on HelpWriting.net ...
  • 17. The Osi Reference Model Inn A Data Communication Network Q: 1 (a) explain the data encapsulation process in the OSI reference model inn a data communication network. Ans:– The way toward going data through the layers of the OSI is called epitome. A convention information unit is a parcel of data made by a PC and go starting with one layer of the OSI then onto the next. b). identify the advantages of layered approach of OSI reference model. 1)It is really non–specific model which is considered as a standard model. 2)It backings association situated and also connectionless administrations. 3)This layer takes after reflection rule that is change in one layer does not affect much on other layer. 4)It is more secure and versatile than having all administrations packaged in a solitary layer. ... Show more content on Helpwriting.net ... ARP: – : stands for address resolution protocol and it helps to find the hardware address of a host from its recognised ip address. IT facilitates data exchange between computers on the same network. It is only used for one address request at a time. It operates as a interface between network and data link layer. DNS: – : stands for domain Name Server. It converts more readily learnt domain names to the numerical IP address required for the purpose of finding and classifying computer amenities and devices with the essential network protocols. This is used to resolve human readable hostname like www.google.com. Q.2 A). explain broadcast domain and collision domain with an example. BROADCAST DOMAIN: Broadcast spaces have a place with an arrangement of gadgets in a similar IP system and works at layer three of the OSI show. That communicate message goes to each PC and system gadget in the communicate area. Regardless of what number of hosts or gadgets are associated together, in the event that they are associated with a repeater, center point, switch or extension, every one of these gadgets are in ONE Broadcast domain. Collision domain– is a piece of a network connected by common medium through repeaters where data packets can crash with one another by being sent. It occur when more than one device efforts to send a packet on a network section at the similar time. Commonly we call media as shared ... Get more on HelpWriting.net ...
  • 18. Main Types Of A Network Part One: Hubs: Hubs are used to construct a network by connecting multiple computers in a star / hierarchical network topology, the most common form of local networks now every day. A hub is a simple device when it is sent bits of computer data from A to B, it is not to examine the purpose, instead, it sends the signal to all other computer (B, C, D ..) within the network. B will then get it, while rejecting the other nodes. This confirms that the traffic is released. Hubs works in the Physical layer in TCP/IP protocol stack. There are two main types of stroke: 1. Liability: The signal is transmitted as it is (it does not need power). 2. Active: The signal is amplified, so they function as a repeater. In fact, they were called a multiport repeater. (PSU) Hubs can be connected to expand the network to other platforms with an uplink port. Switches: Switches place the other side are more advanced then hubs, Instead of diffusion through the frame, a controlled switch makes for the destination MAC address and forwards the appropriate port only reach the computer. In this way, switches reduce traffic and divide the collision domain into segments, which is very suitable for busy LANs and protects photos, from other computers sniffed the same segment. A table with the MAC address belongs to which segment is built. If a destination MAC address is not in the table, it sends all segments except the source segment. If the same objective as the source of the frame is rejected. ... Get more on HelpWriting.net ...
  • 19. Bridging Between Routing And Routing Bridging versus routing Introduction "Routing control protocol is essential in order to dynamically determine the topology of the network and to detect failing links. Bridging control protocols may be used similarly in smaller networks or may be used in combination with routing." Higginson & Shand (1997). Bridge and routers are applied in computer networking as they both connect two or more interrelated Local Area Networks (LAN) therefore creating an extension of the Local Area Network or a Wide Area Network. Bridges operates on MAC layer addresses and at thedata link layer of the Open System Interconnection (OSI) model whereas routers operate on the network control layer – third layer of the OSI model. Since routers do not have the ... Show more content on Helpwriting.net ... On occasions where a protocol appears as unrecognizable by the router, the packet is just dropped. Non–routable protocols don't define any recognized network information in the data packet. Routers are usually included as part of a network switch and can be located on any gateway which includes any point of presence on the internet. Being connected on two or more networks, it sends information packet between terminals based on the current status of the network in which it is connected to. Bridges connect network of similar protocols thus allowing communication between them. They operate on the second (data link) layer of the open system interconnection (OSI) model. The data link layer frames messages for transmission, establishes and error free communication path, ensures sequence of transmitted data, manages access on channel use and check integrity of received messages. While routers transmit only the relevant and required data packet to the end destination as required in the LAN, each bridge builds an internal list of addresses of all the terminals attached to the network so as to allow for communication. Every packet is checked against the internal list of the bridge and the information is forwarded if the opposite segment has the destination address or if the bridge doesn't have the address logged. Routers have the ability to allow hosts that aren't practically on the same logical network, to be ... Get more on HelpWriting.net ...
  • 20. Executive Summary for Network Design Project Running Head: THE STAR TOPOLOGY The Star Topology Jon Jensen IT/230 Cliff Krahenbill 10/25/09 Executive Summary Link Systems was founded in 2005 as an Internet based self help center for people that are starting their own businesses. We have a proven track record of business start up expertise. We have helped several hundred businesses get moving in the right direction. We are focused on improving the position of small businesses, ultimately, helping them to reach the success that they are working on for their company. Link Systems is in business to help your business succeed. Our products are a series of motivational e–books that are organized to help you start and run a successful business. Our customer base ... Show more content on Helpwriting.net ... It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart. In a typical LAN configuration, one computer is designated as the file server. It stores all of the software that controls the network, as well as the software that can be shared by the computers attached to the network. Computers connected to the file server are called workstations. The workstations can be less powerful than the file server, and they may have additional software on their hard drives. On many LANs, cables are used to connect the network interface cards in each computer; other LANs may be wireless. All stations are connected by cable or wireless to a central point, such as hub or a switch. If the central node is operating in a broadcast fashion such as a Hub, transmission of a frame from one station to the node is retransmitted on all of the outgoing links. In this case, although the arrangement is physically a star, it is logically a bus. In the case of the central node acting as switch, an incoming frame is processed in the node and then retransmitted on an outgoing link to the destination station. Ethernet protocols IEEE 802.3 are often used in the Star topology LAN. Wide Area Network(WAN) Design A Wide Area Network ( WAN) is a computer network covering multiple distance areas, which may spread across the entire world. WANs often connect
  • 21. ... Get more on HelpWriting.net ...
  • 22. The Importance Of End Systems In today's society networking is pivotal structure in the way information is transferred and received between people. In the business world we need to send information to people to at fast rates to meet user satisfaction. Imagine places like wall street that is the mecca of business that constantly send information back and forth to get the right information to keep investor aware or up to date on a forever changing stock market. Picture one the biggest libraries in america the library of congress in washington dc that has network structure to accommodate millions of people that commute and use resources such online biography and web capabilities every day. For system like this to exist we depend on a common network layer that is used all ... Show more content on Helpwriting.net ... In the second and third layer of osi model it is called data link and network link. Data link is packaging data into frames and transmitting those frames on the network and performing the error detection correction by uniquely identifying the network devices with an address, and handling the flow control. Data link layer has two sub layer which is called media access control which is know as the computer unique identifier to which the network is assigned The mac address comes with a 48 bit address that is assign to it devices network interface card/.Second sub layer is llc which stand for logic link control, which is know as the multiplex functions that is process of over media access control To provide a means of exchanging data between end users across a MAC–controlled link or a collection of LANs interconnected by MAC–level bridges. Layer 3 switching is another example of fragment–free switching. Up to now, this discussion has concentrated on switching and bridging at the data link layer Layer 2 of the Open System Interconnection OSI model. When bridge technology was first developed, it was not practical to build wire–speed bridges with large numbers of high–speed ports because of the manufacturing cost involved. With improved technology, many functions previously implemented in software were moved into the hardware, increasing performance and ... Get more on HelpWriting.net ...
  • 23. Smartphone 's And Social Networking Smartphone's and Social Networking Lafayette Fedrick Class: ISSC340 American Military University Class number: 4349756 Instructor: Professor Venkatesh, Vijay Date: 19 October 2014 Introduction The topics that will be covering in this paper is Smartphone technology, Social Networking with Virtual Private Networks, Security and TCP/IP Networks, App Technology and Social Apps Lack of Privacy. This paper will attempt to address the security issues with each of these platforms and the future of these technologies. Smartphones The origin of smart phones, it began with Alexander Graham Bell. Bell invented the telephone in 1878 he also made the the first phone call. Motorola later introduced some of the first cellphones to the... Show more content on Helpwriting.net ... The reason why people are beginning to use more apps and data on their smart phones is because the speed of data keeps increasing to the point they have a home computer in their pocket. Nearly all of the smart phones in the world run on a Long Term Evolution (LTE) network or a (Fourth generation) 4G network. Most Carriers are using (Code Division Multiple Access) CDMA or (Global System for Mobiles) GSM. Therefore CDMA and GSM are the two basic technologies in smart phones networks. In the United States CDMA is mostly used and overseas/Europe uses GSM. The reason GSM is most found in Europe is because in 1987 Europe mandated that law use the GSM technology (Trade, O, p. 05). There is good and bad in both networks, but there are key differences in each one. GSM carrier put there costumer information on a remove able SIM Card, so the consumer has complete power and control of what phone they choose to use. While CDMA network you would have to get permission to use or access a difference phone on their networks. Back too 4G/LTE, these two network are the next stage in mobile networking that is suppose to deliver much faster speed than there predecessors. Now some company's offer 4G only not the LTE, 4G is actually a High Speed Packet Access network known as HSPA. The 4G HSPA offers down speeds between 5 megabits and 8 megabits per second. While 4G LTE is considerably much faster than 4G alone, 4G LTE uses (Multiple Input Multiple Output) MIMO technology. MIMO ... Get more on HelpWriting.net ...
  • 24. The Network Of A Network Nowadays everybody can get access to the internet through networks, but according to Columbia University over the 37% of people do not know what a network is. A network is a group of computers which are connected to share information, files, and performs tasks. A network is built using the same common language. My purpose of this project is to explain what a network is, and let you know how important is to know it. The next paragraphs will explain the introduction of networking, the disadvantages of networking, and the disadvantages. A network is a group of computers or devices connected together in order to share information. The computers or electronic devices are connected to networks in many ways, such as wireless connection, wired... Show more content on Helpwriting.net ... Another type of network is Metropolitan area network (MAN) which is used to connect an entire city, a particular region, and university campus. Moreover, a metropolitan area network is smaller than a wide area network but larger than a local area network. Furthermore, another type of network, which is called PAN (Personal Area Network). A Personal Area network is defined as a group of computers or electronic devices connected to a specific range of a user. For example, when we have a group of devices at home interconnected such as laptops, printers, tablets, and cell phones. Networks have become a central issue for organizations, business, and universities because it provides many advantages. One of the benefits of a network is the easiest way to share information. For example, in a company where there are many offices around the world you can distribute information to all the offices in short time. Moreover, having a network will give you the benefits of talking with people in real time in a larger distance. In addition, another advantage of a network is that allow you to share hardware. For example, in an office that you only have a printer you can use this printer connected to multiple computers instead of having one printer for each computer. Another advantage of networking is that allow users to communicate with people all over the world in a better and easy way. For example, we can communicate to ... Get more on HelpWriting.net ...
  • 25. Wireless Security : Wireless Network Essay Wireless Security Overview Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the Internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: Wireless Wide Area Networks (WWAN), Wireless Local Area Network (WLANs), Wireless Personal Area Network (WPAN )and etc. WWAN includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM). WLAN, representing wireless local area networks, includes 802.11, HiperLAN, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and IR All of these represent potential threats in wireless networks as well. However, the more immediate concerns for wireless communications are: Denial of service Malicious hackers Theft of service (Identity theft / MAC spoofing) In wireless security, information must be protected from unauthorized, unanticipated, or unintentional modification. Security requirements include the following: Authenticity–A third party must be able to verify that the content of a message has not been changed in transit. Nonrepudiation–The origin or the receipt of a specific message must be verifiable by a third party. Accountability–The actions of an entity must be traceable uniquely to that entity. As wireless communication and the ... Get more on HelpWriting.net ...
  • 26. The Purpose Of An OSI Model What is the purpose of an OSI model? The purpose of an OSI model is a standard that was created for networks to share information. This standard governs the way information is transmitted over different networks. The model also sets guidelines to those in the manufacturing industry that create and develop software and hardware that are all compatible with each other. This paper will discuss and describe the 7 layers of the Open System Interconnection model (OSI model) and the layers of the Transport Control Protocol/Internet Protocol model (TCP/IP model), and explain the similarities and differences of each model. The 7 layers of the OSI model consist of: The Application layer (layer 7), The Presentation layer (layer 6), The Session... Show more content on Helpwriting.net ... The Transport layer Transport layers exist in both TCP/IP and OSI model. Even though both models have Transport layers they differ. The TCP/IP model consist of two standard transport protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP uses a reliable data–stream protocol which is connected oriented and UDP uses a unreliable data–stream protocol which is connectionless oriented. The Internet layer The Internet layer is a group of protocols and specifications that are used to transport packets from the host across a network, the host specified by a network address (IP address) The Link layer The lower level layer of the TCP/IP model, this layer is used by a suite of protocols for the "Internet". This is used to connect hosts or nodes to a network. This layer is compared to the "Data Link" layer and "Physical " layer of the OSI model. TCP/IP Application Layer VS OSI Application, Presentation and Session layer. The similarities in both models are comparable but different at the same time. All though they exist in both, the approach each uses to construct applications is different. In the OSI model the Application layer, Presentation layer and Session layer correspond to the Application layer of the TCP /IP model. They somewhat do the same job but use different protocols, TCP/IP uses: FTP, SMTP, TELNET, DNS and SNMP where the OSI model uses: FTAM, VT, MHS, ... Get more on HelpWriting.net ...
  • 27. Introduction Of An Internet Of Things Abstract– 6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has been granted and this QoS feature and there are no implementations of such feature in real networks. In this paper, we evaluate the effectiveness of these priority bits in various scenarios. We show that under very heavy or very low network load, these bits have a limited effect on the delay. We will also study the effect of using of 802.15.4 frame in different cases on QoS, Keys words: Internet of Things, Sensor Networks, Flow Label, Traffic Class, 6LowPAN, CSMA/CA, GTS. 1.Introduction An Internet of Things (IoT) system connects the physical world into Internet via radio frequency identification (RFID) tags, sensors, and mobile devices. IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to the end to end communication of things. 6lowpan (IPv6 over Low–Power Wireless Personal Area Networks) is a promising IoT IETF standard for connecting sensors across IPv6 clouds. Some sensing applications are time sensitive and may require bounded delay in sending the sensed data. In particular, military, mission critical and safety domains generally require rapid and/or real time data transfer. Therefore, some QoS feature would be required to give sensor network administrators the ability to control the overall network performance. ... Get more on HelpWriting.net ...
  • 28. The For Seed Germination Are Carried Out Under Controlled... INTRODUCTION The seed biology is known to be the most important stream of plant science. Various experiments for seed germination are carried out under controlled environment. Researchers have experienced a need to maintain and monitor the relative humidity, temperature, water content of seeds kept in closed containers. There exist some practices of using the super saturated solutions made by different chemicals to maintain the desired conditions for effective seed germination and growth. wireless remote monitoring system that can be utilized to precisely monitor and measure the prerequisite conditions of seedling germination. The rapid development and wide adaptability of wireless sensor networks in agriculture has increased the quality of the crops produced. Many researchers have worked on real time monitoring systems. Aimed to design and develop a network integrated of sensors to manage the agricultural water of sensors to manage the agricultural water. Now a days WSN(Wireless Sensor Network) ZigBee is one of the most predictive, reliable and dominant standard. ZigBee model defines the first two layers as physical layer (a) and data–link layer (b) of OSI model. ZigBee is specified for high level communication protocols using small, low–power digital radios signals based on IEEE 802 standard for Wireless personal area networks. ZigBee is a low–cost wireless mesh network standard. The low cost of the ZigBee network enables the technology to be widely used in ... Get more on HelpWriting.net ...
  • 29. Computer Networks : Project Report On Csma Cd With Backoff... ECE 5534 COMPUTER NETWORKS–1 PROJECT REPORT ON CSMA CD WITH BACKOFF ALGORITHM Submitted To: Dr. Chul–Ho Lee FLORIDA INSTITUTE OF TECHNOLOGY 2015 FALL Project Members: Student Id MUTHUKARTHIK CHANDRASEKAR : 902051523 SHARAT SRINIVAS SUBRHAMANYAM MATTA : 901939745 MANJUNATH SEKAR : 901827036 Introduction: Computer networks connect two or more computers which are located anywhere geographically. The use of networks is for communication, resource sharing and information sharing. As per ISO standards, a network is divided into seven different layers: 1. Physical Layer: It is the lower most layer in OSI model, its purpose is transmission of data between the two system. 2. Data link layer: It connects the data from one system to the other by using a protocol of when to send the data over medium. 3. Network layer: It is used for routing, addressing and finding best route to transmit. 4. Transport layer: It holds all the problems of data deliver and transportation problems in the system. 5. Session layer: It manages all different application and keeps up with the synchronization point. 6. Presentation layer: It converts the data into the form which can send across the network to the application layer. 7. Application layer: It is the user interface point in which select specific ... Get more on HelpWriting.net ...
  • 30. Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) A Case Study Table of Contents: Introduction ....................................... 3 Overview ....................................... 3 Innovative Aspects ......................................... 5 Advantages .......................................... 6 Disadvantages .......................................... 6 Conclusion .......................................... 7 Introduction: Asynchronous Transfer Mode (ATM) is a high speed network technology which is designed to support both voice and data communications. It was initially developed to meet the needs of the Broadband Integrated ... Show more content on Helpwriting.net ... Each ATM cell contains exactly 53 octets, 5 octets for header 48 octets for data. As a core protocol, ATM is used in Synchronous Optical Networking (SONET)/Synchronous Digital Hierarchy (SDH), which are backbone of Public Switched Telephone Network (PSTN). Internet Service Providers (ISPs) use Asynchronous Transfer Mode on their long–distance private networks. ATMs operate at the Layer 2 (Data Link layer) of the OSI model, over fiber cable or twisted–pair cable (http://www.wanredundancy.com). The ATM transport hierarchy is shown in the figure below. The physical layer can be divided into three functional levels: Transmission Path Level: This extends between network elements that assemble and disassemble the payload of a transmission system. For end–to–end communication, the payload is end–user information. For user–to–network communication, the payload may be call–control signaling information (call setup and call termination). Cell delineation and header error–control functions are required at the end points of each transmission path. Digital Section Level: This refers to the exchanges or signal transfer points in a network that are involved in switching data streams. Regenerator Section Level: This is a part of the digital section. Virtual Channels and Virtual Paths Logical connections in ATM are referred to as virtual channels. A virtual channel is analogous to a virtual circuit inX.25 or a frame–relay logical
  • 31. connection. It's ... Get more on HelpWriting.net ...
  • 32. Essay on NT1210 Labs 3.1-3.4 NT1210 Labs 3.1 to 3.4 3.1.1 What would happen if wireless devices were not governed by the Wi–Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? Personal information and business will slow down due to each vendor having its own standards/protocols. It will also be more vulnerable to attacks and make accessing more difficult. 3.1.2 Give another example of a model that is used to visualize something that is difficult to observe or perceive. How does the model make it easier to understand? Another way of displaying information for easier understanding is to use a flow chart. A flow chart can be used as a step by step guide. 3.1.3 Based on... Show more content on Helpwriting.net ... Host A will use application for the OS while allowing the PC to still communicate to other devices. Transport will control the data sent and received. The network will place IP addresses to the packets allowing data to be added to the MAC addresses and physical link between host and lines. Exercise 3.2.4 Explain why routing devices do not need the upper layer of the OSI model to route traffic. What is the highest layer of the OSI model used by the router to decide where to forward traffic? The first three layers of the OSI is typically what a router needs to route traffic. The first three layer are physical, data link and network. The highest level the OSI decide where to forward traffic to is the transport layer which is located in the host layers. Lab 3.2 Review 1. How does the abstraction of the physical layer facilitate interoperability across networks using different types of physical wires? IP terminals might be located in different parts of the build making it complex. There are lines coming in and out of the build that might be different than that issued to a company. To try and replace one will be complex, confusing and time consuming if unsure. 2. The OSI model is not directly implemented in networking and often the distinction between the layers will blur in implementation. Why does it endure despite these ... Get more on HelpWriting.net ...
  • 33. Changing The Physical Layer The physical layer specifics the function details for initiating, keeping up and turning off the physical link when moving the bits of data over the physical media such as copper, fibre or wireless. So it will takes your data bits of ones and zeros covert them to what is needed to transfer over that type of media so for example change bits into electrical signals for copper cables then will covert it back to ones and zeros once it reaches its destination to send up OSI model layers. When changing the bits so they can be sent over different types of media this is known as signalling. Signalling will change the bits to what it needs to be for transmission then is read by the connections at the other end. Protocols of the physical layer ... Show more content on Helpwriting.net ... If there is a difference a CRC frame error is generated to state there is a corruption either on the sending device side or the destinations device packet transmission. For detecting and troubleshooting these issues use the different types of show commands such as show interface and show spanning–tree. The data link layer is responsible for controlling access to the media and formatting the data for transmission for going across the physical network link. So it encapsulates the packets from the network layer to suitable frames for the network media to use for transferring data frames from one place to another error free. The addressing used at this layer is physical addressing also known as mac addressing which is how devices are addressed at this layer instead of IP addressing. The data link layer also does error detection at this layer as well. The data link layer has two sub layers which are logical link control and Mac. The logical link control sub layer gives flexibility in services to the layers above so it will let the data link layer known what to do with a packet when gets a frame. This works by it will check the header to establish that the packet inside the frame it received is destined for the network layer. The MAC sub layer keeps a table with the mac addresses of the devices because each device must have a unique Mac to be identified on the network. At the data link layer you also ... Get more on HelpWriting.net ...
  • 34. unit 3 assignment 3 Essay Chapter 3 Review 1. Which of the following is true about a TCP/IP network? A) The network uses only standards defined in TCP/IP RFCs. 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) D) TCP/IP mapping and C) Ethernet 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) B) It exists as a deployed network device, which people can visit on the Internet. C) It has been passed through some form of review and approval or certification process. 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) B) International... Show more content on Helpwriting.net ... A) Vendor models 10. Which of the following statements is true when comparing the OSI and the TCP/IP model as defined in RFC 1122? B) The lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI. 11. A network engineer connects two PCs (PC1 and PC2) using Ethernet NICs and an Ethernet cable that has copper wires inside. The two PCs communicate successfully. Which of the following happens when PC1 sends bits to PC2? D)PC1 converts the bits to sound waves, and the NIC uses an A/D converter to send the data over the cable. 12. A TCP/IP network includes an Ethernet LAN with 10 PCs uses a LAN switch. PC1 sends data intended for an app running on PC2. Which of the following mechanisms does Ethernet define so that PC2 receives and processes the data? A)The Ethernet header lists PC2's MAC address so that PC2 will realize that the data is meant for PC2. 13. Two network pros are having a conversation about some issues in a network. They discuss some issues related to how PPP forwards data, so they happen to be discussing the data structure that includes the PPP header and trailer. Which of the following terms do they use? B) Packet 14. Which of the following are true facts about IP addresses? (Choose two answers.) C) Are listed in the data–link trailer D) Used by routers to make a forwarding decision 15. Which of the following answers is true about Ethernet MAC addresses? A) 48 bits in length C) Are listed ... Get more on HelpWriting.net ...
  • 35. Open System Interconnection Model Essay Open System Interconnection Model OSI is short for Open System Interconnection, which is an ISO standard for worldwide communications that defines a networking framework for implementing protocols in seven layers. History and Reasoning for… –––––––––––––––––––––––––– The early development of networks was disorganised. And by the early 80's there was a great increase in the number and size of networks. Companies started to realise how useful networks could be and started to add and expand networks as quickly as new network technologies were introduced. But by the mid 80's the companies start to experience problems as it was found that it was difficult to exchange information... Show more content on Helpwriting.net ... It gave creators of networks a set of standards that ensured greater compatibility among various network technologies produced by companies around the world. The OSI reference model has become the primary model for network communications and is considered the best tool available for teaching people about sending and receiving data on a network. The 7 Layers Of the OSI ––––––––––––––––––––––– The OSI reference model is a framework that is used to understand how information travels throughout a network. This model explains how packets travel through the various layers to another device on a network, even if the sender and destination have different types of network media. In the OSI reference model, there are seven numbered layers, each of which illustrates a particular network function. Layer 7 is the Application Layer…This layer supports application and end–user processes. Layer 6 is the Presentation Layer…This layer provides independence from differences in data (e.g., encryption) by translating from application to network format, and vice versa. Layer 5 is the Session Layer…This layer establishes, manages and terminates connections between applications. Layer 4 is the Transport Layer…This layer provides transparent transfer of data between systems, or hosts, and is responsible for end–to–end error recovery and ... Get more on HelpWriting.net ...
  • 36. Nt1310 Unit 7 DCC Homework CH 1& Ch2 Sai Kumar thumma 1004541 Q1) Ans The 5 components of DCS (Data communication sys) are A)Sender. B)Receiver. C)Message. D)Transmissions Medium. E)Protocol. Q2) Ans Performance, reliability and security are the 3 necessary for efficient network. Q3) Ans In a point–to–point connection, we connect 2 devices and in multi–point there are more than two devices which share the link. Thus, multi–point has more reliability, less installation cost and easy to install. Q4) Ans Point–to–point and Multipoint are the two–line configuration. Q5) Ans In line configuration, there are 4 topologies, Mesh, Bus, Ring & Star. Q6) Ans In a Half–duplex mode, it can either transmit the data or it can only receive data, but not both at a time. For example, consider the radio channel where one can only receive the data via sound and another example is the walkie talkies are based on these systems.... Show more content on Helpwriting.net ... Example is a telephone, where user communicate each other. Q7) Ans The Basic Network topologies are Ring, Bus, Star, & Mesh topologies. The advantage For ring is ease installation and reconfiguration. For mesh is eliminate traffic problem when connected to multiple system. For bus is simple to install and require less cabling line. For Star is least expensive than other, requires only I/O port Q8) Ans For each network the required number of cable links are Ring & Star – n number of links. Mesh – we use the equation – n(n–1) / ... Get more on HelpWriting.net ...
  • 37. Physical, Data Link, Network Layers, Management... MIS589 Project Milestone 2 Network Requirements 1 Physical, Data Link, Network Layers Management Integration System ClearLeaf MIS Prepared by: Shams Bin Shahid Anaugh Date: 01/23/2016 Approved by: Physical media Physical media is found on the physical layer of the OSI model. Therefore physical media includes cabling and equipment, wiring and the frequencies defined to transfer data between two points. Physical media is what physically connects the computers connected on the internet. For this network two physical media will be used to allow access to the application layers of the system. The coaxial cables will be used to create a WAN. While a wireless protocol will be used in allowing users to roam within the network. A LAN will be represented as follows; Coaxial cable are classified according to it impedance. The one used in this exercise will use the impedance of 70 ohms with RG–58. This can be used for the discussed high speed internet requirements discussed above. The diagram above shows the high level LAN network design that could be implemented. Inter–office connections could be done using Sate–590553175llite Communication or using a single point ISP provider to do the networking. Twisted pair will also be used to plug computers to the main internet socket to aid the roaming of the wireless users. Physical media selection: summary Physical media selection is very daunting task given that there as many products ready in the market that offer wide range ... Get more on HelpWriting.net ...
  • 38. Designing A Computer Network -such There are many things to consider when designing a computer network –such as costs of components, software and labor; communication, cohesion, expandability and many others. However, the end goal in such an enterprise is to have a fully functional, harmonious, and cohesive tiered system where duties and actions are divided, and delineated accordingly. One of the major network architectures used to facilitate this process is known as the TCP/IP Protocol Suite. The TCP/IP Protocol Suite was designed by scientists in the effort to support a new type of network known as the ARAPNET that was being installed across the US in the late 60's to 70's. (White, 2013, p. 15) The challenge was to create an open system whereby all networks could freely communicate with each other. The design was based on a layered system whereby the user would connect at the topmost (or application) layer, while at the same time being removed or separated from the lower (physical) layer. Although the number of layers is not exactly set, depending on the source this number can range between five and seven layers, with each layer providing services to the layer above it. For the purposes of this discussion however, we will address the five layer model. The five layers of the TCP/IP Protocol Suite are: Application, Transport, Network, Network Access (or Data Link), and Physical. (White, 2013, p. 15) Application This layer supports all of the applications on the network. Some of the most frequent ... Get more on HelpWriting.net ...
  • 39. Wireless Sensor Network Essay I. INTRODUCTION Wireless Sensor Network consists of highly distributed Autonomous sensors nodes to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a receiver (destination) [1] [7]. A sensor node consist of a radio transceiver with internal antenna or connected to external antenna, a microcontroller and electronic circuits for interfacing with the sensors and energy source such as battery[1][7]. A.Topologies: Topologies used in Wireless Sensor Network are Mesh, Star, Ring, Tree, and Bus, Fully connected. Mesh Network. B.Characteristics: Power consumption constrains for nodes using batteries or energy ... Show more content on Helpwriting.net ... Wireless Sensor Network Protocols: Physical layer: Sonet , ISDN Data link Layer: Frame Relay, FDDI, Ethernet Network Layer: RIP,OSPF, EGP,IPX,IPv6,ARP Transport Layer: TCP, UDP, SPX Application Layer: BOOTP, DHCP, HTTP, DNS Classifications of the Protocols Protocols are classified into the following major categories. TCP/IP IP, TCP, UDP, SMTP, POP3, RIP, FTP, DHCP Cellular GPRS, GSM, WAP and CDMA VOIP SIP, RTP, MGCP and H.323 General Frame Relay, ATM, X.25, PPP[1].
  • 40. II.OBSTACLES IN WIRELESS SENSOR SECURITY Wireless sensor nodes[2] have limited resources such as limited memory and limited power. There is unreliable communication in wireless sensor network that leads to threat to sensor security. The security of network depend on communication which relies on protocol. Energy Constraint: Energy requires converting input to output (sensor transducer), communication among the sensor nodes and computation. Security levels depend upon the cost of energy. Memory Limitations: Sensor nodes have small amount of memory and storage. Sensor nodes require simple algo–rithms because they do not have enough space to store complicated algorithms and executed them. Unreliable communication: – Unreliable communication occurs due to unreliable transfer, conflict and latency. Unreliable communication occurs due to connectionless packet based routing in wireless sensor network. Even if channel is ... Get more on HelpWriting.net ...
  • 41. Nt1310 Unit 1 Network Analysis Paper Each layer has a specific function and the layers work together to allow an application to send data over a computer network without really specifying the exact protocols and/or physical wiring within each layer. In line with the figure above, when the first CEO sends an email message to the second CEO, email 'application worker' firstly prompts the first CEO to enter a message and specify that the receiver is the second CEO. The application worker then creates the necessary data package with message contents and the destination email address and send s this to a 'transport worker'. The transport worker provides transport integrity. The transport worker may establish a connection with the receiver (second CEO); monitor the overall flow between sender and receiver, and perform the overall error control to recover any lost data to protect... Show more content on Helpwriting.net ... The 'network worker' then takes the data package from the transport worker and adds routing information as to assign the package with a specific PO BOX address or rather a network address (if you may) in order to navigate through the network. The 'network access worker' then inserts error–checking information and prepares the data for transmission. The 'physical worker' finally transmits the data via a physical or wireless medium so that the second CEO receives the message. The following figure shows how the data is transmitted from the application layer to the physical layer. In the case of sending an email, in the same breadth, the OSI model follows similar logical and physical connections when transmitting the email from one CEO's email mailbox to the other's. The other difference is that though the TCP/IP protocol suite has 5 layers, the OSI model has seven layers which basically ... Get more on HelpWriting.net ...
  • 42. Application And Application Of Cloud Computing Introduction With the Internet, users have been able to access information faster than ever. Today, users have the ability to utilize cloud technologies to access information and services. Users no longer have to rely on the processing power of their personal computer (PC) to complete task or limit the ability of accessing pictures or document to a physical location such as their hard drive on their PC. The Internet is a large network that is continues to provide more services and opportunities. The Internet is support by a large network of routers, switches, and servers. Understanding how to network terms and utilization will continue to allow business and user to optimize the utilization of the Internet and cloud computing. Ways users use applications in the cloud in today's business environment As information technology continues to improve, applications no longer are limited to being installed locally on a physical computer or server. Cloud computing now allows applications be access via a virtual solution knows as the "cloud". There are many essential characteristics of cloud computing such as on–demand access, pay per use, connectivity, and resource pooling (Durkee, 2010). Users must be able to trust the connectivity when relying on access an application over the internet. Today 's cloud servers are connected to high–speed networks that allow data to flow to the Internet. These high–speed networks improve reliability and expand accessibility. Cloud computing offers ... Get more on HelpWriting.net ...
  • 43. The Network Requirements Of Many Small Organizations The networking requirements of many small organizations can be served by a single LAN with one or two servers. The design of a small network should be simplistic, but practical, reliable and scalable. A good LAN network must easily expand as the business grows, even if the scale of the original environment is small. Avoid making technology judgments that might limit the company as it grows. I will deal with the physical and logical design of a LAN by building a network in a test laboratory, consisting of computers, an Appliance Security Appliance (ASA) 5505 firewall and switches. Network will consist of Fiber Optic Cable Modem, Nodes, Communication Media, Networking Devices A security policy will be in place, or updated to reflect the goals of the company. Redundant Firewalls with VPNle Communication media (copper cable to connect to the internet, fiber cable) Switch: Switches connect multiple devices, including computers and printers, on the same network. Router is attached to a switch# routers connect a network to other networks, such as the Internet. They shield data from security threats using technologies such as firewalls and virtual private networks (VPNs). They can even decide which computers get preference over others. A workstation connected to a switch Storage server ( server with hard disk) The server will be acting as a print server backup Redundancy: is two chassis, two modules, two links. It means you have a backup to take over the primary system if ... Get more on HelpWriting.net ...
  • 44. Essay on NT1210- Unit 3 Assignment 1 Multiple Choice Questions 1. Which of the following is true about a TCP/IP network? The network uses standards defined in TCP/IP RFC's plus other standards. 2. Which of the following terms is not a common synonym for TCP/IP model? Ethernet / TCP/IP Mapping 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? It exists as a written document / it has been passed through some form of review and approval or certification process 4. Contrast an international standard as compared to a de facto standard? De facto standard documents have been reviewed more thoroughly. / De Facto standards typically mean that the ... Show more content on Helpwriting.net ... 11. A network engineer connects two PCs (PC1 and PC2) using Ethernet NICs and an Ethernet cable that has copper wires inside. The two PCs communicate successfully. Which of the following happens when PC1 sends bits to PC2? 12. A TCP/IP network includes an Ethernet LAN with 10 PCs uses a LAN switch. PC1 sends data intended for an app running on PC2. Which of the following mechanisms does Ethernet define so that PC2 receives and processes the data? The Ethernet header lists PC2's MAC address so that PC2 will realize that the data is meant for PC2 13. Two network pros are having a conversation about some issues in a network. They discuss some issues related to how PPP forwards data, so they happen to be discussing the data structure that includes the PPP header and trailer. Which of the following terms do they use? Packet 14. Which of the following are true facts about IP addresses? Are listed in the data–link trailer and used by routers to make a forwarding decision 15. Which of the following answers is true about Ethernet MAC addresses? All of the above. 16. Witch of the following statements is true comparing LANs and WANs? LANs generally connect devices that are nearer to each other, compared to WANs. WANs are purchased, and LANs are leased.
  • 45. 17. Which of the following answers list true facts about the data link layer of the TCP/IP? Two TCP/IP data–link protocols are Ethernet and PPP. Data–link protocols define addresses that ... Get more on HelpWriting.net ...
  • 46. Patton-Fuller Community Hospital Network Project Patton–Fuller Community Hospital Network Project Harold Copeland CMGT/554 11/11/13 Dean Mcintyre Company Overview Patton–Fuller Community Hospital is a community hospital that provides healthcare services designed to meet the needs of patients at every stage of life. The hospital was originally founded in 1975. Patton–Fuller Community Hospital has been an important part of the community since its opening. Patton–Fuller Community Hospital is located on the corner of 61st. Street and Jump Street (Patton–Fuller Community Hospital, 2013). Patton–Fuller Community Hospital has provided quality healthcare services for the entire family since its opening while keeping its patients information and data secure even in this current ... Show more content on Helpwriting.net ... These two layers perform routing and deals with end to end issues. The hospital currently uses a CISCO ASA 5510–VPN router to connect to the internet. Finally the session layer, presentation layer, and application work together to make the network operational. These three layers actually make all the data be visible to the end users. These layers also make the data and network usable to the operator. Patton–Fuller utilizes Windows Explorer and its company's webpage for these layers (Patton–Fuller, 2013). Recommended Protocols For Patton–Fuller to fully utilize their potential networking power, the following protocols should be utilized. Patton–Fuller should utilize a Gigabyte Ethernet Network for all its hardwired LAN connections. Gigabyte Ethernet is part of the family of Ethernet computer networking and communication standards. The Gigabit Ethernet standard supports a theoretic data rate of 1 gigabit per second. Gigabyte Ethernet networks are connected by CAT5e and CAT6 cabling (Gigabit Ethernet, 2013). The Gigabyte Ethernet network should be accomplished by using layer 3 switch. A layer 3 switch is a high–performance device for network routing. Layer 3 switches actually differ very little from routers. A Layer 3 switch can support the same routing protocols as network routers do. Both inspect incoming packets and make dynamic routing decisions based on the source and destination addresses inside. Layer 3 switches improve on the performance of routers ... Get more on HelpWriting.net ...