The internet uses a network technology

Assignment Help Basic Computer Science
Reference no: EM13936687

The internet uses a network technology called TCP/IP. The name comes from the protocol stack that includes TCP protocol in the transport layer and IP protocol in the network layer. Sometimes UDP protocol is used in the Transport layer instead of TCP.

In many organisations there is a knowledge gap in senior management. For this assignment you have been asked to give a review of TCP/IP to explain the technology to senior managers to assist them with make decisions on major network upgrades that the company is about to carry out. This will require both a technical description of the protocols and a description on how these protocols enable business applications to work.

Requirements

The structure of your document is up to you but you should address each of the following requirements. There will be marks applied to each requirement in roughly equal portions.

1. Write your document as a business report. Structure your sections as you think but cover the following requirements.

2. You should research the topics that you describe in this report in an academic manner. This means that you should do your research and keep a list of the references where you got your information. You might want to add some notes about these references for your own workflow needs. This is sometimes called an annotated bibliography. Once you feel that you have learnt about the technologies sufficiently to start writing about them in your own  words then you should put your references to one side and just write from your memories  of your research. Once you have written a first draft you can check back against your  references to see if there are important pieces of information that you are missing. You can  also begin to place the in text references so that your work is correctly stating where you got the ideas for each idea. Generally one paragraph will cover one idea so you should have a reference for each paragraph apart from paragraphs that are just introducing a topic and not stating any facts. If you just write your paper as you do your research you will find that it will not mark as highly because it will not have any natural flow and your writing is likely to just  be what you have read with minor changes to the words used in each sentence and this will read like a story that has been written by many different authors. It will also like be in too much technical detail without the necessary higher level descriptions for a non technical
person to be able to understand.

3. Technology description of TCP, UDP and I IP. Describe what they are and basically how they
do their work. As this report is targeted at senior managers with little technical knowledge, any terminology that you use should be defined. Your use of technical language should explain the technology so that a non technical person can understand it. It does still need to describe the protocols in a reasonable amount of depth and as such a single sentence to describe IP for example as "a protocol that gives addresses to all computers on the internet and direct messages on the internet to the correct computer " is far too brief and lacking detail. You should explain for example the format of a datagram. What the main fields in the header are for and how they are used by the protocol. You will need to work from a simple high level description to a more detailed description for it to be able to be understood by non-technical users. You should also describe the layered model briefly in introducing TCP, UDP and IP.

4. DHCP is a technology that is used to provide IP address configuration to user's computers.
Management would be interested to understand this technology more. They are interested in how it can be used to allow authorized users to access their network either via wireless or wired Ethernet but also to block users who do are not on a list of authorized users. There are several different ways this can be done. Please describe a solution to this problem

5. Provide a description of business applications that rely on these protocols and how the protocols help to make these applications work. You should focus on the differences for example between TCP and UDP, connection versus connectionless, reliable delivery versus
applications that require real time delivery of data, etc.

Reference no: EM13936687

Questions Cloud

Knowledge gap in senior management : The internet uses a network technology called TCP/IP. The name comes from the protocol stack that includes TCP protocol in the transport layer and IP protocol in the network layer. Sometimes UDP ..
Write a c++ program that will manipulate an array : Write a C++ program that will manipulate an array. It should handle up to 100 integer numbers. Write a separate function for each of the requirements mentioned below. Label the output appropriately.
Practical application of accounting theory : Write an explanation of each theory sourced, in the most part from the academic journal articles evaluated in Part A above (you may use additional sources to support your discussion including your set text).
Write a program to generate a table of factors : Write a program to generate a table of factors used to compute monthly payments for the money borrowed.
The internet uses a network technology : The internet uses a network technology called TCP/IP. The name comes from the protocol stack that includes TCP protocol in the transport layer and IP protocol in the network layer. Sometimes UDP protocol is used in the Transport layer ..
Consider a market where supply and demand : Consider a market where supply and demand are given by QXS = -10 + PX and QXd = 71 - 2PX. Suppose the government imposes a price floor of $33, and agrees to purchase any and all units consumers do not buy at the floor price of $33 per unit.
The conclusion that the level of output is efficient : The conclusion that the level of output is efficient at the market equilibrium rests on all of the following assumptions EXCEPT that __________ . A. buyers and sellers are well-informed B. there are no external costs or benefits
How can we avoid fragmenting habitats : How can we avoid fragmenting habitats and still retain the use of our property? What are some examples?
Do household products division should include measures : Do you think that the Household Products Division should include subjective measures of employee satisfaction and customer satisfaction in its balanced scorecard? Explain.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Addressing table and label packet tracer topology

Complete the following addressing table and label Packet Tracer topology as necessary, Perform Basic Router and Switch Configurations Configure the routers and switches according to the topology provided.

  Identify and correct the errors

Identify and correct the erros in the following program. void nPrintln(string message, int n){int n=1;for (int i=0; i int main (){nPrintln(5, "Welcome to C++!");}

  The radar gun used by a police officer

The radar gun used by a police officer outputs a radar signal and measures the speed of the cars as they pass. However, when the officer wants to ticket an individual for speeding

  Define transferring data from any core to any other core

Explain why loose timings on RAM memory might be useful in a multicore environment. If you know how to do a timing diagram that could be useful but you can also explain the concept. Assume that transferring data from any core to any other core c..

  Identifying potential risk, response and recovery

For each malicious attack and threat identified in above, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).

  Create an employee class

Create an Employee class

  How to copy multiple files from anywhere to anywhere

Shell scrips are used in Linux to automate complicated and repetitive tasks. Such scripts often use variables, pipes, parameters and grep to achieve the desired outcome.

  Problem regarding radio frequency identification

VISA CARD RFID (Radio frequency identification) Cover the following.

  Write a program that tests all fetures of new instruction

Implement a new nonunary instruction in place of NOP called ASLMANY whose operand is the number of times the accumulator is shifted left. Allow immediate, direct, and stack-relative addressing.

  The menu structure for holiday travel vehicle

The menu structure for Holiday Travel Vehicle

  Implementing new systems

Every organization faces resistance to change when implementing new systems. Discuss how you would implement change management in your organization if you were implementing a new system.

  Algorithm to place cell phone base station along road

You wish to place cell phone base stations at certain points along road, so that every house is in four miles of one of base stations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd