Create a datapath diagram

Assignment Help Basic Computer Science
Reference no: EM13830572

• Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario: • Local user sends email to a Yahoo recipient. Local (corporate) user having email address [email protected] sends an email to [email protected]. ? Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. ? Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. ? Show user authentication when necessary. • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario: • Local user, Jonny Hill, transfers file using ftp through the Internet to another company's site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com. ? Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. ? Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. ? Show user authentication when necessary. • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario: • Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built. • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 

Reference no: EM13830572

Questions Cloud

Analyze the methodological approach : This consists of the process through which you will operationalize the independent and dependent variables, find and collect the data, analyze the information, and structure the outcome information. Use a data set, and include where you found the ..
Create a plan for hardware and software recommendations : Create a plan for hardware and software recommendations for a high tech company with 40 employees
Creative environments for learning : Explain how art centers and music centers enhance children's development in these three key areas: emotional, social, and cognitive.
Research on the value of including a model in a dss : Assignment: Analyze the value of including a model (A model simplifies representation or abstraction of a reality. It is generally utilized to analyze decision-making situations.) in a decision support systems (DSS)
Create a datapath diagram : • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario: • Local user sends email to a Yahoo recipient. Local (corporate) user having email address [email protected] sends an email to [email protected]..
Formulate future policy actions to address economic : Formulate (propose solutions) future policy actions to address economic and development issues. Why is your solution best for the real-world practice of politics. Justify your claims and includes specific details.
Determine your level of critical thinking : Determine your level of critical thinking. Write a brief description of a beginning critical thinker, an average critical thinker, and an advanced critical thinker.
Using a conductive material such as aluminum foil : Using a conductive material, such as aluminum foil, construct a Faraday cage. Make it big enough to hold a cellphone or portable FM radio receiver and con?rm that it blocks RF signals to such devices. Next, experiment with the size of holes in the ex..
Benefits and limitations of interactive voice response : Prepare a response to the following discussion topic: The benefits and limitations of Interactive Voice Response (IVR) and types of new applications for IVR predicted in the next 10 years, after reviewing Real World Case 4 in O'Brien: Verizon Comm..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the date in opening of letter

If /home/jenny/draft and /home/alex/letter are links to same file and following sequence of events occurs, what will be date in opening of letter? Alex gives command vim letter.

  Access control policy for lmj-star services

You have been asked to develop an access control policy for LMJ-Star Services (LSS) based on your understanding of the sensitivity of financial data and health care data.

  Explain steps to install apache on the operating system

One of the great benefits of the Apache web server is its wide range of OS and platform support. Apache will run on any Unix-like OS (e.g. Linux, Unix, Mac, Solaris, and Berkeley Software Distribution (BSD) and most Windows OSs).

  Identifying and explaining how the breach occurred

Based on the Target Data Breach answer the following questions and use only information from authoritative or scholarly sources and list references. identifying the type of breach identifying and explaining how the breach occurred (or suspicions by a..

  Wikis are web-based tools that make it easy

Wikis are Web-based tools that make it easy for users to add, remove, and change online content. Employees at companies such as Intel, Motorola, IBM, and Sony use them for a host of tasks, from setting internal meeting agendas to posting docume..

  Examine how coppa and cipa are similar and how they are

write a three to five 3-5 page paper in which you describe the main compliancy requirements and the protected

  Create a list containing the union of the elements

Create a list containing the union of the elements of the two lists? Insert an element after the nth element of the list.?

  Consider a large organization

Consider a large organization

  Describe how history shaped today''s networks

Describe how history shaped today's networks. Focus on the network technology involved and its evolution through to its current state.

  Problem of traveling from one city to another

Describe how the problem of traveling from one city to another could be framed as a production system. What are the states? What are the productions?

  Describe the concept of form follows function

Describe the concept of "Form Follows Function" as it pertains to the three main areas of design (FAB). Recognize ways in which portfolio designer works within limitations of media technology (Functionality).

  A development lifecycle for an ids system

Write a 1-2 page paper on a development lifecycle for an IDS system, including the following: Inception Configuration Deployment

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd