Describe function for each of the osi reference model layers

Assignment Help Computer Networking
Reference no: EM131915797

Information technology (IT) professionals often find themselves in the position of training others on technology.

For this exercise, verbally explaining the concepts will serve you well in that trying to explain something is a great way to learn.

For this activity, you will develop a presentation suitable for use in training individuals with no experience in computer networking. You will need to create a short presentation, 5-7 slides, that describe some very important networking concepts.

You will include some brief verbal descriptions, using the recording feature in PowerPoint, for each slide. You should also include more detailed descriptions regarding the concepts on each slide.

In this scenario, you are a subject matter expert (SME) in networking. You have been hired under contract by XYZ Corporation to prepare an introductory training module for new members of its networking staff. This presentation will aid the new staff as they prepare to take a CompTIA Network+ Exam.

A particular weakness shown in pretesting reveals the team has difficulty associating functions and devices with the OSI reference model or the related TCP/IP model. Your training presentation will prepare them in the basics of network protocols (OSI and TCP/IP), explain how OSI and TCP/IP layers are related, and provide example networking protocols/concepts as they relate to OSI layers, such as the Transport Control Protocol (TCP) relates to the transport layer in the OSI reference model.

Include in your PowerPoint presentation a description of functionality for each of the layers of the OSI Reference Model. Compare and contrast TCP/IP layers with OSI layers. Finally, relate the various terms to the appropriate OSI layer. Explain the concepts using your own voice.

Slide 1: Title page

Slide 2: Describe the purpose and function for each of the OSI Reference Model layers.

Slides 3-4: Compare and contrast the TCP/IP layers with OSI layers.

Slide 5: Provide a TCP/IP protocol or network device that would relate to each layer in the OSI reference model. Include the purpose or function of your example.

For instance, a switch would be a network device used for connecting devices to a network at the OSI-RM data link layer. Examples must be provided for every layer in the OSI-RM.

Slide 6: References in APA format

Reference no: EM131915797

Questions Cloud

Write about standard chartered bank : Write about Standard Chartered Bank - The size of its employees and its organizational structure - The training plan and methodology
Design a business information system : Construct a system analysis paper based on your weekly presentations.
Explain the differences between races : Are there similarities or differences between races (variable RC) in terms of Interpersonal Trust (variables IPT1-IPT5) and Age of branch managers.
Figure out why chairman of the board of directors fired : You're trying to figure out why the chairman of the Board of Directors fired you as a CEO of a small corporation
Describe function for each of the osi reference model layers : Develop a presentation suitable for use in training individuals with no experience in computer networking.
Discuss different types of costing methods : The elements of planning, control, and decision making used by the company. Different types of costing methods used by the company.
Painters spilled bucket of paint on some important papers : While painting your neighbors’ home, the painters spilled a bucket of paint on some important papers
Analyze the main healthcare-related components of rio policy : Analyze the main healthcare-related components of the Rio Policy Statement to the health components of Saudi Arabia's Vision 2030.
What is the for this cash flow : What is the i* for this cash flow?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain a matrix that identifies specific departmental needs

Develop a matrix that identifies specific departmental needs for a company that you are familiar with.

  Contrast the standard network topologies

Compare and contrast 2 of the 5 standard network topologies and the different variations of these topologies. What factors would you consider when implementing a particular topology

  1 list the three fundamental security properties and for

1. list the three fundamental security properties and for each give an example of failure. justify your answer based on

  Explain how does a vlan and firewall combination help you

you are the senior network architect for a large corporation. the company has offices in l.a. new york and miami. the

  Voip communication infrastructures

What are fundamental differences, from the risk management perspective, between Public switched telephone network (PSTN) and VoIP communication infrastructures

  Insert these items into a bst

Insert these items into a BST (using alphabetical order): Hockey, Baseball, Football, Tennis, Swimming, Ice skating, Badminton, Hopscotch, Basketball, Water polo, Crew.

  What is the command for displaying the router interfaces

What is the correct command for configuring a static route on a Juniper router given a destination of 216.234.214.82 with a subnet mask of 255.255.255.255

  What kind of ticket is held by kerberos tgs

Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a __________.

  Report on network administration and support

Prepare a report on Network administration and support - virtual network to support the function of the said servers has eradicated their need. Therefore, the administration of such networks is found to have increasingly become specified.

  What are some of the challenges of using dns in the future

What are the security risks associated with the implementation of DNS? What are some of the challenges of using DNS in the future?

  How many bits are needed to represent an address

An address space has a total of 1,024 addresses. How many bits are needed to represent an address? How many addresses are available in this system?

  Examine the vulnerabilities of an ftp file transfer

Examine the vulnerabilities of an FTP file transfer, perform the activity - Capture network traffic using WireShark or Ethereal

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd