Describe the seven layers of the osi model

Assignment Help Computer Network Security
Reference no: EM132177730

Question: One of the contractual requirements for the ERP upgrade was to provide a training for new employees and interns explaining the system architecture and networking design.

Write a PowerPoint presentation that you will use during the training. You will start this PowerPoint in Unit 4 then complete and submit it in Unit 5.

The requirements for your presentation are:

Describe the seven layers of the OSI model and how they interact with the connected layers.

Discuss seven hardware or software components (one for each of the seven layers) of the customer's network.

Describe the significance of each component in the overall information system.

Describe the DHCP protocol and the importance it plays in the enterprise network design.

Using the "ipconfig /all" command, include a screenshot of the IP configuration information for your PC (or similar Linux/Mac commands).

Explain the primary IP address and MAC address and the difference between the two.

Explain the DHCP lease information shown in the screenshot.

Each slide should focus on one topic of the training (you can have multiple slides per topic).

Include speaking notes in the Notes section of each slide that describe what you are going to say during the training.

Each slide should contain no more than 5 bullets and should include an image that represents the topic.

You should have a minimum of 9 slides including a title slide as the first slide and a reference slide as the last slide.

All references should be in APA format.

Reference no: EM132177730

Questions Cloud

Describe an instance of which you are aware of which an act : Please describe an instance of which you are aware of which an act of internet crime took place.
Write essay which compares conventional validation methods : COS6020 - Software Verification - what is model checking and how it works - Using the CTL model checking algorithm prove that the CTL formula in b) is verified
Determine the minimum number of agents : Develop an ExtendSim model to determine the minimum number of agents that will result in an average waiting time of 5 min or less.
Calculate the total cost on june : On June 15, the firm purchased 50 units with a unit price of $1.20. If the firm uses the LIFO method of inventory pricing, Calculate the total cost on June
Describe the seven layers of the osi model : Describe the seven layers of the OSI model and how they interact with the connected layers. Discuss seven hardware or software components.
What is the monthly rent or mortgage payment : What is the monthly rent or mortgage payment and how easily will that be earned each month. Include all other costs also (payroll, supplies, advertising, etc).
Compute the total equivalent units of production for labor : During the month, 2,700 units of a product were completed and 800 units, Compute the total equivalent units of production for labor for the month
Discuss the objectives of corporate governance : Discuss the objectives of corporate governance and why this has led to increased costs for publicly traded companies?
Register complaints about the product shortage : Why is it important to know which media customers were using to register complaints about the product shortage?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd