Knowledge gap in senior management

Assignment Help Basic Computer Science
Reference no: EM13936691

1.The internet uses a network technology called TCP/IP. The name comes from the protocol stack that includes TCP protocol in the transport layer and IP protocol in the network layer. Sometimes UDP
Protocol is used in the Transport layer instead of TCP.

In many organisations there is a knowledge gap in senior management. For this assignment you have been asked to give a review of TCP/IP to explain the technolog to senior managers to assist them with make decisions on major network upgrades that the company is about to carry out. This will require both a technical description of the protocols and a description on how these protocols
enable business applications to work.

2. You should research the topics that you describe in this report in an academic manner. This  means that you should do your research and keep a list of the references where you got your information. You might want to add some notes about these references for your own workflow needs. This is sometimes called an annotated bibliography. Once you feel that you have learnt about the technologies sufficiently to start writing about the in your own words then you should put your references to one side and just write from your memories of your research. Once you have written a first draft you can check back against your references to see if here are important pieces of information that you are missing. You can also begin to place the in text references so that your work is correctly stating where you got the ideas for each idea. Generally one paragraph will cover one idea so you should have a reference for each paragraph apart from paragraphs that are just introducing a topis and not stating any facts. If you just write your paper as you do your research you will find that it will not mark as highly because it will not have any natural flow and your writing is likely to just be what you have read with minor changes to the words used in each sentence and this will read like a story that has been written by many different authors. It will also like be in too much technical detail without the necessary higher level descriptions for a non technical person to be able to understand.

3. Technology description of TCP, UDP and IP. Describe what they are and basically how they do their work. As this report is targeted at senior managers with little technical knowledge,any terminology that you use should be defined. Your use of technical language should explain the technology so that a non technical person can understand it. It does still need to describe the protocols in a reasonable amount of depth and as such a single sentence to describe IP for example as "a protocol that gives addresses to all computers on the internet and direct messages on the internet to the correct computer " is far too brief and lacking detail. You should explain for example the format of a datagram. What the main fields in the header are for and how they are used by the protocol. You will need to work from a simple high level description to a more detailed description for it to be able to be understood by non technical users. You should also describe the layered model briefly in introducing TCP, UDP and IP. 4. DHCP is a technology that is used to provide IP address configuration to user's computers. Management would be interested to understand this technology more They are interested in how it can be used to allow authorized users to access their network either via wireless or wired Ethernet but also to block users who do are not on a list of authorised users. There are several different ways this can be done. Please describe a solution to this problem 5. Provide a description of business applications that rely on these protocols and how the protocols help to make these applications work.

You should focus on the differences for example between TCP and UDP, connection versus connectionless, reliable delivery versus  applications that require real time delivery of data, etc.

Reference no: EM13936691

Questions Cloud

Ability to communicate ideas and information professionally : It should demonstrate an ability to communicate ideas and information at a professional level, and be written in a form that can be used to build on for the final research report.
Use the heuristic evaluation method : For this coursework you must provide an Expert Appraisal of the Just Eat's takeway interface (web or mobile app) (http://just-eat.co.uk) in a web browser or phone of your choice.
Explain roles of hardware and software components : Discussion is designed to help you understand the roles of hardware and software components in a modern computer system. For the purposes of this Discussion, assume that you are heading a team of 25 people working on a software development project..
Dna replication is a method of growth, repair, and recovery : DNA replication is a method of growth, repair, and recovery. Give me the highlights for a cell making nuclear copies and for cells dividing for reproductive purposes. Not too much detail, because this could get lengthy. I will ask for more depth i..
Knowledge gap in senior management : The internet uses a network technology called TCP/IP. The name comes from the protocol stack that includes TCP protocol in the transport layer and IP protocol in the network layer. Sometimes UDP ..
Write a c++ program that will manipulate an array : Write a C++ program that will manipulate an array. It should handle up to 100 integer numbers. Write a separate function for each of the requirements mentioned below. Label the output appropriately.
Practical application of accounting theory : Write an explanation of each theory sourced, in the most part from the academic journal articles evaluated in Part A above (you may use additional sources to support your discussion including your set text).
Write a program to generate a table of factors : Write a program to generate a table of factors used to compute monthly payments for the money borrowed.
The internet uses a network technology : The internet uses a network technology called TCP/IP. The name comes from the protocol stack that includes TCP protocol in the transport layer and IP protocol in the network layer. Sometimes UDP protocol is used in the Transport layer ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is x after the following if-else statement is executed

What is x after the following if-else statement is executed? Use a switch statement to rewrite it and draw the flowchart for the new switch statement.

  Calculate each student average and grade for the class

Also print a report of the each student's test grades, average and final grade as a table, and then print the averages of each Test and overall Test Average, as well as highest Test Grade of all Tests and the student with the highest class grade.

  Static methods for processing an array of marks

For this task you will create a class containing a number of static methods for processing an array of marks, which are scores in a test. Each mark is an integer in the range 0 to 100 inclusive. On the Interact site for this subject, you will be p..

  Best practices for developing a universally usable interface

Best practices for developing a universally usable interface.

  Evaluate the deployment cost savings realized by cisco

Evaluate the deployment cost savings realized by Cisco, and determine if it was significant. Analyze how the solution deployed by Cisco improved: employee productivity

  Design two level and-or and not circuit

Design a two level AND , OR ,NOT circuit for the following I/O priority circuit,when the ack input is true ack will be made true for the smallest j for which req is true.

  A device that converts mechanical into electrical energy is

A device that converts mechanical into electrical energy is?

  Determines the change to be dispensed from a vending machine

Write a program that determines the change to be dispensed from a vending machine. An item in the machine can cost between 25 cents and a dollar, in 5-cent increments(25,30,35,..90,95,100), and the machine accepts only a single dollar to pay for t..

  Why it is utilized despite its complexity

Database connectivity is a very complex issue. Address what makes it so complex and what could be done to simplify it. Include in your discussion why it is utilized despite its complexity. Personalize your answer and give examples

  Write the diffent entities or objects

Write the diffent entities or objects,logical processes,data flows, and dfata stores which are involoved. starting from time you submitted your time sheet.

  Consider a market with two firms and a market

Consider a market with two firms and a market inverse demand:p= 90 - q , where q is the total market outputFirms have different marginal and fixed costs:Firm 1: c1 = 50 and FC1 =0Firm 2: c2 = 0 and FC2 = 50Assume the two firms choose prices simultane..

  Educational information is safeguarded

From the e-Activity, discuss how students' educational information is safeguarded. Decide if you believe that the safeguard methods are sufficient, too stringent, or too lenient and support your answer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd