Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1.The internet uses a network technology called TCP/IP. The name comes from the protocol stack that includes TCP protocol in the transport layer and IP protocol in the network layer. Sometimes UDP
Protocol is used in the Transport layer instead of TCP.

In many organisations there is a knowledge gap in senior management. For this assignment you have been asked to give a review of TCP/IP to explain the technolog to senior managers to assist them with make decisions on major network upgrades that the company is about to carry out. This will require both a technical description of the protocols and a description on how these protocols
enable business applications to work.

2. You should research the topics that you describe in this report in an academic manner. This  means that you should do your research and keep a list of the references where you got your information. You might want to add some notes about these references for your own workflow needs. This is sometimes called an annotated bibliography. Once you feel that you have learnt about the technologies sufficiently to start writing about the in your own words then you should put your references to one side and just write from your memories of your research. Once you have written a first draft you can check back against your references to see if here are important pieces of information that you are missing. You can also begin to place the in text references so that your work is correctly stating where you got the ideas for each idea. Generally one paragraph will cover one idea so you should have a reference for each paragraph apart from paragraphs that are just introducing a topis and not stating any facts. If you just write your paper as you do your research you will find that it will not mark as highly because it will not have any natural flow and your writing is likely to just be what you have read with minor changes to the words used in each sentence and this will read like a story that has been written by many different authors. It will also like be in too much technical detail without the necessary higher level descriptions for a non technical person to be able to understand.

3. Technology description of TCP, UDP and IP. Describe what they are and basically how they do their work. As this report is targeted at senior managers with little technical knowledge,any terminology that you use should be defined. Your use of technical language should explain the technology so that a non technical person can understand it. It does still need to describe the protocols in a reasonable amount of depth and as such a single sentence to describe IP for example as "a protocol that gives addresses to all computers on the internet and direct messages on the internet to the correct computer " is far too brief and lacking detail. You should explain for example the format of a datagram. What the main fields in the header are for and how they are used by the protocol. You will need to work from a simple high level description to a more detailed description for it to be able to be understood by non technical users. You should also describe the layered model briefly in introducing TCP, UDP and IP. 4. DHCP is a technology that is used to provide IP address configuration to user's computers. Management would be interested to understand this technology more They are interested in how it can be used to allow authorized users to access their network either via wireless or wired Ethernet but also to block users who do are not on a list of authorised users. There are several different ways this can be done. Please describe a solution to this problem 5. Provide a description of business applications that rely on these protocols and how the protocols help to make these applications work.

You should focus on the differences for example between TCP and UDP, connection versus connectionless, reliable delivery versus  applications that require real time delivery of data, etc.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91607574

Have any Question?


Related Questions in Computer Engineering

Access your browsers security settings and configure the

Access your browser's security settings and configure the browser to refuse all cookies or to prompt you before allowing a cookie. Restart the browser; then visit several different Web sites. Be sure to visit popular sit ...

In linux what synchronization methods they use within the

In Linux what synchronization methods they use within the kernel, please dig into your findings for Linux.

Is smartart graphic and table slide important for

Is Smartart graphic and Table slide important for PowerPoint Presentation? How would it benefit?

Stack implemented with slldesign and code your own lifo

Stack implemented with SLL Design and code your own LIFO Stack using single liked list to hold a list of integers. Use the C++ "struct" structure to create your SLL nodes. Node position numbering should start with one. Y ...

Question write a 2 page briefing paper in which you present

Question: Write a 2 page briefing paper in which you present a summary of the issues (including a description of the types of intellectual property which may have been stolen). You should then summarize your research int ...

The following few machines are given informal

The following few machines are given informal descriptions. Decide whether they are of CISC or of RISC design, and provide a short description of why. a) Machine A has over 300 instructions, many of which are executed at ...

Would you help me by giving me some helpful tips about how

Would you help me by giving me some helpful tips about how to study basic C programming in days?

A simple medium access control protocol would be to use a

A simple medium access control protocol would be to use a fixed assignment time division multiplexing (TDM) scheme. Each station is assigned one time slot per cycle for transmission. For the bus, the length of each slot ...

Question suppose a problem can be solved with two different

Question : Suppose a problem can be solved with two different algorithms, A or B. Algorithm A has a time complexity of TA = 17n, and algorithm B has a time complexity of TB = 0.5n 2 . Give the range of n for which it is ...

Do you need computers or information and communication

Do you need computers or information and communication technologies to store, organize, and manage data in organizations? Explain how the present day organizations in a developed country like the USA store and manage the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As