Premium Essay

Layering & Internet Model

In:

Submitted By chander69
Words 3129
Pages 13
There are three parts to this assignment relating to each lecture in Module 1.

Part 1: Layering and the Internet Model
Imagine that a technology organization has been in business for decades, and that the organization developed its own method of computer-to-computer communication. Because this method of communication only occurs within this organization, it is not layered, but rather is designed to operate as quickly and efficiently as possible on the custom hardware by using the least amount of overhead possible. The organization continues to create its own communication hardware and software that works with modern computers, but the CTO of the organization is considering replacing this custom communication solution with the adoption of the Internet Model in use today, along with its technologies. With this scenario in mind, address each of the topics below.

Topic 1: The Advantages of a Layered Model
Identify and describe the advantages that a layered solution would offer the technology organization when compared to its non-layered solution.

Advantages :
The advantage of implementing layered model in technology organization will be :

1. They can communicate with the other organizations and can provide the information/presence about their business on internet too.

2. By implementing layered module… changes at one layer will not affect hardware /software at the other layers. Vendors can develop hardware and software to provide the functions of each layer separately. Thus it can be easily updated and improved.

3. Also layering model is based on standard OSI reference model. For proper communication the software/hardware at different layers should be same. This is accomplished by using standards. Any hardware/software that conform to a standard can communicate with any other hardware and software that confirm to the same

Similar Documents

Free Essay

Website Critque

...1. What is the box model? The CSS box model describes the boxes that are formed around elements in a Web page. In XHTML, every element is treated as though it were a box. The box model consists of four parts: a content area, padding, borders, and margins. 2. What is padding? Padding is the white space that surrounds the box content. 3. What is the margin? Margin is white space outside the border. 4. When using the border shorthand property, what value must always be specified? Border Shorthand Property is the shorthand property you can use to set the values for all four border styles with one declaration. • To set the border width, use: border-width: width; where width is one of the CSS units of measure. • To set the border color, use: border-color: value; where value is a named color, RGB color, or hexadecimal color value. • To set the border style, use: border-style: style; where style is either none, solid, double, dotted, dashed, outset, inset, groove, or ridge. • To use the border shorthand property, enter: border: style color width; where style is the border style, color is the border color, and width is the border width. Although not all three values need to be specified, and values can be entered in any order, you must specify a border style. 5. What are the values for the float property? The values of the float property are left, right or none. 6. What are the values for the clear property? The values of the clear property are left...

Words: 264 - Pages: 2

Premium Essay

Pandora

...Business Strategy: Pandora created and provides an easily accessible Internet radio platform personalized to and by individual listeners. Launched in 2000, Pandora Media created a way for individuals to stream their favorite songs without purchasing them. With over 900,000 songs, Pandora takes the likes and dislikes of each individual consumer into account to make customized stations of exactly what they want to hear. Pandora is focused on Mobile Monetization which is a two prong approach. Digital Strategy and Radio Strategy are the two main areas of focus. The Digital strategy is focused on reaching its customers through the online and mobile devices where the Radio Strategy is trying to reach more consumers through the Interactive and Measureable Audio Products. Traditional broadcast radio currently stands at approximately $73 per 1,000 listener hours, where the mobile platform only stood at $20, which shows the most room for improvement. The mobile platform had increased by 50% since last year and is forecasted to continue to climb at a rapid rate. Close to 70% of all active listeners, now come from the mobile platform which shows transition of today’s society. Pandora has over 200 million registered users and more than 76 million active users. Pandora's major source of revenue are through advertisements it serves on its mobile and web platform. Currently Pandora serves less than one minute of audio ads per hour of listening. This guarantees greater consumer interaction...

Words: 916 - Pages: 4

Free Essay

Final Exam

...Final Exam Review Basics B i • • Basic terminology and concepts Layered model (physical to application) Internet Layering • • • • • • • • Level 5 Level 4 Level 3 Level 2 -- Application Layer (rlogin, ftp, SMTP, POP3, IMAP, HTTP..) -- Transport Layer(a k a Host-to-Host) Layer(a.k.a Host to Host) (TCP, UDP) -- Network Layer (a.k.a. Internet) y ( ) (IP, ICMP, ARP) -- (Data) Link Layer / MAC sub-layer (a.k.a. N t ( k Network Interface or kI t f Network Access Layer) -- Physical Layer • Level 1 Final Exam Review Physical Layer • • • • Time and frequency domains. Bandwidth Band idth and data rate rate. Analog and digital transmission. Simplex, half-duplex and full-duplex transmission Final Exam Review Physical Layer ( Ph i l L (cont’d) ’d) • • • • Transmission impairments. Decibel. S/N ratio. Channel capacity. – Nyquist Nyquist. – Shannon. • Types / properties of media – Copper (UTP: Cat-3, Cat 5) Cat 3, Cat-5) – Fiber. Final Exam Review Physical Layer (cont’d) (cont d) • Data encoding – Analog-to-digital. • (Time sampling / amplitude quantization) – Digital-to-analog. • (D t reconstruction) (Data t ti ) – Transmission modes. • S Synchronous. h • Asynchronous. Final Exam Review Data Li k L D Link Layer Error Control • • Framing Error detection / correction schemes schemes. • Parity. • Hamming distance • CRC (polynomial encoding) . Final Exam Review Data Li k L D Link Layer Flow Control • Acknowledgement • Stop and Wait • PAR (P i i A k (Positive Acknowledgement with l...

Words: 858 - Pages: 4

Free Essay

Wlan Security

...Sebastian Bach Two ways to secure a WLAN, and the ramification if the WLAN is breached. There is an added vulnerability when securing a WLAN than there is with a LAN. The multitude of packets floating around going from one or more access points to a variety of electronic devices can be a tempting arena for those wanting to gain illicit access. There are several ways to increase the security level of a WLAN. The most basic of these would be a router with an integrated firewall. This is almost exclusively found in residential settings. Keeping to the same architecture, firewalls can be quite complex in their modus operandi. Where basic firewalls work on the first three or four layers of the OSI model, the more complex firewalls operate on all seven levels of the OSI model. Often times accompanying these higher end firewalls, there is what is known as a bastion. A bastion is located on the public side of the firewall and acts as bait for would be attackers. The thought behind a bastion is to get the would-be attackers to go there, thinking they have accessed the protected network. Bastions are completely unguarded to make this process easier. Another method of making a WLAN secure is to encrypt data that is on the network. If this is done, the users will authenticated, which will yet again further strengthen the WLAN. For this it is recommended to utilize either WPA or WPA 2 wireless encryption. In conjunction to the encryption, use VLAN or MAC address control lists, to...

Words: 504 - Pages: 3

Premium Essay

Myself

...------------------------------------------------- OSI model From Wikipedia, the free encyclopedia OSI model | 7. Application Layer | NNTP  · SIP  · SSI  · DNS  · FTP  · Gopher · HTTP  · NFS  · NTP  · SMPP  · SMTP  ·DHCP  · SNMP  · Telnet  · Netconf  ·(more) | 6. Presentation Layer | MIME  · XDR  · TLS  · SSL | 5. Session Layer | Named Pipes  · NetBIOS  · SAP  · L2TP  ·PPTP | 4. Transport Layer | TCP  · UDP  · SCTP  · DCCP  · SPX | 3. Network Layer | IP (IPv4, IPv6)  · ICMP  · IPsec  · IGMP  ·IPX  · AppleTalk | 2. Data Link Layer | ATM  · SDLC  · HDLC  · ARP  · CSLIP  ·SLIP  · PLIP  · IEEE 802.3  · Frame Relay · ITU-T G.hn DLL  · PPP  · X.25 | 1. Physical Layer | EIA/TIA-232  · EIA/TIA-449  · ITU-T V-Series  · I.430  · I.431  · POTS  · PDH  ·SONET/SDH  · PON  · OTN  · DSL  ·IEEE 802.3  · IEEE 802.11  · IEEE 802.15 · IEEE 802.16  · IEEE 1394  · ITU-T G.hn PHY  · USB  · Bluetooth · Blue | This box: view · talk · edit | The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a way of sub-dividing a communications system into smaller parts called layers. A layer is a collection of similar functions that provide services to the layer above it and receives services from the layer below it. On each layer, an instance provides services to the instances at the layer above and requests service from the layer below. For example, a layer that provides...

Words: 3915 - Pages: 16

Premium Essay

Layered Security in Plant Control Environments

...operating environments such as Unix, Linux, Windows, Ethernet, and the Internet Protocol. Migrating plant controls to open network and operating environments exposes all layers of the computing environment to unauthorized access. Layered security can be used to enhance the level of security for any computing environment. Layered security incorporates multiple security technologies in each computing layer to provide resistance to unauthorized intrusion, while reducing the risk of failure from a single technology. Layered security requires acceptance of a model, development of an access control plan, compartmentalization of the network, and implementation of core security products that address examination, detection, prevention, and encryption. Layered security is considered a “best practice” in any computing environment, and should be widely used in critical control environments. INTRODUCTION Plant control environments have traditionally been built on proprietary technology. This proprietary technology provided a reasonable level of security from unauthorized access due to its “closed” nature, and lack of connection to business networks and the Internet. However, vendors are beginning to migrate their plant control technology to more open network and operating environments such as Unix, Linux, Windows, Ethernet, and the Internet Protocol. In some instances, plant control environments have access to the Internet. This migration is driven by the need to offer advanced graphical...

Words: 2711 - Pages: 11

Premium Essay

Shades of Gray (Ethical Behavior)

...techniques in order to gain a financial profit while leaving behind companies in the dust and eliminating hundreds if not thousands of jobs in the process. Ethics is more than doing what’s right or wrong. It’s a way of life and how we can have an effect on others. Question 1: Go back through the case and make a list of each action or practice that could be called a gray area. The Layering Strategy: This was formulated in the late 1920 as a way to utilize one company’s money to invest in another. In the case of Goldman, he used his own customers to make money. He created an investment company and buys 90% of the shares in that company with its own money. Because the shares have sold so well, the public wants a piece of the company. So, the shares that Goldman initially bought for, say, $100, it is able to turn around and sell to the public for $110. He would then continue the cycle with another company and the price would climb. The Laddering Strategy: In 1990, the birth of the Internet age just started its peak. Goldman found another way to capitalize on this boom. Much like Goldman’s layering strategy, the Laddering strategies end result is also a crash. With the laddering strategy, this was reserved for Goldman’s best clients. Laddering is a trick, a sort of insider scam by the underwriter only allowing the select few that agreed to laddering would be granted the IPO. The underwriter would lock in the recommitted buyers at a price above the initial price and the shares...

Words: 1780 - Pages: 8

Premium Essay

Nt1310 Unit 3 Network Communication

...1) Protocols, or official standards, have been designed for networks in order to control the movement of data exchanged between components, what the content of data is composed of, and how communication starts and stops. 2) Two connection types (Transmission Control Protocol [TCP]/Internet Protocol [IP] connections and Common Industrial Protocol [CIP] connections) are layered over each other each time data is transferred. 3) The TCP connection is the first connection established. It is used for all Ethernet/IP communication and is required for all CIP connection use. A single TCP/IP connection supports multiple CIP connections. 4) CIP a) Established over TCP connections, Ethernet/IP CIP connections transfer...

Words: 785 - Pages: 4

Free Essay

Protecting Wireless Devices and Enhancing Security in a Wireless Network

...In this ever changing world, wireless communications has become a major platform for communications at work and at home. With popular mediums (Cell phones, PDA’s, Gameboys, Wii, Netbooks, iPods, etc…) like wireless devices, there are many advantages and disadvantages in operating wirelessly. No matter how you feel about the advantages or disadvantages of the devices, they need to be protected, along with setting up some form of security. On the website Howstufworksvideo (12) they show you the basics on how to setup home Network Security. You can go there can see how it is done. Just a few years ago, (25 Sep 07) there were some so-called experts saying that there was no need to secure your wireless system. In an article, David Ramel alleges that the importance of wireless security is overhyped, that it's now trivial to secure wireless nets and that IT pros have far more serious security concerns they should be addressing -- while home users have little to lose even in the remote chance someone tries to breach their network. (3) This person was obviously living in a sheltered environment because identity theft and credit card theft was out of control then. Now he is saying don’t worry about protecting your network and to just hold on to your wallet; basically. Either he was very innocent or totally clueless and is eating humble pie about now. Here are a few disadvantages. A limited spectrum, war driving, interfering signals can be generated by other devices in the...

Words: 2804 - Pages: 12

Free Essay

Intro to Network

...The comparison and contrast between the 2 main reference models which uses the concept of protocol layering. Open System Interconnection Model (OSI) Transport Control Protocol /Internet Protocol (TCP/IP). Transmission Control Protocol (TCP) A connection-oriented transport protocol. Connection-oriented transport protocols provide reliable transport, in that if a segment is dropped, the sender can detect that drop and retransmit that dropped segment. Specifically, a receiver acknowledges segments that it receives. Based on those acknowledgments, a sender can determine which segments were successfully received. TCP operates at the transport layer of the OSI model.  TCP three-way handshake. 1. It sends a message called a SYN to the target host. 2. The target host opens a connection for the request and sends back an acknowledgment message called an ACK (or SYN ACK). 3. The host that originated the request sends back another acknowledgment, saying that it has received the ACK message and that the session is ready to be used to transfer data.  UDP User Datagram Protocol A connectionless transport protocol. Connectionless transport protocols provide unreliable transport, in that if a segment is dropped, the sender is unaware of the drop, and no retransmission occurs. UDP operates at the transport layer  FTP File Transfer Protocol (FTP) Works at the Application layer FTP provides for the uploading and downloading of files from a remote host...

Words: 1464 - Pages: 6

Free Essay

Many Shades of Gray: the Goldman Sachs Standard

...Many Shades of Gray: The Goldman Sachs Standard Are there ethics in big business? Or does big business answer to a different power? This can be a rather gray area. The problem to be investigated is the Goldman Sachs Standard and the ethics (or lack thereof) that exist in the company. The original market strategy was to provide loans for small businesses and then sell these loans as commercial paper. (Jennings, 2012) In the 1920s, this became a tough market in which to make a profit. So, to borrow a phrase, when the going gets tough, the tough change strategies. In the late 1920s, Goldman changed its investment strategy to layered investments. This strategy involves creating a company and then personally purchasing a large amount of the shares. Goldman would generally purchase approximately 90 percent of these shares. The public, unaware of the original purchase, only saw a profitable company so they eagerly purchased not only the remaining initial shares, but also purchased shares sold by Goldman at a higher rate. Goldman would also purchase some of these to artificially inflate the market even further. This enabled Goldman to make money off of the secondary sales. Goldman was lying to its clients because the company it created was not truly as profitable as the inflated share price would indicate. It was fully aware of this and continued to layer additional companies into the strategy that would appear successful only as long as the market continued to grow....

Words: 2017 - Pages: 9

Premium Essay

Network Organizations

...of Networks 5. Three Types of Managers 6. Examples of Networks a. Dell b. GM c. BMW 7. The Future of Networks a. Cisco Telepresence 8. John’s Personal Experience 9. Conclusion 2 By Team Four – Informal Definition By Miles, Snow & Coleman, “Managing 21st Century Network Organisations” – Formal Definition 3 “…multilevel hierarchies have given way to clusters of business units coordinated by market mechanisms rather than by layers of middle-management planners and schedulers.” “…linked competitive success to doing fewer things better, with less.” Dynamics, Snow C., Miles R & Coleman H. Managing 21st Century Network Organisations, Organizational Winter 1992, pp. 5-20. “Established firms downsized to their core competence, de-layering management hierarchies and outsourcing a wide range of activities. New firms eschewed growth through vertical integration and instead sought alliances with independent suppliers and/or distributors.” Summer Miles, R. & Snow, C. Causes of Failures in Network Organisations, California Management Review, 1992, pp. 53-72 4 Marketers and Distributers Producers Designers Suppliers 5 Globalisation • Competition has reduced all margins; thus, firms must cut costs and improve efficiencies – economies of scale • Strong new players at every stage of the value chain Technological Change and Technology Transfer • Shorter product life cycles • Lower barriers to entry, firms have become ‘stateless’ and can move freely across...

Words: 2820 - Pages: 12

Free Essay

Network Management and Security

...(Name) (Instructors’ name) (Course) (Date) Network Management and Security A telecommunication Management Network, commonly known as TMN, is an infrastructure that provides interfaces for connection between several types of operating systems and telecommunications equipment, so as to manage the telecommunication service and network. This is from Glenn Warnock and Nathoo Amin (215). Also, it enables the functioning of the management information, which is exchanged through these interfaces. On the other hand, 5620 SAM is widely used for developing distributed systems, as it provides the infrastructure for interoperability of several object oriented management applications. With this application, the 5620 enables applications of operating systems to interoperate with the service access manager, allowing it to provide connections, isolate and manage network issues across an Alcatel network (225). With this, users can access management information transparently and independent of the hardware and software platform. This therefore enhances the portability of applications, which are developed across the multiple platforms of management. The principles and concepts of the TMN that can be matched with the features and functions of the 5620 platforms include the specification translation and the interaction translation. Redundancy is also an important feature. It is the automatic transfer of data network to stand by, and protects the network against hardware failure, software...

Words: 2230 - Pages: 9

Premium Essay

3 Generation

...Form The free essay examples that we publish on UK Essays have been submitted to us by students. These essays are not the work of our own expert essay writers. Thanks to all of the students that have submitted their work to us. READ MORE Share & download: Print Download Email Free Essays - Communications Essays 3G: Sophistication Guaranteed Telecommunications evolution is undergoing a rapid vamp to the future; the evolution is almost exponential, from the analog types to 2Gs and then finally the latest mobile innovation the 3G technology. The 3G techie is the latest on-stream line of communications which offers advanced voice communications and high-speed data connectivity, with wireless Internet access, mobile data applications and high multimedia content. The 3G model embodies true sophistication in terms of mobile technology but why was this phrase used to describe it? To answer this an...

Words: 1791 - Pages: 8

Premium Essay

Choose One Global Crime as a Case Study and Critically Evaluate the Effectiveness of the Transnational Policing of This Crime.

...Choose one global crime as a case study and critically evaluate the effectiveness of the transnational policing of this crime. This essay focuses on money laundering and argues the effectiveness of the transnational policing of this crime; money laundering is one of the world’s most prevailing organised crimes. This essay firstly defines policing from contrasting viewpoints of different philosophers as well as identifying modes of the police. I will explore the modes of policing and various definitions of policing; this essay considers definitions and approaches to policing through a transnational concept with influences from prominent figures within the ideology of transnational policing. The conventional process of money laundering is clarified together with implications of the how this global crime effects other crimes as well as society as a whole. Aided with two case studies I give examples of how money laundering takes place; taking into hindsight the effectiveness of the policing of money laundering. This essay also addresses the connection between money laundering and the risk society theory whilst also taking into consideration the contrasting views of domestic police modes and transnational police modes. Through addressing ways in which money laundering is combated through global organisations such as Interpol, I critically address significant notions of the policing of money laundering. Policing is typically understood as a method of crime control; however the...

Words: 3023 - Pages: 13