Free Essay

Phase 3 Ip

In:

Submitted By crhodes1124
Words 513
Pages 3
Chad Rhodes
IT 245-1403B-04 Intro to Network Management
Phase 3 Discussion Board
Professor Jennifer Gaddy
09/03/2014

TCP/IP Model- This model IS the internet. That is to say, this is the basis on which the internet, as we know it, was created. That isn’t saying it was the first. The Internet protocol suite(TCP/IP) was introduced in 1982 as the standard networking protocol on ARPNET. In March of 1982, the Department of Defense adopted TCP/IP as the standard for military computer networking.
Layers- Compared to the Open Systems Interconnection (OSI) model, the TCP/IP model has fewer layers. It uses encapsulation to provide abstraction of protocols and services. The Application layer is at the top and is logically closer to the user. This is where applications create the user data and communicate that data to other applications. The Transport layer provides the host to host communications, creating a channel for the communication needs of the applications. The Internet layer is where the datagrams are exchanged across the network. The Link layer serves to define the networking method, and includes the protocols describing the network topology.
Now, compare this with the Open Systems Interconnection (OSI) model and its seven layers, wherein each layer facilitates the needs of the layer above it, while calling on the next layer below it. This model evolved from work with ARPNET, as well.

This chart shows the four layers of the TCP/IP model, showing the basic flow of information from user, via applications, to another user. I like this model for its simplicity in form and functionality.

Here is a chart showing the Open Systems Interconnection (OSI) model and its seven layers. This illustrates the flow of datagram packets from user to user and the addition of headers as it passes through each layer.

This is a side by side illustration, comparing the layers and their functions. Though both are layered protocols, the TCP/IP model does not use all of the layers of the OSI model, even though the layers are equivalent in operation and function.
Network Management- Maintaining and Managing a network is a large field requiring a wide range of functions. FCAPS is another ISO model, and stands for Fault, Configuration, Accounting/Administration, Performance, and Security. Across the board, this serves as the framework for network management.
Fault Management- Errors are detected and the network component makes the management station aware of issues.
Configuration Management- Monitors system configuration information and changes, since a majority of issues arise when changes are made to a system.
Accounting/Administration Management- Also known as billing, this tracks network utilization.
Performance Management- Ensures the network is performing optimally at all levels.
Security Management- As the name implies, this is the process of controlling access to the network.

References

Electronic design (2013) What’s The Difference Between The OSI Seven-Layer Network Model And TCP/IP?
Retrieved from: http://electronicdesign.com/what-s-difference-between/what-s-difference-between-osi-seven-layer-network-model-and-tcpip

WIKIPEDIA, FCAPS
Retrieved from: http://en.wikipedia.org/wiki/FCAPS

Similar Documents

Premium Essay

Mgm316 Phase 3 Ip

...MGM 316-1302B-06 Phase 2 IP June 3, 2013 I chose Sales Manager for each country. I selected to prepared resumes for each country. I included a resume for each country and attached a link to each announcement at the bottom of each resume. Name: Email: PROFILE: Dynamic sales manager with over thirteen years of experience in management, sales, and marketing. Seeking a position where my experience can be effectively utilized to increase product sales and price while growing market share. Recognized for ability to lead, build and sustain successful sales teams. Expert in building mutual beneficial relationships with both customers and business partners. Excellent presentation, negotiation, closing and follow through skills. WORK EXPERIENCE: ABC Company, Hunan, China Sale Manager, 2006 to 2007 * Responsible for managing up to seven Account Executives in three states * Lead the market center in a new sales promotions and contest role outs * Recruit and staff new account managers and sales representatives * Developed and implemented several Best Practices for sales execution * Conduct sales meetings and conference calls with sales team, listened to issues presented by the sales team implement the appropriate actions XYZ Corporation, Shanghai, China Sales Manager, 2005 to 2006 * Recruited resellers in the US and Europe. * Conducted sales calls all over the world using Skype. * Organized demos and evals with Support Engineers. ...

Words: 1191 - Pages: 5

Premium Essay

Study Guide Nsa Capstone

...a translator for the USB device so the computer understands what the USB device is doing. 3) Troubleshooting The most common issue is that either the driver is corrupted or the driver is the incorrect one. To fix this use the disk the printer came with and reinstall the driver or go to the products website and download the driver for that product and model. Topic 2: The OSI Model 1) Definition The OSI model is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. 2) Application 3) Troubleshooting Topic 3: SOHO Broadband 1) Definition The current available broadband solutions are cable, dialup(IDSN), satellite, ADSL(much like dialup) but higher rates 1500Kbps down and 256Kbps up,DSL(carries signal as digtal without have to convert it from analog and its faster) and wireless (Verizon ect) 2) Application I would use a wireless network that would allow everything to hook up to my network. 3) Troubleshooting I would start checking to see if it is network wide or certain sections of the network. If it is the entire network I would start looking towards my main switch and server but it was a certain section of the area of a network I would start at that switch and work my way back towards the server. Topic 4: TCP/IP 1) Definition 2) Application 3) Troubleshooting Check IP address, Subnet Mask, Default Gateway Topic 5: Client Server 1) Definition A domain is a...

Words: 992 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment

...ASSIGNMENT-3 1) A path in a digital circuit-switched network has a data rate of I Mbps. The exchange of 1000 bits is required for the setup and teardown phases. The distance between two parties is 5000 km. Answer the following questions if the propagataion speed is 2 X 108 m: a. What is the total delay if 1000 bits of data are exchanged during the data transfer phase? b. What is the total delay if 100,000 bits of data are exchanged during the data transfer phase? c. What is the total delay if 1,000,000 bits of data are exchanged during the data transfer phase? d. Find the delay per 1000 bits of data for each of the above cases and compare them. What can you infer? Book Name: Data and Communication Networking...

Words: 990 - Pages: 4

Premium Essay

It600-0803a-01:Information Technology Management Entire Buy This Course at: Http: //Myessaybank.Com/Essay Bag/View Paper/Id/1890

...BUY THIS COURSE AT: http://myessaybank.com/essay_bag/view_paper/id/1890 |   Management Effectiveness Using Technology Resources |    Phase 1 - Task 1 | Task Type: | Discussion Board | Deliverable Length: | See assignment details |   |   |   |   |  Primary Discussion Response is due by WednesdayYou have been called in by your boss. The company is considering buying another smaller firm; however, some business analysis is needed for your company management to make its final decision about purchasing. Your boss has asked you to look at the firm that he or she is considering to buy in terms of competitive advantage. You have been asked to explain to senior management how you would provide this information. You have been tasked with using Porter's five forces to make this determination. Discuss and defend to your management how utilizing Porter's five forces to analyze any organization or industry would provide an understanding of competitive advantage. | |   Phase 1 - Task 2 | Task Type: | Individual Project | Deliverable Length: | See assignment details |  The company that you are working for is considering buying another smaller firm. However, there is some business analysis needed for your company to make its final decision about purchasing. Throughout this course, you will be working on creating the Business Strategy and Management Plan.Keep in mind that the final Business Strategy and Management Plan template should contain the following...

Words: 3060 - Pages: 13

Premium Essay

Computers

...Brittany Martin IT245-1303A-03 Introduction to Network Management Phase 3 DB 8-1-2013 This week in phase 3 we are on the subject of how OSI (Open Systems Interconnection) model and TCP/IP (Transmission Control Protocol/Internet Protocol) are similar and how they are different. There are 7 layers in the OSI model and there are only 4 layers in TCP/IP. The 7 layers in OSI are application, presentation, session, transport, network, data link, and physical with application being the highest and physical being the lowest of the model (Harney, n.d.). The 4 layers of TCP/IP are application, transport, internet, and subnet (Harney, n.d.). In the OSI model the application layer simply handles a lot of software protocols such as DNS, and HTTP. The presentation layer transfers data from one end to the other. The session layer handles connection between two devices. The transport layer makes sure information is formatted in the proper way. The network layer sends information over to the proper web address. The data link layer makes sure data is small enough to be sent across the network to arrive in the correct place. The physical layer deals with all hardware including NIC’s, hubs, and Ethernet cabling. The TCP/IP only has 4 layers because one or more layers of the OSI models is composed in the TCP/IP model (OSI Model vs. TCP/IP Model, n.d.). In the application layer it deals with the user and how data is handled with that user. The transport layer deals with communication...

Words: 400 - Pages: 2

Premium Essay

Ccna Labs

...Phase 1: Identifying Requirements, Putting the Network Together Scenario NuggetLabs Industries is growing significantly. Due to space limitations, five employees currently share single cubicles…at the same time. While this is great for team building, these space limitations are now impacting business productivity. NuggetLabs has now leased an additional office building roughly 20Km from their headquarters location. While this office will eventually connect to the HQ office, it will initially be set up independently. NuggetLabs Industries has heard rumors of your ninja-like network consultation skills and has agreed to pay you an excessive amount of money to design and build their network infrastructure. Gathering Information To help guide this initial configuration, you‘ve assembled a list of requirements based on various meetings with management. * The new office will initially house 75 employees, each with their own Cisco IP Phone and PC. This office may eventually scale to 200 employees over 5 years. * The Windows admins are planning to install a new pair of redundant servers at the new office. They plan to manage all the IP addresses for DHCP on these servers and are waiting for you to tell them what IP address range they should use. * Windows admins: Jeff Service - (602) 555-1293, Mike Pack (480) 555-9382. * The new office is a two story building with the Main Distribution Frame (MDF) in the northwest corner of the first floor. Because of...

Words: 4941 - Pages: 20

Premium Essay

Test

...Unit 9 Assignment 2 Phases of a computer attack Phase 1 - Reconnaissance Phase 2 - Scanning Phase 3 - Gaining Access Phase 4 - Maintaining access Phase 5 - Covering Tracks Phase 1:   Passive and Active Reconnaissance Passive reconnaissance:   This is the process of scouting out a company or individuals knowledge and processes, such as finding out when employees come in to work and leave work.   It can also be the result of researching the company through the internet via search engines. Active Reconnaissance:   This is the process of actually scanning the network to find out IP address and services that the network provides.   This process will help the hacker determine what vulnerabilities are on the network as well as other important information such as what operating systems the network is using.   This is a more intrusive part of reconnaissance than the passive way and has a much higher risk of being detected. Phase 2: Scanning This is the process of using the information discovered in the reconnaissance stage and using programs such as port scanners, network mappers, and sweepers.   This can result in getting information such as the user accounts, IP addresses and   computer names. Phase 3: Gaining Access This is the phase where you are taking the information gathered from the reconnaissance and scanning phase, the information gathered is used to exploit vulnerabilities in the network to gain access.   There are several ways to do this such...

Words: 326 - Pages: 2

Free Essay

System Engineerring Roles in Software Enginerring

... TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. TCP provides reliable, in-order delivery of a stream of bytes, making it suitable for applications like file transfer and e-mail. It is so important in the Internet protocol suite that sometimes the entire suite is referred to as "the TCP/IP protocol suite." TCP is the transport protocol that...

Words: 2390 - Pages: 10

Premium Essay

Virtual Private Network

...VPN Concepts A virtual private network (VPN) is used to transport data from a private network to another private network over a public network, such as the Internet, using encryption to keep the data confidential. In other words, a VPN is an encrypted connection between private networks over a public network, most often the Internet. VPNs provide the following services:  Confidentiality: VPNs prevent anyone in the middle of the Internet from being able to read the data. The Internet is inherently insecure as data typically crosses networks and devices under different administrative controls. Even if someone is able to intercept data at some point in the network they won’t be able to interpret it due to encryption.  Integrity: VPNs ensure that data was not modified in any way as it traversed the re Internet. Authentication: VPNs use authentication to verify that the device at the other end of VPN is a legitimate device and not an attacker impersonating a legitimate device. Cost savings - VPNs enable organizations to use the global Internet to connect remote offices and remote users to the main corporate site, thus eliminating expensive, dedicated WAN links and modem banks.    Security - VPNs provide the highest level of security by using advanced encryption and advanced authentication protocols that protect data from unauthorized access. Scalability - Because VPNs use the Internet infrastructure within ISPs and devices, it is easy to add new users. Corporations...

Words: 6523 - Pages: 27

Free Essay

Five Phase Induction Motor

...Design of Five Phase Induction Motor Sanket M. Bhimgade#1 Swapnil C. Chaudhari#2 Roshan B. Durge#3 Vabeihrohnei Chozah#4 Parag P. Salunke#5 Department of Electrical Engineering Dr. Babasaheb Ambedkar Technological University, Lonere, Raigad (MS - 402 103) sanketbhimgade@gmail.com , 2swapnil.28492@gmail.com , 3roshan.durge16@gmail.com , 4pawhrohnei@gmail.com , 1 Abstract: The conversion of electrical energy into mechanical energy has been and continuous to be a dominant form of power transmission for industrial purposes. The alternating current (AC) electric induction motor has been an industry workhouse for electromechanical conversion for over 100 years. This paper introduces the fundamental electric and mechanical principles of 5 phase AC induction motor. In this paper, a generalized formula is proposed for the selection of number of slots required for 5-phase alternative current (AC) machine design and the criterion for selecting the starting points of each phases. Keywords: Induction motor. Five phase, Stator winding. current. The power per phase is P = VP IP cosϕ and the total power is the sum of the amount of power in each phase. If the currents are equal and the phase angles are the same as in Fig. 1, then the load on the system is balanced, the current in the neutral is zero and the total power is [1], =3 cos ∅ Or Or = √3 = 1.73 cos ∅ cos ∅ I. INTRODUCTION In general, the induction machines having three-phase windings are...

Words: 3545 - Pages: 15

Premium Essay

Fiction Corp Data Ctr Mov

...Running head: THE FICTION CORPORATION DATA CENTER MOVE The Fiction Corporation Data Center Move Nigel Cleveland Strayer University Fiction Corporation is a large national retail chain of 10,000 employees and 500 retail outlets. Fiction is moving its primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed Big-Proj that the capital budget cannot exceed $500,000 and must not interrupt business operations. The data in the center supports remote retail locations, an off-site 100-seat call center and 3 remote warehousing operations 24 hours a day. Any significant downtime to its production systems would impact Fiction Corporation’s operations and profitability. Fiction Corporation has hired Big-Proj to supervise and execute its data center move several miles away to its new headquarters facility. The Project life cycle has been signed for 30 days. Big-Proj typically handles these types of moves as part of its normal operations; along with network upgrades, and ERP deployments. The move will include 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers, and 20 PC servers. A part of the strategy on the project will be to keep Fiction Corporation’s systems up and running as they serve 500 remote location retail stores that are connected via frame relay with ISDN backup. The company wishes...

Words: 2202 - Pages: 9

Premium Essay

Costco

...must support a spectrum of user applications and services. The IT division uses a centralized data processing model to meet business operational requirements. The central computing environment has traditionally included an IBM mainframe and over 50 networked Hewlett-Packard and Sun servers [KRAN04, CLAR02, HIGG02]. The mainframe supports a wide range of applications, including Oracle financial database, e-mail, Microsoft Exchange, Web, PeopleSoft, and a data warehouse application. C8-1 In 2002, the IT division established six goals for assuring that IT services continued to meet the needs of a growing company with heavy reliance on data and applications: 1. Implement an enterprise data warehouse. 2. Build a global network. 3. Move to enterprise-wide architecture. 4. Establish six-sigma quality for Carlson clients. 5. Facilitate outsourcing and exchange. 6. Leverage existing technology and resources. The key to meeting these goals was to implement a storage area...

Words: 1575 - Pages: 7

Free Essay

Nt1210 Midterm Review

...Bytes) Term Size (Bytes) Kilobyte Megabyte Gigabyte Terabyte 1024 1,048,576 1,073,741,824 1,099,511,627,776 Kilobyte, Megabyte, Gigabyte, Terabyte 210 220 230 240 Rounded by Size (Bytes) 1,000 1,000,000 1,000,000,000 1,000,000,000,000 Table 1-1 3 Random Access Memory (RAM) Physically exists as set of microchips installed on plastic card (memory module) Central Processing Unit (CPU) uses RAM like people g ( ) p p use notepad Stores binary value so can use it later Can read data from RAM to recall value stored earlier CPU sends electrical signal over bus (electrical pathway) to communicate with RAM 4 Random Access Memory (RAM) (cont.) RAM uses address for each unique memory location where byte can be stored To write to RAM: CPU sends signal to RAM over the bus g to write (store) value into byte of RAM Address in RAM Value to be written To read from RAM: CPU uses similar process (see example in Figure 1-3 on next slide) 5 CPU Reads Byte 4 from RAM The CPU uses the same bus to read the current value of a byte in RAM as it does to send a message to RAM. The read request lists the address of the particular byte, asking for its value. RAM returns the binary value stored at that address. CPU Reads Byte 4 from RAM 6 Figure 1-3 Writing Individual Bits in Byte 4 of RAM RAM circuitry sends a slightly different electrical input to the bits that need to store a 1 versus a 0 to control the capacitors . Essentially, RAM chooses one of two inputs to each bit, which results in...

Words: 11596 - Pages: 47

Premium Essay

Website Migration Project

...available as a failover in case the main site goes down. There is also a need for the site to be redesigned to allow customers to order products online. The system development life cycle (SDLS) is involves seven phases or steps that are followed in developing an information system from conception up to disposition. The following is the seven-step phase of developing an information system by a software engineer: 1. Conceptual Planning 2. Planning and Requirements Definition 3. System design 4. Development and Testing 5. Implementation phase 6. Operations and Maintenance phase 7. Operations and Maintenance phase Conceptual Planning This is the first phase in the system development life cycle. In this phase the information system conceptual framework is constructed. This will include the evaluation and assessment of the system to be developed to determine the cost and risks associated with the system. The managers will also assess the benefits and the opportunities that will be associated with the system. In this first stage of the system development cycle, there will be also the division and designation of roles to be carried out by various agents in the development of an information system. Planning and Requirements Definition T his is the second phase in the system development...

Words: 3420 - Pages: 14

Premium Essay

Pmdp Rep Guidelines

...Project | for Middle Managers Class (MMC) Batch 3 Guidelines | The | CONTENTS | I. The Re-entry Project (ReP) | | A. The Nature of the Re-entry Project (ReP) | 3 | B. The Rationale behind the ReP Requirement | 3 | C. Characteristics of the ReP | 4 | II. Phases of Re-entry Project Execution | | Phase 1: Formulating the Proposal | 6 | Proposal Abstract | 6 | Chapter I: The Performance Gap | 7 | Chapter II: The Intervention | 8 | Endorsement of ReP Proposal by Institutional Partner | 9 | Phase 2: Designing the Plan | 10 | Chapter III: The Plan | 11 | Endorsement of ReP Plan by the Faculty Adviser | 11 | Powerpoint Presentation Version of Chapter III | 12 | Phase 3: Implementing the Plan | 12 | Progress Reports | 12 | Phase 4: Reporting the Results | 13 | Chapter IV: The Final Report | 14 | Endorsement of Report by the Faculty Adviser | 14 | Powerpoint Presentation Version of Chapter IV | 14 | Final ReP Document | 15 | III. Approval Procedure | | A. The ReP Proposal | 16 | B. The ReP Plan | 17 | C. The ReP Progress Reports | 19 | D. The ReP Final Report | 21 | IV. Terms of Reference for Panel Members | | A. Institutional Partner (IP) | 25 | B. Faculty Adviser (FA) | 26 | ...

Words: 6772 - Pages: 28