Premium Essay

Team a Protocol Paper

In:

Submitted By CBGiles
Words 2378
Pages 10
Protocol Paper
Team A: Amy Dippolino, Christine Giles, Bill Groom, and Scott Schultz
NTC/362: Fundamentals of Networking
November 2, 2015
Stanley Kuchel

Protocol Paper
Network communication is vital to any organization that is trying to conduct any type of business, but a lot of people fail to realize all the vital components that must work together in order to make this work. This is why it is important to know the OSI model is constructed and how data moves up and down this stack. However, there are other components that are just as important such as, TCP/IP, circuit and packet switching, and the major protocols that circuit and packet switching use. These processes are truly important because without them the way we communicate today would not exist.
Open Systems Interconnection Protocol
The Open Systems Interconnection (OSI) is a framework for how applications will communicate and work over a network. There are seven layers of related functions that a computer can provide for a user, which define the how two endpoints communicate in a telecommunication network. “The seven layers of function are provided by a combination of applications, operating systems, network card device drivers and networking hardware that enable a system to put a signal on a network cable or out over Wi-Fi or other wireless protocol” (WhatIs.com, 2015). Below is a description of these seven layers. Layer | Name | Description | 7 | Application Layer | This role identifies how the user will access the data and what services will be in play. Examples of this are directory services and remote file access (Microsoft, 2015). | 6 | Presentation Layer | At the operating system, this role carries the original message, encrypts the message, and presents it as intended (WhatIs.com, 2015). | 5 | Session Layer | TCP/UDP handles this layer over the Internet, which establishes,

Similar Documents

Free Essay

Ntc360 Summary

...Syllabus College of Information Systems & Technology NTC/362 Version 1 Fundamentals of Networking Copyright © 2013 by University of Phoenix. All rights reserved. Course Description This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: · University policies: You must be logged into the student website to view this document. · Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Goleniewski, L. (2007). Telecommunications essentials. (2nd ed.) Boston, MA: Pearson. Panko, R. R., & Panko, J. L. (2011). Business data networks and telecommunication (8th ed.) Upper Saddle River, NJ: Prentice Hall All electronic materials...

Words: 2225 - Pages: 9

Premium Essay

Syllabus

...Information Systems & Technology | | |NTC/362 Version 1 | | |Fundamentals of Networking | Copyright © 2013 by University of Phoenix. All rights reserved. Course Description This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials ...

Words: 2455 - Pages: 10

Premium Essay

Ntc 360 Complete Class

...here: http://www.activitymode.com/product/ntc-360-complete-class/ Contact us at: SUPPORT@ACTIVITYMODE.COM NTC 360 COMPETE CLASS 1. NTC-360 ADVANTAGE OF DIFFERENT SECURITY APPROACHES 2. NTC-360 ASSIGNMENT NETWORK ARCHITECTURE 3. NTC-360 ASSIGNMENT NETWORK PROTOCOLS 4. NTC-360 CURRENT TELEPHONE SYSTEMS OF HUFFMAN TRUCKING 5. NTC-360 HUFFMAN TRUCKING COMPANY SECURITY RECOMMENDATIONS 6. NTC-360 NETWORK OUTLINE 7. NTC-360 NETWORKING CHANGES 8. NTC-360 RIORDAN MANUFACTURING 9. NTC-360 SECURITY DISADVANTAGES 10. NTC-360 Team Assignment Riordan Manufacturing - Rough Draft 11. NTC-360 Team B Service Request SR-rm-017 paper 12. NTC-360 WEEK 1 DQ 1 13. NTC-360 WEEK 1 DQ 2 14. NTC-360 Week 2 Assignment Telecommunications 15. NTC-360 WEEK 2 DQ 1 16. NTC-360 WEEK 2 DQ 2 17. NTC-360 Week 2 Learning Team Assignment Network Topologies 18. NTC-360 Week 2 Team Paper - Network Protocols The Case of Huffman Trucking 19. NTC-360 WEEK 3 DQ 1 20. NTC-360 WEEK 3 DQ 2 21. NTC-360 week 3 individual part 1 22. NTC-360 week 3 individual part 2 23. NTC-360 Week 3 Team Assignment - Network Topologies 24. NTC-360 WEEK 4 DQ 1 25. NTC-360 WEEK 4 DQ 2 26. NTC-360 WEEK 5 DQ 1 27. NTC-360 WEEK 5 DQ 2 28. NTC-360 Week 5 Team Assignment Network Infrastructure Upgrading and the Case of Huffman Trucking 29. Activity Mode aims to provide quality study notes and tutorials to the students of NTC 360 COMPLETE CLASS in order to ace their studies. NTC 360 COMPLETE CLASS To purchase this visit...

Words: 817 - Pages: 4

Free Essay

Ntc 406 Uop Course Tutorial/Tutorialrank

...Requirements Analysis Paper NTC 406 Week 1 Learning Team Assignment Broadband Over High-Powered Electrical Cables Paper NTC 406 Week 1 Supporting Activity 1 The Layers of the TCP/IP Model NTC 406 Week 1 Supporting Activity Remote File Operations NTC 406 Week 1 DQ 1 NTC 406 Week 1 DQ 2 NTC 406 Week 1 DQ 3 NTC 406 Week 2 Individual Assignment Slow Network Analy ------------------------------------------------------ NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper (UOP) For more course tutorials visit www.tutorialrank.com Tutorial Purchased: 4 Times, Rating: A+ NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper Prepare a 1- to 2-page paper in which you describe the process of analyzing business requirements to determine network technical requirements. • Provide an example from your personal experience, or with the Virtual Organizations, in translating business requirements into technical requirements. • Explain the challenges of integrating application program interfaces within your network. • Cite at least three different references. Format your paper consistent with APA guidelines. ------------------------------------------------------ NTC 406 Week 1 Learning Team Assignment Broadband Over High-Powered Electrical Cables Paper (UOP) For more course tutorials visit www.tutorialrank.com Tutorial Purchased: 4 Times, Rating: A+ NTC 406 Week 1 Learning Team Assignment Broadband...

Words: 671 - Pages: 3

Premium Essay

Ntc 360 Compete Class

...ASSIGNMENT NETWORK PROTOCOLS 4. NTC-360 CURRENT TELEPHONE SYSTEMS OF HUFFMAN TRUCKING 5. NTC-360 HUFFMAN TRUCKING COMPANY SECURITY RECOMMENDATIONS 6. NTC-360 NETWORK OUTLINE 7. NTC-360 NETWORKING CHANGES 8. NTC-360 RIORDAN MANUFACTURING 9. NTC-360 SECURITY DISADVANTAGES 10. NTC-360 Team Assignment Riordan Manufacturing – Rough Draft 11. NTC-360 Team B Service Request SR-rm-017 paper 12. NTC-360 WEEK 1 DQ 1 13. NTC-360 WEEK 1 DQ 2 14. NTC-360 Week 2 Assignment Telecommunications 15. NTC-360 WEEK 2 DQ 1 16. NTC-360 WEEK 2 DQ 2 17. NTC-360 Week 2 Learning Team Assignment Network Topologies 18. NTC-360 Week 2 Team Paper – Network Protocols The Case of Huffman Trucking 19. NTC-360 WEEK 3 DQ 1 20. NTC-360 WEEK 3 DQ 2 21. NTC-360 week 3 individual part 1 22. NTC-360 week 3 individual part 2 23. NTC-360 Week 3 Team Assignment – Network Topologies 24. NTC-360 WEEK 4 DQ 1 25. NTC-360 WEEK 4 DQ 2 26. NTC-360 WEEK 5 DQ 1 27. NTC-360 WEEK 5 DQ 2 28. NTC-360 Week 5 Team Assignment Network Infrastructure Upgrading and the Case of Huffman Trucking NTC 360 COMPETE CLASS 1. NTC-360 ADVANTAGE OF DIFFERENT SECURITY APPROACHES 2. NTC-360 ASSIGNMENT NETWORK ARCHITECTURE 3. NTC-360 ASSIGNMENT NETWORK PROTOCOLS 4. NTC-360 CURRENT TELEPHONE SYSTEMS OF HUFFMAN TRUCKING 5. NTC-360 HUFFMAN TRUCKING COMPANY SECURITY RECOMMENDATIONS 6. NTC-360 NETWORK OUTLINE 7. NTC-360 NETWORKING CHANGES 8. NTC-360 RIORDAN MANUFACTURING 9. NTC-360 SECURITY DISADVANTAGES 10. NTC-360 Team Assignment...

Words: 471 - Pages: 2

Free Essay

Dr. Cert

...Case Study Final Dr. Vint Cerf: Father of the Internet Rebekah N. Diaz ISSC363 Dr. Tannoury December 28th, 2013 Diaz 2 Technology refers to, the making, usage, modification, and size of machines, tools, methods applied by an order when dealing with problems. It also applies to methods applied when improving an already existing solution and when performing a duty or achieving a goal. The superficial IT evolution can be said to be preceded by hand and print revolutions. All the things that one can now handle within a short spun of time just by the click of a button is quite different from the past. Systems like phones, computers and other electronic devices can carry out a bunch of work just by the click of the correct button within a minimum duration unlike in the past. They have made the lives of young people comfortable and swifter, as explained by Keith (100). Modern technology has led to globalization. This has made the world smaller. It has allowed the world’s economy to be a separate business unit. This business unit is interdependent. The Internet, televisions, and cell phones are enlightening socialization by making both positive and negative impacts on the lives of children. Internet is the first group having enormous influence in technology. It has changed how people communicate, when they talk, where they relate from and the frequency at which they do so. The Internet allows for globalization, interconnection and sharing of information. It has made the...

Words: 2715 - Pages: 11

Premium Essay

Applications Project

...Junior High Grades 6-8 Protocol for Natural Disaster: Tornado Tyson Lee March 3, 2013 Information about the Protocol Living in Mississippi, there are many tornadoes that hit this area. Mississippi has on average, 29 tornadoes per year. One of nature’s most violent acts is a tornado. Tornadoes can cause enough devastation to tear through a neighborhood and demolish it and they can cause fatalities. At times, a tornado can develop so quickly that advance warning can be too little too late. When preparing for a tornado, schools need to be aware of tornado watches and warnings. The National Weather Service issues a warning when conditions are favorable for the development of a tornado and a warning is issued when a tornado has been detected. In the school, there should be someone that will be monitoring the weather radio for potential bad weather. There should also be a plan and provisions set in the school for during school hours, after school hours, and any school related activities. During school hours, there need to be a procedure for relaying this information to all faculty, staff, and students. In order to make sure that all faculty, staff, and students are prepared, in the event of a real tornado, is to have a severe weather safety plan in effect where everyone can take cover within a minute. It is important to do this with regular tornado drills. This allows for all persons to be prepared in the event of a real tornado. The evacuation...

Words: 2313 - Pages: 10

Premium Essay

Accreditation Audit Task 1

...Running Header: Task I 1 Task I Abigail M. Garcia Western Governor’s University: Accreditation Audit Running Header: Task I 2 Executive Summary Nightingale Community Hospital is committed to providing quality care and aims to be the first choice hospital for patients in the community. Four core values represent the passion Nightingale has for excellence: Safety, Community, Teamwork and Accountability. The goals of the hospital are to uphold an atmosphere of healing, promote the benefits of health, and to provide a compassionate experience for all. Overview In order to reach the aforementioned goals, values and commitments, Nightingale Community Hospital must be in compliance of regulatory agencies which outline specific, goaloriented sets of standards. The Joint Commission is one such agency that provides assistance and support to health care facilities to ensure that certain standards are met, education for implementing new standards and feedback of current healthcare practices as part of the accreditation process. According to Facts about Hospital Accreditation (2014), the “Joint Commission standards address the hospital’s performance in specific areas, and specify requirements to ensure that patient care is provided in a safe manner and in a secure environment (p. 1).” This agency uses a Priority Focus Process methodology to identify areas within healthcare organizations which have a significant impact on patient safety and quality of care. One of these...

Words: 2426 - Pages: 10

Premium Essay

Openradio and Software Defined Cellular Wireless Networking

...OpenRadio and Software Defined Cellular Wireless Networking As with most aspects of computer science, wireless network technology has evolved over the years by way of competing proposals and protocols, developed within academia, industry, or often through collaboration of the public and private sectors. As public adoption of computer networks increased, the demand for methods of connecting these networks and allowing users to access their resources led engineers and theoreticians to adapt existing electromagnetic radiation to transmit computer data over the same media which had previously been used to broadcast audio and video signals. For as widespread as the use of these technologies has become, most of the advancement and innovation still comes from within a relatively small community of experts in and around Silicon Valley. The subject of this report is one such collaboration known as the Open Networking Research Center, or ORNC, a joint task force between Stanford University and University of California at Berkeley, sponsored by prominent technology companies such as HP, Intel, Google, Cisco and VMWare. One of the projects that ONRC is working on is to develop a software defined networking solution for cellular wireless data networks, which they refer to as OpenRadio. This report will focus on what ONRC perceives as the problem or shortcoming with the current TCP/IP infrastructure which supports cellular wireless, what they propose as their solution, and how close they are...

Words: 1628 - Pages: 7

Premium Essay

Brief History of Internet

...DARPA he convinced his successors at DARPA, Ivan Sutherland, Bob Taylor, and MIT researcher Lawrence G. Roberts, of the importance of this networking concept. Leonard Kleinrock at MIT published the first paper on packet switching theory in July 1961 and the first book on the subject in 1964. Kleinrock convinced Roberts of the theoretical feasibility of communications using packets rather than circuits, which was a major step along the path towards computer networking. The other key step was to make the computers talk together. To explore this, in 1965 working with Thomas Merrill, Roberts connected the TX-2 computer in Mass. to the Q-32 in California with a low speed dial-up telephone line creating the first (however small) wide-area computer network ever built. The result of this experiment was the realization that the time-shared computers could work well together, running programs and retrieving data as necessary on the remote machine, but that the circuit switched telephone system was totally inadequate for the job. Kleinrock's conviction of the need for packet switching was confirmed. In late 1966 Roberts went to DARPA to develop the computer network concept and quickly put together his plan for the "ARPANET", publishing it in 1967. At the conference where he presented the paper,...

Words: 1995 - Pages: 8

Free Essay

Negligence Paper

...Negligence Paper Jennifer Zuber HCS/478 April 11, 2016 Susan Lawson Negligence Paper In 1711, Alexander Pope wrote in a poem, "To err is human." Errors happen in every walk of life and every career path, but there are some areas where and error could be the difference between life and death or profound injury. The healthcare field is one of those areas. Over time, health care has evolved. There are now so many practices and protocols in place so that errors may be avoided. It is understood that there are some errors that may occur due to being human, and then there are other mistakes that should never happen, such as surgically amputating the wrong limb. There are so many safeguards in place to prevent such errors from happening. Negligence is a general term that denotes conduct lacking in due care (Guido, 2014). Malpractice sometimes referred to as professional negligence, is a more specific term that addresses a professional standard of care as well as the professional status of the caregiver. To be liable for malpractice, the person committing the civil wrong must be a professional, such as a physician, nurse, accountant, or lawyer (Guido, 2014). Gross negligence is an act or omission “which when viewed objectively from the standpoint of the actor at the time of its occurrence involves an extreme degree of risk, considering the probability and magnitude of the potential harm to others; and of which the actor has actual, subjective awareness of the risk...

Words: 1256 - Pages: 6

Premium Essay

Capstone Project

...Requirements and specifications o The resources, such as human, time, funds, space, and tools, required to deliver the product o Tasks o Deliverables o Milestones• Identify major milestones and individual tasks.| • Explain how to launch and configure Microsoft Office Project 2003.|Explore Microsoft Office Project 2003.| • Discuss project planning and management using Microsoft Office Project 2003 and relate the software to the capstone project. o Define the basic terminology of project management. o Explain the project management life cycle. o Explain project management knowledge areas.|Define project management terminology and apply the terminology to the capstone project.| • Organize project teams. o Define team member roles and responsibilities.|Select teams.• Define team member roles and responsibilities.• Elect peers to fill appropriate roles.| Network Development Capstone Project Unit 1 Instructor Functions|Student Tasks| • Identify the key components of the capstone project. o Discuss the key requirements for the successful completion of the project. See Appendix B for a complete list of the technical requirements of the project. o Identify the final product deliverables: ƒ Project Charter/Request for Proposal to include a Statement of Work ƒ Work Breakdown Structure (WBS) ƒ Microsoft Project 2003 documentation ƒ Logical network diagram (MS Visio) ƒ Router diagram with IP subnets illustrated (MS Visio)...

Words: 2321 - Pages: 10

Premium Essay

Mechanical Ventilator

...(Haas & Loik, 2012). The objective of this specific guideline that this paper will review is providing evidence for weaning or discontinuing the mechanical ventilator. The purpose of implementing a guideline...

Words: 1921 - Pages: 8

Premium Essay

Securitymeasurespaperweek05

... Security Measures Introduction System administrators channel most of their time to network environments, and are extremely knowledgeable in the area of network management. They also need to develop background outlines of the environment, so that they can devise effective and efficient backup systems. For these reasons, it is important to undertake an auditing process, which helps monitor the utilization and the performance of the security plan and the standard operating procedure. Further, there should be a high level of awareness already in place, before the implementation and deployment of an incident response squad (Ellis & Speed, 2001). This paper will discuss recommendations on the ways of minimizing or averting security incidences, the assembly of a CSIRT. Further, the paper will define the threat response plan. Minimizing the Severity and the Number of Security Breaches Indeed, the prevention of security incidents is a major milestone for the organization. However, it is not possible to eliminate all the security threats facing the organization. Further, after the incidence of a risk event, minimizing its impact should be a major priority. The process entails the following processes: establishing and enforcing all procedures and policies; upholding the support of incident mitigation and security policies from the management; assessing for organizational vulnerabilities continually and checking all computer networks and systems, to ensure...

Words: 994 - Pages: 4

Premium Essay

Research

...ISS334: Information Systems Security (Project Description) * Each student work alone in this project (individual project). * Each student is required to complete a mid-size project, which includes proposal, implementation, and final demo or paper. * Students will be grouped into teams for the sake of presentations at the end of the semester. Marks allocated for each individual piece of the project are as follows: a) Proposal – 10% b) Project write-up – 22% c) Presentation – 8% Projects include but are not limited to: * Research Paper * You can work on original research problems. The outcome should be a paper with original technical contribution. Your grade on this will be judged on originality, soundness of the approach, and quality of presentation.  * Example Topics: * Vulnerability Analysis * Wireless Security * Intrusion Detection  * Authentication * Access Control * Authorization * DNS Security * Digital Watermarking * New Attacks * Survey Paper * You can write a paper that surveys a particular field on information security. The outcome should be a paper that summarizes the trend in the field you have chosen. Your grade will be judged on the completeness of the survey, the quality of the trend analysis, and the quality of presentation. * Example topics: * Vulnerability Analysis * Wireless...

Words: 1209 - Pages: 5