Describe the seven layers of the osi model

Assignment Help Computer Network Security
Reference no: EM132177730

Question: One of the contractual requirements for the ERP upgrade was to provide a training for new employees and interns explaining the system architecture and networking design.

Write a PowerPoint presentation that you will use during the training. You will start this PowerPoint in Unit 4 then complete and submit it in Unit 5.

The requirements for your presentation are:

Describe the seven layers of the OSI model and how they interact with the connected layers.

Discuss seven hardware or software components (one for each of the seven layers) of the customer's network.

Describe the significance of each component in the overall information system.

Describe the DHCP protocol and the importance it plays in the enterprise network design.

Using the "ipconfig /all" command, include a screenshot of the IP configuration information for your PC (or similar Linux/Mac commands).

Explain the primary IP address and MAC address and the difference between the two.

Explain the DHCP lease information shown in the screenshot.

Each slide should focus on one topic of the training (you can have multiple slides per topic).

Include speaking notes in the Notes section of each slide that describe what you are going to say during the training.

Each slide should contain no more than 5 bullets and should include an image that represents the topic.

You should have a minimum of 9 slides including a title slide as the first slide and a reference slide as the last slide.

All references should be in APA format.

Reference no: EM132177730

Questions Cloud

Describe an instance of which you are aware of which an act : Please describe an instance of which you are aware of which an act of internet crime took place.
Write essay which compares conventional validation methods : COS6020 - Software Verification - what is model checking and how it works - Using the CTL model checking algorithm prove that the CTL formula in b) is verified
Determine the minimum number of agents : Develop an ExtendSim model to determine the minimum number of agents that will result in an average waiting time of 5 min or less.
Calculate the total cost on june : On June 15, the firm purchased 50 units with a unit price of $1.20. If the firm uses the LIFO method of inventory pricing, Calculate the total cost on June
Describe the seven layers of the osi model : Describe the seven layers of the OSI model and how they interact with the connected layers. Discuss seven hardware or software components.
What is the monthly rent or mortgage payment : What is the monthly rent or mortgage payment and how easily will that be earned each month. Include all other costs also (payroll, supplies, advertising, etc).
Compute the total equivalent units of production for labor : During the month, 2,700 units of a product were completed and 800 units, Compute the total equivalent units of production for labor for the month
Discuss the objectives of corporate governance : Discuss the objectives of corporate governance and why this has led to increased costs for publicly traded companies?
Register complaints about the product shortage : Why is it important to know which media customers were using to register complaints about the product shortage?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Defines five it security positions

Create a 1-page outline to be included with your audit that defines five IT security positions that will add significant expertise and experience to your security audit.

  Analyse how trust is used in controlling access

Analyse how trust is used in controlling access to resources. Evaluate the proposed solution used in emergent environments such as BYOD, cloud and pervasive environments.

  Compile a list of methods to stop different cyber crimes

write a 1 to 1 ½ page paper (using APA style formatting) on methods to either catch or stop cyber criminals. Explain the different methods in detail.

  Explain aes algorithms that implement symmetric cryptography

Decription of AES algorithms that implement symmetric cryptography and strenghts and weekness of algorithm.

  Create a simple example of a substitution-based cipher

A major university in Illinois used to place the computer output from student jobs on a table in the computer room. This room is the same computer room.

  Describe the integrative functions

Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design.

  What is the main host firewall program used on linux systems

What is main host firewall program used on Linux systems? What commands are used to manipulate extended file attributes access lists in Unix and Linux systems?

  What is the difference between inference and aggregation

What is the difference between inference and aggregation? Give an example of each, and describe at least one way to mitigate each type of vulnerability.

  Explore traffic behavior when designing a network

Why is it important to explore traffic behavior when designing a network? What problems could arise if you do not understand traffic behavior when you build a new network or upgrade a network?

  What is the technology behind oauth

Use the Internet to research OAuth. What is the technology behind it? What are its strength? What are its weaknesses? Will it replace OpenID?

  Why is an e-mail and internet use policy needed

Why is an e-mail and Internet use policy needed? What are the benefits of developing an incident response capability?

  Explain the implementation process and timeline

Explain the implementation process and timeline. Explain the learning team's recommendations to design the network. Calculate the cost of the network design.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd