CS200 Fundamentals of Information Technology
Module 3 Data Communications and Networks
Assignment 5
Network Layers & Protocols
1. (20 pts) Why are networks based on a layered model? How does this work? What impact does this have on compatibility? What impact does this have on maintenance?
Networks are based on the layered model to deal with the complexity of communicating messages from one source to another source. Breaking down the message sending process allows for a devices’ hardware and software to focus on a single function and passing off between the neighboring layers. This makes the network communication easier to understand and allows engineers to develop, implement, and troubleshoot within each layer without worrying about having
…show more content…
HTTP is a fundamental tool for communicating between two sources on the web. It contains the rules that guide how messages are formatted and transmitted between two sources. Its main purpose is digesting the actions/commands that a user makes while using a web browser. When a user types something like “www.yahoo.com” into the browser, this creates and sends an HTTP request to the web server to retrieve the files that contain the web page. Another type of application protocol is File Transfer Protocol or FTP. This protocol is designed for transmitting files between a client computer and server computer. It accomplishes this through the Client-Server Architecture in which a client can request a file from a server computer which stores the needed data and hosts the data access logic in which to retrieve the …show more content…
Each layer includes protocol that adds a header with control information relevant to that layers function of the messaging process. This allows the PDU to be passed along and properly communicated. It is very important for interactions, successful trade-offs and repackaging between adjacent layers because without this the data would lack the crucial information to complete its journey. An example of this would be an HTTP message being sent to the transport process where the TCP Segment would be added as a header to the HTTP Message. Next, it will be passed to the Internet layer where the IP Packet would be added as a header of the data field containing the TCP segment and HTTP message and so
On this internet, the website said that there are two Calories per one mini marshmallow. The website also said that in one cup of marshmallows there is 159 Calories. This is the same as the back of the marshmallow label we had in class. On the label it said there were 83.2 Calories per gram.
-A monthly claim report lists all claims the insurance carrier has denied or not paid by the required time limits set by the state. It also has a listing of detailed information about the claim itself to better identify the exact claim listed. The monthly claim report is necessary for reimbursement because they must be sent to an auditing team to make sure the correct attention to the overdue claims so that they are paid and if not paid the provider should be send a notice on why the claim is not being paid or why the provider is going to be receiving a partial payment. This is called a remittance advice sent to the providers office so that they claim may be edited and resubmitted.
Ensure that all necessary earth connectors are then attached to the isolation points and any overhead wires
When using routers, you need many routers in order to route the information to the correct location, as one router will not be able to manage this task. Explain how the routing schemes handle this problem.
In this section we investigate attacks and threats to our primary devices. These attacks and threats are built off of the vulnerabilities the previous section and help to determine which security controls would be most valuable against future attacks.
Japan is an island nation off the coast of East Asia. It is made up of four large islands and about 3,900 smaller ones. On a map, they form a thin crescent moon. All together, they form an area about the size of Montana. To the west, the sea of Japan separates it from its nearest neighbors, Korea and China. To the east lies the Pacific ocean. Japan has a moderate climate. Summers are nice. Winters are mild, with heavy snowfall limited to the north. Japan makes crops due to rain in the summer.
I am a plate that is made of clay that was taken from the Earth of Japan. But before I was made into a plate I was up to the mountains near a big forest that had a Jinja on top a beautiful waterfall where water fell from the top to the bottom and sometimes flowing to rivers. But when winter comes the waterfall would freeze into shards and when the winter goes the shards and snow turn into water filling up the waterfall making a waterfall from the top to the bottom flowing with an immense amount of water to rivers and ponds that would sometimes connect with the waterfall. My maker crafted me to be used as art depicting many natural objects or buildings even sometimes people in the drawing. I am also used to hold a meal for a person who would eat the nourishment from top to bottom. Most of the time I would have fish from the ocean or rice that was farmed in flatlands on top of me.
Upon graduating from Midshipman’s School for Women, Hopper immediately received a task to the Bureau of Ordnance Computation in Harvard University. At that time, when she was around 37-38 years old, Hopper had visited Cruft Laboratory, and she was introduced to a machine that had computing capability called the Mark I. Hopper’s task was to program the Mark I, so it could produce "the coefficients for the interpolation of the arc tangents by next Thursday." Due to this short deadline, Hopper was quite horrified, so she asked some of her colleagues for assistance. Soon enough, she was able to complete this difficult task, and she was the third person to program a large-scale digital computer. In 1945, Hopper had discovered that a real moth
An example of a highly important protocol which will be utilized at application level, is HTTP or hypertext transfer protocol. HTTP is the protocol used within web browsers and the entire internet to send and receive specific web page data. HTTP is a controlling protocol, as it determines how documents should be sent, and what the browser should do in response to commands. When accessing a web page, a HTTP command is sent to the pages web server, so that the server may send that specific page’s data to the user. PCO’s Learning Centre will be using the hypertext transfer protocol on a regular basis. In order for students to access web pages, the HTTP must exist to ensure speedy and accurate navigation, especially in a learning
I thought this video was going to be very difficult, though we have been practicing it all semester. Once my partner and I got together to do this project I became more comfortable. I went over my weaknesses and my strengths on the previous group sessions and figured out what I need to work on and what I do well at.
The Physical Layer is the lowest layer of the Open Source Interconnect Model (OSI). It is the layer that deals with all the measurable, physical entities associated with the network. At this layer it is specified how much bandwidth (Baseband or Broadband) will be used in the transmission of data on the network. This layer also includes the physical topology (physical lay out) of the network such as: Bus, Star, Ring or Mesh. The Physical Layer includes these devices: Network Interface Cards (NICs), Transceivers, Hubs, Multistation Access Units (MAUs), Repeaters and Cables. It is at this layer that frames received from the Data Link layer are converted to bits for transmission over the network media to the receiving machines Physical Layer.
The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in people's homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie in a collection of computers that were linked together in the 1970s to form the US Department of Defense's communications systems. Fearing the consequences of nuclear attack, there was no central computer holding vast amounts of data, rather the information was dispersed across thousands of machines. A set of rules, of protocols, known as TCP/IP was developed to allow disparate devices to work together. The original network has long since been upgraded and expanded and TCP/IP is now a "de facto" standard.
The architecture of a neural network is the specific arrangement and connections of the neurons that make up the network. One of the most common neural network architectures has three layers. The first layer is called the input layer and is the only layer exposed to external signals. The input layer transmits signals to the neurons in the next layer, which is called a hidden layer. The hidden layer extracts relevant features or patterns from the received signals. Those features or patterns that are considered important are then directed to the output layer, the final layer of the network. Sophisticated neural networks may have several hidden layers, feedback loops, and time-delay elements, which are designed to make the network as efficient as possible in discriminating relevant features or patterns from the input layer.
TCP/IP is a network model which enables the communication across the Internet. The most fundamental protocol on which the Internet is built. This is made up of the 2 common networking protocols, TCP, for Transmission Control Protocol, and IP, for Internet Protocol. TCP maintains and handles packet flow linking the systems and IP protocol has the ability to handle the routing of packets. However The TCP/IP stack consists of 5 layers first being application layer, the transport layer, then the network layer, the link layer and finally the physical layer. The assignment focuses on the three middle layers and is divided into five parts. Firstly explaining how the TCP and UDP the most vital protocols needed to deliver and communicate.
There are several advantages to the layered approach provided by the OSI model. With the design separated into smaller logical pieces, network design problems can be easier to solve through divide and conquer techniques. Vendors who follow the model will produce equipment that is much more likely to be compatible with equipment from other vendors. The OSI model also provides for more extensible network designs. New protocols and other network services are more easier added to a layered architect.