Networking

Submit these answers as a single Word document. APA style with references. 100% original work. no plagiarism.

Answer the following questions:

1. Map the layers of the TCP/IP model to the OSI model

2. Each layer of OSI has a body/group that is responsible for the standards, please name them

3. Describe the progression through the OSI model of the following:

  – A web browser request and connection to www.cnn.com

  – An email being sent from Outlook on a Windows machine from your APUS email account to [email protected]

Discussions

 Attached is a copy of  the week’s research terms.  Topics will be selected on a first come first serve basis.  To claim a topic, go to this week’s discussion forum (below) and check what topics remain available.  Select an available topic and start a new discussion thread by placing ONLY the topic in the Subject Line (do not put your name or anything else here).  Leave the body of the thread blank and save the post. In weeks where there are insufficient topics for everyone; once all topics have been selected you may then start selecting from the entire list again.  But there should never be three posts on the same topic – if so the last one posted will receive no credit.         After your topic selection, research your selected topic in the university’s electronic library from only academic (refereed) journals.  You will need at least three journal references and the textbook.  Start your research with the textbook so it always grounds your topic. When your research is complete post it in the discussion forum below.  

  1. Structure your paper as follows:
    1. Cover page
    2. Overview describing the importance of the research topic to current business and professional practice in your own words.
    3. Purpose of Research should reflect  the potential benefit of the topic to the current business and professional practice and the larger body of research.
    4. Review of the Literature summarized in your own words. Note that this should not be a “copy and paste” of literature content, nor should this section be substantially filled with direct quotes from the article. A literature review is a summary of the major points and findings of each of the selected articles (with appropriate citations). Direct quotations should be used sparingly. Normally, this will be the largest section of your paper (this is not a requirement; just a general observation).
    5. Practical Application of the literature. Describe how your findings from the relevant research literature can shape, inform, and improve current business and professional practice related to your chosen topic.
    6. Conclusion in your own words
    7. References formatted according to APA style requirements

response

 

businesses seem to move more towards e-commerce and utilization of technology. As the use of the web increases, consumers are turning to shopping online. This may be for many reasons including, time-saving, brand visibility, offers, messaging, personal recommendations and many more (Singhal, & Tanwar, 2021). Shopping online allows consumers many more options than shopping in person would. Businesses also have many options when it comes to B2B commerce. In the planning process they analyze many options to decide what manufacture to go with and what price will be agreed upon. B2C has a more simple process that often does take as long between business and consumer. Nice job and good luck in your future endeavors. 

Singhal, S., & Tanwar, P. (2021). A prediction model for benefitting e-commerce through usage of regional data: A new framework. IAES International Journal of Artificial Intelligence, 10(4), 1009-1018. doi:https://doi.org/10.11591/ijai.v10.i4.pp1009-1018

Eskills

Does someone want to make my assignment about content management systems. Assigment is in the file.

Discussion(Bus Cont Plan&Disas Recov Plan)

Question: Each student will locate and review an article that discusses how a company went through the recovery process after a disaster.  The article should not be older than 5 years old. The review of the article should be between 400-to-550 words and should summarize the article content along with your review of how the recovery process went. Please include how it applies to topics for the week, and why you found it interesting.

***Standard for all discussion posts: Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic

***No Plagiarism 

*** References

computer security foundamental

 

Organizations often do not have the security built into their infrastructure that is required as the organization grows. When the need for security increases, someone is often assigned the responsibility of determining what security measures need to be improved.

Consider the following scenario:

You currently work for a large global organization as a security analyst. The network administrator recently came to you with a new task. The organization has a LAN using TCP/IP. They want the network to be secure but also to gain the most return for the smallest investment. You have been asked to advise the Global Communications team on LAN security.