See attached two attached filesUU-MBA-741-ZM Business Data Communication and Security UU-MBA-741-ZM Business Data Communication and

See attached two attached files

UU-MBA-741-ZM Business Data Communication and Security

UU-MBA-741-ZM Business Data
Communication and Security

Assignment 1

Dear students,

This is your first assignment for this course that accounts for 50% of your total marks

for the course.

Please answer and elaborate on the following questions:

1. What is an application-layer message? A transport-layer segment? A network

layer datagram? A link-layer frame? Elaborate on your answers.

2. Name the advantages of optical fiber over twisted-pair and coaxial cable. Please

elaborate on your answer.

3. What are the four generic architectural components of a public communications

network? Define and elaborate on each of term.

4. Alice wants to send a message to Bob using SHA-1 hashes. She consults with

you regarding the appropriate signature algorithm to be used. What would you

suggest? Please elaborate to explain your suggestion.

5. Explain and elaborate on the impact that communication network applications

have had on business and everyday life.

6. Why are standards important for protocols? Please elaborate.

7. What is a message called that is delivered by TCP? What is a message called

that is delivered by UDP? At which layer do the two protocols work

8. Compare the network topologies (Star, Bus and Ring). What capabilities and

what limitations do they have? Please elaborate on your answer.

Word Count: 3000 words (maximum)

Submit to VLE the following:

Your answers in a pdf document.

Your work needs to be well written and have quality information. Your work must be

clear and must be able to educate someone with no prior knowledge in the field of Data

Communication.

Notes:

• Please read and apply the rules for referencing.

• The assignment is your own individual work. I expect all sent assignments to

be very different from one another even if they are based on the same topic.

• The deadline is the end of week 3.

• This is worth 50% of your mark

UU-MBA-741-ZM Business Data Communication and Security

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

100 word response 1 reference due 6/22/2024Emmons Discussion 3-3:

100 word response 1 reference due 6/22/2024 Emmons Discussion 3-3: Compliance within the Remote Access Domain What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy?  What risks, threats, and vulnerabilities are introduced by implementing a remote

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 a

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 and was enacted to assist reform the financial industry and address consumer financial privacy concerns (Federal Trade Commission, 2023). GLBA possesses requirements for the Federal Trade Commission and

200 word response 1 reference Due 6/8/2024JacksonDiscussion 2-2: Conducting an IT

200 word response 1 reference Due 6/8/2024 Jackson Discussion 2-2: Conducting an IT Infrastructure Audit for Compliance IT security policies have a high level of importance for a compliance audit. As defined by Fortinet, and IT Security Policy “identifies the rules and procedures for all individuals and using an organization’s