[ad_1]
While the OSI Reference Model provides us with a conceptual framework for talking about how networks function, it is the TCP/IP protocols that are essential for actually enabling modern networking and data communications.Imagine that you are relaxing at your favorite local coffee shop enjoying a delicious beverage. You turn on your laptop or smartphone, connect to the shop’s wireless local area network (WLAN), and use the Internet to access your cloud-based e-mail (for example Gmail). What protocols make it all work? In this assignment, you explain and illustrate concepts and functioning of some TCP/IP protocol functions and interactions related to the use of cloud-based e-mail from a client connected to a WLAN.PreparationIn this assignment, you will create a diagram. Visio has been included for your use via the Toolwire Virtual Desktop although you may use any program you choose to create your diagram.DirectionsPart 1 – Network DiagramsDraw a diagram of a typical data transmission path between an e-mail client and a cloud-based e-mail server indicating the physical media, wireless access point, and the local and remote switches and routers involved in data transmission. Your diagram should accurately map the layers of the TCP/IP protocol architecture to the layers of the OSI Reference Model.Make sure to do the following:Create a network diagram that accurately depicts cloud-based e-mail server to remote client transmission.Create a diagram that accurately maps the layers of the TCP/IP protocol architecture to the layers OSI Reference Model.Part 2 – The OSI Layer and SecurityWrite a detailed narrative explanation of the primary function of each OSI layer and describe its part in facilitating a typical data transmission from a cloud-based e-mail server to a remote client computer. After that, describe three or four security issues inherent to the TCP/IP protocol suite.Make sure to do the following:Explain the primary function of each layer of the OSI model and its related TCP/IP protocols.Describe the OSI layers’ part in facilitating a typical data transmission from a cloud-based e-mail server to a remote client computer.Describe security problems inherent to the TCP/IP protocol suite.Frame your explanations using vocabulary and frameworks that are appropriate for technical stakeholders. Submission RequirementsSubmit a single Word document with both parts of this assignment.Font: Times New Roman, 12 point.Length: 3–4 pages (not including cover and reference pages), double-spaced, 1-inch margins.Format: Use current APA style and format for cover and reference pages.
What Students Are Saying About Us
.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"
.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."