subject

Project: Researching TCP/IP As someone who works closely with computer networks, it is critical that you have a solid understanding of the TCP/IP networking model and how it enables communication across the network. In this project, you will write a research paper about this networking model to learn more about it in-depth.

Choose an aspect of the TCP/IP network model that interests you and research it. You may choose to address a specific element of the model such as one or more of the layers, how data is handled, or specific protocols, etc. Or you may choose to address the topic at a higher level—the importance of the TCP/IP model to networking in general, comparison of the TCP/IP model to the OSI model, or how changes in the way we use the Internet will impact the evolution of the model, etc.

Use books, articles, online sources, or interviews for your research. If you wish to interview a network administrator or other expert to provide you with information, work with your instructor or your parents to help you with the process.

Write a five to eight page paper discussing your findings. State your thesis at the beginning of the paper and use the information you find in your research to support it. The report should be primarily a written account of your research findings, though you may use a small number of graphics to illustrate the paper. Include a source page at the end listing all your research sources. If you conduct interviews, also add a page with a list of the questions you asked (you do not need to include answers or a transcript). The pages with sources and questions are in addition to the five to seven pages for the report.

Submission requirements
Use standard English and write full phrases or sentences. Do not use texting abbreviations or other shortcuts.
Make any tables, charts, graphics, or videos neat and well organized
Make the information easy to understand

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:30
What result from the passage of this amendment
Answers: 1
question
Computers and Technology, 23.06.2019 11:00
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
question
Computers and Technology, 24.06.2019 01:30
Hazel has just finished adding pictures to her holiday newsletter. she decides to crop an image. what is cropping an image?
Answers: 1
question
Computers and Technology, 24.06.2019 04:30
The ieee 802.11: defines standards for wireless local area network (wlan) communication protocols. identifies various computers or devices connected to a network. verifies any resource attached to another computer on a network that is different from the computer to which the user is logged on. connects multiple local area networks (lans) and wide area networks (wans).
Answers: 2
You know the right answer?
Project: Researching TCP/IP As someone who works closely with computer networks, it is critical tha...
Questions
question
Mathematics, 15.07.2019 03:50
question
Computers and Technology, 15.07.2019 03:50
Questions on the website: 13722359