Florida Tech | MGT 5157 | ASSIGNMENT 3
College Name: Florida Tech
Subject: Networks and Communication
Course Code: MGT 5157
Title: ASSIGNMENT 3
Question 40862: • Explain MAC addressing
• Understand medium-access control
• Describe network addressing
Instructions
For each of the true/false or multiple-choice questions below, choose one of the options and explain your answer. For the others, provide an explanation. 10 points will be earned for each question.
1. The link layer encapsulates the datagram received from the network layer into a frame.
a. True
b. False
Explain:
2. MAC protocols employ CRC to detect errors.
a. True
b. False
Explain:
3. The physical topology of a LOGICAL token ring protocol LAN is a:
a. Star
b. Bus
c. Ring
d. All of these
e. None of these
4. Recall that IP addressing has undergone change since the early forms of Class A, B, and C addresses. Review the CIDR discussion in the Network Layer lecture and answer the following question: An organization wants to form subnets for four departments with the following number of hosts:
• A dept: 82
• B dept: 40
• C dept: 18
• D dept 60
Assuming the ISP serving the company starts with old Class C address 210.118.63, what do the company’s CIDR entries in the routing table look like?
5. Describe a metric that might be used in a routing table for Internet data communications.
Florida Tech | MGT 5157 | ASSIGNMENT 2
College Name: Florida Tech
Subject: Networks and Communication
Course Code: MGT 5157
Title: ASSIGNMENT 2
Question 40861: • Explain what modern computer networks are and the general principles behind data communications
• Incorporate common connectivity terms
• Distinguish among different types of switched networks
Instructions
For each of the multiple-choice questions below, choose one of the options and explain your answer (10 points each). For the others, provide an explanation (15 points each). Each of your explanations should be a minimum of one paragraph (four to five sentences).
1. Routers operate at:
a. Layer 2
b. Layer 3
c. None of the these
2. TCP and UDP operate at the following layer of the protocol stack:
a. Data link layer
b. Network layer
c. Transport layer
3. Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host are R1 and R2, respectively. Assuming that the switch uses store-and-forward packet switching, answer the following questions:
a. Describe the functions of a store-and-forward packet switch.
b. Identify and explain each of the types of delays that should be considered to calculate the total end-to-end delay to send a packet of length L.
c. Explain the difference between variable and constant delays and identify which of the delays described in (b) are constant and which are variable.
4. Describe the concept of encapsulation in layered architectures and explain the importance, and possible downsides, of encapsulation in multilayered architectures.
Florida Tech | MGT 5157 | ASSIGNMENT 1
College Name: Florida Tech
Subject: Networks and Communication
Course Code: MGT 5157
Title: ASSIGNMENT 1
Question 40860: • Explain what modern computer networks are and the general principles behind data communications
• Incorporate common connectivity terms
• Distinguish among different types of switched networks
Instructions
For each of the multiple-choice questions below, choose one of the options and explain your answer. For the others, provide an explanation. Your explanation should be a minimum of one paragraph (four to five sentences). Include citations to all external references. Ten points are earned for each question.
1. Ethernet is an example of:
a. LAN
b. MAN
2. The scope of a wide-area network is:
a. Within the premises of a building
b. Within a college campus
c. Countrywide
d. Worldwide
e. (a) or (b)
f. (c) or (d)
3. Transmission is the propagation and processing of data signals between network elements. Describe the two basic encoding schemes for the transmission of data signals.
4. Which encoding scheme is the most prevalent in modern computer communications? Why?
5. Why is this encoding scheme important, from a security standpoint?
Florida Tech | BUS 5480 | WEEK 8 DISCUSSION
College Name: Florida Tech
Subject: Strategic Management
Course Code: BUS 5480
Title: WEEK 8 DISCUSSION
Question 40825: Applying organizational structure and culture knowledge (discussed in the video lecture and assigned readings) to the case of a company of your choice, address the following questions:
1. Which type of organizational structure is this company using, and what is the evidence?
2. Which type of organizational culture has this company cultivated, and what is the evidence?
3. Are the structure and culture aligned with the company’s strategy? Explain.
Florida Tech | BUS 5480 | WEEK 7 DISCUSSION
College Name: Florida Tech
Subject: Strategic Management
Course Code: BUS 5480
Title: WEEK 7 DISCUSSION
Question 40824: While applying corporate governance knowledge (discussed in the video lecture and assigned readings) to the case of a company of your choice (preferably publicly traded), address the following questions:
1. How would you describe the corporate governance and board of directors in this company?
2. What internal governance mechanisms are in place at this organization?
3. What external governance mechanisms are applicable in the context of this company?
4. Are the corporate governance mechanisms effective? Explain.