preview

Project With Data And Network Protective Solutions

Better Essays

works with data and network protective solutions. The mission of this office, in general, is to improve the cyber security posture of information sharing that support the Intelligence Community (IC), the Department of Defense (DoD) and civil agencies. In other words, it provides innovative solutions to protect data and networks across the enterprise. Almost everybody knows each other in the office, so that makes the work environment really nice and friendly. In addition, there’s a meeting every week, so everybody is updated with what each person is working on. This is my first work experience related to my Computer Engineering major, so there are a lot of topics didn’t know at all. That’s why my first couple of weeks can be …show more content…

The first three layers are part of the hardware. The first one, called Physical layer, defines the method of moving data between computers, so it is mostly the cabling and signal modulation. This is the physical channel through which the bits of data move. Network devices that operate at the physical layer include a repeater and a hub. The Data Link layer is the second layer and it has the NIC, which is the Network Interface Card. The NIC contains the Media Access Control (MAC) address, which is the unique physical identifier of each system. The recipient’s and sender’s Mac Address, together with the data and the frame check sequence (FCS) is contained in “envelopes” called frames, which are passed to the next layer. The Network layer is the third layer and it includes the routers. It is also the layer where the packets get created and addressed to go from one network to another using the Internet Protocol (IP). The IP packets include the destination IP address, the source IP address and the data. IP addresses work as the network interface identification and location addressing and are stored in the system software. The Transport layer assembles or disassembles the data packets and also ensures reliable data transfer and integrity. After that, the data goes to the Session layer which establishes connections between devices and applications. The Presentation layer then formats the

Get Access