NT1330 Unit 1 Essay

Decent Essays
So the previous section was discussing the findability Layer which enables humans and applications to search and find the smart thing's services they need, however in this section the main concern is to know more the next layer which is sharing layer.
This layer’s main concern is to keep human and machine updated with the new information so the main concern was making this communication secure and free from hacks so researchers tried to use already existing protocols like HTTP that is already provides authentication mechanisms for securely sharing resources by which it allows clients to provide their user names and passwords in order to make HTTP request on a server and it is followed with SSL/TLS in order to make sure that the user names and
…show more content…
(Guinard, Fischer & Trifa,

Related Documents

  • Decent Essays

    Nt1310 Unit 2 Essay

    • 368 Words
    • 2 Pages

    1. Rack and wall mountable connector housings shall accept an interchangeable connector panel. An adapter panel is defined as a modular removable plate containing optical fiber connector adapters. 2.…

    • 368 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The Aegis Secure Key 3.0 has military grade full disk AES 256-bit XTS hardware encryption and is FIPS 140-2 Level 3 validated. You unlock the drive by entering your 7-16 digit PIN before you connect it to your device that way hackers cannot use software on your device to capture your password, and it automatically locks when you unplug it. If an incorrect password is typed 20 consecutive times all the data and the encryption key are erased. It is also dust and water resistant as well as a wear resistant keypad to hide key usage and to help prevent hackers from knowing the commonly used keys. This USB is a Super Speed USB 3.0 that has data transfer rates of 195 for read and 162 for write.…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Study Guide

    • 432 Words
    • 2 Pages

    1. Name three specific cyber issues that have necessitated new laws. 1) Credit card fraud. 2) Cyberstalking. 3) Theft of intellectual property and Identity theft.…

    • 432 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Essay

    • 807 Words
    • 4 Pages

    1. Compare and contrast Radiological dispersal devices (RDD), Radiological exposure device (RED), and Radiological incendiary device (RID). Out of the three devices, Radiological Dispersal Devices are the most common. For one thing, these devices “…require limited technical knowledge…” that is why terrorists are more likely to make these bombs (Radiological Dispersion Device, n.d.).…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Paragraph

    • 632 Words
    • 3 Pages

    We’ve used a lot of devices and storages so far in our life, but one thing that might be weird to people is the RAID. RAID stand for redundant array of independent disks and is a place for people to store their information. It is stored on CDs, instead of the normal flash drives and hard drives. RAIDS are different from the normal CDs, because they have to divide the data and spread the blocks into several megabytes for RAID to work. This is to make RAID efficient and fast.…

    • 632 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Final Exam Paper

    • 1307 Words
    • 6 Pages

    2.3 What is Protocol? Protocol is defined as a set of Rules which governs the communication to a network Between the Layers. In Order to establish a communication in a network Successfully, These are the Following Example: File Transfer Protocol, Simple Mail Transfer Protocol. 2.4…

    • 1307 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Course Project

    • 296 Words
    • 2 Pages

    2.1 Goals The goals of this internship are: a. Provide a solution which reduces the stall time and increases the system efficiency. b. A solution which could be generalized in future to be used with more than two sub-systems. 2.2 Solution Overview The most common solution to such a problem is by making use of a buffer.…

    • 296 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1310 Unit 2 Term Paper

    • 1473 Words
    • 6 Pages

    Question 3 HIV can be transmitted from the HIV positive mother to the infant during pregnancy, labor, delivery, and breastfeeding. Without an intervention, transmission rates range from 15% to 45%, but the rate can be reduced to below 5% with effective prevention programs (1). These interventions are known as prevention of mother to child transmission (PMTCT). PMTCT involves antiretroviral treatment (ART) for both the mother and infant. PMTCT also includes procedures to prevent HIV acquisition in the pregnant woman and provides breastfeeding practices.…

    • 1473 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Unit 13 Canons Essay

    • 168 Words
    • 1 Pages

    Describes 13 canons or concepts that are important to keep a healthy patient through the environment. Believed that with the right balance of these concepts, nature would be able to cure the body of any disease. These canons are ventilation and warming: thought that the person who breathes their air would become or remain sick. That it was necessary to have fresh air to eliminate any foul odors that came from the excrements. Nightingale also stressed the importance of room temperature.…

    • 168 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    unit 205Outcome 1 Know the different types of schools in the education system 1.1 There are two types of schools: Independent schools which rely on fees, have their own entrance exams and follow their own curriculum. Types of Independent Schools: Preparatory School All-Through School Public School Independent Grammar School State schools are run by the government, receive funding and have a set curriculum: Types of State Schools: Grammar Academies Community Trust Free Specialist Voluntary 1.2 Independent schools rely on fees and money from investments they don’t receive government funding. They will have an entrance exam and they also devise their own curriculum framework.…

    • 1136 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    1.1 Describe common physical network topologies Topologies Topologies describes the how different computers or other devices in a computer network is arranged. Topologies can be either physical (meaning placement of the components are arranged in a particular shape) or logical (meaning how data flows despite of its physical layout). There are different recognised topologies including star, mesh, tree and ring. In a star topology, each network device (computer or peripheral) is linked to a central hub or a switch with a point-to-point access or connection.…

    • 3175 Words
    • 13 Pages
    Great Essays
  • Improved Essays

    Describe the C.I.A. triangle, which is founded on three desirable information characteristics: confidentiality, integrity, and availability. Page 7 To understand InfoSec one has to know how the C.I.A. triangle plays a part in it, the features are confidentiality, integrity, and availability, while looking at security technology it would seem like these three components are insufficient as a single part due to their limits in the ever changing IT environment their scopes are limited the needs in the IT field requires a more robust design. The development of the C.I.A. triangle is now a list of wide-range features and procedures that are vital, which covers privacy, identification authentication authorization, and accountability. The three discussed in this paper will be availability, confidentiality, and integrity (Whitman & Mattord, 2014).…

    • 399 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Layers Of WBAN

    • 954 Words
    • 4 Pages

    Layers of WBAN For the low cost, and short range communication IEEE has defined layers called physical (PHY) and medium access control (MAC). Physical layer Clear channel assessment (CCA) within the current channel, activation and deactivation of radio transceiver, data transmission and reception are the tasks that is done by the physical layer. There are different physical layers. The choice of physical layer depends on the applications.…

    • 954 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    OSI And TCP/IP Model

    • 771 Words
    • 4 Pages

    In order for network devices and applications to communicate with each other, they must follow protocols and specific rules that are laid out by the Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) model. In order for data to travel from one device to another, seven layers were created for the OSI & TCP/IP model. These seven layers are a basic standard, utilized by most networks today and are based on the OSI. Even though the OSI model is standard and widely used, it does have some drawbacks.…

    • 771 Words
    • 4 Pages
    Improved Essays