Free Essay

Intro to Network

In:

Submitted By shamelesseuan
Words 1464
Pages 6
The comparison and contrast between the 2 main reference models which uses the concept of protocol layering. Open System Interconnection Model (OSI) Transport Control Protocol /Internet Protocol (TCP/IP). Transmission Control Protocol (TCP) A connection-oriented transport protocol. Connection-oriented transport protocols provide reliable transport, in that if a segment is dropped, the sender can detect that drop and retransmit that dropped segment. Specifically, a receiver acknowledges segments that it receives. Based on those acknowledgments, a sender can determine which segments were successfully received. TCP operates at the transport layer of the OSI model.

TCP three-way handshake.
1. It sends a message called a SYN to the target host.

2. The target host opens a connection for the request and sends back an acknowledgment message called an ACK (or SYN ACK).

3. The host that originated the request sends back another acknowledgment, saying that it has received the ACK message and that the session is ready to be used to transfer data.

UDP
User Datagram Protocol A connectionless transport protocol. Connectionless transport protocols provide unreliable transport, in that if a segment is dropped, the sender is unaware of the drop, and no retransmission occurs.

UDP operates at the transport layer

FTP
File Transfer Protocol (FTP)

Works at the Application layer

FTP provides for the uploading and downloading of files from a remote host running FTP server software. As well as uploading and downloading files, FTP enables you to view the contents of folders on an FTP server and rename and delete files and directories if you have the necessary permissions.

One of the big problems associated with FTP is that it is considered insecure. Even though simple authentication methods are associated with FTP, it is still susceptible to relatively simple hacking approaches. In addition, FTP transmits data between sender and receiver in an unencrypted format.
Identify the purpose, features, and functions of the following network components:
• Hubs
• Switches
• Bridges
• Routers
• Gateways
• CSU/DSU
• Network interface cards (NICs), ISDN adapters, and system area network cards
• Wireless access points (WAPs)
• Modems
A wide range of devices are used in modern networking. As a Network+ certified technician, you will need to have a good understanding of commonly used devices.
Given an example, identify a Media Access Control (MAC) address.
MAC addresses are the means by which systems communicate at a base level. As a network administrator, you will need to understand the purpose, function, and expression of MAC addresses.
Outline
• Introduction
• Hubs
• Switches
• Switching Methods
• Working with Hubs and Switches
• Hub and Switch Ports
• Cables Connecting Hubs and Switches
• Hub and Switch Indicator Lights
• Rack Mount, Stackable, and Freestanding Devices
• Managed Hubs and Switches
Typically, a local area network exists in a house or a university campus, while a wide area network exists over many office buildings separated by a vast distance. The office buildings in a WAN may be in different countries or even continents. For example, the headquarters may be in USA, the regional office may be in the UK, and the branch office may be in India. The workers in these three buildings use a Wide Area Network to collaborate with each other. The Internet can also be considered as a WAN, with the Ethernet being a classic example of WAN. Let us have a look at the two structures and their differences.

The Differences
In a LAN setup, devices are connected to a switch or a hub. Shared devices are also connected to a switch that is centrally located. In case the devices need to be connected to the Internet, the switch is then connected to the ISP and thus, to the Internet. The data that is shared amongst these devices is stored in servers. If more devices need to be added, an extra hub or switch can be added.

Local Area Network (LAN) has higher bandwidth, thus is faster when compared to a WAN. The maximum speed of a LAN can be 1000 megabits per second. As LAN is faster, it is widely preferred for sharing computers in a network. The network is easy to set up, most computers and laptops manufactured today come with the RJ45 port built-in on the motherboard, which is used to connect to the network. In case of older machines that do not have this port, a separate NIC (Network Interface Card) will be required to be installed. This card fits in the PCI slot on desktops, and the PCMCIA slot on laptops.

The main advantage of using LAN is the ease of sharing. Computers, if connected to the same LAN, can even share a printer. The biggest hurdle that a firm faces while connecting computers in a LAN is the monitoring of traffic for the Internet. If there is too much load put on only one computer or on a shared device, the network speed may reduce. This can be circumvented by using a LAN traffic monitor, whose function is to keep a track of the bandwidth used. On the basis of setup and maintenance cost breakup, LAN is considered to be cheaper as compared to a WAN setup.
Read more at Buzz. In a WAN setup, computers that are present at different locations are interconnected. The devices are connected to the router and the routers are interconnected via T1 standards. This makes it difficult to expand a WAN network.

Wide Area Network (WAN) has a lower bandwidth, thus slowing the network. The speed of a WAN can go up to 150 megabits per second. This means the speed of a WAN is one-tenth the speed of a LAN. Though WAN is slower, it is used widely to share data. The best example of WAN is the Internet. The data on the Internet is accessible across continents. However, a WAN cannot share computer peripherals, so a computer in one country cannot use a printer in another country. To set up a WAN, a modem and a router is needed. Thus, if an additional device needs to be added to the network, a router needs to be configured and connected to the others in the network. As the number of devices in a WAN are greater than those connected in a LAN, there is a greater need for a monitoring device. A special-purpose computer is used, whose only purpose is to send and receive data from the Internet. Leased lines or satellites are used to connect devices in a WAN.

While each of the two have their own advantages and disadvantages, there is also a distinct factor that helps one choose between a LAN and a WAN setup, and that is distance. If the locations to be connected are far apart, there is no point considering a LAN setup, as in spite of whatever advantages it may offer, it is not possible.
Network security is a broad topic with multi layered approach. It can be addressed at the data link layer, network layer and application layer. The issues concerned are: packet intrusion and encryption, IP packets and routing tables with their update version, and host-level bugs occurred at data link layer, network layer and application, respectively.
The TCP/IP protocols are being used globally irrespective of the nature of the organization whether it belongs to general category of organizations or security specific sensitive organizations. The news -:"information about hacking of some website or portal by some undesired people is very common nowadays. This shows that TCP/IP protocols are susceptible to intercept. This generated a need to ensure all round security for the network in an organization. The task of network administrator had to widen to inc1ude the overall security of the network. He has to ensure that all parts of this network are adequately protected and adequate measures of security have been implemented within a TCP/IP network. He should be aware of an effective security policy. He should also be able to pinpoint the main areas of risk that the network may face. Basically, these main areas of risk vary from network to network depending upon the organization functioning. There are, therefore, various security-related aspects which have direct implications for network administrator along with the means to monitor the implemented measures of security effectively arid to tackle the problem of breach of security if it happens.
Basic Requirements of Network Security
The main objective of the network is to share information among its users situated locally or remotely. Therefore, it is possible that undesired user can hack the network and can prove to be harmful for the health of the network or user. There are few basic points which must be followed by network administrator to provide the network an adequate security other than network-specific security as in case of e-commerce, etc. These are given below:

Similar Documents

Premium Essay

Intro to Network Magement

...IT245-1202A-01 : Introduction to Network Management Network Configuration Candice Robinson 04/23/2012 Table of Contents Target Organization………………………………………………………………….…3 Network Architecture…………………………………………………………………..4 Network Model……………………………………………………………………………….5 Network Security……………………………………………………………………………...6 Network Protocols…………………………………………………………………………….7 Network Management………………………………………………………………………...8 References……………………………………………………………………………………..9 Target Organization Name of Business: CR Media Locations: Fayetteville, NC; Greensboro, NC and New Port News, NC and a website. Number of employees: 22 Business History: CR Media is a business that provides rentals of video games and movies. The business came to life in December of 2011 and is in the process of becoming established. Movies and Games can be rented via the internet and mailed to the home address in addition to visiting a physical location in the above mentioned cites. Network Architecture The network architecture that will be used for the organization will be the client/server network. A client/server network would be more suitable because this is a business that is growing thus it will be easier to make changes and additions to the network. A WLAN Star Topology is going to be used because it will be cost effective and will allow room for future growth. The client/server network will be composed of Windows 2000 File Server, Exchange Server and Firewall Server. We plan to...

Words: 407 - Pages: 2

Premium Essay

It245-Intro to Network Management

...Introduction to Network Management Phase 5: Network Security & Network Management Network User Guide Final Version Gabriel B. Del Fierro IT245-1304B, Introduction to Network Management Instructor: Brian Rodgers December 23, 2013 Executive Summary The purpose of this user guide is to familiarize you the Casa Del Fierro organization, what their needs are within this Network Organization. Contained in the following pages will provide you with all of the pertinent information that you will need in order to provide the highest quality of service and care. “An ounce of prevention is better than a pound of cure” – B. Franklin.   Table of Contents IT245-1303B-01 Network Project Plan Executive Summary 1 Table of Contents 2 Section 1: Introduction of the Organization and its Requirements 4 Section 2: Network Architecture Design 6 Section 3: Network Model or Stack to be Used 8 Section 4: Network Protocols 15 Section 5: Network Security 19 Section 6: Network Management 22 References 24 Section 1: The Organization & It’s Network Requirements The Casa Del Fierro is a small organization with a total of two main users with a few friends and family that comes to visit on holidays. Although this network is set up in a comfortable home, individual needs may vary. The internet is used on a daily basis, Streaming Movies along with music, Online School, Social Media, Games, Online Banking and accessing medical care records. The devices to be networked...

Words: 5562 - Pages: 23

Premium Essay

It245 Intro to Network Management

...IT245 IP5 Introduction to Network Management Individual Project Carol McClellan February 10, 2014 Contents Identifying the Network 4 The Company Considered 4 The Networks Considered 4 Servers Applied 4 Roles of Network managers 4 Diagramming the Network 5 Legend for the Diagram 5 Diagram 6 Network Models 7 The Seven Layers of the OSI Model 7 Physical Layer 7 Data Link Layer 7 Network Layer 7 Transport Layer 7 Session Layer 8 Presentation Layer 8 Application Layer 8 FCAPS 9 Fault Management 9 Configuration Management 9 Accounting 10 Performance 10 Security 10 Protocols and Agents 12 Transport Layer 12 Application Layer 12 Presentation Layer 13 Session Layer 13 Network Layer 13 Data Link Layer 14 Physical Layer 14 Network Security 15 Network Management2 16 FOOTNOTES 18 Identifying the Network The Company Considered I have decided to use Walmart for my individual project. It is an international company with 11,137 retail units in twenty-seven countries on five continents. It employs over two million people around the world. The Networks Considered There are numerous networks that would be needed for an international company such as this. In addition to the ones used nationally, there would be others in relation to language and monetary differences and shipping differences. There would also be a more extensive requirement as far as tariffs and taxes. Some of the national ones would be taking...

Words: 5551 - Pages: 23

Premium Essay

Google

...Intro Intro Swot BalancedScorecard Conclusion Corporate finance 2 Ngoc-Viet Vo Binh-Duong Doan Yuming Hao Huili Liu Noelia Martin Plaza Khurram Shahzad © 2010 - GMP IAE LYON 3 Intro Intro Swot BalancedScorecard Conclusion Plan Intro Swot Scorecard Conclusion Plus Introduction SWOT Analysis Balanced Scorecard Strategies & Indicators GMP Corporate Finance Plus Conclusion 2 Intro Intro Swot BalancedScorecard Conclusion introduction 3 Intro Intro Swot BalancedScorecard Conclusion Introduction Intro Swot Scorecard Conclusion Plus GMP Corporate Finance Plus Google is a global technology leader focused on improving the ways people connect with information. Incorporated in California in September 1998 and reincorporated in Delaware in August 2003. Headquarters are located at 1600 Amphitheatre Parkway, Mountain View, California 94043 4 Intro Intro Swot BalancedScorecard Conclusion Introduction Intro Swot Scorecard Conclusion Plus Mission: Google’s mission is to organize the world’s information and make it universally accessible and useful GMP Corporate Finance Plus Major Products: Google Web Search with Advanced Search Functionality Web Page Translation—supports 41 languages Integrated Tools—such as a spell checker, a calculator, a dictionary and currency and measurement converters Google image and book search Google Scholar Google Finance Google webmaster...

Words: 1119 - Pages: 5

Free Essay

Swear as Mechanism to Pain

...and file systems. • Use of the Solaris Management Console. SYS-ED/COMPUTER EDUCATION TECHNIQUES, INC. (Solaris – System Admin: Intro - 6.5) Ch 2: Page i Solaris System Administration: Introduction 1 Operating System Concepts Operating System: Definition An operating system is the set of programs that controls a computer. The core of the operating system is the kernel. The kernel is a control program that functions in privileged state that allows all hardware instructions to be executed. It reacts to interrupts from external devices and to service requests and traps from processes. The kernel creates and terminates processes and responds to requests for service. Operating systems are resource managers. The main resource is computer hardware in the form of processors, storage, input/output devices, communication devices, and data. Operating system functions include: • Implementing the user interface. • Sharing hardware among users. • Allowing users to share data among themselves. • Preventing users from interfering with one another. • Scheduling resources among users. • Facilitating input/output. • Recovering from errors. • Accounting for resource usage. • Facilitating parallel operations. • Organizing data for secure and rapid access. • Handling network communications. Processes run applications, which are linked together with libraries that perform standard services. The kernel supports...

Words: 2421 - Pages: 10

Free Essay

System

...790 4121 Lec 3 – Performance  + Pipeline Review  Electrical Engineering and Computer Sciences El t i l E i i dC t S i University of California, Berkeley http://www.eecs.berkeley.edu/~pattrsn http://www‐inst.eecs.berkeley.edu/~cs252 David Patterson Review from last lecture • Tracking and extrapolating technology part of  architect’s responsibility • Expect Bandwidth in disks DRAM network and Expect Bandwidth in disks, DRAM, network, and  processors to improve by at least as much as the  square of the improvement in Latency • Quantify Cost (vs. Price) – IC ≈ f(Area2) + Learning curve, volume, commodity,  margins Outline • • • • • • • • Review MIPS – An ISA for Pipelining 5 stage pipelining 5 t i li i Structural and Data Hazards Forwarding Branch Schemes Exceptions and Interrupts Conclusion  • Quantify dynamic and static power Quantify dynamic and static power – Capacitance x Voltage2 x frequency, Energy vs. power • Quantify dependability – Reliability (MTTF vs. FIT), Availability  (MTTF/(MTTF+MTTR) 3/28/2008 CS252-s06, Lec 02-intro 3 3/28/2008 CS252-s06, Lec 02-intro 4 1 IS2202 Computer Systems Architecture Lecture review pipeline and memory hierarchy MIPS ‐‐ A "Typical" RISC ISA • • • • 32‐bit fixed format instruction (3 formats) ( p ) 32 32‐bit GPR (R0 contains zero, DP take pair) 3‐address, reg‐reg arithmetic instruction Single address mode for load/store:  base + displacement – no indirection 31 Example: MIPS (‐ MIPS) Register-Register ...

Words: 635 - Pages: 3

Free Essay

Sink

...http://www.cnnchile.com/noticia/2013/11/21/coca-cola-life-la-nueva-version-de-la-bebida-creada-en-chile-y-argentina# ---intro https://www.marketingweek.com/2014/09/04/coca-cola-defends-life-as-marketing-push-kicks-off/ --intro http://www.coca-cola.co.uk/newsroom/press-releases/coca-cola-life-marketing-campaign/ ---intro http://www.dailymail.co.uk/news/article-2811978/Introducing-GREEN-Coke-exclusive-taste-Coca-Cola-Life-soft-drink-35-cent-sugar-revolutionise-beverage-industry.html ---encoding http://refrigerators.reviewed.com/news/coca-cola-tests-out-a-new-unified-look-for-cans --encoding http://www.cuckoodesign.com/blog/2014/07/coca-cola-launch-new-product-green-packaging/ ----encoding http://www.thebrandingjournal.com/2014/06/coca-cola-launches-coca-cola-life-drink-natural-sweeteners-fewer-calories/ ---receiver https://www.cokecce.com/news-and-events/news/coca-cola-enterprises-announces-the-launch-of-coca-cola-life -35-55 https://www.boston.com/news/business/2014/06/17/is-the-new-coca-cola-life-healthier-than-regular-coke-and-will-it-come-to-the-us age 35-55 https://www.marketingmag.com.au/news-c/pepsi-next-coca-cola-life-green-cola-wars/ --receiver aged 30-40 http://www.thewire.com/business/2014/06/coca-cola-life-isnt-actually-good-for-you/372962/ ---decoding the green colour meaning http://www.theguardian.com/media-network/media-network-blog/2014/sep/11/coca-cola-life-brands-obesity ---noise http://www.campaignlive.co.uk/article/1315388/coca-cola-life-p...

Words: 333 - Pages: 2

Premium Essay

It/244 Week 1

...OF PHOENIX IT/244 INTRO TO IT SECURITY Instructor’s Name: JAMES SERSHEN Date: 04/18/2012 1. Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 1.1. Company overview As relates to your selected scenario, give a brief 100- to 200-word overview of the company. The Company I have chosen is, The Bloom Design Group. The Bloom Design Groups mission is to provide online interior design services to its customers. The company offers their customers interior design services. What sets this company apart from others is that they have a website that allows customers a chance to design and decorate their rooms to their liking in a virtual environment before spending their money. The option provided for their customers is a virtual decorating tool. With this tool customers can play around with various color schemes for each room’s floor and ceilings, as well as customizing furniture as well. Then employees are able to access the corporate network through a VPN collection to access their client files, in order to place electronic orders for the design materials and furniture. 1.2. Security policy overview Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why. Program-Framework security policy is the best overall for this type of company. As The Bloom Design Groups network stands right now it...

Words: 924 - Pages: 4

Free Essay

Scientific Article

...Scientific Article 1 Intro to Psychology Risk-takers are smarter according to new study In a recent study using functional magnetic resonance imaging (fMRI), images taken of the brains of young men revealed major differences in what is called “white matter” between two separate groups of participants. The University of Turku in Finland under the direction of SINTEF claims young men that make quick decisions in risky situations have a highly developed neural network and are “smarter” than low risktakers. First each participant was given a personality test to assess the risk-taking propensity and susceptibility to peer influence. By doing this the researcher was able to separate the 17 right-handed, 18-19 year old males into two groups, high and low risk takers. The two groups reported to the Department of Radiology of the Turku University Hospital for two practice sessions. During the sessions they were shows a driving game with sets of 20 stop-light intersections. They learned how to play the game and then reported back for four testing sessions in an MRI scanner. The first two sessions were performed under a non-competition social setting and the last two sessions by surprise were under social pressure of a peer competition situation. Measurements were taken of the participants at each moment that decisionmaking took place wether to stop at the yellow light or try and make it through. Results showed that high risk-takers didn't hesitate for long before they...

Words: 599 - Pages: 3

Premium Essay

It/244 Final

...Information Security Policy Gennie Diamond Axia College of University of Phoenix IT/244 – Intro to IT Security October 10, 2010 Executive Summary The goals of this information security policy will be to state the principles and guidelines for protecting the confidentiality, integrity, and availability of sensitive information and resources for XYZ Energy. This policy will set forth requirements for securing the network’s confidential information and data communications infrastructure, in addition to defining detailed policies in the areas of physical security, access control, and network security. Assumptions of the security plan defines physical security at each site for the environment around the network including entry control at each facility, the need and responsibilities of security staff, and issues around security in common areas. Information system security defines workplace protection and guidelines for storage, protection, and maintenance of hardware and network equipment. Access control policies address user enrollment and all network access privileges, along with identification and authentication process policies. Finally, network policies are defined for granting and managing network access while still protecting sensitive company data. Project constraints can include, but are not limited to, availability of resources needed to provide appropriate security for each defined security goal; time restraints for meeting these goals;...

Words: 1790 - Pages: 8

Premium Essay

Cyber Crime

...1.1 (Intro.) CS-M74 Software Product Development (2003-4) 1.2 (Intro.) Roger D Stein BSc PhD MBCS CEng CITP R.D.Stein@swansea.ac.uk Room 302, Faraday Tower 1.3 (Intro.) CS-M74 Pre-requisites • CS-M01 Distributed Programming in Java 1.4 (Intro.) Assessment Report 10% Linux / C 10% Group Project 20% Project Specification 30% Written Examination (May/June) 30% Lectures approx. 20 in total ((plus tutorials)) TB1 Tues. 9.00 Far-L ? Andy Gimblett (3 Linux + 6 C) [with CS-244] Wed. 11.00 Glyn-A ? Roger Stein (start on 5 November) TB2 Lectures Linux /C 9 Introduction 1 Ethics 1 Legal Issues 1 Project Management 2 (Group Project 2) Software Engineering 4 1.4 (Intro.) Books B. Ayres, The Essence of Professional Issues in Computing, Prentice-Hall, 1999 S Baase, A Gift of Fire, 2nd ed., Prentice-Hall, 2003 B. Hughes and M. Cotterell, Software Project Management, 3rd ed., McGraw-Hill, 2002 R. Pressman, Software Engineering: A Practitioner’s Approach, 5th ed., McGraw-Hill, 2000 I. Summerville, Software Engineering, 6th ed., Addison-Wesley, 2001 1.5 (Intro.) Why Software Engineering? “Engineering … to define rudely but not inaptly, is the art of doing that well with one dollar, which any bungler can do with two after a fashion” - Arthur Mellen Wellington, The Economic Theory...

Words: 3498 - Pages: 14

Free Essay

Informatique

...Administration système et sécurité sous LINUX La configuration de base du réseaux Enseignant: Arafet BOUSSAID arafet.boussaid@gmail.com 1 Service intro Prot ocol e http Port RFC Client Serveur Couche 3 TCP, UDP (httpdata) TCP Web 80 / 443 2616 Firefox, opera, chrom, Apache, IIS, Lighthttpd VSftpd, Role FTP, Filezilla server Postfix-dovecot eXchange, Lotus Domino BIND, Role DNS Vlc-server Transfert de fichier ftp 20 / 989 21 /990 959 FileZilla FlashFXP CuteFTP Messagerie Smtp 25 Pop 110 / 995 Imap 143 / 993 Resolution de nom streaming DNS 53 2821 Outlook, Thenderbird, Evolution 1034 Resolver TCP TCP UDP c/s TCP s/s UDP Rtp rtcp rtsp 5004, 5005 Vlc 2 Service intro à Admin distance Proto Port cole telnet Ssh 23 22 RFC 854 Client Serveur Telnetd openSSH Couche 3 TCP Cmd Shell linux 4253 Putty WinSCP 2131 système Auto Dhcp configuratio n IP Contrôleur de domaine Surveillanc e réseaux Ldap 67 Role dhcp Dhcpd OpenLdap, ActiveDiractory UDP 389 2251 Client/ serveur messgerie, OS client 2573 Nagios Cacti Zabbix système Tcp/udp Snmp 161 Snmp 162 -trap Agent SNMP Tcp/udp Synchronis ation du temps Ntp 123 NTPd UDP 3 /etc/services intro Description : Les candidats doivent être capables d'examiner, de changer et de vérifier les paramètres de configuration de la pile TCP/IP côté client Termes, fichiers et utilitaires utilisés : – /etc/hostname...

Words: 1178 - Pages: 5

Premium Essay

Xbis 219

...Amazon has created and implemented a sound strategy that should help to keep them in the forefront of the global internet market. The services Amazon has added so far include Simple Storage Service (S3), which allows businesses to store data and applications on Amazon disk drives, Amazon charges 15 cents per gigabyte per month. Elastic Compute Cloud (EC2) is a service in which Amazon rents out processing power starting at 10 cents per hour. Some businesses use both of these services together saving the companies both money and time. The third service Amazon has added is called Mechanical Turk, this service combines processing power with networks of people who are paid to recognize inappropriate content in images or transcribing audio. Companies post work to Mechanical Turk and pay for this service and Amazon gets a 10 percent commission (Intro to Information Systems). Each of these new services has the same potential data management issues. Data management issues could include corrupted files infecting the entire...

Words: 593 - Pages: 3

Free Essay

Research

...Intro (3x): Em D G Verse 1: Em D G Let love explode and bring the dead to life Am Em C A love so bold to see a revolution somehow Em D G Em D G Let love explode and bring the dead to life Am Em C A love so bold to see a revolution somehow Prechorus: D Em Now I'm lost in Your freedom D Em C And this world I'll overcome Chorus: D* My God's not dead, He's surely alive Em He's living on the inside roaring like a lion D God's not dead, He's surely alive Em C He's living on the inside roaring like a lion Em D He's roaring, He's roaring G He's roaring like a lion! Verse 2: G Let hope arise and make the darkness hide Am G ...

Words: 599 - Pages: 3

Premium Essay

Samenvatting

...samenvatting_introduction_to_international_business.pdf Samenvatting Introduction to International Business Rijksuniversiteit Groningen | International Business | Introduction to International Business Verspreiden niet toegestaan | Gedownload door: Dorien De Vries | ID: 118424 INTRO TO IB KEY WORDS AND CONCEPTS Conceptual Foundations of International Business Strategy 1. Internationally transferable FSAs . Tacit knowledge = personal knowledge MNE’s heritage=key routines developed by the firm since its inception. 4 archetypes of administrative heritage: • Centralized exporter=only exporting the standardized product, no activity in host country. • International projector=FSAs from home country copied, no development of new ones. • International coordinator=different parts of the production process in different countries. • Multi-centered MNE=does everything(produce, sell, etc.) in the host country. 2. Non-transferable or location bound FSAs. 4 types of non-transferable FSAs: • Stand-alone resources=linked to location advantages. Such as certain immobile markets. • Other resources=such as local marketing knowledge, don’t have same value abroad. • Local best practices=routines which are highly effective at home, not the same abroad. • Recombination capabilities=taking FSAs/products from home and adapt it to host country. 3. Location advantages. !Strengths of a location, useable for all the firm’s operations in that location. !The reason why an MNE should go there. Foreign...

Words: 2493 - Pages: 10