Tuesday, December 31, 2019

Web Analytics Online And E Commerce Activities - 899 Words

Web Analytics: Web analytics is a set of strategic methodologies implemented to maximize online and e-commerce activities. Web analytics extracts and categorizes qualitative and quantitative data to identify and analyze on-site and off-site patterns and trends. Analytic techniques and requirements vary according to organizational requirements. Web analytics services may be supplemented with related sources, including email marketing response rates, direct mail, sales and website performance data. With the help of Web analytics admin can be able to determine the number of users hit the website and how long they were on the site during the visit. Using the web analytics administrators can monitor whether the site is working fine or not, determine the area of interest of customer in the site and where they do not get traffic. It provides the administrators and publishers, the data that can be used to modify the website for the better user experience. Page Caching: The amount of real-time(dynamic) information that displays in web pages will correlate directly to the server resources, memory, and processing cycles that are being used, which affect the effective speed of the page loading. By caching the pages, they are saved in their fully rendered state, by which we can achieve performance that nears that of static web pages. Page caching is a process of storing (caching) this HTML on the server, during the time of generation of these WebPages, so that the next timeShow MoreRelatedSnookis Beach Boutique: E-Commerce Strategies1677 Words   |  7 PagesDuds Beach Boutique e-Commerce Strategies Creating a highly differentiated and unique identity in the crowded clothing retailing markets on the Jersey Shore boardwalk takes a combination of one-of-a-kind designs, a strong multichannel selling strategy that includes social media and the Web, and a positive in-store customer experience. Retailing is as much about creating a unique in-store experience as it is about creating a differentiated and defensible market identity online (Piturro, 1999). WithRead MoreWeb Analytics Software Tools For A Tremendous Amount Of Customer Data786 Words   |  4 Pagesamount of customer data these days. Even the free tools like Google Analytics give us incredible insights into where our traffic comes from and what people do on site. Yet, 80% of online retailers do not use their analytics sufficiently. Many don’t even track important actions like conversion rates and purchases. If one uses analytics only to measure the daily traffic, he is doing his self and his customers a disservice. Go ogle Analytics has many ecommerce specific features which are not setup by defaultRead MoreElectronic Commerce and Page Ref Essay4966 Words   |  20 PagesE-commerce 2013, 9e (Laudon/Traver) Chapter 1 The Revolution Is Just Beginning 1) The growth of mobile e-commerce almost doubled from 2011 to 2012. Answer: TRUE Diff: 2 Page Ref: 8 AACSB: Reflective Thinking 2) Approximately 80% of adults in the United States use a social network on a daily basis. Answer: FALSE Diff: 2 Page Ref: 8 AACSB: Reflective Thinking 3) A companys online inventory control process is an example of e-business, as opposed to e-commerce. Answer:Read MoreLaudon Mis 6ce Ch1010201 Words   |  41 Pagesï » ¿ Management Information Systems, Cdn. 6e (Laudon et al.) Chapter 10 E-Commerce: Digital Markets and Digital Goods 1) E-commerce is ubiquitous, meaning that is it available just about everywhere, at all times. Answer: TRUE Diff: 2 Type: TF Page Ref: 316 AACSB: Reflective thinking skills CASE: Content A-level Heading: 10.1 Electronic Commerce And The Internet 2) Marketspace is a marketplace extended beyond traditional boundaries and removed from a temporal and geographic location. Answer:Read MoreDigital Indi Challenges Of Data Mining Essay1387 Words   |  6 Pagesof Data Mining Implementation in E-Commerce in India Abstract: Data mining has drastically altered how businesses are being operated, especially in the online domain. This paper attempts to review the massive growth of data mining applications to improve the profitability of e-commerce ventures. As consumers increasingly tend to make their purchases online and with many companies investing heavily on improving their web presence, it is only natural thatRead MoreImpact Of E Commerce On Global Economy1352 Words   |  6 PagesIntroduction Impact of E-Commerce on Global Economy It is exciting area especially E-Commerce. The advancement in World Wide Web, computers and mobile wireless communication technologies are transforming the way business is conducted. The success stories of Amazon, eBay are few examples. New technologies have provided the required platform for innovation, growth, shopping convenience, and price advantage due to the boundary less competition. Business leaders across the industry are developingRead MoreThe Big Data Related Activities1487 Words   |  6 Pagesbig data and to the way in which it is used. Growth in big data brings with it many challenges, but it also presents new opportunities. Figure 1, helps understand some of the big data related activities that are taking place in the world with respect to volume of data that is being consumed by these activities over the next 5 years. Fig. 1: Data is predicted to grow to more than 160,000 terabytes in the next 5 years. Apple was Teradata’s â€Å"fastest ever customer to a petabyte† and, is operating a multiple-petabyteRead MoreWebsite Analysis : Web Analytics Essay1032 Words   |  5 PagesWeb analytics helps us to extract the data , analysis and perform report with the available data about a particular website which helps to identify and enhance the website for existing users and to attract new users [1] However, Web Analytics is a procedure for measuring web movement as well as can be utilized as a medium for business and statistical surveying, and to evaluate/enhance the adequacy of a site. For organizations utilizations of web analytics can help them measure the aftereffectsRead MorePrivacy Issues Of Data Mining And Data Publishing1404 Words   |  6 Pagesconcerns regarding their uses have also grown. With the personal data has been mined and published every day, the battle to reclaim the privacy starts vigorously. E-commerce websites harvests information about all the online searches of customers. Social Media exposes the likes and preferences of people, their photos and all their daily activities. Video surveillance monitors the movement of people. The data gets published from health care, censes and other government agencies. With such potential of harvestingRead MoreThe Forces Driving An Organization1621 Words   |  7 Pagesare the forces driving an organization to shift to analytics and be known as an analytical competitor? Analytics is when a particular organization uses large amount of data, predictive modeling, fact-based management, statistical analysis, quantitative analysis, and explanatory reasons in order to drive their business decisions and actions successfully (Harris 12). When an organization is trying to be analytically competitive, they are using analytics systematically and extensively to think outside

Monday, December 23, 2019

Critical Thinking By The Criticalthinking.org Website

Based on the definition given by the Criticalthinking.org website, critical thinking is a mode of thinking which is about any subject or content. In my opinion, the process for critical thinking is to read the text, analyze the text, interpret the meaning of the text and evaluate it whether is there any hidden meaning behind those obvious meaning of the text. Normally, the readers need to think in a more systematic way and break down the information that is given rather than just memorizing it. Memorizing is not going to help us to understand what we read and it will be totally useless and waste our time if we just read the text and don’t even can think critically and understand it. We can’t just listen to one side’s view and be biased towards one another side as we need to listen to both side’s view and think based on our logic and justify that which side are we biased to. Nowadays, critical thinking is widely accepted and being applied to most of the countries around the world. Especially in the United States, it is being heavily applied into the education system in the country and it is also an important element for students to accept it readily. I didn’t feel it that much until the moment I came to University of Colorado Boulder to further my studies and have started my very first class in the college. It was a different environment and atmosphere compared to the study environment back in Malaysia. The study environment here enables me toShow MoreRelatedEssay on Information: Writing and Harvard Business School1122 Words   |  5 PagesColumbia: American Psychological Association . This will be my main reference for all information when I need information on anything that will involve APA styling. I will be using the book as well as accessing all information offered on the APA website directly associated with the book. Bloker, J. (1998). How to Write Your Dissertation in Fifteen Minutes a Day. New York: Owl Books. This book is an excellent guide that I will use on the best way to write an excellent dissertation, while managing

Sunday, December 15, 2019

Night Creature Dark Moon Chapter Eleven Free Essays

â€Å"Relax,† I ordered before Jessie and Leigh could threaten me again. â€Å"I’m not going to flip out and start eating the populace.† At least for another few days. We will write a custom essay sample on Night Creature: Dark Moon Chapter Eleven or any similar topic only for you Order Now â€Å"You can make more,† Damien pressed. â€Å"Can’t you?† â€Å"Sure.† As soon as Edward handed over the formula. I’d planned to send Damien some of the serum before the next full moon. The item had been on my to-do list. Along with a whole bunch of other things I couldn’t quite remember. I stood and crossed to the window, peering at the second floor of the antiques store. A light was on inside, but no shadows moved beyond the curtains. â€Å"Maybe I should see if they’re okay.† â€Å"Why wouldn’t they be?† I turned at Jessie’s words. â€Å"You’ve never told me why you came to Fairhaven.† The four of them exchanged glances. I was getting really sick of being on the outside looking in. I should have been used to it by now, but I wasn’t. â€Å"What?† I demanded. â€Å"We’re not exactly sure,† Damien said. Leigh shushed him, and I shot her a glare. â€Å"If the compound wasn’t toast, you’d be sending me a report. You never had a problem with that before.† â€Å"Before, you weren’t one of them.† â€Å"I was. You just didn’t know it.† Leigh’s fingers curled into fists. â€Å"I can’t believe you let your hair down and run naked in the woods once a month.† â€Å"It isn’t as if I have a choice.† I didn’t want to talk about my affliction – with her or anyone else. â€Å"Can we move on? What’s happening here?† Silence reigned for several ticks of the clock before Will spread his hands. â€Å"People are disappearing.† I wanted to say â€Å"Same old, same old,† but that wouldn’t be helpful, would it? â€Å"Who called Edward?† I asked instead. â€Å"The sheriff.† â€Å"Bodies in the woods? Mangled? Eaten?† â€Å"Not this time.† â€Å"What, then, this time?† â€Å"People go missing,† Leigh chimed in. â€Å"There’s blood but no bodies.† â€Å"We thought the victims were shifting more quickly than usual,† Will said. â€Å"Maybe some new kind of spell.† â€Å"Instant werewolf.† Jessie made the motions of a drum roll with her hands. â€Å"Presto changeo.† My hand went to the talisman in my pocket. Uh-oh. I opened my mouth to explain, and Will jumped in. â€Å"But there hasn’t been an increase in the wolf population to account for the vanishing citizens. Damien says there aren’t any werewolves here at all, except for him.† â€Å"No werewolves?† I glanced at Damien. He shook his head. â€Å"No wolves of any kind.† â€Å"There are wolves all over this part of the state.† â€Å"Except in Fairhaven,† he said. â€Å"The only reason for no wolves in a place like this would be werewolves,† I murmured. â€Å"They don’t like one another.† â€Å"Exactly,† Damien agreed. â€Å"So what does it mean if there’s neither one?† I had no idea, but I doubted it meant anything good. â€Å"No one’s seen any wolves,† Leigh continued, â€Å"but the forest is full of crows.† Crows and wolves work together in nature. Wolves tolerated the birds, even let them feed off their kills. In return, many naturalists believe crows fly ahead of the packs, leading them to prey. The behavior transfers to werewolves. Where there’s a lot of one, there’s a lot of the other. My own fascination with the large, black scavengers had begun in childhood. While many people used them for target practice, I’d drawn pictures of crows over and over again. When I got older, I began to collect figurines, paintings, stuffed animals – like the one Nic had found on my desk. Heckle and Jeckle had been my favorite cartoon. No wonder Edward had kept such a close eye on me. â€Å"When I’m out in the woods,† Damien murmured. â€Å"I sense†¦ I’m not sure. It’s as if something’s coming, or maybe just left. I feel watched even when I’m certain nothing’s there.† I’d say he was paranoid, except I’d felt something, too. â€Å"What were you shooting at when I got here?† â€Å"Shadows,† Jessie muttered. â€Å"We’re all spooked.† Which wasn’t like them. Werewolf hunters were the least spookable creatures on earth. They had to be. She saw my expression, must have read my mind. â€Å"I can kill anything I see. But what am I supposed to do when I know it’s there, but it isn’t?† I had no answer for that. â€Å"Axe you sufficiently brought up to speed, Elise?† Edward’s voice from the doorway made me gasp and spin around. â€Å"I hate when you sneak up on me.† That he could was amazing in itself. I had the hearing of a wolf. I glanced past Edward, searching for Nic, my mind already scrambling for a way to explain our discussion of disappearing bodies. But my boss was alone, and that made me more nervous. â€Å"What did you do with him?† â€Å"Who?† â€Å"You know damn well who!† His eyes narrowed, and I swallowed the rest of the angry words that threatened to spill off my tongue. They’d get me nowhere. â€Å"Where is Agent Franklin, sir?† â€Å"Where do you think?† My heart skipped, then lunged into my throat. â€Å"You didn’t.† â€Å"That depends on what you think I did.† â€Å"You can’t go around killing FBI agents.† He frowned. â€Å"Why would I do that?† â€Å"Because your answer to every problem is to shoot it?† â€Å"It has always worked well for me.† I couldn’t just stand around while Nic might be dead or dying. I started for the door, and Edward yanked me back. â€Å"Relax. He is safe.† He dropped my arm immediately, surreptitiously rubbing his fingers against his black pants. Though I’d been expecting it, Edward’s typical reaction to being anywhere near me hurt more than usual. The only man who had ever touched me gently, willingly, was Nic – and he didn’t know what I was. Seeing him again made me long for what I didn’t, and couldn’t, have. â€Å"By safe you mean – â€Å" â€Å"Alive,† Edward snapped. â€Å"I am not completely senile. Yet.† † Yet being the operative word,† Jessie muttered. I tensed, anticipating an explosion of German obscenities. Instead, Edward smirked, winked, and the two of them chuckled. I stifled my childish jealousy. He would never care for me the way he cared for Jessie or Leigh, and I’d better get used to it. Edward glanced at the Fitzgeralds. â€Å"I thought I sent you two†¦ elsewhere.† â€Å"We wanted to hear the story of why your second in command turns furry every month.† The last flicker of humor fled his eyes as he glanced at me. â€Å"You told them everything?† Not everything. There were certain secrets only Edward and I could ever know. â€Å"I told them the basics so they wouldn’t shoot me.† â€Å"They were ordered to leave you alone.† He fixed the others with a glare. â€Å"Elise is beyond your reach. She answers only to me.† â€Å"La-di-dah,† Jessie mumbled. â€Å"There isn’t a scratch on her.† â€Å"But not for lack of trying,† Will countered, taking her hand when she would have slugged him. Edward scowled at Jessie, then Leigh. â€Å"You are not to play games with Elise. No physical fighting, do you understand?† A warm glow began in my chest. Edward was worried about me. â€Å"She could kill you without even trying,† he continued, and the glow died. He was worried about them. I should have known. â€Å"Can I talk to you?† Damien jerked his head. â€Å"Outside?† I looked at the others, but they were studiously avoiding my gaze. Except for Edward, who merely rolled his eyes and shrugged. â€Å"Sure.† Damien preceded me onto the porch, where he pondered the sky for several moments. I didn’t press. I was just glad to get away from everyone else for a while. â€Å"There’s more to your story than you told them,† he said at last. â€Å"Isn’t there always?† Our eyes met and a flash of understanding, a tug of camaraderie, passed between us. â€Å"What is Mandenauer to you?† he asked. I was surprised by the question. â€Å"My boss.† Edward was the father I didn’t have, the mother, too. Even if he didn’t love me, more than likely hated me, he was the only constant I’d ever had in my life. â€Å"How close are you, really?† he murmured. At first I thought he was asking again about me and Edward. Did everyone believe the old man and I were lovers? Hadn’t they seen the way he treated me? Worse than a junior agent. Then I studied Damien’s face and understood he meant something else entirely. â€Å"To an antidote?† I didn’t wait for his answer. This was why he’d asked me outside. He didn’t want Leigh to know if I was further away from a cure than they thought. â€Å"I haven’t discovered anything new,† I admitted. Dismay filled his eyes, and I touched him before I thought not to. Power blazed – bright, blinding, painful. I snatched my hand away. â€Å"We’re going to have to watch that,† I said. â€Å"It hurts† I’d never touched any of my test subjects skin to skin. I couldn’t afford to have them know what I was. But there’d been other times, other places, where I had touched a werewolf in human form. They hadn’t lived to see another moon, or blow my cover, but my secret was safe with Damien. â€Å"I will find a cure,† I promised. â€Å"Count on it.† â€Å"I feel better knowing†¦Ã¢â‚¬  His voice drifted off. â€Å"That I have a personal interest?† Damien nodded. No one could desire a cure more than me – not even Damien. Leigh loved him despite what he was. I didn’t have that luxury. No one loved me, and while I was like this, no one would. â€Å"I never doubted you weren’t working as hard as you could,† Damien said. â€Å"But I did.† Neither one of us jumped at the sound of Leigh’s voice. I’d heard her coming, and so had Damien. She wasn’t as sneaky as Edward. Not yet. â€Å"Leigh – † Damien began. â€Å"Let me talk.† She moved onto the porch and stood between us. â€Å"I never trusted you, Doctor, and now I know why. Werewolves murdered my family. I don’t like them.† â€Å"Yet you’re married to one.† Her eyes flashed, and her fingers curled into fists. â€Å"We can’t help who we love.† â€Å"I know.† Leigh cast me a quick glance, and her fingers relaxed. I understood her dilemma. She both loved Damien and hated his curse. She wanted him cured, needed him to be, and she had to depend on someone she distrusted to do it. Whoever said life was fair? â€Å"She saved you, Leigh. Show a little gratitude.† â€Å"I thanked her. What do you want?† Leigh tilted her head in my direction. â€Å"A hug?† â€Å"I’ll pass.† I’d never been big on physical contact. Never knew when a simple touch, like Damien’s, could give me a blistering headache. My gaze was drawn to the throbbing pulse at the base of Leigh’s neck – or an intense desire for red meat. I might be able to control my craving for human blood through medication, but that didn’t mean I wasn’t blindsided by a longing for it at the oddest moments. Leigh didn’t trust me? Hell, I didn’t trust myself. â€Å"Just so we’re clear,† she continued. â€Å"I want you to quit dicking around and fix him. That’s what you’re paid for.† â€Å"Leigh – † Damien sounded exasperated. â€Å"I’d get more done if you weren’t bugging me,† I interrupted. â€Å"Don’t you have someone to kill?† â€Å"Always.† â€Å"Have a nice trip.† A modicum of respect flickered in her eyes before she took Damien’s hand. â€Å"We’ll be in Washington.† â€Å"D.C.?† Which reminded me of Nic. The Fury remained parked in front of the tavern. Where was he? â€Å"Washington State,† Leigh answered. â€Å"What’s there?† â€Å"Trees. Wolves. Dead people. There’s been a significant increase in werewolf activity pretty much everywhere over the past few days. Edward’s cell phone’s ringing like crazy. Drove him bat shit when he couldn’t get hold of you.† â€Å"Strange that there’s so much action when the moon isn’t even full,† I murmured. â€Å"They’re up to something,† Leigh said, â€Å"but then, they always are.† With a nod that passed for both agreement and good-bye, Leigh headed for the car, stopping at the bottom of the porch steps when Damien didn’t follow. â€Å"I’ll be right there,† he said. With one more glare for me, Leigh climbed into the passenger seat. â€Å"I was thinking,† Damien continued. â€Å"Maybe the werewolves are after more than Mandenauer. If they want you or the information you’ve gathered, they’ll be back as soon as they know blowing up the compound didn’t do them any good.† I considered the silver bullet that had nearly hit me in the head. â€Å"I think they already know.† â€Å"Where’s your research now?† â€Å"Edward has it.† Damien shot a quick, concerned glance at the cabin. Hell. What if someone killed Edward before he could tell me where the information was? The thought sent a shiver from my head down to my toes. I was surprised they hadn’t tried already, though Edward wasn’t easy to eliminate, and the werewolves, despite their pack nature, weren’t exactly organized. Unlike real wolves, they didn’t take orders well. There was always a new alpha fighting to be in charge, if not of a certain pack, then the world. Thus far they’d never joined together with any success. If they did, we might be in serious trouble. And wouldn’t killing my boss, then putting an end to a cure for lycanthropy be a good way for an up-and-coming leader to gain everyone’s loyalty? I didn’t like the direction of my thoughts. I had to find Edward and quick. â€Å"Be careful,† Damien said. Instead of shaking his hand – we both knew what a mistake that would be – I murmured, â€Å"You, too,† before slipping into the house. How to cite Night Creature: Dark Moon Chapter Eleven, Essay examples

Saturday, December 7, 2019

Network Needs For Data Communication Samples †MyAssignmenthelp.com

Question: Discuss about the Network Needs For Data Communication. Answer: Importance of Physical layer: The physical layer refers to the first layer of the Open System Interconnection Modelor the OSI model. The bit-level transmission is managed in this layer. Transmission between physical devices is controlled by this layer. The mechanical or electrical interface that is needed for the communication between the communicating devices is also provided by this layer (Chen et al. 2015). The layer is responsible for dealing with the various physical connections that the network needs for data communication. It includes the wireless transmission, cabling standards, various types of connectors, interface cards and many more as needed by the network (Goseling, Gastpar and Weber 2015). Error free communication: The data that hardware devices generate are optimized by the layer to make it suitable for digital communication. Without the optimization the data will communication may not be effective due to discrete timing over the network. This optimization of data timing to make it suitable for the transmissions makes the communication error free. The optimization is done using the line coding technique (Zou et al. 2015). The layer also allows for interleaving of bits which helps to improve the error correction. Robust communication: The layer helps to detect the carrier collision. It can sense if there are sufficient carrier is available for data communications and this helps to avoid carrier congestion created due to the data packets undelivered for unavailability of data carriers and thus ensures robust communication (Kapetanovic, Zheng and Rusek 2015). Reliable communication: The layer with the help of Signal equalization and multiplexing technique helps in ensuring reliable communication (Mukherjee et al. 2014). Importance of Data-Link layer: The data link layer is the second layer in the seven layer OSI model. It helps to connect two nodes that are involved in the data communication. The connection is made using the logical link. The link that is established between the nodes is also terminated by the layer once the communication is completed (Marquardt 2017). Ease of communication: The layer provides end-to-end message delivery with proper acknowledgement of message delivery, thus ensures ease of communication (Cui , Yu and Yan 2016). Error free communication: In order to ensure error free transmission the layer control the traffic generated by the data frame. It communicate with the transmission node for telling it to back -off when there is no availability of buffer message (Kizza 2017). Robust communication: The layer helps in detecting the any errors occurred in the physical layers and based on that the errors are acknowledged and again retransmitted by rectifying the errors and making necessary correction. Thus ensures error free and robust communication (Ding and Jiang 2016). Importance for lower layers: The data link layer helps in error-free data transmission between the nodes with proper control over the physical layer that resides bellow the data link layer in the OSI model. The error free transmission helps layers above it in assuming transmission which is virtually error free (Zafar and Ejaz 2016). Importance of internet layers: The internet layer lies above the physical and data link layer. The layer plays an important role in data communication and also helps in managing the layers below it (Blekneni et al. 2016). Error free communication: The layer helps in controlling the subnet traffic. Whenever the any router in this layer exceeds the buffer limit the layer sends an instruction to the transmission station to hold on the transmission to avoid error in data communication (Qadir et al. 2015). Robust communication: The layer allows for frame fragmentation that helps in determining the maximum transmission unitor the MTU for the router that is used for the downstream communication. It checks if the data fragment size is less or greater than the transmission unit size. In case the fragment size is greater than the transmission unit size, then fragmentation is done on the data frame and at the time of receiving the data at the destination site the data is again reassembled to keep the data integrity and robustness of the system (Kalakech 2016). Importance for lower layers: The network layer control how the subnet will operate. It decides the allocation of the physical path for the data communication to take place to facilitate the network conditions and the service priority. The data link layer acts as an interface between the physical layer and network layer (Garman and Sherman 2015). The data link layer with the help of the network layer helps for smooth operation of the physical layer by proper resource allocation of the physical layer entities allowing for robust and error free execution of the physical layer components with proper resource management Drills: a) Boolean operation on bit patterns: not 0010111000101100 : 1101000111010011 0010111000101100 or 1110000011100001: 1110111011101100 iii. 0010111000101100 and 1110000011100001: 10000000100000 1100111000111011 and 0110111100011100: 100111000011000 b) What are the subnet masks for the following slash address blocks Slash address blocks Subnet masks /8 255.0.0.0 /15 255.254.0.0 c) Address mask validity and slash forms for the correct address masks: Address masks validity Slash forms i) 255.255.248.0 valid /21 ii) 255.224.252.0 Not valid NA iii) 255.255.255.224 valid /27 iv) 255.255.156.0 Not valid NA The criteria of a valid subnet mask is that when it is converted to binary the binary equivalent have to consists of only consecutive 1's and then 0's, but no intermittent mixing is allowed. The binary equivalent of the address mask 255.224.252.0 is 11111111.11100000. 11111100. 00000000 which is not valid according to the above mentioned criteria. The binary equivalent of the address mask 255.255.156.0 is 11111111. 11111111. 10011100.00000000 which is also not valid. d) Number of hosts in the following address blocks: Address blocks Number of hosts /13 524272 /26 62 Controlled access and contention-based access to a physical medium : Controlled access grant permission to the transmitting stations to enable it for communication. Only that station granted for permission will be allowed to send data node in the communication. This helps to control the traffic and collision of message is also avoided in this way (Thilina et al. 2015). Contention refers to media access method that is used for sending broadcasting medium. In this method any transmitting station can send data at any time. However, this might create collision in the network. In order to avoid the collision carrier sensing mechanism is used. References: Belkneni, M., Bennani, M.T., Ahmed, S.B. and Kalakech, A., 2016, October. Network Layer Benchmarking: Investigation of AODV Dependability. InInternational Symposium on Computer and Information Sciences(pp. 225-232). Springer, Cham. Chen, G., Gong, Y., Xiao, P. and Chambers, J.A., 2015. Physical layer network security in the full-duplex relay system.IEEE transactions on information forensics and security,10(3), pp.574-583. Cui, L., Yu, F.R. and Yan, Q., 2016. When big data meets software-defined networking: SDN for big data and big data for SDN.IEEE network,30(1), pp.58-65. Ding, R. and Jiang, H., 2016. Simulation of data-link networks used in cooperative terminal guidance. InElectronics, Electrical Engineering and Information Science: Proceedings of the 2015 International Conference on Electronics, Electrical Engineering and Information Science (EEEIS2015)(pp. 504-511). Garman, S. and Sherman, R., 2015. Automation at the Network Layer. Goseling, J., Gastpar, M. and Weber, J.H., 2015. Random access with physical-layer network coding.IEEE Transactions on Information Theory,61(7), pp.3670-3681. Kalakech, A., 2016, September. Network Layer Benchmarking: Investigation of AODV Dependability. InComputer and Information Sciences: 31st International Symposium, ISCIS 2016, Krakw, Poland, October 2728, 2016, Proceedings(Vol. 659, p. 225). Springer. Kapetanovic, D., Zheng, G. and Rusek, F., 2015. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks.IEEE Communications Magazine,53(6), pp.21-27. Kizza, J.M., 2017.Guide to computer network security. Springer. Marquardt, R.R., 2017. Data Link Layer Trust Signaling in Communication Network.filed Jul,11. Mukherjee, A., Fakoorian, S.A.A., Huang, J. and Swindlehurst, A.L., 2014. Principles of physical layer security in multiuser wireless networks: A survey.IEEE Communications Surveys Tutorials,16(3), pp.1550-1573. Qadir, J., Ali, A., Yau, K.L.A., Sathiaseelan, A. and Crowcroft, J., 2015. Exploiting the power of multiplicity: a holistic survey of network-layer multipath.IEEE Communications Surveys Tutorials,17(4), pp.2176-2213. Thilina, K.M., Tabassum, H., Hossain, E. and Kim, D.I., 2015. Medium access control design for full duplex wireless systems: challenges and approaches.IEEE Communications Magazine,53(5), pp.112-120. Zafar, S. and Ejaz, U., 2016. SCTP-aware Link Layer Retransmission Mechanism for Smart-grid Communication Network.Engineering, Technology Applied Science Research,6(4), pp.1093-1098. Zou, Y., Zhu, J., Wang, X. and Leung, V.C., 2015. Improving physical-layer security in wireless communications using diversity techniques.IEEE Network,29(1), pp.42-48.