Discussion Board
Deliverable Length: 4 – 6 paragraphs
An organization has a number of tools available when determining how best to address performance issues on their network. The organization can use subnetting or they can use segmentation.
Discuss the pros and cons of each.
Provide examples of when each would be appropriate.
Individual Project
Deliverable Length: 4 – 5 pages
The OSI Layer 3 (Network Layer) is one of the layers that perform packet segmentation. The OSI Layer 3 is roughly equivalent to the Internet Layer of the TCP/IP model and the Layer 4 (Transport Layer) of the OSI model is roughly equivalent to the Host-to-Host layer of the TCP/IP model. The above two layers perform network segmentation. Based on the above information, answer the following questions.
(a) Describe in detail how packets are segmented by the Host-to-host layer (Transport Layer) Internet Layer of the TCP/IP model.
(b) Do all packets arrive at their destination in the order in which they were segmented and transmitted? Why or why not?
(c) Describe how segmented packets are re-arranged or reassembled at the packets’ destination to ensure that received segmented packets match the order in which they were segmented and transmitted.
(d) How are errors handled during transmission of segmented packets?
(e) What's the difference between a TCP segment and a TCP packet?
Please answer the following questions and requirements to write your paper of 4–5 pages. As you answer each question, you must provide support or evidence that will enhance and empirically prove your answers. Academic IT articles or real-life IT findings that are not found in journals or other academic sources must be used in supporting your answers. Please use APA style for all cited sources, including your reference page.
Please include the following elements in your paper:
A title page
A report that includes the following:
An introduction to the contents of the report
Detailed explanations about the items listed regarding network segmentation, error handling, TCP segments and TCP packets.
Please cite your references in APA format.
Weeks 3 and 4
Individual Project :
Deliverable Length : 3-5 pages
Please answer the following questions and requirements to write your 3–5 page paper. As you answer each question, you must provide support or evidence that will enhance and empirically prove your answers. Academic IT articles or real-life IT findings that are not found in journals or other academic sources must be used in supporting your answers. Please use APA style for all cited sources, including your reference page.
The following is a case study about a design company.
You are a senior network administrator for a networking solutions firm. Years ago, you installed a small LAN at a design company. It is growing fast and needs your networking solutions firm to upgrade its network. You assigned Liz to the job. That afternoon, while preparing to work on a lab ass.
1. Discussion Board
Deliverable Length: 4 – 6 paragraphs
An organization has a number of tools available when
determining how best to address performance issues on their
network. The organization can use subnetting or they can use
segmentation.
Individual Project
Deliverable Length: 4 – 5 pages
The OSI Layer 3 (Network Layer) is one of the layers that
perform packet segmentation. The OSI Layer 3 is roughly
equivalent to the Internet Layer of the TCP/IP model and the
Layer 4 (Transport Layer) of the OSI model is roughly
equivalent to the Host-to-Host layer of the TCP/IP model. The
above two layers perform network segmentation. Based on the
above information, answer the following questions.
(a) Describe in detail how packets are segmented by the Host-
to-host layer (Transport Layer) Internet Layer of the TCP/IP
model.
(b) Do all packets arrive at their destination in the order in
which they were segmented and transmitted? Why or why not?
(c) Describe how segmented packets are re-arranged or
reassembled at the packets’ destination to ensure that
received segmented packets match the order in which they were
segmented and transmitted.
(d) How are errors handled during transmission of segmented
packets?
(e) What's the difference between a TCP segment and a TCP
packet?
2. Please answer the following questions and requirements to write
your paper of 4–5 pages. As you answer each question, you
must provide support or evidence that will enhance and
empirically prove your answers. Academic IT articles or real-
life IT findings that are not found in journals or other academic
sources must be used in supporting your answers. Please use
APA style for all cited sources, including your reference page.
Please include the following elements in your paper:
network segmentation, error handling, TCP segments and TCP
packets.
Please cite your references in APA format.
Weeks 3 and 4
Individual Project :
Deliverable Length : 3-5 pages
Please answer the following questions and requirements to write
your 3–5 page paper. As you answer each question, you must
provide support or evidence that will enhance and empirically
prove your answers. Academic IT articles or real-life IT
findings that are not found in journals or other academic
sources must be used in supporting your answers. Please use
APA style for all cited sources, including your reference page.
The following is a case study about a design company.
solutions firm. Years ago, you installed a small LAN at a design
company. It is growing fast and needs your networking
solutions firm to upgrade its network. You assigned Liz to the
job. That afternoon, while preparing to work on a lab
assignment from her class in Cisco routing, Liz mentions that
she would use a router to increase the performance of the design
company's network because routers are better than bridges.
Explain to Liz when and where a router would be the best
3. choice. Under what circumstances would a router not be the best
choice? Provide examples to clarify your points.
down to examine the lab materials on Liz's desk. Janis thinks
the design company should use a bridge to solve the problem.
She reminds you that the design company has a relatively small
network and that a router would be more equipment than
necessary. The design company's network is using nonroutable
protocols. What do you tell Janis? Provide examples in your
explanation and recommendations.
classes in Cisco routing, and he enjoys the
hands-on exercises in his class. As he reviews his notes for that
night's class, he is unsure of the concept of routing tables.
Explain to Luke what kind of information is kept in a router's
routing table and what it is used for. What 2 methods can be
used to build these tables? Provide examples in your
explanation to clarify and accentuate your explanation.
Be sure to cite all references using APA style.
Discussion Board
Deliverable Length: 4 – 6 paragraphs
Networks use different routing protocols to select the best
routing path to reach other networks. A distance-vector routing
uses a set of protocols (IPX, SPX, IP, or DECnet) and a distance
calculation through an outgoing network interface to select the
most efficient path to a network destination.
Link-state routing protocols track the connection status and type
to each link that comes from a network. The criteria for
selection are links with greater hops and faster mediums. Those
are considered the most efficient links that will be used by the
routing protocols.
and use both distance-vector and link-state protocols? Why?
tasks of these protocols? What is the future for routing through
4. these protocols? Explain.
In your own words, please post a response to the Discussion
Board and comment on other postings. You will be graded on
the quality of your postings.
For assistance with your assignment, please use your text, Web
resources, and all course materials.
Weeks 5 and 6
Discussion Board
Deliverable Length: 4 – 6 paragraphs
This is Mark's first time configuring routers and switches. Mark
thought it was simply a matter of installing them, and they
would just work. However, now you are reading a manual on
configuring routers and switches. The first thing you notice is
that you are configuring different elements. For example, in
routers, you must configure the router’s hostname and BRI
interface. For switches, the configuration must occur on the
switch's host name, system name, and switching mode, just to
name a few of the configurations. Mark might need some help.
Please post an answer to the following questions. Also, support
your answers with academic or real IT examples to accentuate
your point. Also, you must provide at least 1 feedback post to
one of your classmates.
needed? Why?
e configuration process of
routers and switches can be made easier, especially for
nonexperts who want to play around with routers and switches?
How? Provide an example if you feel that it can be
accomplished. If you do not think it can be accomplished, then
provide a reason as to why not.
In your own words, please post a response to the Discussion
Board and comment on other postings. You will be graded on
the quality of your postings.
For assistance with your assignment, please use your text, Web
5. resources, and all course materials.
Weeks 7 and 8
Discussion Board
Deliverable 4-6 paragraphs
Research the Web and look up information on linked-state
routing protocol. Describe how linked-state protocol routing
works. Discuss 2 examples of linked-state routing protocols.
Explain how routing protocols differ from routed protocols.
Offer examples.
Discussion Board Assignment Guidelines:
research linked-state routing protocols.
owing questions:
o How do routing protocols work?
o What are 2 examples of linked-state routing protocols?
o What is 1 example where a linked-state routing protocol
should not be used?
answers to the three questions above.
Board.
In your own words, please post a response to the Discussion
Board and comment on other postings. You will be graded on
the quality of your postings.
Individual Project
Deliverable : 4-7 Pages
Discuss the importance of using a routing protocol and explain
general functionality. Router Information Protocol (RIP) is a
distance-vector routing protocol than can be used by a router to
send data from one network to another. What are the demerits of
distance vector routing protocols in general?
Assignment Guidelines:
research distance-vector routing protocols, with a high
concentration on the versions of Router Information Protocol
6. (RIP).
paper:
o What is the purpose of a routing protocol?
o What is a distance-vector routing protocol?
o What are the advantages and disadvantages of distance-vector
protocols?
o What is RIP?
o What are the two versions of RIP, and what are their specific
purposes?
o What are the limitations of RIP?
page word document.
Your submitted assignment (125 points) must include the
following:
-spaced Microsoft Word document,
excluding title page and reference section. All references should
be in APA format. You may find using section headings and
bullets make the paper more readable.
Grading:
You will be graded on the accuracy of your answers and the
thoroughness of your RIP, RIPv1, RIPv2, and distance-vector
routing protocol descriptions.
Please submit your assignment.
For assistance with your assignment, please use your text, Web
resources, and all course materials.
Weeks 9 and 10
Individual Project
Deliverable : 4-6 Pages
A company wants to create 4 separate offices across the globe.
The managers want to be able to connect these offices over the
Internet, and they want to make sure that each network is
7. available to each other. That is, they want the routing
information of all 4 networks to be available at each site so that
any employee can go to any site and work from it, but they are
worried about passing traffic over the Internet and how to
monitor the traffic for security and compliance reasons.
Please answer the following questions and requirements to write
your 3–5 page paper. As you answer each question, you must
provide support or evidence that will enhance and empirically
prove your answers. Academic IT articles or real-life IT
findings that are not found in journals or other academic
sources must be used in supporting your answers. Please use
APA style for all cited sources, including your reference page.
scuss the latest implementations of routing protocols that
would be used in the company's wide area network and the
Internet.
How does each protocol work in a WAN?
n monitoring passing traffic over
the networks and Internet under safe and secure conditions?
Provide examples of how it would be done and why it would be
done in this fashion.
network from the idea and requirements of the company, what
would be your recommendation? Why would you recommend
this alternative?
Be sure to reference all sources using APA style.
Discussion Board
Deliverable 4-6 pages
Todd, a junior network administrator, is given the task of
providing feedback on routing, specifically the routed,
nonroutable and routing protocols. It should also address
routing congestion. Todd knows that nonroutable protocols
cannot go across local area network (LAN) boundaries and that
8. routed ones can transport data across networks. Todd needs
help, however, to make a complete feedback report. .
network congestion? Why?
protocols? Is there a legitimate reason for having nonroutable
protocols? Do you think they can be replaced and with another
type of protocol or innovative system?
and routing protocols. Provide examples.
In your own words, please post a response to the Discussion
Board and comment on other postings. You will be graded on
the quality of your postings.
For assistance with your assignment, please use your text, Web
resources, and all course materials.
Ip5
Create a force-field analysis to address the leadership team's
concerns about what else it should be doing and to what it has
not yet paid enough attention. The analysis has been started
below.
HELPING FORCES
HINDERING FORCES
List here what will help the team address issues on which it has
not yet put a priority focus.
Consider how to include any item that needs to be addressed as
an action that would be listed here.
Leadership team effectiveness
List here the problems it might need to address or the things
that will cause the team to fail in making the change projects it
has identified as working well.
Any resistance factors from the organization or the board would
need to go here.
9. Deliverable Length: 4 – 6 paragraphs
An organization has a number of tools available when
determining how best to address performance issues on their
network. The organization can use subnetting or they can use
segmentation.
Deliverable Length: 4 – 6 paragraphs
Networks use different routing protocols to select the best
routing path to reach other networks. A distance-vector routing
uses a set of protocols (IPX, SPX, IP, or DECnet) and a distance
calculation through an outgoing network interface to select the
most efficient path to a network destination.
Link-state routing protocols track the connection status and type
to each link that comes from a network. The criteria for
selection are links with greater hops and faster mediums. Those
are considered the most efficient links that will be used by the
routing protocols.
and use both distance-vector and link-state protocols? Why?
tions that can perform the
tasks of these protocols? What is the future for routing through
these protocols? Explain.
Deliverable Length: 4 – 6 paragraphs
This is Mark's first time configuring routers and switches. Mark
thought it was simply a matter of installing them, and they
would just work. However, now you are reading a manual on
configuring routers and switches. The first thing you notice is
that you are configuring different elements. For example, in
routers, you must configure the router’s hostname and BRI
10. interface. For switches, the configuration must occur on the
switch's host name, system name, and switching mode, just to
name a few of the configurations. Mark might need some help. .
ot be
needed? Why?
routers and switches can be made easier, especially for
nonexperts who want to play around with routers and switches?
How? Provide an example if you feel that it can be
accomplished. If you do not think it can be accomplished, then
provide a reason as to why not.
Deliverable 4-6 paragraphs
Research the Web and look up information on linked-state
routing protocol. Describe how linked-state protocol routing
works. Discuss 2 examples of linked-state routing protocols.
Explain how routing protocols differ from routed protocols.
Offer examples.
o How do routing protocols work?
o What are 2 examples of linked-state routing protocols?
o What is 1 example where a linked-state routing protocol
should not be used?
Todd, a junior network administrator, is given the task of
providing feedback on routing, specifically the routed,
nonroutable and routing protocols. It should also address
routing congestion. Todd knows that nonroutable protocols
cannot go across local area network (LAN) boundaries and that
routed ones can transport data across networks. Todd needs
help, however, to make a complete feedback report.
Do you think the term routing congestion can be replaced by
network congestion? Why?
protocols? Is there a legitimate reason for having nonroutable
11. protocols? Do you think they can be replaced and with another
type of protocol or innovative system?
ifferences between routed, nonroutable
and routing protocols. Provide examples.