This document contains discussion questions, instructions, and assignments for a course on computer networking. It includes questions about WAN protocols, VoIP services, quality of service for multimedia networks, MPLS protocols, network design, IP addressing schemes, network security risks, and recommendations for VLAN implementation and network equipment for a manufacturing company. Students are asked to write responses analyzing topics and drafting network plans.
1. Click this link Now for Complete Course
https://bitly.com/1wyQ9jh
This file comprises NTC 240 Week 4 Vocabulary Definitions
of Terms
Computer Science - General Computer Science
Discussion Question 1
Write a 250- to 300-word short-answer response to the
following:
· What are two WANs that you have used? What equipment
or devices were used? Describe the network design and
configuration? Respond to your classmates, and discuss how
your examples differ.
Discussion Question 2
Write a 250- to 300-word short-answer response to the
following:
· Chou (2009) discusses a very common situation in business,
communications between branch offices, and the home
office data center. The author presents two methodologies
to improve throughput between the offices and the data
center: data compression and caching. Analyze and discuss
the common types of data used in your company to test the
suitability of these methods. Additionally, discuss where, in
general, data compression can be used and where data
compression cannot be used.
Discussion Question 3
Write a 250- to 300-word short-answer response to the
following:
· Soares, et al. (2008) review all the present protocol
2. segments necessary for VoIP telephony. Protocol such as
Session Initiation Protocol (SIP) and H.323 are prevalent but
have limitations. Analyze and discuss the limitations of SIP
and H.323 as presently used and include in your discussion
effects of the proposed Advanced Multimedia System (AMS)
protocol and whether it will fix the existing problems.
Discussion Question 1
Write a 250- to 300-word short-answer response to the
following:
· What are the advantages and disadvantages of VoIP? What
VoIP services exist? What equipment may be necessary in a
small office/home office (SOHO) and large enterprise
environment?
Discussion Question 2
Write a 250- to 300-word short-answer response to the
following:
· The Internet does not guarantee delivery. Multimedia
services such as Internet Protocol television (IPTV) require
levels of quality of service (QoS) for acceptable performance.
Doverspike et al. (2009) have created a set of internal
protocols that help create a QOS scenario to allow IPTV
signals to be delivered in an acceptable fashion. Pick any two
of the author’s techniques and show how they contribute to
the creation of a data stream with QOS.
Discussion Question 3
Write a 250- to 300-word short-answer response to the
following:
· Based on the Khan and Tahboub (2009) article, analyze and
discuss the advantages and disadvantage of the MPLS
protocol and what services are most likely to use that
protocol in the network.
3. Learning Team Instructions
Network Design for Acme Manufacturing Network Draft
Draft a logical network drawing for Acme to depict the
recommended WAN. Include the recommendations for the
type of leased lines the company should choose at each
location.
Draft recommendations on the type of telecommunications
systems that would work best for Acme: private branch
exchange (PBX) or VoIP.
Individual
OSI Model Paper
Write a 3-4 page paper (400 words per page) describing the
open systems interconnection (OSI) model and how it relates
to a network. Your response should include answers to the
following:
· On which layers of the OSI model do WAN protocols
operate?
· What are some of these protocols?
· On which OSI layers do switches and routers operate?
· If routers reside at more than one layer, what is the
difference between the OSI layers?
Discussion Question 1
Write a 250- to 300-word short-answer response to the
following:
· Conduct an Internet search to locate an example of a
private network and a public network. How is each network
used? What are the pros and cons of each?
Discussion Question 2
Write a 250- to 300-word short-answer response to the
following:
· Explain sub-netting in a way a nontechnical client would
4. understand. Add clarification to other student explanations.
Discussion Question 3
Find a web site, an article on a web site or a peer reviewed
article that is related to this weeks material. Write a 250-300
word synopsis what you have found and explain why you
think it is relevant. Make sure you include the references
and links to the article or web site.
Learning Team Instructions
Network Design for Acme Manufacturing Address Draft
Draft the IP address scheme, including the range of IP
addresses, broadcast addresses, and subnets.
Draft a VLAN to appropriately address Acme’s concerns that
departments that are not grouped together are logically
connected.
Monday
Individual
Short Answers
Provide answers to each of the following questions:
Identify the functions of a CSU/DSU. How are they used in a
corporate environment?
Integrated services digital networks (ISDN) are sometimes
used in locations that do not support DSL or cable modem
connections. Your choices may be analog modems or an ISDN
connection in those remote locations. Describe three
benefits ISDNs have over regular dial-up modem
connections.
Compare and contrast packet and circuit switching. Which is
more commonly used? What are the advantages and
disadvantages of each?
Describe the three main types of firewalls. Explain how each
type protects the network. Determine which firewall is the
5. most efficient and why.
Your answers should be 3-4 pages long in total (400 words
per page).
Discussion Question 1
Write a 250- to 300-word short-answer response to the
following:
· What are some of the greatest security risks to a WAN?
Provide an example of one risk and discuss the potential
consequences and possible precautions.
Discussion Question 2
Write a 250- to 300-word short-answer response to the
following:
· Network attacks come in many forms. Broadley, et al.
(2009) point out a new method where the attacker creates a
covert communication channel by changing the timing of part
of a real signal and sneaking in. Analyze and discuss whether
your system at work could be attacked by this methodology
and if you think so what are you going to do about it?
Discussion Question 3
Find a web site, an article on a web site or a peer reviewed
article that is related to this weeks material. Write a 250-300
word synopsis what you have found and explain why you
think it is relevant. Make sure you include the references
and links to the article or web site.
Learning Team Instructions
Network Design for Acme Manufacturing Equipment Draft
Draft recommendations on network equipment that should
be placed at each location. Also consider equipment based
on the teleconferencing needs.
Draft a recommendation on how to secure the network.
Make appropriate recommendations for wireless at Acme.
6. Monday
Individual
VLAN Paper
Consider the following scenario:
Your Company moves into a new building. Marketing is on
the first floor, engineering is on the second floor, operations
are on the third floor, and the call center is on the fourth
floor. The LAN is organized neatly, with each floor having i...
https://bitly.com/1wyQ9jh