What are two WANs that you have used? What equipment or devices were used? Describe the network design and configuration? Respond to your classmates, and discuss how your examples differ.
DQ 1· What are two WANs that you have used? What equipment or devices were used? Describe the network design and configuration? Respond to your classmates, and discuss how your examples differ.
DQ 2 · Chou (2009) discusses a very common situation in business, communications between branch offices, and the home office data center. The author presents two methodologies to improve throughput between the offices and the data center: data compression and caching. Analyze and discuss the common types of data used in your company to test the suitability of these methods. Additionally, discuss where, in general, data compression can be used and where data compression cannot be used.
DQ 3 Soares, et al. (2008) review all the present protocol segments necessary for VoIP telephony. Protocol such as Session Initiation Protocol (SIP) and H.323 are prevalent but have limitations. Analyze and discuss the limitations of SIP and H.323 as presently used and include in your discussion effects of the proposed Advanced Multimedia System (AMS) protocol and whether it will fix the existing problems.
NTC249 Wide Area Networking Concepts
Week 2 Discussion
DQ1 What are the advantages and disadvantages of VoIP? What VoIP services exist? What equipment may be necessary in a small office/home office (SOHO) and large enterprise environment?
DQ2 The Internet does not guarantee delivery. Multimedia services such as Internet Protocol television (IPTV) require levels of quality of service (QoS) for acceptable performance. Doverspike et al. (2009) have created a set of internal protocols that help create a QOS scenario to allow IPTV signals to be delivered in an acceptable fashion. Pick any two of the author’s techniques and show how they contribute to the creation of a data stream with QOS.
DQ 3 Based on the Khan and Tahboub (2009) article, analyze and discuss the advantages and disadvantage of the MPLS protocol and what services are most likely to use that protocol in the network.
NTC249 Wide Area Networking Concepts
Week 3 Discussion
DQ1 Conduct an Internet search to locate an example of a private network and a public network. How is each network used? What are the pros and cons of each?
DQ 2 Explain sub-netting in a way a nontechnical client would understand. Add clarification to other student explanations.
DQ 3 Find a web site, an article on a web site or a peer reviewed article that is related to this weeks material. Write a 250-300 word synopsis what you have found and explain why you think it is relevant. Make sure you include the references and links to the article or web site.
NTC249 Wide Area Networking Concepts
Week 4 Discussion
DQ1 What are some of the greatest security risks to a WAN? Provide an example of one risk and discuss the potential consequences and possible precautions.
DQ 2 · Network attacks come in many forms. Broadley, et al. (2009) point out a new method where the attacker creates a covert communication channel by changing the timing of part of a real signal and sneaking in. Analyze and discuss whether your system at work could be attacked by this methodology and if you think so what are you going to do about it?
DQ 3 Find a web site, an article on a web site or a peer reviewed article that is related to this weeks material. Write a 250-300 word synopsis what you have found and explain why you think it is relevant. Make sure you include the references and links to the article or web site.
NTC249 Wide Area Networking Concepts
Week 5 Discussion
DQ1 How can wireless interface with a WAN? Discuss security concerns with wireless and best practices to protect a wireless system?
DQ2 Worldwide Interoperability for Microwave Access (WiMAX) is a very popular topic today since it offers the possibility of wireless broadband signal capability over large geographic areas. WLAN signals suffer from a number of potential degradations such as multipath and fading. Balakrishnan, et al. (2009) analyzes the WiMAX technology in these conditions. An interesting side note to recognize is that this analysis was done via computer simulation using software called OPNET. Analyze and discuss the potential for the use of WiMAX in your corporate environment. Do you see WiMAX becoming the predominant WAN wireless technology of the future? If so, why? If not, why?
DQ3 Li, et al. (2009) have provided a brief review of early network structures and are also providing their view of the future generations of wireless networking out to the 7th generation. Analyze and discuss you personal view of either agreement or disagreement with the authors. In either case present support or alternatives.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
