You are on page 1of 20

NTC 360 Entire Course

For more classes visit


www.snaptutorial.com

NTC 360 Week 1 Discussion Question 1


NTC 360 Week 1 Discussion Question 2
NTC 360 Week 2 Discussion Question 1
NTC 360 Week 2 Discussion Question 2
NTC 360 Week 2 Individual Telecommunication Systems
NTC 360 Week 2 Learning Team Instructions

NTC 360 Week 1 Discussion Question 1

For more classes visit


www.snaptutorial.com

Based on the article by Elmeleegy et al. (2007), why have some researchers
recommended redesigning the Ethernet networking technology from the ground up?
Why do the authors propose a new solution?

NTC 360 Week 1 Discussion Question 2

For more classes visit


www.snaptutorial.com

What are some considerations an organization should look at when moving from a
traditional phone system to VoIP? Explain the impact on an organization when using
VoIP.

NTC 360 Week 2 Discussion Question 1

For more classes visit


www.snaptutorial.com

Based on the Shacham et al. (2007) article, what are the advantages of using optical
(photonic) communications in future chip multiprocessors (CMP)? What are the two
inherent limitations of photonic networks that electronic computing can solve? What is
the size or scale of the components being discussed?

NTC 360 Week 2 Discussion Question 2

For more classes visit


www.snaptutorial.com

Based on the Takahashi et al. (2007) article, what characteristic of a mesh


network is important to the experiment? What are the pros and cons of
employing this emergency communications design within an area of the U.S.
prone to natural disasters

NTC 360 Week 2 Team Assignment


Telecommunication Systems

For more classes visit


www.snaptutorial.com

Prepare a 2- to 3-page paper describing the telecommunication systems used at your


workplace.
Use short answers to explain the difference between:

Rotary and Dual Tone Multi-frequency (DTMF)


Wide Area Telecommunications Service (WATS) and leased lines

NTC 360 Week 3 Discussion Question 1

For more classes visit


www.snaptutorial.com

Based on the Beliles and Twinam (2008) article, what role does an Ethernet layer 2
switch play in virtual local-area networks (VLAN)? How can an Ethernet layer 2 switch
be used to implement physical and data security policies? How does protecting a
VLAN switch in a secure physical location prevent tampering?

NTC 360 Week 3 Discussion Question 2

For more classes visit


www.snaptutorial.com

What impact does network congestion have on productivity?

NTC 360 Week 3 Individual Short Answers

For more classes visit


www.snaptutorial.com

Use short answers to explain the difference between:


Synchronous and asynchronous

Analog and digital

XON and XOFF

Simplex and duplex

Serial and parallel transmission

NTC 360 Week 3 Learning Team


Instructions

For more classes visit


www.snaptutorial.com

Network protocols
o
o
o
o

Identify protocols.
Provide rationale for the adoption of existing protocols.
Explain advantages and disadvantages of protocols.
Present recommendations and benefits.

NTC 360 Week 4 Discussion Question 1

For more classes visit


www.snaptutorial.com

Based on the Nicholaisen (2007) article, what are the concerns with the current OSI
model design? Why is the Clean Slate Internet Project important to lower the impact
of Internet organized crime?

NTC 360 Week 4 Discussion Question 2

For more classes visit


www.snaptutorial.com

What are some of the reasons an organization might consider using a Wireless LAN?
What type of security issues need to be considered when implementing a Wireless
LAN?

NTC 360 Week 4 Individual Short Answers

For more classes visit


www.snaptutorial.com

Use short answers to explain the difference (including the advantages and
disadvantages of) between:

Mesh, Bus, Ring and Star topologies

Ethernet, Token Ring, FIDDI and wireless

NTC 360 Week 4 Learning Team


Instructions

For more classes visit


www.snaptutorial.com

Network topologies
o
o
o
o

Identify topologies in use.


Explain advantages and disadvantages of different topologies.
Consider combining topologies.
Present recommendations and benefits.
Switching

NTC 360 Week 5 Discussion Question 1

For more classes visit


www.snaptutorial.com

Based on the Greiner (2010) article, in addition to traditional technical security tools,
some of the network security best practices are non-technical and relate to physical
security and employees.

NTC 360 Week 5 Discussion Question 2

For more classes visit


www.snaptutorial.com

What are some things we need to evaluate when protecting our network?

NTC 360 Week 5 Learning Team Service


Request Presentation

For more classes visit


www.snaptutorial.com

Prepare and submit a Microsoft PowerPoint presentation.

NTC 360 Week 5 Learning Team Service


Request Project

For more classes visit


www.snaptutorial.com

Network Security
o
o
o
o

Identify current security efforts.


Identify security needs.
Explain advantages and disadvantages of various security approaches.
Present recommendations and benefits.

You might also like