Title: NTC 360 Course Real Knowledge / ntc360dotcom
1NTC 360 Course Real Knowledge / ntc360dotcom
For More Tutorials
www.ntc360.com
2NTC 360 Course Real Knowledge / ntc360dotcom
- NTC 360 Week 1 Discussion Question 1
- NTC 360 Week 1 Discussion Question 1NTC 360 Week
1 Discussion Question 2NTC 360 Week 2 Discussion
Question 1NTC 360 Week 2 Discussion Question
2NTC 360 Week 2 Individual Telecommunication
Systems
- Based on the article by Elmeleegy et al. (2007),
why have some researchers recommended redesigning
the Ethernet networking technology from the
ground up? Why do the authors propose a new
solution?
3NTC 360 Course Real Knowledge / ntc360dotcom
- NTC 360 Week 1 Discussion Question 2
- NTC 360 Week 2 Discussion Question 1
- What are some considerations an organization
should look at when moving from a traditional
phone system to VoIP? Explain the impact on an
organization when using VoIP.
- Based on the Shacham et al. (2007) article, what
are the advantages of using optical (photonic)
communications in future chip multiprocessors
(CMP)? What are the two inherent limitations of
photonic networks that electronic computing can
solve? What is the size or scale of the
components being discussed?
4NTC 360 Course Real Knowledge / ntc360dotcom
- NTC 360 Week 2 Discussion Question 2
- NTC 360 Week 2 Individual Telecommunication
Systems
- Based on the Takahashi et al. (2007) article,
what characteristic of a mesh network is
important to the experiment? What are the pros
and cons of employing this emergency
communications design within an area of the U.S.
prone to natural disasters
- Prepare a 2- to 3-page paper describing the
telecommunication systems used at your workplace. - Use short answers to explain the difference
between - Rotary and Dual Tone Multi-frequency
(DTMF) - Wide Area Telecommunications Service
(WATS) and leased lines
5NTC 360 Course Real Knowledge / ntc360dotcom
- NTC 360 Week 2 Learning Team Instructions
- NTC 360 Week 3 Discussion Question 1
- Present recommendations and benefits
- Each team will submit One document
which is the project plan with outline of how you
will approach the project. Who will do what, what
are the major milestones,etc
- Based on the Beliles and Twinam (2008) article,
what role does an Ethernet layer 2 switch play in
virtual local-area networks (VLAN)? How can an
Ethernet layer 2 switch be used to implement
physical and data security policies? How does
protecting a VLAN switch in a secure physical
location prevent tampering?
6NTC 360 Course Real Knowledge / ntc360dotcom
- NTC 360 Week 3 Discussion Question 2
- NTC 360 Week 3 Individual Short Answers
- What impact does network congestion have on
productivity?
- Synchronous and asynchronous
- Analog and digital
- XON and XOFF
- Simplex and duplex
- Serial and parallel transmission
7NTC 360 Course Real Knowledge / ntc360dotcom
- NTC 360 Week 3 Learning Team Instructions
- NTC 360 Week 4 Discussion Question 1
- o Present recommendations and benefits.
- o Each team will submit one status report
for the activities that were done during that
week along with any issues and future plans for
the next week.
- Based on the Nicholaisen (2007) article, what are
the concerns with the current OSI model design?
Why is the Clean Slate Internet Project important
to lower the impact of Internet organized crime?
8NTC 360 Course Real Knowledge / ntc360dotcom
- NTC 360 Week 4 Discussion Question 2
- NTC 360 Week 4 Individual Short Answers
- What are some of the reasons an organization
might consider using a Wireless LAN? - What type of security issues need to be
considered when implementing a Wireless LAN?
- Use short answers to explain the difference
(including the advantages and disadvantages of)
between - Mesh, Bus, Ring and Star topologies
- Ethernet, Token Ring, FIDDI and wireless
9NTC 360 Course Real Knowledge / ntc360dotcom
- NTC 360 Week 4 Learning Team Instructions
- NTC 360 Week 5 Discussion Question 1
- Continue working on Service Request.
- Network topologies
- o Identify topologies in use.
- o Explain advantages and disadvantages of
different topologies.
- Based on the Greiner (2010) article, in addition
to traditional technical security tools, some of
the network security best practices are
non-technical and relate to physical security and
employees. Name three of these practices and
explain how your organization meets or falls
short on the practices identified.
10NTC 360 Course Real Knowledge / ntc360dotcom
- NTC 360 Week 5 Discussion Question 2
- NTC 360 Week 5 Learning Team Service Request
Presentation
- What are some things we need to evaluate when
protecting our network?
- Prepare and submit a Microsoft PowerPoint
presentation.
11NTC 360 Course Real Knowledge / ntc360dotcom
- NTC 360 Week 5 Learning Team Service Request
Project
- Complete work on Service Request.
- Network Security
- o Identify current security efforts.
- o Identify security needs.
12NTC 360 Course Real Knowledge / ntc360dotcom
For More Tutorials
www.ntc360.com