IT 242 INTRO TO WAN TECHNOLOGIES Version 4
IT 242 INTRO TO WAN TECHNOLOGIES Version 4 IT 242 Week 1 CheckPoint OSI Model IT 242 Week 1 DQ 1 IT 242 Week 1 DQ 2 IT 242 Week 2 CheckPoint Signals IT 242 Week 2 Individual VoIP IT 242 Week 3 DQ 1 IT 242 Week 3 DQ 2 IT 242 Week 3 Toolwire® Lab IT 242 Week 4 Che..
IT 242 Week 1 CheckPoint OSI Model Describe the open systems interconnection (OSI) model and how it relates to a network in 200 to 300 words. Include answers to the following: · On which layers of the OSI model do WAN protocols operate? · ..
IT 242 Week 1 DQ 1 What is a WAN? Locate an example of a typical WAN setup and describe the components. Provide a picture, chart, or image if possible. Respond to your classmates and discuss how your examples differ. ..
IT 242 Week 1 DQ 2 What is the most commonly used cable in networking? What are the latest advancements in cabling? ..
IT 242 Week 2 CheckPoint Signals Explain the differences between data, voice, and video signals in 200 to 300 words. Include a description comparing the differences between a private branch exchange (PBX) and Voice over Internet protocol (VoIP). ..
IT 242 Week 2 Individual VoIP Conduct an Internet search to locate a case study that shows how VoIP was beneficial to an organization. Write a 350- to 700-word paper which you analyze the organization’s use of VoIP. Respond to the following in your analysis: · ..
IT 242 Week 3 DQ 1 Conduct an Internet search to locate an example of a private network and a public network. How is each network used? What are the pros and cons of each? ..
IT 242 Week 3 DQ 2 You are a consultant who has been hired to design a WAN for a startup business. How would you explain subnetting in a way your nontechnical client would understand. ..
IT 242 Week 3 Toolwire® Lab Complete the following Toolwire® labs: · Planning Network Access · Troubleshooting Network Access Complete the lab assignment as indicated. ..
IT 242 Week 4 CheckPoint Ethernet or Token Ring Consider the following scenarios: · Saguaro Federal has mainframes for all of its banks and businesses. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this cho..
IT 242 Week 4 Exercise Toolwire® Lab Complete the following Toolwire® Lab: · Designing for Network Connectivity Complete the lab assignment as indicated. ..
IT 242 Week 4 Individual VLAN Consider the following scenario: · Your company moves into a new building. Marketing is on the first floor, engineering is on the second floor, operations is on the third floor, and the call center is on the fourth f..
IT 242 Week 5 CheckPoint Switching Compare and contrast packet and circuit switching in 250 to 300 words. Which is more commonly used? What are the advantages and disadvantages of each? ..
IT 242 Week 5 DQ 1 Identify the functions of a CSU and DSU. How are they used in a corporate environment? ..
IT 242 Week 5 DQ 2 ISDNs are sometimes used in locations that do not support DSL or cable modem connections. Your choices may be analog modems or an ISDN connection in those remote locations. Describe three benefits ISDNs have over regular dial-up modem connections. ..
IT 242 Week 6 CheckPoint Static or Dynamic Consider the following scenario: As a network administrator for a company, you want to configure an IP route between two routers. Of static and dynamic routing, which is more appropriate? Explain your answer in 200 to 300 words. ..
IT 242 Week 6 Exercise Toolwire® Lab Complete the following Toolwire® Labs: · Starting a Switch · Starting a Router ..
IT 242 Week 6 Individual Router and Switch Configuration Describe how to configure a switch and router in a 350– to 750–word paper in APA format. Be sure to include the following: · Basics of installing, setting up, and configuring a switch o&..
IT 242 Week 7 CheckPoint Firewalls In 200 to 300 words: Describe the three main types of firewalls. Explain how each type protects a network. Determine which firewall is the most efficient and why. ..
IT 242 Week 7 DQ 1 What are some of the greatest security risks to a WAN? Provide an example of one risk and discuss the potential consequences and possible precautions. ..
IT 242 Week 7 DQ 2 What is a key? What are the differences between private key and public key encryption? Provide examples of each. ..
IT 242 Week 8 CheckPoint WLAN Explain in 200 to 300 words at least two different ways to secure a wireless LAN (WLAN). What are the ramifications if a WLAN is breached? ..
IT 242 Week 8 Individual Wireless Signals Resource: Ch. 18 of Wide Area Networks Discuss four different types of wireless technologies in a 350- to 700-word paper. Describe the characteristics and properties of each signal type, and how each can be used. Include a table or matrix that co..
IT 242 Week 9 Capstone DQ How has your perception of WAN technology changed as a result of what you have studied in this course? ..
IT 242 Week 9 Final Project WAN Design Read Appendix A. Develop a plan to set up a WAN based on the scenario in Appendix A. Your plan must include the following: · An overview of the company and its needs · &n..
Showing 1 to 25 of 25 (1 Pages)