NTC 248 All Discussions

0 items
NTC 248 All Discussions
NTC 248 All Discussions
$12.00
  • Description

NTC 248 All Discussions

The Latest Version A+ Study Guide

 

**********************************************

NTC 248 All Discussions Link

https://hwsell.com/category/ntc-248-all-discussions/

**********************************************

 

NTC 248 Wk 1 Discussion – Network Layers

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

The Open Systems Interconnection (OSI) model is structured in a series of layers. Each layer is designed to provide services to the layer above it. There can be multiple protocols that provide the same services (e.g., each kind of Ethernet or WiFi provides the same service of carrying frames to the Logical Link Control sublayer).

Discuss the advantages of dividing network features into layers.

Explain why it helps to have consistent services provided by different protocols at the same level. Use network theory and standards to support your explanation.

Post your response to the discussion area.

Respond to at least one of your peers. In your response, consider sharing ideas about what happens at one of the layers to provide the next layer the ability to complete its task.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

NTC 248 Wk 2 Discussion – Cloud Computing and Virtualization Benefits

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Cloud computing and virtualization have provided a new alternative to traditional computing for organizations.

Discuss a cloud computing model you believe would help your current employer or an organization with which you are familiar. Include the following in your discussion post:

  • Why you selected this model (i.e., what problem it would solve or benefits it would bring)
  • How you would use virtualization if your cloud computing model was implemented

Post your response to the discussion area.

Respond to at least one of your peers. In your response, consider sharing ideas on what the organization might need to do to implement the suggested model or additional benefits the organization would receive.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

NTC 248 Wk 3 Discussion – IP Addressing

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

 

Due Thursday

Respond to the following in a minimum of 175 words:

IPv4 has some limitations that over time could become insurmountable, yet IPv6 is showing slow adoption.

Compare and contrast the addresses used by IPv4 and IPv6.

Explain the problem that drove the change in address format from IPv4 to IPv6. How well has IPv6 format been adopted?

Discuss whether or not you think the solution used in IPv6 is likely to be effective for IP addressing in the future.

Post your response to the discussion area.

Respond to at least one of your peers. In your response, consider sharing your thoughts about why many organizations have not migrated to IPv6. Alternatively, if you have worked for an organization that has migrated to IPv6, share what you learned from your experience.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

NTC 248 Wk 4 Discussion – Protocol Security Choices

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

For many areas of network functionality there are older, established protocols available with significant security risks and newer protocols that attempt to address those risks.

Identify two protocols that perform the same functions but with different levels of security.

Answer the following questions:

  • What are the security issues of the less secure protocol?
  • How does the more secure protocol attempt to address those issues?
  • How effective is the more secure protocol?

Post your response to the discussion area.

Respond to at least one of your peers. In your response, consider sharing ideas about alternative or complementary protocols that could be used to address the issues your peers identified.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

 

 

 

NTC 248 Wk 5 Discussion – Network Troubleshooting Tools

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

Consider the various tools and utilities for network troubleshooting.

Select a tool or utility for troubleshooting a network that you think would provide performance metrics for an IT department. Answer the following questions:

  • What type of performance metrics does the selected tool or utility provide?
  • Why would these performance metrics be useful for the IT department?
  • What types of network problems can these performance metrics solve?

Post your answers to the discussion area.

Respond to at least one of your peers. In your response, consider sharing additional thoughts about your peer’s tools or utility selection.

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.