110 likes | 190 Views
For more course tutorials visit<br>www.it242.com<br>IT 242 Week 1 CheckPoint: OSI Model<br>IT 242 Week 1 DQs<br>IT 242 Week 2 CheckPoint: Signals<br>IT 242 Week 2 Assignment: VoIP<br>IT 242 Week 3 DQs<br>IT 242 Week 4 CheckPoint: Ethernet or Token Ring<br>IT 242 Week 4 Assignment: VLAN<br>IT 242 Week 5 CheckPoint: Switching<br>IT 242 Week 5 DQs<br>IT 242 Week 6 CheckPoint: Static or Dynamic<br>IT 242 Week 5 DQs<br>IT 242 Week 6 Assignment: Router and Switch Configuration<br>IT 242 Week 7 CheckPoint: Firewalls<br>IT 242 Week 7 DQs<br>IT 242 Week 8 CheckPoint: WLAN<br>IT 242 Week 8 Assignment: Wireless Signals<br>IT 242 Capstone Discussion Question<br>IT 242 Final Project: WAN Design<br>
E N D
IT 242 Course Real Knowledge / it242dotcom For More Tutorials www.it242.com
IT 242 Course Real Knowledge / it242dotcom IT 242 Entire Course IT 242 Week 1 CheckPoint OSI Model • IT 242 Week 1 CheckPoint: OSI Model • IT 242 Week 1 DQs • IT 242 Week 2 CheckPoint: Signals • IT 242 Week 2 Assignment: VoIP • IT 242 Week 3 DQs • Describe the OSI model and how it relates to a network in 200 to 300 words. Your response should include answers to the following: • On which layers of the OSI model do WAN protocols operate?
IT 242 Course Real Knowledge / it242dotcom IT 242 Week 1 DQs IT 242 Week 2 Assignment VoIP • Post your response to the following: What is a WAN? Locate an example of a typical WAN setup and describe the components. Provide a picture, chart, or image if possible. Respond to your classmates and discuss how your examples differ. • Conduct an Internet search to locate a case study that shows how VoIP was beneficial to an organization. • Write a 350- to 700-word paper in APA format in which you analyze the organization’s use of VoIP.
IT 242 Course Real Knowledge / it242dotcom IT 242 Week 2 CheckPoint Signals IT 242 Week 3 DQs • Explain the differences between data, voice, and video signals in 200 to 300 words. • Post your response to the following: Conduct an Internet search to locate an example of a private network and a public network. How is each network used? What are the pros and cons of each?
IT 242 Course Real Knowledge / it242dotcom IT 242 Week 4 Assignment VLAN IT 242 Week 4 CheckPoint Ethernet or Token Ring • Your company moves into a new building. Marketing is on the first floor, engineering is on the second floor, operations is on the third floor, and the call center is on the fourth floor. The LAN is organized neatly, • Saguaro Federal has mainframes for all of its banks and businesses. Should the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate?
IT 242 Course Real Knowledge / it242dotcom IT 242 Week 5 CheckPoint Switching IT 242 Week 5 DQs • Compare and contrast packet and circuit switching in 250 to 300 words. Which is more commonly used? What are the advantages and disadvantages of each? • Due Date: Day 2 [Main forum] • Post your response to the following: Identify the functions of a CSU/DSU. How are they used in a corporate environment?
IT 242 Course Real Knowledge / it242dotcom IT 242 Week 6 Assignment Router and Switch Configuration IT 242 Week 6 CheckPoint Static or Dynamic • Describe how to configure a switch and router in a 350- to 750-word paper in APA format. Be sure to include the following • Basics of installing, setting up, and configuring a switch • As a network administrator for a company, you want to configure an IP route between two routers. Of static and dynamic routing, which is more appropriate?
IT 242 Course Real Knowledge / it242dotcom IT 242 Week 7 CheckPoint Firewalls IT 242 Week 7 DQs • Due Date: Day 5 [Individual] forum • In 200 to 300 words: • Describe the three main types of firewalls. • Explain how each type protects a network. • Determine which firewall is the most efficient and why • Discussion Question 1o Due Date: Day 2 [Main] forumo Post your response to the following: What are some of the greatest security risks to a wide area network? Provide an example of one risk and discuss the potential consequences and possible precautions.
IT 242 Course Real Knowledge / it242dotcom IT 242 Week 8 Assignment Wireless Signals IT 242 Week 8 CheckPoint WLAN • Discuss four different types of wireless technologies in a 350- to 700-word paper in APA format. • Describe the characteristics and properties of each signal type, and how each can be used. • Due Date: Day 4 [Individual forum] • Explain in 200 to 300 words at least two different ways to secure a WLAN. What are the ramifications if a WLAN is breached
IT 242 Course Real Knowledge / it242dotcom IT 242 Week 9 Capstone Discussion Question IT 242 Week 9 Final Project WAN Design • Post your response to the following: How has your perception of WAN technology changed as a result of what you have studied in this course? • Develop a plan to set up a wide area network based on the scenario presented in Appendix A. Your plan must include the following:
IT 242 Course Real Knowledge / it242dotcom For More Tutorials www.it242.com