Saturday 10 August 2013

NTC 360 Week 1 Discussion Question 1




For more course tutorials visit



Based on the article by Elmeleegy et al. (2007), why have some researchers recommended redesigning the Ethernet networking technology from the ground up? Why do the authors propose a new solution?



NTC 360Week 1 Discussion Question 2




For more course tutorials visit



What are some considerations an organization should look at when moving from a traditional phone system to VoIP? Explain the impact on an organization when using VoIP.


NTC 360 Week 2 Discussion Question 1




For more course tutorials visit



Based on the Shacham et al. (2007) article, what are the advantages of using optical (photonic) communications in future chip multiprocessors (CMP)? What are the two inherent limitations of photonic networks that electronic computing can solve? What is the size or scale of the components being discussed?


NTC 360 Week 2 Discussion Question 2




For more course tutorials visit



Based on the Takahashi et al. (2007) article, what characteristic of a mesh network is important to the experiment? What are the pros and cons of employing this emergency communications design within an area of the U.S. prone to natural disasters


NTC 360 Week2 Individual Telecommunication Systems




For more course tutorials visit



Prepare a 2- to 3-page paper describing the telecommunication systems used at your workplace.
Use short answers to explain the difference between:

         Rotary and Dual Tone Multi-frequency (DTMF)
         Wide Area Telecommunications Service (WATS) and leased lines
         Private Branch eXchange (PBX) and Centrex

         The layers of the International Organization for Standardization-Open Systems Interconnection (ISO-OSI) model

NTC 360 Week 3 Discussion Question 1




For more course tutorials visit




Based on the Beliles and Twinam (2008) article, what role does an Ethernet layer 2 switch play in virtual local-area networks (VLAN)? How can an Ethernet layer 2 switch be used to implement physical and data security policies? How does protecting a VLAN switch in a secure physical location prevent tampering?


NTC 360 Week 3 Discussion Question 2