Professional Documents
Culture Documents
Based on the article by Elmeleegy et al. (2007), why have some researchers
recommended redesigning the Ethernet networking technology from the ground up?
Why do the authors propose a new solution?
What are some considerations an organization should look at when moving from a
traditional phone system to VoIP? Explain the impact on an organization when using
VoIP.
Based on the Shacham et al. (2007) article, what are the advantages of using optical
(photonic) communications in future chip multiprocessors (CMP)? What are the two
inherent limitations of photonic networks that electronic computing can solve? What is
the size or scale of the components being discussed?
Based on the Beliles and Twinam (2008) article, what role does an Ethernet layer 2
switch play in virtual local-area networks (VLAN)? How can an Ethernet layer 2 switch
be used to implement physical and data security policies? How does protecting a
VLAN switch in a secure physical location prevent tampering?
Network protocols
o
o
o
o
Identify protocols.
Provide rationale for the adoption of existing protocols.
Explain advantages and disadvantages of protocols.
Present recommendations and benefits.
Based on the Nicholaisen (2007) article, what are the concerns with the current OSI
model design? Why is the Clean Slate Internet Project important to lower the impact
of Internet organized crime?
What are some of the reasons an organization might consider using a Wireless LAN?
What type of security issues need to be considered when implementing a Wireless
LAN?
Use short answers to explain the difference (including the advantages and
disadvantages of) between:
Network topologies
o
o
o
o
Based on the Greiner (2010) article, in addition to traditional technical security tools,
some of the network security best practices are non-technical and relate to physical
security and employees.
What are some things we need to evaluate when protecting our network?
Network Security
o
o
o
o