Network | DNLF | NFKSD

Get your original paper written from scratch starting at just $10 per page with a plagiarism report and free revisions included!









Hire A Writer

7737697797 (what’s ap)

Discussion 200-250 words

Replys: 80-100 words

Week-1 Discussion

Answer the following questions and respond to 2 students

Module 1 question about Communication Layers:

In this module 1, you learned about a foundational organizing principle in networking: layers of communication. The OSI model and the TCP/IP model are both commonly used to guide network design, maintenance, and troubleshooting tasks.

This text gave the analogy of a letter being mailed via the post office to illustrate the nature of each layer in the OSI model. Many other analogies can be used to further describe how communications layers function in a system. What examples can you think of? Consider in what ways you notice one person, company, or other entity communicate with another person, company, or other entity indirectly through multiple layers. Then answer the following question:

What is a real-life example of how layers in a system indirectly connect two entities (such as a person or company) in communication?

Module 2 question about Networking for life working in technology:

As you move into your career, you will find that your continued success relies on your ability to keep learning. In addition, the more you learn, you will find that you are able to advance more quickly in your career and achieve your goals. is a website devoted to providing information about technology careers. By understanding more about the interplay between your educational pursuits and the needs of the IT industry, you will better position yourself for success. Go to and find an article relevant to your career goals.

Respond to the following question:

What did you learn about your chosen career path that you did not already know?


Answer the following questions and Respond to two students

Module 3 question about CLI vs GUI

In this module, you started learning how to work from the command line to interact with computers and other devices on the network. Working in a CLI (command-line interface) can feel intimidating and unfamiliar, especially if you have not used a CLI before. But, it also might provide options to automate functions and to do tasks you cannot do from a GUI. Think about your experiences during this module and in the past using both a GUI and a CLI, and do a little reading online to learn about other people’s perspectives on this issue. Then respond to the following questions:

What are some advantages of working with a GUI? Give an example of when a GUI is a better fit for the task.

Module 4 question about Linux Distros

Because Linux is a free, open source operating system, many companies and individuals have developed their own version of Linux. Each of these is called a distribution, or distro for short. You have already worked with Ubuntu (pronounced oo-boon-too). Other popular Linux distros include MX Linux, Linux Mint, Debian, Elementary OS, Fedora, openSUSE (pronounced soo-suh), and Kali Linux. Note that while the Linux OS itself is free, some distros include other tools, trademarks, or support services, which incur a charge. One example of this is the robust Red Hat Enterprise Linux.

Do some research online about three of these Linux distros, Then respond to the following question:

Which three Linux distros did you research?


Answer the following questions and Respond to two students

Module 5 question about Cabling Upgrade

Research online to find how much cabling of higher categories would cost. Choose a higher category that offers better throughput for reasonable costs. Consider whether you would be able to use existing connectors on devices or if devices would need adapters or replacement. What target cable category did you choose? How much does this cabling cost, on average, per meter?

Module 6 question about Wi-Fi Innovations

How would you explain OFDMA to non-IT executive at your company?


In this module, you learned about spine-and-leaf architecture and the improvements this design offers over the older, three-tiered architecture. Some of the advantages this design are improved redundancy, decreased latency, increased performance, improved scalability, increased security, and reduced expense. The spine-and-leaf switch architecture is especially adaptable to newer networking technologies, such as virtualization and hybrid cloud. Do some research online about spine-and-leaf architecture and respond to the following question:

What are the advantages and disadvantages of building the spine-and-leaf network at layer 2 (VLANs) or layer 3 (subnets)?


List some tips for VLAN configuration that increase security and overall network performance.


Module 9 question Trouble Shooting Internet Connections

If there’s one networking challenge everyone who’s used a computer has faced, it’s figuring out how to connect your devices to the Internet. Whether you’re looking for an open Wi-Fi hotspot, changing the password on your own Wi-Fi, or talking with your ISP’s customer service to troubleshoot a connection problem, you’ve used problem solving to work through the challenges. When facing these potentially frustrating problems, it helps to have a plan for how to find the solution. Answer the following questions.

In a web browser, do a search for tips, tricks, hints, and steps for troubleshooting Internet connection issues. Make a list of ideas from at least three sources that you can use for future reference.

Module 10 question about Password Design

Recommendations on how to create secure passwords continue to shift as researchers study the vulnerability of passwords in known data breaches. For example, how long should a password 
really be? How much complexity is 
really needed? How often should passwords be rotated—if at all? Are long passphrases more secure than complex passwords?

Do some research online about debates surrounding passwords. Then respond to the following question:

What is one password debate you believe is significant?


In your opinion at this point in your career, what do you believe is the greatest threat network admins should work to mitigate on their networks?


What personal computing or network resources are essential to your personal life, schooling, and work life?

Stay Anonymous
With Our Essay Writing Service

The aim of our service is to provide you with top-class essay help when you ask us to write my paper; we do not collect or share any of your personal data. We use the email you provide us to send you drafts, final papers, and the occasional promotion and discount code, but that’s it!

Order Now