What is the purpose of nonroutable protocols

Assignment Help Management Information Sys
Reference no: EM131886082

Discussion Board

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Friday of each week. Two additional responses are required after Friday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.
The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

Todd, a junior network administrator, is given the task of providing feedback on routing. Specifically, he will discuss the routed, nonroutable, and routing protocols. He should also address routing congestion. Todd knows that nonroutable protocols cannot go across local area network (LAN) boundaries and that routed ones can transport data across networks. Todd needs help, however, to make a complete feedback report.

Post an answer to the following questions, and support your answers with academic or real information technology (IT) examples to accentuate your point:

• Do you think the term routing congestion can be replaced by the term network congestion? Why?

• In your opinion, what is the purpose of nonroutable protocols? Is there a legitimate reason for having nonroutable protocols? Do you think they can be replaced with another type of protocol or innovative system?

• Be sure to explain differences between routed, nonroutable, and routing protocols. Provide examples.

Reference no: EM131886082

Questions Cloud

Discuss the total threat coverage for the operating systems : Discuss the total threat coverage for the operating systems provided by these tools. Update the previously completed sections based on the instructors feedback.
The main criticisms of community policing in ferguson : What steps can communities take to make community policing a successful strategy for law enforcement?
Develop an attack plan that covers the given criteria : Develop an attack plan that covers these criteria. Find tools on the web that could help you find information about systems/networks, etc.
Describe the challenges you would face in policing : As stated in your text there are about 566 federally recognized tribal governments within the United States.
What is the purpose of nonroutable protocols : In your opinion, what is the purpose of nonroutable protocols? Is there a legitimate reason for having nonroutable protocols?
Explain the overview routine activity theory of criminology : Discuss how the selected theory affects an individual's decision to commit crime. Give an example of a criminal action and explain how it relates to theory.
How does each protocol work in a wan : Where is each protocol used in a WAN? How does each protocol work in a WAN? Discuss the latest implementations of routing protocols that would be necessary.
Discuss the practical research applications for categories : In your textbook, you have read about five general categories of experimental, quasi-experimental, and ex-post facto designs.
Which design would be practical for a large study : Which design would be practical for a large study? Which one would be practical for a small study?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Can the eastern religions of buddhism and hinduism

Can the Eastern religions of Buddhism and Hinduism and the monotheistic religions of Judaism, Christianity, and Islam produce the same ethical results? Why or why not? What is the determining factor?

  Discuss the technological advancements in health care

Heightened technological advancements in health care increase information security. Although standards exist in health care regarding the protection of information, there is controversy regarding information security and personal devices, includin..

  Discussing the use of tablets vs desktopstablets are said

discussing the use of tablets vs. desktopstablets are said to be replacing desktop computers. dell hp and others have

  What are some advantages of using a cloud-based solution

What are some advantages of using a cloud-based solution? Would this be something your past or current organization could utilize? Why or why not?

  Creation of a supply chain

Creation of a supply chain - What effect does materials management have on the creation of a supply chain?

  Requirement of an effective solution to interoperability

Determine the most significant requirement of an effective solution to interoperability - Provide a rationale for your determination.

  Analyze porters five forces model

Analyze Porter's Five Forces Model in relation to competition within the industry of That corporation

  Feature that is provided by google doc

Analyze Google Docs and discuss some of the feature that is provided by Google Doc

  Project management risk managementrisk management is a

project management risk managementrisk management is a critical aspect of project management. the supply chain

  Monitoring employee in workplace by using digital technology

Monitoring employees in workplace by using digital monitoring technologies. My part is Advantages and Disadvantages of using technologyto monitoring employees at the workplace

  Describe the importance of hardware maintenance

Your organization has also asked you to research best practices in hardware maintenance and setup. Describe the importance of hardware maintenance.

  Preventing computer hackinghacking is breaking into

preventing computer hackinghacking is breaking into computer systems. when people hack into a system they often go

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd