Week 1: Introduction and the Application Layer – DiscussionTechnology and Evolution (graded)As you will discover this week through your studies, communications have gone through some major changes throughout history. Explain how information systems from the 1980s differ from information systems today. What networking and communications changes were introduced in the past decade (2000s), and what were their implications?Week 1: Introduction and the Application Layer – DiscussionThe Application Layer (graded)The textbook and lecture explain that there are four fundamental application architectures in use today: host-based architectures, client-based architectures, client-server architectures, and peer-to-peer architectures. Do some research in the DeVry Virtual Library (Under Course Home in the Student Resources section). Based on your research, what application architectures are most prevalent today? Under what architecture would you classify technologies such as virtualization, cloud computing, and Web-based applications? Last, what factors are involved in selecting the architecture that is right for your organization?Week 2: Physical Layer and LANs – DiscussionLAN Topology (graded)In order to understand a LAN you need to understand all the parts involved in constructing one. Discuss each of the components of a LAN as described in the textbook and in your research. What are the current standards for each of these components? What improvements are on the horizon? What role does ethernet play in today’s LANs.Week 2: Physical Layer and LANs – DiscussionCommunication Media (graded)Networks today will not operate without reliable media. What are some popular media types used in organizations today? How might factors such as transmission distance, cost, and organization type impact your choice of media?Week 3: The Data Link Layer – DiscussionMedia Access Control (graded)As you may have discovered by reading your textbook, there are two sub-layers that operate at the data link layer. The media access control (MAC) sub-layer controls the hardware, so let’s focus on that aspect. The two approaches to media access control are controlled and contention access. What are some differences in these approaches? When would one access control be a better option than the other?Week 3: The Data Link Layer – DiscussionData Link Layer (graded)Network sniffing and analysis has become a critical and necessary element of work for systems administrators, network admin, network engineers, security analysts, and many other niches within the realm of information technology. Wireshark is a free tool that allows you to quickly investigate connectivity and application problems. Download, install, and capture some local traffic from your home network. What data link communications do you see taking place? Does anyone see a term called ARP? What might this mean? Share your findings with the class.Please take a look in the Webliography for the link titled Wireshark.Week 4: Network and Transport Layers – DiscussionIPv4 versus IPv6 (graded)At the heart of the networking layer is addressing. IP addressing is used to locate computers and other network devices across the Internet. Currently, IPv4 is the dominant network addressing standard used on the Internet and within organizations. The problem is that we have exhausted our public IPv4 addresses. IPv6 was developed in part to address this very issue.Do some research on IPv6 in the DeVry Library and on the Web. What are some immediate differences in the two protocols? Does IPv6 provide operational improvement, as well as increased address space? How has/will IPv6 impact organizations, the Internet, and you at home?Week 4: Network and Transport Layers – DiscussionNetwork and Transport Layer Protocols (graded)The Network and Transport layers are where the protocol suites TCP/IP reside. This suite of protocols is critical to the operation of the Internet and organizations as we know them today. Do some research via the DeVry library, the Internet, and your textbook and list and discuss three TCP/IP protocols.What are the primary functions of the Transport and Network layers? What protocols do you use each day?Week 5: Backbone and Wireless Networks – DiscussionBackbone Network Components (graded)Your textbook explains that there are two basic components of a backbone network, those components being a cable and hardware device. Business processes and needs ultimately drive the type of cable media and hardware you select. What are these types of cables and hard devices? What are the major functions of each of these devices? What factors might determine how we select which ones are appropriate for our organization?Week 5: Backbone and Wireless Networks – DiscussionWireless Local Area Networks (graded)Wireless networks have become a pervasive part of society today. Let’s focus our discussion on Wi-Fi also known as the IEEE 802.11 standards group. The latest member of the 802.11 family is 802.11n. Let’s start our conversation with a discussion on differences between LANs and Wireless LANs. What are some immediately noticeable differences in the technologies? What advantages are inherent in Wireless technologies on the LAN? Explore some disadvantages as well.Week 6: WANs, MANs, and the Internet – DiscussionInternet Architecture (graded)The Internet is easily the mostly widely used and accessible network in the world. But how is it constructed? Many say the Internet is simply many separate networks connected together. Read Chapter 10 and look under the hood to see how the Internet is put together. What are some key pieces of the basic architecture of the Internet? What redundancies are built into the Internet, as presented in Chapter 10? Do some research on the current architecture of the Internet and on any planned changes.Week 6: WANs, MANs, and the Internet – DiscussionComparing WAN Architectures (graded)When making the all-important decision of what type of WAN or MAN architecture to use, there are three choices: circuit-switched, VPN, and packet switched architectures. Compare and contrast each architecture. How are they unique? What do they share? What factors drive your decision?Week 7: Network Design, Management, and Security – DiscussionThe Wild, Wild Web (graded)Although we have discussed how the Internet has been an invaluable tool for organizations and people across the world, it has also had adverse impacts on these same groups. From identity theft to denial-of-service attacks, networking technology is being harnessed to harm people and organizations. Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present? Discuss which technology from Chapter 11 of your textbook could have helped to prevent or minimize the impact of this incident.Week 7: Network Design, Management, and Security – DiscussionCost Justification (graded)Cost-benefit analysis for our network decisions is a critical skill and ability in IS management. What could we do to impress the CFO with our submission? Let’s look at what they believe is important in an article from the source, CFO Magazine’s site. Our ability to sell technology recommendations to management often requires providing cost analysis and perhaps even hard dollar benefits. How the CFO in your organization thinks should be a good indicator of what will fly in terms of getting support from the finance department. The CFO Magazine website almost always has some information or articles related to technology or networking.Go to the CFO Magazine’s website found in the Webliography under CFO. How could the articles or recommendations at the CFO site help your efforts? Are these subjects where we should be looking to for future investments? How likely is your organization to be looking at these?