Free

Unit 2 Discussiion CIS 204 - Coursework Example

Comments (0) Cite this document
Summary
Since RIP may not be suited to the large scale networks and given the shortest path first function, it may compromise the security aspect of the network.
The RIP protocol may be left over against OSPF and EIGRP…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Unit 2 Discussiion CIS 204
Read TextPreview

Extract of sample "Unit 2 Discussiion CIS 204"

I totally agree with the team leader on account of leaving out RIP. Since RIP may not be suited to the large scale networks and given the shortest path first function, it may compromise the security aspect of the network.
The RIP protocol may be left over against OSPF and EIGRP on account of the complete set of instructions and requirements fulfillment. The RIP protocol provides for the shortest path first, while OSPF allows fulfilling the requirements of the entire loop and network, hence the team lead may well be justified suggesting the use of OSPF and EIGRP against RIP protocol.
OSPF and EIGRP are two commonly used protocols for the purpose of networking systems. The difference between the two is in terms of the proprietary ownership. While OSPF can be used in a broader manner in such a way that it is not dependent upon the hardware, the EIGRP is strictly restricted to Cisco devices and licenses grant (Lammle, 2007, p.477).
EIGRP has an advantage over OSPF in the domain of backup restoration and retrieval while OSPF may not provide this.
OSPF in contrast to EIGRP is Link state while EIGRP is class less protocol. The other major difference between the two include the hop count limit, while EIGRP hop count rotates between 100 to 255, the OSPF protocol varies in terms of the hop count from the EIGRP.
The similarity between the two include entire loop covering in terms of coverage and unlike the RIP protocol, provide the service to all the nodes.
Another similarity between these two is the support for the IP version 6 support and functioning.
Questions pertinent to the next meeting would include the implementation costs, the size of network and the introduction of possibly a third protocol IS-IS.
References:
Lammle, T. (2007). CCNA: Cisco Certified Network Associate Study Guide: Exam 640-802. John Wiley & Sons Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Unit 2 Discussiion CIS 204 Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Unit 2 Discussiion CIS 204 Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1659537-unit-2-discussiion-cis-204
(Unit 2 Discussiion CIS 204 Coursework Example | Topics and Well Written Essays - 250 Words)
Unit 2 Discussiion CIS 204 Coursework Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1659537-unit-2-discussiion-cis-204.
“Unit 2 Discussiion CIS 204 Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1659537-unit-2-discussiion-cis-204.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Unit 2 Discussiion CIS 204

CIS

...CIS With the imagination of the human mind, racing at the speed of light it is quite evident how it affects the field of technology. Because of the fast paced human thought process, new technologies emerge everyday. Implementing these, technologies in the socio sphere of life bring along its own issues. The widespread use of technology in day-to-day business has forced experts to look into its pros and cons with some insight. The past few years have seen new trends emerging, better and efficient ways to communicate on a personal as well as social level. These boast about the enormous amount of data that can be shared. Nevertheless, along with it has come the intriguing question of "how safe is it to share" (Martinelli,...
3 Pages(750 words)Essay

Cis 331 discussion wwek 2

...Please respond to (2) other discussion posts. The original post will be highlighted in bold red colors. The yellow will be what I put as myanswer for the same discussion post. You may agree or disagree with their posting. Or you can add something to their answer, but please remember to be respectful. Please remember that you are no editing their post answer, you are just writing what you think about what reading their post for the week. It will be just like a sit in class discussion with you the teacher and the other students. You can put all answers ONE pages of work. No sources are needed. I have provided an example of how to respond to student post at the bottom of the page in discussion question two. This week I...
1 Pages(250 words)Essay

CIS assigntment #2

...Malware and its Effects Malware is a make up term that refers to malicious software. These are software that are created by individuals and designed to attack computer systems for the creators benefit (Szor, 2005). Malware has been in existence for almost as long as computers have and have been one of the greatest enemies of software developers as they are designed to find points of weakness in order to gain entry into a host computer and thus serve as a means of revealing the imperfections that exist within the various programs that have been designed by computer companies (Parikka, 2007). There are different types of Malware present in the market and they are used by their attackers to perform different activities. Some... and its Effects...
2 Pages(500 words)Essay

CIS

...Sherry Turkle: Connected, But Alone? Turkle in the TED.com show talks about how technology has transformed the manner in which people communicate today. The traditional forms of communication where people used to talk face to face or through phone calls have been replaced by new forms of technology through use of text messages, social networks and emails. According to her, this transformation has led to loss of genuine real life conversation converting people into robot- like machines. She asserts that there are features of real conversation that can never be replaced by the electronic communication. These features are what connect people as social beings. It is through real conversation that one can express their real emotions... Turkle:...
2 Pages(500 words)Essay

Unit #2

...Unit #2 Brief paper Critical Legal Thinking The supremacy clause is a special clause in the constitution of the United s that establishes the country’s constitution, the country’s treaties and statues as the supreme law in the land. The special clause provides a solution for successive legal battles by stating that in case of a conflict between the federal government and the state governments among many other devolved units, the state judges and judiciaries must follow the federal laws owing to the supremacy of its application. The clause serves a vital role since it influences the operations of the judiciary and the dispensation of justice in the country. Additionally,...
4 Pages(1000 words)Research Paper

Unit 3 Discussion CIS 204

...Computer Case Study Institute Since it is a lunch meeting, I need to be brief. I would ask them about the last time they updated their firewall firmware. I would further like to know how often there is a security breach at this small local company. Knowledge about missing updates on their servers and PCs would be crucial at this point. Before going to the site, I would like to know if they have a secure backup for their data. Since it is a lunch meeting it would be highly improbable for them to be carrying the flowchart or any documentation of their network, but I would still inquire about that. Lastly, I would ask them if they have WEP encryption because this is highly vulnerable to attack. 2. There are many things that...
1 Pages(250 words)Case Study

Unit 2-2 FM

...Problem solving Problem solving Walgreen is among the largest drug retailing companies in the United s of America. To wordsthe month of May 2014, the company had 8,217 retail stores in 50 states in operation. Walgreen was founded in the year 1901 by Charles R, Walgreen. Walgreen has reported total; Revenue US$ 72.217 billion (2013) Operating income US$ 3.94 billion (2013) Net income US$ 2.45 billion (2013) Total assets US$ 35.481 billion (2013) Total equity US$ 19.454 billion (2013) Calculating the; ROE, net assets/shareholders equity= 13% ROA, net income/ average total assets = 7.1% The profit margin, total revenue/ gross profit = 3% Total asset turnover, average assets/ total assets= 97.2% Equity multiplier, total...
1 Pages(250 words)Essay

CIS 375 Week 2 Assingment

...Assignment Multi-Touch Screens vs. Mouse-Driven Screens Lecturer Multi-Touch Screens vs. Mouse-Driven Screens Mouse driven screens and interfaces have dominated the desktop computing experience for close to three decades. All computing tasks were centered on the mouse, keyboard and other devices for input into the computer. However, over the last decade the conventional mouse driven screens are rapidly being replaced by the new touch interaction paradigm. This technology has been introduced by the tablets, smart phones, laptops among other devices (Helander, 2014). The replacement of the mouse driven screens by multi-touch screens is due to the different metaphors used in the design of these interfaces. The section below provides... Multi-Touc...
4 Pages(1000 words)Assignment

CIS

...CIS Part My experience working for an organization offered new insight and practical involvement in theimplementation of a new system. Participating as part of the software design and development and implementation team, both the functional and non-functional requirements for the system had to be gathered for the organization, Virtusa. The organization is a profit oriented tech-firm that was looking to install a new computer system for its clients. The firm in this instantiated example of the project proves that the failure of the project was due to the requirements deficiencies. The practical case problem presented is that of a software corporation called Virtusa which released a software program application for its...
1 Pages(250 words)Essay

CIS

...College: Computer Programming Preheat the oven to 350 degrees. In a bowl, cream some butter, brown sugar, and white sugar together. Beat in the pudding mix until it is blended (Allrecipes.com, n.d). This recipe step exhibits both a sequence and iteration control structures. The first two steps exhibit a sequence control structure while the last step manifests an iterative approach. 2) 1. Database Administrator - Design and operations of a database 2. Help Desk - End-user oriented 3. System Programmer - Improve mainframe performance 4. Network Manager- Set up and manage network 5. System Operator - Day-to-day computer operations C++ Programming Language C++ is a cross-platform, multi-purpose computer...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Unit 2 Discussiion CIS 204 for FREE!

Contact Us