Premium Essay

Nt1310 Unit 5 Research Paper

Submitted By
Words 592
Pages 3
The idea is to convert the DC supply into a high frequency AC supply with the help of an oscillator, which we need in order to transfer wirelessly [7]. For the oscillator we used a simple Colpitts oscillator. The oscillator is a simple one to implement and being a current oscillator it is helpful for the system [1]. The AC power is then transferred wirelessly through inductive coupling. In inductive coupling power is transferred between coils of wire by a magnetic field. Fig. 2 shows the block diagram for the wireless power transfer through inductive coupling. The transmitter and receiver coils together form a transformer. An alternating current (AC) through the transmitter coil (L1) creates an oscillating magnetic field (B) by Ampere's law. The magnetic field passes through the receiving coil (L2), where it induces an alternating EMF (voltage) by Faraday's law of induction, which creates an AC current in the receiver. One important parameter for coupling is frequency, as the efficiency shows a proportional relationship with frequency for such systems [9].

Fig 2 Block diagram of WPT (Collected from [9]) Both of the coils act like a transformer using which the power is transferred. The power …show more content…
For this system, a 24AWG Magnetic Enameled Wire have been used. The diameters and number of turns of both the transmitting coil and receiving coil are chosen in such a way that they both resonate at the same frequency. The diameter and number of turns were arbitrarily chosen to be 15cm and 20 turns respectively. The coils were then separately connected to the transmitting end or Colpitts oscillator. The number of turns of both the coils were varied to get the expected outcome. When both the coils resonated at the same frequency, then the receiving part was accordingly. The chosen frequency was 66 KHz approximately. To find the inductance of the coils, the following formula were

Similar Documents

Premium Essay

Nt1310 Unit 5 Research Paper

...a router does not respond to the hello packet, it is assumed dead, and routing updates are sent to every other router by using a multicast address. In the case where there are no network changes, OSPF will use very little bandwidth (only sending hello packets). As soon as there is an outage, however, OSPF will flood the network as the change is sent to every router (and then every router notifies every other router about the change). This system of near silence when possible and flooding when necessary ensures that routing information gets propagated throughout the network as quickly as possible. Bibliography: Basu, Anindya. Stability Issues In OSPF Routing. 1st ed. 2001. Print. Yang, Song. RIP Internet Protocol Failure Analysis And Research. 1st ed. 2012. Print. Oki, Eiji. Advanced Internet Protocols, Services, And Applications. John Wiley & Sons, Inc, 2012. Print. ...

Words: 919 - Pages: 4

Premium Essay

Nt1310 Unit 5 Networking Research Paper

...How to protect From unauthorised access. Firewalls Secure socket layers (SSL) Strong passwords Firewalls Firewalls are a set of related programs that are located at a network gateway server. Firewalls protect private networks from users from other networks getting access. Firewalls are important to have to stop people from accessing things they shouldn’t as for example if someone not involved in a business gets access to a business’s website they then could access that business customers private information which would make that business not be trusted by the public which would lose the business money. Secure socket layers- easier to remember as (SSL) is a protocol for transmitting private documents through the internet. SSL keeps users personal details such as full name, address, bank card details, etc. knowing that websites with ‘https’ with the ‘s’ after the ‘http’ indicates that the website is secure and can be trusted to not do anything it shouldn’t such as sharing out your personal details or taking more money that agreed on if it was a site where you were purchasing something. Other sites that cannot be trusted may ask for details and if you give them all your details that that’s giving them everything that they need to steal your money and even steal your identity. Strong password...

Words: 510 - Pages: 3

Premium Essay

Telecommunications

...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...

Words: 496 - Pages: 2

Premium Essay

Nothing

...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...

Words: 10839 - Pages: 44

Premium Essay

Unit

...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...

Words: 6762 - Pages: 28

Premium Essay

Fsmo Role Ayer Nate Method

...Sole's Blog SOLVE YOUR IT PROBLEMS FASTER, SAVE YOUR FEET AND GET MORE TIME ON YOUTUBE! * HOME * * ABOUT SOLE VIKTOR * * USEFULL LINKS « How to publish a website with both Anonymous and Forms Based Authentication in ISA 2006 How to configure ISA 2006 with FBA for OWA and NTLM for Outlook Anywhere and Autodiscover in Exchange 2007 » How to place FSMO and Global Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master...

Words: 10360 - Pages: 42