Premium Essay

Intro to Networking Lab 9.1

In: Computers and Technology

Submitted By Delan42
Words 1408
Pages 6
NT1210 Lab 9
The Internet
Chandra Ramsey
February 29, 2016
Lab 9 The Internet
9.1.1 Broadband Internet
The original dialup connections offered by telephone companies required complete use of the telephone cable to connect to the Internet (meaning that no calls could be placed or received during the Internet connection). Why is this inefficient for establishing a connection to the Internet? What was the limitation of the data rates available on this type of Internet connection?
First you had to make sure that your call waiting feature was turned off so that there wouldn’t be any interruptions in the service. Because it was like using the telephone, your data rates were charged as long distance telephone calls by the minute.
9.1.2
The term broadband Internet generally refers to higher-speed and constantly available connections to the Internet. The term represents an evolution of Internet connectivity, but it originally referred to the type of media usage. Broadband and baseband are the two types of media usage available. Briefly define these terms and explain the difference between them.
Broadband – The term broadband commonly refers to high-speed Internet access that is always on and faster than the traditional dial-up access. It also includes several high-speed transmission technologies such as Digital Subscriber Line (DSL) Cable Modem.
Baseband – refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different frequency range.
The difference between baseband and broadband is that baseband uses digital signaling, and broadband uses analog signals in the form of optical or electromagnetic waves over multiple transmission frequencies.

9.1.3 DSL Connection Types Table 9-1 Lab 9.1 Review
1. The cable television infrastructure has been incorporating fiber-optic cable since the…...

Similar Documents

Premium Essay

Intro to Networking Lab 9.1

...Lab 9.1 – 9.4 ITT – Technical Institute Introduction to Networking Martin Gilmore January 6, 2016 Lab 9.1: Broadband Internet Exercise 9.1.1 * This was inefficient because it prohibited the use of the phone line for its original intention. * The limitation of the data rate for this type of connection was 56kbps. Exercise 9.1.2 * Broadband uses multiple channels of frequencies to transmit data more efficiently where broadband uses a single channel. Exercise 9.1.3 DSL Connection Types DSL Type | Maximum Download Speed | Maximum Upload Speed | Maximum Distance (m) | ADSL | 24 Mbps | 1.4 Mbps | 6000+ | HDSL | 1.54 Mbps | 1.54 Mbps | 3650 | IDSL | 144 Kbps | 144 Kbps | 10,700 | MSDSL | 2 Mbps | 2 Mbps | 8800 | RADSL | 7 Mbps | 1 Mbps | 5500 | SDSL | 2,048 Mbps | 2,048 Mbps | 3000 | VDSL | 52 Mbps | 16 Mbps | 1000+ | Lab 9.2: Networks and Subnets Exercise 9.2.1 * If you had 4 bits for the host ID, how many unique combinations can be made from 4 bits? * 16 * What is another way to express this value as a power of 2? * 42 Exercise 9.2.2 * On a /24 network, how many unique host ID values exist? * 256 hosts * On a /16 network, how many unique host ID values exist? * 65,534 hosts, or 164 Exercise 9.2.3 * What is the reserved network address? * 176.33.4.0 * What is the reserved broadcast address? * 176.33.4.255 * What is the first available host ID for a unique host on this......

Words: 542 - Pages: 3

Premium Essay

Nt 1210

...Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to......

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to......

Words: 4400 - Pages: 18

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they......

Words: 16182 - Pages: 65

Premium Essay

Police Abuse Essay

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify......

Words: 16043 - Pages: 65

Premium Essay

Introduction to Networking

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify......

Words: 16043 - Pages: 65

Premium Essay

Mangaement of Project

...Progress – Earned Value Project Scoping and Life Cycle, Project Selection Methods and Portfolio Strategy, Project Proposal Project Dynamics and Alternative Contracts in Project Management Quality, Communication and Knowledge in Project Management Critical Chain and alternative Project Models Revision and Exam Preparation C Braziotis C Braziotis C Braziotis A Pyne C Braziotis C Braziotis N14C31 – Managing Projects © Christos Braziotis, 2012-2013 – Nottingham University Business School Slide 28 Skills & Assessment Assumed Skills: • Basic arithmetic • Basic statistics – Average and variance / Normal distribution • Teamwork Assessment: • 2 hour examination (70%) • Group coursework assignment (30%) - In groups of 4 (Start networking!) N14C31 – Managing Projects © Christos Braziotis, 2012-2013 – Nottingham University Business School Slide 29 Module Texts A • Meredith, J.R. and Mantel, S.J. (2012) Project Management: A Managerial Approach. 8th Edition, John Wiley and Sons Ltd. – Note #1: this is the recommended primary text for the module. Material from it will be used in many lectures. The book comes with a CDROM containing Crystal Ball which will be used in the course. – Note #2: It is a minor update to the 7th, 6th and 5th Editions, and either can be used for the course. 8th Edition N14C31 – Managing Projects 7th Edition 6th Edition 5th Edition Slide 30 © Christos Braziotis, 2012-2013 – Nottingham University Business School Module......

Words: 3914 - Pages: 16

Premium Essay

Damsel

..................................................................................................... 46 8.10 Residence ..................................................................................................................... 46 8.11 Off-campus living service............................................................................................... 46 8.12 Student government ...................................................................................................... 46 8.13 Student conduct ............................................................................................................ 46 xi Section 9: Faculty of Business and Information Technology ........................................... 48 9.1 Degrees offered ............................................................................................................. 49 9.2 Program information – Bachelor of Commerce (Honours) ............................................. 50 9.2.1 General information ................................................................................................... 50 9.2.2 Admission requirements ............................................................................................ 50 9.2.3 Internship program .................................................................................................... 51 9.2.4 Careers.....................................................................................................................

Words: 195394 - Pages: 782

Premium Essay

Biotechnology

...26 29 30 30 33 35 36 37 39 39 39 40 42 42 46 46 48 49 49 51 51 51 3 E-business infrastructure Learning outcomes / Management issues Links to other chapters Introduction E-business infrastructure components Real-world E-Business: Random House Internet technology Hosting of web sites and e-business services The Internet timeline Just how big is the Internet? Case Study 3.1 Innovation at Google Intranets and extranets Web technology Internet-access software applications Blogs and blogging Electronic mail or e-mail Feeds Voice over IP (VoIP) 103 103 103 104 105 107 109 110 111 114 115 116 124 128 129 131 132 134 A01_CHAF9601_04_SE_FM.QXD:D01_CHAF7409_04_SE_C01.QXD viii 10:59 Page viii Contents How does it work? Internet standards Networking standards The HTTP protocol Uniform resource locators (URLs) Domain names Web presentation and data exchange standards Audio and video standards Focus on Internet governance Managing e-business infrastructure Managing hardware and systems software infrastructure Managing Internet service and hosting providers Managing employee access to the Internet and e-mail Managing e-business applications infrastructure Focus on web services, SaaS and service-oriented architecture (SOA) Benefits of web services or SaaS Challenges of deploying SaaS Case Study 3.2 New architecture or just new hype? EDI Focus on mobile commerce Wireless Internet access standards Wireless access devices Popularity of mobile......

Words: 404133 - Pages: 1617

Premium Essay

Netwrk Security

...had limited capabilities. Terminals actually required a physical connection on a dedicated port. The ports were often serial connections that utilized the RS-232 protocol. It usually required one port for one terminal. IBM, Digital Equipment, and other computer manufacturers developed variations on this architecture by utilizing terminal servers, but the basic concept was the same. There was nothing equivalent to what we experience today where hundreds if not thousands of connections can reach a system on a single network circuit. In the 1980s, the combination of the development of the personal computer (PC), the development of network protocol standards, the decrease in the cost of hardware, and the development of new applications made networking a much more accepted practice. As a result, LANs, WANs, and distributed computing experienced tremendous growth during that period. When first deployed, LANs were relatively secure-mainly because they were physically isolated. They were not usually connected to WANs, so their standalone nature protected the network resources. WANs actually preceded LANs and had been around for some time, but they were usually centrally controlled and accessible by only a few individuals in most organizations. WANs utilizing direct or dedicated privately owned or leased circuits were relatively secure because access to circuits was limited. To connect two locations (points A and B) usually required a point-to-point (A-B) circuit. If you wanted to......

Words: 95027 - Pages: 381

Free Essay

Unix

...know what you did or didn’t like about this book—as well as what we can do to make our books stronger. Please note that I cannot help you with technical problems related to the topic of this book, and that due to the high volume of mail I receive, I might not be able to reply to every message. When you write, please be sure to include this book’s title and author as well as your name and phone or fax number. I will carefully review your comments and share them with the author and editors who worked on the book. Fax: 317.581.4663 Email: opsys@mcp.com Mail: Executive Editor Operating Systems Macmillan Computer Publishing 201 West 103rd Street Indianapolis, IN 46290 USA 00.72314819 FM 10/24/00 9:55 AM Page xviii 01.72314819 intro 10/24/00 9:56 AM Page 1 Introduction In recent years, the UNIX operating system has seen a huge boost in its popularity, especially with the emergence of Linux. For programmers and users of UNIX, this comes as no surprise: UNIX was designed to provide an environment that’s powerful yet easy to use. One of the main strengths of UNIX is that it comes with a large collection of standard programs. These programs perform a wide variety of tasks from listing your files to reading email. Unlike other operating systems, one of the key features of UNIX is that these programs can be combined to perform complicated tasks and solve your problems. One of the most powerful standard programs available in UNIX is the shell. The shell is a......

Words: 112126 - Pages: 449

Premium Essay

Acquisition Law

...Schedule Baseline Segment 6 questions........................................................................164 Prepare the Cost Management Plan (PMBOK® Guide 7.0) Estimate Costs (PMBOK® Guide 7.1) 7.2.1 Resource pool and rates Determine Budget (PMBOK® Guide 7.2) 7.3.1 Historical budget and schedule dramas 7.3.2 Cost Baseline 7.3.3 Funding reconciliation 7.3.4 The Performance Measurement Baseline Plan Quality (PMBOK® Guide 8.1) 7.4.1 Quality issues and gurus 7.4.2 Six Sigma & other quality movements 7.4.3 Cost of Quality and additional quality tools 7.4.4 Quality Management Plan 7.4.5 Process Improvement Plan Segment 7 Questions .......................................................................196 Develop Human Resources Plan (PMBOK® Guide 9.1) Responsibility Assignment Matrices 8.2.1 Organization Chart & Staffing Management Plan Plan Communications (PMBOK® Guide 10.2) 8.3.1 Information and stakeholder analysis 8.3.2 Sender-Receiver Models 8.3.3 The Communications Management Plan Plan Risk Management (PMBOK® Guide 11.1) 8.4.1 The Risk Management Plan 8.4.2 Risk categories 8.4.3 Risk Breakdown Structure Segment 8 questions........................................................................226 6.4 7.1 7.2 7.3 Segment 7. Budgeting, Quality & Risk Planning ......................................................169 7.4 7.5 8.1 8.2 8.3 Segment 8. Complete the Subsidiary......

Words: 67153 - Pages: 269

Premium Essay

Database Management System

...Concepts Chapter 10: Transaction Management and Concurrency Control Chapter 11: Database Performance Tuning and Query Optimization Chapter 12: Distributed Database Management Systems Chapter 13: Business Intelligence and Data Warehouses PART V: Databases and the Internet Chapter 14: Database Connectivity and Web Technologies PART VI: Database Administration Chapter 15: Database Administration and Security GLOSSARY INDEX IV BRIEF CONTENTS The following appendixes and answers to selected questions and problems are included in the Premium Website for this text, found at cengage.com/mis/coronel. Appendix A: Appendix B: Appendix C: Designing Databases with Visio Professional: A Tutorial The University Lab: Conceptual Design The University Lab: Conceptual Design Verification, Logical Design, and Implementation Converting an ER Model into a Database Structure Comparison of ER Model Notations Client/Server Systems Object-Oriented Databases Unified Modeling Language (UML) Databases in Electronic Commerce Web Database Development with ColdFusion The Hierarchical Database Model The Network Database Model Microsoft ® Access ® Tutorial Creating a New Database Using Oracle 11g Appendix D: Appendix E: Appendix F: Appendix G: Appendix H: Appendix I: Appendix J: Appendix K: Appendix L: Appendix M: Appendix N: Answers to Selected Questions and Problems V TABLE OF CONTENTS PA R T I D ATA B A S E C O N C E P T S Business Vignette: The Relational......

Words: 189848 - Pages: 760

Premium Essay

Product Management Pdf

...features of what is called the third-generation new products process, which is the way most firms interpret the process depicted in Figure 1.4.31 There is something else significant in Figure 1.4. Don’t be misled by the titles of the phases. They do not refer to functions or departments. Technical people lead the technical portion of the development, but others participate, some very actively, including market research, sales, design, and so on. Launch sounds like a marketing activity, but much of the marketing is done back during earlier phases. We discuss what we call the “marketing ramp-up” in detail in Chapter 16. Also, during launch, the manufacturing people are busy setting up production capability. Legal people are clearing brand names, lab people are running tests on early product output, and so on. As seen before, the new products process is a job for a well-organized, efficient cross-functional team. Additionally, different firms group the new product activities differently. There is certainly no agreement on the exact number of steps. That is not a cause for concern. Rather than thinking of the process as some number of discrete phases, look for the bigger picture of a large, evolving, general-purpose process, which we break up into phases partly for our benefit in presenting the story about new product activities. Different firms simply break up the same underlying process differently. Lexmark International, manufacturer of printers and related products and associated......

Words: 279013 - Pages: 1117

Premium Essay

Relational Algebra

...and electronic mail address. We have endeavored to eliminate typos, bugs, and the like from the text. But, as in new releases of software, bugs probably remain; an up-to-date errata list is accessible from the book’s home page. We would appreciate it if you would notify us of any errors or omissions in the book that are not on the current list of errata. We would be glad to receive suggestions on improvements to the books. We also welcome any contributions to the book Web page that could be of use to other read- Silberschatz−Korth−Sudarshan: Database System Concepts, Fourth Edition Front Matter Preface © The McGraw−Hill Companies, 2001 9 Preface xxiii ers, such as programming exercises, project suggestions, online labs and tutorials, and teaching tips. E-mail should be addressed to db-book@research.bell-labs.com. Any other correspondence should be sent to Avi Silberschatz, Bell Laboratories, Room 2T-310, 600 Mountain Avenue, Murray Hill, NJ 07974, USA. Acknowledgments This edition has benefited from the many useful comments provided to us by the numerous students who have used the third edition. In addition, many people have written or spoken to us about the book, and have offered suggestions and comments. Although we cannot mention all these people here, we especially thank the following: • Phil Bernhard, Florida Institute of Technology; Eitan M. Gurari, The Ohio State University; Irwin Levinstein, Old Dominion University; Ling Liu, Georgia......

Words: 301237 - Pages: 1205