Free Essay

Nsa Week 1

In:

Submitted By shaunk3716
Words 753
Pages 4
1. Describe a local land line phone system based on the following Landline Telephone Components:

a. Local Loop- it is a loop of copper wire that allows current to flow from the telephone to the central office and back.
b. Central Office- The central office serves a group of customers in a certain or local area. A good example the book utilizes is that the customers associated with the central office are identified by the first 3 digits of their phone number (not the zip code).
c. Local Exchanges- I’m assuming you mean the carriers not the customers, Local Exchange Carriers are local telephone companies that provide service along with other Local Exchange Carriers within a designated geographical area.
d. POP- Point of Presence is the point where either a Local Exchange Carrier or a long-distance carrier meets another long-distance carrier.
e. Long Distance System – A long-distance system is a system that connects local exchange carriers together in different local access and transport areas and can connect within the same local access and transport area.
f. Fixed Line – a fixed line telephone is a phone that could only be connected to one phone. It began with the Bell Telephone Company in 1877 and lacked the ability to connect to multiple phones which were connected through a single central office.

2. Define and describe the following Telecommunications Network Components:
a. Cellular Telephones:
i. Voice- The transmission of analog information via earlier cell phones similar to the way a fixed-telephone transmits voice. ii. Data- The second generation cell phones can transmit and receive digital data which not only allows talking on the phone; it allows other options such as accessing the internet.

b. Telephone Network Topology:
i. Demarcation Point- Is the point at which the responsibility of the service provider ends. ii. Equipment- The equipment for Demarcation point for a customer includes the tie-in OSP (outside plant) cable to the customers premise equipment racks and active equipment. In a FIFTH networks, the connection is typically made in the customer’s premises whereby fiber-optic or copper cabling is connected to the ONT (optical network terminal). iii. Access Networks- An access network is part of the network that connects the individual customer or business to the telecommunications system. iv. Regional/Metro Networks- A metro network is responsible for aggregating information from the local exchanges of a specific service provider, as well as information from other independent service providers, and sending the information to the regional and long-haul/core network.
A regional network also referred to as a WAN network is basically a larger version of a MAN network. It is responsible for aggregation of information from metro networks. Regional networks are typically the last point before information traffic is put onto the core network.

c. Cable TV:
i. Broadcast TV- Broadcast TV prior to the 1950’s was information primarily delivered over fixed lines or radio broadcasts. ii. Community Antenna- In the early stages, it was an antenna placed on the highest point, such as a hilltop with a copper cable that carried the signal from the antenna to the user or group of users. iii. Network Access Point- Is a terminal that serves as a connection point for drop cables. iv. Interface Device- A network interface device is in an all plastic enclosure designed to house the electronics that support a network. The device interfaces with existing cabling for television, telephone, and internet connectivity.

d. Telecommunication Services:
i. RBOCs- Regional Bell Operating Companies are made up of seven service providers that provide most of the fixed-line, wireless, and data services in the U.S due to a suit against AT&T by the government in 1984. ii. Unbundling- Also referred to as local-loop unbundling, is a regulatory process by which multiple telecommunications service providers can lease space on the local exchange connecting to a customer’s home or business. iii. MSOs- Multiple System Operators are cable TV companies that offer television services to consumers using radio frequency over copper and Fiber optic networks. iv. ISPs- An internet service provider is a company that provides access to the internet.
v. Triple Play- Is a data option offered by ISP which includes high speed internet, voice, and video services. vi. Cloud Computing- Is a way to increase the capabilities of a device or add new capabilities or services without making any hardware changes to the device. Some of the key cloud computing services today are data storage, computation, and software.

Similar Documents

Free Essay

Nsa: Surveillance Awareness Project Proposal

...Surveillance Awareness Project A proposal prepared by Team Underachievers Shea Polansky Gabriela Cde Baca Jacob Nevarez Elliot Nicholas For Dr. Natasha Jones University of New Mexico 2014-10-21 Team Underachievers Memo TO:​​Dr. Natasha Jones FROM:​Team Underachievers DATE:​​2014-10-7 SUBJECT:​Proposal PURPOSE:​To acquaint you with our proposal Dear Dr. Jones, Edward Snowden’s leaks about the National Security Agency’s mass surveillance programs created a global debate about privacy, security, and safety. The NSA has the capability to read email, snoop on private social network conversations, observe phone call records, and track the physical locations of citizens not charged nor suspected of any crime, without so much as a warrant. Worse, the demographic most affected this level of snooping on our digital lives, the 18-24 year-old college crowd, is the least knowledgeable and most politically apathetic about the issue. This is a recipe for disaster, and this proposal seeks funding for an awareness campaign that will address it. This campaign will raise awareness about mass surveillance and the Snowden disclosures. We will use posters and flyers to dry attention to the issue. We will use the University of New Mexico as a testing ground, using before and after surveys to gauge effectiveness. If the campaign proves successful, we will recruit volunteers and raise a second round of funding to bring the campaign to college campuses across...

Words: 3481 - Pages: 14

Premium Essay

Rainforest

...taylor | Course and Section Number | Program of Study | Man1030 | business | Introduction to Business MAN1030 Week 2 Individual Work The Challenges to Ensure Your Organization Acts Ethically and is Socially Responsible Assignment Instructions | To complete this assignment: 1. Select question 1, 2, or 3 below and answer it in the space provided. 2. Reflect on the information presented in this week’s lesson and provide an insightful response to each question writing no more than two paragraphs. 3. An example of an excellent response is given for you. | Save and Submit to Dropbox | 1. Save your work as a Microsoft Word 2010 (.docx) file that includes your name, course code, and title in the file name. For example: JaneSmith_MAN1030_Week2.docx. 2. To submit your assignment, go to the Dropbox and click "Submit Assignment." 3. Click on the drop-down menu to select the Week 2: Individual Work basket in the Dropbox. | Objective:Describe the importance of business ethics and social responsibility. EXAMPLE:Find a current article about ethics in business. After reading the article, write a response in which you summarize the article and, in your own words, assess the article. | Example answer:I found an article discussing NSA spying on Verizon, and whether it was ethical for Verizon to disclose that it was providing NSA with all phone records. If the government requests data, I believe that Verizon should be more transparent. Their contracts...

Words: 532 - Pages: 3

Free Essay

Nsa Surveillance Program

...NSA Surveillance Program Eric D. Reeves ITT Tech Online MG517 – Ethical and Regulatory Environment Dr. Carrie A. O'Hare June 9, 2013 Abstract/Executive Summary The American people are reaping what they sow.  They were so eager to have any semblance of security after 9/11, that they allowed the Patriot Act to be rammed through Congress and signed into law all in a matter of days despite warnings from critics that it could be used to infringe upon citizens’ rights. NSA Surveillance Program has been in the news over the past week.  It was revealed Wednesday June 5, 2013 in The Guardian that the NSA had requested the phone records of millions of Version’s customers regardless of whether they were suspected of suspicious activity or not. In addition it seems that other carriers are requesting similar information. * Introduction: This week millions of Americans was informed by The Guardian of a top-secret government order that was approved by the Foreign Intelligence Surveillance Court, requiring that Verizon release and hand over millions of Americans’ phone records to the national Security Agency. Of course this information made many Americans uncomfortable and people started freaking out. Then the Washington Post reported that not only has the government been keeping an eye on whom we call, when, and how long we talk to them, but it’s also been tapping into the servers of nine major U.S. Internet companies and collecting emails, photos, videos, documents, and...

Words: 2521 - Pages: 11

Free Essay

The Government and the Cloud

...------------------------------------------------- The Government and “The Cloud” DéAna Colón Project-Based Information Systems, 90.480.032, TP5 Table of Contents Table of Contents 2 Introduction 3 US Privacy Rights 3 Loss of Companies’ Products/Services 4 Government’s Cloud-Data Security 6 Negative Impact on International Relations 7 Loopholes 8 Conclusion 9 Sources 10 Figure 1: Cisco's Projected Revenue Chart 5 Figure 2: Key Stakeholders and Responsibilities for FedRAMP 7 Introduction With the technological advances made, cloud-based data storage has become a staple in businesses worldwide. Storing data using a web-based content management system offers a limitless amount of off-site storage, allowing companies to save larger amounts of data longer. The United States government currently has the unwarranted authority to read emails or access cloud-based data that has been stored for six months or more. Both positive and negative aspects are realized with this controversy. On a positive perspective, many feel the government accessing the data could be beneficial. Probing may help the government prevent terrorism in the United States. It may also provide the information needed to better forecast the country’s economic future. A disparaging concern is that companies feel the government is violating privacy rights. In addition, possible data leaks may result in a company’s loss of product or services. Ultimately, it must be decided whether the...

Words: 2612 - Pages: 11

Premium Essay

Internet Surveillance

...Contrary to what many people may think, online private data and cellphone meta-data is susceptible to snooping by not only government agencies and corporations, but also hackers willing to risk a prison sentence. In 2013, NSA whistle blower Edward Snowden revealed previously unknown details of global surveillance programs run by the United States' NSA in close cooperation with three partners: Australia, the United Kingdom, and Canada. The documents leaked by Mr. Snowden revealed details about the NSA secretly tapping into Yahoo and Google data centers to collect information from millions of accounts worldwide. The shocking evidenced released by Mr. Snowden reveals that lawmakers and politicians should take greater control over how and why they are using their surveillance technologies, and question whether or not the fight against terrorism justifies the use of these surveillance programs on citizens as well. Furthermore, it is important to ensure that there be continued innovation in internet security in order to create services and products which can counter-act the use of these programs on ordinary citizens who don’t want their data accessible to anyone but themselves. Spying agencies are able to cripple the civil liberties and the right to privacy of citizens, therefore it is imperative that the government protect the rights of citizens through reforms on Surveillance Acts, but it is also equally pertinent for citizens take initiative and push for new reforms and innovation...

Words: 1527 - Pages: 7

Premium Essay

Data Mning

...As the world’s largest non-alcoholic beverage company, Coca-Cola generates petabytes of data from various sources. Multi-channel retail data, customer profile data from loyalty programs, social media data, supply chain data, competitor data, sales and shipment data from bottling partners as well as transaction and merchandising data. Coca-cola collects vast amounts of data and they take a refreshing approach in exploiting that data and deriving value from it. Chief Big Data Insights Officer, Esat Sezer, explains that Coca-Cola takes a strategic approach instead of a tactical approach with big data. They use the vast amount of available data sets to change the way they approach IT. They have embraced big data technologies and as such were able to create a shared services centre for their financial transactional activities as well as an employee service centre for HR activities. They moved from a decentralized approach to a centralized approach, where the data is combined centrally and available via the shared platforms across the organization. In addition, Coca-Cola has almost 70 million Facebook followers and big data enables Coca-Cola to connect to these followers better and be able to grow the brand advocacy. Coca-Cola also leverages Point of Sales data from companies like Walmart (Walmart alone is responsible for $ 4 billion in Coca-Cola sales annually) to build customer profiles, create centralized iPad reporting across the company and enable Collaborative Planning, Forecasting...

Words: 2706 - Pages: 11

Premium Essay

Writing a Report

...Eco-30043 Economic and Business Forecasting Assignment 2012/13 A year ago you were hired as an entry-level assistant business analyst by an advertising agency. Last week, top management requested a review of household consumption behaviour in the United Kingdom. They are particularly interested in whether the recent financial crisis and the economic recession that followed, have permanently altered consumption patterns in the country. The chief analyst, and head of your department, holds a briefing with the entire team in order to assign tasks. You have been asked to do what you have been doing since day one, which is secondary data collection. Confident in your abilities, you see this as an opportunity to gain a more substantive role within the department. You argue that you can provide a thorough and sophisticated analysis of consumer expenditure, complete with reliable forecasts for the foreseeable future. You suggest preparing a report on the analysis of only a subset of goods and services to showcase your technical and analytical skills. The chief analyst agrees to consider your work. If the report you present is at par with the required standard, both in technical detail and analytical discussion, you would be assigned a more prestigious role in the larger scale project, which could lead to a promotion within the department to a more senior level. You are forwarded the data file report1213.dta, which contains, among other, information on UK household expenditure on certain...

Words: 1070 - Pages: 5

Premium Essay

Not-for-Profit

...Christina Selden Week 8 12-7 1. This grant has the characteristics of an exchange transaction rather than a contribution. It is not donor restricted and therefore would be reported in an unrestricted fund. 2014 No entry 2015 Research expenses (direct) 4 Cash (or accounts payable) 4 Grants and contracts receivable 6 Revenue from sponsored research 6 Cash 6 Grants and contracts receivable 6 2. 2014 Pledges receivable (from NSA) 6 Revenues from contributions 6 2015 Research expenses (direct) 4 Cash (or accounts payable) 4 Due from restricted fund 6 Resources released from restrictions 6 Cash 6 Due from restricted fund 6 Cash 6 Pledges receivable (from NSA) 6 Resources released from restrictions 6 Cash 6 3. The grant revenue from the SGMA was recognized only as the research was carried out. It is an ordinary commercial cost plus contract. The restricted contribution from the NSA was recognized when the pledge was made. 4. CAA would not recognize revenue from NSA’s contribution until it had completed the research. 12-8 Cash 30,000 Revenues from contributions 30,000 Resources released from restriction 21,000 Cash 21,000 Equipment 21,000 Resources released from restriction 21,000 Depreciation expense 7,000 Accumulated depreciation ...

Words: 1171 - Pages: 5

Free Essay

Copycat

...abril! Like · Comment · Share · 133 Darryl Lovendino 7 April at 10:01 · Wahahahahah Darryl Lovendino's photo. Like · Comment · Share Karl Chrolo Lovendino, JuJo BaJojo, BO OO and 9 others like this. Darryl Lovendino Write a comment... News Feed Darryl Lovendino shared Waka Flocka Flame's video. 9 March · 7,919,334 Views Waka Flocka Flame uploaded a new video. Like · Comment · Share Solo Kun Hahahaha naimaine ko po kayooo XD 9 March at 10:31 · Like Darryl Lovendino Write a comment... Darryl Lovendino shared Trust Me, I'm a "Psychologist"'s photo. 7 March · Trust Me, I'm a "Psychologist"'s photo. Trust Me, I'm a "Psychologist" tweet it @trustpsychology See translation Like · Comment · Share · 1 Darryl Lovendino shared a link. 2 March · iOS · Drugs As Tools For Spirituality "The program is a voyage chart, a series of signals, which, like the pilot’s radio provides the basic orienting information required for the “trip.” - Timoth... YOUTUBE.COM Like · Comment · Share Darryl Lovendino Write a comment... Darryl Lovendino 21 February · New look mogs. Edward Darryl Lovendino's photo. Like · Comment · Share · 104 News Feed In a relationship with Jun Ji-Hyun From Seoul, Korea Born on 9 July 1994 (20 years old) Followed by 1,892 people FRIENDS · 936 Min Sung Jung Son Joana San...

Words: 901 - Pages: 4

Free Essay

33 Sumaries

...News! 1. 6/6/2013 Doug Gross. * Barack Obama believes that there should be internet access in all schools. He wants to provide funds to around 99% of public schools for them to be able to have internet, even in libraries. He says that he wants all American students to be connected online in five years. Usually, adults don’t go for this type of thing they want children to not be so ‘connected’ to the internet. They want kids to not spend so much time on computers, but he almost wants just that to happen. People are becoming way too dependent on computers and the internet, which even libraries are eventually only going to be used just for that. Although Obama is more so moderate, this idea is clearly making him to be a liberal. He wants the change and wants to continue to further the change on technology. 2. 6/8/2013 Maureen Dowd * In this article, she quotes the book 1984. She is talking about how Bush felt about 9/11 and some of the after effects. It turns out that, for seven years the N.S.A was taking information from our phone calls. This all started while Bush was president through a program called prism. Prism would let the F.B.I. and N.S.A. into many social media websites and was able to access all of our information. These people were trying to spot out terrorists, and will go to any means necessary. According to Obama, they necessarily can’t hear the conversations; they are just able to learn about who we call. They also are saying that they don’t...

Words: 4728 - Pages: 19

Free Essay

Week 2 Programming

...Week 2 homework Visual Basic- Name can't exceed 255 characters You must use a letter as the first character. You can't use a space, (.),(!), @, &, $, # in the name. Python- Must begin with a letter (a - z, A - B) or underscore (_) Other characters can be letters, numbers Case Sensitive Can be any length Java-The name can be of any length. All variable names must begin with a letter of the alphabet, an underscore, or ( _ ), or a dollar sign ($). Similarities 1. Must begin with a letter of the alphabet. 2. There are certain keywords that cannot be used. 3. The length of the name can be any reasonable length. Differences 1. Visual basic has Graphical User Interface while most of the languages such as c and c++ doesn't have 2. It has IDE i.e. other languages design there programs on editor and run program on dos prompt but in case of visual basic all tasks are done under same environment. 3. Visual basic is an event driven language. p.71 Short Answer 1. Ask Questions 2. Pseudocode is a kind of structured English for describing algorithms 3. Input received, Process happens, Output produced 4. Easier to understand and manipulate Workbench 1. Console.WriteLine("Enter Height:"); String number1 = String.Empty; number1 = Console.ReadLine(); 2. Console.WriteLine("Enter Color:"); String number1 = String.Empty; number1 = Console...

Words: 251 - Pages: 2

Free Essay

Jcsuacgsauycgsau

...This Week in Sex: Bisexual Men Have Unique Needs, Casual Sex Is Good for Some, Later Childbirth Linked to Longer Life by Martha Kempner June 27, 2014 - 11:50 am A new study suggests that reactions to casual sex are mostly about the individuals who are having it and how authentic they are being to their own sexual mores. (Couple in bed via Shutterstock) This Week in Sex is a weekly summary of news and research related to sexual behavior, sexuality education, contraception, STIs, and more. The Public Health Community and the Needs of Bisexual Men A new study in the Journal of Preventative Medicine argues that the public health community has not paid enough attention to the unique needs of bisexual men. In Beyond the Bisexual Bridge, author William Jeffries suggests that men who have sex with men and women (MSMW) are often seen as transmitters of sexually transmitted infections (STIs) including HIV, and, more to the point, as the way in which certain diseases or epidemics jump from gay men to heterosexuals of both sexes. By looking at them as disease vectors and not a population with their own sexual health issues, however, Jeffries believes that we are making bisexual men more vulnerable to STIs. Only about 2 percent of the male population identifies as MSMW but, according to the study, their sexual health needs and experiences are different from those of heterosexual or straight men. They are more likely to have early sexual debut, forced sexual encounters, and sex in...

Words: 3174 - Pages: 13

Premium Essay

Mobile Technology and Privacy

...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...

Words: 7224 - Pages: 29

Free Essay

Whistleblowing

...Whistleblowing: Necessary Evil or Good Thing Maureen Haley University of North Carolina – Asheville April 16, 2014 This paper was prepared for Management 484-001, taught by Professor Donald D. Lisnerski Whistleblowing: Necessary Evil or Good Thing Is whistleblowing a necessary evil or good thing? Can whistleblowing be avoided? Can the whistleblower be protected? “A whistleblower is an employee who discovers corporate misconduct and chooses to bring it to the attention of others.”(Ghillyer, 2014) Whistleblowers can be viewed as providing a praiseworthy act or be severely labeled as informers who have breached the loyalty of their co-workers and company. Whistleblowing can be a service to the community and public. Whistleblowing can be ethical or unethical, and the whistleblower discovering corporate misconduct has the options to be an internal or an external whistleblower. Whistleblowing can save people’s lives. Dr. Jeffrey Wigand made the decision to go public with information that his employer Brown & Williamson (B&W) was manipulating the nicotine content, suppressed efforts to develop safer cigarettes, and lied about the addictive properties of nicotine. According to Sissela Bok, in the book Taking Sides: Clashing views in Business Ethics and Society, “not only is loyalty violated in whistleblowing, hierarchy as well is often opposed, since the whistleblower is not only a colleague but a subordinate. Though aware of the risks inherent in such disobedience...

Words: 3746 - Pages: 15

Premium Essay

Moder Totalitarianism

...Modern Totalitarianism. In the 1940s through the 1960s, the world lived in a time of war. In September 1939 World War II broke out , and was followed by the Cold War of 1947 that lasted up until 1991. The historic wars of these times influenced literature and the writers of the time, as they shaped their novels and books around these events. Writers such as George Orwell and Kurt Vonnegut created novels of dystopian societies to alert nations that communism was not as great as it sounded. British writer George Orwell wrote the novel 1984 published by Harcourt Brace Jovanovich, Inc. in 1949. 1984 is a political novel written with the purpose of warning readers in the West of the dangers of totalitarian government. In 1949, the Cold War had not yet escalated, and many Americans supported communism as possible political systems for the west. Therefore, Orwell wrote his novel in order to expose the cruelty and oppression of communist countries. In his dystopian nation, Orwell gave a sneak peak of what a country could become if the people gave all the power to the government. In 1984, Orwell portrays the perfect totalitarian society in which the government monitors and controls every aspect of human life to the extent that having a disloyal thought is against the law. They do so with the use of technology such as tele screens and microphones across the city which allowed the government to monitor all the citizens almost all of the times. In order to keep the citizens of London...

Words: 2560 - Pages: 11