Premium Essay

Nt 1210

In: Computers and Technology

Submitted By thsvikepitcher18
Words 4400
Pages 18
ITT Technical Institute

NT1210 Introduction to Networking Onsite Course


Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments

Introduction to Networking


Where Does This Course Belong?
This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration

NT2799 NSA Capstone Project

NT2580 Introduction to Information Security

NT2670 Email and Web Services

NT2640 IP Networking

PT2520 Database Concepts

NT1330 Client-Server Networking II

NT1230 Client-Server Networking I

NT1430 Linux Networking

PT1420 Introduction to Programming

NT1110 Computer Structure and Logic

NT1210 Introduction to Networking

NT1310 Physical Networking

CO2520 Communications

SP2750 Group Theories

EN1420 Composition II

EN1320 Composition I

GS1140 Problem Solving Theory

GS1145 Strategies for the Technical Professional

MA1210 College Mathematics I

MA1310 College Mathematics II

Networking Technology Courses


Similar Documents

Premium Essay

Nt 1210

...Emmanuel Reyes NT 1210 S. 8:00-12:55 Unit 2 Lab 6.3: 1) SSID can be more diverse be unique to the users of the network 2) ASUS RT-AC68U, the LAN and Wireless 2.4 GHz MAC Addresses are the same because is the same device providing hard-line and wireless internet connection. The IP Address is IP Range of – 3) Firmware updates help keep the device running with the latest software needed. Restoring to defaults/loading settings help re-acquire in case something happens to the router. 4) Reyes Home Network Guest. You can add security to sign on to the guest network. You increase the number of wireless networks found within range of the router. 2.1: 1) Media is needed for the signal to pass on, Interface is needed to connect media and access the signal, Signal is what is transported on the media, Pattern is used so signals can be recognized, Timing helps determine the patterns and thus the signal being passed. Without any one of these, the signal will not get to the destination and a link will not occur. 2) Plug and Play, Device Discovery, Driver Updates 3) I cannot add programs by searching on my laptop 4) Peer-to-peer devices allow like devices to communicate without special hardware. 5) Local Area Network, Wireless, Bluetooth 2.1 Review: 1) Network devices can operate through the network and by more than one computer, peripheral devices may be internal or external, but must be connected to a computer with the proper cables. ...

Words: 569 - Pages: 3

Free Essay

Nt 1210

...NT-1210 Unit Name Lab l Labs Date 1-l Reading Binary Convert the following decimal numbers to binary equivalents: 89 1011001 776 10110000 Convert the following Binary values to their decimal equivalent: 101_0100L 169 11101010 234 Lab 1-2 Binary Math and Logic Draw the graphical symbol Explain the logical operations (give a truth table) for each: AND OR NOT Lab 1.3 Bit and Byte Structure - (see page 15 of lab manual) How many bits are in a byte? 8 1 Kilobyte is equal to: 1024 55,296 23,552 bytes Kilobytes Megabytes Terabytes 54 Megabyte is equalto: 23 Gigabyte is equalto: 5 Terabyte is equal to 5,120 120MB = 16GB= 125,829,120 16,384 bytes MBytes Lab 1.4 ASCII (See page 20 of Lab manual) 1. Decode the simple numerical sentences into one English paragraph. You may use Google to find an ASCII table. Use the keywords-Binary to text conversion; Hexadecimatto text conversion; ASGllto text conversion-to aid the decoding process: Code"Tvoe ASC llcodes Numeric Message 87 101 1 08 1 08 44 32 116 104 97 116 32 109 97 107 101 115 32 111 117 114 32 49 48 32 110 117 109 98 101 114 32 100 101 99 105 109 97'108 3247 3297 115 99 105 10532115121115116 101 '10932 106 117 11511632114105103104 11633148 Translation Well, that makes our 10 number decimal / ASCII system just right! Lab 1.5 Creating a File System Follow the procedures outlined in the Lab Manual on pages 231o27......

Words: 918 - Pages: 4

Free Essay

Nt 1210

...Objectives and Assignments Week 7 Instructor: Thomas W. Chappell, PhD. Office Hours (For appointments): Monday, Tuesday, Wednesday, Thursday 3:30 – 6:00 PM Objectives: Complete current week’s assignments submissions Important Notes: Attendance in class is critical to your accomplishments Missing class is missing valuable information that will help you succeed and accomplish your goals Please attend every class for success in your field! Grading Policy: * Please read the last page of your syllabus which will be covered in week one. * Missing labs will be made up at 80% after the first week, 70% the after the second week and 0% the third week. * Quizzes will not be made up. * Students can potentially be dropped by the Dean of Academic Affairs after missing 4 or 5 cumulative classes. * Students who miss three consecutive class will be dropped by the Dean of Academic Affairs * Assignments and Labs will be counted at 0% after three weeks. Course Objectives Covered by This Unit * CO1 Identify the major needs and stakeholders for computer networks and network applications * CO2 Identify the classifications of networks and how they are applied to various types of enterprises * CO3 Compare and contrast the OSI and TCP/IP models and their applications to actual networks * CO4 Explain the functionality and use of typical network protocols * CO5......

Words: 799 - Pages: 4

Free Essay

Nt 1210

...NT 1210 Lab 3.1.1, 3.2.1, 3.3.1 The Purpose of Reference Models Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi-Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? The process of marketing the wireless devices would be much slower than if the Wi-Fi Alliance wasn’t governing them. This would impact my personal life or business communications in a big way. The reason is Wi-Fi Alliance certifies the products through pre-standard rules thus insuring the speed of product market and quality. The OSI Reference Model Exercise 3.2.1 Define each layer of the OSI Model and state what each layer provides. Physical – transmission and reception of the unstructured raw bit stream over a physical medium. Carries signals for higher layers and describes the electrical /optical , mechanical and functional interfaces. Data link – Error free transfer of data frames from node to node over the physical layer , allowing the higher layers to assume virtually error –free transmission over the link. Network - is the third layer, which controls the subnet operation by deciding which physical path data should take based on network conditions and priority of service with other factors. Transport - is the fourth layer, which ensures the error-free delivery of messages in sequence and with no losses or duplications. Higher layer protocols are relieved from concerns with......

Words: 473 - Pages: 2

Premium Essay

Nt 1210

...Casey Alexander Unit 2 Assignment 2 Multiple choice 1) C 11) A 2) B 12) A, D 3) B, D 13) B 4) C, D 14) C 5) A 15) A, D 6) D 16)D 7) C 17)D 8) C 18)D 9) A, C, D 19) A 10) C, D 20) B Key terms 1) Computer networking – A combination of many components that work together so that many different devices can communicate. 2) Computer network - A combination of many components that work together so that many different devices can communicate. 3) Application – Software that performs some useful function for a user. 4) Email - Electronic mail. An application in which the user can type text and attach other files to create the electronic equivalent of a postal letter, and send the email to another person using his or her email address. 5) Voice call – A more modern term for a telephone call that emphasizes the fact that the traffic flows between the endpoints is voice. 6) Video frame – A grid of pixel locations of a chosen width by height that contains the light/colors......

Words: 402 - Pages: 2

Premium Essay

Nt 1210 Presention

...NT1210 Introduction to Networking Introduction to Computer Networking 1 Objectives  Identify the major needs and stakeholders for computer networks and network applications.  Identify the classifications of networks and how they are applied to various types of enterprises.  Explain the functionality and use of typical network protocols.  Use preferred techniques and necessary tools to troubleshoot common network problems. 2 Objectives  Define a computer network.  Identify the primary needs for computer networks and network applications.  Draw the four major physical network topologies: bus, star, ring, and mesh. 3 Computer Networking  Use large variety of components that must work together.  Move bits from one device to another.  Bit: Smallest unit of data, binary 1 or 0.  Focuses on copying bits on one device to another.  Computing devices include computers, gaming systems, televisions, phones, tablets, GPS navigation systems, watches, etc. 4 Defining a Network with User Applications  Examples: Digital advertising, online/video games, text messages, websites, social media, and email.  Network diagrams often use cloud to identify what part of network to ignore for a particular discussion.  LAN vs WAN 5 Defining a Network with User Applications Computer Networks: Cloud Representing Hidden Parts of the Network 6 Figure 2-1 An Informal General Definition of a Computer Network  Telecom: Short for telephone......

Words: 4305 - Pages: 18

Free Essay

Nt 1210 Introduction to Networking

...John Holbrook Step by Step Installation of a Secure Linux Web, DNS and Mail Server Feb 10, 2004 GIAC GSEC Practical – Version 1.4b, Option 1 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46. 1 Table of Contents Abstract................................. Introduction.........................................................................................................................4 Current Setup..................................................................................................................4 Reasons for new install ..................................................................................................4 Sudo...............................................................................................................................5 Security Comparison of Redhat 9.0 and Openna 1.0..........................................................7 Default Installed Services...............................................................................................7 Configuration Notes............................................................................................................8 The New Setup...............................................................................................................8 Layers of Protection........................................................................................................9 Verifying Integrity of Downloaded Files.................................

Words: 16169 - Pages: 65

Free Essay

Nt 1210 Unit 9 Exercise

...Unit 9. Exercise 1. Print Server Assignment Requirements Respond to the following email: -- FROM: Rebop Pakulah, Acme Engineering Company RE: Printers are multiplying like rabbits. Hello most esteemed US computer guru, Thank you for setting up our branch office in the US. However, our data center has a problem. It seems that everyone there is in love with Office Depot and has a printer on their desk. We employ 150 people. This is too many printers. The ink is so expensive. I hear many people come in of Saturdays and print baseball schedules, shopping list, and photos of their family. What can you suggest to help me? Thank you! From: AA To Rebop Pakulah Hello Rebop; glad to hear your company has increased in employees and volume. Rebop I cannot believe almost every user in cubicle has their own printer. This must stagnate your network, not to mention office expenses for toner and repair calls. Here is what I am suggesting for your 150 employees; you should have 3 multipurpose printers HP4555mfp printers. Then perhaps keep about 10 small HP printers that may belong to your admin staff, such as HR, Recievers, accounts payable team, and those employees that use a printer for 75% percent of their duties. All of these printers would be added to the network server, the subnet, gateway, and IP would be assigned to each printer. After that rules can be added to these printers, such as standard settings, if a user needed to use a portrait printer......

Words: 319 - Pages: 2

Free Essay

Nt 1210 Unit 1 Assignment

...Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 > 1 x 1 = 1 2931 Exercise 1.1.2 22 > 4 x 1 = 4 21 > 2 x 1 = 2 20 > 1 x 0 = 0 4+2+0= 6 Exercise 1.1.3 21 > 2 x 1 =2 20 > 1 x 1= 1 2+1= 3 Exercise 1.1.4 24 > 16 x 1 = 16 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 16+0+0+2+0=18 Exercise 1.1.5 11100010 27 > 128 x 1 = 128 26 > 64 x 1 = 64 25 > 32 x 1 = 32 24 > 16 x 0 = 0 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 128+64+32+0+0+0+2+0=226 > Exercise 1.1.6 156 156 > 27 > 128 x 1 = 128/ 156-128= 28 28 > 26 > 64 x 0 = 0 28 > 25 > 32 x 0 =0 28 > 24 > 16 x 1 = 16/ 28-16=12 12 > 23 > 8 x 1 = 8/ 12-8=4 4 > 22 > 4 x 1 = 4/ 4-4=0 0 > 21 > 2 x 0 = 0 0 > 20 > 1 x 0 =0 100111002 = 156 Exercise 1.1.7 255 255 > 27 > 128 x 1 = 128/ 255-128=127 127 > 26 > 64 x 1 = 64/ 127-64=63 63 > 25 > 32 x 1 = 32/ 63-32=31 31 > 24 > 16 x 1 = 16/ 31-16=15 15 > 23 > 8 x 1 = 8/ 15-8=7 7 > 22 > 4 x 1 =......

Words: 2960 - Pages: 12

Premium Essay

Nt 1210 Unit 5 Assignment 2

...GS 1145 Strategies Unit 11 Assignment 1 Reflection Kelly S Draney This class has been an eye opener for me in respect that I was a real procrastinator. It has helped to open my eyes to the fact that I need to get my homework done and in on time. With the assignment on scheduling I found that I wasted a lot of time during the day, when I could be getting things done. Breaking down my schedule into blocks showed me that I had a lot of wasted time watching TV when I could be more productive. Having to juggle time for work and school was something I was not accustomed to. I have a greater respect for my students now seeing what they have to go through. The other thing this class helped me with, was learning how to use the Microsoft Office Suites programs better. I had no idea how to use Power Point before this class. Gratefully we were put into small groups to work on these projects. The good thing about these projects was it gave me a chance to learn about Power Point. I was surprised how easy it really is to use. It also helped to learn the different rules about completing a Power Point Presentation. I enjoyed being in your class. I heard a lot of good comments from students who felt you were tough, but fair. You created a fun learning environment in class. I look forward to having you again for an instructor later on in my studies....

Words: 259 - Pages: 2

Premium Essay

Nt 1210 Unit 5 Research Project 1.Docx

...Major needs and major stakeholders for computer and network applications Classification of Networks A system convention characterizes standards and contracts for correspondence between network devices. Versatile, few progressions, few elements, high data transfer capacity, CPU power, repetition, port thickness, reasonableness, security highlights The Advantages of using Layer 2 economical, adaptable and versatile, simple to introduce and keep up. Advantages of Ethernet technology Thicknet >(10BASE5)- uses a thicker coaxial link with a transport topology. Thinnet-(>10BASE2) uses a more slender coaxial link with a transport topology. >Ethernet-(10BASE-T) - star topology & UTP cabling >Quick Ethernet (100BASE-T) - convey movement at the ostensible rate of 100 Mbit/s, star topology utilizes UTP .>Gigabit Ethernet (1000BASE-T) - utilizes four sets of Category 5 unshielded contorted pair to accomplish the gigabit information rate of 1000 Mbits/s Define Ethernet concepts Classifiedness- Protection from exposure to unapproved individuals. Confirmation- User names and passwords. Trustworthiness- Maintaining information consistency. Firewalls-an instrument that controls advanced data that comes into and goes out of the system. Antivirus-infection programming intended to recognize and demolish infections. Basic security requirements LAN (Local Area Network)-WLAN (Wireless Area Network)CAN (Campus Area Network)MAN (Metropolitan Area Network)WAN (Wide......

Words: 453 - Pages: 2

Premium Essay


...INT: I=Prt A=P(1+rt) COMPOUND INT: A=P(1+i)^m=P(1+r/n)^nt with m=n.t *Find the interest rate for the given deposit and compound amount $8000 accumulating to $1167212 compounded quarterly for 8 yrs We have P=$8000,A=$1167212, n=4,t=8 Since A=P(1+r/n)^nt We have by taking the logarithm both sides, lnA=lnP+nt.ln(1+r/n) ln(1+r/n)= (lnA-lnP)/nt= (ln1,672.12-ln8000)/4.8=1+i/4= 1.011875 so r=0,0475=4,75% *Find the present value if the money is compounded ar indicate $36,52713 at 5,3% compounded annually for 10 yrs We apply the formula A=P(1+r)^t (since n=1) To obtain P=A/(1+r)^t=36,52713/(1+0,053)^10=$21,79374 (dollars) *Find the time required for the given initial amount to be at least equal to the final amount $5000 deposited at 4% compounded quarterly to reach at least $23000 Taking the logarithms of both sides of the equation A= P(1+r/n)^nt Leads to : lnA=lnP+n.t.ln(1+r/n) Which implied: t=[(lnA-lnP)/nt.ln(1+r/n)] Substituding A=23,000 , P=5000, r=0,04 and n=4 the above formula we get: t=[(ln23000 – ln5000)/4.ln(1+0,04/4)]= 38,34 yrs= 460 months= 38 yrs 4 months Ex57: You are offered $1000 now or $1210 in 5 yrs.If money can be invested at 6% compounded annually which is longer? The future value of $1000 is A=1000(1+0,06)^5 (since n=1) = $13382 So you should get $1000 now Second solution: The present value of $1210 is given by P=A/(1+r)^t=1210/(1+0,06)^5=$90418<$1000 This means that $1210 5yrs later is equivalent to $90418 and so you should......

Words: 982 - Pages: 4

Premium Essay

Ip Address Scenario

...Theren Woods 9/24/2015 NT 1210 Unit 1. Exercise 1. IP Addressing Scenario A design for a 1 floor office with a single data closet serving 145 to 254 users would need a core network, networks for firewall, a switch management network, a server network, voice network, wireless network, and a network for future services to accommodate the potential 50% growth the company intends to happen. The subnet range that should be used to accommodate 145 hosts plus a potential 50% growth within the next two years should be This subnet mask range would support 254 hosts and this particular scenario is only planning for no more than 218. The IP addresses should be statically assigned because dynamically assigned IP addresses can change each time you connect to the internet but statically assigned IP addresses are reserved for the user and don’t change over time. Statically assigned IP addresses would definitely be best for an office environment because you want the same IP addresses everyday so the computers can talk to the server and with one another daily. You should have more than one network/subnets for computers, printers, future use and other host that may be needed. If DHCP is used you should use a Windows Server because it is safer. Normally a hacker will try to penetrate your router or firewall first so if that happens they will also have your DHCP. If it is on a server that’s another added layer to try and hack...

Words: 255 - Pages: 2

Premium Essay

Raven Williams-1230

...Raven Williams January 14, 2016 NT: 1210 Intro to Networking 1. What are open standards, and what, if any, are the advantages of such standards? Open Standards" are standards made available to the general public and are developed (or approved) and maintained via a collaborative and consensus driven process. "Open Standards" facilitate interoperability and data exchange among different products or services and are intended for widespread adoption. 2. In general, why would a layered architecture be viewed as beneficial? The Benefits of Layered Application Other applications will be able to reuse the functionality exposed by your layers. You will be able to distribute your layers over multiple physical tiers. This can make a very good impact on your application by Improving performance (sometimes), scalability and fault tolerance. The maintenance of your application is easier because of the low coupling between layers. Adding more functionality to your application is made easier. Layers make your application more testable. Building a well formed layers makes the orientation in your application easier. Having your application not layered means that you have to deal with all security threats in one place which is very difficult. Having your application distributed to layers makes it much easier for design and implement Without a good deployment plan it is not trivial to distribute your layers over multiple physical tiers in distributed computing. You need...

Words: 1095 - Pages: 5

Premium Essay


...Izaak Cook NT 1210 Intro to Networking Unit 1. Lab 1.2: Binary Math and Logic Exercise 1.2.1 1 0 0 1 + 1 1 0 Binary 1111 = 15 Decimal 2. Exercise 1.2.2 1 1 0 1 0 1 Binary 1011 = 11 Decimal 3. Exercise 1.2.3 1 1 1 1 1 1 Binary 1110 = 14 Decimal 4. Exercise 1.2.4 100 2 OR 011 2 = 111 = 7 5. Exercise 1.2.5 111 2 AND 100 2 = 100 = 4 6. Exercise 1.2.6 NOT 1001 2 = 0110 2 = 6 Exercise 1.2.7 1010 2 + 10 2 = 1100 2 + 10 2 (= 2) = 1110 2 Exercise 1.2.8 If one of the values being added is 11112, then the result will be the same as the other value being added. Exercise 1.2.9: 1 | 1 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | Using the OR operator, what is the result of 11002 OR 11112? What can you conclude about using OR on any value with a string of 1s? What value can you use with an OR operator to preserve the other input number in the logical equation? When using a string of 11112 the result will be the same using 111121.2 review 1. Determine the result of 100100002 + 11011102. Show the mapping that you created to solve this addiTon problem. 100100002 11011102 111111104 = 254 decimal 2. Determine the result of 110011002 AND 111111002. Show the mapping or truth table that you created to solve this addiTon problem. 110011002 111111002 1.3 Exercise...

Words: 266 - Pages: 2