Premium Essay

Nt1310 Unit 5 Essay

Submitted By
Words 550
Pages 3
2.1 Intranet: this is a privately accessible infrastructure of cables, routers, and various servers, in most cases it is limited to one company or an organization or a group of companies, like the Internet, an Internet is used to carry a wide range of services.
2.2 Extranet: they too like intranets are privately owned wide area networks, which are generally owned by an organization or a company, however they differ from intranets in the sense that the owner of an extranet charges a specific fee to those who may require access to it or they can access the information provided on the extranet if they are given authorization by an organsiation. Furthermore an extranet, is also used to carry a wide range of services like the Internet.
2.3 Smartphone: this is a mobile phone which has an advanced mobile operating system, to which combines features of personal computer operating system. It has a mobile system environment, connected to the Wi-Fi which is connected to the Internet and has basic computer functions, iOS, some smartphones have a touchscreen display. An environment for applications to be created by an individual user of application developer, the user has a variety of applications …show more content…
It is a voice which is transmitted over a telephone network, this service runs over any network. It is important to note that VoIP’s are not telephone, however are data devices that transfer real time audio communication. A VoIP connects to a switch to which the switch is connected to a router, the router therefore connects to the Internet where the clients of telephones on the system will connect to the switch and connect to the VoIP server, connecting through digital or manual ports, or others that one is able to plug in straight into the VoIP. VoIP, enable organization to be more productive in their business

Similar Documents

Premium Essay

Nt1310 Unit 5 Essay

...signals. The host must start giving out data into the controller tRC-2 clocks after the controller has acknowledged the WRITEA command from the controller. The controller executes the DQ port to the devices at the middle of the signal of DATAIN port but at two times the speed of transfer rate. The DM inputs are clocked in alliance with the internal clock of the controller. The data is given out to the memory devices on the DQM ports. The operation of the write command is as follows. The user initiates WRITEA along with ADDR and the first write data value is placed on the DATAIN bus with a data masked on DM bus with a particular value. The controller later makes the CMDACK high. This is the acknowledgement of the controller that the operation of write has been started. While this occurs, controller gives out commands to the SDRAM devices side by side. Once the CMDACK is made high, NOP is laid on the CMD on the next clock cycle. tRC-2 is done after the CMDACK is made high by the user itself and the data is masked onto the controller in the DATAIN port for a particular value. The DM is also asserted a particular value at this juncture. Fig. 12. WRITEA timing diagram. A. REFRESH Command The main purpose of the instructor is to perform an AUTO REFRESH command to the SDRAM. The controller will send an acknowledgement to state the fact that the refresh command will be executed with a CMDACK command. A timing diagram shows the working of the whole module. The operations of the REFRESH...

Words: 605 - Pages: 3

Premium Essay

Nt1310 Unit 5 Essay

...achieved, then each instrument should be as far away as possible from each other. 4. In your recording studio there are DI boxes. What is their main use? How are they powered? (2 marks) Direct input (DI) boxes are used in recording studies to connect an unbalanced output signal to a microphone level balanced input via a XLR cable. They are indispensible for recording electric and bass guitars, putting signal into the mixers microphone input. DI boxes match levels, and are usually used with PA systems and in recording studios. DI boxes require power, supplied either by phantom power (48 volts) from the mixer or an internal 9 volt battery. 5. On a mixer what do the terms PRE and POST on an AUX send output mean? (2 marks) Auxiliary sends are usually used for two purposes. They are used to send signals to an audio processor or FX unit, such as reverb, or to an entirely separate monitor mix for musicians, for example a headphone send. The engineer can manipulate this send either before or after the signal comes through the mixing desk, hence the need for pre and post fade. Pre-fader auxiliary sends are used for the to monitor the mix. When adjustments are made whilst using pre-fader auxiliary sends, the musicians would not hear it, although it would be heard the front-of-house. For example, if an acoustic cello was using pick-up, which needed equaliser (EQ) applied, the cellist would not hear the adjustments through their foldback, although the audience would. Post-fade auxiliary...

Words: 1950 - Pages: 8

Premium Essay

Nt1310 Unit 5 Essay

...Question 2: What are the foundations of J2EE API? In your answer include the main detail definitions, services, and specifications. J2EE API is used for developing and running enterprise software, including network and web services, and other large-scale, multi-tiered, scalable, reliable, and secure network applications. Specifications : RMI: Distributed Object Communication allows objects to access data and invoke methods on remote objects(non-local memory objects), this process is known as remote method invocation Java Mail: It allows an application component to send Internet mail (notifications. The JavaMail API has two parts: • an application-level interface used by the application components to send mail, and • a service provider interface used at the Java EE SPI level. Java Message Service: JMS is a Message-oriented middleware(MOM) API for sending messages between two or more clients. It provides message standard for an application component based on J2EE to create, send and receive messages. Web Services: The Java API for XML Web Services (JAX-WS) and the Java API for XML-based RPC (JAX-RPC) both provide support for web service calls using the SOAP/HTTP protocol. XML Processing: pull parsingThe Java API for XML Processing (JAXP) provides support for the industry standard SAX and DOM APIs for parsing XML documents, as well as support for XSLT transform engines. The Streaming API for XML (StAX)pull-parsing API for XML. Java EE Connector Architecture: This architecture...

Words: 523 - Pages: 3

Premium Essay

Nt1310 Unit 5 Essay

...Contents P3.1 1 Analyse the functions of a product, e g forces acting on any four engine component, and what kind of material constraints should be taken into account based on various loading factors at its design phase. 1 Camshaft 1 push rod 2 valves springs 3 Piston 3 P3.2 5 Identify the function of the piston, connecting rod , crankshaft and fly wheel. list down and explain the materials and their properties the components which they are made with, along with the processing methods to make these components. 5 Piston 5 Connecting rod 6 Crankshaft 7 Flywheel 8 P3.3 9 Identify and explain the possible limitations, on the processing of piston, connecting rod and crankshaft and flywheel, which is imposed by processing costs, the need to safeguard...

Words: 1745 - Pages: 7

Premium Essay

Nt1310 Unit 5 Essay

...representation of documents on physical media or on a paper. • speaker: speaker is one of the coolest output devices used with computer systems that convert electromagnetic waves into sound waves 4. What are the advantages and disadvantages of peer-to-peer network configuration? Advantages of peer-to-peer network configuration: • No need for a network operating system. • Easy to set up. • Less expensive. • If one computer does not work it will not disrupt any other part of the network. Disadvantages of peer to peer network configuration: • Files and folders cannot be centrally backed up. • Central server is not available to manage and control the access of data. • Computers get slow because each computer might be being accessed by others. 5. Pick 2 physical topologies and provide the advantages and disadvantages of each. • Bus topology: Advantages: - less expensive - requires less length of cable - easy to set up. Disadvantages: - less secured. - Get slower when the number of computers is increased. - Hard to find the faults in the system. • Ring topology: Advantages: - No require of server. - Speed is higher than bus topology. - Each computer has equal access to all resources. Disadvantages: - Expensive - If one computer does not work than the whole system will fail. ...

Words: 466 - Pages: 2

Premium Essay

Telecommunications

...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...

Words: 496 - Pages: 2

Premium Essay

Fsmo Role Ayer Nate Method

...Sole's Blog SOLVE YOUR IT PROBLEMS FASTER, SAVE YOUR FEET AND GET MORE TIME ON YOUTUBE! * HOME * * ABOUT SOLE VIKTOR * * USEFULL LINKS « How to publish a website with both Anonymous and Forms Based Authentication in ISA 2006 How to configure ISA 2006 with FBA for OWA and NTLM for Outlook Anywhere and Autodiscover in Exchange 2007 » How to place FSMO and Global Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master...

Words: 10360 - Pages: 42