Free Essay

Unit 1 Exercise 1

In: Business and Management

Submitted By Redskins24
Words 253
Pages 2
Composition 1 Composition 1Composition 1didnt didn’t didn’t didn’t did nt didi did did did did did did did did did did did did did did did did did idid id idi did idid did did did dmdidi didid idid idid didid didid didi didididid didiid dididid iediddjiiiiiiiiiii did did didi did idid didi dd didi didii didid didid dddid didid didid diid idid idid idid ididididi did ididi idid ddi didi didi didi idid didid did dididi didid didid didi diid didid didi did idi did id id id I I did id id id id id I ii ii I I I I j j j j j j j d djdjd jdj du dudu dudu dud dud ud dudu dudud dudu dudud dud didi didi diid did idid didi didi did did idd didi diid d idid idi didi idi diid idi did did did id did did id di did did idid ddi didi didi didi did did did did did did did did didid didid didid didid didid did did did dd did id did did did di did di did did did did didi did didid did didid didi did d did did did dd didid did did did did di did did did did did did did did did did did did did did did didid did id did did did did dd did did d did did did did did did did did did did ddid did di didid id diidi di did idid dd

Similar Documents

Premium Essay

Unit 1 Exercise 1

...NT1310 Unit 1 Exercise 1 6/17/14 The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off......

Words: 398 - Pages: 2

Premium Essay

Nt1310 Unit 1 Exercise 1

...Unit 1 Exercise 1 Local Exchange When you send an email from New York to Japan, that email,is sent from your home to the local exchange point over the access network. Once it is in the local exchange it is then sent to aggregating points in different cities and counties over the regional network. Then it is aggregated and transported over the long-haul network so that it reaches the launching point at the country shoreline where it is then sent over the ocean network to Japan. Once there, the email is sent back over the long-haul or regional network to the local exchange and then on to the individual receiving the email. This occurs using mostly fiber optics so the speeds at which all this takes is at the speed of light which is approximately 127,000 miler per second. understand how to interface with the local exchange you must first understand the different networks that comprise it. The first network, being the access network. The access network is the network that connects the individual user or business with the telecommunications system. This is made up of a series of fiber-optic and copper cabling and passive and active equipment that connects you to the local exchange. The central office at the local exchange contains the switching equipment to direct your telephone, data , video, etc. to where it needs to go. The access network is very important to the local exchange since it’s the part that reaches the end user, who is you, and connects them. The metro network,......

Words: 339 - Pages: 2

Free Essay

Nt1420 Unit 1 Exercise 1

...Unit 1 Exercise 1 An analog signal is any continuous signal which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. A digital signal is a physical signal that is a representation of a sequence of discrete values (a quantified discrete-time signal), for example of an arbitrary bit stream, or of a digitized (sampled and analog-to-digital converted) analog signal. Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time. Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time. A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring Long-distance telephone company, such as MCI (before its absorption by Verizon), Sprint and the former AT&T Corporation (before its merger with SBC in 2005). In the United States, it is defined as any carrier that provides inter-LATA communication, where a LATA is a local access and transport area. Long Distance central office, central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop. Tandem, telephone switch is a U.S. telephone company central office telephone exchange used to interconnect local exchange......

Words: 263 - Pages: 2

Premium Essay

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are to A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from to There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network......

Words: 756 - Pages: 4

Premium Essay

Unit 8 Exercise 1

...Unit 8 Exercise 1 Ja’Martay Bentley GE375 Tami Gary May 16, 2016 Freud’s psychoanalytic perspective emphasized unconscious and unresolved past conflicts (Carpenter & Huffman, 2011). Freud believed the psyche (mind) contained three levels of consciousness: conscious, preconscious, and the unconscious (Carpenter & Huffman, 2011). Conscious is the thoughts or motives that a person is currently aware of or is remembering (Carpenter & Huffman, 2011). Preconscious are thoughts or motives that are just beneath the surface of awareness and can be easily brought to the mind (Carpenter & Huffman, 2011). The unconsciousness are thoughts and motives that lie beyond a person’s normal awareness, which still exert great influence (Carpenter & Huffman, 2011). Freud believed that most psychological disorders originate from repressed memories and instincts (sexual and aggressive) that are hidden in the unconscious (Carpenter & Huffman, 2011). Freud also believed that personality was composed of three mental structures: id, ego, and superego (Carpenter & Huffman, 2011). The id is totally unconscious and serves as a reservoir of mental energy (Carpenter & Huffman, 2011). The id is made up of innate, biological instincts and urges. It is immature, impulsive, and irrational (Carpenter & Huffman, 2011). The id wants what it wants and when it wants it – pleasure principle (Carpenter & Huffman, 2011). As a child grows older, the ego develops......

Words: 901 - Pages: 4

Premium Essay

Nt 1330 Unit 1 Exercise 1

...Unit 1. Exercise 1. IP Addressing Scenario Course Objectives and Learning Outcomes In this Exercise, you will explain IP address components, contrast classful and classless IP addressing, and explain the function of DNS and DHCP. Assignment Requirements Respond to the following scenario with design considerations and recommendations: You are an IT Administrator for a newly founded company and have been tasked with designing an IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth within the next two years. At a minimum, address these specific questions, in addition to any other concerns/considerations: 1. What subnet range/s should be used? 2. Should IP addresses be dynamically or statically assigned? 3. Should one or more network/subnets be used? 4. If DHCP is used, should a router, firewall or Windows Server be utilized and why? Respond in detail, justifying your recommendations. In your response, consider future growth and design considerations. Submission Requirements 1-2 pages, Microsoft Word, double-spaced, 12 pt. font In response to your question I would use a classless addressing and start at for your network address with a subnet mask of This gives you 254 hosts per subnet which will easily cover your 50% growth over the......

Words: 384 - Pages: 2

Free Essay

Unit 1. Exercise 1. Local Exchange

...Unit 1 Exercise 1. Local Exchange The access network is the part of the network that connects the individual consumer or business to the telecommunication system by which the access network have’s to be one of the most important networks since data is being sent through the physical cabling link from the consumer to the local exchange but order for services to meet the requirement of data transferable satisfaction between the individual consumer and local exchange first all informative information from the local exchange will hold data information that will convert through the cabling network but there must be connectivity to the interconnection point of the telecommunication service order for this to process correctly as needed. A metro network also referred to as a MAN (metro area network) is responsible for aggregation information from the local exchanges of a specific service provider metro Ethernet can connect to a variety of data information within the local area networks (LANs) and individual end users to a wide area network (WANs) what distinguish a borderline of telecommunication structure throughout the internet connectivity service metro networking can distribute over a large climate of businesses when data is traveling through the metro network such as gaming development companies, high in corporations, academic institutions, and government agencies in large cities that can use metro Ethernet interconnection data package standard cabling or fiber optic......

Words: 452 - Pages: 2

Premium Essay

Unit 1 Exercise 1 Ip Addressing Scenario

...ITT TECH INSTITUTE OF TECHNOLOGY, LATHROP | NT1330 Client Server Networking II | Unit 1 Exercise 1 IP Addressing Scenario | | Joel Vargas, Julia Duque, Jonathan Beckman, Marwan Sayyah | Due Date 06/25/2016 | | Exercise 1. IP Addressing Scenario When designing I would use one floor with a single server rack, IDF box, or some type of data closet. I would start by creating a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video.  In the case of the how the IP addressed would be assigned I would consider choosing statically. Why because a static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that there easy to use and less expensive. I use them for my job working at Save Mart Corporations as a Bench Technician to tests our lane equipment and NIC’s on our network systems. When it comes to maintaining and obtaining static IP addresses they are easier to use as well. I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. Also you should take this into consideration. If you keep everything at its minimum size or space then that’s all you have to work with. If you...

Words: 541 - Pages: 3

Free Essay

Unit 1 Exercise 1. Local Exchange

...Unit 1 Exercise 1. Local Exchange NT1310 The purpose of a Network is to share data. To make this possible, you have to be able to connect to other computers. To make this enticing to people to want to take advantage of this technology, it has to be simple not so complex. This sounds a little difficult to understand as far as a qualified answer, but to sum things up that is it. The question to ask and that many people don’t consider is how data is transferred from one computer to another computer? Transferring data that is being sent by the user who has created and initialized the transfer of information using a source such as an email service for example. How do you get information from one computer to another, and how do you make it simple and easy to do this? Companies that succeeded at doing this have a great profit with exponential growth possibilities and revenue. For example Cisco company who has made billions by allowing different groups of networks to share data across what we call the internet. Games take advantage of this technology to connect to other computers. Networking companies have succeeded so well in allowing people to connect across their internal networks and the internet that pretty much any app. is able to send data to another computer. There is a physical connection running between two computers that want to connect. This is made possible because phone lines that run from houses to switches to other houses that the phone......

Words: 612 - Pages: 3

Free Essay

Nt1310 Unit 6 Exercise 1

...NT1310 Physical Networking Unit 6 Exercise 1 Thomas Westbrook Due Date: Unit 6 Exercise 1: Connector Installation Twisted -Pair Cable * Measure the cable you want to put ends on, using a cable cutter trim off the excess * Use a cable stripper to strip about 1 ½ inches of the jacket from the end, then rotate the stripper around the cable twice to cut through the jacket * Remove the stripper and pull the trimmed jacket from the cable, so that you can see the inner conductors. Separate any visible jacket slitting cords that are present, trim it backto the edge of the jacket. * Untwist all the inner conductor pairs and spread them apart so that you can see each individual conductor * Line up the individual conductors so that the color matches the color-coding standard you are using * Trim the conductors so that the ends are even with each other, make sure that the jacketof the cable will be inside the connector. The total length of the exposed connectors after trimming should be no longer then ½ inch to 0.625 inches * Insert the conductors into the connector, make sure that all conductors line up properly with the pins as they were in the previous step. If they don’t line up, try again. Make sure to do this step carefully, it’s the last one before crimping * Carefully insert the connector and cable into the crimping tool. It has two dies that will press into the connector. Push the pins in the connector into the conductorsinside the......

Words: 421 - Pages: 2

Premium Essay

Unit 3 Exercise 1 Nt1310

...| Unit 3. Exercise 1. | | Specifications - Definitions | | Unit 3. Exercise 1. | | Specifications - Definitions | NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi 1. Application (in terms of cabling infrastructure): The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exists.. (OSI_model#Layer_7:_application_layer) 2. Unshielded twisted-pair: UTP cable is a popular cable used in computer networking that consists of two shielded wires twisted around each other. In the image to the right, is an example of the different network cables you're likely to encounter. (/jargon/u/utpcable.htm) 3. Shielded Twisted-pair: Twisted Pair (STP) has a fine wire mesh surrounding the wires to protect the transmission; Unshielded Twisted Pair (UTP) does not. Shielded cable is used in older telephone networks, network, and data communications to reduce outside interference. In the picture to the right, is an example of what these cables look like inside. (jargon/t/twispair.htm) 4. Fiber-Optic cable: A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing.......

Words: 1317 - Pages: 6

Premium Essay

Unit 5. Exercise 1 Security

...Montie Ramsarran July 18th, 2014 NT1230 Mr. Durniok Unit 5. Exercise 1 Security Re: Manager In response to your questions regarding if Windows 7 includes protection against some internet threats. Windows 7 comes with Microsoft Security Essentials which helps defend against viruses, trojans, worms and spyware. Windows Defender runs in the background and notifies you when you need to take specific action. However, you can use it anytime to scan for malware if your computer isn’t working properly or you clicked a suspicious link online or an email message. You also have Firewall protection on your computer, where you can access it from your “control panel” to make sure it is turned on. Not only does it protect you at home but in public places also. Your “advanced settings” on firewall shows you “incoming” and “outgoing” rules and also allows you to create your own rules. Microsoft Security Essentials uses green, yellow and red color codes to designate the security status of your PC and a color-coded icon in the taskbar tells you at a glance if your attention is needed. It’s simple—when you’re green, you’re good. However, if there’s a red or yellow threat, Microsoft Security Essentials will alert you and recommend what to do (you can act directly from the notification area without having to enter the application). In closing, Microsoft Security Essentials is designed for small business; it runs quietly in the......

Words: 259 - Pages: 2

Free Essay

Nt1330-Unit 2 Exercise 1

...NT1330-Unit 2 Exercise 1 DNS Scenario Dear junior IT, Thank you for contacting me regarding your questions, and trust that I will do my best to help you. From what I understand, you work at two branch offices, and have been given the responsibility of discovering where to place an Active-Directory Integrated DNS server. You also have some question of what type DNS server would best meet your company’s needs. First let’s begin with the smaller branch supporting perhaps five user/workstations, with an unusually slow network. The question with such a small branch isn’t really about what kind of DNS server you need, but do you need a DNS server at all. If there is a very high level of file/data sharing, then yes perhaps you could benefit from a server, but configured in a secondary zone, such as an ADI. However, if there is not enough file/data sharing to really warrant the presence of the server, an ADI server could potentially slow down an already sluggish system. Now let’s move on to the second, much larger branch supporting around thirty users. You stated that this branch has a much better network connectivity than its smaller counterpart. In this case, I would recommend a DNS server set up in the primary zone. The primary zone is the primary source of information within this zone. I would also further suggest moving your servers from the smaller branch to your larger branch. All files from the smaller branch could be accessed via a “VPN” remote link. This would......

Words: 287 - Pages: 2

Premium Essay

Nt1330 Unit 8 Exercise 1

...Administrative Control versus Trust Unit 8 Exercise 1 ITT Technical Institute Floyd Washington Jr. May 21, 2015 As an administrator you must set up guidelines over a network to prevent the malicious intent of bad users. This is why the administrator must implement Administrative Control. Administrative Controls are the policies, guidelines, procedures and standards that protect the overall integrity of the company’s computer network. This is when the company’s IT Professionals take every precaution possible to ensure that their computer network is secure and free of viruses that can cause the network to crash. Administrative control is one thing, but too much control can hurt a business in many ways. Too much control over a company’s network can restrict user from attaining much needed information. Therefore, an administrator must allow some users in the company full use of the company’s network without any restrictions. As a network administrator you must choose the people carefully that you allow full access to your company’s network. They must have solid instructions for the sites they are to visit. Administrative controls can have a great influence on the decision making of the entire company workforce. Without Administrative controls there can and probably will be serious liabilities formed against the company you work for. Most computer networks today will require that users use an authentication process, which means that the network is password and PIN......

Words: 336 - Pages: 2

Free Essay

Nt1310 Unit 9 Exercise 1

...Montie Ramsarran August 11th, 2014 NT1310 Mr. Amos Unit 9 Exercise 1 Light Source and Components-Definitions 1. Forward Biased LED: A bias voltage that is applied to a pn-junction in the direction that causes a large current flow; used in some semiconductor diode circuits. 2. Incoherent Light: Light in which the electric and magnetic fields of photons are completely random in orientation. Incoherent light is typically emitted from light bulbs and LEDs. 3. Laser: Acronym for light amplification by stimulated emission of radiation. The laser produces a coherent source of light with a narrow beam and a narrow spectral bandwidth (about 2cm). Lasers in fiber optics are usually solid-state semiconductor types. Lasers are used to provide the high-powered, tightly controlled light wave lengths necessary for high-speed, long-distance optical fiber transmissions. 4. Output Pattern: A setting that selects the output pattern for comparison outputs. This enables outputs for changes in levels rather than just upper/lower limit comparisons to set value. It can be set according to the control applications. Note: The settings must be as follows for correct zone outputs. 5. Output Power: The useful signal or power delivered by a circuit or device. 6. Modulation Speed: (1) Coding of information onto the carrier frequency. Types of modulation include amplitude modulation (AM), frequency modulation (FM), and phase......

Words: 1207 - Pages: 5