Free Essay

Unit 3 Assignment 2

In: Computers and Technology

Submitted By zmccallum
Words 411
Pages 2
When building a Telecommunications room some things you are going to have to consider are doing to have to be the climate and also the setup. Among these things to consider on the setup would consist of equipment racks, cabinets and pathways. I will discuss rules and regulations regarding the requirements of Building a Telecommunications room. I will start with the required climate conditions and end with the Equipment Racks, Cabinets and Pathways. When building out a telecommunications room there needs to be open air vents available to the buildings ventilation system for air conditioning and on each vent in the ductwork there should be dampers installed for climate control. There needs to be a 20 amp 110v ac circuit installed on each wall and one in the center of the room. There should be 40w fluorescent tubes approximately every 4 feet a crossed the ceiling. The server racks should generally be hooked up to high powered UPS’s located in a separate room.
Equipment Racks and Cabinets should have adequate air flow and cooling. They should also have Adjustable mounting rails that have markings. The Cabinets are suggested to be at least 6 inches wider and deeper than your largest equipment. They should have a minimum 2 foot rear clearance, and 3 foot front clearance. There should be a vertical cable manager installed between racks and at both ends of every row. When you are building pathways you need to consider the following; Quantity, size and bend requirements and you need to allow for growth. They cannot be located in elevator shafts by any means, however areas above ceilings is ok. Fire codes apply and must be respected regarding the use of polymers, (www.bicsi.org). As you can see there needs to be adequate lighting and temperature conditions in the server room to consider. One so you have light to be able to access anything you need. As well as adequate cooling system so the server room doesn’t over heat. There are strict guidelines on how the server room is set up and how the racks are composed to have adequate cooling conditions as well so you don’t overheat and damage the equipment or worse cause a fire. As long as you maintain these guidelines you should be well on the right track of setting up a successful telecommunications room.

Citation
Telecommunication rooms. (n.d.). Retrieved from http://www.facilities.udel.edu/docs/FPC/fds/current/infotech/telecommunications rooms.pdf

Similar Documents

Free Essay

Unit 2 Assignment 2

...NT2580 Unit 2 Assignment 2 10/1/13 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry. 2737111 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange. 2755801 Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active......

Words: 257 - Pages: 2

Free Essay

Unit 2 Assignment 2

...Unit 1 Research Paper 1 Injectable Tissue Engineering Brand Zae GS1140 Injectable Tissue Engineering Introduction Every year more than700,000 Americans undergo a form of joint replacement surgery. The procedure-in which a knee or a hip is replaced with an artificial implant-is highly invasive, and many patients delay said surgery for as long as they can. A doctor by the name of Jennifer Elisseeff , a biomedical engineer at Johns Hopkins University, hopes to change that with a simple and quick procedure that does away with surgery entirely. Dr. Elisseeff and her colleagues have developed a way to inject joints with specially designed mixtures of polymers, cells, and growth stimulators that solidify and form healthy tissue. This form of technology can eliminate the need for many expensive and dangerous surgeries. Surgeries involving muscle development, the cardio vascular system, and even limb repair after a traumatic incident. This form of technology can improve our health care system dramatically and open new windows of opportunity for new forms of medicine. Even the possibility for new cures for diseases that we currently fight every day such as cancer and possibly even HIV, eliminating the need for long and expensive treatments. As well as repairing worn or damaged tissue, this form of engineering can also be used in the future for growing new organs or limbs to replace old damaged or missing ones. If a patient is in need of a new......

Words: 427 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...Jennifer Schneider – NT 1230 – Client-Server Networking – Unit 3; Assignment 1 IPv6 Addressing 1.) Research the following organizations and explain their involvement with the Internet Public IP Addresses a. American Registry for Internet Numbers: Allocates, transfers and records maintenance of IP addresses as well as reverse DSN. b. Internet Assigned Numbers Authority: Allocates IP addresses from the pools of unallocated addresses to the RIRs according to their needs as described by global policy and to document protocol c. Asia-Pacific Network Information Center: Distributes and maintains IPv6 addresses 2.) Approximately how many IPv4 addresses are possible? There are approximately 4.3 billion IPv4 addresses available. 3.) Approximately how many IPv6 addresses are possible? There are 340,282,366,920,938,463,463,374,607,431,768,211,456 Ipv6 addresses available 4.) Why do you think the world is running out of IPv4 addresses? The internet really started in the 70s as a DARPA research project. At the time, there were 60 or so institutions expected to connect. As the interested research community grew, the addressing scheme was expanded from 8 bits (256 addresses in the predecessor to Internet Protocol (IP) known as Network Control Protocol (NCP)) to 32 bits (the IPv4 addresses we have today). At the time, it was still expected that the internet would serve largely defense, research, and educational institutions. It was essentially a laboratory experiment on a really......

Words: 411 - Pages: 2

Free Essay

Unit 3 Assignment 1

...IS3340-WINDOWS SECURITY | Encryption and BitLocker Activity | Unit 3 Assignment 1 | | | 5/1/2014 | | 1. One of the shop floor computers that is connected to your network is commonly used by the floor manager. You want the floor manager’s files to be encrypted on that computer. Although the floor manager’s documents folder is on a central server, there are some local temporary files that could contain sensitive information and should be encrypted at all times. Which Windows encryption feature would best provide encryption for all of the floor manager’s local files while leaving other users’ files unencrypted? Folder Encryption: EFS 2. The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data and the name of the spreadsheet does not change. Which Windows encryption feature would ensure this one file is always stored on the disk in encrypted format? File Encryption: EFS 3. The chief executive officer (CEO) wants to copy confidential sales projection information from her workstation to her laptop via a universal serial bus (USB) device. What is the best option to ensure the confidential information is secure during the copying process? BitLocker To Go 4. You want to encrypt your main file server’s disk that stores confidential information for several users. Which Windows encryption feature encrypts an entire disk and is not......

Words: 294 - Pages: 2

Premium Essay

Unit 5 Assignment 2

...IS3340-WINDOWS SECURITY | Security Audit Procedure Guide | Unit 5 Assignment 3 | | [Type the author name] | 5/1/2014 | | This document outlines the required steps to follow, inorder to properly scan the necessary hardware (servers and workstations) in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer you will be scanning and the computer with MBSA installed have Internet access, the latest security catalog (.cab file), authentication files, and WUA installer files will be automatically downloaded, if needed. If either the target computer or the computer with MBSA installed does not have Internet access, download the following files and place them in the C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\ directory on the computer that is performing the scan. 2) Scan computers Run MBSA and clear the Check for security updates check box when performing the scan. Using the Graphical Interface Tool The following procedure describes how to use the MBSA GUI tool. To use the MBSA GUI tool to scan for updates and patches 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. * Check for Windows......

Words: 487 - Pages: 2

Premium Essay

Nt1210 Unit 2 Assignment 2

...Joseph V. Stewart NT1210 Unit 2 Assignment 2 Computer Basics Review 1. C. Datacom 2. B. Bob’s incoming email server 3. B. The call uses only digital electrical signals, D. The call represents short sounds as a unique set of bits 4. C. The call uses both analog and digital electrical signals, E. The call represents each spoken word as a unique set of bits. 5. D. A choice for the number of frames per second 6. B. Use an incoming video server 7. D. None of the answers is correct 8. B. The web browser asks for the one object identified by the web address, and the web server automatically sends the rest of the objects to the browser. 9. A. A website typically contains many web objects, C. A web page typically contains many web objects, D. A website typically contains many web pages. 10. C. The operating system on the PC, D. The PC’s NIC 11. A. 16 HTTP GET request messages with 16 matching HTTP GET reply messages 12. A. Web browsers 13. A. http 14. C. Node 15. B. Cable, D. Switch 16. D. SMB Network 17. A. Router 18. D. The Internet 19. A. Internet service provider 20. B. Any ISP’s network Key Terms Computer Networking-the stuff that works together Computer network-the process of the stuff working together Application-a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device Email-electronic......

Words: 483 - Pages: 2

Free Essay

Unit 3 Assignment 2 Nt2580

...1. Discretionary Access Control – For Shovels and Shingles I would use Discretionary Access Controls. This way certain user groups have certain access. Considering there is only 12 clients I would assume the employee base and small and only 2-3 groups would be required with different access levels. 2. Rule Based Access Control – Due to the small client base and the fact most users would most likely be sharing information in a small advertising company I would go with Rule Based. This way there is certain files that everyone can access and ones that can’t be accessed. It allows for a personal data structure while allowing some files to be shared freely. 3. Non-Discretionary Access Control – Due the company being larger and associated with IT, I would go with the non-discretionary controls. This way the employees will only have access to what is dictated to them by the administrators. This is especially recommended because there are employees traveling and using the network from the outside. All control for the network should be done administratively. 4. Role-Based Access Controls – For Backordered Parts defense contractor I would recommend Role-Based access controls. As there are many facets to a design and building company there will be many access levels and areas that should only be accessed by certain personnel. Using this role-based control will allow for all users to only see what they need to see, and not see what they don’t need to see as pertaining to......

Words: 321 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Free Essay

Unit 3 Assignment 2-Reflection on Essay Wriiting

...Reflections on Essay Writing EN 1320 Composition 1 Class 8 Oct 2014 Unit 3 Assignment 2: Refelerctions on Essay Writing EN1320 Where to start; to explain about what I have learned about writing in composition 1 class. I have always been a pretty good writer, I think. As long as I like the genre that I’m writing on, I can usually produce a good product. Composition one has helped me slower but surely, I think it will just take a little more time. This class has helped me considering it is only the fourth week of class. I guess my style of writing is; I believe I’m a prewritter, most of the time. First, I get all my source material together, I read and outline said materials and I just start writing. I do the same thing that I’ve always done through my entire US Air Force career. It’s how I approach all my writing assignments and I’ve got proficient at it. In the Air Force, I wrote for subordinates or troops, their EPRs (Enlisted Performance Reports). I always used this approach when I wrote metals, awards and disciplinary reports on someone actions. I would start with few bullet statements or what you would call brief statements on accomplishments. I would start with some short bulleted statements and expound on them. I’ve had a few good supervisors in the Air Force that taught me how to write. They have told me, it doesn’t matter what comes out when you write, just get it down. I have used this lot and I got pretty good at it, for example when an accident......

Words: 413 - Pages: 2

Free Essay

Unit 2 Assignment 2

...Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Linda Vaughn GS1145T 10/3/2015 Why Create ASIMO? ASIMO is humanoid robot created to duplicate human motion and genuinely help people. ASIMO took more than two decades of persistent study, research, trial and error before achieving a humanoid robot. ASIMO's design, development and operation rely on many different disciplines including Mathematics, Physics, Anatomy, Engineering and Computer Science. In 1986 Honda engineer’s set out to create a walking humanoid robot early models (E1, E2, and E3) focused on developing legs that could simulate the walk of a human. Models (E4, E5, and E6) focused on developing walk stabilization and climbing stairs. Then the head, arms and body were added to improve balance. Hondas first robot P1 was rather rugged standing at 6’2 and weighing at 386lbs. P2 had a more friendly design. P3 model was more compact standing at 5’2 and weighing 287lbs. ASIMO can run, walk on uneven slopes and surfaces turn smoothly and reach and grab for objects. ASIMO can also comprehend and respond to simple voice commands. It can also recognize the face of a selective group of individuals using camera eyes. It can also map environment and register stationary objects and can avoid moving objects as it moves......

Words: 598 - Pages: 3

Premium Essay

Unit 5 Assignment 2

...Unit 5 Assignment 2 Ethernet Local Area Networks Review PT1210 Introduction to Networking Christopher B. Young ITT Tech – Tempe Campus Instructor: Mr. Larry Douglas Oct 16, 2015 1.C | 11.C | 2.D | 12.C | 3.B | 13.C | 4.A | 14.A | 5.B | 15.A | 6.E | 16.A | 7.D | 17.D | 8.A | 18.C | 9.A | 19.B | 10.A | 20.C | Ethernet LAN: A collection of devices including user devices, LAN switches, routers, old hubs and cables all of which use IEEE Ethernet standards at the physical and data link layers so that the devices can send Ethernet frames to each other 802.3: The name of the original IEEE Ethernet standard as well as the overall base name of all IEEE Ethernet LAN working committees Fast Ethernet: The informal name for one particular Ethernet standard originally defined formally as 803.3u which was the first Ethernet Standard to surpass the original 10-Mbps speed to run at 100 Mbps. Gigabit Ethernet: The informal name for one particular Ethernet standard defined formally in 802.3z(for fiber) and 802.3ab(for UTP) with a speed of 1 Gbps Autonegotiation: A process defined by the IEEE so that nodes on the same etherent link can exchange messages for the purpose of choosing the best speed and duplex option that both nodes support Ethernet Frame: The bytes of data that flow in an Ethernet LAN which begins with the Ethernet header followed by data and ends with the Ethernet trailer. Ethernet LANs deliver Ethernet frames from one Etherent device to......

Words: 327 - Pages: 2

Premium Essay

Unit 3 Assignment

...Unit 3 Assignment Greg Phoenix Cleveland State Dr. King August 13, 2000 Unit 3 Assignment The slides I will be discussing are Psychology/Human services. Part 1: Were the individuals professional? Slide one: This slide is a picture of two people who appear to be talking. The one individual is leaning in touching her co-worker on the shoulder. Although her coworker seems distressed, I do not feel it is proper for her to have physical contact. Not everyone will feel that her act of kindness as welcoming. Workers have very different levels of acceptance for physical contact of any kind (Zupek, 2010). Something that seems very innocent to you and I could be offensive to another. Slide two: Shows a client laying on the couch with a tissue in her hand and the counselor is writing something down on paper. This picture is a classic for what people consider to be a normal therapy session. The counselor appears to be professional, but also seems distant. There is no eye contact with the patient, which may come across to the patient as “not listening”. Slide three: Is of a therapist standing in a room writing on something despite the fact they are in a group session. Is this individual professional? It appears she is, although she is distancing herself from the group. I guess it could be decided if we knew the exact situation instead of only seeing a picture of it. She appears to be working where she feels less distracted. I think she would be more professional if she......

Words: 1010 - Pages: 5

Premium Essay

Unit 3. Assignment 1

...Unit 3. Assignment 1. IPv6 Addressing 1. Research the following organizations and explain their involvement with the Internet public IP addresses a. American Registry for Internet Numbers (ARIN) ARIN, a nonprofit member-based organization, supports the operation of the Internet through the management of Internet number resources throughout its service region; coordinates the development of policies by the community for the management of Internet Protocol number resources; and advances the Internet through informational outreach. IP address space allocation, transfer, and record maintenance https://www.arin.net/about_us/overview.html b. Internet Assigned Numbers Authority (IANA) IANA is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic. http://www.iana.org/numbers c. Asia-Pacific Network Information Center (APNIC) The Asia Pacific Network Information Centre (APNIC) is an organization that manages the assignment of Internet number recourses within the Asian continent. APNIC sets the rules, regulations and standards that all designated organizations must abide by and implement. End-user organizations and Internet service providers take direction from Regional Internet Registries (RIRs) like APNIC to provide Internet resources within certain regions. The Internet number resources include antonymous system numbers as well as IP addresses that assist in clearly......

Words: 577 - Pages: 3

Premium Essay

Level 3 Business Unit 2 Assignment 1

...business, like delivery vans or PCs. In this case £19,600 of fixed assets is owned. Current assets show the cash or near-cash available to the firm. This includes stock ready to sell, money owed to them by debtors and cash in the bank. There are £31,692 worth of current assets. Deducting all the current liabilities from the total amount of fixed and current assets gives the value of the business on the day the balance sheet was drawn up. This business is worth £34,677, financed by £34,677 of share capital and reserves. Capital and reserves are in effect liabilities, because the firm owes this money to the owners. What a firm owns, it owes. Therefore net assets and capital employed or financed by should always be the same amount. Task 2 Profitability Ratios Profitability ratios measure how much profit and organisation makes. I will look at the three main profitability ratios which are gross profit margin, net profit margin and return on capital employed. Gross Profit Margin The gross profit percentage ratio works out the amount of profit from the buying and selling of goods. The higher the figure is the better, preferably over 50% because then the business would have taken away overhead expenses and some profit would be left over. Two ways of improving a gross profit margin is to raise the selling price of the product, or to negotiate deals with less expensive suppliers. Calculation for Craft & Pottery Shop GPM: 105785 (Gross Profit) / 187730 (Sales......

Words: 3798 - Pages: 16

Premium Essay

Unit 2 Assignment 2

...Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced labour -Right to a fair trial -No punishment without law -Respect for your private and family life, home and correspondence -Freedom of thought, belief and religion -Freedom of expression -Freedom of assembly and association -Right to marry and start a family -Protection from discrimination in respect of these rights and freedoms -Right to peaceful enjoyment of your property -Right to education -Right to participate in free elections This act promotes anti discriminatory practice in a way that it gives everyone the rights they deserve which can’t be taken away from anyone, therefore everyone is equal in what they can do. Data protection act- The data protection act defines UK laws on processing data on identifiable living people. It covers any data which can identify a person such as address, name, Humber, email, information is to be used fairly and lawfully. It is only used for limited specific purposes and in a way that is relevant, adequate and excessive. This promotes anti discriminatory practice as it helps protect......

Words: 4206 - Pages: 17