Premium Essay

Unit 5 Lab 1

In: Computers and Technology

Submitted By kent106
Words 315
Pages 2
Physical Networking Unit 5 Lab 1

Wired and Wireless Networks

The biggest difference between these two types of networks is one uses network cables and one uses

radio frequencies. A wired network allows for a faster and more secure connection and can only be

used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the

“need to run cables in difficult environments through walls, floors and ceilings. Cables need to be run

from computer to computer and switch to switch. Process can be time consuming. Loose cables likely

remain the single most common and annoying source of failure in a wired network.” (PACE University,

n.d.) While a wireless network is a very useful and convenient networking device, however these types

of networks a lot less secure and transmission speeds can suffer from outside interference. Although

wireless networking is a lot more mobile than wired networking the range of the network is usually 150-

300 indoors and up to 1000 feet outdoors depending on the terrain. The cost for wired networking has

become rather inexpensive. Ethernet cables, hubs and switches are very inexpensive. Broadband

routers cost more, but these are optional components of a wired network, and their higher cost is offset

by the benefit of easier installation and built-in security features.

The primary parts of a wired network are the cables, network adapters, and routers. Wired LANs offer

superior performance. The tools needed would be a Crimping tool, Punch Down tool, Cable cutters,

Cable strippers, and a Cable tester. A traditional Ethernet connection offers only 10 Mbps bandwidth,

but 100 Mbps Fast Ethernet technology costs a little more and is readily available. Fast Ethernet should

be sufficient for file sharing, gaming, and high-speed…...

Similar Documents

Premium Essay

Database Unit 1 Lab 1

...Lab 1 1. A collection of information accessible from a computer or server 2. DBMS is a Database Management System that organizes information internally. 3. Dbms stores information, spreadsheet runs formulas 4. Product | Use | Where it was used | Cost | DB2 | Open database environment | A small single-user application to a large multi-user system. | $598 + $99 additional user | Microsoft Access | Relational databases that have tables of data. | Software developers and data architects | $199 (Amazon) | Microsoft SQL Server | primary function is to store and retrieve data as requested by other software applications | workloads ranging from small single-machine applications to large Internet-facing applications with many concurrent users | Vary (Different Prices for different purposes) | Filemaker Pro | database engine with a GUI-based interface | ??? | $329.00 | Oracle | transfer any customer info from one location to any other in the world | larger organizations and small chain stores | ??? (Couldn’t find anything) | Mysql | database for use in web applications | Personal and commercial use | $2k-$10k/year | 5. “DBMS stands for database management system whereas RDBMS stands for relational database management system; these softwares are created to maintain and utilize large scale collection of data in an efficient manner.” http://www.differencebetween.info/difference-between-dbms-and-rdbms 6. 290 7. Peng J Wu 8. Footlocker:......

Words: 447 - Pages: 2

Premium Essay

Is 3120 Unit 1 Lab 1

...Use the internet to help you answer the following questions: 1. What is the current state of IPv6? Estimate what percentage of the network infrastructure is running IPv6 traffic. What percentage of the network is running IPv4 traffic? IPv6 - Reports in November 2008, indicated that penetration was still less than one percent of Internet traffic in any country. The leaders were Russia (0.76%), France (0.65%), Ukraine (0.64%), Norway (0.49%), the United States (0.45%), and China: 0.24%). IPv4 - Of the 4.3 billion Internet addresses possible with today's Net mainstream technology, 95 percent are gone. That is a 90% use across the worlds internet use IPv4 2. Find a company that offers unified communications. a. What technologies are being used? i. Microsoft • Audio, video, and Web conferencing • Instant messaging • Unified messaging • Voice-over Internet Protocol (VoIP) • Secure communication • Mobility • Provide IT control with failover, redundancy, and scalability • Manage compliance, and archiving policies for messaging and telephony systems b. What type of network infrastructure is being used? IPTV – Internet Protocol Television 3. Find the following models on the internet: a. B2C – Groupon, Livingsocial, Amazon Local. b. B2B – Adobe, Cisco, American Express (Other CC companies) c. B2G – Construction and Infrastructure, Information Technology 4. Look up the general definitions of the following acronyms that relate to unified......

Words: 324 - Pages: 2

Premium Essay

Unit 1 Lab

...Students will be provided with a copy of the VMware image of the Linux distribution and tools that will be used through out this course when I return to class on September 25, 2012. Accompanying this lab students will need to answer the questions from the Security Strategies in Linux Platforms and Applications lab book. To accomplish the lab assignment below, students will need to obtain a copy of the Fedora Image provided to you by the Substitute Instructor and complete a basic VMware installation of Fedora. The questions in the lab book will be based on the installation experience. Assigned Pages: 6-10 Questions: 1 through 15. This assignment is due by the end of class for Unit 1. 1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time? Accurate time is important because of the date/time stamps (records) that occur on both log-in's and any changes that were made. This allows the logs to be checked to see what individual made the changes, or was logged-in at the time the changes were implemented. 2. During the install, a password has been set for the "root" user. What is the "root" user, and when is it appropriate to use this account? The "root" user is name or account that by default has access to all commands and files. It is also referred to as the root account, root user and the superuser. It would be appropriate to use this......

Words: 1655 - Pages: 7

Free Essay

Unit 1 Lab

...1. The CPU is what actually runs the programs. 2. 1, 0 3. Digital data, and/or digital device 4. Key words, or reserved words 5. Nmeumonics 6. A compiler translates a high-level language program into a separate machine language program. An interpreter both translates and executes the instructions of a high-level program. 7. Operating system Popular Programming languages 1970s: Pascal: Niklaus Wirth. 1970, and was developed for use in education to teach programming. C: Dennis Ritchie. Developed between 69 and 73. It was designed to encourage cross-platform programming, and to be used by straight forward compliers. Smalltalk: Alan Kay, Dan Ingalls, Adele Goldberg. Developed between 69 and 72. It was designed primarily for educational use. Scheme: Guy L. Steele and Gerald Jay Sussman. Developed in 1975 for educational uses. SQL: Donald D. Chamberlin and Raymond F. Boyce. Appeared in 1974. Designed to manipulate and retrieve data. 1980s: C++: Bjarne Stroustrup. Appeared in 1983. Developed for systems programming. Ada: Jean Ichbiah. Developed in 1980 for the Department of Defense as a unified language for embedded and real-time systems. Eiffel: Bertrand Meyer. Appeared in 1986. Developed to eliminate bookkeeping instructions to make code more readable and easier to program. Objective-C: Brad Cox and Tom Love in1983. Perl: Larry Wall. Appeared in 1987. Developed as a general purpose Unix coding mechanism. 1990s: Python: Guido van Rossum,......

Words: 457 - Pages: 2

Premium Essay

Unit 1 Lab 1 Nt1230

...Name Student # Date Assignment Requirements Follow the directions in the Lab Manual for Lab 1, and complete all Exercises. Answer all the questions. Submission Requirements Microsoft Word. 1-2 pages. Self-Assessment Checklist I followed the directions in the lab manual for all exercises. | * | I submitted answers to all of the questions for this lab. | * | I used critical thinking. | * | I have followed the submission requirements:File Format: Microsoft Word (.doc /.docx)Length: 1-2 pagesFont: Times New Roman 12 point sizeLine Spacing: Double | * | Lab 1 worksheet Preparing a Virtual Workstation Image Exercise 1.3 | Exploring Windows 7 | Overview | In order to familiarize yourself with the new Operating System being rolled out in your organization, you decide to manipulate some common features to see how they differ from previous Windows versions. In this exercise you will work with screen saver and other display properties. | Completion time | 30 minutes | Question 1 | What is the current screen resolution? 800x600 | Question 2 | What security advantages does displaying the login screen on resume offer? Offers security from anyone coming along and taking a look at what your doing | Question 3 | How did changing the theme affect your display? It gave a different background | Exercise 1.4 | Creating an .iso Image From Windows 7 Installation Media (Optional) | Overview | Carrying around......

Words: 275 - Pages: 2

Free Essay

Nt1310 Unit 7 Lab 1

...Unit 7 Lab 1 New Building Safety Plan In my safety plan the first things that I’m going to cover are the PPE for working on a construction site where a new building is being placed. First you’re going to need a hard hat so that when anything falls from above, it keeps your brains where they belong like in your head. Second steel toed shoes or boots, preferably boot for a little extra ankle support. But the steel toes to protect your feet from anything being dropped or lowered in case your foot gets in the way. Safety goggles, pretty self-explanatory on this one, just need to keep things out of your eyes! Long pants (blue jeans) protect your legs from different object that could hurt your skin but with pants on you might just get a bruise. Next on the list gloves are always a good idea to wear so that you don’t rip your hands up while you’re working! A water cooler is a must in this situation because it’s going to be hot out and hydration is key to survival! There will also be no running on the job site. Hurry to quickly can cause more accidents than any amount of production you’re getting for running that thirty foot. Only work on the parts of the job that you know, if someone ask for help go ahead and give them a hand but if you’re a plumber then just let the electrician handle his own job. Back to PPE for a sec a back brace would be a good idea to wear also. Once you have a back injury it will be a problem for the rest of your life in most cases. In case of an......

Words: 392 - Pages: 2

Free Essay

Unit 9 Lab 1

...Task 1 1. The Cisco RV220W Firewall is a hardware firewall that doubles as a router. It has VPN security to allow safe access from remote computers and offices. It also protects against cloud based threats. ZoneAlarm is a software two-way firewall and also comes with backup software. It monitors your programs constantly and should a virus or malicious program make it through it catches it immediately. Task 2 1. Panda, Norton, and Kapersky all offer free trial versions of their products. AVG is the only full-fledged free anti-virus software in the group. McAfee does not offer trial versions or a free version, only purchasable options. 2. A Trojan horse is an application that appears benign but is really a destructive program. A user will think they are downloading something beneficial to their computer and when they do the Trojan horse begins to corrupt their system. Phishing is when a person receives an email that directs them to a false website that appears to be legit and then has the user enter sensitive personal information such as credit card numbers, social security number, etc. A drive-by download occurs when a user visits a website, doesn’t have to click any links or anything, and malicious software automatically begins to download in the background without the users knowledge. Task 3 1. A full backup backs up all the files and folders on a specific drive every time you use that file set. It takes longer and uses up more file space. An incremental......

Words: 586 - Pages: 3

Free Essay

Et1220 Unit 5 Lab Report

...------------------------------------------------- Part 1- Implement Asynchronous Counters Theory: 1. What makes a counter asynchronous? The counter is asynchronous because its clock is only applied to a single flip-flop. 2. What is the modulus or count range of the following counter? 16 cycles will count from 0-15 Planning: 3. What is the purpose of the ELVISmx Dig In instrument? display the output of the counter Test Procedure: 4. Record the observed values from Lab 5 Table 5-1. Record the state number, the value of QDQCQBQA, the hexadecimal and decimal values. StateNumber | DataLine 7 | DataLine 6 | DataLine 5 | DataLine 4 | Hexadecimal | Decimal | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 1 | 1 | 2 | 0 | 0 | 1 | 0 | 2 | 2 | 3 | 0 | 0 | 1 | 1 | 3 | 3 | 4 | 0 | 1 | 0 | 0 | 4 | 4 | 5 | 0 | 1 | 0 | 1 | 5 | 5 | 6 | 0 | 1 | 1 | 0 | 6 | 6 | 7 | 0 | 1 | 1 | 1 | 7 | 7 | 8 | 1 | 0 | 0 | 0 | 8 | 8 | 9 | 1 | 0 | 0 | 1 | 9 | 9 | 10 | 1 | 0 | 1 | 0 | A | 10 | 11 | 1 | 0 | 1 | 1 | B | 11 | 12 | 1 | 1 | 0 | 0 | C | 12 | 13 | 1 | 1 | 0 | 1 | D | 13 | 14 | 1 | 1 | 1 | 0 | E | 14 | 15 | 1 | 1 | 1 | 1 | F | 15 | | | | | | | | | | | | | | | ------------------------------------------------- Part 2- Implement Synchronous Counters Theory: 5. What makes a counter synchronous? Because its clock is applied to each of the flip-flops. 6. What is the purpose of the ~U/D control signal......

Words: 591 - Pages: 3

Free Essay

Unit 5 Lab 5.1-5.4

...Unit 5. LAB 5 Ethernet LANs LAB 5.1: LAN Standard Exercise 5.1.1 Briefly define the 802.1 standard: Keeper of the LAN architecture – IEEE standard 802. Describes the 802 family of standards. Describes the LAN Architecture. Defines some useful things, such as the LAN address format, the SNAP protocol, the Playpen Ethertypes, and the OID registration arcs. The higher Layer Interface working group in 802. Defines the bridging and security glue that interconnects the LANs define by the 802 MAC groups. Exercise 5.1.2 What 802.3 standard originally define PoE functionality? When was the standard enhanced, and what was the new standard name given for the enhancement? The standard that originally defines PoE functionality was the IEEE 802.3af. The new standard is known as IEEE 802.3at it, and it was enhanced in 2012. Exercise 5.1.3 Complete Table Standard | Cabling | Maximum Length | 10BASE5 | Coaxial(Thicknet) | 500m | 10BASE2 | Coaxial (Thinnet) | 185m | 10BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | 100BASE-FX | Multi-mode fiber optic cable (SC or ST) | 400m | 100BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | 100BASE-T4 | STP Twisted Cable | 100m | 100BASE-TX | Single-mode fiber optic cable | 20km | 1000BASE-LX | SMF and MMF | 550m | 1000BASE-SX | MM fiber-optic | 220m or 550m (dependent upon fiber thickness | 1000BASE-ZX | MM fiber-optic | 550m | 1000BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | Exercise 5.1.4 What does the numeric prefix before BASE in the......

Words: 1936 - Pages: 8

Premium Essay

Nt1130 Unit 1 Lab

...Unit 1 Assignment 1: Windows 2008 Network Services Most networks out there will take advantage of DNS and DHCP services. These services make managing a network an easier task for the administrator. While they are not always required for a network to function, most cases they will be used. Knowing what these services do will help the administrator determine if they are required for the network. DNS stands for Domain Name System. What this service does is help convert IP addresses into names easily remembered by the user. Instead of having to remember an IP address for every device on the network an administrator could set up DNS so names can be assigned to all the devices. Most users will find remembering a name easier than trying to recall a string for 12 numbers. DHCP stands for Dynamic Host Configuration Protocol. What DHCP does is assign IP addresses to devices. Without DHCP an administrator would have to assign IP addresses to each device on the network. Maybe in a small network this wouldn’t be a problem, but a network with more than 10 devices this may become a large task for one person. DHCP can be configured with a range of IP addresses for a network and it will assign each device an address that is not being used. It keeps track of what devices are using IP addresses and which ones are not. Knowing how each of these services work will help an administrator decide if they want to use them. In a network with say 5 devices the administrator may want to manually assign...

Words: 357 - Pages: 2

Premium Essay

Unit 5 Assignment 1

...Shamone Gayles Unit 5 exercise 1: Guided Reading Chapter 10 1. What is the typical organization on an argument essay? Introduction /summary of opposing positions including strengths/ limitations of opposing positions/Your understanding of the issue, describing both strengths and limitations of your position/Reasons your understanding is better than the opposing views’ understanding/ Conclusion 2. What are points of contention, and how do you identify them? My position verses opposing positions, by coming up with the best arguments against your position yourself so you are prepared to counter them. 3. Why is it important to know the stance of your opposition? By knowing your opposition, you can identify the weaknesses in your stance and how to remedy them. 4. What is the difference between argument and research paper? In an argument you pick a topic that is controversial and debatable, whereas in a research paper, you do your research and only report what you find, while not trying to sway in either direction. Chapter 24 1. What is a good way to start the research process? Define your research question and sharpen it/ develop a working thesis that offers your best guess about how you will answer the research question/ devise a research plan to systematically collect the information needed to answer your research question and determine whether you’re working thesis is verifiable. 2. Why is it important to have a sharp research......

Words: 724 - Pages: 3

Free Essay

Unit 5 Assignment 1

...pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm Unit 5 Assignment 1:Future Statement Brain Mapping 8/1/2013 Troy Jones (16609262) GS 1140 | I find the future of Brain Mapping Technology very exciting! Think of it, science has already begun to do this. Can you imagine if we could look at the brain and find exactly where our actions come from? Thoughts, behaviors, actions, and brain trauma/disease just to name a few could be improved upon or better yet cured! This would have a huge impact on our society. Brain diseases like (ALS) Lou Gehrig’s disease for example could be impacted greatly. I personally lost my oldest brother to ALS last year. He was only 54 and died nine months after the diagnosis. It’s a brutal disease. I would like to in vision a future for people without ALS or Autism. Curing......

Words: 274 - Pages: 2

Free Essay

Unit 5 Ass.1

...CPU/memory and cheaper to run / maintain. Unequal cost load- balancing EIGRP allows unequal cost load balancing, which means you can use 2 different cost links to load balance traffic, no other protocol can do this. It is VLSM friendly unlike other distance vector protocols, and EIGRP supports VLSM and discontinued networks. EIGRP is also less confusing than OSPF because it does not have different network types and EIGRP is easier to deploy in hub and spoke scenarios. EIGRP uses a flat network without areas, this can both be an advantage and disadvantage. OSPF is obviously an open standard so it's the logical choice if you have multiple vendors. It can perform well but it requires that you tweak SPF timers because by default in IOS there is a 5 second wait before running the SPF algorithm. OSPF uses areas which means you can segment the network more logically. OSPF can only summarize between areas. OSPF is link state so it has a better view of the entire network than EIGRP before it runs the SPF algorithm. Network administrators will usually be more comfortable with OSPF because it's more commonly deployed....

Words: 379 - Pages: 2

Premium Essay

Unit 7 Lab 1

...Gerald Johnson NT1310T Unit 1 Exercise Local Exchange 3/13/2016 The purpose of a Network is to share data. To make this possible, you have to be able to connect to other computers. To make this enticing to people to want to take advantage of this technology, it has to be simple not so complex. This sounds a little difficult to understand as far as a qualified answer, but to sum things up that is it. The question to ask and that many people don’t consider is how data is transferred from one computer to another computer? Transferring data that is being sent by the user who has created and initialized the transfer of information using a source such as an email service for example. How do you get information from one computer to another, and how do you make it simple and easy to do this? Companies that succeeded at doing this have a great profit with exponential growth possibilities and revenue. For example Cisco company who has made billions by allowing different groups of networks to share data across what we call the internet. Games take advantage of this technology to connect to other computers. Networking companies have succeeded so well in allowing people to connect across their internal networks and the internet that pretty much any app. is able to send data to another computer. There is a physical connection running between two computers that want to connect. This is made possible because phone lines that run from houses to switches to other houses......

Words: 472 - Pages: 2

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they......

Words: 16182 - Pages: 65