...Upon arriving at the client, Ocper, Inc., I realize that there is no one dedicated to information technology or networking on the staff. Also, there are twenty Windows peer-to-peer client computers all connected via coax cabling. The president indicates that the company plans to double in size over the next two years, but she is weary of drastically changing the computing environment. My job as a recently hired consultant is to suggest and give a breakdown of a new system. Suggestion of Changes In Terms of the Current Network Type/Structure with the Benefits. I would advise the president to replace the current network setup to twisted pair cable. Coaxial cable carries high frequency signals along a single center conductor, whereas, twisted pair cable improves its electrical characteristics at a lower voice frequency and prevents signals from crossing into adjacent wires. It also allows the signal to travel longer distances. Reasoning for Suggesting Connecting All Current and New Client Computers Using Twisted Pair Cable Instead of Staying With the Current Coax Wiring Structure. Twisting two insulated wires together improves their electrical characteristics at a lower voice frequency and prevents signals from crossing into adjacent wires. It also allows the signal to travel longer distances. Coaxial cables carry high-frequency signals along a single-center conductor surrounded by a foil or braided copper shield. Coaxial cable has less loss than twisted pair, and...
Words: 883 - Pages: 4
...possible to save cost. Based on the existing technology, it is known that the corporate MAN connection makes use of lease lines. In the office buildings, LAN connection with hybrid bus/star topology is used with Ethernet LAN transmission medium. In the new Network Design, a few additions are present. Figure 1 - Parstech Wide Area Network This network design shows the Wide Area Network and the relationships between the branch offices and the main headquarters. The main headquarters is where the application servers of the company is present. This is to enhance security by placing it in one place. The branch servers are connected to the main headquarters by means of leased lines using the transmission medium fiber optics. The bandwidth and data rate of fiber optics is required to maintain the connection under high network usage. Figure 2 – Sample Internal Architecture of LAN in one of the offices. The diagram above shows the architecture of an office building in one of the branches. The whole network is set behind a firewall as a measure of protection. The switches give connection to terminals and also resources such as printers. Some protocols are needed for the printers to work correctly when remote, namely the Line Printer Daemon Protocol or LPR. This...
Words: 2052 - Pages: 9
...... .. 4 Historical Milestones........ …... …... …...... ….... …......... …....... …....... 4 Optical Networking why......... ….......... …..................... …................ …. 5 Principles and Operation............... …................. …........ ….............. …... 5-8 Single Mode Fiber............ …........................ ….................. …...... 6 Multimode Fiber................. ….................. ….............. …........ … 6-7 Optical Networking Tools.............. …............... …............. …............ ….. 8-10 Fiber Optic Splicers................. …............. ….... …........... …........ 8-9 Fiber Optic connectors.................. …............... …................. ….... 9 Fiber optic couplers........... …................. …............. …............ …. 9 Fiber Optic Transmitters................ ….................. …............ …...... 9 Fiber Optic Receivers............ ….................. …............ …..... ….... 10 Types Of Optical Networks.............. …........................... …............. …..... Optical Network Architecture............... …............... …............ ….......... ... Optical Networking vs Other Technologies................. …............ …......... Optical Networking Advantages........ …................ …................. ….. …. Optical Networking disadvantages....... …........... …......... …............ ….. Business Implications and Applications..........
Words: 3428 - Pages: 14
...History of Fiber Optics The idea of using light waves for communication can be traced as far back as 1880 when Alexander Graham Bell invented the “photo-phone” shortly after he invented the telephone in 1876. In this remarkable experiment, speech was transmitted by modulating a light beam, which traveled through air to the receiver. The flexible reflecting diaphragm (which could be activated by sound) was illuminated by sunlight. The reflected light was received by a parabolic reflector placed at a distance of about 200 m. The parabolic reflector concentrated the light on a photo-conducting selenium cell, which formed a part of a circuit with a battery and a receiving earphone. Sound waves present in the vicinity of the diaphragm vibrated the diaphragm, which led to a consequent variation of the light reflected by the diaphragm. The variation of the light falling on the selenium cell changed the electrical conductivity of the cell, which in turn changed the current in the electrical circuit. This changing current reproduced the sound on the earphone. Fiber Optic Technology Fiber Optic is a technology that uses glass as thin as a human hair to transmit data from one place to another by sending pulses of light through an optical fiber. The light forms an electromagnetic carrier wave that is modulated to carry information. A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. It is widely...
Words: 2001 - Pages: 9
...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...
Words: 6762 - Pages: 28
...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...
Words: 10839 - Pages: 44
...Verizon Tony Gauvin All images from www22.verizon.com ©2005 Tony Gauvin, UMFK Overview Existing Condition New Vision and Mission External opportunities and threats CPM EFE Internal strengths and weaknesses IFE SWOT Matrix SPACE BCG IE matrix Grand Strategy Matrix QSPM Analysis Possible strategies Recommendations Strategic implementation and desired results Annual objectives (goal) and polices Evaluation Procedure Wednesday, March 23, 2005 © 2005 Tony Gauvin, UMFK Verizon Overview Verizon Communications Inc. is a provider of communications services with four operating segments: Domestic Telecom Domestic Telecom services principally represent Verizon's telephone operations that provide local telephone services in 29 states and the District of Columbia Domestic Wireless Domestic Wireless products and services include wireless voice and data services and equipment sales across the United States. The Information Services segment encompasses Verizon’s domestic and international publishing businesses, including print SuperPages and electronic SuperPages.com directories, as well as Website creation and other electronic commerce services. This segment has operations principally in North America and Latin America The International segment has wireline and wireless communications operations and investments primarily in the Americas, as well as investments in...
Words: 3995 - Pages: 16
...wife, however due to severe cognitive disturbances together with motor neuron features, his wife can no longer take care of him at home as she cannot determine his needs or understand his complaints. Mr. Khoury and his wife have both accepted his poor prognosis and deterioration as reflected by orders not to resuscitate, intubate or ventilate. His reason for admission is not an acute illness but to determine which palliative measures can be taken to relieve discomfort whilst correcting his fluid imbalance. A combination of reasons exists as to why Mr. Khoury's fluid and electrolyte imbalance has occurred. Firstly, as a result of Mr. Khoury growing dysphasia, his difficulty in comprehending language combined with decreased communication has led to an inadequate oral intake of medications. Furthermore, coupled with the chronic, degenerative disease of the brain known...
Words: 3264 - Pages: 14
...(hardware) • the means of transporting information between computers, inclusive of the physical media, the data packaging mechanism, and the routing between multiple network equipment pieces from the starting node until reaching the destination node. q Interoperability (software) • the methodology applied to make data understandable to computers that use proprietary or simply different computer operating systems and languages. TOPICS COVERED q Communication Networks q Network Types q Classification Geographic q Protocols and Standards q System Requirements q Labs & Exercises Communication & Networks BASEBAND Network is one in which the cable or other network medium can carry only a single signal at any time. vs. BROADBAND Network can carry multiple signals simultaneously, using discrete frequency for each signal. How Network Communicates ? Server Is a Computer running process that provides a service to other computers when they request it. Client Is a Computer running process that request a service from the server. Network Types Client - Server Peer to Peer Network’s Geographic PAN - Personal Area Network LAN - Local Area Network MAN - Metropolitan Area Network WAN - Wide Area Network ü Size ü Transmission...
Words: 2163 - Pages: 9
...NT1210 Introduction to Networking Unit 1: Mid-Term Mid Term Review 1 Nibble, Byte, Word, Double Word Nibble, Byte, Word, Double Word Figure 1-2 2 Kilobyte, Megabyte, Gigabyte, Terabyte Size (2N Bytes) Term Size (Bytes) Kilobyte Megabyte Gigabyte Terabyte 1024 1,048,576 1,073,741,824 1,099,511,627,776 Kilobyte, Megabyte, Gigabyte, Terabyte 210 220 230 240 Rounded by Size (Bytes) 1,000 1,000,000 1,000,000,000 1,000,000,000,000 Table 1-1 3 Random Access Memory (RAM) Physically exists as set of microchips installed on plastic card (memory module) Central Processing Unit (CPU) uses RAM like people g ( ) p p use notepad Stores binary value so can use it later Can read data from RAM to recall value stored earlier CPU sends electrical signal over bus (electrical pathway) to communicate with RAM 4 Random Access Memory (RAM) (cont.) RAM uses address for each unique memory location where byte can be stored To write to RAM: CPU sends signal to RAM over the bus g to write (store) value into byte of RAM Address in RAM Value to be written To read from RAM: CPU uses similar process (see example in Figure 1-3 on next slide) 5 CPU Reads Byte 4 from RAM The CPU uses the same bus to read the current value of a byte in RAM as it does to send a message to RAM. The read request lists the address of the particular byte, asking for its value. RAM returns the binary value stored at that address. CPU Reads Byte 4 from RAM 6 Figure 1-3 Writing Individual Bits in Byte 4 of RAM...
Words: 11596 - Pages: 47
...in the economic and national and the world security. As thus, it has become a primary concern for all business people protecting their ideas not to be leaked, in the military due to the protection of national security and also by the government which has to keep it a secret of all what is happening within it. The issue of the cyber attacks has not been one event but something that has occurred over time as a result of inventions and innovations by the governments and security agencies. It was triggered by the need to safeguard one's interests and at the same time keep secrets that if they leak the competitors or the enemies can use them against you. One of the periods that can be credited to giving birth to the period of developments that led to cyber attacks is 1918 all the way to 1939 whereby there was increased military revolution. One of these advances was the use of modern aircraft, weapons, and military strategies and, of course, the technology (Andress & Winterfeld, 2013). It is said that necessity is the mother of all inventions and therefore after the First World War rulers all over the world, the military, political and the business leaders knew that there was an immediate need to develop more technological...
Words: 1263 - Pages: 6
...Assignment -1 Global Business Environment Topic: Pro-Globalist Vs Anti-Globalist Pro-globalist vs. Anti-globalist, the seventh Secretary-General of the United Nations, addressed the force of globalization in his quote, “It has been said that arguing against globalization is like arguing against the laws of gravity. What is Globalization? It is the integration of the world, technologically, economically and politically, wherein the barriers between the national borders are removed to facilitate the flow of goods, capital, services, labour. Global production has created global markets which offer extraordinary growth for organizations in terms of growth & profits. It has led to sharing of ideas & technology, which further leads to innovation and technological progress. However, it is also blamed for increasing the gap between rich and poor, destruction of the environment, and threatening human rights. In the last three years, the anti-globalization movement has staged protests at meetings of the World Trade Organization, the European Union, the World Bank, the International Monetary Fund, the World Economic Forum, and the G-8. Globalization is a powerful real aspect of the new world system, and it represents one of the most influential forces in determining the future course of the planet. Globalization has many dimensions: economic, political, social, cultural, environmental, security, and others. Different people have different interpretations on Globalization. Due...
Words: 2105 - Pages: 9
...AT&T is a very large multinational corporation that focuses on telecommunication products. They were founded in 1893 in Alexander Graham Bell (who invented the telephone) and are headquartered in Dallas, TX. They have grown into being the #1 provider of wired telephony and #2 in mobile telephony in the United States. They are currently experiencing a dramatic shift in their market presence as landlines continue to decline as mobile and broadband are taking over as their main growth markets. AT&T’s relevant market has and always will be in telecommunications. Telecommunications can be defined as connecting individuals and information through means of technology such as airwaves and wires. Since being founded in the late 1800s, their main focus has been to connect people for voice calls. However, with the invention of the internet, they have begun to focus their expansion efforts on internet communications and connectivity. The market that AT&T operates in is growing through a huge transformation. Consumers these days are relying less on hardwired “landlines” and are focusing more on a mobile presence. This has caused AT&T’s phone business to focus their growth on mobile. AT&T is experiencing a radical shift in both of these markets. Like their competitors, their landline business has been on the decline over the last 10 years. This trend will definitely continue as less and less people are signing up for landlines as they feel that there is really no point in having a phone...
Words: 1690 - Pages: 7
...B. WORLDCOM 2.0 Nature of the Fraud The nature of the fraud was the uses of fraudulent accounting method by add on huge earning in 2002 to cover the liability of acquired by company. When the earning is high, it will show that the company financial growth is high and will make the price of WorldCom's stock increase. The creative accounting was done by classified over $3.4 billion for line costs that is interconnection expenses with other telecommunication companies as capital expenditure. When the cost have been capitalised, meaning that WorldCom to spread them over many year as capital will have depreciation. Line cost supposed to record as expenses as WorldCom paid other companies because of the usage of their communication networks. Access fees and transport charges are consist in line cost expenses charges for messages for WorldCom customers. This misclassified were done between 2011 and first quarter 2002. Read more: http://www.ukessays.com/essays/accounting/nature-of-the-fraud-accounting-essay.php#ixzz3qjKkXfsR WORLDCOM'S COLLAPSE: THE OVERVIEW; WORLDCOM FILES FOR BANKRUPTCY; LARGEST U.S. CASE By SIMON ROMERO and RIVA D. ATLAS Published: July 22, 2002 • Facebook • Twitter • Google+ • Email • Share • Print • Reprints • WorldCom, plagued by the rapid erosion of its profits and an accounting scandal that created billions in illusory earnings, last night submitted the largest bankruptcy filing in United States history. The bankruptcy is expected...
Words: 1810 - Pages: 8
...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...
Words: 234459 - Pages: 938