...Leased Lines Crystol Weidger INF325: Telecommunications & Networking Concepts Instructor: Sabahudin Tricic December 10, 2012 Leased Lines In this paper we will answer the following questions a-g for a better understanding of leased lines. a. Below what speed are there different leased line standards in different parts of the world? Lease lines span between 1.544 Mbits/second for a typical T1 located in North America to over 34 Mbits/second in Europe. It was below 50 Mbits of data transmission when difficulties started to occur from country to country so that different parts of the world could configure their own set of lease line standards (Panko & Panko 2011). b. What is the exact speed of a T1 line? North America provides lease line access in the form of T1. This is a dedicated connection which supports data rates of 1.544 Mbps (Panko & Panko, 2011). c. What are the speeds of comparable leased lines in Europe? The comparable lease line standards start at the speed of 2.048 Mbps which is known as E1. Europe provides a similar structure to the North American for data connectivity. Even though Europe’s’ structure may be similar to North American structure it is different. d. Why are fractional T1 and E1 speeds desirable? Fractional T1 and E1 speeds are desirable because they help to alleviate cost. They also provide dedicated transmissions that can be divided into different lines for multiplexing data and voice communications. The T1/E1...
Words: 515 - Pages: 3
...IT Director Assignment Final Paper INF325: Telecommunications and Networking Concepts The purpose of this paper is to act as an IT Director for a small, growing firm, and tasked to develop an electronic resource security policy to deploy within the organization. The policy will be designed to protect the organization’s valuable electronic assets, but also be flexible enough to accommodate the employees as they execute in their jobs and get business done. Communications and data security aspects such as smartphone access, remote data access, and internal electronic email such as email and IM messaging. The paper will discuss the difference between policy and implementation, and describe the importance of their separation. An outline of the security policy will be drafted stating the areas identified. The paper will compare the differences between users who work remotely or use wireless hotspots to users who work on site in a traditional office environment. Finally, it would discuss how I would implement the security policy within the organization which includes how employees would be apprised of the new policies, and an explanation of which elements are critical for a successful implementation of the policy. The difference between implementation and policy is that implementation is the execution, carrying out, method, standard, and policy for doing something. In Information Technology, it ensures that all the processes within the system is operating correctly in its environment...
Words: 1530 - Pages: 7