...IT 320 WAN Homework Unit 1 Vocabulary Exercise: Matching (Pg 3) Matching a) When referring to clocking, the CSU/DSU is this piece of equipment Data Circuit Terminating Equipment (DTE) b) The software used by a router Cisco IOS c) Dialup and ISDN are examples of these types of networks Circuit Switching d) Describes the timing between the router and the CSU/DSU Synchronous e) Lost when a device is powered down or rebooted Contents of RAM f) Wires or other media through which data is transmitted from one place to another Serial Link g) Connects LANs to WANs Interface h) The physical connection point on networking devices where signals enter and exit Router i) A smaller, more compact physical connection physical interface specification Smart serial interface j) A WAN link contracted for use by the customer Leased Line k) Frame relay and ATM are examples of these types of networks Packet Switching l) When referring to clocking the customer’s router , this piece of equipment is used Data Terminal Equipment (DTE) m) A communications link that is outside the normal IP network, like a console cable or a phone call between two modems and the aux port. Out of Band Management n) A network that spans a large geographic region WAN o) A telecommunications path that sends 1 bit at a time Serial Interface p) The router port that connects a WAN link Bus ...
Words: 320 - Pages: 2
...Task 1 Element 1 Describe computer network types and standards. 1.1 The description distinguishes types of networks. Homogeneous Networks Homogeneous means similar, it is easy to administer and protect the homogeneous network configuration in networking. In a homogeneous network configuration, the similar operating environment is used to run the all systems. Same protocols are used to run the same operating environment and with the similar security attributes. A homogeneous network used a NIS+ master, is shown in the following figure. Figure (a) Homogeneous Network Heterogeneous Networks Heterogeneous means different, to run different network protocol a Trusted Solaris networks can be used. Different protocols are used to run the same operating environment and with the different security attributes and uses the different NIS (network information service). The following figure shows a typical heterogeneous network and some different protocols. There is a good example of heterogeneous network in networking term, computers with MS windows XP / windows 7 & UNIX, Linux, can communicate to each other by using different network protocols. Figure (b) Heterogeneous Network (Oracle, 2010) Wide Area Network Wide Area Network (WAN) is any network that crosses different far places like national boundaries. In WAN we can shares software and resources with connecting workstations and can Share information/files over a larger area A centralised WAN consist of a central...
Words: 12246 - Pages: 49
...Property and Other Businesses – Hong Kong Network Expansion – Mainland and Overseas Growth – Human Resources Financial Review Ten-Year Statistics Investor Relations Risk Management 89 90 94 112 116 124 125 153 154 155 156 157 158 159 160 161 240 Sustainability Corporate Responsibility Corporate Governance Report Remuneration Report Board and Executive Directorate Key Corporate Management Report of the Members of the Board Contents of Accounts and Notes Independent Auditor’s Report Consolidated Profit and Loss Account Consolidated Statement of Comprehensive Income Consolidated Balance Sheet Balance Sheet Consolidated Statement of Changes in Equity Consolidated Cash Flow Statement Notes to the Accounts Glossary Annual Report 2012 1 MTR...
Words: 17904 - Pages: 72
...Packaging………………………………………………………………………………...17 “Moisturizer”…………………………………………………………………………….18 Process control…………………………………………………………………………...20 References………………………………………………………………………………..20 Introduction What is hair conditioner? Hair conditioners are basically designed to restore hair to its natural state rather than produce an artificial effect. Mostly, the hair conditions have treatments of washing to dyeing or to sustain permanent waving hair [7]. Hair conditioner has also the ability to undo the damage by giving a better look and feel to the hair fibers. However, hair conditioners are not meant to repair damaged hair. Most hair conditioner is basically compositions containing cationic surfactants in combination with long chain fatty alcohol and other lipid components [1]. Modern hair conditioners are actually derived from old-age practices. For example, anointing the head with polar...
Words: 5515 - Pages: 23
...and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR, UK http://www.academicpress.com Library of Congress Cataloging-in-Publication Data Ellis, Juanita. Convergence of voice, video, and data networks / Juanita Ellis, Charles Pursell, Joy Rahman. p. cm. ISBN 0-12-236542-9 1. Convergence (Telecommunication) I. Pursell, Charles. II. Rahman, Joy. III. Title. TK5101.E48 2003 384.3¢3—dc21 International Standard Book Number: 0-12-236542-9 PRINTED IN...
Words: 125371 - Pages: 502
...1. Compare and contrast at least five technologies that are readily available for in-home internet access. You should consider practical as well as technical differences in your comparison. Do not include Frame Relay or ATM as these are primarily larger scale business solutions. 802.11N Higher-speed standards up to 300+ Mbps 802.11n uses (MIMO) technology and a wider radio frequency channel. It provides a mechanism called frame aggregation to decrease time between transmissions Channels operating at 40 MHz are another feature incorporated into 802.11n The transmitter and receiver use pre-coding & post-coding techniques to achieve the capacity of a MIMO link Video Conferencing A video conference is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously ITU H.320 is known as the standard for video conferencing over integrated services digital networks H.264 SVC is compression standard that enables video conferencing systems to achieve highly error resilient The components within a Conferencing System layers: User Interface, Conference Control, Control or Signal Plane and Media Plane The RTP and UDP normally carry information such the payload type which is the type of codec, frame rate, video size and many others Browser A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web. Web browser is a client program...
Words: 2038 - Pages: 9
...employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to meet the demands of continued success. table of contents: Staff …………………………………………………………………………………………………………………………………………. 3 Network Requirements ……………………………………………………………………………………………………………. 4 WAN Design …………………………………………………………………………………………………………………………… 12 LAN Design ……………………………………………………………………………………………………………………………. 26 Structured Cabling …………………………………………………………………………………………………………………. 28 Hardware...
Words: 18593 - Pages: 75
... Revisiting the concept “dialogue” in public relations Petra Theunissen ∗ , Wan Norbani Wan Noordin 1 School of Communication Studies, Faculty of Design & Creative Technologies, AUT University, Private Bag 92006, Auckland 1142, New Zealand a r t i c l e i n f o Article history: Received 2 October 2010 Received in revised form 14 September 2011 Accepted 14 September 2011 Keywords: Public relations Dialogue Two-way symmetric communication Risk a b s t r a c t This paper follows a critical approach in exploring the philosophical underpinnings and key features of dialogue in public relations practice and thinking. It argues that dialogue has been uncritically equated to two-way symmetrical communication, which has not done justice to the nature of dialogue, and has effectively stifled concrete development of a dialogic theory in public relations. The paper draws from a range of literature, including mainstream public relations and communication philosophy—in particular the philosophy of Martin Buber. The purpose of this paper is to inform public relations thinking by encouraging debate rather than proposing a new theoretical approach. As such, it sets out to explore the concept of dialogue and its philosophical underpinning, considers its practical application and suggests that it should not be seen as superior to persuasion. © 2011 Elsevier Inc. All rights reserved. 1. Introduction The term “dialogue” has become ubiquitous in public relations writing...
Words: 8548 - Pages: 35
...Economic Modelling 28 (2011) 1348–1353 Contents lists available at ScienceDirect Economic Modelling j o u r n a l h o m e p a g e : w w w. e l s ev i e r. c o m / l o c a t e / e c m o d Foreign direct investment and China's regional income inequality☆ Kang Yu a, Xian Xin b,c, Ping Guo a, Xiaoyun Liu d,⁎ a School of Economics and Management, Zhejiang Forestry University, Zhejiang, 311300, PR China Center for Rural Development Policy, China Agricultural University, Beijing, 100083, PR China c College of Economics and Management, China Agricultural University, Beijing, 100083, PR China d College of Humanities and Development Studies, China Agricultural University, Beijing, 100083, PR China b a r t i c l e i n f o a b s t r a c t China's widening regional income inequality coupled with its pronounced regional disparity in foreign direct investment stock since 1990 has claimed the attention of many scholars. While some researchers confirm regional disparity in China's foreign direct investment, others attribute the widening regional income inequality to this regional disparity. This paper thus assesses the impacts of China's stock of foreign direct investment on its regional income inequality using simultaneous equation model and the Shapley value regression-based decomposition approach. Our results suggest that China's stock of foreign direct investment has accounted for merely 2% of its regional income inequality. Furthermore, the contribution ratio of per...
Words: 5685 - Pages: 23
...CHAPTER 1 INTRODUCTION TO INFORMATION TECHNOLOGY 1.1 Introduction Modern civilization has become so complicated and sophisticated that to survive one has to be competitive. This compels people to keep themselves informed of all types of happening in the society. And this in turn entails the need for an infrastructure of information. This is the point where information technology or IT becomes most important, as it is the infrastructure that allows us to get information accurately and in time. Before we define information technology, it is important to understand the notion of Data, Information, Technology, and Knowledge. In everyday conversation, people use the terms data and information interchangeably. However, some computer professional make a distinction between the two terms. Data It is the words, numbers, letters, symbol, sound, video and graphics that describe people, events, things and ideas. It is raw facts about people, objects, and events that have little or no meaning. It is the raw material used to create useful information. It becomes information when you use it as the basis for initiating some action or for making a decision. Information It is defined as the words, numbers, letters, symbol, sound, video and graphics used as the basis for human action or decisions. It is data that have been processed and presented in a form suitable for human interpretation, often with the purpose of revealing trends or patterns that can be used in decision-making. It is data...
Words: 12773 - Pages: 52
...Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet Technologies * Token Ring/IEEE 802.5 WAN Technologies A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the...
Words: 217433 - Pages: 870
...Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 ii Top-Down Network Design Top-Down Network Design, Third Edition Priscilla Oppenheimer Copyright© 2011 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing August 2010 Library of Congress Cataloging-in-Publication data is on file. ISBN-13: 978-1-58720-283-4 ISBN-10: 1-58720-283-2 Warning and Disclaimer This book is designed to provide information about top-down network design. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc. Trademark Acknowledgments All terms mentioned in this book that...
Words: 79785 - Pages: 320
...BAB111 Revised January 12, 2005 ILinc Case Study of a Start Up “It’s been a long semester,” thought Mark Bernstein. “I have spent a lot of time with Degerhan working on our business plan for our proposed new venture, Interactive Learning Corporation, but can we really make it go? Should we even try? I’ve got a good job waiting for me with a large corporation. Is the upside potential of ILinc great enough to justify taking the risk?” Mark Bernstein and Degerhan Usluel knew each other from MBA classes at Rensselaer Polytechnic Institute. Outside a career fair sponsored by the school in the fall of 1993, Bernstein was sitting on a bench when Usluel approached and asked, “Do you really want to work for any of them?”, referring to the established companies at the career fair. “No, I can’t see myself working for corporate America. I’d really like to start my own business, but I’m not sure what to do,” Mark replied. “I know what you mean. I can’t see myself being a small part of a large corporation. I’ve been doing some work for Professor Jack Wilson that has made me wonder whether there might be something in our project that could be turned into a business,” explained Usluel. Thus began the prospecting. The Players Mark Bernstein Bernstein earned a BA in Economics from Union College. Articulate and hard driving, he had worked in sales and sales management for several computer related companies for over nine years before enrolling in Rensselaer’s MBA program...
Words: 8404 - Pages: 34
...general information under “Notices” on page 261. Fifth Edition (September 2009) © Copyright Lenovo 2008, 2009. LENOVO products, data, computer software, and services have been developed exclusively at private expense and are sold to governmental entities as commercial items as defined by 48 C.F.R. 2.101 with limited and restricted rights to use, reproduction and disclosure. LIMITED AND RESTRICTED RIGHTS NOTICE: If products, data, computer software, or services are delivered pursuant a General Services Administration ″GSA″ contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS-35F-05925. © Lenovo 2008, 2009 Contents About this manual . . . . . . . . . . v Safety information . . . . . . . . . . 1 General safety . . . . . . . . . . . . . . 2 Electrical safety . . . . . . . . . . . . . 3 Safety inspection guide . . . . . . . . . . . 5 Handling devices that are sensitive to electrostatic discharge . . . . . . . . . . . . . . . 6 Grounding requirements . . . . . . . . . . 6 Safety notices (multilingual translations) . . . . . 7 Laser compliance statement (multilingual translations) . . . . . . . . . . . . . . 28 Symptom-to-FRU index . Numeric error codes . Error messages . . . Beep symptoms . . . No-beep symptoms . . LCD-related symptoms Intermittent problems . Undetermined problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 62 66 67...
Words: 57559 - Pages: 231
...Securing Cisco Routers (SECR) Glossary A AAA ABEND Access Access attacks Authentication, Authorization, Accounting. Allows all facets of user security to be defined on a central server. Abnormal END. Abnormal termination of software. 1.) In dealing with network security it is an all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. An all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not intended to be accessible to the intruder. Limiting the flow of information from the resources of a system to only the authorized persons or systems in the network. See ACE. access control Access Control Entry access control list See ACL. access device access layer Access Method Hardware component used in your signaling controller system: access server or mux. The point at which local end users are allowed into the network. 1.) Generally, the way in which network devices access the network medium. 2.) Software within an SNA processor that controls the flow of information through a network. Defines access rights and privileges for the network users. The access policy should provide guidelines for connecting external networks, connecting devices to a network, and adding new software to systems. The remote computer system which connects a personal computer to the Internet. Access Virtual...
Words: 23221 - Pages: 93