...Lab 2 Exercise 2.1.1 If one of the five (Media, Interface, Signal, Pattern, and Timing) is missing you will not get a connection. You will not be able to share information. If Media is missing there is no way to transmit the signal. If the Interface is missing there is no way for the computer to access the media to get the connection. If the signal is missing you cannot transmit to get the connection. If the pattern is missing the device cannot communicate with any other device on the network. If the timing is missing the device’s communication would crash into other devices’ communication causing a roadblock in the system. Exercise 2.1.2 The Network interface card (NIC) allows this kind of integration. Exercise 2.1 review Network devices are routers, gateways, hubs, and switches. Peripheral devices are printers, mice, monitor, and scanners. You would limit incoming connections to keep spam out and viruses or malware out. Peer to peer network is good for small groups and businesses. They can share resources and data between nodes. They scale better and are more resilient because they do not rely exclusive on servers. Exercise 2.2.1 The startup cost for individual computers is $3600 versus a high-capacity printer for $500. The drawback to having only one printer for 30 users is backup (traffic jam) of pages to print as well as wearing it out causing repair costs. Setting priorities on what printed first. The cost for three printers –two backup...
Words: 1074 - Pages: 5
...The 802.11B was an amendment to the original 802.11 standard released in because the original did not have fast enough speeds to be sufficient to support the needs that the technology required. 802.11B added speeds of 5.5 and 11 Mbps. The 802.11B standard also supports wireless devices that are up to 115 meters or 375 feet apart. If the distance is exceeded or as it grows farther apart the standard states that the signal lower its transfer speed instead of completely dropping its signal if it falls out of range. The 802.11A standard specifies a maximum of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions. The standard has devices that are generally no more than 100 ft. apart. The 802.11G standard was developed as a “best of both worlds”, type of standard in an attempt to keep the highly stable standard features of the 802.11b standard but include the higher transfer rates of the 802.11A standard. This standard operates on the ISM band and not the U-NII band so it can reach farther with its signal but the band is highly crowded. The 802.11N standard was being established doffing the writhing of the text book and was projected to be able to transfer 100 Mbps to 500 Mbps depending on which proposal was approved. I found that available technology on wireless N technology is capable of 270 Mbps on a particular website putting it to the test. I feel that standards are beneficial to wireless networking and do not limit new technology. They allow for...
Words: 305 - Pages: 2
...Introductory Network Concepts, Network Standards, and the OSI Model 1. There are many reasons for a company to network its computers, some are as follows; Share software, information with others on networks, cheaper than buying individual software and hardware for each standalone especially if the software often offers deals for amount being purchased, e-mail between network users, and flexible access from any computer on the network. 2. Two fundamental network models are peer-to-peer(P2P) or Client/Server. In a P2P network, every computer can communicate directly with every other computer, and no computer on this network has more authority than another. On a client/server network every computer acts as a client or a server. 3. There are 3 types of networks depending on how much territory they cover, they are LANs, MANs, and WAN networks. LAN networks cover a small area like one building or one office. MANs cover multiple buildings like a handful of government offices surrounding a state capital. A WAN network is one that connects two or more geographically distinct LANs and MANs. 4. A server is a computer on the network that manages shared resources. 5. A client is a computer on the network that requests resources or services from another computer on a network. 6. A NIC or Network Interface Card is the device that enables a workstation to connect to the network and communicate with other computers. 7. A NOS or Network Operating System is the...
Words: 845 - Pages: 4
...Network Standards and Protocols June 29, 2013 Homework: Respond to multiple choice questions 1. A 2. B 3. D 4. C 5. C 6. D 7. B 8. C 9. D 10. D 11. C 12. D 13. B 14. C 15. A 16. D 17. D 18. D 19. A 20. B Define Key table 1.Computer Network is any combinations of many components that work together so that many different devices can communicate. 2. Computer Networking is the gerund form of the term computer network. 3. Application is a function of any kind of computer or electronic device. 4. Email is electronic mail in which user can type text or attach files. 5. Voice call is a modern term for telephone call. 6. Video frame is a grid of pixel location a chosen width by height that contains the lights/ color to be shown in a video. 7. Web server is software that stores web pages and web objects, listens for request for those pages and send the content of the pages/objects to clients. 8. web browser is software controlled directly by a user that request web pages from a web server and after receiving a page display the web in a window. 9. web address is the text that indentifies details about one object in a network so that a client can request that object from a server. 10. Protocol is a set of rules that different devices or software must follow so that the network works correctly. 11. HTTP is the protocol by web browsers and web servers to define the format of URLs and the messages...
Words: 390 - Pages: 2
...802.11 standard in 1997; this was to be known as the first WLAN standard, also known as 802.11 Prime. Throughout the years these standards have been ratified and amended. The first revision was in 1999 with 802.11b, later in 1999 802.11a was amended; in 2003 802.11g was amended and 802.11n was amended in 2009. Of these four standards there are some similarities and differences. The differences between these standards are as follows: * 802.11b – 2.4 GHz ISM, uses HR-DSSS (High Rate Direct Sequence Spread Spectrum), Data rates using DSSS are 1 and 2 Mbps, HR-DSSS uses 5.5 and 11 Mbps. Backward compatible to 802.11 Legacy (Prime) DSSS only. * 802.11a – 5 GHz - UNII, uses Orthogonal Frequency Division Multiplexing (OFDM) allowing for 5 GHz RF frequency’s operating in three different frequency bands called the Unlicensed National Information Infrastructure (UNII). These frequency ranges are: * UNII – 1: 5.150 – 5.250 * UNII – 2: 5.250 – 5.350 * UNII – 3: 5.725 – 5.825 Data rates under this standard were mandatory at 6, 12, and 24 Mbps with optional support for 9, 18, 36, 48, and 54 Mbps. This standard is not backwards compatible. * 802.11g – 2.4 GHz ISM, this standard utilized Extended Rate Physical (ERP) to enhance the physical layer, by using ERP-OFDM & ERP-DSSS/CCK (Complementary Code Keying) Data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps are made available. (ERP-OFDM: 6, 12, 24 Mbps) (ERP-DSSS/CCK: 1, 2, 5.5, 11). This standard is backward...
Words: 484 - Pages: 2
...Tech Partners Consulting www.techpartners.net.au SOEs – Standard Operating Environments The SOE concept explained in business terms Authored by Alan Pickering, Tech Partners Consulting September, 2003 Introduction The use of Information and Communications Technology (ICT) in organisations has gone well past the stage of being unique, novel and even technically difficult. Nowadays, the technology is readily available, thanks to the volume demand from commercial and residential market segments. Even so, there are benefits from adopting a Standards based approach to choosing and deploying ICT assets; and offering technology based IT services to customers. This white paper will provide a brief introduction to the philosophy of Standard Operating Environments, and will explain the likely benefits, costs and planning factors that relate to adopting an SOE approach. Background When desktop computing and Local Area Networks appeared in organisations in the 1980’s, they were small scale and of little immediate consequence. Being somewhat complex, and requiring some hands on technical skills, they were acquired in small quantities. The low cash costs meant they were often purchased ‘under the radar’ of senior management and IT teams. The practical use and popularity of PCs and LANs grew, to the point that some organisations recognized the need to account for the cost of assets and people’s time spent on support. Since then, industry analysts have studied the...
Words: 2707 - Pages: 11
...actual testing procedure. This would include defining and setting the standards and the guidelines. Next, the team needs to decide on the proper hardware and software would be best suited for the project. With this in mind, the next logical step would be to work on the network required to support the testing environment. Some of the elements that make up the environment are the requirements for testing the design. This would include a test schedule, identifying the performance requirements, and developing a method to control test, so that there is a base or standard to compare it with. The test plan should also cover the required activities involved in the testing. The group needs to delegate the team’s roles and responsibilities. They will need to develop the testing schedule by preparing the test environment and identifying any risks. Next, is the actual set up. The test environment setup is a very important part of test phase. It represents the need focus on preventative measures to avoid pitfalls. The primary attention should be in the planning activities such as: * Track activities * Setup activities * Installing the hardware * Installing software The test team should consider the number of tests to be performed, the manner in which testing will be approached, and the test conditions that need to be applied. Most important of all, the test design standards and guidelines need to be defined and followed. This will ensure that...
Words: 283 - Pages: 2
...What is the International Strategy? The Strategy for Disaster Reduction The International Strategy for Disaster Reduction reflects a major shift from the traditional emphasis on disaster response to disaster reduction, and in effect seeks to promote a "culture of prevention". UNISDR is the secretariat of the International Strategy and mandated by the UN General Assembly to ensure its implementation. The International Strategy for Disaster Reduction builds upon the experience of the International Decade for Natural Disaster Reduction (1990-1999), which was launched by the General Assembly in 1989. The International Strategy embodies the principles articulated in a number of major documents adopted during the Decade, including, in particular, the Yokohama Strategy for a Safer World: Guidelines for Natural Disaster Prevention, Preparedness and Mitigation and its Plan of Action, and the text below entitled "A Safer World in the 21st Century: Disaster and Risk Reduction". Both of these were endorsed at the Programme Forum on the International Decade held in Geneva from 5 to 9 July 1999, which also adopted the Geneva Mandate on Disaster Reduction. Learn more about the UN Resolutions and Reports on DRR A Safer World in the 21st Century: Disaster and Risk Reduction Introduction While hazards are inevitable, and the elimination of all risk is impossible, there are many technical measures, traditional practices, and public experience that can reduce the extent or severity of...
Words: 2205 - Pages: 9
...Unit1/Assignment 2 03/25/13 Impact of a Data Classification Standard “Internal Use Only” This is my brief report on the IT infrastructure domain. I will be describing the “internal use only “data classification standards set by Richman Investments. The user domain is the first layer of the IT infrastructure I will discuss that is affected by the “internal use only” standard. It is the first layer and what some believe to be the weakest in the infrastructure. The user domain is where personal information is created and obtained for internal use only. Each person will have set permissions on what they can and cannot do. This way no one person can mess up or delete anything that doesn’t need to be (Jones and Bartlett Learning). The work station domain is the second layer of the infrastructure that I will discuss. This is also affected by the “internal use only” standard. This layer is where the user can access the network and any applications or information on the system. This requires a user to login with a password or authentication of some kind. This has to be done before this person can get to this information. This will help keep people out that aren’t supposed to be accessing the information (Jones and Bartlett Learning). The LAN to WAN domain is the third layer of the infrastructure I will discuss. I feel this is also affected by the “internal use only” standard. The TCP and UDP are not safe due the fact these are...
Words: 340 - Pages: 2
...are nurses themselves and work in their various fields. So when something comes up that needs addressed, they meet as a committee and discuss the issue. Then they decide what would be the best action to take for solving the problem. By doing this they are able to come up with the standards we now have. They realize that there must be a code of ethics and code of conduct set forth and these are the rules that we as nurses must follow. No one is allowed to change any part of it. So far there is a wide variety of standards that have been put into place. It is good for to know these rules and they will guide us in daily nursing duties. By implementing the higher standard of care, we are all able to work more proficiently and professionally. In order to develop a new standard, there usually has to be a problem that has come to the attention of one or more of the committee members, or from someone else that has brought forth a concern or complaint. The members then meet in order to come up with a solution to help with the problem. Such an example would be when too many nurses were getting stuck with needles and contracting diseases from them. From that basis came the implementation of the safety standards we now have to help prevent needle sticks, including not recapping needles, and using the safety features provided with each...
Words: 254 - Pages: 2
... |23 12월 2011 | | |11 Music | |Endorsed with merit at level 1 |24 12월 2011 | |2012 | |Entries and Results | |Show explanation of the entry details | |Hide explanation of the entry details | |Each standard can have a range of results including "N" for not achieved, "A" for...
Words: 354 - Pages: 2
...PLC 2005 - 2009 Newcastle upon Tyne Trainee Manager At McDonalds I was responsible for up to 19 members of staff, as well as the day to day running of the restaurant as a key member of the managing team. I assisted in many areas of the restaurant including cash handling, waste management and hospitality e.g. handling customer complaints. I also developed my IT skills here in an industry standard software suite. Frontline Recruitment 2008 Derby Various Bakery positions Duties included operating kitchen equipment to produce products to sell in the bakery stores. Working as part of a large team to fill orders and work to deadlines and targets, as well as adhering to health and safety regulations and striving to meet customer satisfaction. Good customer service and communication skills were essential to the job role, along with the ability to work quickly and efficiently to high standards...
Words: 508 - Pages: 3
...COPIER CONFUSION CASE STUDY Abstract The Business Company, Inc., badly needed new copying machines. The company had 20 machines, but they were old and copy quality was poor. They broke down frequently. And to change paper size from 8.5 x 11 in. to legal-size, the user had to remove one paper tray containing 8.5 x 11 in. paper and replace it with a tray containing legal-size paper. Newer machines had two trays, one for each paper size, that permitted changing paper size at the push of a button without changing paper trays. The company’s purchasing agent, thought this would be a labor-saving feature and decided to include it in a specification for purchase of new machines. The copying machine industry called this feature, “dual-cassette” design. John Richards, the company’s purchasing agent, thought this would be a labor-saving feature and decided to include it in a specification for purchase of new machines. The copying machine industry called this feature, “dual-cassette” design. The Business Company issued an invitation for bids for purchase and maintenance of 20 replacement machines. The solicitation included a specification that called for a machine that would permit “copying both 8.5 x 11 in. and legal-size paper without manually changing the paper trays.” The term dual cassette did not appear in the specification. John received bids from several companies, including Copies Incorporated, a reputable manufacturer...
Words: 368 - Pages: 2
...PROC5000/Anthony Vatterott/SPARTAN HEAT EXCHANGERS, INC/Dalton 1 SPARTAN HEAT EXCHANGERS, INC. Rick Coyne is the Materials Manager at Spartan, Inc. Until recently, the company has benefitted from excellence in customization and specialized research & development of design with full-service custom unit fabrication. This has historically allowed Spartan to maintain a positive rapport with clients, as their approach allowed for meeting the client’s specific needs. However, the industry trend has changed and competition from international sources has pressured Spartan’s Executive Management to revise the fiveyear development plan to compete with Korean and European firms. The standard for the industry has shifted from customized solutions to a low-price, highly-standardized market. This is not in line with Spartan’s current initiatives and Max Brisco, vice president of manufacturing, has solicited Rick to provide a detailed plan on how to achieve savings and efficiency in a transition to a more competitive manufacturing structure. The most critical step in this reformation is to redesign workflow and job order processing from a job order/job ticket method to a more streamlined and standardized process. This will require re-engineering the workflow of the manufacturing workforce, and offers an opportunity for the research & design component to redirect their efforts away from customized products and toward a working internal manufacturing process. The use...
Words: 532 - Pages: 3
...Question 1 (20%) In your own words, briefly describe your understanding of application of the lifecycle concept to validation. Process validation is a vital aspect not just for regulatory purposes, but also for the efficient and reliable long-term application of the process. In order to address the performance of the process adequately, process validation is used to identify the relevant parameters, to design the experimental validation studies accordingly and to define appropriate acceptance criteria through process development. Applying the lifecycle concept to validation, measures should be taken to routinely maintain and control the validated status of the process during initial development, its long-term application and until the process’s discontinuation. These measures include the monitoring of relevant performance parameters through good documentation. Question 2 (20%) What activities generally support the validation of a process / product? Activities that generally support the validation of a process / product include equipment calibration to ensure that the measured variable is accurately monitored; equipment qualification which includes installation qualification (IQ) an audit of the installation against the equipment specifications and drawings and operational qualification (OQ) which confirms that the equipment performs as intended; process development to provide documented evidence of the suitability of all critical process parameters...
Words: 528 - Pages: 3