...Nt1310 9/17/2014 Unit 1 Assignment 1 Cell phones – Cell phones use data networks to communicate over radio frequencies. The frequencies that they use are also shared with television, Bluetooth, and Wi-Fi. Landline phones – Landline phones use voice networks only because they do not need as much speed as anything else. Normal house phones use approximately 10 MB/s which is all that voice networks handle. SMS/Text messaging – Text messaging uses data networks because they can also be sending media like pictures and video. The other reason that I believe that text messaging uses data networking is because it is faster. Fax machines – Fax machines use voice because they only transmit exactly what is on the paper. It is not being transformed into little packets and sent over the internet to another place; it is just sent from one place to another through the phone line. Pagers – Pagers use the same as cell phones and that is data networks because it is wireless, and does not have to be plugged into anything. Pagers are not that common due to the cell phone industry growing swiftly. VOIP – VOIP as it says in the name of it uses a data network. It uses IP for talking so that the communication is more secure and not many people can tap in as easily as people can over regular phones. Skype/Facetime – Skype and facetime both use data networks to communicate because you are sharing video with somebody else. You are also receiving video, and video cannot be shared over a voice...
Words: 263 - Pages: 2
...Answer questions 1 through 7 and 12 through 18, 22 – 25, 27 and 29 1. Compare and contrast phases, steps, techniques, and deliverables. Phases (planning, analysis, design, and implementation) are composed of steps, which rely upon techniques, which produce deliverables. 2. Describe the major phases in the SDLC. planning- fundamental process of understanding why an information system should be built and determining how the project team will go about building it analysis- answers the questions of who will use the system, what it will do, and where and when it will be used design- decides how the system will operate, in terms of the hardware, software, and network infrastructure implementation- the system is actually built 3. Describe the principal steps in the...
Words: 933 - Pages: 4
...Current facilities ICT has to offer in Medicine 2.0 Monitoring Patients 2.0.1 In the case of when a patient is hospitalized, they often need careful care and monitoring closely. Which is something, not possible for both nurses and doctors to do as keeping a check on the patients 24/7 continuously is very time consuming and both doctors and nurses have other patients and work to attend to. So, as an alternative computerized monitors are used, where patients are connected to a sensor which receives and sends information about the condition & status of the patient to the computerized monitor. Some of the things which the sensors monitor are Pulse rate (Heart beats per minute), Temperature, Breathing rate (Breaths per minute), Blood oxygen levels and blood pressure. In the case where there is a medical emergency, the computer sends warnings to the hospital experts or the ones which are in reach at the moment by either Loud Buzzer/Alarming sound. This is an effective and efficient way of informing as it terminates nurses and doctors extra work of keeping check of patient’s condition for prolonged hours. Patients data can be produced by a small printer attached to the computer if needed for use in the future or if the patient wants it. Diagnosing Illness 2.0.2 Body scans 2.0.2.1 Surgery sounds scary and tempting to most of us but sometimes doctors need to take a look inside a patient’s body in order to continue or do some tests. With the introduction of ITC, there is no longer...
Words: 807 - Pages: 4
...TASK 1 1 (ASSESSMENT CRITERIA 1.1) For a 12V battery there are 6 cells with 2V each. In series connection for a battery, its individual cells are connected with each other in such a way that the positive terminal is of a cell is connected with the next cell’s negative terminal or vice versa. To measure the Voltage across the battery provided, using a multimeter, I checked the voltage of each of the cells. Cell 1: 2.1V Cell 2: 2.1V Cell 3: 0.6V Cell 4: 1V Cell 5: 2.1V Cell 6: 2.1V Therefore, adding them 4(2.1) +0.6+1=10V In Parallel connection for a battery, the positive terminals of the cells in a battery are connected together while the negative terminal of the cells are grouped together to give a mutual positive and negative terminal respectively. The battery voltage is same as the cells voltage here in parallel connection but the current is divided. So, for a 60Ah, the battery is set to provide 1 A of current for 60 hours of time after which it is discharged completely. Depending on the system the battery can also provide 2A of current for 30 hours or...
Words: 1726 - Pages: 7
...1. Email Systems: Spam: Spam is an unwanted commercial email, because a large amount of spam is sent in order to try and persuade the user to buy something. Spam delivers viruses and other nasty software that harm the computer system. 1a. Protection: To avoid unwanted emails, a spam filter is the best solution it detects unwanted emails and stops the spam from going into the user’s inbox. Never reply to spam and delete spam without opening it. 2. Wireless Systems: MAC association: A Media Access Control address is a physical address associated with the Network adapter that is used to facilitate communications. On the second OSI layer which is the Data link layer, it is important that the Network Adapter communicates with another Network adapter, they communicate with each other by swapping MAC addresses. A MAC address is a 48 bit binary number which is a sequence of 12 hexadecimal digits eg. "a2:34:4b:66:4c:01"...
Words: 535 - Pages: 3
...1. Executive Summary Currently mobile communications are everywhere and as fast as ever and in this world speed is everything. Currently 4G networks are reaching their network capacity with the availability of massive amounts of data from sources such as mobile on-demand video, live streaming data, device to device communication applications and may more data intensive applications. Fifth Generation (5G) networks are slated to be implemented in 2020, but development has already started on the mobile devices, infrastructure, technology standards and many of the advanced features the system will offer. This new technology must be able to fully support IPv6 be backwards compatible, be able to simultaneously connect to multiple dissimilar wireless...
Words: 905 - Pages: 4
...UNIT 1 PRACTICE Follow-up Questions for Congressional Hearing • What is the purpose of government according to the natural rights philosophers? • Where does government get its right to govern, according to the natural rights philosophers? • What is a social compact? Do you think this is the best way to create a government? Why or why not? • What beliefs about rights were important to the American colonists? • What rights do you think people should have? • What is republican government? • Why did Montesquieu believe that the powers of republican government should be separated among different branches or groups in the government? • What was the purpose of balancing the powers among different groups in the government? • Why should each group...
Words: 977 - Pages: 4
...Learning Journal Unit 3 University of the People CS 4404-01 Advanced Networking and Data Security Dr. Sherry Richardson Friday, 12 July 2024 Learning Journal Unit 3 In network engineering, Quality of Service (QoS) plays a crucial role in managing and enhancing the performance of enterprise networks. XYZ Company aims to improve its network quality and is considering the implementation of QoS techniques like traffic shaping and traffic policing (Fulber-Garcia, 2022). In this post, I will explore the pros and cons of both techniques to offer a thorough understanding of making an informed decision. Traffic Shaping Pros: 1. Improved Bandwidth Utilization: Traffic shaping regulates the flow of data packets to ensure optimal use of available...
Words: 745 - Pages: 3
...Unit Five Jerrie Gomez Kaplan University Carrier Sense Multiple Access Both protocols listen for transmission, and Difference Between.com. (2011) explains that CSMA/CA is proactive, and CSMA/CD is reactive. Carrier sense multiple access/collision detection (CSMA/CD) is a protocol that deals with collisions after they occur; once a collision is identified, data transmission is stopped, and then retransmitted once listening to the network proves there is not transmitting data. Carrier sense multiple access/collision avoidance (CSMA/CA) works to detect and prevent collisions before they occur; by listening to the network for any traffic. CSMA/CD is an IEEE 802.3 standardization and CSMA/CA is IEEE 802.11, therefore CSMA/CA is better suited for wireless networks. Collision detection (CD) is easily detected on wired networks, which is why collision avoidance (CA) should be used on wireless networks, as wireless access points cannot accurately detect collisions. Price versus Performance Fast ethernet, introduced in 1995, is capable of carrying data at speeds of 100...
Words: 972 - Pages: 4
...NT1310 Physical Networking Unit 6 Exercise 1 Thomas Westbrook Due Date: Unit 6 Exercise 1: Connector Installation Twisted -Pair Cable * Measure the cable you want to put ends on, using a cable cutter trim off the excess * Use a cable stripper to strip about 1 ½ inches of the jacket from the end, then rotate the stripper around the cable twice to cut through the jacket * Remove the stripper and pull the trimmed jacket from the cable, so that you can see the inner conductors. Separate any visible jacket slitting cords that are present, trim it backto the edge of the jacket. * Untwist all the inner conductor pairs and spread them apart so that you can see each individual conductor * Line up the individual conductors so that the color matches the color-coding standard you are using * Trim the conductors so that the ends are even with each other, make sure that the jacketof the cable will be inside the connector. The total length of the exposed connectors after trimming should be no longer then ½ inch to 0.625 inches * Insert the conductors into the connector, make sure that all conductors line up properly with the pins as they were in the previous step. If they don’t line up, try again. Make sure to do this step carefully, it’s the last one before crimping * Carefully insert the connector and cable into the crimping tool. It has two dies that will press into the connector. Push the pins in the connector into the conductorsinside the connector...
Words: 421 - Pages: 2
...| Unit 3. Exercise 1. | | Specifications - Definitions | | Unit 3. Exercise 1. | | Specifications - Definitions | NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi 1. Application (in terms of cabling infrastructure): The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exists.. (OSI_model#Layer_7:_application_layer) 2. Unshielded twisted-pair: UTP cable is a popular cable used in computer networking that consists of two shielded wires twisted around each other. In the image to the right, is an example of the different network cables you're likely to encounter. (/jargon/u/utpcable.htm) 3. Shielded Twisted-pair: Twisted Pair (STP) has a fine wire mesh surrounding the wires to protect the transmission; Unshielded Twisted Pair (UTP) does not. Shielded cable is used in older telephone networks, network, and data communications to reduce outside interference. In the picture to the right, is an example of what these cables look like inside. (jargon/t/twispair.htm) 4. Fiber-Optic cable: A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing. These...
Words: 1317 - Pages: 6
... This paper concentrates on the book Strength Finder 2.0 and within this book they provide you with an assessment test that targets you’re top five strengths. The book gives a description of each strength, and provides a scenario to clarify its meaning. The importance of this assessment will help you distinguish your top strengths and what you can do to apply in the work place. I will share with you my top five strengths, its description, my thoughts, and how I can use those strengths to better my future as a leader. My first strength is achiever, which did not surprise me because I am hard working, and when I set my eyes on a goal I try my hardest until that goal is reached. The achiever theme explains my drive, I have a constant need for achievement. By the end of the day I must always achieve something in order to feel good about myself, and when I do not achieve anything I feel dissatisfied with myself. This strength strongly describes who I am, and no matter what I am doing I feel that this strength applies to any activity that I am doing. I feel that my previous job is a perfect example of my achiever theme. I was a dishwasher/line cook at a restaurant called Sunset Grille and I started working there when I was 21. I started out as dishwasher only making minimum wage, which felt degrading to me, but a job is a job I told myself, and at least I was making money. I did, however strived to make more money; I asked my boss how I could do that...
Words: 1922 - Pages: 8
... God created man in his own image, and since limits do not bound God, the athletic limit of of humans remains undetermined. In Lab 2, the progression of the men’s 100 meter freestyle world record engages people to ponder the possibility to human performance and how fast a man can swim the event. Since the early 1900’s, the world record has steadily decreased and the mathematical model provided in the lab accurately represents some of the historical time period, but the model appears to limit human performance to 44 in the race. Predicting the times around 1980-2010 very closely, the model then slopes to a near horizontal line above y = 44. Although the future of the potential time remains in question, other historical evidence persuades me to believe man will swim faster than the model limits. For each question, my personal experience, mathematical knowledge, and educated guesses led me to a result denying the limit of 44 seconds. My own personal career as a swimmer has taught me the necessary technique and physical condition required to swim fast, and the factors determining the speed of a swimmer lead me to suggest a limit faster than 44 seconds exist. For questions 2-5 historical data and performance provided analysis and tables for the model in the graphing window. By graphing the equation, a table on the calculator provided the estimation for the world record each year, and the estimation proved accurate for quite a few periods. Although accurate for some time, the graph...
Words: 503 - Pages: 3
...that there wasn’t a set install that came provided, instead you click the specific .exe file to use that particular tool. After trial and error we decided that it would be easiest to use the rcrack_gui.exe in order to crack the password for this assignment. The next thing we did was copy the hash into a text file and then renamed the extension to .pwdump so that it could be accessed by our program. Next we noticed that we had no rainbow tables, so we followed the instructions on: http://null-byte.wonderhowto.com/how-to/rainbow-tables-create-use-them-crack-passwords-0131470/ By using Terminal/CMD we were able to invoke the provided rtgen.exe file by navigating to the folder containing it and using the command: rtgen md5 loweralpha-numeric 1 7 0 3800 33554432 0, this command essentially created a small rainbow table with lowercase alphanumeric values in it. The process of creating the rainbow table took about 30 minutes even though it was a smaller size file. From after this we needed to sort the rainbow table in order to use it with Rainbowcrack. Once we sorted the rainbow table we were able to try using Rainbowcrack in order to crack the passwords. We loaded the hash that we were provided by using the load LM and NTLM hash from PWDUMP file. We decided to load the same file twice (once for LM and NTLM respectively), since we were not completely sure which has was used (NTLM being Microsoft's successor to LM). After loading the file we then chose the search rainbow table option...
Words: 1415 - Pages: 6
...to the 10.20.111.0/24) - all incoming connection requests should be rejected with the following exceptions. iptables –A INPUT –s 10.10.111.0/24 –d 10.20.111.0/24 –j REJECT -m state --state NEW,ESTABLISHED,RELATED. iptables –A FORWARD –s 10.10.111.0/24 –d 10.20.111.0/24 –j REJECT -m state --state NEW,ESTABLISHED,RELATED. 1)The internal machine should respond to a ping from 10.10.111.0/24 We use following iptables commands:- iptables –I FORWARD 1 –s 10.10.111.0/24 –d 10.20.111.2 –j ACCEPT –p icmp --icmp-type echo-request –m state --state NEW,ESTABLISHED,RELATED =>The following outputs shows the implementation of rules on the int-rtr and the rule is listed using iptables –L =>We verify the rule by pinging the IP address 10.20.111.2 from the backtrack machine =>Thus we can ensure that the iptables rule is correct, as indicated by the above output. 2) The internal machine (10.20.111.2) should accept all incoming SSH and http requests from 10.10.111.0/24 We use following iptables commands:- iptables –I FORWARD 1 –s 10.20.111.0/24 –d 10.10.111.2 –j ACCEPT –p tcp –m state –state NEW ,ESTABLISHED,RELATED --dport ssh iptables –I FORWARD 1 –s 10.20.111.0/24 –d 10.10.111.2 –j ACCEPT –p tcp –m state –state NEW ,ESTABLISHED,RELATED --dport http =>The rule is listed as follows: =>Thus as the rule mentions the internal machine receives SSH and http requests from 10.10.111.0/24 =>The following screenshot determines that http request was received to the internal machine...
Words: 1021 - Pages: 5