...Task 10: Network Protocols This network is small enough to have been connected using RIP, but instead we have used OSPF. There are a number of reasons for this which you are required to explore. • Compare the operations of RIP and OSPF for an IPv4 network • Identify the advantages and disadvantages of both protocols • Explain why OSPF is the preferred choice for this network. The word count is up to 1500 words, not including contents, referencing and appendices. What is RIP? RIP (Routing Information Protocol) is one of the oldest distance-vector routing protocols. It is designed for use on smaller networks and is supported on a wide variety of systems. RIP uses a single routing metric (i.e., a hop count) to measure the distance between source and destination routers. It is simple to program, but it has a number of disadvantages. The maximum routers which can be supported in rip is 15. That is why this protocol can be used efficiently in small networks only. For larger, more complicated networks, RIP's transmission of the entire routing table every 30 seconds may put a heavy amount of extra traffic in the network. How RIP works? What makes RIP work is a routing database that stores information on the fastest route from computer to computer, an update process that enables each router to tell other routers which route is the fastest from its point of view, and an update algorithm that enables each router to update its database with the fastest route communicated from neighboring...
Words: 919 - Pages: 4
... The idea is to convert the DC supply into a high frequency AC supply with the help of an oscillator, which we need in order to transfer wirelessly [7]. For the oscillator we used a simple Colpitts oscillator. The oscillator is a simple one to implement and being a current oscillator it is helpful for the system [1]. The AC power is then transferred wirelessly through inductive coupling. In inductive coupling power is transferred between coils of wire by a magnetic field. Fig. 2 shows the block diagram for the wireless power transfer through inductive coupling. The transmitter and receiver coils together form a transformer. An alternating current (AC) through the transmitter coil (L1) creates an oscillating magnetic field (B) by Ampere's law. The magnetic field passes through the receiving coil (L2), where it induces an alternating EMF (voltage) by Faraday's law of induction, which creates an AC current in the receiver. One important parameter for coupling is frequency, as the efficiency shows a proportional relationship with frequency for such systems [9]. Fig 2 Block diagram of WPT (Collected from [9]) Both of the coils act like a transformer using which the power is transferred. The power transferred increases with frequency and the mutual inductance, M between the coils, which depends on their geometry and the distance Drange between them. Another important parameter is the coupling coefficient k=M/√(L_1 L_2 )…………… (1) When, the distance between the...
Words: 592 - Pages: 3
...How to protect From unauthorised access. Firewalls Secure socket layers (SSL) Strong passwords Firewalls Firewalls are a set of related programs that are located at a network gateway server. Firewalls protect private networks from users from other networks getting access. Firewalls are important to have to stop people from accessing things they shouldn’t as for example if someone not involved in a business gets access to a business’s website they then could access that business customers private information which would make that business not be trusted by the public which would lose the business money. Secure socket layers- easier to remember as (SSL) is a protocol for transmitting private documents through the internet. SSL keeps users personal details such as full name, address, bank card details, etc. knowing that websites with ‘https’ with the ‘s’ after the ‘http’ indicates that the website is secure and can be trusted to not do anything it shouldn’t such as sharing out your personal details or taking more money that agreed on if it was a site where you were purchasing something. Other sites that cannot be trusted may ask for details and if you give them all your details that that’s giving them everything that they need to steal your money and even steal your identity. Strong password...
Words: 510 - Pages: 3
...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...
Words: 496 - Pages: 2
...Network Topology Paper Unit 3 Assignment 1 ITT TECHNICAL INSTITUTE NT1310 Physical Networking Peter Mahlan 20168804 04/08/2016 Table of Contents Scope or Introduction 3 Unit 3. Assignment 1. Network Topology 3 Section 1 3 Conclusion 5 Reference 5 Network Topology Scope or Introduction Unit 3. Assignment 1. Network Topology Course Objectives and Learning Outcomes In this assignment, you will describe the hierarchical star, bus, and ring network topologies. Assignment Requirements Chapter3 covered 3 main network topologies – hierarchical star, bus, and ring. Write a paragraph describing each topology. Discuss the reasons for using each, and any strengths/weaknesses each has. Submission Requirements Submit a 1-2 page Word document; double-spaced; Times New Roman 12 pt font. Cite all sources used. Section 1 In computer networking, topology refers to the layout of connected devices. Think of a topology as a network’s virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home network may be arranged in a circle in a family room, but it would highly unlikely to find a ring topology there. Hierarchical Star Hierarchical star is also known as an extended star topology. Hierarchical or extended star topology is a star network with an additional networking device connected to the main networking device. Typically, a network...
Words: 691 - Pages: 3
...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...
Words: 10839 - Pages: 44
...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...
Words: 6762 - Pages: 28
...Sole's Blog SOLVE YOUR IT PROBLEMS FASTER, SAVE YOUR FEET AND GET MORE TIME ON YOUTUBE! * HOME * * ABOUT SOLE VIKTOR * * USEFULL LINKS « How to publish a website with both Anonymous and Forms Based Authentication in ISA 2006 How to configure ISA 2006 with FBA for OWA and NTLM for Outlook Anywhere and Autodiscover in Exchange 2007 » How to place FSMO and Global Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master...
Words: 10360 - Pages: 42
...Christopher A. Lee Sr. NT1310 Week 3 Assignment.Network Topology Paper Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network.[1][2] Essentially, it is the topological[3] structure of a network, and may be depicted physically or logically. Physical topology refers to the placement of the network's various components, including device location and cable installation, while logical topology shows how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical. A good example is a local area network (LAN): Any given node in the LAN has one or more physical links to other devices in the network; graphically mapping these links results in a geometric shape that can be used to describe the physical topology of the network. Conversely, mapping the data flow between the components determines the logical topology of the network. Contents * 1 Topology * 1.1 Point-to-point * 1.2 Bus * 1.3 Star * 1.4 Ring * 1.5 Mesh * 1.6 Tree * 1.6.1 Advantages * 1.6.2 Disadvantages * 1.7 Hybrid * 1.8 Daisy chain * 2 Centralization * 3 Decentralization * 4 See also * 5 References * 6 External links Topology There are two basic categories of network topologies:[4] 1. Physical topologies ...
Words: 5057 - Pages: 21