...B. Methodology - B1. Participants or Stakeholders: Because this is an applied research project with a focus on the evaluation of curricular practices, I am the main and active participant. There are an additional three other stakeholders in my proposed capstone research, which includes administrators, students, and the community where I teach. This is because my research will affect these individuals when I get to the application portion of my capstone research. Likewise, two characteristics of my stakeholders relevant to my problem statement include being both supportive and hesitant. First, my stakeholders are supportive. I have felt very supported as the art educator in my school district by administration, students, and the community. This is relevant to the problem statement in Part A because I know I have the support to create curriculum in my classroom. I know that if I asked for resources or help with my curriculum, that it would be provided. Second, my stakeholders are also hesitant. I believe that they would be hesitant specifically to make a change in my curriculum. This goes back to my problem statement because I am responsible for the curriculum I create. This means that if I decide to change the curriculum currently in place at my school, I believe there will be hesitancy with administration, students, and the community. While these stakeholders support me, change can be scary for some individuals. I believe there is an expectation from these individuals to continue...
Words: 1052 - Pages: 5
... Because the cluster head will perform the additional task of data aggregation it will dissipate more energy and if it will remain the Cluster head permanently then it will die quickly. LEACH will face this problem by randomly rotating cluster head to save the battery of individual node. Each node uses a particular algorithm at each round to decide whether to become a cluster head or not. In order to become a cluster head, that node should have higher energy level than others. Thus the ultimate goal of LEACH protocol is to increase the lifetime of whole system by selecting cluster head among more powerful sensor network. The process of implementation of LEACH includes many rounds. Each round contains two phase a) cluster set-up phase b) steady phase a) CLUSTER SET-UP PHASE: in this phase organization of cluster take place. It will work in three steps. • Advertisement phase: each node will decide based on the formula whether to become a cluster head or not for the current round. After this each elected CH node will send a broadcast message advertizing all nodes. After this member nodes will decide to which it will belong depending upon the signal strength and distance for the current round. • Joining phase: Once the cluster head has been selected , all the nodes join the corresponding cluster by sending a message to CH informing that it will be a member of that cluster • Schedule creation: CH will receive all the messages from the nodes that would like to be in its cluster. Once...
Words: 527 - Pages: 3
...Problem Statement For this problem we are trying to find how many rebounds and corners it will take the ball to go into a pocket. We are also trying to find out what pocket the ball will land in,and if there are any patterns that meet that criteria. The rules include that you have to start at the lower left corner , and at a 45 degree angle. Also you have to start with whole number dimensions(4 by4 , 2 by 3), and there is only 4 pockets on the pool table. Process We had each member of our group draw out the pool table and try different whole number dimensions . Afterwards , we looked at each of our examples and charts and compared them to make a bigger chart with all the dimensions of 1-4 . We did this just to figure out if there were any common patterns within the the pictures and tables. Making a super pool table and coming up with our own patterns within the dimensions and rebounds was something we also did, by doing this we got to see if one of our patterns can match a bigger size dimension pool table along with the other dimensions. In conclusion we made a mini poster explaining our thoughts about this problem, within this project we got to go around to see what our classmates also had in mind. Solution...
Words: 436 - Pages: 2
...January 6, 2015 January 6, 2015 Todd Eppes NT1310 Todd Eppes NT1310 Service Provider types Unit 2 Assignment 1 Service Provider types Unit 2 Assignment 1 Todd Eppes January 1, 2015 NT1310 Unit 2 Assignment 1 Service Provider Types RBOCS stands for Regional Bell operating company. It was one of the United States regional telephone companies that were created as a result of the breakup of AT&T. They are allowed to compete for long distance telephone traffic under certain circumstances. RBOCs are generally in competition for digital data and internet traffic with wireless service providers and cable TV companies. ILEC is short for incumbent local exchange carrier. IT is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. They are in contradistinction to CLEC. GTE was the second largest ILEC after “The Baby Bells” but has since been absorbed into Verizon. CLEC stands for competitive local exchange carrier. IT is a telecommunications provider company competing with other, already established carriers. CLECs have evolved from the competitive access providers that began to offer private line and special access services in competition with the ILECs beginning in 1985. MSO is short for multiple-system operator. This is an operator of multiple cable or direct-broadcast satellite television systems. Though in the strictest sense any cable company that serves multiple communities is an...
Words: 274 - Pages: 2
...routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...
Words: 1834 - Pages: 8
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10
...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...
Words: 10839 - Pages: 44
...NT1310-Physical Networking Unit 1 Assignment 1: Voice VS Data 1. A cell phone is a mobile phone which can make and receive calls over a radio link. It connects to a cellular network which allows it to connect to the public telephone network. It uses both voice and data networks. 2. A landline phone is a device that has a physical connection with a telecommunication network. One big advantage landlines hold over cell phones is clear reception. Landlines offer both voice and data usage via broadband. 3. SMS stands for short message services It is the text messaging service component of mobile communication systems, phones or the web. It is the most widely used data application. It is used on data networks. 4. A Fax is the telephonic transmission of printed text and images to a telephone number connected to a device. It uses both analog and digital signals. It operates over both voice and data networks, and is a big reason why there are still landlines. 5. A Pager, also known as a Beeper, is a wireless communication device that receives numeric or text messages. It can also receive and announce voice messages. There are one way pagers which can only receive messages, and two way pagers which can send messages. The Pager uses both voice and data networks. 6. VOIP, or voice over IP is technology which enables the delivery of voice communications and multimedia sessions. Over internet protocol networks, VOIP involves signaling, channel setup, digitization of analog voice signals...
Words: 324 - Pages: 2
...Adam Wolfe 10/20/2012 NT1310 – Unit 4. Assignment 1 – Copper vs. Fiber The copper phone wire has very limited bandwidth. It was designed to provide 3,000Hz bandwidth, perfectly adequate for a voice signal. Fiber links offer over 1,000 times more bandwidth capacity and can be carried over 100 times the distance than copper can. The chart pictured here shows the specific advantages Fiber has over copper wiring in regards to bandwidth and distance. When it comes to LANs or premises cabling, a lot of controversy, a lot of "positioning" and a lot of misinformation are talked about by most people who speak on the topic of copper vs. fiber cabling. The wire most use for LANs is a lot younger than fiber optics. Fiber use is over 20 years old, but computer networks on unshielded-twisted-pair cable (UTP) have only been around about 15 years. In that time, UTP has gone through at least 5 generations, each time to keep up with the incrementing bandwidth requisites of LANs; the ever evolving technology of LAN wire is hardly the “telephone wire” that the majority think of it as. Below is a chart showing the LANs growth in capacity LAN | Bandwidth | Ethernet | 10 Mb/s | FDDI | 100 Mb/s | Fast Ethernet | 100 Mb/s | ATM | 55, 155 Mb/s | Gigabit Ethernet | 1,000 Mb/s (1 gigabit/s) | 10 Gigabit Ethernet | 10 Gb/s | But still, even with all the efforts that copper cabling manufactures have made to stay relevant in todays LAN structuring, installation is a problem...
Words: 628 - Pages: 3
...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...
Words: 6762 - Pages: 28
...associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...
Words: 2573 - Pages: 11
...internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...
Words: 4400 - Pages: 18
...have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator If more domains exist in the forest, place the domain roles on a server in theese domains like Domain Controller #2 Global Catalog configuration. In Windows 2008 Active Directory all Domain Controllers are by default Global Catalog servers, personally...
Words: 10360 - Pages: 42
...internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...
Words: 4400 - Pages: 18