Free Essay

Physical Networking Unit 7 Definitions

In:

Submitted By candaceb
Words 550
Pages 3
1. Crosstalk- is any phenomenon by which a signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel. 2. Waveguides- is a structure that guides waves, such as electromagnetic waves or sound waves. 3. FTTH- is a generic term for any broadband network architecture using optical fiber to provide all or part of the local loop used for last mile telecommunications. 4. Simplex- is a simplex that is also a regular polytope. 5. Half-Duplex- system provides communication in both directions, but only one direction at a time (not simultaneously). 6. Full- Duplex- system, or sometimes called double-duplex, allows communication in both directions, and, unlike half-duplex, allows this to happen simultaneously. 7. Photodiode- is a type of photo detector capable of converting light into either current or voltage, depending upon the mode of operation. 8. Amplitude Modulation- is a modulation technique used in electronic communication, most commonly for transmitting information via a radio carrier wave. 9. Analog Transmission- is a transmission method of conveying voice, data, image, signal or video information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that of a variable. 10. Digital Transmission- is the physical transfer of data (a digital bit stream) over a point-to-point or point-to-multipoint communication channel. 11. Sample Rate- defines the number of samples per unit of time (usually seconds) taken from a continuous signal to make a discrete signal. 12. Electromagnetic Wave- is a form of radiant energy, propagating through space via photon wave particles. 13. Refraction- is the change in direction of a wave due to a change in its transmission medium. 14. Medium- is the part of the medium frequency (MF) radio band used mainly for AM radio broadcasting. 15. Total Internal Reflection- is a phenomenon that happens when a propagating wave strikes a medium boundary at an angle larger than a particular critical angle with respect to the normal to the surface. 16. Fresnel Reflection- describes the behavior of light when moving between media of differing refractive indices. 17. Tensile Strength- measures the force required to pull something such as rope, wire, or a structural beam to the point where it breaks. 18. Dispersion- dispersion is the phenomenon in which the phase velocity of a wave depends on its frequency. 19. Bandwidth- is a measurement of bit-rate of available or consumed data communication resources expressed in bits per second or multiples of it. 20. Polarity- is defined as having two opposite tendencies or opposite electrical charges. 21. Absorption- of electromagnetic radiation is the way in which the energy of a photon is taken up by matter, typically the electrons of an atom. 22. Scattering- is a general physical process where some forms of radiation, such as light, sound, or moving particles. 23. Equilibrium Mode Distribution- of light travelling in an optical waveguide or fiber is the distribution of light that is no longer changing with fiber length or with input modal excitation. 24. Personal Protective Equipment- refers to protective clothing, helmets, goggles, or other garments or equipment designed to protect the wearer's body from injury. 25. Good Work Habits- Be the do-er, Responsibility, Proactive, Team player, Active learner, and Organized and driven.

Similar Documents

Premium Essay

Nothing

...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...

Words: 10839 - Pages: 44

Premium Essay

Week 5 Assignment

...Assignment (3% of Grade) APUS/Sanford Lesson 5 Review: Networking Models, Traffic and Devices The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. Describe the three modes of communication available on a network. (Minimum word count: 60) Whenever we connect devices there must be away for one device to communicate to another. The three basic modes of operation annoy network are Simplex, Half-Duplex, and Full-Duplex operation. in simplex operation, a network cable or communication channel can only send information in one direction. Half-duplex operations are capable of sending information in both directions between nodes, but only one direction can be utilized at a time. Full-duplex operation is a connection between two devices and is capable of sending information in both directions simultaneously. 2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20) The Open Systems Interconnect (OSI) model has seven layers. The application, presentation, session, transport, network, datalink, and physical layers. 3. Describe a protocol data unit (PDU). (Minimum word count: 30) A protocol data unit (PDU) is an open system interconnection term use in telecommunications that refers to a group of information added or removed by a layer of the OSI model. Each layer uses protocol data unit (PDU) to communicate and exchange information, which can only...

Words: 500 - Pages: 2

Premium Essay

Test

...BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10

Premium Essay

Unit 3 Exercise 1 Nt1310

...| Unit 3. Exercise 1. | | Specifications - Definitions | | Unit 3. Exercise 1. | | Specifications - Definitions | NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi 1. Application (in terms of cabling infrastructure): The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exists.. (OSI_model#Layer_7:_application_layer) 2. Unshielded twisted-pair: UTP cable is a popular cable used in computer networking that consists of two shielded wires twisted around each other. In the image to the right, is an example of the different network cables you're likely to encounter. (/jargon/u/utpcable.htm) 3. Shielded Twisted-pair: Twisted Pair (STP) has a fine wire mesh surrounding the wires to protect the transmission; Unshielded Twisted Pair (UTP) does not. Shielded cable is used in older telephone networks, network, and data communications to reduce outside interference. In the picture to the right, is an example of what these cables look like inside. (jargon/t/twispair.htm) 4. Fiber-Optic cable: A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing. These...

Words: 1317 - Pages: 6

Premium Essay

Week 5 Assignment

...Name: Date: August , 2014 ISSC340 Week 5 Assignment (3% of Grade) Lesson 5 Review: Networking Models, Traffic and Devices The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. Describe the three modes of communication available on a network. (Minimum word count: 60) Simplex Data travels in only one direction, similar to a public address (PA) system. Half-duplex Data travels in two directions, but in only one direction at a time, similar to a walkie-talkie. Traditional shared Ethernet uses half-duplex transmissions. Full-duplex Data travels in two directions simultaneously, similar to a phone conversation. Full-duplex Ethernet (or switched Ethernet) supports full- duplex transmissions in a switched environment. 2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20) The OSI/RM consists of the seven layers Application 7, Presentation 6, Session 5, Transport 4, Network3, Data Link 2, and Physical 1. 3. Describe a protocol data unit (PDU). (Minimum word count: 30) The PDU consists of the payload and the header from that layer. The next layer then treats the PDU from the previous layer as the payload, adds its header (creating a new PDU), and transferring it to the next layer. 4. List three practical functions of the OSI model. (Minimum word count: 60) The OSI/RM has three practical functions:  It gives developers necessary, universal concepts...

Words: 481 - Pages: 2

Premium Essay

Meow Investments Meow Documents

...Unit Plans Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure  Common threats for each of the seven domains  IT security policy framework  Impact of data classification standard on the seven domains Reading  Kim and Solomon, Chapter 1: Information Systems Security. Keywords Use the following keywords to search for additional materials to support your work:  Data Classification Standard  Information System  Information Systems Security  Layered Security Solution  Policy Framework ------------------------------------------------- Week 1 Assignment (See Below) * Match Risks/Threats to Solutions * Impact of a Data Classification Standard Lab * Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) * Page 7-14 in lab book. Project (See Below) * Project Part 1. Multi-Layered Security Plan ------------------------------------------------- Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes  You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions...

Words: 1409 - Pages: 6

Free Essay

Software

...Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel, IO Processor, DOT matrix printer, ink jet printer, laser printer. Advanced concepts; Horizontal and vertical instruction format, microprogramming, microinstruction sequencing and control; instruction pipeline; parallel processing; problems in parallel processing; data hazard, control hazard. UNIT IV ILP software approach-complier techniques-static branch protection-VLIW approach-H.W...

Words: 3183 - Pages: 13

Free Essay

Electrical Studys

...Justin Chandonnet 1/25/2014 Chapter 5 Definitions 1. Ethernet LANs: The term Local Area Network LAN generally defines a private network covering a single location, like a building. Ethernet is the most common network standard in implementation. It is a set of protocols that defines the physical connections of the network. 2. 802.3 standard: 802.3 is a standard specification for Ethernet a system of physical communications in a local area network LAN which is maintained by the Institute of Electrical and Electronics Engineers IEEE. 3. Fast Ethernet: Fast Ethernet is a local area network LAN transmission standard that provides a data rate of 100 megabits per second , referred to as 100BASE-T. 4. Gigabit Ethernet: Gigabit Ethernet is a transmission technology based on the Ethernet frame format and protocol used in local area networks this provides a data rate of 1 billion bits per second one gigabit. Gigabit Ethernet is defined in the IEEE 802.3 standard. 5. Autonegotiation: Auto negotiation is an Ethernet procedure that permits devices to exchange information about their network use and protocols. They allow devices to perform automatic configuration to achieve the best modes of operations over links and provide automatic speed matching to allow devices to operate optimally with each...

Words: 374 - Pages: 2

Free Essay

Network Proposal

...PROPOSAL FOR ABC NETWORKING AND CYBER-PHYSICAL SYTEMS SAFETY Name: Institutional Affiliation: Course: Date: Table of Contents SECTION I: CONSULTANT …………………………..............................................2-5 SECTION II: OUR UNDERSTANDING OF ABC REQUIREMENTS…………….5 SECTION III: OUR PROPOSAL……………………………………………………..6-16 SECTION IV: PROJECT RESOURCE……………………………………………..….17-18 Reference………………………………………………………………………………… I.0. Introduction BLM COMMUNICATIONS Your Ref… Our Ref: ABC/14/9 26 September 2014 Information Technology/ Systems Engineer ABC, Department of ICT Address: Dear Sir/Madam, RE: PROPOSAL FOR NETWORKING AND CYBER-PHYSICAL SYTEMS SAFETY Proposal on enterprise-wide solution for networking topology, network devices, IP infrastructure, and network security innovative safety procedures and measures for implementation to provide safer environments for networking and electronic document management software. We look forward for your favorable consideration. Sincerely, Name, LEAD CONSULTANT 1. Business Questionnaire |Company Registration No. 490998 | |PIN Number P051564540Q ...

Words: 2114 - Pages: 9

Premium Essay

Myself

...------------------------------------------------- OSI model From Wikipedia, the free encyclopedia OSI model | 7. Application Layer | NNTP  · SIP  · SSI  · DNS  · FTP  · Gopher · HTTP  · NFS  · NTP  · SMPP  · SMTP  ·DHCP  · SNMP  · Telnet  · Netconf  ·(more) | 6. Presentation Layer | MIME  · XDR  · TLS  · SSL | 5. Session Layer | Named Pipes  · NetBIOS  · SAP  · L2TP  ·PPTP | 4. Transport Layer | TCP  · UDP  · SCTP  · DCCP  · SPX | 3. Network Layer | IP (IPv4, IPv6)  · ICMP  · IPsec  · IGMP  ·IPX  · AppleTalk | 2. Data Link Layer | ATM  · SDLC  · HDLC  · ARP  · CSLIP  ·SLIP  · PLIP  · IEEE 802.3  · Frame Relay · ITU-T G.hn DLL  · PPP  · X.25 | 1. Physical Layer | EIA/TIA-232  · EIA/TIA-449  · ITU-T V-Series  · I.430  · I.431  · POTS  · PDH  ·SONET/SDH  · PON  · OTN  · DSL  ·IEEE 802.3  · IEEE 802.11  · IEEE 802.15 · IEEE 802.16  · IEEE 1394  · ITU-T G.hn PHY  · USB  · Bluetooth · Blue | This box: view · talk · edit | The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a way of sub-dividing a communications system into smaller parts called layers. A layer is a collection of similar functions that provide services to the layer above it and receives services from the layer below it. On each layer, an instance provides services to the instances at the layer above and requests service from the layer below. For example, a layer that provides...

Words: 3915 - Pages: 16

Premium Essay

Unit

...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...

Words: 6762 - Pages: 28

Free Essay

Network and Protocols

...wireless networking.      1. User mobility in the workplace.      2. A cost-effective networking media for use in areas that is difficult or too costly to wire. 2. What are the three areas defined for the IEEE 802.11 standard?      1. Physical Layer (PHY)           The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.)     2. Medium Access Control (MAC)           I. The reliability of the data service.           II. Access control to the shared wireless medium.           III. Protecting the privacy of the transmitted data.     3. MAC management protocols and services           I. Authentication, association, data delivery, and privacy. 3. What is an ad hoc network?      1. In this network, the wireless clients (stations) communicate directly with each other. This means the clients have recognized the other stations in the WLAN and have established a wireless data link.      2. The fundamental topology of the WLAN is the Basic Service Set (BSS). This is also called the independent Basic Service Set, or ad hoc network. 4. What is the purpose of an Extended Service Set?      1. By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended.      2. Definition - The use of multiple access points to extend user mobility Hand-off. 5. What are the four physical layer technologies being used in 802.11 wireless networking?      1...

Words: 1687 - Pages: 7

Premium Essay

Cis 550, Term Paper: Diginotar, Part 6b

...Running head: CIS 500, Case Study 1: Stratified Custom Manufacturing, Part 2 
 ABSTRACT This paper develops a security policy document for my mid-sized organization “Canar Networkung Organization”. The paper will include measures to protect against breaches and act as a proactive defense. It defines the segments of policy that are purpose, audience, document information and scope for the success of organization. This paper also develops the policy criteria that protect the organization from proactive defense and organizational risks. It examines the objectives, complains, responsibilities, implementations and control of policy criteria in order to enhance the organization. The paper also details the policy measurement in order to mitigate the organizational threats, and provides an effective security elements for the enhancement of the organization. Introduction: The policy This policy is the procedure and principle that guides the decisions and the rational outcomes of an organization. The subjective and the objective decisions can be assisted by policy in order to make better environment to the organization. Policies include the set of decision that can be associated by the senior management in an organization. Document information: The framework of Canar Networkung Organization could be provided by document information for the development of organization...

Words: 7361 - Pages: 30

Premium Essay

Ecomerce

...driver of EC. 1-2 1 9/12/2011 Learning Objectives 6. Describe some EC business models. 7. Describe the benefits of EC to organizations, consumers, and society. 8. Describe the limitations of EC. 9. Describe the contribution of EC to organizations responding to environmental pressures. 10. Describe online social and business networks. 1-3 Electronic Commerce: Definitions and Concepts  electronic commerce (EC) The process of buying, selling, or exchanging products, services, or information via computer networks 1-4 2 9/12/2011 Electronic Commerce: Definitions and Concepts  EC can be defined from these perspectives: Business process Service Learning Collaboration Community 1-5 Electronic Commerce: Definitions and Concepts  e-business A broader definition of EC that includes not just the buying and selling of goods and services, but also servicing customers, collaborating with business partners, and conducting electronic transactions within an organization 1-6 3 9/12/2011 Electronic Commerce: Definitions and Concepts  Pure versus Partial EC  EC can take several forms depending on the degree of digitization 1. the product (service) sold 2. the process (e.g., ordering, payment, fulfillment) 3. the delivery method 1-7 Electronic Commerce: Definitions and Concepts 1-8 4 9/12/2011 Electronic Commerce: Definitions and Concepts  brick-and-mortar (old economy)...

Words: 1829 - Pages: 8

Premium Essay

Notes of Unit 1. Chapter 1. Nt1230

...CHAPTER 1 Introduction to Networking Objectives Upon completion of this chapter, you should be able to answer the following questions: ■ What are the requirements for an Internet connection? What are the major components of a personal computer (PC)? What procedures are used to install and troubleshoot network interface cards (NICs) and modems? What basic testing procedures are used to test the Internet connection? What are the features of web browsers and plug-ins? ■ What are the Base 2, Base 10, and Base 16 number systems? How do you perform 8-bit-binary-to-decimal and decimal-to-8-bit-binary conversions? How do you perform simple conversions between decimal, binary, and hexadecimal numbers? How are IP addresses and network masks represented in binary form? How are IP addresses and network masks represented in decimal form? ■ ■ ■ ■ ■ ■ ■ ■ Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary: Internet page 4 page 4 parallel port serial port page 10 page 10 enterprise network Internet service provider (ISP) page 6 personal computers (PCs) page 7 page 8 mouse port page 10 keyboard port page 10 Universal Serial Bus (USB) port expansion slots page 10 page 11 page 10 central processing unit (CPU) random-access memory (RAM) page 9 disk drive page 9 hard disk page 9 network interface card (NIC) video card page 11 input/output devices (I/O) page 9 motherboard memory chip page...

Words: 22727 - Pages: 91