...more flexibility than cases Punch-Down Blocks- connection bits which cut the insulation of copper wires and forces the copper itself into contact with a circuit. Special tool required. Consolidation Points- a convergence point for the horizontal cabling of a section or floor Crimpers- used to connect.. connectors to the connection ends of wires. Fish Tape- used to help pass cabling through walls and ceilings. Fed upon by larger species of Duck Tape. Cable Toner- device that ensures electricity is going where it needs, and isn't being lost in an unintended place Continuity Tester- tests if two cables can be connected to form a complete circuit Category 5e/6 Cable- heavy insulation against noise and crosstalk, these cables require all 4 pairs in a cable to be... View Full Essay Join Now Please login to view the full essay... Essay's Statistics Submitted by: gabrekthetank Date shared: 11/20/2012 05:52 PM Words: 509 Pages: 3 Save Paper Report this Essay Similar Documents Practice Activity 2: Cabling – Definitions Practice Activity 10 Anat Practices Notes The Challenge Of International Human Resource Management: Balancing The Duality Of Strategy And Practice Business Practice Audit Values And Study Practices Of Nursing Students : An Indicators Of Their Performance In The Nurses...
Words: 409 - Pages: 2
...Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to...
Words: 10839 - Pages: 44
...or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could be (but are not limited to): Install/maintain/upgrade site LAN cabling/wiring Survey, inventory and document networking layout and assets Install, configure and/or support Windows 7 desktop as network clients Install, configure and/or support Windows Server 2008 for a network Install, configure and/or support a site LAN (local area network, wired or wireless) General network user...
Words: 6762 - Pages: 28
...os St. Catherine Specialty Hospital Designing the Future of IP-based Healthcare Data Networks _________________ Project Charter Document with Scope Table of Contents A. General Project Information Page 3. B. Project Objectives -Project Mission Statement -Business Case -Problem Statement -Goal Statement -Definition of Terms Target Project Goals Page 4. Acceptance to Terms of Deliverables Key Project Directives Page 5. C. Project Assumptions Page 6. Telecommunication Location Specification Page 8. Telecommunication Room Specifications Telecommunication Power Requirements Additional Network Requirements Page 9. Project Deliverables Page 12. D. Project Scope Page 14. ScopeAgenda Fulfilling IP Convergence Requirements Network Verification Requirements Page 16. Work Area Designations Infectious Control Requirements Page 17. Cable Run Specifications Page 18. Scope Exclusions Page 20. E. Project Milestones Page 21. F. Impact Statement Page 22. G. Roles & Responsibilities Page 23. H. Resources Page 24. I. Project Risks Page 25. J. Success Measurements Page 26. K. Project Participant Signatures Page 27. A. - General Information Project Title: | St. Catherine Specialty Hospital - Network and Data Infrastructure | Brief Project Description: | New hospital...
Words: 8359 - Pages: 34
...Contents Vision Statement 1 Project requirements 1 Project management tools and techniques. 1 Project management Plan 2 A. Project Overview 2 i. Purpose, Scope and Objectives 2 ii. Assumptions, Constraints and Risks 2 iii. Project Deliverables 3 iv. Schedule and Budget Summary 3 v. Evolution of the Plan 4 vi. Definitions and Acronyms 4 B. Project Organisation 4 i. External interfaces 4 ii. Internal structure 4 iii. Role and responsibilities 5 C. Project Management Process Plans 6 i. Project Initiation 6 ii. Project Planning 7 iii. Project Execution 8 iv. Project Monitoring & Control 11 V. Project Closure 16 D. Project-Specific Process Plans 17 i. Project Specific Processes 17 ii. Method, Tools and Techniques 17 iii. Infrastructure 17 iv. Project and Work Product Acceptance against quality control metrics 17 E. Project-Supporting Process Plans 17 i. Configuration Management 17 ii. Verification and Validation 17 iii. Documentation 17 iv. Work Product Quality Assurance 17 v. Project Reviews and Audits 17 vi. Problem Resolution 17 vii. Subcontractor Management 17 F. Additional Plans 17 i. Conflict Resolution 17 g. Project Plan Sign Off 18 Project budget layout on a spreadsheet 19 Support and Maintenance Plan 19 Lessons learned Report 20 Reference 20 Vision Statement • Continually strive to strengthen and improve the positive impact of students and community: transforming their lives, as well as our own, through our work • Become known nationally as an institution...
Words: 3860 - Pages: 16
...NETW600 Telecommunications Capstone Table of Contents Executive Summary 3 Project Background 3 Industry 3 Trends and Projections 4 Competition 5 Strength 5 Weakness 5 Opportunity 5 Threats 5 Problem and Definition 6 Problem 1: Infrastructure 6 Problem 1.1 Cabling 6 Problem 1.2 Disaster Recovery 6 Problem 1.3 Equipment Life Cycles 6 Problem 2: Security 7 Problem 3: No Internal VoIP 7 Problem 4: Inability to Switch to Telecommute Employees 7 Project Overview 8 Goals & Objectives 8 Assumptions 9 Identification of Issues & Requirements 10 Findings and Recommendations 14 Budget Requirements 14 Recommended Approach – Telecommute 14 Alternative Approach 1 – High Availability (On-Site) 15 Alternative Approach 2 – Telecommute & Cloud 16 Network Design 17 Recommended Approach – Telecommute 18 Alternative Approaches 19 Alternative Approach 1 – High Availability (On-Site) 19 Alternative Approach 2 – Telecommute & Cloud 20 Implementation Plan 20 Project Plan 21 Milestones and Measurements 21 Implementation Strategy 22 Works Cited 23 Appendix A 24 Recommended Approach – Telecommute 24 Alternative Approach 1 – High Availability (On-Site) 27 Alternative Approach 2 – Telecommute & Cloud 30 Executive Summary Travel Agency, Inc. is a large travel firm that was founded in 1999. They pride themselves on personal relationships along with fast and accurate customer service. Travel Agency,...
Words: 4954 - Pages: 20
...their guidance and constant supervision as well as for providing necessary information regarding the project & also for their support in completing the project. I would like to express my gratitude towards my parents & member of (Organization Name) for their kind co-operation and encouragement which help me in completion of this project. I would like to express my special gratitude and thanks to industry persons for giving me such attention and time. My thanks and appreciations also go to my colleague in developing the project and people who have willingly helped me out with their abilities. TABLE OF CONTENT CHAPTER 1 Introduction Organogram for F.C.D.A- I.C.T Unit CHAPTER 2 HARDWARE AND SOFTWARE Computer motherboard Installations of software CHAPTER 3 NETWORKING Networking Devices Ethernet standard of cabling Network topology CHAPTER 4 WEB DEVELOPMENT HTML and HTML tags The use of CSS Java script CHAPTER 5 Summary and conclusion Chapter 1 Introduction This chapter...
Words: 4162 - Pages: 17
...IT Security and Compliance Policy | IS3350/Security Issues; Roger Neveau; 3/12/2013; Mike Taylor, Instructor | This document is the Final Project for IS3350 Security Issues, creating and improving security policies for LenderLive Network | | Table of Contents Introduction2 Risk Analysis2 SWOT Analysis2 Physical Security5 Data Classification6 Regulatory Compliance8 Intellectual Property…………………………………………………………………………………………………………………………….10 Training……………………………………………………………………………………………………………………………………..............11 Security Breach……………………………………………………………………………………………………………………………………..12 Appendix A SWOT Analysis…………………………………………………………………………………………………………………..14 Appendix B Definitions………………………………………………………………………………………………………………………….17 Appendix C Roles…………………………………………………………………………………………………………………………………..18 Works Cited…………………………………………………………………………………………………………………………………………..19 Introduction An effective IT Security policy protects the organization against possible threats to the infrastructure and data that the organization has. It will provide and maintain its ability to provide confidentiality, integrity, availability, and security of the client’s data within the organization’s environment. Overview The IT Security and Compliance policy for LenderLive Network Inc. will detail the policies, procedures, and guidelines that the organization will adhere to, to ensure compliance of the Graham-Leach-Bliley Act (GLBA) and Federal Trade Commission’s Safeguards Rule. It describes...
Words: 4550 - Pages: 19
...Layered Security Solution Policy Framework ------------------------------------------------- Week 1 Assignment (See Below) * Match Risks/Threats to Solutions * Impact of a Data Classification Standard Lab * Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) * Page 7-14 in lab book. Project (See Below) * Project Part 1. Multi-Layered Security Plan ------------------------------------------------- Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions. Assignment Requirements This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat. Required Resources Worksheet: Match...
Words: 1409 - Pages: 6
...A NPSTC Public Safety Communications Report The National Public Safety Telecommunications Council is a federation of organizations whose mission is to improve public safety communications and interoperability through collaborative leadership. Defining Public Safety Grade Systems and Facilities Final Report 5/22/2014 Support to NPSTC provided by the U.S. Department of Homeland Security's Science and Technology Directorate, Office for Interoperability and Compatibility (OIC), and the National Protection and Programs Directorate, Office of Emergency Communications (OEC). Points of view or opinions expressed are those of the originators and do not necessarily represent the official position or policies of the U.S. Department of Homeland Security. American Association of State Highway and Transportation Officials | American Radio Relay League | Association of Fish and Wildlife Agencies | Association of Public Safety Communications Officials | Forestry Conservation Communications Association | International Association of Chiefs of Police | International Association of Emergency Managers | International Association of Fire Chiefs | International Municipal Signal Association | National Association of State Chief Information Officers | National Association of State Emergency Medical Services Officials | National Association of State Foresters | National Association of State Technology Directors | National Emergency Number Association | National Sheriffs’ Association 8191 Southpark...
Words: 44798 - Pages: 180
...CURRICULUM VITAE CURRENT EMPLOYMENT Name of company : EOH (Pty) Ltd Position : Senior Performance Consultant & Test Lead Period : 01/09/09 to Date Location : Bedfordview Work Description Performance testing activities. Develop Automation / performance testing / scripting standards and procedures. Develop automated Mercury tools (Loadrunner, QTP) scripts. Define performance test objectives. Develop and enhance test data staging/back-up/restore strategy. Analyze and report performance test results. Advise on QA environment configurations to achieve reliable results. Setup performance monitoring scripts, reports and alerts. Develop Automation Test scripts Using: Winrunner, QTP, TestPartner, TestComplete, Selenium, Cubic Test, WebUI Test Studio & IBM Rational Functional Tester Work closely with Operations staff, to ensure the correct O/S and Application Servers settings are applied. Work closely with System Architect to determine the non-functional requirements of the system. Using Mercury QC, PM, Test Director, QTP and Load Runner tools Doing (Regression, SIT, Functional, Manual, Automation and Performance Testing) Analyze the project documents Provide test strategy and plan documents Derive Load testing requirements Derive Load testing scripts Execute Load tests Monitoring with BAC tool Analyze Load testing results Provide regular testing feedback to the relevant stakeholders Maintain Load test scripts Provide a sign off recommendation ...
Words: 3927 - Pages: 16
...Contingency Plan Template Appendix I-3 CONTINGENCY PLAN Version Submitted to: Submitted By: Table of Contents 1 Executive Summary 1 2 Introduction 1 2.1 Purpose 3 2.2 Scope 3 2.3 Plan Information 3 3 Contingency Plan Overview 4 3.1 Applicable Provisions and Directives 4 3.2 Objectives 4 3.3 Organization 5 3.4 Contingency Phases 8 3.4.1 Response Phase 8 3.4.2 Resumption Phase 8 3.4.3 Recovery Phase 8 3.4.4 Restoration Phase 9 3.5 Assumptions 9 3.6 Critical Success Factors and Issues 9 3.7 Mission Critical Systems/Applications/Services 10 3.8 Threats 10 3.8.1 Probable Threats 11 4 System Description 12 4.1 Physical Environment 12 4.2 Technical Environment 12 5 Plan 12 5.1 Plan Management 12 5.1.1 Contingency Planning Workgroups 12 5.1.2 Contingency Plan Coordinator 12 5.1.3 System Contingency Coordinators 13 5.1.4 Incident Notification 13 5.1.5 Internal Personnel Notification 13 5.1.6 External Contact Notification 13 5.1.7 Media Releases 14 5.1.8 Alternate Site (s) 14 5.2 Teams 14 5.2.1 Damage Assessment Team 14 5.2.2 Operations Team 15 5.2.3 Communications Team 15 5.2.4 Data Entry and Control Team 15 5.2.5 Off-Site Storage Team 15 5.2.6 Administrative Management Team 15 5.2.7 Procurement Team 15 5.2.8 Configuration Management Team 16 5.2...
Words: 17284 - Pages: 70
...Contingency Plan Template Appendix I-3 CONTINGENCY PLAN Version Submitted to: Submitted By: Table of Contents 1 Executive Summary 1 2 Introduction 1 2.1 Purpose 3 2.2 Scope 3 2.3 Plan Information 3 3 Contingency Plan Overview 4 3.1 Applicable Provisions and Directives 4 3.2 Objectives 4 3.3 Organization 5 3.4 Contingency Phases 8 3.4.1 Response Phase 8 3.4.2 Resumption Phase 8 3.4.3 Recovery Phase 8 3.4.4 Restoration Phase 9 3.5 Assumptions 9 3.6 Critical Success Factors and Issues 9 3.7 Mission Critical Systems/Applications/Services 10 3.8 Threats 10 3.8.1 Probable Threats 11 4 System Description 12 4.1 Physical Environment 12 4.2 Technical Environment 12 5 Plan 12 5.1 Plan Management 12 5.1.1 Contingency Planning Workgroups 12 5.1.2 Contingency Plan Coordinator 12 5.1.3 System Contingency Coordinators 13 5.1.4 Incident Notification 13 5.1.5 Internal Personnel Notification 13 5.1.6 External Contact Notification 13 5.1.7 Media Releases 14 5.1.8 Alternate Site (s) 14 5.2 Teams 14 5.2.1 Damage Assessment Team 14 5.2.2 Operations Team 15 5.2.3 Communications Team 15 5.2.4 Data Entry and Control Team 15 5.2.5 Off-Site Storage Team 15 5.2.6 Administrative Management Team 15 5.2.7 Procurement Team 15 5.2.8 Configuration Management Team 16 5.2.9 Facilities Team 16 5.2.10 System Software Team 16 ...
Words: 17323 - Pages: 70
...SSCP Study Notes 1. Access Controls 2. Administration 3. Audit and Monitoring 4. Risk, Response, and Recovery 5. Cryptography 6. Data Communications 7. Malicious Code Modified version of original study guide by Vijayanand Banahatti (SSCP) Table of Content 1.0 ACCESS CONTROLS…………………………………………………………...... 03 2.0 ADMINISTRATION ……………………………………………………………... 07 3.0 AUDIT AND MONITORING…………………………………………………...... 13 4.0 RISK, RESPONSE, AND RECOVERY………………………………………....... 18 5.0 CRYPTOGRAPHY……………………………………………………………....... 21 6.0 DATA COMMUNICATIONS…………………………………………………...... 25 7.0 MALICIOUS CODE……………………………………………………………..... 31 REFERENCES………………………………………………………………………........ 33 1.0 ACCESS CONTROLS Access control objects: Any objects that need controlled access can be considered an access control object. Access control subjects: Any users, programs, and processes that request permission to objects are access control subjects. It is these access control subjects that must be identified, authenticated and authorized. Access control systems: Interface between access control objects and access control subjects. 1.1 Identification, Authentication, Authorization, Accounting 1.1.1 Identification and Authentication Techniques Identification works with authentication, and is defined as a process through which the identity of an object is ascertained. Identification takes place by using some form of authentication. Authentication Types Example Something you know...
Words: 17808 - Pages: 72
...troubleshoot network interface cards (NICs) and modems? What basic testing procedures are used to test the Internet connection? What are the features of web browsers and plug-ins? ■ What are the Base 2, Base 10, and Base 16 number systems? How do you perform 8-bit-binary-to-decimal and decimal-to-8-bit-binary conversions? How do you perform simple conversions between decimal, binary, and hexadecimal numbers? How are IP addresses and network masks represented in binary form? How are IP addresses and network masks represented in decimal form? ■ ■ ■ ■ ■ ■ ■ ■ Key Terms This chapter uses the following key terms. You can find the definitions in the Glossary: Internet page 4 page 4 parallel port serial port page 10 page 10 enterprise network Internet service provider (ISP) page 6 personal computers (PCs) page 7 page 8 mouse port page 10 keyboard port page 10 Universal Serial Bus (USB) port expansion slots page 10 page 11 page 10 central processing unit (CPU) random-access memory (RAM) page 9 disk drive page 9 hard disk page 9 network interface card (NIC) video card page 11 input/output devices (I/O) page 9 motherboard memory chip page 9 page 9 sound card page 11 jack page 14 local-area network (LAN) page 14 continues 2 Networking Basics CCNA 1 Companion Guide continued Ethernet page 14 plug-and-play page 16 page 17 page 17 web browser page 26 web servers page 26 binary digit (bit) page 26 byte page 26 bits...
Words: 22727 - Pages: 91