Premium Essay

Scoial Networking

In:

Submitted By DoubleRR
Words 1008
Pages 5
Persuasive Essay: Social networking
Sharrieff L. Martin University of Phoenix

COMM/215

Professor Haines

September 30th, 2014

| |
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|Introduction | |
|Computer software giants and visionaries in the 80s, such as Apple and IBM were in their beginning stages of developing the PC and | |
|paving the way for others to follow in their footsteps and implement their ideas to enhance technology in the future. Many years | |
|later a young Mark Zuckerberg and his college friends concocted an idea in their Harvard

Similar Documents

Premium Essay

Face Detetction

...Data Communication Theory What is dotted decimal notation on IPv4 addresses? Answer: It is presentation form for the numerical data that consists of a string of decimal numbers each pair is separated by a dot. The common use is to write the numbers in the octet group based 10 (decimal) numbers separated by dots. In computer networking, Internet Protocol Version 4 addresses are commonly written using quad-dotted notation of four decimal integers, ranging from 0 to 255 each. Chapter 6- Explain the Peer-to Peer network and what are its advantages? Answer – In Peer to Peer network, network hosts don’t have a specific role. They provide specific services and also consume network services. We have hosts that will fulfill a variety of different roles, like one computer can have printer connected to it which is then shared on to the network. Another computer can have a large hard drive attached to it and everyone else is allowed to use the hard drive for data storage, modification etc. In Such network we have hosts that both provide and consume network services. In essence they function both as a Client and as a Server at the same time. The advantage of Peer to Peer network is the ease of installation. We can share our resources on the network and everyone can share the benefits. On the other hand is not very scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of...

Words: 1023 - Pages: 5

Free Essay

Ip Networking

...Wiring a LAN * * * Task 1: Communicating on a star topology Procedure 1. Disconnect your lab computer from the ITT LAN and plug in your network cable to the ITT lab computer. 2. Connect the other end of your network cable to the hub provided by the instructor. Answer the following questions: a. What is the purpose of the hub? b. What is the topology you are creating? 3. Turn on the hub and verify that a link light is illuminated both on the computer’s network interface card (NIC) and the network hub. If not, check with the instructor. Answer the question: a. What does the link light indicate? 4. On the workstation, open a command prompt by clicking START> RUN and type CMD. 5. Next, type the IPCONFIG/ALL command to determine current TCP/IP settings for clients on a network. Record the following: a. Your computer’s IP address b. Classmate’s IP address connected with your hub 6. Next, use the PING command to verify network connectivity between clients. Type PING XX.XX.XX.XX at the command prompt where XX.XX.XX.XX is the IP address that you recorded in Step 5b. 7. You will receive ICMP replies from your classmate’s computer illustrating that your computers are connected and communicating. If not, you can check with your instructor. 8. Now, unplug your network cable from the hub and repeat Step 6. What was the result? 9. Unplug your cable from the ITT computer. Replace the ITT UTP cable to the ITT computer...

Words: 401 - Pages: 2

Free Essay

Final

...Associate Program Material Appendix J Wireless Network Plan Use the following outline to create your wireless network plan. Fill in each section of the plan as required. Deployment Scenario Infrastructure Deployment Scenario Rationale An infrastructure wireless network provides a more reliable network connection for wireless clients. If we strategically placed the stationary base we can maximum reception. Infrastructure mode networks offer the advantage of scalability, centralized security management and improved reach. Hardware Components • Component Name: Access point o Rationale for using component: Receive and transmit signal that can be picked up by any node that has the ability to receive wireless signals through a wireless network interface card. o Rough cost estimate: $100 • Component Name: Switches o Rationale for using component: Give the ability to expansion of a WLAN o Rough cost estimate: $250 • Component Name: Cables o Rationale for using component: The access point is connect to wired network with cables to give wireless access o Rough cost estimate:$10 IEEE Wireless Network Type Apex Designs has identified that an 802.11n LAN will be implemented. Access Point Management Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location rather than to...

Words: 503 - Pages: 3

Free Essay

Walmart Global Sucess

...Mohamad Alshaar Assignment 4 What are common carriers, local exchange carriers. And interexchange carriers? Common carriers are private companies like AT&T and sprint that provide communication services to the public. LEC are common carriers that provide local telephone services, and IXC are common carriers that provide long distance services Who regulates common carriers and how is it done? In the US the FCC (Federal Communications Commissions) is an agency that regulates voce and data communications, where each state has their own public utilities commission where communications is regulated within its borders. What is cloud architecture? The user lease connection points into the common carrier’s network, where a person dials the telephone number of the destination computer and establishes a temp circuit between two computers. What is POTS? POTS is plain old telephone system where dial-up was used to connect to the internet, it is obviously outdated with the new high speeds available (e.g.T-1) How does ISDN work? ISDN works in a way to combined voice, videos, and data over the same digital circuit, BRI vs. PRI ISDN BRI is basic access service that provides 2 64Kbps digital transmission channels where PRI is primary access service that provides 23 64Kbps digital transmission channels. What is 2B+D? 2B+D is another name for BRI that is basic access service that provides 2 64Kbps digital transmission channels. How do VPN services differ from common...

Words: 404 - Pages: 2

Premium Essay

Data Communication at Walmart

...Case Study: 6 – Wal-Mart Case Study: Data Communications at Wal-Mart Erin Barraclough Case Study: Data Communications At Wal-Mart • Case Study - Data Communications At WalMart Page 116 1. How has Wal-Mart improved its data communication systems for suppliers? 2. What are some typical data communication applications in Walmart? 3. What are some of the applications of wireless technology in WalMart? 4. What are some of the features and capabilities of VMS? • Due Date Saturday, September 21, 2013 11:59:00 PM CDT (Bidgoli, 2013, p.. Question 1) Wal-Mart has improved its data communication system for its suppliers through various approaches. The main reason for doing so is to, remain the lowest cost retail merchandiser. The first improvement Wal-Mart has done to improve its communication system was adding a customized web site for its suppliers. This customized network has enable suppliers to retrieved, all sales, inventory, and forecasting data through faster connections. To make sure that the confidentiality of data is maintained, Wal-Mart has implemented a security system to ensure that no suppliers can access each other’s data. The second improvement to the data communication system was allowing the suppliers, Web-Based access to Wal-Mart’s Retail Link system to access information in the database. Question 2) Wal-Mart utilizes various data communication system to remain at the top of the retail business. Some typical data communication...

Words: 388 - Pages: 2

Free Essay

Network and Protocols

...wireless networking.      1. User mobility in the workplace.      2. A cost-effective networking media for use in areas that is difficult or too costly to wire. 2. What are the three areas defined for the IEEE 802.11 standard?      1. Physical Layer (PHY)           The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.)     2. Medium Access Control (MAC)           I. The reliability of the data service.           II. Access control to the shared wireless medium.           III. Protecting the privacy of the transmitted data.     3. MAC management protocols and services           I. Authentication, association, data delivery, and privacy. 3. What is an ad hoc network?      1. In this network, the wireless clients (stations) communicate directly with each other. This means the clients have recognized the other stations in the WLAN and have established a wireless data link.      2. The fundamental topology of the WLAN is the Basic Service Set (BSS). This is also called the independent Basic Service Set, or ad hoc network. 4. What is the purpose of an Extended Service Set?      1. By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended.      2. Definition - The use of multiple access points to extend user mobility Hand-off. 5. What are the four physical layer technologies being used in 802.11 wireless networking?      1...

Words: 1687 - Pages: 7

Premium Essay

Wireless Technologies

...point to another. Roaming from access point to access point (cell to cell), similar to cellular telephone technology, is possible. Technology Discussion There are three wireless technology standards on the market today: Bluetooth, 802.11b, and 802.11a. A new standard, 802.11g, was recently approved by IEEE and products using this technology are expected to be released later this year (3Q). Bluetooth was the first wireless technology to the market. It operates at a frequency of 2.4 GHz (ISM band) using the Frequency Hopping Spread Spectrum (FHSS) modulation method. Bluetooth can transmit data at 700 Kbps at a range of 300 feet indoors. It was primarily intended for “device-to-device” communication as opposed to wireless networking,...

Words: 1089 - Pages: 5

Premium Essay

Cable Connectors and Tools Guide

...4331Insert 06/21/04 11:11 AM Page 1 Cable Connector and Tool Identification Guide 4331Insert 06/21/04 11:11 AM Page 2 This Cable Connector and Tool Identification Guide will allow you to view connectors and tools in living color. Many items in the data-communications industry are color-coded; for example, orange is used to designate fiber optic cable. Some of the products shown in the following pages are: • Connectors • Fiber optic test scope • Cables • Cable tester • Mount box • Punch-down block • Wall plates • Fiber patch panel • Jacks • Telephone installation • Face plates • Fiber optic breakout box • Cable strippers • Wiring closet • Connectorizing kits • Tractor-mounted unspooler FIBER OPTIC PATCH CABLE with MT-RJ connectors FIBER OPTIC PATCH CABLE with ST connectors 4331Insert 06/21/04 11:11 AM Page 3 A SIX-FIBER MULTIMODE FIBER OPTIC CABLE Notice Kevlar threads (yellow) at top. ARMORED FIBER OPTIC CABLE A 25-PAIR UTP CABLE This cable is often used for telephone applications. TYPE 1 TOKEN RING CABLE Notice the shielding and unique connector. TWIN-AXIAL CABLE 4331Insert 06/21/04 11:11 AM Page 4 SILVER SATIN CABLE with an RJ-45 connector MODULAR JACK THAT UTILIZES EITHER 568A OR 568B PINOUT CONFIGURATIONS 3M HOTMELT™ ST FIBER OPTIC CONNECTOR TWIN-AXIAL CABLE TO RJ-11 BALUN 4331Insert 06/21/04 11:11 AM Page 5 ...

Words: 776 - Pages: 4

Premium Essay

Synergetic Solutions Inc.

...organization possess only basic computer assembling and troubleshooting skills, while a few higher-skilled individuals operate as the specialists” (University of Phoenix, 2002). Two years ago, due to stagnation in the system integration market, Harold Redd, Chief Executive Officer investigated the possibilities of adding, designing, building, and implementing complex computer networks into Synergetic as a means to increase revenue. Synergetic has received a contract worth $1.2 million for designing a network and is currently working on contracts worth $5 million. Redd decided Synergetic should focus on networking designs as a primary source of income and has set a target goal of $12 million total revenue in the next 9 months of which 80% is the goal of network design and building. Redd has invested in 4 engineers to receive training and certification in networking technologies with the end goal of drawing new customers to Synergetic thereby increasing total sales and profits. Synergetic, facing reduction of revenue, desire to increase profitability, employee dissatisfaction, changes in consumer purchasing patterns, declining market shares due to competition, and changes in technology due to stagnation caused by the current economic conditions. Synergetic is proposing the following plan to change the mainstream business structure from assembly and troubleshooting of computers to designing and building complex computer networks thus keeping up and surpassing current market...

Words: 1235 - Pages: 5

Free Essay

Validation

...[pic] ZigBee Wireless Mesh Networking for Monitoring & Control What is ZigBee? ZigBee is a consortium of software, hardware and services companies that have developed a common standard for wireless networking of sensors and controllers. While other wireless standards are concerned with exchanging large amounts of data, ZigBee is for devices that have smaller throughput needs. The other driving factors are low cost, high reliability, high security, low battery usage, simplicity and interoperability with other ZigBee devices. ZigBee can be used in commercial applications such as building maintenance for monitoring and controlling lights, Heating, Ventilation and Air Conditioning (HVAC), smoke alarms, fire alarms, burglar alarms, landscaping sprinklers and lights and many other uses. In health care, ZigBee can be used for patient monitoring equipment, fitness monitoring and other uses. Industrial environments can use ZigBee for asset monitoring, process control, assuring compliance with environmental standards and energy management. Used correctly, ZigBee enabled devices can give a warning before a breakdown occurs so that repairs can be made in the most cost effective manner. They can also be used to maintain quality and reduce waste. Soon, ZigBee enabled devices will show up in our homes. They will be used for controlling our home entertainment systems, lights, garage door openers, alarms, panic buttons, and many other uses. Imagine your...

Words: 996 - Pages: 4

Premium Essay

How to Plan for Security

...How to Plan for Security i). Statement of Policy This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems. a) Scope and Applicability The scope of this policy statement covers the hardware, software and access protocols associated with the WLAN use by students and workers at the university. The policies adopted will seek to regulate access permissions for the users of the WLAN facility and to promote responsible use in line with policies outlined in this policy document and by industry standards and legal requirements of use. b) Definition of Technology Address The WAN is available for use by the students and workers within the university. The WLAN facility provides access to information systems meant to facilitate the learning and worker needs by providing information access and software platforms. c) Responsibilities The administration and management of the WLAN facility is the responsibility of appointed network administrators at the university’s faculty of Information and Communication Technology. The...

Words: 1907 - Pages: 8

Free Essay

Wireless

...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Free Essay

Wireless Communications

...Wireless Communications Paper Wireless communication involves the transmission of data from one point to another without the need to run cabling in-between. Although it seems relatively new to the end user today, it has surprisingly been around for longer than you may think dating back to the late 1800’s. The first wireless technology discovered was the Radio Frequency (RF signal). Thomas Edison and Nikola Tesla were two inventors that played a huge role in developing the RF technology we still use today. By conducting many experiments using wireless technology they together came up with the RF signal that was first implemented in WWII by the US Military. It wasn’t until the 1970s’ that the first ‘wireless network’ was developed called ALOHAnet. This new wireless network was made to communicate from island to island is Hawaii. Using LAN technologies and a 400 MHz frequency band ALOHAnet was the predecessor of many wireless technologies to come. Today we have many wireless technologies that are used for many different types of services. If you’ve used Bluetooth technology then you’ve used a Personal Area Network (PAN). A PAN network is intended for short ranges and typically controlled and used by a single person. If you’ve connected to the internet at work, a coffee shop, work, or at school then you’ve connected to part of a Wide Area Network (WAN) configured into a Local Area Network (LAN). Most people know a typical WAN by the name of WIFI, even though that’s just a business...

Words: 786 - Pages: 4

Premium Essay

Mdcs

...Abstract:-The fourth generation of mobile networks will truly turn the current mobile phone networks, in to end to end IP based networks, couple this with the arrival of IPv6, every device in the world will have a unique IP address, which will allow full IP based communications from a mobile device, right to the core of the internet, and back out again. If 4G is implemented correctly, it will truly harmonize global roaming, super high speed connectivity, and transparent end user performance on every mobile communications device in the world. 4G is set to deliver 100mbps to a roaming mobile device globally, and up to 1gbps to a stationary device. With this in mind, it allows for video conferencing, streaming picture perfect video and much more. It won’t be just the phone networks that need to evolve, the increased traffic load on the internet as a whole (imagine having 1 billion 100mb nodes attached to a network over night) will need to expand, with faster backbones and oceanic links requiring major upgrade. 4G won’t happen overnight, it is estimated that it will be implemented by 2012, and if done correctly, should takeoff rather quickly. 4G networks i.e. Next Generation Networks (NGNs) are becoming fast and very cost-effective solutions for those wanting an IP built high-speed data capacities in the mobile network. Some possible standards for the 4G system are 802.20, Wi-MAX (802.16), HSDPA, TDD UMTS, UMTS and future versions of UMTS. The design is that 4G will be based on OFDM...

Words: 3876 - Pages: 16

Free Essay

It/205 Week 5 Checkpoint

...Checkpoint - TJX Companies IT/205 March 1, 2013 Checkpoint - TJX Companies This week’s checkpoint deals with the credit card data theft at TJX companies which occurred in July of 2005. According to the book Essentials of MIS, the thieves used a vulnerable wireless network from one of the department stores on the TJX network to gain access. (Laudon & Laudon, 2011, p. 243) After the thieves had access to the network the installed a sniffer program on one of the main computers of the network. They then were able to download any information that they needed to. The TJX Company was still using outdated weak wireless security encryption called WEP, (Wired Equivalent Privacy), instead of upgrading to a more secure version of wireless security, WPA, (Wi-Fi Protected Access). They also did not have any firewalls or data encryption in place. (Laudon & Laudon, 2011, p. 243). The tools that was needed to be in place to help stop this from happening was, the stronger wireless security of Wi-Fi Protected Access (WPA) standard with more complex encryption, they also needed to install strong firewalls, data encryption on computers, and to transmit credit card data to banks with encryption. This breach had some lasting effects on the TJX Company. One of the first effects was that the company had to strengthen the company’s information system security. They also had to agree to have a third-party auditor review their security measures every two years for the next twenty years...

Words: 388 - Pages: 2