Free Essay

Transmitting Bits Labs

In:

Submitted By nandito01
Words 337
Pages 2
Exercise 4.1.1
Because those same standards define how communication between different hardware and software involved, will take place.
4.1.2
The difference is between signal circuits and power circuits. Signal circuits operate at extremely low current levels and use digital logic voltage levels. Power circuits on the other hand require larger amounts of current to operate electrical devices such as motors, heating units
4.1.3
A very common application is the health care field. Shielded copper cable is often used in health care facilities for its efficiency and resistance to flame. The use of shielded cables in security systems provides some protection from power frequency and radio frequency interference, reducing the number of false alarms being generated. The best practice is to keep data or signal cables physically separated by at least 3 inches (75mm) from 'heavy' power circuits which are in parallel.
4.1.5
white/green stripe | white/orange stripe | green solid | orange solid | white/orange stripe | white/green strip | blue solid | blue solid | white/blue stripe | white/blue stripe | orange solid | green solid | white/brown stripe | white/brown stripe | brown solid | brown solid |

4.1.6
Coaxial cable conducts electrical signal using an inner conductor surrounded by an insulating layer and all enclosed by a shield, typically one to four layers of woven metallic braid and metallic tape. The cable is protected by an outer insulating jacket. Normally, the shield is kept at ground potential and a voltage is applied to the center conductor to carry electrical signals

4.1.7
UTP is less expensive than dedicated coax or fiber, Color-coded cabling, physically smaller than coax, easiest media to install and reconfigure, UTP is extremely easy to terminate. TP cable is less expensive per foot than traditional RG59 coaxial cable
4.1.8
Both cables are necessary

4.1.9
4.1.10

Multimeter - Wal-Mart- Cost: $36.89
Tone Generator – Lowes – Cost: $39.05
Pair scanner – Ebay – Cost: $149.00
Time domain Reflectormerter (TDR) - Amazon – Cost:$284.40

Similar Documents

Free Essay

Nt1210 Intro to Networking Lab 4.2

...NT1210 Lab 4.2: Fiber-optic Cables Exercise 4.2.1 The light in an SMF cable travels down the center of the fiber parallel to the direction of the fiber in a single path. Can this type of cable be used to transmit and receive bits simultaneously, or does it require one fiber for transmitting and one for receiving? Justify your answer using your textbook and Internet research. No it cannot transmit and simultaneously receive bits with a single cable. A second cable would be needed for sending bits back. In this case you would need two cables one send bits and second cable receiving bits. Exercise 4.2.2 What characteristics of fiber-optic cables allow them to be used over longer distances with less risk than copper cable? The core in single-mode fiber is only approximately 10 times larger than the wavelength of the light it is carrying. This leaves very little room for the light to bounce around. As a result the data carrying light pulses in single-mode fiber are essentially transmitted in a straight line through the core. Electromagnetic immunity including non-conductivity, Security considerations, decreased attenuation and increased transmission distance, Increased bandwidth potential, Small diameter and weight Long term economics Exercise 4.2.3 MMF distances can still far exceed copper cable, but MMF cannot match the distance available from the more expensive SMF. What is the reason for the distance limitation with the use of MMF? Multimode cables are less expensive...

Words: 333 - Pages: 2

Free Essay

Paper

...Assuming that the switches user store-andforward packet switching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing, propagation delay, and processing delay.) 3, (10 points) (a) How long does it take for a packet of length 1,000 bytes to be delivered from the sending host to the receiving host over a link of distance 4,800 km, propagation speed 2.4x108 m/s, and transmission rate 2Mbps? (b) More generally, how long does it take a packet of length L to be delivered from the sending host to the receiving host over a link of distance d, propagating speed s, and transmission rate R bps? (c) How long does it take for the first bit of the packet to arrive at the receiving host (start to count the time when the sending host starts to transmit the packet)? (d) How long does it take for the last bit of the packet to be put on the link (start to count the time when the sending host starts to transmit the packet)? 4, (8 points) Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rate R1=512kbps, R2=1.5Mbps, and R3=1Mbps. (a) Assume no other traffic in the network, what is the throughput for the file transfer? (b) Suppose the file is 8MB (consider 1MB = 106 bytes). Dividing the file size by the throughput, roughly how long will it take to transfer the file to...

Words: 728 - Pages: 3

Free Essay

Vision Sharing

...joints, 1 microphone, 2 cameras and 2 wheels has a broad workspace and flexible mechanical arms as well as can see and hear. First, the structure of teleoperated mobile manipulator is provided and the motion control of it is introduced. Further, the collaboratively-teleoperated mobile manipulator is implemented which is also the goal of our research. Based on the network platform with Users-Server-Robots mode, both commands transport and multimedia data transport are realized. Therefore, controllers could obtain the real-time remote state information of manipulators which is called vision sharing, and send the control commands in time to them as feedback. Finally, several experiments are carried out with the actual mobile manipulator in our lab, which later has achieved the expected result. Index Terms—Cooperative Manipulators, Computer Vision for Robotics and Automation, Teleoperation I. INTRODUCTION T mobile manipulator is a new-type robot designed by us which is integrated advantages of teleoperated camera, mobile robot and automatic arm while simultaneously reduced their drawbacks. It has a broader workspace and more flexible mechanical arms, even attain the ability of seeing and hearing. What is more, we have provided a network system for teleoperation, so people could attain the remote situation information and send corresponding commands. ELEOPERATED Fig 1 reveals the relationship of subordination and inheritance of teleoperated mobile manipulator. The...

Words: 2093 - Pages: 9

Premium Essay

Nt1210 Chapter 2

...and audio) that the user wants to see and hear, collecting that information into web pages. Web Browser: Software that allows a user to get and display a copy of a web page from a web server. Web Address: Identifies the specific web page that the user wants to display. Web Page: Identified by the name after the / in the URL. Protocol: A set of standards (rules) that defines how software on different devices communicate. HTTP: A standard used by web servers and browsers to define the format of web addresses. Enterprise Network: A network owned and operated by a large company that typically has 1,000 employees or more. Link: A term used for the transmitting of bits between devices, whether it is a wireless connection or a network cable. Node: A term used for any device that sits on the end of links and decides what path the bits will travel on to make it to their destination. Internet: A global network connecting every home and business network to...

Words: 1030 - Pages: 5

Premium Essay

Lab3

...LAB 3.2 3.1.2 Using Figure 3-1 define each layer of the OSI model in your own words and state what layer provides. Use your textbook or internet to support your answer. Physical – Device Data Link – Physical address Network – Path determination Transport – End to end connections Session – internet Presentation – typing data Application – games, downloads 3.2.2 Using Figure 3-2 as a basis, complete the diagram to show the intermediate encapsulation provided by each layer. Application Presentation Session | Data | Transport | Segment | Network | Packet | Data Link | Frame | Physical | Bit | 3.2.3 Briefly explain the deencapsulation steps in the communication from host B receiving a message from host A destined for an active application. First the receiving computer synchronizes with the digital signal by reading binary numbers. After synchronizing is complete and it gets the whole frame and passes it to the layer above it which is the Data Link layer. Second the Data Link layer will do a Cyclic Redundancy Check (CRC) on the frame. Checking for errors and then strip off any information or header which was put on by the remote systems Data Link layer and pass the rest to the Network layer. Third the Network layer checks the IP address and if it matches the Network layer header is stripped off from the packet and passed to the Transport layer. Fourth the Transport layer processes the segment and...

Words: 347 - Pages: 2

Free Essay

Computer Network Lab Manual

...CN LAB REPORT Dept. of ISE, BVBCET Department of Information Science & Engineering, BVBCET Hubballi COMPUTER NETWORKING LAB Mahantesh Patil 2BV14IS410 Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET LAB-01 List the hardware components 1) Difference between switch and Hub: 2) Difference between SWITCH and ROUTER 3) Differences between Router and Gateway 4) What is the Difference between Subnetting and Supernetting? HARDWARE COMPONENTS Cables: 1|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable, Twisted pair cable. RJ-45 The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way. 2|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET SWITCHES: Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports. NIC(NETWORK INTERFACE CARD) A network card, network...

Words: 3647 - Pages: 15

Premium Essay

Patton-Fuller

...they have the responsibility of providing good service and protecting each patient’s rights. The Health Insurance Portability and Accountability Act (HIPAA) outlines the principles and requirements that the hospital must use to ensure they are protecting patient’s rights. In the Patton-Fuller Community Hospital there are a large amount of Protected Hospital Information that needs to remain protected to meet the standards that HIPAA defines. The network is a 1000BASE-T, which supplies 1Gigabit of Ethernet connectivity over 5 cables (CAT5). This long-haul, copper-based standard is ideally suited for use within the data center because which is used in all the clinical areas of the hospital such as Emergency rooms ,Operating rooms, Pharmacy, Labs, doctor’s offices, Wards, Outpatient examining rooms, and Intensive Care Units (ICU’s) but the throughput of copper wire connections leaves room for improvement. The Administrative sections of the hospital such as IT Department, Admitting/Discharge, Facilities, Human Resources (HR), Finances, and Hospital Senior Management are using 1000BASE-T network structure. “The backbone network structure for the entire hospital is 1000BASE-T. Individual sections of departmental networks such as Radiology use different standards such as 1000 Base. ”  Patton-Fuller Community Hospitals current network topology- Patton-Fuller’s Logical Network is segmented into two distinct networks, Administrative Functions and Clinical Areas. The Administrative Functions...

Words: 3258 - Pages: 14

Premium Essay

Nt1210 Lab 3

...NT1210 Lab 3.1 3.1.1 You wouldn’t be able to communicate with other devices. You would have to go back to hardline phone and using mail service. No more on the go communications. 3.1.2 The OSI model. It actually shows the process. 3.1.3 Physical, Data, Link, Network, Transport, Session and Presentation. 3.1.4 If its too general the reader wont understand completely. And if its too focused or granular on details it will bore the reader. 3.2.1 Physical – Device Data Link – Physical address Network – Path determination Transport – End to end connections Session – internet Presentation – typing data Application – games, downloads ApplicationPresentationSession | Data | Transport | Segment | Network | Packet | Data Link | Frame | Physical | Bit | 3.2.2 3.2.3 First the receiving computer synchronizes with the digital signal by reading binary numbers. After synchronizing is complete and it gets the whole frame and passes it to the layer above it which is the Data Link layer. Second the Data Link layer will do a Cyclic Redundancy Check (CRC) on the frame. Checking for errors and then strip off any information or header which was put on by the remote systems Data Link layer and pass the rest to the Network layer. Third the Network layer checks the IP address and if it matches the Network layer header is stripped off from the packet and passed to the Transport layer. Fourth the Transport...

Words: 483 - Pages: 2

Free Essay

Ospf White Paper

...WHITE PAPER BIDIRECTIONAL FORWARDING DETECTION FOR OSPF Fast Failure Detection to Speed Network Convergence OVERVIEW In both Enterprise and Service Provider networks, the convergence of business-critical applications onto a common IP infrastructure is becoming more common. Given the criticality of the data, these networks are typically constructed with a high degree of redundancy. While such redundancy is desirable, its effectiveness is dependant upon the ability of individual network devices to quickly detect failures and reroute traffic to an alternate path. This detection is now typically accomplished via hardware detection mechanisms. However, the signals from these mechanisms are not always conveyed directly to the upper protocol layers. When the hardware mechanisms do not exist (eg: Ethernet) or when the signaling does not reach the upper protocol layers, the protocols must rely on their much slower strategies to detect failures. The detection times in existing protocols are typically greater than one second, and sometimes much longer. For some applications, this is too long to be useful. Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media. THE PROBLEM WITH CONVERGENCE The process of network convergence can be broken up into a set of discreet events*:...

Words: 6315 - Pages: 26

Premium Essay

HIPAA Violation In Healthcare

...taking the most proactive and easiest step to avoid violations in the future. Five. Social Media With the advent of social media, it seems that everyone has something to post online. From pictures of the office, to what they're working on today, nothing is free from the possibility of going up on an employees account. There are even some that will post up patient photos or other data. This is however a HIPAA violation. It might seem harmless so long as the name isn't mentioned, but it doesn't take much to put together pieces. Thanks to the 6 degrees of separation theory, it's very easy for the following to happen: Alice sees the picture online, and knows the person Alice recognize that the poster works at X Labs Alice takes to google and finds out that X Labs specializes in XYZ illness Alice now knows that the patient has or might have XYZ illness Make sure that all of your employees are aware that using social media to share any form of patient information is a violation and can easily result in jail time. Six. Social breaches In smaller towns and mroe rural areas it's very easy for an accidental breach of patient information to occur. A friend runs into their healthcare provider or clinician outside of the office and inquires about a mutal friend who is also a patient. Most patients aren't aware of HIPAA laws, and so they don't know that they are asking for their friend to breach that law. While these inquires do happen often, it's best to have responses planned...

Words: 1030 - Pages: 5

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Premium Essay

Nt 1210

...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Intro to Networking Lab 4.1

...NT1210 Lab 4.1 Copper Cabling Exercise 4.1.1 Why are standards so important for NICs, connectors, and media? Use your textbook and Internet research to justify your answer. Simple because Stability, Consistency, Minimization of packet errors. Exercise 4.1.2 The voltage for registering a bit of 1 on Ethernet can be as low as 2.5 volts or even 1 volt. Why is this so low when the capacity for transmitting electricity on the copper wire is so high? Use your textbook and Internet research to support your answer. Because the voltage (or current) used to transmit data needs only be high enough for the receiver to detect it. Making the voltage (much) higher would make the receiver electronics more difficult. Exercise 4.1.3 What are some applications of shielded copper cable? Why is the more expensive shielded cable used in these situations? Use your textbook or Internet research to support your answer. The extra covering in shielded twisted pair wiring protects the transmission line from electromagnetic interference leaking into or out of the cable. STP cabling often is used in Ethernet networks, especially fast data rate Ethernets. Exercise 4.1.4 Complete the entries in Table 4-1. Use your textbook and Internet research to compose your answer. The common connector for interfacing UTP wires to a computer for networking is the Registered Jack 45 (RJ-45) interface. This uses eight copper wires (four twisted pairs) to complete the connec- tion between interfaces. The pinout...

Words: 721 - Pages: 3

Free Essay

Analog Versus Digital

...| Analog and Digital Comparison | NTC/362 Fundamentals in Networking | EDWARD BROWN | Jose Giralt | 3/18/2013 | | A signal is simply the transmission of data from one place to another place. In our day to day life we deal with various signals constantly like signals from music, power lines, telephones, and cellular devices. Analog and digital are two kinds of signals which are used for the transmission of information from source to destination. Usually the information to be transmitted from one place to another is either audio or video. This information signal is then transformed into those signals which can be transmitted via different channels. For the analog format, the data is transformed into electrical pulses with varying amplitude while for the digital format; the data is transformed into binary format representing two amplitudes. We have various such equipment like analog or digital phones, fax machines, modems, clocks, watches etc. Analog technology is the older one and has been used for decades. It is cheap too but the problem with analog signals is that there is a limitation on the size of the data that can be transmitted at any given point of time. With the advent of digital technology many improvements and new techniques have been introduced. Now days almost every appliance or equipment is based on digital technology. In this, the transmitter translate the data into binary form and the receiver re assemble and produces the...

Words: 2433 - Pages: 10

Premium Essay

Protocols

...Lawrence Peterson ------------------------------------------------- LAB 3.1-3.4 3.1.1 – WHAT WOULD HAPPEN IF WIRELESS DEVICES WERE NOT GOVERNED BY THE WI-FI ALLIANCE AND EACH VENDOR HAD ITS OWN STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF...

Words: 996 - Pages: 4