...enable OSI device to communicate to another by exchanging information. (Goleniewski, 2007) The seven layers in the OSI model include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Each layer has its own functions and responsibilities. The four lower layers of the OSI model contain the physical, data link, network, and transport layers. The physical layer is layer 1, which is the bottom layer of the OSI model. It transmits and receives signals, as well as specifying the physical details of Ethernet cables and other hardware behavior. The functions of the physical layer include managing hardware connections, handle sending and receiving of binary signals and encoding of bits. (Cengage Learning, 2011) The data link layer, layer 2, is responsible for managing access to the network and provides physical addressing, device-to-device delivery of frames, media access control, and MAC addresses. Layer 3 is the network layer, which handles the logical addressing and routing of PDUs across internetwork. It handles packet routing and access control through packet inspection. Transport layer is the 4th layer of the OSI model and it is responsible for delivery of data streams across the network. The transport layer not only ensures reliable delivery of data but it also breaks data into segments, handles sequencing and provides flow control. The upper layers of the OSI model consist of three layers which include...
Words: 1073 - Pages: 5
...NT1310-Physical Networking Unit 1 Assignment 1: Voice VS Data 1. A cell phone is a mobile phone which can make and receive calls over a radio link. It connects to a cellular network which allows it to connect to the public telephone network. It uses both voice and data networks. 2. A landline phone is a device that has a physical connection with a telecommunication network. One big advantage landlines hold over cell phones is clear reception. Landlines offer both voice and data usage via broadband. 3. SMS stands for short message services It is the text messaging service component of mobile communication systems, phones or the web. It is the most widely used data application. It is used on data networks. 4. A Fax is the telephonic transmission of printed text and images to a telephone number connected to a device. It uses both analog and digital signals. It operates over both voice and data networks, and is a big reason why there are still landlines. 5. A Pager, also known as a Beeper, is a wireless communication device that receives numeric or text messages. It can also receive and announce voice messages. There are one way pagers which can only receive messages, and two way pagers which can send messages. The Pager uses both voice and data networks. 6. VOIP, or voice over IP is technology which enables the delivery of voice communications and multimedia sessions. Over internet protocol networks, VOIP involves signaling, channel setup, digitization of analog voice signals...
Words: 324 - Pages: 2
...Business Data Communications and Networking 9th Edition Jerry Fitzgerald and Alan Dennis 1-1 Introduction to Data Communications 1-2 Outline • Brief history of Data Communications – Communications, Information Systems and the Internet • Data Communications Networks – Network components, network types • Network Models – OSI model, Internet model, transmission via “layers” • Network Standards – Standards making, common standards • Future Trends – Pervasive networking, integration of voice, video, and data, new information services 1-3 Information Age • First Industrial Revolution – Introduction of machinery – New organizational methods – Changed the way people worked • Second Industrial Revolution – Information Age – Introduction of computers – Introduction of networking and data communication – Changed the way people worked again • Faster communication Collapsing Information lag • Brought people together Globalization 1-4 The Collapsing Information Lag Historical developments in electronic communications telegraph sped up the rate and volume of transmission of information 1850 Information took days or weeks to be transmitted 1900 Information transmitted in minutes or hours 1950 2007 large quantities of information transmitted in a fraction of a second growth of telecommunications and especially computer networks Globalization of networks 1-5 Advances in Phone Technology Phone invented 1876 first...
Words: 1962 - Pages: 8
...Assignment 1 Voice vs. Data Cellular phone can operate and provide between the two carriers of network voice communication and data are link to the same tower where both signals are being transmitted and connected to a mobile telephone switching office (MTSO) but the only issue is data is being more optimize with newer mobile phones and mobile applications meaning the user is going to be burning a lot more data storage than expected. Landline are both equipped with the same network comparison, landlines are largely involve with point-to–point access between the scribers and the central office point order for the physical connection to correspond with each other now for other conventional landlines that’s being used for security and survival standards such as police officers, firefighters, and military units that undergo through a leased lined from a provider order to received data transmission by telecommunication from a data line. SMS/Text message or short message service are more involve in the data networking area where all text messages are usually displayed normally from cellular phones and computers, now there phones required installation application for voice communication text message that allows the user of the cellular phone to send a text by voice leaving your hands free this is a new way to encounter better texting methods for voice control order to send and receive information for cellular interaction. Fax Machine can be operated for both services of voice communication...
Words: 511 - Pages: 3
...Chapter 1. Introduction to Data Communications Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc. 1 Copyright John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. Adopters of the textbook are granted permission to make back-up copies for their own use only, to make copies for distribution to students of the course the textbook is used in, and to modify this material to best suit their instructional needs. Under no circumstances can copies be made for resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein. 2 Chapter 1. Learning Objectives • Be aware of the history of communications, information systems and the Internet • Be aware of the applications of data communications networks • Be familiar with the major components of and types of networks • Understand the role of network layers • Be familiar with the role of network standards • Be aware of three key trends in communications and networking 3 Chapter 1. Outline • Introduction: The Information Society • Brief histories of: – communications,...
Words: 2770 - Pages: 12
...Enel571 Overview of Digital Communications Read “Background and Preview” section in Haykin PP 1-29 – – – – – – – What is digital communications? Short History of Digital Communications Why digital vs analog Impact of DSP technology trend Components of a communication system Common channel types General theme of digital communication engineering Digital comm overview.ppt 1 What is Communications? Physical separation Source of information Intended receiver Voice, text, numerical data Pictures, video Etc. Analog sources of information • Voice, video, are analog continuous time signals • No mapping of analog signal into a discrete alphabet of symbols • Eg. AM, FM etc. Digital sources of information • Text, data files etc. • Source data consists of symbols which are members of a finite discrete set. eg text • Digital source may have originated as an analog signal that was mapped into a discrete set of symbols. eg DVD Digital comm overview.ppt 2 Communications channel Physical separation Source Noise distortion Intended Receiver • Channel is always analog continuous time in nature • Regardless of whether source is analog or digital • Challenge for communications engineer is: – – – that channel resources are limited, power, bandwidth etc. Interference noise in channel Distortion effects Digital comm overview.ppt 3 What is Analog Communications then? Analog source Analog modulator ...
Words: 1186 - Pages: 5
...NT1210 Introduction to Networking Unit 1: Mid-Term Mid Term Review 1 Nibble, Byte, Word, Double Word Nibble, Byte, Word, Double Word Figure 1-2 2 Kilobyte, Megabyte, Gigabyte, Terabyte Size (2N Bytes) Term Size (Bytes) Kilobyte Megabyte Gigabyte Terabyte 1024 1,048,576 1,073,741,824 1,099,511,627,776 Kilobyte, Megabyte, Gigabyte, Terabyte 210 220 230 240 Rounded by Size (Bytes) 1,000 1,000,000 1,000,000,000 1,000,000,000,000 Table 1-1 3 Random Access Memory (RAM) Physically exists as set of microchips installed on plastic card (memory module) Central Processing Unit (CPU) uses RAM like people g ( ) p p use notepad Stores binary value so can use it later Can read data from RAM to recall value stored earlier CPU sends electrical signal over bus (electrical pathway) to communicate with RAM 4 Random Access Memory (RAM) (cont.) RAM uses address for each unique memory location where byte can be stored To write to RAM: CPU sends signal to RAM over the bus g to write (store) value into byte of RAM Address in RAM Value to be written To read from RAM: CPU uses similar process (see example in Figure 1-3 on next slide) 5 CPU Reads Byte 4 from RAM The CPU uses the same bus to read the current value of a byte in RAM as it does to send a message to RAM. The read request lists the address of the particular byte, asking for its value. RAM returns the binary value stored at that address. CPU Reads Byte 4 from RAM 6 Figure 1-3 Writing Individual Bits in Byte 4 of RAM...
Words: 11596 - Pages: 47
...model is comprised of seven layers, with layer one positioned at the bottom of the layer stack and layer seven at the top. The layers have assigned names as well as number references. Layer 7, the application layer, is the interface between the protocol stack and application software. The software might be client or utilities or server services. It is the ability of software to communicate with the standardized interface of application layer protocols that makes network communications possible. Layer 6, the presentation layer, establishes the context between disparate application layer protocols. Effectively, the presentation layer adjusts syntax, semantics, data types, data formats, etc. This layer ensures that data sent by the application is compatible with the lower layers of network communication and that data received from the network is acceptable to the receiving software. Layer 5 manages the connections between computers. Connection management includes establishing, maintaining and terminating the links between network systems. This layer provides for full-duplex, half-duplex, and simple communications (i.e. two-way simultaneous, two-way one-way-at-a-time, and one direction only). This layer...
Words: 2317 - Pages: 10
...Physical Networking Unit 1 Lab 1 Data on fixed Line vs. Cellular Debate In this paper I will go over the pros and cons of having a fixed line network vs. a cellular network. When making this decision there are several things to consider, the most important is what this network is going to be used for. I am going to first go over the fixed line network then follow up with the cellular network. At the end of this paper I will do a recommendation to a new company that wants to open up a Skype- style service as to whether they should use a fixed line or a cellular network. Fixed line telephones was the main form of communication in 1877 and this was the case up to the time when cellular phone came into the world. Fixed lines are in every home and building today so everyone has the ability to have telephone and data service. To receive or transmit data over the fixed line a modem is needed on each end of the line. The modem takes the digital information and turns it into tones that have been specifically selected for the transmission over the telephone network. The modem on the other end is responsible for turning the tones back into the digital data. Modems transmit data over a telephone network that is designed for voice so the data rates were limited until digital subscriber line (DSL) was introduced. DSL utilizes the existing analog phone line so no need for new equipment other than modems that can convert the digital data into high-frequency tones along with a filter at...
Words: 1223 - Pages: 5
...NT1210 Introduction to Networking Introduction to Computer Networking 1 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks and how they are applied to various types of enterprises. Explain the functionality and use of typical network protocols. Use preferred techniques and necessary tools to troubleshoot common network problems. 2 Objectives Define a computer network. Identify the primary needs for computer networks and network applications. Draw the four major physical network topologies: bus, star, ring, and mesh. 3 Computer Networking Use large variety of components that must work together. Move bits from one device to another. Bit: Smallest unit of data, binary 1 or 0. Focuses on copying bits on one device to another. Computing devices include computers, gaming systems, televisions, phones, tablets, GPS navigation systems, watches, etc. 4 Defining a Network with User Applications Examples: Digital advertising, online/video games, text messages, websites, social media, and email. Network diagrams often use cloud to identify what part of network to ignore for a particular discussion. LAN vs WAN 5 Defining a Network with User Applications Computer Networks: Cloud Representing Hidden Parts of the Network 6 Figure 2-1 An Informal General Definition of a Computer Network Telecom: Short for telephone communications ...
Words: 4305 - Pages: 18
...available using VOIP. La Jolla will have 19 total VOIP phones in order to accommodate the number of corporate administrators, the Del Mar and Encinitas facilities will only have 6 VOIP phones. The standards being applied to this project are LAN, WAN, Wireless, and VOIP. A LAN or local area network is created when multiple computers or devices are connected as a network providing services and applications within a common structure such as a single business, campus or region. A LAN is generally governed by the organization by an administrator who controls the policies, security and access control. Essential components of a working LAN is the workstation computers, data server, networking switch and the outward facing router. The WAN, or wide area network, is created when multiple LANS are essential. However if the physical facilities are geographically too far apart to be maintained as a unified LAN would require the services of third...
Words: 2182 - Pages: 9
...Mobile computing and social networks are part of the daily lives of millions of Americans. “48% of American adults own a mobile computing device in some form according to the latest Nielsen data.” (Knott, 2012) As far as social networking site usage “over 65% of all internet users in the United States use social networking sites.” (Brenner, 2012) It is obvious that mobile computing and social networking on the web is not a passing fade. There are many uses and applications for mobile computing and social networks. In this paper a few of these aspects will be examined. First an assessment will be made as to the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Second, an evaluation of the benefits realized by consumers because of the ability to gain access to their own data via mobile applications will be completed. Third, the challenges of developing applications that run on mobile devices because of the small screen size will be examined. Forth, the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android will be described. Fifth, due to mobile applications requiring high availability because end users need to have continuous access to IT and IS systems, a discussion of the ways of providing high availability will be undertaken. Finally, because mobile devices are subjected to hacking...
Words: 3603 - Pages: 15
...Design The integrative network design project for Kudler Fine Foods will include Transmission Control Protocol/ Internet Protocol (TCP/IP) will be used as a means of communication within a private network or the internet for Kudler Fine Foods network devices. Hypertext Transfer Protocol (HTTP) is used for transfer of multimedia files, video, sound, and text over the internet. Kudler Fine Foods will implement File Transfer Protocol (FTP) to download files, transfer files, delete files, copy and rename files from the internet as needed. Mesh Protocol will be used to connect all devices such as printers, computers, and scanners on the network. In a true mesh topology every node has a connection to every other node in the network ("Common Physical Network Topologies ", 2014). The network will consist of a hardware firewall blocking unwanted access from outside of the location. The next step is to set up a hub or switch that will connect all of the stores terminals. All of these terminals such as registers and remote locations such as warehouse will be hardwired with twisted pair CAT 5 Ethernet cable. The server will be located in a room in each store with the hub or switch. A wireless access point/router will be centrally located in the store to provide good signal in every part of the store for employees using their handheld devices to be able to view and update the store inventory while on the sales floor Since the blade servers are easily expanded upon, cost efficient...
Words: 4817 - Pages: 20
...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...
Words: 10839 - Pages: 44
...Know who to ask. Identify key players & key groups from organization chart. 2 types of key players: Information sources – explain business strategies, long-term plans, business requirements. Decision makers – approve overall network design or establish funding levels. Normally information sources & decision makers are from the same person. However, it can be from different person. Key factor - Timing. Time constraint – Completion deadline. Require project plan for tracking project activities, key players & required dates. Business Requirements: Funding Levels 7 8 Funding Considerations Major constraint. Management issue. Top management must get involved. Must consider recurring & nonrecurring costs. Cost Factor Networking Hardware Networking Software UPS RAID Virus Protection...
Words: 2076 - Pages: 9