Free Essay

Wired Lines

In:

Submitted By jeanyesjedeye
Words 1044
Pages 5
Wired Media Wired transmission lines are physical systems that are used to transmit certain physical quantities. They consist of a collection of a set of conductors made up of good conductors of electricity, like copper and aluminum, and a wire. Some transmission lines used are t-1, t-3, OC lines, DSL, dial-up, and cable lines.
A T-1 line is a copper or fiber optic telephone line that can carry more data than traditional dial-up lines. These lines were originally made with twisted copper. T-1 lines are still being made, but the standard is slowly being upgraded to fiber optic lines. T-1 lines can transmit 1.544 Mbps. They connect geographically separate offices through a private voice and/or data connection. It is very useful for small businesses and commercial buildings with more than 8 lines. Getting a T-1 line is costly (around $1,500 a month), however it could save money for companies who have many phone lines.
T-3 lines are a collection of about 28 T-1 lines that can transmit data at 44.736 Mbps. Obviously they are faster than T-1 lines, because they have a collection of 28 T-1 lines. They are used for longer distances than T-1 as well. Similar to T-1 lines, they are used to connect geographically separate offices through a private voice and/or data connection. They cost upwards of $3,000 a month to operate so not all small businesses can afford to have a T-3 line.
Optical Carrier lines (OC lines), are a part of the Synchronous Optical Network (SONET). OC-1 is the base rate of Optical Carrier lines. This rate is 51.84 Mbps. These speeds go up to 40 Gbps with OC-768 levels. The integer behind the OC is the multiple of OC-1 rates (51.8 x n for OC-n).
OC 768 consists of a SONET ring to maintain its reliability during high-speed transmissions. It is so much more efficient than a single T-1 line. In fact, It is capable of transmitting 516,096 voice channels at the same time. It takes 21,504 T-1 lines to even have that many channels. Usually, Communication providers are the consumers of OC lines because of them having to be able to provide service to others. Most businesses cannot afford this expensive transmission lines.
Digital Subscriber Line (DSL) is a technology for bringing high-bandwidth information to homes and small businesses over ordinary telephone lines. There are 3 different variations of DSL. HDSL (High bit-rate DSL) is used mainly in corporate companies or between telephone companies and customers. Unlike ADSL, HDSL is symmetrical. This means that the upstream and downstream speeds are equivalent, so sending email and receiving email all flows at the same time. Which explains why corporate sites are the main users. Upstream and downstream rates reach up to rates of 1.544 Mbps on a single wire.
Another breed of DSL is ADSL (Asymmetric DSL). ADSL is the form of DSL that most homes and small businesses use. It is called Asymmetric because most of its duplex bandwidth is devoted to the downstream direction, sending data to the user. This is because most people downstream data more than they upload it to websites and other users. This helps us get what we want from our Internet faster than we would if it was asymmetric like HDSL. Downstream speeds reach up to 6.1 Mbps while upload speeds reach 640 kbps.
RADSL (Rate-Adaptive DSL) is a type of ADSL technology developed by Westell. It uses software to determine the rate at which signals can be transmitted for a given customers phone line. The better the phone line, the higher rate you will receive. Their system delivers minimum downstream at 640 kbps and their maximum is 2.2 Mbps and minimum upstream from 272 kbps up to the maximum of 1.088 Mbps all over an existing line. DSL may be not as effective as cable depending on where you are located to your provider. A DSL user must be no more than 18,000 feet away from the phone office, and the farther the user is from the phone office, the lower the bandwidth and rate of data transfer. Technical difficulties with the home's phone lines can result in lowered bandwidth, and interruptions of Internet service.

Dial-up uses the facilities of public switched telephone networks (PSTN) to establish a dialed connection to an Internet service provider (ISP) via telephone lines. Dial-up is one of the cheapest communication connections there is. Rural and remote areas still use dial-up because they it is too expensive for Internet providers to get other services out to them. The upside is that it is so affordable and easy to obtain. All that is needed to start a dial-up connection is a telephone line. However, the downside of dial-up is the extremely slow transmission rate compared to other lines and an increasing amount of Internet content such as streaming media will not work at dial-up speeds. Even at speeds up to 320 kbps with compression hardware assistance, it is still less than half the speed of cable and DSL.
The advantages of Dial-up connection are that they are cheap and secure. They are also offered in just about everywhere. Weaknesses are that you must have a phone line, and the speeds are very slow
A Cable modem is similar to an ADSL system, but instead of coming from a telephone provider through telephone lines, it comes from a cable provider through your cable TV line. Cable lines can receive up to 1.5 Mbps, which is not as fast as DSL, but you would not need to have a telephone line to receive the cable transmission. The actual bandwidth for Internet service over cable TV line is up to 27 Mbps downstream with 2.5 upstream, however, the local provider is probably not going to be connected to the Internet with lines faster than a T-1 system. So it is said that the more likely rate that will be received from a cable line is around 1.5 Mbps.

Similar Documents

Free Essay

Avoid the Crowd

...crowdsourcing. Nor is asking them to take “action shots” of your product in use that they would, in turn, post on their company blog. Just two of the many healthy ways companies interact with their customers, to say nothing of using social media outlets like Facebook or Twitter to start a conversation. For our purposes, I’ll narrow down what crowdsourcing is to this: Asking people to compete against each other to produce significant branding collateral for only the promise of pay to the ultimate winner. Here’s how it works: Let’s say, for instance, a company needs a new logo. That company turns to the “crowd” – you, me and everyone else out there who wants to participate with the promise that, if chosen, there’s money waiting at the finish line. We submit our designs, the company picks a “winner” and they get the money. The company gets what they want, most likely at a very nominal cost. Sounds good, right? Some lucky designer might get a really prominent piece for his or her portfolio. The company gets new...

Words: 1534 - Pages: 7

Premium Essay

Innovation

...1. How would you define crowd sourcing? Crowd sourcing is the application of the open source idea to any field outside of software, taking a function performed by people within the organization, such as reporting done by journalist. 2. Why does crowd sourcing require a large, "undefined community" to work? Why not a small, defined community of passionate people who you know and have worked with before or with whom you are already friends (think Face book communities which are smaller, and defined)? Crowd sourcing require a large undefined community because it is said to be more accurate and concise. Large aggregates produce better estimates and judgments than smaller groups. Decisions come from diverse backgrounds. Wisdom of the crowd is another type of crowdsourcing that collects large amounts of information and aggregates it to gain a complete and accurate picture of a topic, based on the idea that a group of people is often more intelligent than an individual. This idea of collective intelligence proves particularly effective on the web because people can contribute in real-time within the same forums from very diverse backgrounds 3. Can you think of other examples of crowd sourcing besides photography? Is photography a good example? What kinds of products or services might not lend themselves to crowd sourcing? Mobs, herds and runaway stock markets produce bad decisions from crowdsourcing. 4. What is the impact of crowd sourcing on business? Can...

Words: 363 - Pages: 2

Free Essay

Ano Ang Bibliograpiya Ng Pahayagan

... bullying and terrorism. What are the basic element of computer network? 1.End devices also known as host :The sources and destinations of the communication . These devices act as the interface between the end users and the underlying network. Examples: Computers, mobile phones etc.  2. Intermediary devices: Devices that give network access to the attached end devices and transport the messages between hosts. Usually, transparent to the end users. Also, these devices accomplish communication functions in order to ensure the success of the communication process. Examples: Hubs, switches, routers, modems, firewalls, etc.  3. Transmission media: The physical media that connects the devices, enabling the exchange of messages between them. It may be wired or wireless.  4. Services: Network-aware software applications (e.g., a web browser) that request network resources (e.g., data) in order to enjoy the end user of the application some provided service (e.g., World Wide Web).  5. Processes: Software that runs on network devices in order to support the communication functions - in accordance with the established, also in software, communication rules or protocols - and facilitate the provision of services to the end users. In contrast with the services, processes are transparent to the end users.  6. Messages: Well-known applications. Includes...

Words: 524 - Pages: 3

Free Essay

Wlan Security

...Practical WLAN security Abstract This report covers the basics security standards in today’s wireless networks, how they work, existing flaws and vulnerability’s. We will go trough the basic architecture of 802.11, the security it provides like WEP, WPA and WPA2. Further more we will go trough some practical experiment exploiting the flaws described in the article. The result of our practical experiments show upon how easy it is to break encryptions and deploying Evil twins, even with very little understanding of the security structure. 2.1 802.11 Standards The architecture of the wireless LANs is specified by the 802.11 standard created by IEEE [1]. There are a few versions of the standard with differences in frequency and speed. Briefly these are a few of the current standards 802.11 (1997): 2.4Ghz, 2Mbps 802.11a (1999): 5Ghz, 54Mbps 802.11b (1999): 2.4Ghz, 11Mbps 802.11g (2003): 2.4Ghz, 54Mbps Even when things like speed and frequency differ, most things are the same as the original 802.11 standard. They all are using the same medium access protocol, CSMA/CS and have features for increasing range by the cost of speed. They also support the two connection modes of ad-hoc and infrastructure, but since this reports is about practical WLAN security we'll not go any further in on that and just care about the infrastructure mode. 1. Introduction Where ever you go, either it’s an workplace, coffeeshop, library or even a park there is a high chance today that...

Words: 4798 - Pages: 20

Premium Essay

Wireless Tutorial

...Wireless Hacking – Haifux Wireless Hacking Edri Guy Mar 04 ,2013 See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux DISCLAIMER 1 – The following discussion is for informational and education purpose only. 2 – Hacking into private network without the written permission from the owner is Illegal and strictly forbidden. 3 – Misused could result in breaking the law so use it at your own risk. See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Overview ● We're going to learn how WiFi (802.11) works ● Start with terminology ● Types ● Vulnerabilities ● Attacking them ● Surprise demonstration of....:) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● AP - Access Point MAC – Media Access Control a unique id assigned to wireless adapters and routers. It comes in hexadecimal format (ie 00:11:ef:22:a3:6a) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● BSSID – Access Point's MAC Address ESSID - Access Point’s Broadcast name. (ie linksys, default, belkin etc) Some AP’s will not broadcast their name,But Airodump-ng can guess it. See-Security Mar 04 2013 – Wireless...

Words: 2941 - Pages: 12

Free Essay

Math Doc Unit 1

...1a. Answer: (1.0, 228,000), (2.0, 216,000) 1a. Key work steps 1b. Answer: $-12,000 1b. Key work steps Since M= y2-y1/x2-x1 then M= 216,000-228,000/2.0-1.0 M=-12,000/2.0-1.0 M=-12,000/1.0 M=-12,000 1c. Answer: Y= (-12,000)*x+240,000 1c. Key work steps Since Y=mx+b then and do figure m we use the formula m= (y2-y1)/(x2-x1) I know now what m is in my equation in this situation it’s -12,000 and to figure b is just the Y intercept which in this case is 240,000. So I get my linear equation Y= (-12,000)*x+240,000. 1d. Answer: $126.000 1d. Key work steps Now if this depreciation were to continue until 2019 then we use our formula to determine the value of the plane. Y=(-12,000)*x+240,000 now x is the number of years from the end of our graphing years which was half way through 2009. So in this case x will = 9.5 years now to plug this in. Y=(-12,000)*9.5+240,000 Y=114,000+240,000 Y= $126,000 2a. Answer: L=w-5 2a. Key work steps 2b. Answer: Width= 22.5 inches, Length is 17.5 inches 2b. Key work steps Since p=2L+2W and our equation L=W-5 then P=2(W-5)+2W P=2W-10+2W P=4W-10 We know that in this case P=80 inches so 80=4W-10 80+10=4W-10+10 90=4W 90/4=4W/4 22.5=W and since we know L= W-5 then L= (22.5)-5 L= 17.5 3a. Answer: C= $225+$10(x-2), C=(25x) 3a. Key work steps 3b. Answer:16.3 inches is needed 3b. Key work steps Our inequality for this problem is...

Words: 334 - Pages: 2

Free Essay

Xrdctfvygbhnijm

...maths a. the angle between a line on a graph and the positive limb of the x-axis b. the smaller dihedral angle between one plane and another 7. (Astronomy) astronomy the angle between the plane of the orbit of a planet or comet and another plane, usually that of the ecliptic 8. (General Physics) physics another name for dip28 ˌincliˈnational adj Collins English Dictionary – Complete and Unabridged © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003 in•cli•na•tion (ˌɪn kləˈneɪ ʃən) n. 1. a special disposition of the mind or temperament; a liking or preference: a great inclination for sports. 2. something to which one is inclined. 3. the act of inclining or state of being inclined. 4. a tendency toward a certain condition, action, etc. 5. deviation or amount of deviation from a normal, esp. horizontal or vertical, direction or position. 6. an inclined surface. 7. a. the angle between two lines or two planes. b. the angle formed by the x-axis and a given line. [1350–1400; Middle English < Latin]1. (often foll by: for, to, towards, or an infinitive) a particular disposition, esp a liking or preference; tendency: I've no inclination for such dull work. 2. the degree of deviation from a particular plane, esp a horizontal or vertical plane 3. a sloping or slanting surface; incline 4. the act of inclining or the state of being inclined 5. the act of bowing or nodding the head 6. (Mathematics) maths a. the angle between a line on a graph and the...

Words: 4637 - Pages: 19

Free Essay

Definitions

...greater than one. This constant is also known as the eccentricity. * Archimedean Spiral The path traced out by a point along a rod, as the rod pivots about a fixed end. The linear movement of the point along the rod is constant with the angular movement of the rod. * Involute The path traced out by a point when an end of a plane figure is wrapped or unwrapped when held firm. * Epicycloid Tracing the path of a point as a circular disc rolls on the outside of a larger disc. * Hyper cycloid Tracing the path of a point as a circular disc rolls on the inside of a larger disc. * Superior Trochoid A Superior Trochoid is the path or Locus of a point which lies on the outside of a circle when it rotates along a straight line without slipping. * Inferior Trochoid An Inferior Trochoid is the path or Locus of a point which lies on the...

Words: 359 - Pages: 2

Free Essay

Business Letter

...can position the date on the right or on the left of your letter. Recipent’s name and address Beneath this, you should put the recipient’s name and address, just as it would appear on the envelope. If you’re using a window envelope, make sure it’ll show through when the paper is inserted. The recipient’s name and address should be positioned on the left-hand side. The Greeting After their address, you should leave a line’s space then put “Dear Mr Jones”, “Dear Bob” or “Dear Sir/Madam” as appropriate. Follow this with a comma. The greeting should be left-aligned. The Subject You may want to include a subject for your letter — this is often helpful to the recipient, especially if they receive a lot of mail. If you do include a subject line, this should be directly below the “Dear name”, centered on the page, and can be in bold, uppercase or both to make it stand out. The Text of your Letter The main body of...

Words: 475 - Pages: 2

Premium Essay

Vision

...before examining the actual context, it is also important to look at the form of the poem, which also plays a puissant role. First of all, and most noticeable, is the continual use of dashes, which adds a lingering essence, as if foreshadowing the death. The dashes also signify power and unanswered questions about death and, perhaps, whether or not an afterlife exists. Another aspect of the form is how it is broken up into stanzas expressing differing ideas in each one. By braking up such ideas, it is easier to analyze the varying aspects of death that Ms. Dickinson believes are imperative when expressing what she is feeling prior to her death. The first stanza starts off repeating the title, “I heard a Fly buzz—when I died—“ (line 1). These words, though odd, are explained through the rest of the stanza, as the insignificance of the sound of a fly’s buzz is magnified, thus becoming extreme, compared to “The Stillness in the room” (2). This “Stillness” is then related to the “Stillness in the air” (3). Though the “Stillness” causes the buzzing sound to take strength, “Stillness”, in this stanza, takes on a double meaning, which is representative of death as well. The second stanza differs from the first in that, as she lies in her bed, observers, who express their own emotions while witnessing her final moments, surround her. “The Eyes...

Words: 885 - Pages: 4

Free Essay

Mathe Formulae

...1 SOME IMPORTANT MATHEMATICAL FORMULAE Circle : Area = π r2; Circumference = 2 π r. Square : Area = x2 ; Perimeter = 4x. Rectangle: Area = xy ; Perimeter = 2(x+y). 1 Triangle : Area = (base)(height) ; Perimeter = a+b+c. 2 3 2 Area of equilateral triangle = a . 4 4 Sphere : Surface Area = 4 π r2 ; Volume = π r3. 3 2 3 Cube : Surface Area = 6a ; Volume = a . 1 Cone : Curved Surface Area = π rl ; Volume = π r2 h 3 π r l + π r2 Total surface area = . Cuboid : Total surface area = 2 (ab + bh + lh); Volume = lbh. Cylinder : Curved surface area = 2 π rh; Volume = π r2 h Total surface area (open) = 2 π rh; Total surface area (closed) = 2 π rh+2 π r2 . SOME BASIC ALGEBRAIC FORMULAE: 1.(a + b)2 = a2 + 2ab+ b2 . 2. (a - b)2 = a2 - 2ab+ b2 . 3.(a + b)3 = a3 + b3 + 3ab(a + b). 4. (a - b)3 = a3 - b3 - 3ab(a - b). 2 2 2 2 5.(a + b + c) = a + b + c +2ab+2bc +2ca. 6.(a + b + c)3 = a3 + b3 + c3+3a2b+3a2c + 3b2c +3b2a +3c2a +3c2a+6abc. 7.a2 - b2 = (a + b)(a – b ) . 8.a3 – b3 = (a – b) (a2 + ab + b2 ). 9.a3 + b3 = (a + b) (a2 - ab + b2 ). 10.(a + b)2 + (a - b)2 = 4ab. 11.(a + b)2 - (a - b)2 = 2(a2 + b2 ). 12.If a + b +c =0, then a3 + b3 + c3 = 3 abc . INDICES AND SURDS m n mn (ab)m = a m b m am 1. am an = am + n 2. = a m − n . 3. (a ) = a . 4. . an m am −m = 1 a 5.   = . 6. a 0 = 1, a ≠ 0 . 7. a . 8. a x = a y ⇒ x = y m am b b 9. a x = b x ⇒ a = b 10. a ± 2 b = x ± y , where x + y = a and xy = b. S B SATHYANARAYANA ...

Words: 2819 - Pages: 12

Premium Essay

Mgt 496 Week 1 Quiz

...O.Q.) is a balance of ____________ and __________. Question 3. Which of the following statements are true about independent or random demand? Question 4. The supply chain does not need an order to operate. Question 5. Which of the following is a technique to reduce demand lead time variability (L.T.V.)? Question 6. The relationship between cost and service is always a straight line. MGT 496 WEEK 1 QUIZ To purchase this visit following link: http://www.activitymode.com/product/mgt-496-week-1-quiz/ Contact us at: SUPPORT@ACTIVITYMODE.COM MGT 496 WEEK 1 QUIZ MGT 496 Week 1 Quiz 1.Question : Which of the following is NOT an example of independent demand? Question 2. Economic order quantity (E.O.Q.) is a balance of ____________ and __________. Question 3. Which of the following statements are true about independent or random demand? Question 4. The supply chain does not need an order to operate. Question 5. Which of the following is a technique to reduce demand lead time variability (L.T.V.)? Question 6. The relationship between cost and service is always a straight line. MGT 496 WEEK 1 QUIZ To purchase this visit following link: http://www.activitymode.com/product/mgt-496-week-1-quiz/ Contact us at: SUPPORT@ACTIVITYMODE.COM MGT 496 WEEK 1 QUIZ MGT 496 Week 1 Quiz 1.Question : Which of the following is NOT an example of independent demand? Question 2. Economic order quantity (E.O.Q.) is a balance of ____________ and __________. Question...

Words: 733 - Pages: 3

Premium Essay

Wireless Hacking Presentation

...Wireless Hacking – Haifux Wireless Hacking Edri Guy Mar 04 ,2013 See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux DISCLAIMER 1 – The following discussion is for informational and education purpose only. 2 – Hacking into private network without the written permission from the owner is Illegal and strictly forbidden. 3 – Misused could result in breaking the law so use it at your own risk. See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Overview ● We're going to learn how WiFi (802.11) works ● Start with terminology ● Types ● Vulnerabilities ● Attacking them ● Surprise demonstration of....:) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● AP - Access Point MAC – Media Access Control a unique id assigned to wireless adapters and routers. It comes in hexadecimal format (ie 00:11:ef:22:a3:6a) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● BSSID – Access Point's MAC Address ESSID - Access Point’s Broadcast name. (ie linksys, default, belkin etc) Some AP’s will not broadcast their name,But Airodump-ng can guess it. See-Security Mar 04 2013 – Wireless...

Words: 2941 - Pages: 12

Free Essay

Airborne

...Airborne Jumping out of an airplane is a life experience one will never forget. People have different reasons for doing it. Some people skydive for the sport of it. It is an exhilarating and adrenaline pumping experience. I jumped out of an airplane to earn my airborne wings in the army. It all started in Airborne School, during ground week, where we were taught how to land safely and dawn a parachute. During tower week, the second week of training, we learned pre-jump preparations and how to properly exit an airplane. Finally, the third week of training came: jump week. My classmates and I made five jumps from a C130 aircraft. Two of the jumps were with just a parachute, known as Hollywood jumps. Two of the jumps were with full combat loads. One of the combat jumps had to be at night so that we could earn our jump wings. I woke up at “zero dark thirty”; a phrase that means before dawn in the army. I rolled out of bed sore from the two weeks of five mile runs every morning in full uniform and boots. My legs hurt from jumping from platforms and throwing myself to the ground learning to land correctly. I stood in formation, half asleep, while the airborne instructors briefed us for the events of the day. The airborne instructors are called Black Hats because of the black baseball caps that they wear with their rank and wings pinned to the front. That morning, our class had to jog three miles to the air field to get our Jump Master brief. I felt a slight chill in my bones...

Words: 990 - Pages: 4

Premium Essay

Arindam

...world's contracted thus; Thine age asks ease, and since thy duties be To warm the world, that's done in warming us. Shine here to us, and thou art everywhere; This bed thy centre is, these walls, thy sphere. (5) (10) (15) (20) (25) (30) 17. both the'Indias: the East Indies was famous for spices; the West Indies for gold and silver (mines.) 24. alchemy: false gold. Questions on Donne's "The Sun Rising" 1. _____. In the first stanza of the poem the speaker is: a. surprised at how late he has slept. b. wishing he were a king. c. annoyed at the sun for waking him and his lover. d. grateful that the sun has wakened him and his lover. e. comparing the sun unfavorably to his lover. 2. _____. The use of the word fool in line one is an example of: a. personification. b. irony. c. oxymoron. d. simile. e. iambic pentameter. 3. _____. "Saucy, pedantic wretch"...

Words: 1665 - Pages: 7