Free Essay

Nt1210

In: Computers and Technology

Submitted By bobbyt4321
Words 374
Pages 2
Chapter outline: * Sending bits with electricity and copper wires * (AC)
(AC)
Sending bits with light and fiber-optic cables * Frequency
Amplitude
Phase
Frequency
Amplitude
Phase
Sending bits with radio waves and no cable

Electrical Current – the amount of electricity that flows past a single point
Electrical Current – the amount of electricity that flows past a single point

Sending voiceand data from mobile phones through wireless wan
Data: amplitude and phase shift
Sending voiceand data from mobile phones through wireless wan
Data: amplitude and phase shift
Direct Current (DC) – flows in one direction.
Alternating Current (AC) – changes direction over time.
Direct Current (DC) – flows in one direction.
Alternating Current (AC) – changes direction over time.
Creating Circuits using Network Cable
Creating Circuits using Network Cable

Sending Bits with Radio Waves and No Cables (Wireless)
Sending Bits with Radio Waves and No Cables (Wireless)
Sending Data over Electrical Circuits
Sending Data over Electrical Circuits
Flexible cord with an outer plastic cover ( jacket) that holds wires (conductor).

Flexible cord with an outer plastic cover ( jacket) that holds wires (conductor).

-Bit rate over 1 circuit
-Encoding bit over 1 circuit
-Sending bits over multiple circuits

-Bit rate over 1 circuit
-Encoding bit over 1 circuit
-Sending bits over multiple circuits

SENDING BITS (DATA) USING ELECTICITY, CABLES, RADIO WAVES, AND WIRELESS
SENDING BITS (DATA) USING ELECTICITY, CABLES, RADIO WAVES, AND WIRELESS Radio waves- have energy level, can be changed and sensed by networking devices.
Wireless WAN and LAN- both use radio wave and no cables; mobile phone networking
Radio waves- have energy level, can be changed and sensed by networking devices.
Wireless WAN and LAN- both use radio wave and no cables; mobile phone networking
The basics of Optical transmission
-Fiber Optic cable
-Fiber Optic transmitters
-Fiber Optics in Ethernet
-Fiber Optics in LAN, WAN
The basics of Optical transmission
-Fiber Optic cable
-Fiber Optic transmitters
-Fiber Optics in Ethernet
-Fiber Optics in LAN, WAN
Sending Bits with Lights and Fiber-Optic Cable
Sending Bits with Lights and Fiber-Optic Cable
Using Ethernet LANs
Using Ethernet LANs
-UTP- unshielded twisted-pair.
-Bit rate and encoding.
-RJ-45 connectors and sockets.
-Ethernet cable pinpoint

-UTP- unshielded twisted-pair.
-Bit rate and encoding.
-RJ-45 connectors and sockets.
-Ethernet cable pinpoint

T…...

Similar Documents

Premium Essay

Nt1210 Midterm Study Guide

...NT1210 Midterm Study Guide * The term troubleshooting refers to finding a problem and evaluating it so that corrective action can be taken. * Extensive digitization is a process that began in the 1960s. * Networks have more than just a physical component. * International standards-setting bodies can affect standards established in the United States. * A bus topology does not form a closed loop. * The bit interval is the duration it takes a single bit to be transmitted. * Data communications is a subset of telecommunications. * Data can include or convey graphic images, sound, or video files. * The physical layers of the OSI and TCP/IP models are very similar. * The data communications phase associated with digitization is the first phase. * The portion of an IP address from which bits are borrowed when subnetting is the host. * The transport layer ultimately passes data up to the application layer. * A MAC address is associated with the Data Link Layer. * An IP address is associated with Network Layer. * Twisted pair, Coaxial and Fiber Optic are types of cable * The capacity of a circuit to carry data is its bandwidth. * A 32-bit bus can handle four times the data bits as an 8-bit bus. * LAN resources might include software, hardware and data. * Data bits are frequently passed through pins in a connector. * Synchronous protocols are the type of data link protocols primarily used to......

Words: 355 - Pages: 2

Premium Essay

Nt1210 Final Exam Notes

...NT1210 Introduction to Networking Final Exam Notes Bonus questions from lab work: Chapter 1 12-13 15 Chapter 2 48 Chapter 3 62 Chapter 4 86 Chapter 6 132 Chapter 8 148 Chapter 9 165 Chapter 10 177 Textbook questions: Page Note 4 Byte – 8 bits 84 Essentially, link refers to any cable between two devices, and node refers to any device. 77 HTTP, the Hypertext Transfer Protocol, defines the rules by which a web browser can ask for a web page from a web server, and the rules a web server uses to send the web page back to the web browser. 107 Every standard has two important features on which this book will focus. First, a standard documents ideas. Those ideas are the ideas that matter to anyone creating products to put in a network, or ideas that matter to people building a network. 107 Beyond the ideas in a standard, people must agree to a particular version of document. 110 The TCP/IP model organizes its standards into layers. The layers make TCP/IP easier for humans to understand what TCP/IP does. It also makes it easier to divide the work among different products. * - write protocols, - create standards, - how networks work* 162 Simple Direct Current Circuit Using a Battery Current 169 Encoding scheme – In networking, the encoding scheme defines the electrical equivalent: the electricity that means a 1 or a 0. *Interpreted between nodes.* 171 With full duplex, both endpoints can send at the same time,......

Words: 1336 - Pages: 6

Free Essay

Nt1210

...NT1210 Unit 4 Labs Unit 4 Labs NT1210 8/4/14 Unit 4 Labs Lab Review: 4.1 – Page: 82 and 83 1. To eliminate the crossover issue, lower the amount of equipment and cost. Simplify a network. 2. To increase the maximum distance for a signal. If put after the maximum distance the signal may degrade. 3. The connection and processing speed. It also depends on the number of connections the computer or laptop will allow. Lab Review: 4.2 – Page: 85 1. A. Bend Radius: The minimum radius that a fiber optic cable can be bent without loss of light or impairment. A general rule that it be no less than 15 times the cable diameter B. To not affect a signal sent down the line. 2. The core/Glass Filament, Cladding, Buffer, Strengthener and Outer Jacket. Lab Review: 4.3 – Page: 90 1. Ease of installation, lack of certified fiber optic specialists and changes to the physical design of the network later on. 2. By limiting the devices needed depending on the distance and need of each network. Verify the number of access points needed before the start. Lab Review: 4.4 – Page: 95 1. By selecting a specific layer and testing the health you can definitively say the problem lies either below or above that layer. Example: test the Transport layers health if it is ok you know the problem is in the Application layer. 2 A. B. If the cable is damaged in any way it should be checked. ----------------------- 3...

Words: 255 - Pages: 2

Free Essay

Nt1210 Essay

...Robin Woodruff NT1210 8/8/2014 Mrs. Oliver 1 Comparison between Microsoft and VMware With the Microsoft Cloud OS vision, people get one consistent platform that goes beyond just virtualization, and includes management, automation, development platform, network, data, and identity. Microsoft offers a platform that supports peoples’ needs from bare metal up through applications and out to devices, including mission-critical workloads, from leading solution providers that include Microsoft, Oracle and SAP. People can choose the platform that's right for their entire business, and adapt as the needs of their business change.​ In-text reference: (Microsoft, 2014). Microsoft changes Hyper-V in each version, which creates a learning curve for IT staff with every new Windows release. In-text reference: (IT World, 2014) VMware has publically changed its product roadmaps several times over the last few years. VMware touts these changes as product evolution, but existing people are left behind with a product that might be unsupported or unfit for the future. VMware's approach is to virtualize everything, and other components like apps, management, identity, and data are viewed through that lens only, without true consideration for the benefits provided by cloud services like application portability, resiliency, and elasticity as well as a common identity platform. Unlike Windows Server and Azure, VMware is not certified and supported by Oracle. In-text reference:......

Words: 572 - Pages: 3

Free Essay

Nt1210 Lab 3

...Mason Schwarz NT1210 1/14/15 Lab 3 Lab 3.1 The network reference models refer to the TCP and the OSI models of communication between machine and server. The TCP model has a 5 layer process, whereas the OSI model has a 7 layer process. Each is important for sending and receiving data throughout the network. Lab 3.2 The OSI reference model is a networking model that serves as communication between a client and server. This is a 7 layer process. The first layer is the physical layer in which you have the physical connection type. The second layer is the data link which contains the actual data being sent. The third layer is the network layer that grabs the IP address of the receiver. The fourth layer transports the data from one client to another. The fifth layer sets up which software should run the data. The sixth layer determines how the data is presented. The seventh layer opens the application that the data is displayed on. Lab 3.3 The TCP model is exactly the same thing as the OSI model except for the fact that the last 3 layers are shown as 1. The first layer is the physical layer in which you have the physical connection type. The second layer is the data link which contains the actual data being sent. The third layer is the network layer that grabs the IP address of the receiver. The fourth layer transports the data from sender to receiver. The fifth layer sets up which software should run the data, determines how its presented and loads the proper......

Words: 343 - Pages: 2

Premium Essay

Nt1210 Lab 5.3

...Adrian Fisher NT1210 Tuesday class Professor K Lab 5.3 Exercise 5.3.1: When I entered the ipconfig/release command I couldn’t see my IP address anymore and when I entered ipconfig/renew my IP address came back up. Everything was the same. Exercise 5.3.2: Exercise 5.3.3: Here’s what happened when I entered command PING 192.168.1.1 Here what happened when I entered command WWW.GOOGLE.COM Exercise 5.3.4: Here’s what happened when I entered command PING –A 192.168.1.1 And this is what happened when I ping the local host in a argument. Exercise 5.3.5: Here’s what happened when I entered the command PING –N 6 192.168.1.1. From what I can gather from my research, being able to to send out a certain number of pings that you desire allows you to further analyze the speed of the ping better and get an average round trip time. Exercise 5.3.6: Here’s what happened when I entered command TRACERT 192.168.1.1. It looks like the trace went through 1 system. When I sent the trace to WWW.GOOGLE.COM the trace went through 14 devices. Here’s what happening. Here’s what happened when I traced WWW.NFL.COM. Exercise 5.3.7: There are 2 active connections and 2 protocols being performed when I ran netstat. Here’s what it looked like. When I ran the netstat after I opened up internet explorer this is what popped up....

Words: 256 - Pages: 2

Premium Essay

Nt1210 Review Questions

...NT1210 Cynthia Allen Unit 7 Chapter Review Questions Key Terms 1. Switched Circuits – A circuit created by the phone company in reaction to signaling ( the user tapping telephone keys or modem sending the same digits w/ the Telco tearing down the circuit when the user is finished. 2. Dedicated circuit – A electrical circuit created by a telco CO. on behalf of a customer, with circuits staying up all the time, dedicated for use by the customer that ordered the circuit, also known as leased lines, leased circuit and point to point. 3. Circuit switching - The overall process by which a series of Telco devices called circuit switches connect a circuit from one customer to another, with the device taking bits on one segment in the link and forwards those bits out the matching outgoing segment without storing the bits. 4. Leased line – A physical link between two locations provided by Telco, that allows two way communications between sites. Because the customer does not own the physical line between the sites, but rather pays a monthly fee for service called a leased line “AKA” dedicated circuit, leased circuit, and point-to-point. 5. Packet switching – The process of forwarding customers data in a WAN by looking at the header of the header of the message sent into the WAN by the customer and making a peer message (per-packet) decision as to where to forward each message. 6. Time –division- multiplexing –A type of logic used by some networking devices including......

Words: 451 - Pages: 2

Premium Essay

Nt1210 Unit 5

...LAN Standards Kevin Nguyen David Beitl Luis Benitez NT1210 1/25/2015 5.1.1 802.1 standard is basically that it handles the architecture, security, management and internetworking of LAN, MAN, WAN standardized by IEEE 802. 5.1.2 What 802.3 standard originally defined PoE functionality? The IEEE 802.3af standard When was the standard enhanced, and what was the new standard name given for the enhancement? It was changed in 2009 and it was called IEEE 802.3at 5.1.3 Ethernet Standards Standard | Speed | Segment Length | Cable | 10Base5 | 10Mbps | 500m | Rg-8 or RG-11 Coaxial | 10Base2 | 10Mbps | 185m | RG-58 A/U or RG-58 C/U Coaxial | 10Base-T | 10Mbps | 100m | Cat 3 or better UTP | 100Base-T | 100Mbps | 100m | Cat 5 UTP or STP | 100Base-TX | 100Mbps | 100m | Cat 5 UTP or STP | 100Base-FX | 100Mbps | 2km | 2-pair 850 nm Multimode optic fibers | 1000Base-T | 1Gbps | 100m | 4-pair, Cat 5 or Cat 5e | 1000Base-SX | 1Gbps | 550m (multimode) | 2-pair fiber optic | 5.1.4 What does the numeric prefix before BASE the Ethernet standards? It denotes its maximum data transmission rate What does the inclusion of the postfix of –T imply? A reference to the twisted pair cable needed for this standard. Lab 5.1 Review 1. What would the maximum speed of traffic be from a node in network A to a node in network B? 10 Mbps 2. How is it possible for a network to uphold a maximum speed when it allows different categories of UTP wire......

Words: 359 - Pages: 2

Free Essay

Nt1210

...NT1210 INTRO TO NETWORKING UNIT3 LAB3.3 The TCP/IP Model Mr. Randy Vogl Gus Perez 19593003 The TCP/IP network model Exercise 3.3.1 What are the distinct differences between OSI and TCP/IP models? TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection. Model TCP/IP is developed on points toward a model the internet. TCP/IP has 4 layers. OSI has 7 layers. TCP/IP more reliable than OSI OSI has strict boundaries; TCP/IP does not have very strict boundaries. TCP/IP follow a horizontal approach. OSI follows a vertical approach. In the application layer, TCP/IP uses both session and presentation layer. OSI uses different session and presentation layers. TCP/IP developed protocols then model. OSI developed model then protocol. TCP/IP offers support for connectionless communication within the network layer. In the network layer, OSI supports both connectionless and connection-oriented communication. TCP/IP is protocol dependent. OSI is protocol independent. http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/ Read more: Difference between OSI and TCP IP Model | Difference Between | Difference between OSI vs TCP IP Model http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/#ixzz3f4nyPzTU TCP/IP model protocols and functions. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the......

Words: 1306 - Pages: 6

Premium Essay

Nt1210 Exam

...NT1210 Exam 1 Study Guide. 1. Approximately how many bytes are in a kilobyte (KB)?megabyte(MB)? 2. What are the parts of the hard drive? 3. How are voice communications converted to digital signals? 4. What does compression do to video files? 5. In this sample Web address,http://www.itt-tech.edu which part identifies the protocol being used? 6. Is the Internet one centrally controlled and managed network? 7. What manages peripheral devices on your computer? 8. What network topologies suffer from a single point of failure? 9. Define a networking standard? 10. What standards-setting body sets de facto standards? 11. Why is the TCP/IP model divided into layers? 12. What do routers do? 13. What is “encapsulation” when talking about data? 14. In TCP/IP networks, how are nodes identified layer 2 and layer 3? 15. Define the Physical Layer? 16. What is the result of the Wi-Fi Alliance’s input on how wireless devices act? 17. Frames are associated with the Layer of the TCP/IP and OSI models. 18. How do LANs and WANs differ on the way they use to send data? 19. Why is it important to understand alternating current when learning about networks? 20. What causes full duplex to transmit and receive simultaneously? 21. What does attenuate mean when describing data signals? 22. What is an RJ-45 used for on networks? 23. Which type of fiber is better for longer distances? Why? 24. 802.11g is for what type of technology? 25. What is CSMA/CA......

Words: 537 - Pages: 3

Premium Essay

Nt1210 Final

...NT1210 FINAL EXAM EBOOK INSTITUTE DECEMBER 11, 2014 Nt1210 Final Exam eBook Institute NT1210 FINAL EXAM DOWNLOAD: NT1210 FINAL EXAM Getting Nt1210 Final Exam is easy and simple. Mostly you need to spend much time to search on search engine and doesnt get Nt1210 Final Exam documents that you need. We are here to serve you, so you can easily access, read and download its. No need to wasting time to lookup on another place to get Nt1210 Final Exam. We provide you Nt1210 Final Exam in PDF format so you can read and download its to your computer which this file are safe and virus free. You can read this document with Adobe Acrobat or other PDF Reader. We have massive collection of documents, books, eBook and pdf files including that you are looking Nt1210 Final Exam. To access this you just need to signed up and complete its through website to open your limited access for documents that you needs. So what do you waiting for? DOWNLOAD: NT1210 FINAL EXAM Nt1210 Final Exam 2 Nt1210 Final Exam eBook Institute Final Exam Nt1210 http://ebookinstitute.net/..../final-exam-nt1210.pdf Read or Download final exam nt1210 Online. Also you can search on our online library for related final exam nt1210 that you needed. You can download PDF Document such final exam nt1210 for free ... Download Filetype: PDF | Last Update: 2014-12-11 Final Exam Nt1210 Itt Tech http://ebookinstitute.net/..../final-exam-nt1210-itt-tech.pdf Read or Download final exam nt1210 itt tech Online. Also you can...

Words: 1156 - Pages: 5

Premium Essay

Nt1210

...NT1210 LAB 1.1 1.1.1 2931 103 102 101 100 1000 100 10 1 2 9 3 1 ___________________ 2000 + 900 + 30 + 1 = 2931 1.1.2 1102 22 21 20 4 2 1 1 1 0 ________________ 4 + 2 + 0 = 6 1.1.3 112 21 20 2 1 1 1 __________ 2 + 1 = 3 1.1.4 Exercise 1.1.4: Create an expanded mapping for binary number 10010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 | 1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.5: Create an expanded mapping for the......

Words: 252 - Pages: 2

Free Essay

Nt1210

...NT1210 Lab 3 3.1.1 If wireless devices where not governed by the Wi-Fi alliance it would make it hard to communicate hardware and software between different machines. That would mean cable providers, cellphone providers, and internet providers would all have to use their own Wi-Fi frequencies. Without the WI-FI alliance it would be to hard to manage day to day life with all devices not being able to share hardware and software. Also there would be no real security so it would be easy for someone to hack all of your information. 3.1.2 A model that is used to visualize something that I would use is power points. It is easier to explain something to someone when you break down the information into slides and show key points. Power points make information easier to understand. 3.1.3 Data Link Physical Application Network Transport 3.1.4 If the model is to general then you wouldn’t understand it. If the model is to granular then the data would begin to overlap itself. Review.3.1 1. The data wouldn’t be filtered correctly so there would be connection errors. 2. (OSI) started in the 1970s, with a lot of progress on individual standards in the 1980s, and with vendor products appearing by the early 1990s. It was created to compete with TCP/IP. It broke everything into layers and each layer provided facilities to the layer above it and below it. 3. (TCP)/IP resulted from research and......

Words: 334 - Pages: 2

Premium Essay

Nt1210 Intro to Networking 3.2

...NT1210 Lab 3.2. The OSI reference Model Exercise 3.2.1 Using Figure 3-1, define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or Internet research to support your answer. The Physical layer is something simple like wiring, fiber and network cards. Devices that allow communication between the OSI networks. Data link layer is the Ethernet, among other protocols; we're keeping this simple remember. The most important take-away from layer 2 is that you should understand what a bridge is. Switches, as they're called nowadays, are bridges. Network layer is an IP address because you're dealing with layer 3 and "packets" instead of layer 2's "frames." IP is part of layer 3, along with some routing protocols, and ARP (Address Resolution Protocol). Transport layer handles messaging units which is also called packets. When you're talking about specific protocols, like TCP, they're "segments" or "datagrams" in UDP. This layer is responsible for getting the entire message to keep track of fragmentation. Session layer is Network Basic Input/output System model allowing applications on separate computers to communicate over a local area network. The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets. Presentation uses Secure Sockets Layer which provides a secure connection between internet browsers......

Words: 597 - Pages: 3

Premium Essay

Nt1210 Unit 8

...NT1210 Unit 8 Assignment 1 Practice #1 Give an IP address and number of bits borrowed (from the host for the subnet mask), Find the following information. Host Address 200.17.15.10 Network Class C SN Mask 255255255224 Network Address 200.17.15.0 Bits Bono wed 3 SNs Created 524288 Usable SNs | 8 | | Hosts perSN | 32 | Usable Host^N 30 | Subnet No. | Network ID | First Host IP | Last Host IP | Broadcast Address | 0 | 200.17.15.0 | 200.17.15.1 | 200.17.15.30 | 200.17.15.31 | 1 | 200.17.15.32 | 200.17.15.33 | 200.17.15.62 | 200.17.15.63 | 2 | 200.17.15.64 | 200.17.15.65 | 200.17.15.92 | 200.17.15.93 | 3 | 200.17.15.94 | 200.17.15.95 | 200.17.15.124 | 200.17.15.125 | 4 | 200.17.15.126 | 200.17.15.127 | 200.17.15.156 | 200.17.15.157 | 5 | 200.17.15.158 | 200.17.15.159 | 200.17.15.188 | 200.17.15.189 | 6 | 200.17.15.190 | 200.17.15.191 | 200.17.15.220 | 200.17.15221 | 7 | 200.17.15.222 | 200.17.15.223 | 200.17.15.252 | 200.17.15253 | Practice #2 Given an address and subnet mask, find the Following information. Host Add ness | 152.12.14.18 | Network Class | B | SN Mask | 255.255.255.240 | Net wotk Address | 152.12.14.16 | Bits Borrowed | 4 | SNsCieated | 1048576 | UsableSNs | 16 | | | Hosts perSN | 16 | Usable HosWSN | 14 | Subnet No. | Network ID | Rrst Host IP | Last Host IP | Broadcast Address | 0 | 152.12.14.16 | 152.12.14.17 | 152.12.14.30 | 152.12.14.31 | 1 | 152.12.14.32 | 152.12.14.33 | 152.12.14.46 | 152.12.14.47 | 2...

Words: 473 - Pages: 2