Premium Essay

Nt1310 Unit 2 Lab 1

In: Computers and Technology

Submitted By thorn1323
Words 915
Pages 4
Amazon
With amazon services you choose a service plan based upon a completely virtual environment. Using a preconfigured AMI (amazon machine image) or creating your own with its own set of network permissions and protocols. This also chooses instance types you may want. Multiple services using AMI and with that utilize static endpoints or attach persistent block storage to said instances. The resources you use is what you will pay for out of the total plan you have chosen based upon time or data transfer. Amazon also has an elastic block store based service with offers persistent storage for amazon EC2 instances. EC2 is a program which you decide a system to boot into it so it can be stopped and restarted with the whim of the client. With this the EBS volumes can be measured and observed by the client. EC2 also provides multiple locations. This is based mainly open regions and available zones. Elastic or dynamic IP addresses are available for wireless and mobile devices that will use these cloud services. Virtual private could is a thing all its own that will create logically isolated sections of the amazon web services which you can launch within your AWS resources to create a virtual network which you can also select your own section of IP addresses, subnets, and configuration of your route tables, networks and gateways. Within these services a Virtual private network (VPN). Amazon cloud watch is a service that monitors your data. This gives stats, graphs, and alarms when you start to reach certain points of data allocation. With amazon cloud watch you also can set caps for your businesses for how much data can be used with a certain allocation of time. Auto Scaling, This automatically scales your Amazon Ec2 capacity up or down according to conditions that you yourself will define this service is enabled by amazon cloud watch and available with not extra fees.…...

Similar Documents

Premium Essay

Unit 2. Lab 1 - Cloud Computing Research

...Unit 2. Lab 1: Cloud Computing Research With Amazon, you get anywhere between 5GB and 1TB depending upon how much you’d like to pay for the privilege. Amazon passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. To use Amazon EC2, you simply: * Select a pre-configured, templated Amazon Machine Image (AMI) to get up and running immediately. Or create an AMI containing your applications, libraries, data, and associated configuration settings. * Configure security and network access on your Amazon EC2 instance. * Choose which instance type(s) you want, then start, terminate, and monitor as many instances of your AMI as needed, using the web service APIs or the variety of management tools provided. * Determine whether you want to run in multiple locations, utilize static IP endpoints, or attach persistent block storage to your instances. * Pay only for the resources that you actually consume, like instance-hours or data transfer. With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from Google if you have a Google Apps account up to a total of 16TB. On...

Words: 469 - Pages: 2

Premium Essay

Nt1310 Physical Networking Unit 2

...NT1310 Physical Networking Unit 2: Assignments and Homework Lab 1: Cloud Computing Research Amazon: Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. It is designed to make web-scale computing easier for developers. Amazon EC2’s simple web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment. Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that you actually use. Amazon EC2 provides developers the tools to build failure resilient applications and isolate themselves from common failure scenarios. Cost - Inexpensive – Amazon EC2 passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. See Amazon EC2 Instance Purchasing Options for a more detailed description. Amazon EC2 Instance Purchasing Options In addition to providing the flexibility to easily choose the number, the size and the configuration of the compute instances you need for your application, Amazon EC2 provides customers three different purchasing models that give you the flexibility to......

Words: 575 - Pages: 3

Free Essay

Nt1310 Unit 2 Ass 1

...RBOCS-The Regional Bell Operating Companies (RBOC) are the result of United States v. AT&T, the U.S. Department of Justice antitrust suit against the former American Telephone & Telegraph Company (later known as AT&T Corp.). On January 8, 1982, AT&T Corp. settled the suit and agreed to divest its local exchange service operating companies. Effective January 1, 1984, AT&T Corp.'s local operations were split into seven independent Regional Bell Operating Companies known as "Baby Bells". RBOCs were originally known as Regional Holding Companies (RHCs). Currently, three companies have the RBOCs as predecessors. They are AT&T Inc., Verizon, and Century Link. Some other companies are holding on smaller segments of the companies. ILEC- An incumbent local exchange carrier (ILEC) is a local telephone company in the United States that was in existence at the time of the breakup of AT&T into the Regional Bell Operating Companies (RBOCs), also known as the "Baby Bells."[1] The ILEC is the former Bell System or Independent Telephone Company responsible for providing local telephone exchange services in a specified geographic area. GTE was the second largest ILEC after the Bells, but it has since been absorbed into Verizon, a RBOC. ILECs compete with competitive local exchange carriers (CLEC). When referring to the technical communities ILEC is often used just to mean a telephone provider. In Canada, the term ILEC refers to the original telephone companies such...

Words: 496 - Pages: 2

Premium Essay

Unit 3 Exercise 1 Nt1310

...| Unit 3. Exercise 1. | | Specifications - Definitions | | Unit 3. Exercise 1. | | Specifications - Definitions | NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi 1. Application (in terms of cabling infrastructure): The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exists.. (OSI_model#Layer_7:_application_layer) 2. Unshielded twisted-pair: UTP cable is a popular cable used in computer networking that consists of two shielded wires twisted around each other. In the image to the right, is an example of the different network cables you're likely to encounter. (/jargon/u/utpcable.htm) 3. Shielded Twisted-pair: Twisted Pair (STP) has a fine wire mesh surrounding the wires to protect the transmission; Unshielded Twisted Pair (UTP) does not. Shielded cable is used in older telephone networks, network, and data communications to reduce outside interference. In the picture to the right, is an example of what these cables look like inside. (jargon/t/twispair.htm) 4. Fiber-Optic cable: A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing.......

Words: 1317 - Pages: 6

Premium Essay

Nt1310 Unit 1 Exercise 1

...Unit 1 Exercise 1 Local Exchange When you send an email from New York to Japan, that email,is sent from your home to the local exchange point over the access network. Once it is in the local exchange it is then sent to aggregating points in different cities and counties over the regional network. Then it is aggregated and transported over the long-haul network so that it reaches the launching point at the country shoreline where it is then sent over the ocean network to Japan. Once there, the email is sent back over the long-haul or regional network to the local exchange and then on to the individual receiving the email. This occurs using mostly fiber optics so the speeds at which all this takes is at the speed of light which is approximately 127,000 miler per second. understand how to interface with the local exchange you must first understand the different networks that comprise it. The first network, being the access network. The access network is the network that connects the individual user or business with the telecommunications system. This is made up of a series of fiber-optic and copper cabling and passive and active equipment that connects you to the local exchange. The central office at the local exchange contains the switching equipment to direct your telephone, data , video, etc. to where it needs to go. The access network is very important to the local exchange since it’s the part that reaches the end user, who is you, and connects them. The metro network,......

Words: 339 - Pages: 2

Free Essay

Nt1310 Unit 7 Lab 1

...Unit 7 Lab 1 New Building Safety Plan In my safety plan the first things that I’m going to cover are the PPE for working on a construction site where a new building is being placed. First you’re going to need a hard hat so that when anything falls from above, it keeps your brains where they belong like in your head. Second steel toed shoes or boots, preferably boot for a little extra ankle support. But the steel toes to protect your feet from anything being dropped or lowered in case your foot gets in the way. Safety goggles, pretty self-explanatory on this one, just need to keep things out of your eyes! Long pants (blue jeans) protect your legs from different object that could hurt your skin but with pants on you might just get a bruise. Next on the list gloves are always a good idea to wear so that you don’t rip your hands up while you’re working! A water cooler is a must in this situation because it’s going to be hot out and hydration is key to survival! There will also be no running on the job site. Hurry to quickly can cause more accidents than any amount of production you’re getting for running that thirty foot. Only work on the parts of the job that you know, if someone ask for help go ahead and give them a hand but if you’re a plumber then just let the electrician handle his own job. Back to PPE for a sec a back brace would be a good idea to wear also. Once you have a back injury it will be a problem for the rest of your life in most cases. In case of an......

Words: 392 - Pages: 2

Free Essay

Nt1310 Unit 9 Exercise 1

...11th, 2014 NT1310 Mr. Amos Unit 9 Exercise 1 Light Source and Components-Definitions 1. Forward Biased LED: A bias voltage that is applied to a pn-junction in the direction that causes a large current flow; used in some semiconductor diode circuits. 2. Incoherent Light: Light in which the electric and magnetic fields of photons are completely random in orientation. Incoherent light is typically emitted from light bulbs and LEDs. 3. Laser: Acronym for light amplification by stimulated emission of radiation. The laser produces a coherent source of light with a narrow beam and a narrow spectral bandwidth (about 2cm). Lasers in fiber optics are usually solid-state semiconductor types. Lasers are used to provide the high-powered, tightly controlled light wave lengths necessary for high-speed, long-distance optical fiber transmissions. 4. Output Pattern: A setting that selects the output pattern for comparison outputs. This enables outputs for changes in levels rather than just upper/lower limit comparisons to set value. It can be set according to the control applications. Note: The settings must be as follows for correct zone outputs. 5. Output Power: The useful signal or power delivered by a circuit or device. 6. Modulation Speed: (1) Coding of information onto the carrier frequency. Types of modulation include amplitude modulation (AM), frequency modulation (FM), and phase modulation (PM). (2) When light is......

Words: 1207 - Pages: 5

Premium Essay

Nt1310 Unit 1 Assignment 1

...ITT Technical Institute Springfield, MO Unit1 Activity1 Tom McKellips NT1310 Bryan Thurlkill September 26, 2013 Voice vs. Data * Cell Phones – Since a cell phone is considered a two way radio, which transmits the digital signal via radio waves-invisible light waves-that move through the air. Cell phones can be seen as both voice and data, depending on what type of cell you have. * Landline Phones – A simple phone that has to be plug into a jack, which is mostly used in business and in a few homes now days. The signal travels through the wires to a switch than to its destination. A landline phone sends a voice signal across the network. * SMS / Text Messaging - text messaging has become a very popular mode of communication. Short Message Service (SMS) is a communication protocol allowing the interchange of short text messages between mobile devices. SMS messages are presently transmitted over signaling channels of a voice network, such as over SS7 channels. * Fax Machines – Fax machines sends data through networks which is a lot faster than using regular mail. A fax machine takes a copy of a document than sends it through a transmission line to another fax which than prints out an exact copy of that same document. This transmission is sent through a data network. * Pagers - Pagers were the most popular wireless communications devices for several reasons: They are very easy to use, their batteries last several weeks, and they are light......

Words: 534 - Pages: 3

Premium Essay

Nt1310 Unit 1

...Nt1310 9/17/2014 Unit 1 Assignment 1 Cell phones – Cell phones use data networks to communicate over radio frequencies. The frequencies that they use are also shared with television, Bluetooth, and Wi-Fi. Landline phones – Landline phones use voice networks only because they do not need as much speed as anything else. Normal house phones use approximately 10 MB/s which is all that voice networks handle. SMS/Text messaging – Text messaging uses data networks because they can also be sending media like pictures and video. The other reason that I believe that text messaging uses data networking is because it is faster. Fax machines – Fax machines use voice because they only transmit exactly what is on the paper. It is not being transformed into little packets and sent over the internet to another place; it is just sent from one place to another through the phone line. Pagers – Pagers use the same as cell phones and that is data networks because it is wireless, and does not have to be plugged into anything. Pagers are not that common due to the cell phone industry growing swiftly. VOIP – VOIP as it says in the name of it uses a data network. It uses IP for talking so that the communication is more secure and not many people can tap in as easily as people can over regular phones. Skype/Facetime – Skype and facetime both use data networks to communicate because you are sharing video with somebody else. You are also receiving video, and video cannot be shared over a......

Words: 263 - Pages: 2

Premium Essay

Nt1310 Unit 9 Lab 1

...allows you to pull the cable and protect the fiber ends from damage. PULL BOX – A pull box is usually installed after a long straight run or every time the set of turns totals 180 degrees or more. The pull box is used to create a intermediate opening for the pulling cable to reduce the length of cable being pulled through the conduit or to reduce the number of turns the cable is being pulled through at a given time. It is important to keep in mind the bend radius of the cable when using a pull box. SPLICE ENCLOSURES – Splice enclosures can take many forms depending on their location and application. Splice enclosures can be typically place in one of the two following categories. 1. Radial Splice Enclosures – radial splice enclosures have cables enter and exit the enclosure on the same side. 2. Axial Splice Enclosures – Axial splice enclosures have cables enter and exit on opposite ends of the enclosure. Enclosures designed for outdoor use are environmentally sealed. Typically all enclosures will include: * A strain relief system that ensures the strength member of the cable will carry the tensile load. * Clips that hold the splices in an orderly fashion. * Space for looping the extra optical fiber that is needed to perform the splice outside the enclosure PATCH PANELS – Patch panels are an interconnected point for fiber cables that allow signals to be routed from one cable to another with a patch or jumper cord. CONDUIT – Conduit is used to for......

Words: 1252 - Pages: 6

Free Essay

Lab 2 Unit 2

...Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary? Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license 1. Middle initial 2. Are you a Jr. or Sr. Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. | Make sure patient fills out all the whole application. Lab 2.2 Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software......

Words: 342 - Pages: 2

Premium Essay

Nt1310 Unit 8 Lab

...Give a basic explanation of each step necessary to assemble a connector to a piece of fiber optic cable 1. Cable and Optical fiber preparation 2. Oven cured Epoxy application and connector assembly 3. Oven cured epoxy polishing General Guidelines The following contains information on the placement of fiber optic cables in various indoor and outdoor environments. In general, fiber optic cable can be installed with many of the same techniques used with conventional copper cables. Basic guidelines that can be applied to any type of cable installation are as follows:     Conduct a thorough site survey prior to cable placement.     Develop a cable pulling plan.     Follow proper procedures.     Do not exceed cable minimum bend radius.     Do not exceed cable maximum recommended load.     Document the installation. Conduct a Site Survey The purpose of a site survey is to recognize circumstances or locations in need of special attention. For example, physical hazards such as high temperatures or operating machinery should be noted and the cable route planned accordingly. If the fiber optic cable has metallic components, it should be kept clear of power cables. Additionally, building code regulations, like the National Electric Code (NEC)** must be considered. If there are questions regarding local building codes or regulations, they should be addressed to the authority having jurisdiction, such as the fire marshal or city building inspector. Develop a......

Words: 2096 - Pages: 9

Free Essay

Nt1310 Unit 2 Activity 2

...Michael McNair NT1310 Pleace Unit 2 Activity 2 Press Release 9/30/15 FOR IMMEDIATE RELEASE: Awesomegafuntime Announces Lowest Deals Ever. Nashville, TN Awesomegafuntime is coming to Nashville with the cheapest triple play to date. This out of know where startup company founded by what the completion is calling the strong arm thugs of the communications world. Some believe that this reputation is inspired more by the business practices of the company than the ties to the mafia that it openly professes. Awesomegafuntime is pretty much making you an offer that you can’t refuse. Three services all for one price. That’s right Television, Phone, and Internet all for just 50 dollars a month. This company is coming to an area near you. They pretty much are kicking in your door with this deal. Before you know it they will have you locked down ‘on their 2 GB fiber speeds. As we all know fiber can be fragile, but the Awesomegafuntime support staff have no problem responding to check on the lines, sometimes you may even wake in the middle of the night to find one of their representatives out back digging a hole down to check the lines. When talking security Awesomegafuntime is your friend. Promising tap free service on your phone. If at any time your phone line becomes compromised they promise to take care of it… And when it comes down to entertainment Awesomegafuntime has you backed with a channel line that you would expect from a provider based out of Vegas. But hurry...

Words: 314 - Pages: 2

Free Essay

Nt1310 Unit 1 Graded

...Activity 1 Cell phones – originally these used voice networks. More recently they use voice and data networks. Landline phones – use both voice and data networks. SMS / Text Messaging – uses both voice and data networks Fax Machines – use data networks Pagers – the type of network depends on the type of pager, Fire Dept. pagers use a voice network where other types of pagers would use data networks. VOIP phones – use data networks Skype / Facetime - use data networks Activity 2 How does the data in an online game get sent from your computer or gaming system to the computer gaming system of all the people you are playing with? The data from an online game is sent to other players via the internet. When you play the game you connect to the internet via the router in your home. That data is transmitted to your local internet service provider. The data is then sent to the games host server and then transmitted to the internet provider of the other players that are logged into the game server and forwarded to the internet provider of the other players and then on to the player’s system. Lab Portion Pros and cons of a purely fixed line network vs. having a purely cellular network. Fixed Line Network | Cellular Network | Advantages | Advantages | Super cheap | Take your wherever you go | High download allowances  | Stop paying for line rental | Faster speeds | Plug and play technology | Consistent connection | Flexible options available | Disadvantages...

Words: 333 - Pages: 2

Premium Essay

Nt1310 Unit 2 Lab 1

...Amazon With amazon services you choose a service plan based upon a completely virtual environment. Using a preconfigured AMI (amazon machine image) or creating your own with its own set of network permissions and protocols. This also chooses instance types you may want. Multiple services using AMI and with that utilize static endpoints or attach persistent block storage to said instances. The resources you use is what you will pay for out of the total plan you have chosen based upon time or data transfer. Amazon also has an elastic block store based service with offers persistent storage for amazon EC2 instances. EC2 is a program which you decide a system to boot into it so it can be stopped and restarted with the whim of the client. With this the EBS volumes can be measured and observed by the client. EC2 also provides multiple locations. This is based mainly open regions and available zones. Elastic or dynamic IP addresses are available for wireless and mobile devices that will use these cloud services. Virtual private could is a thing all its own that will create logically isolated sections of the amazon web services which you can launch within your AWS resources to create a virtual network which you can also select your own section of IP addresses, subnets, and configuration of your route tables, networks and gateways. Within these services a Virtual private network (VPN). Amazon cloud watch is a service that monitors your data. This gives stats, graphs, and alarms......

Words: 1385 - Pages: 6