In: Computers and Technology

Submitted By thenuttypoet
Words 467
Pages 2
Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi- Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications?
There would be too much interference going on. There would be no control of the airwaves that wireless networks adhere to. Since we are so focused on the technology that we cannot live without, it would be very frustrating and the technology would not work properly.
Exercise 3.1.2 Give another example of a model that is used to visualize something that is difficult to observe or perceive. How does the model make it easier to understand?
You would need all of the above devices to make the network operate properly.
Exercise 3.1.3 Based on what you already know about networks, what are the different layers you think would be necessary for communication to be mapped to a model? Consider direct connections between host devices and connections that require other routing equipment, such as a hub, switch, or router.
Data Link, Physical, Application, Network, Transport
Exercise 3.1.4 The granularity of the reference model will often determine the usefulness of the model. What will happen if a model is too general? What will happen if a model is too granular (too focused on individual detail)?
If the data is too detailed, it may overlap with other information. However if the datais too general, then there may be crucial information missing.
Lab 3.1Review 1. Why would a three- layer model of communication that has the layers physical, network, and application be insufficient to adequately describe network communication?
Because of the fact that you still need to describe how the data is packed and communicated through the communication.
2. What is the history of the OSI reference model? How did it come about and why was it created? Use…...

Similar Documents

Nt1210 Midterm Study Guide

...NT1210 Midterm Study Guide * The term troubleshooting refers to finding a problem and evaluating it so that corrective action can be taken. * Extensive digitization is a process that began in the 1960s. * Networks have more than just a physical component. * International standards-setting bodies can affect standards established in the United States. * A bus topology does not form a closed loop. * The bit interval is the duration it takes a single bit to be transmitted. * Data communications is a subset of telecommunications. * Data can include or convey graphic images, sound, or video files. * The physical layers of the OSI and TCP/IP models are very similar. * The data communications phase associated with digitization is the first phase. * The portion of an IP address from which bits are borrowed when subnetting is the host. * The transport layer ultimately passes data up to the application layer. * A MAC address is associated with the Data Link Layer. * An IP address is associated with Network Layer. * Twisted pair, Coaxial and Fiber Optic are types of cable * The capacity of a circuit to carry data is its bandwidth. * A 32-bit bus can handle four times the data bits as an 8-bit bus. * LAN resources might include software, hardware and data. * Data bits are frequently passed through pins in a connector. * Synchronous protocols are the type of data link protocols primarily used to......

Words: 355 - Pages: 2


...Jasmine Perez NT1210 Chapter 2 Review Questions 1. Which of the following terms is the closest synonym to the term "computer networking"? c. Datacom 2. Ann uses her email address, me@here.com , to send an email to Bob, whose email address is you@there.com The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? b. Bob’s incoming email server. 3. According to this chapter, which of the following concepts happens happens in a modern-day, end-to-end voice call between two business telephones sitting in the same office building in the United States. c. The call uses both analog and digital electrical signals. e. The call represents each spoken word as a unique set of bits. 4. According to this chapter, which of the following concepts happens in a modern-day, end to end voice call between two home telephones in the United States? a. The call uses only analog electrical signals. d. The call represents short sounds as a unique set of bits. 5. A student makes a video recording of a professor teaching a class. The student posts the video to a website. The answers list information that the student used or chose on the computer on which he was processing the video which of the following answers is the least likely to impact the size of the video file? a. A character set 6. A student records a video of a professor teaching a class. The student plans to later post the video online on......

Words: 992 - Pages: 4


...Kannard Johnson Mr. Baker NT1210 April 2 2013 Unit 1 Assignment Review Questions 1) Which of the following is true about 1 bit? a. C- Represents one binary digit. 2) Which of the following terms means approximately 106 bytes? b. D- Kilobyte 3) Which answer lists the correct number of bits associated with each term? c. C- 64 bits per quadruple word 4) Which of the following answers are true about random-access memory as it is normally used inside a personal computer? d. A- Used for short-term storage e. E- Is installed on the motherboard 5) This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? f. A- The CPU tells the RAM which address holds the data that the CPU wants to read. 6) Which of the following determines, in part, what bits the computer stores in the file to represent the text typed into the report? g. C- Character set. 7) Which of the following determines, in part, what bits the computer stores in RAM to represent the number 123456789? h. D- The binary equivalent of decimal 132456789. 8) Which of the following is not a feature of a file system that might be used with a hard drive? i. A- An actuator arm 9) Which of the following are some of the important features supplied by files as defined by a computer OS? j. A- Keeps data in order ...

Words: 680 - Pages: 3


...NT1210 Unit 4 Labs Unit 4 Labs NT1210 8/4/14 Unit 4 Labs Lab Review: 4.1 – Page: 82 and 83 1. To eliminate the crossover issue, lower the amount of equipment and cost. Simplify a network. 2. To increase the maximum distance for a signal. If put after the maximum distance the signal may degrade. 3. The connection and processing speed. It also depends on the number of connections the computer or laptop will allow. Lab Review: 4.2 – Page: 85 1. A. Bend Radius: The minimum radius that a fiber optic cable can be bent without loss of light or impairment. A general rule that it be no less than 15 times the cable diameter B. To not affect a signal sent down the line. 2. The core/Glass Filament, Cladding, Buffer, Strengthener and Outer Jacket. Lab Review: 4.3 – Page: 90 1. Ease of installation, lack of certified fiber optic specialists and changes to the physical design of the network later on. 2. By limiting the devices needed depending on the distance and need of each network. Verify the number of access points needed before the start. Lab Review: 4.4 – Page: 95 1. By selecting a specific layer and testing the health you can definitively say the problem lies either below or above that layer. Example: test the Transport layers health if it is ok you know the problem is in the Application layer. 2 A. B. If the cable is damaged in any way it should be checked. ----------------------- 3...

Words: 255 - Pages: 2

Nt1210 Essay

...Robin Woodruff NT1210 8/8/2014 Mrs. Oliver 1 Comparison between Microsoft and VMware With the Microsoft Cloud OS vision, people get one consistent platform that goes beyond just virtualization, and includes management, automation, development platform, network, data, and identity. Microsoft offers a platform that supports peoples’ needs from bare metal up through applications and out to devices, including mission-critical workloads, from leading solution providers that include Microsoft, Oracle and SAP. People can choose the platform that's right for their entire business, and adapt as the needs of their business change.​ In-text reference: (Microsoft, 2014). Microsoft changes Hyper-V in each version, which creates a learning curve for IT staff with every new Windows release. In-text reference: (IT World, 2014) VMware has publically changed its product roadmaps several times over the last few years. VMware touts these changes as product evolution, but existing people are left behind with a product that might be unsupported or unfit for the future. VMware's approach is to virtualize everything, and other components like apps, management, identity, and data are viewed through that lens only, without true consideration for the benefits provided by cloud services like application portability, resiliency, and elasticity as well as a common identity platform. Unlike Windows Server and Azure, VMware is not certified and supported by Oracle. In-text reference:......

Words: 572 - Pages: 3


...NT1210 E1 Chapter 2 Review 1. Which of the following terms is the closest synonym to the term computer networking? a. Telecom b. Protocol c. Datacom< d. Stuff 2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? a. Ann’s incoming email server b. Bob’s incoming email server< c. Bob’s outgoing email server d. Ann’s compression algorithm e. The A/D converter near Ann 3. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two business telephones sitting in the same office building in the United States? (Choose two answers.) a. The call uses only analog electrical signals. b. The call uses only digital electrical signals.< c. The call uses both analog and digital electrical signals. d. The call represents short sounds as a unique set of bits.< e. The call represents each spoken word as a unique set of bits. 4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.) a. The call uses only analog electrical signals. b. The call uses only digital electrical signals. c. The call uses both analog and digital electrical......

Words: 1381 - Pages: 6

Nt1210 Lab 5.3

...Adrian Fisher NT1210 Tuesday class Professor K Lab 5.3 Exercise 5.3.1: When I entered the ipconfig/release command I couldn’t see my IP address anymore and when I entered ipconfig/renew my IP address came back up. Everything was the same. Exercise 5.3.2: Exercise 5.3.3: Here’s what happened when I entered command PING Here what happened when I entered command WWW.GOOGLE.COM Exercise 5.3.4: Here’s what happened when I entered command PING –A And this is what happened when I ping the local host in a argument. Exercise 5.3.5: Here’s what happened when I entered the command PING –N 6 From what I can gather from my research, being able to to send out a certain number of pings that you desire allows you to further analyze the speed of the ping better and get an average round trip time. Exercise 5.3.6: Here’s what happened when I entered command TRACERT It looks like the trace went through 1 system. When I sent the trace to WWW.GOOGLE.COM the trace went through 14 devices. Here’s what happening. Here’s what happened when I traced WWW.NFL.COM. Exercise 5.3.7: There are 2 active connections and 2 protocols being performed when I ran netstat. Here’s what it looked like. When I ran the netstat after I opened up internet explorer this is what popped up....

Words: 256 - Pages: 2

Nt1210 Review Questions

...NT1210 Cynthia Allen Unit 7 Chapter Review Questions Key Terms 1. Switched Circuits – A circuit created by the phone company in reaction to signaling ( the user tapping telephone keys or modem sending the same digits w/ the Telco tearing down the circuit when the user is finished. 2. Dedicated circuit – A electrical circuit created by a telco CO. on behalf of a customer, with circuits staying up all the time, dedicated for use by the customer that ordered the circuit, also known as leased lines, leased circuit and point to point. 3. Circuit switching - The overall process by which a series of Telco devices called circuit switches connect a circuit from one customer to another, with the device taking bits on one segment in the link and forwards those bits out the matching outgoing segment without storing the bits. 4. Leased line – A physical link between two locations provided by Telco, that allows two way communications between sites. Because the customer does not own the physical line between the sites, but rather pays a monthly fee for service called a leased line “AKA” dedicated circuit, leased circuit, and point-to-point. 5. Packet switching – The process of forwarding customers data in a WAN by looking at the header of the header of the message sent into the WAN by the customer and making a peer message (per-packet) decision as to where to forward each message. 6. Time –division- multiplexing –A type of logic used by some networking devices including......

Words: 451 - Pages: 2

Nt1210 U1A1

...nt1210 Unit 1 assignment 1 1. c. Represents one binary digit 2. b. megabyte 3. d. 4 bits per byte 4. c. used to process data & e. is installed on the motherboard 5. a. the cpu tells teh ram which addresses holds the data that the CPU wants to read 6. c. character set 7. d. the binary equivalent of decimal 123456789 8. a. an actuator arm 9. a. keeps data in order, b. Provides a convenient way to name a set of data for easier operations like copying and moving & c. Names give users an easy way to reference the data 10. c. By reading the files and autogenerating a directory structure for the files, for use on your classmate’s local computer 11. b. using a magnetic charge 12. a. used for short-term memory & b. used for long-term memory 13. a. actuator arm & c. platters 14. a. ram & d. USB flash drive 15. b. pixel grid 16. d. by closing an electrical circuit conneted to the key when the key is pressed 17. b. two dimensions: movement as 2 numbers: one in the direction of the x axis of an x, y graph and the other on the y axis. 18. c. input of commands that control the computer 19. c. the screen is using more than 1 million pixels & d.1024 is the number of 'items' top to bottom in a grid on the screen 20. a.information that identifies each individual pixel on the computer display & b. a binary code for each pixel, defining its color List the words inside the acronyms RAM - Ram Access Memory OS - operating system CPU - central processing unit KB -......

Words: 307 - Pages: 2


...NT1210 INTRO TO NETWORKING UNIT3 LAB3.3 The TCP/IP Model Mr. Randy Vogl Gus Perez 19593003 The TCP/IP network model Exercise 3.3.1 What are the distinct differences between OSI and TCP/IP models? TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection. Model TCP/IP is developed on points toward a model the internet. TCP/IP has 4 layers. OSI has 7 layers. TCP/IP more reliable than OSI OSI has strict boundaries; TCP/IP does not have very strict boundaries. TCP/IP follow a horizontal approach. OSI follows a vertical approach. In the application layer, TCP/IP uses both session and presentation layer. OSI uses different session and presentation layers. TCP/IP developed protocols then model. OSI developed model then protocol. TCP/IP offers support for connectionless communication within the network layer. In the network layer, OSI supports both connectionless and connection-oriented communication. TCP/IP is protocol dependent. OSI is protocol independent. http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/ Read more: Difference between OSI and TCP IP Model | Difference Between | Difference between OSI vs TCP IP Model http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/#ixzz3f4nyPzTU TCP/IP model protocols and functions. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the......

Words: 1306 - Pages: 6

Nt1210 Exam

...NT1210 Exam 1 Study Guide. 1. Approximately how many bytes are in a kilobyte (KB)?megabyte(MB)? 2. What are the parts of the hard drive? 3. How are voice communications converted to digital signals? 4. What does compression do to video files? 5. In this sample Web address,http://www.itt-tech.edu which part identifies the protocol being used? 6. Is the Internet one centrally controlled and managed network? 7. What manages peripheral devices on your computer? 8. What network topologies suffer from a single point of failure? 9. Define a networking standard? 10. What standards-setting body sets de facto standards? 11. Why is the TCP/IP model divided into layers? 12. What do routers do? 13. What is “encapsulation” when talking about data? 14. In TCP/IP networks, how are nodes identified layer 2 and layer 3? 15. Define the Physical Layer? 16. What is the result of the Wi-Fi Alliance’s input on how wireless devices act? 17. Frames are associated with the Layer of the TCP/IP and OSI models. 18. How do LANs and WANs differ on the way they use to send data? 19. Why is it important to understand alternating current when learning about networks? 20. What causes full duplex to transmit and receive simultaneously? 21. What does attenuate mean when describing data signals? 22. What is an RJ-45 used for on networks? 23. Which type of fiber is better for longer distances? Why? 24. 802.11g is for what type of technology? 25. What is CSMA/CA......

Words: 537 - Pages: 3

Nt1210 Final

...NT1210 FINAL EXAM EBOOK INSTITUTE DECEMBER 11, 2014 Nt1210 Final Exam eBook Institute NT1210 FINAL EXAM DOWNLOAD: NT1210 FINAL EXAM Getting Nt1210 Final Exam is easy and simple. Mostly you need to spend much time to search on search engine and doesnt get Nt1210 Final Exam documents that you need. We are here to serve you, so you can easily access, read and download its. No need to wasting time to lookup on another place to get Nt1210 Final Exam. We provide you Nt1210 Final Exam in PDF format so you can read and download its to your computer which this file are safe and virus free. You can read this document with Adobe Acrobat or other PDF Reader. We have massive collection of documents, books, eBook and pdf files including that you are looking Nt1210 Final Exam. To access this you just need to signed up and complete its through website to open your limited access for documents that you needs. So what do you waiting for? DOWNLOAD: NT1210 FINAL EXAM Nt1210 Final Exam 2 Nt1210 Final Exam eBook Institute Final Exam Nt1210 http://ebookinstitute.net/..../final-exam-nt1210.pdf Read or Download final exam nt1210 Online. Also you can search on our online library for related final exam nt1210 that you needed. You can download PDF Document such final exam nt1210 for free ... Download Filetype: PDF | Last Update: 2014-12-11 Final Exam Nt1210 Itt Tech http://ebookinstitute.net/..../final-exam-nt1210-itt-tech.pdf Read or Download final exam nt1210 itt tech Online. Also you can...

Words: 1156 - Pages: 5


...NT1210 LAB 1.1 1.1.1 2931 103 102 101 100 1000 100 10 1 2 9 3 1 ___________________ 2000 + 900 + 30 + 1 = 2931 1.1.2 1102 22 21 20 4 2 1 1 1 0 ________________ 4 + 2 + 0 = 6 1.1.3 112 21 20 2 1 1 1 __________ 2 + 1 = 3 1.1.4 Exercise 1.1.4: Create an expanded mapping for binary number 10010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 | 1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.5: Create an expanded mapping for the......

Words: 252 - Pages: 2

Nt1210 U6

...NT1210 Unit 6 Assignment 1 1. C 2. C 3. B, D 4. B,D 5. A 6. C 7. A, B 8. B 9. A, B 10. C 11. C 12. A 13. C 14. A, D 15. B, D 16. A, B, D 17. B 18. B 19. C, D 20. B, C Key Terms Coverage area – the space in which the wireless radio signals in one wireless LAN can effectively reach and be used to send and receive data between the WLAN’s AP’s and its clients. Shared bandwith – a term referring to how some networks must share the right to send data by taking turns, which limits the total number of bits sent by all devices (the networks total capacity). Wi-Fi – a term created by the Wi-FiAlliance as part of its overall wireless LAN branding and marketing strategy; this term has become somewhat synonymous with wireless LAN over time. LAN edge – a reference to the part of the campus LAN with the end-user devices and the switches to which they connect, through an Ethernet switch or a wireless LAN access point, that contains the largest number of physical links. WLAN hotspot – a location, typically in a business like a retailer or restaurant, where customers can come and go and where the company offers a wireless LAN plus internet access to its customers, often for free. Basic Service Set – (BSS) in wireless LANs, a single wireless access point (AP) and the client devices that send data to/from that AP. Extended Service Set – (ESS) a wireless LAN in which all devices......

Words: 470 - Pages: 2


...NT1210 Lab 3 3.1.1 If wireless devices where not governed by the Wi-Fi alliance it would make it hard to communicate hardware and software between different machines. That would mean cable providers, cellphone providers, and internet providers would all have to use their own Wi-Fi frequencies. Without the WI-FI alliance it would be to hard to manage day to day life with all devices not being able to share hardware and software. Also there would be no real security so it would be easy for someone to hack all of your information. 3.1.2 A model that is used to visualize something that I would use is power points. It is easier to explain something to someone when you break down the information into slides and show key points. Power points make information easier to understand. 3.1.3 Data Link Physical Application Network Transport 3.1.4 If the model is to general then you wouldn’t understand it. If the model is to granular then the data would begin to overlap itself. Review.3.1 1. The data wouldn’t be filtered correctly so there would be connection errors. 2. (OSI) started in the 1970s, with a lot of progress on individual standards in the 1980s, and with vendor products appearing by the early 1990s. It was created to compete with TCP/IP. It broke everything into layers and each layer provided facilities to the layer above it and below it. 3. (TCP)/IP resulted from research and......

Words: 334 - Pages: 2

56 komentarzy | Download | Naisho no Tsubomi