Premium Essay

Nt 1310 Unit 1 Week One Assignment 1-3

In: Science

Submitted By groovy514
Words 355
Pages 2
Fixed line vs Cellular
Cell phones have limited coverage area, unless in a big city with a lot cell phone towers, but there are other ways the signals can be blocked as well. Which makes a cell phone less dependable. The batteries in a cell phone need to stay charged to make or receive calls, and as long as it is charged you can use your phone any time even if you are somewhere where there is no power. Cell phone plans are usually cheaper is you are just getting a plan to talk on the phone and not a plan that includes data. A land line always works (unless it a cordless phone and the power goes out). You do not need to charge a land line phone that is connected to the wall, and you do not have to worry about a weak signal. The cost is more especially if you need to make long distance calls because that is not included in a normal plan.

Voice vs Data
Cell phones use both, you can use the voice and data at the same time because they no longer use the same antenna.
Landlines phones use both, the key tones use data because the tones transfer as data, and you talking is using the voice
SMS/text uses data, and is transferred as a message with characters over the data network
Fax uses the data, when a fax is sent it gets immediately digitized and packaged in secure TCP packets and sent to natural data inc and then secure networks operation center for final delivery.
Pagers use data, they receive a number via a small screen from incoming callers
VOIP uses the data network over the internet and bypasses the phone companies making all calls via the internet.

Online Gaming
When it comes to gaming, you start with your internet at home, contact a series of switches that are governed by the traffic management interfaces, and then the user will access the game servers and databases. This all allows multiple users to connect to the servers and with each other…...

Similar Documents

Premium Essay

Nt 1310 Unit 3

...Application is a term used to describe the different types of cable i.e. cat5, cat5e, and so on and the different shielding or fire rating Unshielded Twisted-Pair is copper wire that is used in a twisted pair. Which is two conductors of a single circuit that are twisted together to prevent crosstalk UTP typically have only one outer covering or jacket for one or more of the twisted pairs. Shielded Twisted-Pair is copper wire that is almost the same but also with the outer covering each twisted pair is also shielded separately and then shielded again before the outer jacket Fiber-Optic Cable bandwidth is dramatically higher than with copper speeds and it uses a strand of glass or plastic to transmit data using light pulses transmission distances are much further away it is not susceptible to outside EMI or crosstalk interference. It is more secure than copper wire it very hard to tap in to unlike copper wire. Dark Fiber is just a term used for unused or unneeded strands of installed fiber because you always want to install more than you need cause networks always grow. Coaxial Cable is widely used for cable tv it has solid copper core with a Teflon insulation around that either a foil sleeve of a braided wire mesh and then the outer jacket Plenum is the space between the deck ant the false ceiling when it is used for HVAC Riser is a vertical shaft that allows you to run wires between two floors Rip Cord is installed in some wire it is also called the slitting cord......

Words: 569 - Pages: 3

Premium Essay

Unit 3 Assignment 1

...Jennifer Schneider – NT 1230 – Client-Server Networking – Unit 3; Assignment 1 IPv6 Addressing 1.) Research the following organizations and explain their involvement with the Internet Public IP Addresses a. American Registry for Internet Numbers: Allocates, transfers and records maintenance of IP addresses as well as reverse DSN. b. Internet Assigned Numbers Authority: Allocates IP addresses from the pools of unallocated addresses to the RIRs according to their needs as described by global policy and to document protocol c. Asia-Pacific Network Information Center: Distributes and maintains IPv6 addresses 2.) Approximately how many IPv4 addresses are possible? There are approximately 4.3 billion IPv4 addresses available. 3.) Approximately how many IPv6 addresses are possible? There are 340,282,366,920,938,463,463,374,607,431,768,211,456 Ipv6 addresses available 4.) Why do you think the world is running out of IPv4 addresses? The internet really started in the 70s as a DARPA research project. At the time, there were 60 or so institutions expected to connect. As the interested research community grew, the addressing scheme was expanded from 8 bits (256 addresses in the predecessor to Internet Protocol (IP) known as Network Control Protocol (NCP)) to 32 bits (the IPv4 addresses we have today). At the time, it was still expected that the internet would serve largely defense, research, and educational institutions. It was essentially a laboratory experiment on a really......

Words: 411 - Pages: 2

Free Essay

Nt 1110 Unit 3 Assignment 1

...Unit 3 Assignment 1 Video Clip 1.07 Serial Parallel & Game Ports * Serial ports – 9 or 25 pins (male) * Parallel ports – 25 pins (female) * Game ports – 15 pins (female) Mouse – serial connector (old), PS/2, or USB/wireless Keyboard – 5-pin DIN (old), PS/2 or USB/wireless Network Inteface card – converts parallel communication to serial (RJ-45 connector) Modem – connects to phone line (56k), converts analog to digital & vice versa (RJ-11 connector). Video – VGA, DVI, or S-video SCSI – narrow (50-pin Type A), wide (68-pin, type P) IEEE 1394 (firewire) – serial, fast, hot swappable, used for streaming media, expected to replace SCSI Multimedia – Microphone, speakers, earphones, color coded. Video 1.09 CRT Monitor (old) & LCD Monitor (new) CRT – Cathode Ray Tube LCD – Liquid Crystal Display Contrast Ratio – Ratio of purest white to purest black Dot pitch – CRT – Distance between phosphorescent dots Pixel Pitch – LCD – Addressable pixels on screen, same as resolution. Resolution – Both CRT & LCD – Addressable points on screen. PCI Express – twice as fast as AGP Video 1.10 RAID – Redundant Array of Independent Disks Fault tolerance – real time copies of data, and data is not lost if hard drive fails. RAID – protect data in real time. RAID 0 – Striped Volume – faster speeds, no fault tolerance. Requires two or more drives, max 32 drives, CPU writes data evenly among drives, each disk has partial copy. RAID 1 – Mirrored......

Words: 487 - Pages: 2

Free Essay

Unit 3 Assignment 1

...IS3340-WINDOWS SECURITY | Encryption and BitLocker Activity | Unit 3 Assignment 1 | | | 5/1/2014 | | 1. One of the shop floor computers that is connected to your network is commonly used by the floor manager. You want the floor manager’s files to be encrypted on that computer. Although the floor manager’s documents folder is on a central server, there are some local temporary files that could contain sensitive information and should be encrypted at all times. Which Windows encryption feature would best provide encryption for all of the floor manager’s local files while leaving other users’ files unencrypted? Folder Encryption: EFS 2. The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data and the name of the spreadsheet does not change. Which Windows encryption feature would ensure this one file is always stored on the disk in encrypted format? File Encryption: EFS 3. The chief executive officer (CEO) wants to copy confidential sales projection information from her workstation to her laptop via a universal serial bus (USB) device. What is the best option to ensure the confidential information is secure during the copying process? BitLocker To Go 4. You want to encrypt your main file server’s disk that stores confidential information for several users. Which Windows encryption feature encrypts an entire disk and is not......

Words: 294 - Pages: 2

Premium Essay

Unit 3 Assignment 1

...Unit 3 Assignment 1: Compare Windows 8 and Windows RT Course Objectives and Learning Outcomes Identify the characteristics of popular mobile operating systems. Compare mobile operating systems to their related desktop operating systems. Identify the characteristics of Windows Phone. Identify differences and similarities between Windows 8 and Windows Phone 8. Assignment Requirements Research Windows 8 and Windows RT on the Microsoft website and write a paper that discusses the implications of an integrated platform. Required Resources Web browser Windows RT website http://windows.microsoft.com/en-us/windows/rt Submission Requirements Submit a one-page paper that compares Windows 8 and Windows RT. The paper should identify five similarities and five differences between the platforms. You should also discuss how an integrated platform affects users and developers. Which operating system is required for mobile application development? Why? Evaluation Criteria Category | # | Criteria | CONTENT, 90% | 1.1 | The paper should identify 5 similarities between Windows 8 and Windows RT. Up to 20 points for this element | | 1.2 | The paper should identify 5 differences between Windows 8 and Windows RT. Up to 20 points for this element | | 1.3 | The paper should discuss how an integrated platform impacts users. Up to 20 points for this element | | 1.4 | The paper should discuss how an integrated platform impacts developers. Up to 20 points for this......

Words: 283 - Pages: 2

Premium Essay

Nt Unit 6 Assignment 1

...Unit 6. Assignment 1. AD User/Group Design Scenario Dear Junior Admin, I received your E-mail and in response I recommend that you do the following. Since there is a domain for each department, such as Marketing, accessing one printer is rather easy. To start off you will need to create a group that allows access to the one printer within each department in your company. After creating each group you must then assign it to a domain local group, global group and then to a universal group. Then you will need to add it to the marketing domain local group. For HR, you will need to take all of the users within the forest and add them to a global then universal group. Proceed to take the universal group and add it to the domain local group within their domain. These users will then have access to whatever is in that universal group, therefore you must make sure that you assign the printer for them to print vacation requests to the HR department. You must take a slightly different approach for R&D. To allow access to only the server, you must first create a domain local group that has some administrative rights. Add them to a customized admins group that you have control of. You can assign these rights and permissions as you create and assign them. Remember to limit their access to their local machines only. You can do all of this through the desktop local user account settings. You may also take a different route if you choose to. This is one of the approaches you may......

Words: 288 - Pages: 2

Premium Essay

Unit 1 Exercise 1 Nt 1310

...The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off chance the Michigan gamer decided...

Words: 324 - Pages: 2

Premium Essay

Nt 1310 Unit 1

...Data enters the system it gets converted into binary computer language. This data is sent through the network and encapsulated into packets. These packets have headers and trailers which indicate the direction of travel. Therefore the packets carry the information to and from destination. In addition this includes a number place in other words it keeps its place in the order it was sent. The packets travel through routers as in goes through the network. The access network router would be the first router. The packets are not limited to just one router sometimes these packets will travel through multiple routers in multiple topologies. This can include Regional Networks, Long-Haul Networks, and Ocean Networks. The network and each router will determine which direction of travel is best path for the packet. As things change within the network something are slower than others it learns from it and makes changes for better performance. With this method the packets will more than likely arrive out of order. Depending if you use TCP or UDP, you will get an acknowledgement of the receipt of each packet to the sending system. The sending system will resend any lost information. When the all the packets get to the destination, they get put back in order based on the header and trailer information. Than the data goes the reverse order of encapsulation to be read at the server or computer. This all happens usually at the milliseconds, in reference to time taken. The server......

Words: 277 - Pages: 2

Premium Essay

Nt 1310 Unit 1

...Ryan Heath NT1310 12/14/14 Unit 1 Assignment 1 Cell Phones: Cell phones use both data and voice networks. Although most people text now a days and rarely do people call each other. The older cell phones used voice only, they didn’t have the capability of a data network. You can also stream audio and video using your cellular network. Landline Phones: Landline phones are voice only. There is no way to use data through a landline phone. It can be used for internet but that is through a dial up connection. Landlines work within a network of central hubs that started out with a human operator connecting you to another person. SMS/Text messaging: Text messaging is a data service that allows users to send messages back and forth between their devices. You can also send pictures through text messages. Fax Machines: A fax is sent immediately gets digitized and packaged in secure TCP packets and sent to natural data Inc. Fax machines use an analog data signal. Pager: A way to notify individuals of incoming calls by tone, it uses a data signal. This was the start of the text message area. People could use a series of numbers to send messages. VOIP: Voice over IP is a phone that uses digital technology to make phone calls on the internet rather than through phone lines. A VOIP phone allows us to bypass the phone companies completely, it uses data networks. Skype/Facetime: To use these services you have to have a data network in order to get on the internet to use...

Words: 505 - Pages: 3

Premium Essay

Nt 1310 Unit 1 Assingment 1

...1. Cell phones a. Cell phones are on a voice network for the most part b. Cell phones do use data services. c. Cellphones can access networks for internet an voice 2. Landline Phones a. This is a Voice network b. No power is needed to use this network c. The network actually builds electricity why moving thought the house 3. SMS/Text Messaging a. SMS (Short message service) is a mechanism of delivery of short messages over the mobile networks. b. It is a store and forward way of transmitting messages to and from mobiles. c. The message (text only) from the sending mobile is stored in a central short message center (SMS) which then forwards it to the destination mobile. 4. Fax Machine a. Voice, although the two are becoming one and the same thing to a certain extent now. b. Internally all the large telephone companies are switching to unified data networks to carry all of their traffic, and tweaking the parameters for best results with each distinct type of traffic going onto the network. c. Fax Machines are not used nearly as much as email is used today 5. Pagers a. A way to notify individuals of incoming calls by a tone, it uses a data signal. b. Was also used to relay short messages to doctors in hospitels c. Was only capable of receaving signals not capable of sending them again. 6. VOIP (voice over IP) Phones a. Uses digital technology to make phone calls on the Internet rather than through phone lines. b. A VoIP phone allows us to bypass the......

Words: 326 - Pages: 2

Free Essay

Nt 1310 Unit 1 Ex 1

...Introduction One of the most important items about gaming is there are winners and losers (in a fun and entertaining way), which influences and entices players all over the world. All of the variables involved with the networks that provide gaming platforms are so dynamic and diverse. From games that are purely for fun or learning there will be a huge market for deploying bigger networks. This is one reason networks growth should grow exponentially. Below is what I have identified as a gaming or Local Exchange network. “Retrieved from, http://www.psu.com/a018031/” 12/17/2013 Posted January 17th, 2013 at 19:30 EDT by Timothy Nunes “Retrieved from, http://www.hcl-axon.com/Our_Products/gamedge/” 12/17/2013 “Retrieved from, http://compnetworking.about.com/od/homenetworking/ig/Home-Network-Diagrams/Hybrid-Network-Diagram.htm” 12/17/13 By Bradley Mitchell References • Home Wi-Fi Security Checklist Cited in the "Handbook of Electronic Security and Digital Forensics" and other titles! • Fixing Common Internet Connection Problems There's nothing more frustrating than a broken Internet connection. We have some tips that can help. Summary The development of a good gaming network has many components that work to enable the end user to have a full experience of entertainment and enjoyment. Some networks are much smaller which can be setup for home use. The ability to play a...

Words: 295 - Pages: 2

Premium Essay

Nt-1310 Unit 2 Activity 1 Cloud Computing

...Fidel Luna (15275168) NT-1310 Unit 2 Lab Cloud Computing Research iCloud Drive Inc. #566-533W Roulette Street, Pembina North Dakota, 58271 USA Founded in 2000, iCloud Inc. is recognized as a thought leader and innovator of Cloud services, bringing continuous innovation through high-performing cloud solutions to clients that want simple Internet Technology delivered in a less expensive way. iCloudDrive brings powerful backup, collaboration and sharing features to your business. It’s easy to use making it suitable for everyone – whether you’re a one-person business or a large enterprise. Provider | Cost | Speed | Space | APIs | Customer Service | Users | Ecryption | ICloud Express | $38.00/Month | n/a | 2 TB | All | Good | 3 | 256 Bit |   | $125.00/Month | n/a | 10 TB+ | All | Good | 10 + | 256 Bit | Rackspace General Purpose * High-performance, RAID 10-protected SSD storage * Redundant 10-Gigabit networking * Option of booting from Cloud Block Storage (additional charges apply for Cloud Block Storage) * Disk I/O up to ~35,000 4K random read IOPS and ~35,000 4K random write IOPS* Provider | Cost | Speed | Space | APIs | Customer Service | Users | Ecryption | General1-2 | $29.00/mo | 400Mb/s | 40GB SSD |   | 24x7x365 | 2 |   | General1-4 | $58.00/mo | 800Mb/s | 80GB SSD |   | 24x7x365 | 4 |   | General1-8 | $117.00/mo | 1,600Mb/s | 160GB SSD |   | 24x7x365 | 8 |   | OneDrive Store: Securely store all your files and share......

Words: 287 - Pages: 2

Free Essay

Nt 1210 Unit 1 Assignment

...Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 > 1 x 1 = 1 2931 Exercise 1.1.2 22 > 4 x 1 = 4 21 > 2 x 1 = 2 20 > 1 x 0 = 0 4+2+0= 6 Exercise 1.1.3 21 > 2 x 1 =2 20 > 1 x 1= 1 2+1= 3 Exercise 1.1.4 24 > 16 x 1 = 16 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 16+0+0+2+0=18 Exercise 1.1.5 11100010 27 > 128 x 1 = 128 26 > 64 x 1 = 64 25 > 32 x 1 = 32 24 > 16 x 0 = 0 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 128+64+32+0+0+0+2+0=226 > Exercise 1.1.6 156 156 > 27 > 128 x 1 = 128/ 156-128= 28 28 > 26 > 64 x 0 = 0 28 > 25 > 32 x 0 =0 28 > 24 > 16 x 1 = 16/ 28-16=12 12 > 23 > 8 x 1 = 8/ 12-8=4 4 > 22 > 4 x 1 = 4/ 4-4=0 0 > 21 > 2 x 0 = 0 0 > 20 > 1 x 0 =0 100111002 = 156 Exercise 1.1.7 255 255 > 27 > 128 x 1 = 128/ 255-128=127 127 > 26 > 64 x 1 = 64/ 127-64=63 63 > 25 > 32 x 1 = 32/ 63-32=31 31 > 24 > 16 x 1 = 16/ 31-16=15 15 > 23 > 8 x 1 = 8/ 15-8=7 7 > 22 > 4 x 1 =......

Words: 2960 - Pages: 12

Premium Essay

Nt Week 1 Assignment

...Courtney Patin Week 1 Telecommunications Exercise 1) Local Loop a. The local loop is the physical wiring that connects you to the public switched telephone network (PSTN). This line can be a voice line, or it can be a data line. The physical wiring for the local loop consists of a pair of twisted copper wires that run from the telephone company's central office (CO) to the subscriber’s premise and another pair of twisted copper wires that run back to the telephone company’s CO. 2) Central Office a. In telephone communication in the United States, a central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called local loop. The central office has switching equipment that can switch calls locally or to long-distance carrier phone offices. In other countries, the term public exchanges is used. 3) Local Exchanges a. A local exchange carrier (LEC) is the term used in the U.S. for describing the telephone company which operates within a local area and provides telecommunication services within that area. a.i. Local exchange carriers started across the U.S. following the breakup of the Bell system due to antitrust regulations. Local exchange carriers are allowed only to handle local calls, and not any long-distance traffic. 4) POP a. Point of presence (POP) is the point at which two or more different networks or communication devices build a connection with each other. POP mainly refers to an access point,......

Words: 1525 - Pages: 7

Free Essay

1310 Unit 1 Assignment 1

...Unit 1 Assignment: Integrated Circuit Technology 2) Processor | Transistor count | Date of introduction | Manufacturer | Intel 4004 | 2,300 | 1971 | Intel | Intel 8008 | 3,500 | 1972 | Intel | Intel 8080 | 4,500 | 1974 | Intel | Intel 8085 | 6,500 | 1976 | Intel | Intel 8086 | 29,000 | 1978 | Intel | Intel 8088 | 29,000 | 1979 | Intel | Intel 80286 | 134,000 | 1982 | Intel | Intel 80186 | 55,000 | 1982 | Intel | Intel 80386 | 275,000 | 1985 | Intel | Intel i960 | 250,000 | 1988 | Intel | Intel 80486 | 1,180,235 | 1989 | Intel | Pentium | 3,100,000 | 1993 | Intel | Pentium Pro | 5,500,000 | 1995 | Intel | Pentium II Klamath | 7,500,000 | 1997 | Intel | Pentium II Deschutes | 7,500,000 | 1998 | Intel | Pentium III Katmai | 9,500,000 | 1999 | Intel | Pentium II Mobile Dixon | 27,400,000 | 1999 | Intel | Pentium III Coppermine | 21,000,000 | 2000 | Intel | Pentium 4 Willamette | 42,000,000 | 2000 | Intel | Pentium III Tualatin | 45,000,000 | 2001 | Intel | Pentium 4 Northwood | 55,000,000 | 2002 | Intel | Itanium 2 McKinley | 220,000,000 | 2002 | Intel | Itanium 2 Madison 6M | 410,000,000 | 2003 | Intel | Pentium 4 Prescott | 112,000,000 | 2004 | Intel | Itanium 2 with 9 MB cache | 592,000,000 | 2004 | Intel | Pentium 4 Prescott-2M | 169,000,000 | 2005 | Intel | Pentium 4 Cedar Mill | 184,000,000 | 2006 | Intel | Dual-core Itanium 2 | 1,700,000,000 | 2006 | Intel | Core 2 Duo Conroe | 291,000,000 | 2006 | Intel | Core...

Words: 535 - Pages: 3

2 unids 48mm HSS acero inoxidable metal carburo Sierra abierta del agujero | Drama Online Movies | Season 6 Episode 2 Job