Premium Essay

Nt 1310 Unit 1

In: Computers and Technology

Submitted By jay101800
Words 277
Pages 2
Data enters the system it gets converted into binary computer language. This data is sent through the network and encapsulated into packets. These packets have headers and trailers which indicate the direction of travel. Therefore the packets carry the information to and from destination. In addition this includes a number place in other words it keeps its place in the order it was sent.
The packets travel through routers as in goes through the network. The access network router would be the first router. The packets are not limited to just one router sometimes these packets will travel through multiple routers in multiple topologies. This can include Regional Networks, Long-Haul Networks, and Ocean Networks. The network and each router will determine which direction of travel is best path for the packet. As things change within the network something are slower than others it learns from it and makes changes for better performance. With this method the packets will more than likely arrive out of order. Depending if you use TCP or UDP, you will get an acknowledgement of the receipt of each packet to the sending system. The sending system will resend any lost information. When the all the packets get to the destination, they get put back in order based on the header and trailer information. Than the data goes the reverse order of encapsulation to be read at the server or computer. This all happens usually at the milliseconds, in reference to time taken. The server would send information back along similar lines except that the data could take a different route based on the routers routing table at the time of…...

Similar Documents

Free Essay

Nt 2670 Unit 1 Assignment 1

...Installing Server Roles with a Batch File 1. What does the /w switch do? Why is it used? “¹/W switch specifies the warning level of the MIDL compiler.” 2. What is the goal of port scanning? ServerManagerCmd.exe command-line tool can be utilized to install or remove Server 2008 Roles and Features. “Type the following, in which name represents the command name of the role, role service, or feature that you want to remove, and then press Enter. The -restart parameter restarts the computer automatically after removal is complete, if a restart of the computer is required. ” ServerManagerCmd.exe -remove name –restart”² 3. What is the command to start the DHCP Server service? “To start the DHCP service, use the command/sbin/service dhcpd start. To stop the DHCP server, use the command /sbin/service dhcpd stop.”³ 4. What command is used to configure a DNS zone? “dnscmd [ServerName] /zoneadd ZoneName ZoneType [/dp FQDN| {/domain|/enterprise|/legacy}] /load”⁴ References 1. /W switch. (n.d.). (Windows). Retrieved March 20, 2014, from 2. Dnscmd Syntax. (n.d.). : Domain Name System(DNS). Retrieved March 20, 2014, from 3. Removing Server Roles and Features. (n.d.). Removing Server Roles and Features. Retrieved March 20, 2014, from 4. Start or......

Words: 274 - Pages: 2

Premium Essay

Nt Unit 6 Assignment 1

...Unit 6. Assignment 1. AD User/Group Design Scenario Dear Junior Admin, I received your E-mail and in response I recommend that you do the following. Since there is a domain for each department, such as Marketing, accessing one printer is rather easy. To start off you will need to create a group that allows access to the one printer within each department in your company. After creating each group you must then assign it to a domain local group, global group and then to a universal group. Then you will need to add it to the marketing domain local group. For HR, you will need to take all of the users within the forest and add them to a global then universal group. Proceed to take the universal group and add it to the domain local group within their domain. These users will then have access to whatever is in that universal group, therefore you must make sure that you assign the printer for them to print vacation requests to the HR department. You must take a slightly different approach for R&D. To allow access to only the server, you must first create a domain local group that has some administrative rights. Add them to a customized admins group that you have control of. You can assign these rights and permissions as you create and assign them. Remember to limit their access to their local machines only. You can do all of this through the desktop local user account settings. You may also take a different route if you choose to. This is one of the approaches you may......

Words: 288 - Pages: 2

Premium Essay

Unit 1 Exercise 1 Nt 1310

...The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off chance the Michigan gamer decided...

Words: 324 - Pages: 2

Premium Essay


...Michael Campbell 10/15/2014 NT1310 Unit 5 Lab1 New Building – Wired and Wireless The advancements in technology have made it necessary to rely on a combination of solutions to keep the cost so there is not any sacrificing security. For the most part, the basis of the network will be a wired solution. A wired solution will keep the security high, so a hacker would have to be physically attached to the network to gain full access. Running a wired network is more cost effective because wireless technology is still new enough so the cost is higher. By running new wired networks, longevity can be built into it by planning ahead. Racks, patch cabling, and wired routers are less difficult to troubleshoot. A wireless solution is can be very attractive due to the fact that there are relatively few cables, but they are more susceptible to security issues and cost is higher than wired networks. This network is less of a physical set up and more of a logical network, due in part to assigning and managing all of the IP addresses. Wireless routers, wireless access points, and Wi-Fi network cards have their limitations, however they can be utilized in areas (such as an internet café) where security is not as important. The tools for both types of installs are mostly the same, with a few differences depending upon the cable types being used; the testing tools change a bit when going after the range of the wireless network. There are many apps for your smartphone that allow you to......

Words: 320 - Pages: 2

Premium Essay

Nt 1310 Unit 1, Assignment 1

...Cell Phones – Cellphones use both voice and data communication. To give an example: a person talking on a cellphone will use “voice” communication. On the other side, “Data” technology is also used on smartphones which allow them to search the internet and download different files. Landlines – Landlines usually and more than common use voice communication. Though newer landlines have the option to use what’s called a NCID (Network Caller ID) which uses data sent over a TCP connection. SMS/Text Messaging – SMS or text messages can be used in a variety of ways. Examples include: cellphones and internet texting. SMS does not use any kind of voice technology and therefore is sent over data networks. Fax Machines – Fax machines have analog modems. This type of modem technology uses the voice network. When the receiving end gets a fax connection it listens for a digital connection that has been converted from an analog signal using a voice network. Pagers – Pagers were primarily a data network. They worked by sending numerical short messages, something that may have been a bit similar to texting but with numbers. Since the introduction of data pagers, voice pagers have also been brought into the picture. These types of pagers use the” voice” network. VOIP Phones – VOIP (Voice over Internet Protocol) is a technology that can transmit audio messages over the internet. VOIP is transferred over an internet protocol it thereby uses data networks. Something that might be worth...

Words: 315 - Pages: 2

Free Essay

Unit 1 Nt 1104

...S0/0/0 S0/0/1 R2 Fa0/0 S0/0/0 S0/0/1 R3 Fa0/0 S0/0/0 S0/0/1 PC0 NIC PC1 NIC PC2 NIC Task 1: Prepare the Network. Step 1: Cable a network that is similar to the one in the Topology Diagram. You can use any current router in your lab as long as it has the required interfaces shown in the topology. Note: If you use 1700, 2500, or 2600 routers, the router outputs and interface descriptions will appear different. Disregard, we are using 2811 or a generic router. Step 2: Clear any existing configurations on the routers. Disregard in PT! Task 2: Perform Basic Router Configurations. Perform basic configuration of the R1, R2, and R3 routers according to the following guidelines: 1. Configure the router hostname. 2. Disable DNS lookup. Type “no ip domain-lookup” w/o the italics. 3. Configure a privileged EXEC mode password. 4. Configure a message-of-the-day banner. 5. Configure a password for console connections. 6. Configure a password for VTY connections. Task 3: Configure and Activate Serial and Ethernet Addresses. Step 1: Configure interfaces on R1, R2,......

Words: 3741 - Pages: 15

Premium Essay

Nt 1310 Unit 1

...Ryan Heath NT1310 12/14/14 Unit 1 Assignment 1 Cell Phones: Cell phones use both data and voice networks. Although most people text now a days and rarely do people call each other. The older cell phones used voice only, they didn’t have the capability of a data network. You can also stream audio and video using your cellular network. Landline Phones: Landline phones are voice only. There is no way to use data through a landline phone. It can be used for internet but that is through a dial up connection. Landlines work within a network of central hubs that started out with a human operator connecting you to another person. SMS/Text messaging: Text messaging is a data service that allows users to send messages back and forth between their devices. You can also send pictures through text messages. Fax Machines: A fax is sent immediately gets digitized and packaged in secure TCP packets and sent to natural data Inc. Fax machines use an analog data signal. Pager: A way to notify individuals of incoming calls by tone, it uses a data signal. This was the start of the text message area. People could use a series of numbers to send messages. VOIP: Voice over IP is a phone that uses digital technology to make phone calls on the internet rather than through phone lines. A VOIP phone allows us to bypass the phone companies completely, it uses data networks. Skype/Facetime: To use these services you have to have a data network in order to get on the internet to use...

Words: 505 - Pages: 3

Premium Essay

Nt 1330 Unit 1 Exercise 1

...Unit 1. Exercise 1. IP Addressing Scenario Course Objectives and Learning Outcomes In this Exercise, you will explain IP address components, contrast classful and classless IP addressing, and explain the function of DNS and DHCP. Assignment Requirements Respond to the following scenario with design considerations and recommendations: You are an IT Administrator for a newly founded company and have been tasked with designing an IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth within the next two years. At a minimum, address these specific questions, in addition to any other concerns/considerations: 1. What subnet range/s should be used? 2. Should IP addresses be dynamically or statically assigned? 3. Should one or more network/subnets be used? 4. If DHCP is used, should a router, firewall or Windows Server be utilized and why? Respond in detail, justifying your recommendations. In your response, consider future growth and design considerations. Submission Requirements 1-2 pages, Microsoft Word, double-spaced, 12 pt. font In response to your question I would use a classless addressing and start at for your network address with a subnet mask of This gives you 254 hosts per subnet which will easily cover your 50% growth over the......

Words: 384 - Pages: 2

Premium Essay

Nt 1310 Unit 1 Assingment 1

...1. Cell phones a. Cell phones are on a voice network for the most part b. Cell phones do use data services. c. Cellphones can access networks for internet an voice 2. Landline Phones a. This is a Voice network b. No power is needed to use this network c. The network actually builds electricity why moving thought the house 3. SMS/Text Messaging a. SMS (Short message service) is a mechanism of delivery of short messages over the mobile networks. b. It is a store and forward way of transmitting messages to and from mobiles. c. The message (text only) from the sending mobile is stored in a central short message center (SMS) which then forwards it to the destination mobile. 4. Fax Machine a. Voice, although the two are becoming one and the same thing to a certain extent now. b. Internally all the large telephone companies are switching to unified data networks to carry all of their traffic, and tweaking the parameters for best results with each distinct type of traffic going onto the network. c. Fax Machines are not used nearly as much as email is used today 5. Pagers a. A way to notify individuals of incoming calls by a tone, it uses a data signal. b. Was also used to relay short messages to doctors in hospitels c. Was only capable of receaving signals not capable of sending them again. 6. VOIP (voice over IP) Phones a. Uses digital technology to make phone calls on the Internet rather than through phone lines. b. A VoIP phone allows us to bypass the......

Words: 326 - Pages: 2

Free Essay

Nt 2640 Unit 1 Summary

...Unit 1 Summary: Chapters 1,2,3,4 Chapter 1 – The TCP/IP and OSI Networking Models: * A network model sometimes also called either a networking architecture or networking blueprint refers to a comprehensive set of documents used to describe the functions of a network as a whole * The international organization for standardization (ISO) took on the task to create such a model, starting as early as the late 1970’s beginning work on what would become known as the open systems interconnection (OSI) networking model. * IP defines addresses for several important reasons. First each device that uses TCP/IP needs a unique address so that it can be identified on the network and IP also figures out how to group addresses together. * The term IP host refers to any device, regardless of size or power that has an IP address and connects to any TCP/IP network * The Current OSI Model: 1. Application 2. Presentation 3. Session 4. Transport 5. Network 6. Data Link 7. Physical Chapter 2 – LAN Fundamentals: * File Sharing: Each computer can be configured to share all or parts of its file system so that the other computers can read, or possibly read and write, the files on another computer. * File Transfers: A computer could install a file transfer server, thereby allowing other computers to send and receive files to and from that computer. * The term collision domain defines the set of devices whose frames could collide *......

Words: 483 - Pages: 2

Free Essay

Nt 1310 Unit 1 Ex 1

...Introduction One of the most important items about gaming is there are winners and losers (in a fun and entertaining way), which influences and entices players all over the world. All of the variables involved with the networks that provide gaming platforms are so dynamic and diverse. From games that are purely for fun or learning there will be a huge market for deploying bigger networks. This is one reason networks growth should grow exponentially. Below is what I have identified as a gaming or Local Exchange network. “Retrieved from,” 12/17/2013 Posted January 17th, 2013 at 19:30 EDT by Timothy Nunes “Retrieved from,” 12/17/2013 “Retrieved from,” 12/17/13 By Bradley Mitchell References • Home Wi-Fi Security Checklist Cited in the "Handbook of Electronic Security and Digital Forensics" and other titles! • Fixing Common Internet Connection Problems There's nothing more frustrating than a broken Internet connection. We have some tips that can help. Summary The development of a good gaming network has many components that work to enable the end user to have a full experience of entertainment and enjoyment. Some networks are much smaller which can be setup for home use. The ability to play a...

Words: 295 - Pages: 2

Premium Essay

Nt-1310 Unit 2 Activity 1 Cloud Computing

...Fidel Luna (15275168) NT-1310 Unit 2 Lab Cloud Computing Research iCloud Drive Inc. #566-533W Roulette Street, Pembina North Dakota, 58271 USA Founded in 2000, iCloud Inc. is recognized as a thought leader and innovator of Cloud services, bringing continuous innovation through high-performing cloud solutions to clients that want simple Internet Technology delivered in a less expensive way. iCloudDrive brings powerful backup, collaboration and sharing features to your business. It’s easy to use making it suitable for everyone – whether you’re a one-person business or a large enterprise. Provider | Cost | Speed | Space | APIs | Customer Service | Users | Ecryption | ICloud Express | $38.00/Month | n/a | 2 TB | All | Good | 3 | 256 Bit |   | $125.00/Month | n/a | 10 TB+ | All | Good | 10 + | 256 Bit | Rackspace General Purpose * High-performance, RAID 10-protected SSD storage * Redundant 10-Gigabit networking * Option of booting from Cloud Block Storage (additional charges apply for Cloud Block Storage) * Disk I/O up to ~35,000 4K random read IOPS and ~35,000 4K random write IOPS* Provider | Cost | Speed | Space | APIs | Customer Service | Users | Ecryption | General1-2 | $29.00/mo | 400Mb/s | 40GB SSD |   | 24x7x365 | 2 |   | General1-4 | $58.00/mo | 800Mb/s | 80GB SSD |   | 24x7x365 | 4 |   | General1-8 | $117.00/mo | 1,600Mb/s | 160GB SSD |   | 24x7x365 | 8 |   | OneDrive Store: Securely store all your files and share......

Words: 287 - Pages: 2

Free Essay

Nt 1210 Unit 1 Assignment

...Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 > 1 x 1 = 1 2931 Exercise 1.1.2 22 > 4 x 1 = 4 21 > 2 x 1 = 2 20 > 1 x 0 = 0 4+2+0= 6 Exercise 1.1.3 21 > 2 x 1 =2 20 > 1 x 1= 1 2+1= 3 Exercise 1.1.4 24 > 16 x 1 = 16 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 16+0+0+2+0=18 Exercise 1.1.5 11100010 27 > 128 x 1 = 128 26 > 64 x 1 = 64 25 > 32 x 1 = 32 24 > 16 x 0 = 0 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 128+64+32+0+0+0+2+0=226 > Exercise 1.1.6 156 156 > 27 > 128 x 1 = 128/ 156-128= 28 28 > 26 > 64 x 0 = 0 28 > 25 > 32 x 0 =0 28 > 24 > 16 x 1 = 16/ 28-16=12 12 > 23 > 8 x 1 = 8/ 12-8=4 4 > 22 > 4 x 1 = 4/ 4-4=0 0 > 21 > 2 x 0 = 0 0 > 20 > 1 x 0 =0 100111002 = 156 Exercise 1.1.7 255 255 > 27 > 128 x 1 = 128/ 255-128=127 127 > 26 > 64 x 1 = 64/ 127-64=63 63 > 25 > 32 x 1 = 32/ 63-32=31 31 > 24 > 16 x 1 = 16/ 31-16=15 15 > 23 > 8 x 1 = 8/ 15-8=7 7 > 22 > 4 x 1 =......

Words: 2960 - Pages: 12

Premium Essay

Nt 1310

...NT 1310 Physical Networking This packet includes: Unit 2 Assignment 1: Service Provider Types Exercise 1: Triple Play Marketing Unit 2 Assignment 1- Service Provider Types RBOCS - Regional Bell Operating Companies. These seven companies were established after an antitrust suit against AT&T. It split the company into seven regional companies that handle local exchange service. They are also known as “Baby Bells.” These companies handled almost all of the telephone services across the country. ILEC - Incumbent Local Exchange Carrier. This is a local telephone company that existed when AT&T was broken up into the RBOCS. It was an independent telephone company that provided telephone services in a specific geographical area. ILECs compete with CLECs. CLEC is an acronym for competitive local exchange carriers. They compete with ILECs by providing private line and special access services. They are not affiliated with the RBOCs. Some states especially encourage these companies because they are competitive and the opposite of the monopolies. MSO’s - Multiple system operators. These are defined as an operator of multiple cable television systems. This usually refers to large cable companies that provide service for multiple communities, such as Time Warner Cable, ComCast or Charter Cable. These MSOs provide television service, broadband internet services, and telephone services. ISP - Internet service provider. This is any company that provides customers direct......

Words: 511 - Pages: 3

Free Essay

1310 Unit 1 Assignment 1

...Unit 1 Assignment: Integrated Circuit Technology 2) Processor | Transistor count | Date of introduction | Manufacturer | Intel 4004 | 2,300 | 1971 | Intel | Intel 8008 | 3,500 | 1972 | Intel | Intel 8080 | 4,500 | 1974 | Intel | Intel 8085 | 6,500 | 1976 | Intel | Intel 8086 | 29,000 | 1978 | Intel | Intel 8088 | 29,000 | 1979 | Intel | Intel 80286 | 134,000 | 1982 | Intel | Intel 80186 | 55,000 | 1982 | Intel | Intel 80386 | 275,000 | 1985 | Intel | Intel i960 | 250,000 | 1988 | Intel | Intel 80486 | 1,180,235 | 1989 | Intel | Pentium | 3,100,000 | 1993 | Intel | Pentium Pro | 5,500,000 | 1995 | Intel | Pentium II Klamath | 7,500,000 | 1997 | Intel | Pentium II Deschutes | 7,500,000 | 1998 | Intel | Pentium III Katmai | 9,500,000 | 1999 | Intel | Pentium II Mobile Dixon | 27,400,000 | 1999 | Intel | Pentium III Coppermine | 21,000,000 | 2000 | Intel | Pentium 4 Willamette | 42,000,000 | 2000 | Intel | Pentium III Tualatin | 45,000,000 | 2001 | Intel | Pentium 4 Northwood | 55,000,000 | 2002 | Intel | Itanium 2 McKinley | 220,000,000 | 2002 | Intel | Itanium 2 Madison 6M | 410,000,000 | 2003 | Intel | Pentium 4 Prescott | 112,000,000 | 2004 | Intel | Itanium 2 with 9 MB cache | 592,000,000 | 2004 | Intel | Pentium 4 Prescott-2M | 169,000,000 | 2005 | Intel | Pentium 4 Cedar Mill | 184,000,000 | 2006 | Intel | Dual-core Itanium 2 | 1,700,000,000 | 2006 | Intel | Core 2 Duo Conroe | 291,000,000 | 2006 | Intel | Core...

Words: 535 - Pages: 3

BLEACH Brave Souls | DDR Nr.1161/64 ** 10 Jahre NVA 1966, postfrisch | NetU VF Dvdrip