1310 Nesbit

In: Business and Management

Submitted By HneenAdil
Words 4863
Pages 20
S

w
9B04C013

Ebrahim El Kalza prepared this case under the supervision of Professor James A. Erskine solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality.
Ivey Management Services prohibits any form of reproduction, storage or transmittal without its written permission. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Ivey Management Services, c/o Richard Ivey School of Business, The University of
Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca.
Copyright © 2004, Ivey Management Services

Version: (A) 2009-10-07

That’s not at the Matthews standard! You’re going to have to perform at a higher level if you want to work here!
Summer Associate Moez Kassam slowly rubbed his temples as his senior manager, Sherif Mahfouz, at
Matthews Management Consulting stormed out of the client office they shared. It was early August 2003, and Kassam had been in Abu Dhabi for only two weeks. Already his dream assignment was becoming a nightmare. He felt he could do no right, and was beginning to lose confidence in his abilities. This was the third time he had been scolded, and he felt his chance of leveraging the internship into a full-time offer with Matthews was in serious jeopardy.
THE CONSULTING INDUSTRY

Since the burst of the dot-com bubble in 2000, many articles, in business magazines, had characterized the industry’s decline and even forecasted its demise. With the consulting industry’s role in scandals such as
Enron, the glut of MBA…...

Similar Documents

Nt 1310 Unit 3

...Application is a term used to describe the different types of cable i.e. cat5, cat5e, and so on and the different shielding or fire rating Unshielded Twisted-Pair is copper wire that is used in a twisted pair. Which is two conductors of a single circuit that are twisted together to prevent crosstalk UTP typically have only one outer covering or jacket for one or more of the twisted pairs. Shielded Twisted-Pair is copper wire that is almost the same but also with the outer covering each twisted pair is also shielded separately and then shielded again before the outer jacket Fiber-Optic Cable bandwidth is dramatically higher than with copper speeds and it uses a strand of glass or plastic to transmit data using light pulses transmission distances are much further away it is not susceptible to outside EMI or crosstalk interference. It is more secure than copper wire it very hard to tap in to unlike copper wire. Dark Fiber is just a term used for unused or unneeded strands of installed fiber because you always want to install more than you need cause networks always grow. Coaxial Cable is widely used for cable tv it has solid copper core with a Teflon insulation around that either a foil sleeve of a braided wire mesh and then the outer jacket Plenum is the space between the deck ant the false ceiling when it is used for HVAC Riser is a vertical shaft that allows you to run wires between two floors Rip Cord is installed in some wire it is also called the slitting cord......

Words: 569 - Pages: 3

Nt 1310 Final Review

...Term Name the common cable types used today | | Definition UTP, STP, and Fiber Optic | | | Term What unit of measurement is a tenfold logarithmic ratio of power output to power input? | | Definition Decibel | | | Term Name 3 things that can contribute to attenuation. | | Definition Conductor Resistance, Mutual Capactitance, Impedence. | | | Term Name 3 types of crosstalk. | | Definition Near end cross talk, Far end Cross Talk, Equal Level Far end cross talk. | | | Term Name an organization which is part of the US goverment and controls communications. | | Definition FCC | | | Term What is the National Fire Protection Association responsible for? | | Definition to help protect people, property, and the environment from fire damage. | | | Term A telecommunications room can sometimes be referred to as what? | | Definition An enclosed space for housing telecommunications equipment. | | | Term Backbone cabling includes what? | | Definition The physical/electrical interconnections between telecommunications rooms and equipment rooms. | | | Term What is NOT a network architecture commonly used today? | | Definition | | | Term Name some characteristic about 10Base-T networking? | | Definition max cable length is 100 meters UTP | | | Term According to the NEC, article 800.100, Primary protectors shall be grounded: | | Definition The grounding conductor shall be insulated | | | Term What...

Words: 1003 - Pages: 5

Nt 1310 Unit 7 Definitions

...1. Crosstalk - Unwanted transfer of signals between communication channels. 2. Waveguides – A metal tube or other device confining and conveying microwaves. 3. FTTH – Fiber to the x is a generic term for any broadband network architecture using optical fiber to provide all or part of the local loop used for last mile telecommunications. 4. Simplex – A fiber-optic cable or cord carrying a single fiber. 5. Half Duplex – Allowing the transmission of signals in both directions but not simultaneously. 6. Full Duplex – Refers to the transmission of data in two directions simultaneously. 7. Photodiode – A semiconductor diode that, when exposed to light, generates a potential difference or changes its electrical resistance. 8. Amplitude Modulation – The modulation of a wave by varying its amplitude, used chiefly as a means of radio broadcasting, in which an audio signal is combined with a carrier wave. 9. Analog Transmission – A transmission method of conveying voice, data, image, signal or video information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that of a variable. 10. Digital Transmission – The use of discrete electrical pulses, light pulses, or other discrete signals to create binary codes for data communications. 11. Sample Rate – The sampling rate, sample rate, or sampling frequency defines the number of samples per unit of time taken from a continuous signal to make a discrete signal. 12.......

Words: 535 - Pages: 3

Nt 1310

...iLogic Samples – Inventor 2011 The iLogic Railing Design samples are provided as examples to demonstrate some ofAutodesk Inventor’s iLogic capabilities as well as some of the common methods used in basic as well as advanced rule types. These sample assemblies are included in a project named iLogic Samples that will be listed among your other existing projects after installing Inventor 2011. Also included with each sample is the VB.NET source code for the forms launched by the Form rule included in each assembly. You can download and install VB Express 2008 in order to open either solution. The DLLs generated from these two VB projects have also been installed alongside the assembly files. With these dll’s in place, you can click the iLogic iTrigger Icon with the main assembly loaded to launch the form for modifying the driving design parameters. You will notice that the advanced form applies changes to the design immediately, whereas you must click OK to apply changes using the basic form. Notes about the rules included in the samples: 1. There are rules embedded in the top level assembly, subassembly as well as within the individual parts. 2. All default component names have been changed. This “stabilizes” the component names so that rules referencing them continue to work if the file names they point to ever change (i.e., Design copy with new file names). 3. The order the rules appear in the iLogic Tree Editor affects the end result produced by the rules......

Words: 467 - Pages: 2

Unit 1 Exercise 1 Nt 1310

...The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off chance the Michigan gamer decided...

Words: 324 - Pages: 2

Nt-1310

...Michael Campbell 10/15/2014 NT1310 Unit 5 Lab1 New Building – Wired and Wireless The advancements in technology have made it necessary to rely on a combination of solutions to keep the cost so there is not any sacrificing security. For the most part, the basis of the network will be a wired solution. A wired solution will keep the security high, so a hacker would have to be physically attached to the network to gain full access. Running a wired network is more cost effective because wireless technology is still new enough so the cost is higher. By running new wired networks, longevity can be built into it by planning ahead. Racks, patch cabling, and wired routers are less difficult to troubleshoot. A wireless solution is can be very attractive due to the fact that there are relatively few cables, but they are more susceptible to security issues and cost is higher than wired networks. This network is less of a physical set up and more of a logical network, due in part to assigning and managing all of the IP addresses. Wireless routers, wireless access points, and Wi-Fi network cards have their limitations, however they can be utilized in areas (such as an internet café) where security is not as important. The tools for both types of installs are mostly the same, with a few differences depending upon the cable types being used; the testing tools change a bit when going after the range of the wireless network. There are many apps for your smartphone that allow you to......

Words: 320 - Pages: 2

Nt 1310 Unit 1, Assignment 1

...Cell Phones – Cellphones use both voice and data communication. To give an example: a person talking on a cellphone will use “voice” communication. On the other side, “Data” technology is also used on smartphones which allow them to search the internet and download different files. Landlines – Landlines usually and more than common use voice communication. Though newer landlines have the option to use what’s called a NCID (Network Caller ID) which uses data sent over a TCP connection. SMS/Text Messaging – SMS or text messages can be used in a variety of ways. Examples include: cellphones and internet texting. SMS does not use any kind of voice technology and therefore is sent over data networks. Fax Machines – Fax machines have analog modems. This type of modem technology uses the voice network. When the receiving end gets a fax connection it listens for a digital connection that has been converted from an analog signal using a voice network. Pagers – Pagers were primarily a data network. They worked by sending numerical short messages, something that may have been a bit similar to texting but with numbers. Since the introduction of data pagers, voice pagers have also been brought into the picture. These types of pagers use the” voice” network. VOIP Phones – VOIP (Voice over Internet Protocol) is a technology that can transmit audio messages over the internet. VOIP is transferred over an internet protocol it thereby uses data networks. Something that might be worth...

Words: 315 - Pages: 2

Nt 1310 Network Topology

...Network Topology Star Topology has its own cable that connects to a central hub or switch, multipoint repeater, or even a Multistation Access Unit. Data passes through the hub to reach other devices on the network. A hub, switch, or computer acts as a router to transmit messages this is in its simplest form. Star reduces the chance of failure in the network by connecting all of the systems to a central node. Star is the most common networks because of the ease of configuring and troubleshooting it. If a wire goes bad only one node will go down which prevents a huge impact on productivity. However, because a star involves a central hub or switch as well as a lot more cabling it cost more to implement. Bus topologies computers are connected to a single cable or trunk or backbone by a transceiver either directly or by using a short drop cable. All ends of the cable must be terminated, that is plugged into a device such as a computer or terminator. The number of computer affect the performance since only one computer at a time can send data the more computers you have on the network the more computers there will be waiting to send data. If there is a break in the line all computers will fail. Bus is inexpensive and very easy to install. They are limited in security and number of devices that can be on the network. Bus can only transmit slowly at 10 \Mb/s. Ring topology network computers are connected by a single loop of cable, the data signals travel around the loop in......

Words: 374 - Pages: 2

Nt 1310 Unit 1

...Data enters the system it gets converted into binary computer language. This data is sent through the network and encapsulated into packets. These packets have headers and trailers which indicate the direction of travel. Therefore the packets carry the information to and from destination. In addition this includes a number place in other words it keeps its place in the order it was sent. The packets travel through routers as in goes through the network. The access network router would be the first router. The packets are not limited to just one router sometimes these packets will travel through multiple routers in multiple topologies. This can include Regional Networks, Long-Haul Networks, and Ocean Networks. The network and each router will determine which direction of travel is best path for the packet. As things change within the network something are slower than others it learns from it and makes changes for better performance. With this method the packets will more than likely arrive out of order. Depending if you use TCP or UDP, you will get an acknowledgement of the receipt of each packet to the sending system. The sending system will resend any lost information. When the all the packets get to the destination, they get put back in order based on the header and trailer information. Than the data goes the reverse order of encapsulation to be read at the server or computer. This all happens usually at the milliseconds, in reference to time taken. The server......

Words: 277 - Pages: 2

Nt 1310 Unit 1

...Ryan Heath NT1310 12/14/14 Unit 1 Assignment 1 Cell Phones: Cell phones use both data and voice networks. Although most people text now a days and rarely do people call each other. The older cell phones used voice only, they didn’t have the capability of a data network. You can also stream audio and video using your cellular network. Landline Phones: Landline phones are voice only. There is no way to use data through a landline phone. It can be used for internet but that is through a dial up connection. Landlines work within a network of central hubs that started out with a human operator connecting you to another person. SMS/Text messaging: Text messaging is a data service that allows users to send messages back and forth between their devices. You can also send pictures through text messages. Fax Machines: A fax is sent immediately gets digitized and packaged in secure TCP packets and sent to natural data Inc. Fax machines use an analog data signal. Pager: A way to notify individuals of incoming calls by tone, it uses a data signal. This was the start of the text message area. People could use a series of numbers to send messages. VOIP: Voice over IP is a phone that uses digital technology to make phone calls on the internet rather than through phone lines. A VOIP phone allows us to bypass the phone companies completely, it uses data networks. Skype/Facetime: To use these services you have to have a data network in order to get on the internet to use...

Words: 505 - Pages: 3

Nt 1310 Midterm Exam Review

...1. Plenum and coaxial cable are not common cables used today. 2. A decibel is the unit of measurement that is a tenfold logarithmic ratio of power output to power input. 3. Frequency increases does not contribute to attenuation. 4. Mutual crosstalk is not a type of crosstalk. 5. The Federal Communications Commission (FCC) is part of the US government. 6. The National Fire Protection Association (NFPA) is responsible for the development and publication of the National Electric Code. 7. A telecommunications room can sometimes be referred to as a telecommunications room or a wiring closet. 8. Backbone cabling includes cabling between equipment rooms and building entrance facilities, in a campus environment it is the cabling between buildings’ entrances facilities, and vertical connections between floors. 9. The hub network architecture is not commonly used today. 10. 10Base-T networking only requires 2 wire pairs of an eight-pin modular jack. 11. According to the NEC, Article 800.100, primary conductors shall be grounded, the grounding conductor shall be insulated and listed as suitable for the purpose. 12. Knowing and following the electrical ad building codes helps protect the buildings occupants, helps when working with local, city, country, and state officials, and helps when working with electricians and contractors. 13. Patch cables are generally considered the weakest link in a network setup. 14. The security of a......

Words: 677 - Pages: 3

Nt 1310

...FUTURE STATEMENT Solar Technology Although not widely used, I believe the future of Solar energy technology products such as Solar panels is bright. Solar technology is one of the green energy sectors that is making a lot of difference here at home and around world. For instance, the use of solar panels in homes is very popular in most third world countries since energy cost is expensive. The cost and accessibility of this technology is much easier than here in the U.S. For instance in Africa, the use of solar panels in homes is very common. Cheap imports from China have made it affordable for most home owners. The panels are easily available and are installed by contractors without any red-tape if the person can afford it. Although, most of these countries are poor and lacks basic infrastructures, solar energy has given them the opportunity to be less dependent on fuel imports and benefit the technological advantages of a clean energy economy. On the other hand, here in the U.S. the use of solar panels in homes is not as popular as other countries. The average American homeowner doesn’t know where to buy these panels or how to get them installed. Home buyers have the perception that solar panels are not affordable so they are reluctant to consider them as an option when they build or buy a new house. Furthermore, the burden of getting licensing and permit scares off a lot of homeowners who otherwise would have benefited from this green energy technology. Regardless, I......

Words: 388 - Pages: 2

Nt-1310 Unit 2 Activity 1 Cloud Computing

...Fidel Luna (15275168) NT-1310 Unit 2 Lab Cloud Computing Research iCloud Drive Inc. #566-533W Roulette Street, Pembina North Dakota, 58271 USA Founded in 2000, iCloud Inc. is recognized as a thought leader and innovator of Cloud services, bringing continuous innovation through high-performing cloud solutions to clients that want simple Internet Technology delivered in a less expensive way. iCloudDrive brings powerful backup, collaboration and sharing features to your business. It’s easy to use making it suitable for everyone – whether you’re a one-person business or a large enterprise. Provider | Cost | Speed | Space | APIs | Customer Service | Users | Ecryption | ICloud Express | $38.00/Month | n/a | 2 TB | All | Good | 3 | 256 Bit |   | $125.00/Month | n/a | 10 TB+ | All | Good | 10 + | 256 Bit | Rackspace General Purpose * High-performance, RAID 10-protected SSD storage * Redundant 10-Gigabit networking * Option of booting from Cloud Block Storage (additional charges apply for Cloud Block Storage) * Disk I/O up to ~35,000 4K random read IOPS and ~35,000 4K random write IOPS* Provider | Cost | Speed | Space | APIs | Customer Service | Users | Ecryption | General1-2 | $29.00/mo | 400Mb/s | 40GB SSD |   | 24x7x365 | 2 |   | General1-4 | $58.00/mo | 800Mb/s | 80GB SSD |   | 24x7x365 | 4 |   | General1-8 | $117.00/mo | 1,600Mb/s | 160GB SSD |   | 24x7x365 | 8 |   | OneDrive Store: Securely store all your files and share......

Words: 287 - Pages: 2

Nt 1310

...NT 1310 Physical Networking This packet includes: Unit 2 Assignment 1: Service Provider Types Exercise 1: Triple Play Marketing Unit 2 Assignment 1- Service Provider Types RBOCS - Regional Bell Operating Companies. These seven companies were established after an antitrust suit against AT&T. It split the company into seven regional companies that handle local exchange service. They are also known as “Baby Bells.” These companies handled almost all of the telephone services across the country. ILEC - Incumbent Local Exchange Carrier. This is a local telephone company that existed when AT&T was broken up into the RBOCS. It was an independent telephone company that provided telephone services in a specific geographical area. ILECs compete with CLECs. CLEC is an acronym for competitive local exchange carriers. They compete with ILECs by providing private line and special access services. They are not affiliated with the RBOCs. Some states especially encourage these companies because they are competitive and the opposite of the monopolies. MSO’s - Multiple system operators. These are defined as an operator of multiple cable television systems. This usually refers to large cable companies that provide service for multiple communities, such as Time Warner Cable, ComCast or Charter Cable. These MSOs provide television service, broadband internet services, and telephone services. ISP - Internet service provider. This is any company that provides customers direct......

Words: 511 - Pages: 3

1310 Unit 1 Assignment 1

...Unit 1 Assignment: Integrated Circuit Technology 2) Processor | Transistor count | Date of introduction | Manufacturer | Intel 4004 | 2,300 | 1971 | Intel | Intel 8008 | 3,500 | 1972 | Intel | Intel 8080 | 4,500 | 1974 | Intel | Intel 8085 | 6,500 | 1976 | Intel | Intel 8086 | 29,000 | 1978 | Intel | Intel 8088 | 29,000 | 1979 | Intel | Intel 80286 | 134,000 | 1982 | Intel | Intel 80186 | 55,000 | 1982 | Intel | Intel 80386 | 275,000 | 1985 | Intel | Intel i960 | 250,000 | 1988 | Intel | Intel 80486 | 1,180,235 | 1989 | Intel | Pentium | 3,100,000 | 1993 | Intel | Pentium Pro | 5,500,000 | 1995 | Intel | Pentium II Klamath | 7,500,000 | 1997 | Intel | Pentium II Deschutes | 7,500,000 | 1998 | Intel | Pentium III Katmai | 9,500,000 | 1999 | Intel | Pentium II Mobile Dixon | 27,400,000 | 1999 | Intel | Pentium III Coppermine | 21,000,000 | 2000 | Intel | Pentium 4 Willamette | 42,000,000 | 2000 | Intel | Pentium III Tualatin | 45,000,000 | 2001 | Intel | Pentium 4 Northwood | 55,000,000 | 2002 | Intel | Itanium 2 McKinley | 220,000,000 | 2002 | Intel | Itanium 2 Madison 6M | 410,000,000 | 2003 | Intel | Pentium 4 Prescott | 112,000,000 | 2004 | Intel | Itanium 2 with 9 MB cache | 592,000,000 | 2004 | Intel | Pentium 4 Prescott-2M | 169,000,000 | 2005 | Intel | Pentium 4 Cedar Mill | 184,000,000 | 2006 | Intel | Dual-core Itanium 2 | 1,700,000,000 | 2006 | Intel | Core 2 Duo Conroe | 291,000,000 | 2006 | Intel | Core...

Words: 535 - Pages: 3