It 220 Network Standards

In: Computers and Technology

Submitted By Dkfae
Words 1074
Pages 5
Lab 2

Exercise 2.1.1

If one of the five (Media, Interface, Signal, Pattern, and Timing) is missing you will not get a connection. You will not be able to share information. If Media is missing there is no way to transmit the signal. If the Interface is missing there is no way for the computer to access the media to get the connection. If the signal is missing you cannot transmit to get the connection. If the pattern is missing the device cannot communicate with any other device on the network. If the timing is missing the device’s communication would crash into other devices’ communication causing a roadblock in the system.

Exercise 2.1.2
The Network interface card (NIC) allows this kind of integration.

Exercise 2.1 review
Network devices are routers, gateways, hubs, and switches. Peripheral devices are printers, mice, monitor, and scanners.
You would limit incoming connections to keep spam out and viruses or malware out.

Peer to peer network is good for small groups and businesses. They can share resources and data between nodes. They scale better and are more resilient because they do not rely exclusive on servers.

Exercise 2.2.1 The startup cost for individual computers is $3600 versus a high-capacity printer for $500. The drawback to having only one printer for 30 users is backup (traffic jam) of pages to print as well as wearing it out causing repair costs. Setting priorities on what printed first. The cost for three printers –two backup printers is $1500 versus $3600. You could have up to seven printers which would cost $3500 divided these between the 20 users. This would be 4-5 users per printer.

Exercise 2.2.2 You would need 4 printers at least to prevent overload on the printers’ capacity. Yes, by having 4 or more you cut down on wear and tear of the unit reducing down time and repair costs. Having 4 printers…...

Similar Documents

Network

...13 Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network Xu Huang, Shirantha Wijesekera and Dharmendra Sharma University of Canberra Australia 1. Introduction Wireless security is becoming increasingly important as wireless applications and systems are widely adopted. Numerous organizations have already installed or are busy in installing “wireless local area networks” (WLANs). These networks, based on the IEEE 802.11 standard, are very easy to deploy and inexpensive. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi. WiFi is a global set of standards, unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Other important trends in wireless adoptions are including the introduction of wireless email with devices such as the Blackberry and The Palm VII, rampant digital cell phone use, including the use of short message service (SMWS), and the advent of Bluetooth devices. But the risks associated with the adoption of wireless networking are only now coming to light. A number of impressive......

Words: 6431 - Pages: 26

Network Standards and Protocols Pg 99

...Network Standards and Protocols June 29, 2013 Homework: Respond to multiple choice questions 1. A 2. B 3. D 4. C 5. C 6. D 7. B 8. C 9. D 10. D 11. C 12. D 13. B 14. C 15. A 16. D 17. D 18. D 19. A 20. B Define Key table 1.Computer Network is any combinations of many components that work together so that many different devices can communicate. 2. Computer Networking is the gerund form of the term computer network. 3. Application is a function of any kind of computer or electronic device. 4. Email is electronic mail in which user can type text or attach files. 5. Voice call is a modern term for telephone call. 6. Video frame is a grid of pixel location a chosen width by height that contains the lights/ color to be shown in a video. 7. Web server is software that stores web pages and web objects, listens for request for those pages and send the content of the pages/objects to clients. 8. web browser is software controlled directly by a user that request web pages from a web server and after receiving a page display the web in a window. 9. web address is the text that indentifies details about one object in a network so that a client can request that object from a server. 10. Protocol is a set of rules that different devices or software must follow so that the network works correctly. 11. HTTP is the protocol by web browsers and web servers to define the format of URLs and the......

Words: 390 - Pages: 2

Network Standards

...Standards 802.11B, 802.11A, 802.11g and 802.11n differ from each other in multiple ways. The main difference between these would be the frequency of the wavelengths. Where wireless A runs around 5/5.8GHz B and G will run at around 2.4 GHz. Then there is wireless N which is a dual band system and will run both 2.4 and 5 GHz. Wireless N will also be able to use a MIMO or multiple input multiple outputs, this allows 4 signals where before only 1 signal was actually possible. The other difference would be the overall range of signal; this depends on the IEEE standard. The approximate range for A is around 390 feet while G and B will be around 460 feet total. N will offer the most distance in terms of range which as an approximate 820 feet range. These are the outdoor ranges, the indoor ranges for A and B is about 115 feet G is 125 and N again is the furthest at about 230 feet. Another difference between them would be speeds these would flux but N will offer the faster Data rate overall. A and G will be around 54Mb/ps while B is only limited to 11 Mb/ps. N is capable of up to 300 Mb/ps. I think they do benefit in a lot of positive ways. The standards promote wireless technologies because it basically allows venders to create these devices in which will work together by having an overall interface. Overall if this wasn’t the case there is really no telling what would happen in the business world. If there were no standards that were maintained by an organization such as IEEE......

Words: 357 - Pages: 2

Wireless Network Standards

...The 802.11B was an amendment to the original 802.11 standard released in because the original did not have fast enough speeds to be sufficient to support the needs that the technology required. 802.11B added speeds of 5.5 and 11 Mbps. The 802.11B standard also supports wireless devices that are up to 115 meters or 375 feet apart. If the distance is exceeded or as it grows farther apart the standard states that the signal lower its transfer speed instead of completely dropping its signal if it falls out of range.   The 802.11A standard specifies a maximum of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions. The standard has devices that are generally no more than 100 ft. apart.   The 802.11G standard was developed as a “best of both worlds”, type of standard in an attempt to keep the highly stable standard features of the 802.11b standard but include the higher transfer rates of the 802.11A standard. This standard operates on the ISM band and not the U-NII band so it can reach farther with its signal but the band is highly crowded. The 802.11N standard was being established doffing the writhing of the text book and was projected to be able to transfer 100 Mbps to 500 Mbps depending on which proposal was approved. I found that available technology on wireless N technology is capable of 270 Mbps on a particular website putting it to the test. I feel that standards are beneficial to wireless networking and do not limit new technology. They allow......

Words: 305 - Pages: 2

It241 Week 3 Wireless Network Standards

...802.11 standard in 1997; this was to be known as the first WLAN standard, also known as 802.11 Prime. Throughout the years these standards have been ratified and amended. The first revision was in 1999 with 802.11b, later in 1999 802.11a was amended; in 2003 802.11g was amended and 802.11n was amended in 2009. Of these four standards there are some similarities and differences. The differences between these standards are as follows: * 802.11b – 2.4 GHz ISM, uses HR-DSSS (High Rate Direct Sequence Spread Spectrum), Data rates using DSSS are 1 and 2 Mbps, HR-DSSS uses 5.5 and 11 Mbps. Backward compatible to 802.11 Legacy (Prime) DSSS only. * 802.11a – 5 GHz - UNII, uses Orthogonal Frequency Division Multiplexing (OFDM) allowing for 5 GHz RF frequency’s operating in three different frequency bands called the Unlicensed National Information Infrastructure (UNII). These frequency ranges are: * UNII – 1: 5.150 – 5.250 * UNII – 2: 5.250 – 5.350 * UNII – 3: 5.725 – 5.825 Data rates under this standard were mandatory at 6, 12, and 24 Mbps with optional support for 9, 18, 36, 48, and 54 Mbps. This standard is not backwards compatible. * 802.11g – 2.4 GHz ISM, this standard utilized Extended Rate Physical (ERP) to enhance the physical layer, by using ERP-OFDM & ERP-DSSS/CCK (Complementary Code Keying) Data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps are made available. (ERP-OFDM: 6, 12, 24 Mbps) (ERP-DSSS/CCK: 1, 2, 5.5, 11). This standard is......

Words: 484 - Pages: 2

Bis 220 Final Exam Guide

...BIS 220 Final Exam Guide To Buy this Class Copy & paste below link in your Brower http://sourceofhomework.com/downloads/bis-220-final-exam-guide/ Or Visit Our Website Visit : http://sourceofhomework.com Email Us : sourceofhomework@gmail.com Type: BIS 220 Final Exam BIS 220 Final Exam Guide 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work. 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities. 4) ______ issues involve who may obtain information and how much they should pay for this information. 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? 8) Which of the following is detected by the contextual spelling checker? 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the......

Words: 13129 - Pages: 53

Networks

...The Wealth of Networks The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press New Haven and London Copyright _ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. 10 9 8 7 6 5 4 3 2 1...

Words: 214717 - Pages: 859

Standard

...Standards for medicines management a We are the nursing and midwifery regulator for England, Wales, Scotland, Northern Ireland and the Islands. • We exist to safeguard the health and wellbeing of the public. • We set the standards of education, training and conduct that nurses and midwives need to deliver high quality healthcare consistently throughout their careers. • We ensure that nurses and midwives keep their skills and knowledge up to date and uphold the standards of their professional code. • We ensure that midwives are safe to practise by setting rules for their practice and supervision. • We have fair processes to investigate allegations made against nurses and midwives who may not have followed the code. b Standards for medicines management Introduction The Nursing and Midwifery Council (NMC) is the UK regulator for two professions: nursing and midwifery. The primary purpose of the NMC is protection of the public. It does this through maintaining a register of all nurses, midwives and specialist community public health nurses eligible to practise within the UK and by setting standards for their education, training and conduct. One of the most important ways of serving the public interest is through providing advice and guidance to registrants on professional issues. The purpose of this booklet is to set standards for safe practice in the management and administration of medicines by registered nurses, midwives and specialist community public health...

Words: 21045 - Pages: 85

Standards

...October 2002 national competency standards for the enrolled nurse Introduction Description of Enrolled Nurse National Competency Standards Assessing Competence Glossary of Terms Introduction The Australian Nursing and Midwifery Council (ANMC) is a peak national nursing and midwifery organisation established in 1992 with the purpose of developing a national approach to nursing and midwifery regulation. The ANMC works in conjunction with the state and territory nursing and midwifery regulatory authorities (NMRAs) to produce national standards which are an integral component of the regulatory framework to assist nurses and midwives to deliver safe and competent care. The standards include the national competency standards for enrolled nurses which were first adopted by the ANMC in the early 1990s. These have been reviewed and revised regularly since then. Other standards developed by the ANMC for implementation by the NMRAs include the competency standards for registered nurses, midwives and nurse practitioners, codes of professional conduct and ethics, and a range of position statements and guidelines. The full list of standards, position papers and guidelines produced by the ANMC can be viewed on the website. The national competency standards for the enrolled nurse are scheduled for review in 2007. This review will be undertaken by a team of expert nursing consultants and will include extensive consultation with nurses around Australia. The purpose underpinning the......

Words: 4755 - Pages: 20

Bis 220 Final Exam Guide

...BIS 220 Final Exam Guide http://hwguiders.com/downloads/bis-220-final-exam-guide/ 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work. 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities. 4) ______ issues involve who may obtain information and how much they should pay for this information. 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? 8) Which of the following is detected by the contextual spelling checker? 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet. 11) No alphabetic characters in a social security number field is an example of 12) In a database, the primary key field is used to 13) Search engines and metasearch engines are examples of which network......

Words: 8209 - Pages: 33

Bis 220 Final Exam

...BIS 220 Final Exam To Purchase this Tutorial Copy And Paste Below Link In Your Browser http://www.homework-bank.com/downloads/bis-220-final-exam/ For Any Information or Any Class Which you Did not find on Our Website , Just Hit US Email On below address Email Address: hworkbank@gmail.com Visit Our Website : http://www.homework-bank.com/ BIS 220 Final Exam 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work. 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities. 4) ______ issues involve who may obtain information and how much they should pay for this information. 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? 8) Which of the following is detected by the contextual spelling checker? 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as...

Words: 564 - Pages: 3

Bis 220 Final Exam

...A++PAPER;http://www.homeworkproviders.com/shop/bis-220-final-exam/ BIS 220 FINAL EXAM BIS 220 FINAL EXAM, 1) Two information systems that support the entire organization are BIS 220 final exam question 2) _______ is the direct use of information systems by employees in their work 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities 4) ______ issues involve who may obtain information and how much they should pay for this information Bis 220 final exam 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? BIS 220 Final Exam 8) Which of the following is detected by the contextual spelling checker? bis 220 final exam 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet 11) No alphabetic characters in a social security number field is an example of 12) In a database, the primary key...

Words: 537 - Pages: 3

Bis 220 Final Exam

...BIS 220 FINAL EXAM A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=final-exam-7 Visit Our website: http://hwsoloutions.com/ Product Description BIS 220 FINAL EXAM, 1) Two information systems that support the entire organization are BIS 220 final exam question 2) _______ is the direct use of information systems by employees in their work 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities 4) ______ issues involve who may obtain information and how much they should pay for this information Bis 220 final exam 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? BIS 220 Final Exam 8) Which of the following is detected by the contextual spelling checker? bis 220 final exam 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet 11) No alphabetic characters in a social security number......

Words: 547 - Pages: 3

Introductory Network Concepts, Network Standards, and the Osi Model

...Introductory Network Concepts, Network Standards, and the OSI Model 1. There are many reasons for a company to network its computers, some are as follows; Share software, information with others on networks, cheaper than buying individual software and hardware for each standalone especially if the software often offers deals for amount being purchased, e-mail between network users, and flexible access from any computer on the network. 2. Two fundamental network models are peer-to-peer(P2P) or Client/Server. In a P2P network, every computer can communicate directly with every other computer, and no computer on this network has more authority than another. On a client/server network every computer acts as a client or a server. 3. There are 3 types of networks depending on how much territory they cover, they are LANs, MANs, and WAN networks. LAN networks cover a small area like one building or one office. MANs cover multiple buildings like a handful of government offices surrounding a state capital. A WAN network is one that connects two or more geographically distinct LANs and MANs. 4. A server is a computer on the network that manages shared resources. 5. A client is a computer on the network that requests resources or services from another computer on a network. 6. A NIC or Network Interface Card is the device that enables a workstation to connect to the network and communicate with other computers. 7. A NOS or Network Operating System is......

Words: 845 - Pages: 4

Standards

...Running head: UNWRAPPING ISLLC STANDARD NUMBER Unwrapping ISLLC Standard Number 1 Myka N. Walker Grand Canyon University: EDA 534 January 11, 2012 The initial collaborative learning community assignment was the unwrapping of ISLLC standard number one. A multiplicity of issues was anticipated in the beginning as this was a group assignment. Typically, group assignments can be challenging due to the varying opinions of the group’s membership. In reality, only two problems arose during the unwrapping process. The first problem surfaced in the beginning of the week. Several members of the group were unsure of how to complete the assignment. A discussion took place and each member contributed thoughts about what the assignment required and how it should be completed. The second problem was the division of work. Each of the ISLLC standards consists of four facets: knowledge, skills, enduring understandings and essential questions. There are five members in the yellow group. One group member quickly assumed the leadership role and created a rotating schedule. The schedule allows each person to tackle a different facet of the standards each week. The schedule also allows each person to compile the assignments and submit them. This was a very equitable way to split the work and all group members agreed to follow the schedule. The unwrapping of the ISLLC standards is a valuable process for any future principal. If the standards are going to be......

Words: 324 - Pages: 2