Nt 1310 Unit 3

In: Computers and Technology

Submitted By ryandoros
Words 569
Pages 3
Application is a term used to describe the different types of cable i.e. cat5, cat5e, and so on and the different shielding or fire rating
Unshielded Twisted-Pair is copper wire that is used in a twisted pair. Which is two conductors of a single circuit that are twisted together to prevent crosstalk UTP typically have only one outer covering or jacket for one or more of the twisted pairs.
Shielded Twisted-Pair is copper wire that is almost the same but also with the outer covering each twisted pair is also shielded separately and then shielded again before the outer jacket
Fiber-Optic Cable bandwidth is dramatically higher than with copper speeds and it uses a strand of glass or plastic to transmit data using light pulses transmission distances are much further away it is not susceptible to outside EMI or crosstalk interference. It is more secure than copper wire it very hard to tap in to unlike copper wire.
Dark Fiber is just a term used for unused or unneeded strands of installed fiber because you always want to install more than you need cause networks always grow.
Coaxial Cable is widely used for cable tv it has solid copper core with a Teflon insulation around that either a foil sleeve of a braided wire mesh and then the outer jacket
Plenum is the space between the deck ant the false ceiling when it is used for HVAC
Riser is a vertical shaft that allows you to run wires between two floors
Rip Cord is installed in some wire it is also called the slitting cord it is meant to make it easier to split the jacket on the cable when more than 2” of the wire needs to be exposed.
Core in cabling is what the core of the cable is made out of like coaxil is usually a solid copper core twisted pair the core is two wires twisted together that are two cores on a single circuit
Attenuation is the gradual loss in intensity of any kind of flux through medium

Similar Documents

Nt 1310 Final Review

...Term Name the common cable types used today | | Definition UTP, STP, and Fiber Optic | | | Term What unit of measurement is a tenfold logarithmic ratio of power output to power input? | | Definition Decibel | | | Term Name 3 things that can contribute to attenuation. | | Definition Conductor Resistance, Mutual Capactitance, Impedence. | | | Term Name 3 types of crosstalk. | | Definition Near end cross talk, Far end Cross Talk, Equal Level Far end cross talk. | | | Term Name an organization which is part of the US goverment and controls communications. | | Definition FCC | | | Term What is the National Fire Protection Association responsible for? | | Definition to help protect people, property, and the environment from fire damage. | | | Term A telecommunications room can sometimes be referred to as what? | | Definition An enclosed space for housing telecommunications equipment. | | | Term Backbone cabling includes what? | | Definition The physical/electrical interconnections between telecommunications rooms and equipment rooms. | | | Term What is NOT a network architecture commonly used today? | | Definition | | | Term Name some characteristic about 10Base-T networking? | | Definition max cable length is 100 meters UTP | | | Term According to the NEC, article 800.100, Primary protectors shall be grounded: | | Definition The grounding conductor shall be insulated | | | Term What...

Words: 1003 - Pages: 5

Nt 1310 Unit 7 Definitions

...signals between communication channels. 2. Waveguides – A metal tube or other device confining and conveying microwaves. 3. FTTH – Fiber to the x is a generic term for any broadband network architecture using optical fiber to provide all or part of the local loop used for last mile telecommunications. 4. Simplex – A fiber-optic cable or cord carrying a single fiber. 5. Half Duplex – Allowing the transmission of signals in both directions but not simultaneously. 6. Full Duplex – Refers to the transmission of data in two directions simultaneously. 7. Photodiode – A semiconductor diode that, when exposed to light, generates a potential difference or changes its electrical resistance. 8. Amplitude Modulation – The modulation of a wave by varying its amplitude, used chiefly as a means of radio broadcasting, in which an audio signal is combined with a carrier wave. 9. Analog Transmission – A transmission method of conveying voice, data, image, signal or video information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that of a variable. 10. Digital Transmission – The use of discrete electrical pulses, light pulses, or other discrete signals to create binary codes for data communications. 11. Sample Rate – The sampling rate, sample rate, or sampling frequency defines the number of samples per unit of time taken from a continuous signal to make a discrete signal. 12. Electromagnetic Wave – A wave of energy having......

Words: 535 - Pages: 3

Nt 1310

...projects have also been installed alongside the assembly files. With these dll’s in place, you can click the iLogic iTrigger Icon with the main assembly loaded to launch the form for modifying the driving design parameters. You will notice that the advanced form applies changes to the design immediately, whereas you must click OK to apply changes using the basic form. Notes about the rules included in the samples: 1. There are rules embedded in the top level assembly, subassembly as well as within the individual parts. 2. All default component names have been changed. This “stabilizes” the component names so that rules referencing them continue to work if the file names they point to ever change (i.e., Design copy with new file names). 3. The order the rules appear in the iLogic Tree Editor affects the end result produced by the rules after changing parameter values. Notice that the Assembly Parameters to Parts rule runs and performs an update before the Maximum Weight Rule runs. This ensures the total weight is calculated after all parameter changes including an update have been done to the parts. 4. Suppress the Form rule in order to change parameter values using Inventors Parameter Editor dialog. You will notice significant changes to the Inventor Parameter Editor Dialog in the 2011 release to accommodate the Rules Driven Design methods iLogic enables. 5. The advanced railing sample has a rule for generating an Excel Report. You need to update the excel link to......

Words: 467 - Pages: 2

Nt 1110 Unit 3 Assignment 1

...Unit 3 Assignment 1 Video Clip 1.07 Serial Parallel & Game Ports * Serial ports – 9 or 25 pins (male) * Parallel ports – 25 pins (female) * Game ports – 15 pins (female) Mouse – serial connector (old), PS/2, or USB/wireless Keyboard – 5-pin DIN (old), PS/2 or USB/wireless Network Inteface card – converts parallel communication to serial (RJ-45 connector) Modem – connects to phone line (56k), converts analog to digital & vice versa (RJ-11 connector). Video – VGA, DVI, or S-video SCSI – narrow (50-pin Type A), wide (68-pin, type P) IEEE 1394 (firewire) – serial, fast, hot swappable, used for streaming media, expected to replace SCSI Multimedia – Microphone, speakers, earphones, color coded. Video 1.09 CRT Monitor (old) & LCD Monitor (new) CRT – Cathode Ray Tube LCD – Liquid Crystal Display Contrast Ratio – Ratio of purest white to purest black Dot pitch – CRT – Distance between phosphorescent dots Pixel Pitch – LCD – Addressable pixels on screen, same as resolution. Resolution – Both CRT & LCD – Addressable points on screen. PCI Express – twice as fast as AGP Video 1.10 RAID – Redundant Array of Independent Disks Fault tolerance – real time copies of data, and data is not lost if hard drive fails. RAID – protect data in real time. RAID 0 – Striped Volume – faster speeds, no fault tolerance. Requires two or more drives, max 32 drives, CPU writes data evenly among drives, each disk has partial copy. RAID 1 – Mirrored......

Words: 487 - Pages: 2

Nt 2670 Unit 3 Homework Assignment

...UNIT 3 HW Assignment 1. What is port scanning? A: The act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer. 2. What is the goal of port scanning? A: The main purpose of port scanning is to find out as much information as you can on the target in order to see if there's any known vulnerabilities. 3. Would you prefer an open source or proprietary port scanning software? A: Would you prefer an open source or proprietary port scanning software? Open source. It’s actually easier to deal with a bug fix for open source than it is for proprietary software. In open source, bugs are typically submitted to an online issue tracking system, which is public to any user. For simple everyday support issues there really isn’t much difference between open source support and proprietary software support. 4. What port scanning software would you recommend to your Senior Administrator? Explain why. A: Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service......

Words: 287 - Pages: 2

Nt 1420 Unit 3 Answers

...Short Answers Unit 3 1. WHAT TWO THINGS MUST YOU NORMALLY SPECIFY IN A VARIABLE DECLARATION? The variable’s name The variable’s data type 2. WHAT VALUE IS STORED IN UNINITIALIZED VARIABLES? =0 Research Unit 3 1. WHAT IS REVERSE ENGINEERING? The process of taking a piece of software or hardware an analyzing its functions an information flow and then translating those processes. 2. WHAT ARE THE ADVANTAGES AND DISADVANTAGES TO USE REVERSE ENGINEERING TO DISCOVER THE LOGICS OF A SOFTWARE PROGRAM? Advantages- one can repair certain bugs, see how a program operates, and improve the operation of the program. Disadvantages- certain other bugs may be introduced during the process 3. FIND ANY ONE TOOL AVAILABLE TO PERFORM REVERSE ENGINEERING OF SOFTWARE PROGRAMS. LIST AT LEAST FIVE FEATURES OF THAT TOOL. GDB-GNU DEBUGGER  Allows taking a program and breaking it down to the assembly language level  Debug your programs  Examine your programs  Command line based tool which makes it easier to issue different parameters  Debug the kernel of any operating system UNIT 3: ALGORITHM WORKBENCH 3. SET B= (2 + A) SET A= (B + 4) SET B=( A/ 3.14) SET A= (8-B) 4. A. Set result = x + y 12 = 4 +8 B. Set result = z * 2 4 = 2 * 2 C. Set result = y / x 2 = 8 / 4 D. Set result = y – z 6 = 8 – 2 5. Dim cost1 As Double = 0 6. Dim cost1 As Integer = 0 7. Dim cost1 As Integer = 27 8. Total = 10 + 14 9. due......

Words: 257 - Pages: 2


...Michael Campbell 10/15/2014 NT1310 Unit 5 Lab1 New Building – Wired and Wireless The advancements in technology have made it necessary to rely on a combination of solutions to keep the cost so there is not any sacrificing security. For the most part, the basis of the network will be a wired solution. A wired solution will keep the security high, so a hacker would have to be physically attached to the network to gain full access. Running a wired network is more cost effective because wireless technology is still new enough so the cost is higher. By running new wired networks, longevity can be built into it by planning ahead. Racks, patch cabling, and wired routers are less difficult to troubleshoot. A wireless solution is can be very attractive due to the fact that there are relatively few cables, but they are more susceptible to security issues and cost is higher than wired networks. This network is less of a physical set up and more of a logical network, due in part to assigning and managing all of the IP addresses. Wireless routers, wireless access points, and Wi-Fi network cards have their limitations, however they can be utilized in areas (such as an internet café) where security is not as important. The tools for both types of installs are mostly the same, with a few differences depending upon the cable types being used; the testing tools change a bit when going after the range of the wireless network. There are many apps for your smartphone that allow you to......

Words: 320 - Pages: 2

Nt 1310 Network Topology

...Network Topology Star Topology has its own cable that connects to a central hub or switch, multipoint repeater, or even a Multistation Access Unit. Data passes through the hub to reach other devices on the network. A hub, switch, or computer acts as a router to transmit messages this is in its simplest form. Star reduces the chance of failure in the network by connecting all of the systems to a central node. Star is the most common networks because of the ease of configuring and troubleshooting it. If a wire goes bad only one node will go down which prevents a huge impact on productivity. However, because a star involves a central hub or switch as well as a lot more cabling it cost more to implement. Bus topologies computers are connected to a single cable or trunk or backbone by a transceiver either directly or by using a short drop cable. All ends of the cable must be terminated, that is plugged into a device such as a computer or terminator. The number of computer affect the performance since only one computer at a time can send data the more computers you have on the network the more computers there will be waiting to send data. If there is a break in the line all computers will fail. Bus is inexpensive and very easy to install. They are limited in security and number of devices that can be on the network. Bus can only transmit slowly at 10 \Mb/s. Ring topology network computers are connected by a single loop of cable, the data signals travel around the loop in......

Words: 374 - Pages: 2

Nt 1310 Unit 1

...Data enters the system it gets converted into binary computer language. This data is sent through the network and encapsulated into packets. These packets have headers and trailers which indicate the direction of travel. Therefore the packets carry the information to and from destination. In addition this includes a number place in other words it keeps its place in the order it was sent. The packets travel through routers as in goes through the network. The access network router would be the first router. The packets are not limited to just one router sometimes these packets will travel through multiple routers in multiple topologies. This can include Regional Networks, Long-Haul Networks, and Ocean Networks. The network and each router will determine which direction of travel is best path for the packet. As things change within the network something are slower than others it learns from it and makes changes for better performance. With this method the packets will more than likely arrive out of order. Depending if you use TCP or UDP, you will get an acknowledgement of the receipt of each packet to the sending system. The sending system will resend any lost information. When the all the packets get to the destination, they get put back in order based on the header and trailer information. Than the data goes the reverse order of encapsulation to be read at the server or computer. This all happens usually at the milliseconds, in reference to time taken. The server......

Words: 277 - Pages: 2

Nt 1310 Unit 1

...Ryan Heath NT1310 12/14/14 Unit 1 Assignment 1 Cell Phones: Cell phones use both data and voice networks. Although most people text now a days and rarely do people call each other. The older cell phones used voice only, they didn’t have the capability of a data network. You can also stream audio and video using your cellular network. Landline Phones: Landline phones are voice only. There is no way to use data through a landline phone. It can be used for internet but that is through a dial up connection. Landlines work within a network of central hubs that started out with a human operator connecting you to another person. SMS/Text messaging: Text messaging is a data service that allows users to send messages back and forth between their devices. You can also send pictures through text messages. Fax Machines: A fax is sent immediately gets digitized and packaged in secure TCP packets and sent to natural data Inc. Fax machines use an analog data signal. Pager: A way to notify individuals of incoming calls by tone, it uses a data signal. This was the start of the text message area. People could use a series of numbers to send messages. VOIP: Voice over IP is a phone that uses digital technology to make phone calls on the internet rather than through phone lines. A VOIP phone allows us to bypass the phone companies completely, it uses data networks. Skype/Facetime: To use these services you have to have a data network in order to get on the internet to use...

Words: 505 - Pages: 3

Nt 1310 Midterm Exam Review

...1. Plenum and coaxial cable are not common cables used today. 2. A decibel is the unit of measurement that is a tenfold logarithmic ratio of power output to power input. 3. Frequency increases does not contribute to attenuation. 4. Mutual crosstalk is not a type of crosstalk. 5. The Federal Communications Commission (FCC) is part of the US government. 6. The National Fire Protection Association (NFPA) is responsible for the development and publication of the National Electric Code. 7. A telecommunications room can sometimes be referred to as a telecommunications room or a wiring closet. 8. Backbone cabling includes cabling between equipment rooms and building entrance facilities, in a campus environment it is the cabling between buildings’ entrances facilities, and vertical connections between floors. 9. The hub network architecture is not commonly used today. 10. 10Base-T networking only requires 2 wire pairs of an eight-pin modular jack. 11. According to the NEC, Article 800.100, primary conductors shall be grounded, the grounding conductor shall be insulated and listed as suitable for the purpose. 12. Knowing and following the electrical ad building codes helps protect the buildings occupants, helps when working with local, city, country, and state officials, and helps when working with electricians and contractors. 13. Patch cables are generally considered the weakest link in a network setup. 14. The security of a......

Words: 677 - Pages: 3

Nt 1310 Unit 4 Exercise 1: Cabling – Definitions

...Ernie Castillo NT1310 Instructor: Mr. Greene Unit 4 Exercise 1: Cabling – Definitions 1. Horizontal Cabling - The cabling between and including the telecommunications outlet and the horizontal cross-connect. Horizontal cabling is considered the permanent portion of a link; may also be called horizontal wiring. 2. Backbone Cable - A cable connection between telecommunications or wiring closets, floor distribution terminals, entrance facilities, and equipment rooms either within or between buildings. This cable can service voice communications or data communications. In star-topology data networks, the backbone cable interconnects hubs and similar devices, as opposed to cables running between hub and station. In a bus topology data network, it is the bus cable. Backbone is also called riser cable, vertical cable, or trunk cable. 3. Patch Cords - Any flexible piece of cable that connects one network device to the main cable run or to a patch panel that in turn connects to the main cable run; also called. Used for interconnecting circuits on a patch panel or cross-connect. Patch cables are short distance, usually have connectors preinstalled on both ends, are used to connect equipment, and are generally between 3 and 6 meters long. 4. Connectors - With respect to cabling, a device attached to the end of a cable, receiver, or light source that joins it with another cable, device or fiber. A connector is a mechanical device used to align and join two conductors or fibers......

Words: 1322 - Pages: 6

Nt 1310 Unit 1 Assingment 1

...1. Cell phones a. Cell phones are on a voice network for the most part b. Cell phones do use data services. c. Cellphones can access networks for internet an voice 2. Landline Phones a. This is a Voice network b. No power is needed to use this network c. The network actually builds electricity why moving thought the house 3. SMS/Text Messaging a. SMS (Short message service) is a mechanism of delivery of short messages over the mobile networks. b. It is a store and forward way of transmitting messages to and from mobiles. c. The message (text only) from the sending mobile is stored in a central short message center (SMS) which then forwards it to the destination mobile. 4. Fax Machine a. Voice, although the two are becoming one and the same thing to a certain extent now. b. Internally all the large telephone companies are switching to unified data networks to carry all of their traffic, and tweaking the parameters for best results with each distinct type of traffic going onto the network. c. Fax Machines are not used nearly as much as email is used today 5. Pagers a. A way to notify individuals of incoming calls by a tone, it uses a data signal. b. Was also used to relay short messages to doctors in hospitels c. Was only capable of receaving signals not capable of sending them again. 6. VOIP (voice over IP) Phones a. Uses digital technology to make phone calls on the Internet rather than through phone lines. b. A VoIP phone allows us to bypass the......

Words: 326 - Pages: 2

Nt-1310 Unit 2 Activity 1 Cloud Computing

...Fidel Luna (15275168) NT-1310 Unit 2 Lab Cloud Computing Research iCloud Drive Inc. #566-533W Roulette Street, Pembina North Dakota, 58271 USA Founded in 2000, iCloud Inc. is recognized as a thought leader and innovator of Cloud services, bringing continuous innovation through high-performing cloud solutions to clients that want simple Internet Technology delivered in a less expensive way. iCloudDrive brings powerful backup, collaboration and sharing features to your business. It’s easy to use making it suitable for everyone – whether you’re a one-person business or a large enterprise. Provider | Cost | Speed | Space | APIs | Customer Service | Users | Ecryption | ICloud Express | $38.00/Month | n/a | 2 TB | All | Good | 3 | 256 Bit |   | $125.00/Month | n/a | 10 TB+ | All | Good | 10 + | 256 Bit | Rackspace General Purpose * High-performance, RAID 10-protected SSD storage * Redundant 10-Gigabit networking * Option of booting from Cloud Block Storage (additional charges apply for Cloud Block Storage) * Disk I/O up to ~35,000 4K random read IOPS and ~35,000 4K random write IOPS* Provider | Cost | Speed | Space | APIs | Customer Service | Users | Ecryption | General1-2 | $29.00/mo | 400Mb/s | 40GB SSD |   | 24x7x365 | 2 |   | General1-4 | $58.00/mo | 800Mb/s | 80GB SSD |   | 24x7x365 | 4 |   | General1-8 | $117.00/mo | 1,600Mb/s | 160GB SSD |   | 24x7x365 | 8 |   | OneDrive Store: Securely store all your files and share......

Words: 287 - Pages: 2

Nt 1310

...NT 1310 Physical Networking This packet includes: Unit 2 Assignment 1: Service Provider Types Exercise 1: Triple Play Marketing Unit 2 Assignment 1- Service Provider Types RBOCS - Regional Bell Operating Companies. These seven companies were established after an antitrust suit against AT&T. It split the company into seven regional companies that handle local exchange service. They are also known as “Baby Bells.” These companies handled almost all of the telephone services across the country. ILEC - Incumbent Local Exchange Carrier. This is a local telephone company that existed when AT&T was broken up into the RBOCS. It was an independent telephone company that provided telephone services in a specific geographical area. ILECs compete with CLECs. CLEC is an acronym for competitive local exchange carriers. They compete with ILECs by providing private line and special access services. They are not affiliated with the RBOCs. Some states especially encourage these companies because they are competitive and the opposite of the monopolies. MSO’s - Multiple system operators. These are defined as an operator of multiple cable television systems. This usually refers to large cable companies that provide service for multiple communities, such as Time Warner Cable, ComCast or Charter Cable. These MSOs provide television service, broadband internet services, and telephone services. ISP - Internet service provider. This is any company that provides customers direct......

Words: 511 - Pages: 3