Bao Luu
Frank Childress
Fund of Networking Tech
13 April, 2017
Chapter Summaries In chapter one it is a general overview of the components and hardware that are necessary for a computer to function. The four major components for a computer to run are the motherboard, hard drive, RAM, and BIOS/CMOS. After assembling the computer, the next step will be obtaining workstations and network servers. For an example the workstations include Windows, Linux, UINX, and Mac OS. The OS is an a very essential because it provides many critical services including a user interface, memory management, file system, and an interface to a computer’s hardware device. To be able to connect to the internet a NIC must be provided. The NIC provides a connection between the computer and the network. After implanting the NIC there will be a need for a network medium, for an example an ethernet cable or a wireless
…show more content…
There are broad categories of cables copper wire and fiber optic. The main differences between the two are composition of signals, speed at which signals can be sent, and the distance the signals can effectively travel. There are a lot of things to factor when choosing a network media for an example bandwidth rating, maximum segment length, interference, cable grade, and ease of installation. Now to understand the difference types of cabling. The first one is unshielded twisted-pair cable and are used for most networks. While the shielded twisted-pair cable is used for noisy environments or very high-bandwidth. Lastly is the fiber-optic cable which are bits transmitted as pulses of light instead of electricity. Fiber-optic cables are also immune to electrical interference and high secured. But sometimes wiring isn’t cost efficient so they opted into wireless networking which is a lot more affordable. Not only is it cost efficient it establishes backup or contingency connectivity for existing wired
3. Insulation material: made from XLPE and isolate between the three phases, its thickness is about 5.5 mm along the cable 4. Outer semiconductor: uniformly distribute the voltage on the surface of the insulation 5. Earth layer: made from copper, used to ground the cable, in case of short circuit it protect the cable by leaking the short circuit current into the ground, its thickness is about 25mm2 area 6. Filling: synthetic fibers used to make the cable circular and to fill the gap between the phases 7.
Assign. 3 Andrew McConnon 13349871 1. In terms of specification of the framing in relation to the classic Ethernet protocol, it is specified by IEEE 802.3-2012.
There is simply no changes in the formats of packets to the wire alone changes to the rules and algorithms that govern the usage of protocol. The most significant change may be an improvement towards scalable timer algorithm belonging to calculate any time to send RTCP packets in order to minimize the transmission rate in excess of the developed While many participants log on to a session
In Ethernet data is send in form of packages, to control
Task 1 1.1) Design a networked system to meet the given specification. Your design must satisfy the user requirements and be scalable. [3.1] The design of the network system should include: cost, Bandwidth, system growth, applications, communications, and scalability of the system and selection of components. Introduction - Designing the Network In this design I will be listing and discussing, through the different and necessary designing stages, the various elements involved in designing a network that meets the system requirements given by the client.
10. Live support. v. Installation. The system installation involves placing computer hardware such as computers, servers, printers and routers, and software such as system software, drivers, and plugins into the daily organization’s operations.
Both types of networks provide network services using operating systems that can communicate with each other through common protocols. Each of these networks enables control of how users and programs get access to resources. Also, clients in a client server network and nodes or hosts in a peer-to-peer network use any combination of desktop, mobile, or tablet operating systems. 2. Discuss the difference between a physical topology and a logical topology.
2.1 AWS Networking AWS provide a kind of networking services that also provide private network connections to the cloud, scalable DNS and tools to make logistically solitary networks. There are also have prevalent networking services comprise the Amazon Virtual Private Cloud (VPC) and Amazon Direct Connect. Amazon VPC generates a logically solitary set of Amazon EC2 for example which can be connected to current network using VPN connection. Amazon VPC generates a private cloud inside AWS, while deposition built-in security with security groups and network access control lists. When using Amazon EC2, VPC is free.
In order to access a UNIX system, and use it , you need to connect to the system. You can login: Locally Remotely Login Types In general, there are two ways: Command-line Login GUI Login Connecting Locally Connecting locally means, you are directly logging into the UNIX system. Network connectivity is not required.
Goals of the Lab This lab has many different overall goals that are meant to introduce us to the challenges and procedures of building a preliminary enterprise environment from the ground up. Each task has it’s own set of goals that expose us to important areas of system administration in this type of environment. The lab first introduces us to installation and configuration of an edge routing device meant to handle all internal network traffic between devices, and allow access out to an external network, in our case the Internet. The lab then introduces installation of an enterprise Linux distribution, Red Hat Enterprise Linux 7, which will be used as the main Linux based server in our enterprise environment.
Understanding networking is a fundamental part of configuring complex environments on the internet. This has implications when trying to communicate between servers efficiently, developing secure network policies, and keeping your nodes organized. Every location or device on a network must be addressable. This is simply a term that means that it can be reached by referencing its designation under a predefined system of addresses. In the normal TCP/IP model of network layering, this is handled on a few different layers, but usually, when we refer to an address on a network, we are talking about an IP address.
1. I will be able to learn various networking protocols for routing and switching like OSPF, RIP, EIGRP and BGP. As working in the field of network security is my career goal, learning these protocols during my Co – op will help me introduce to the base of core networking. 2. I will be able to design architecture for a communication network.
There is several different types of components that enable the internet and help the web function correctly upon your computer. A few of these things are; Uploading and FTP, Web Servers, network routers, proxy servers, ISPs, Web Hosting Services, and Domains. I will be explaining all of these components in as much detail as possible. Uploading
I am extremely honored to be considered for the National Technical Honor Society. I have been looking forward to this moment for two years now. I strongly believe I would be a good candidate for NTHS because, I am a dedicated hardworking student who strives to be the best I can be. I also believe NTHS would be a great benefit not only towards my scholastic abilities but also to my character. As a student, I have set high standards for my future, focusing on my studies and looking forward to college.
1. What factors in the WorldCom case support the conclusion that CEO Bernie Ebbers Knew about the financial statement fraud? What factors support his defense that he did not know about the fraud? Bernie Ebbers Knew about the financial statement fraud because he was the one who encourage others to go into financial fraud because of the stock prices were going down, which was affecting his marginal loan. For that reason, he was trying to sell his stock, but the board of Directors lent him $341 million, along with 2% interest rate.