Premium Essay

Nt 1310

In: Computers and Technology

Submitted By watwell1980
Words 511
Pages 3
NT 1310
Physical Networking
This packet includes: Unit 2
Assignment 1: Service Provider Types
Exercise 1: Triple Play Marketing

Unit 2 Assignment 1- Service Provider Types

RBOCS - Regional Bell Operating Companies. These seven companies were established after an antitrust suit against AT&T. It split the company into seven regional companies that handle local exchange service. They are also known as “Baby Bells.” These companies handled almost all of the telephone services across the country.
ILEC - Incumbent Local Exchange Carrier. This is a local telephone company that existed when AT&T was broken up into the RBOCS. It was an independent telephone company that provided telephone services in a specific geographical area. ILECs compete with CLECs.
CLEC is an acronym for competitive local exchange carriers. They compete with ILECs by providing private line and special access services. They are not affiliated with the RBOCs. Some states especially encourage these companies because they are competitive and the opposite of the monopolies.
MSO’s - Multiple system operators. These are defined as an operator of multiple cable television systems. This usually refers to large cable companies that provide service for multiple communities, such as Time Warner Cable, ComCast or Charter Cable. These MSOs provide television service, broadband internet services, and telephone services.
ISP - Internet service provider. This is any company that provides customers direct access to the internet. They use copper cable, wireless, or fiber optic cable to give access to the internet for their customers. There are many different ISPs to choose from. Often times either your cable company or your local phone company will be your ISP.

Unit 2
Exercise 1

Welcome to New Verse! We are the all in one communication service that fits all of your needs. Be in control with…...

Similar Documents

Premium Essay

Nt 1310 Unit 3

...Application is a term used to describe the different types of cable i.e. cat5, cat5e, and so on and the different shielding or fire rating Unshielded Twisted-Pair is copper wire that is used in a twisted pair. Which is two conductors of a single circuit that are twisted together to prevent crosstalk UTP typically have only one outer covering or jacket for one or more of the twisted pairs. Shielded Twisted-Pair is copper wire that is almost the same but also with the outer covering each twisted pair is also shielded separately and then shielded again before the outer jacket Fiber-Optic Cable bandwidth is dramatically higher than with copper speeds and it uses a strand of glass or plastic to transmit data using light pulses transmission distances are much further away it is not susceptible to outside EMI or crosstalk interference. It is more secure than copper wire it very hard to tap in to unlike copper wire. Dark Fiber is just a term used for unused or unneeded strands of installed fiber because you always want to install more than you need cause networks always grow. Coaxial Cable is widely used for cable tv it has solid copper core with a Teflon insulation around that either a foil sleeve of a braided wire mesh and then the outer jacket Plenum is the space between the deck ant the false ceiling when it is used for HVAC Riser is a vertical shaft that allows you to run wires between two floors Rip Cord is installed in some wire it is also called the slitting cord......

Words: 569 - Pages: 3

Free Essay

Nt 1310 Final Review

...Term Name the common cable types used today | | Definition UTP, STP, and Fiber Optic | | | Term What unit of measurement is a tenfold logarithmic ratio of power output to power input? | | Definition Decibel | | | Term Name 3 things that can contribute to attenuation. | | Definition Conductor Resistance, Mutual Capactitance, Impedence. | | | Term Name 3 types of crosstalk. | | Definition Near end cross talk, Far end Cross Talk, Equal Level Far end cross talk. | | | Term Name an organization which is part of the US goverment and controls communications. | | Definition FCC | | | Term What is the National Fire Protection Association responsible for? | | Definition to help protect people, property, and the environment from fire damage. | | | Term A telecommunications room can sometimes be referred to as what? | | Definition An enclosed space for housing telecommunications equipment. | | | Term Backbone cabling includes what? | | Definition The physical/electrical interconnections between telecommunications rooms and equipment rooms. | | | Term What is NOT a network architecture commonly used today? | | Definition | | | Term Name some characteristic about 10Base-T networking? | | Definition max cable length is 100 meters UTP | | | Term According to the NEC, article 800.100, Primary protectors shall be grounded: | | Definition The grounding conductor shall be insulated | | | Term What...

Words: 1003 - Pages: 5

Free Essay

Nt 1210

...NT-1210 Unit Name Lab l Labs Date 1-l Reading Binary Convert the following decimal numbers to binary equivalents: 89 1011001 776 10110000 Convert the following Binary values to their decimal equivalent: 101_0100L 169 11101010 234 Lab 1-2 Binary Math and Logic Draw the graphical symbol Explain the logical operations (give a truth table) for each: AND OR NOT Lab 1.3 Bit and Byte Structure - (see page 15 of lab manual) How many bits are in a byte? 8 1 Kilobyte is equal to: 1024 55,296 23,552 bytes Kilobytes Megabytes Terabytes 54 Megabyte is equalto: 23 Gigabyte is equalto: 5 Terabyte is equal to 5,120 120MB = 16GB= 125,829,120 16,384 bytes MBytes Lab 1.4 ASCII (See page 20 of Lab manual) 1. Decode the simple numerical sentences into one English paragraph. You may use Google to find an ASCII table. Use the keywords-Binary to text conversion; Hexadecimatto text conversion; ASGllto text conversion-to aid the decoding process: Code"Tvoe ASC llcodes Numeric Message 87 101 1 08 1 08 44 32 116 104 97 116 32 109 97 107 101 115 32 111 117 114 32 49 48 32 110 117 109 98 101 114 32 100 101 99 105 109 97'108 3247 3297 115 99 105 10532115121115116 101 '10932 106 117 11511632114105103104 11633148 Translation Well, that makes our 10 number decimal / ASCII system just right! Lab 1.5 Creating a File System Follow the procedures outlined in the Lab Manual on pages 231o27......

Words: 918 - Pages: 4

Premium Essay

Unit 1 Exercise 1 Nt 1310

...The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off chance the Michigan gamer decided...

Words: 324 - Pages: 2

Premium Essay

Nt-1310

...Michael Campbell 10/15/2014 NT1310 Unit 5 Lab1 New Building – Wired and Wireless The advancements in technology have made it necessary to rely on a combination of solutions to keep the cost so there is not any sacrificing security. For the most part, the basis of the network will be a wired solution. A wired solution will keep the security high, so a hacker would have to be physically attached to the network to gain full access. Running a wired network is more cost effective because wireless technology is still new enough so the cost is higher. By running new wired networks, longevity can be built into it by planning ahead. Racks, patch cabling, and wired routers are less difficult to troubleshoot. A wireless solution is can be very attractive due to the fact that there are relatively few cables, but they are more susceptible to security issues and cost is higher than wired networks. This network is less of a physical set up and more of a logical network, due in part to assigning and managing all of the IP addresses. Wireless routers, wireless access points, and Wi-Fi network cards have their limitations, however they can be utilized in areas (such as an internet café) where security is not as important. The tools for both types of installs are mostly the same, with a few differences depending upon the cable types being used; the testing tools change a bit when going after the range of the wireless network. There are many apps for your smartphone that allow you to......

Words: 320 - Pages: 2

Premium Essay

Nt 1310 Unit 1, Assignment 1

...Cell Phones – Cellphones use both voice and data communication. To give an example: a person talking on a cellphone will use “voice” communication. On the other side, “Data” technology is also used on smartphones which allow them to search the internet and download different files. Landlines – Landlines usually and more than common use voice communication. Though newer landlines have the option to use what’s called a NCID (Network Caller ID) which uses data sent over a TCP connection. SMS/Text Messaging – SMS or text messages can be used in a variety of ways. Examples include: cellphones and internet texting. SMS does not use any kind of voice technology and therefore is sent over data networks. Fax Machines – Fax machines have analog modems. This type of modem technology uses the voice network. When the receiving end gets a fax connection it listens for a digital connection that has been converted from an analog signal using a voice network. Pagers – Pagers were primarily a data network. They worked by sending numerical short messages, something that may have been a bit similar to texting but with numbers. Since the introduction of data pagers, voice pagers have also been brought into the picture. These types of pagers use the” voice” network. VOIP Phones – VOIP (Voice over Internet Protocol) is a technology that can transmit audio messages over the internet. VOIP is transferred over an internet protocol it thereby uses data networks. Something that might be worth...

Words: 315 - Pages: 2

Premium Essay

Nt 2640

...Stacie Rollins Thursday, January 8, 2015 NT 2640 Unit 1 Assignment 1 Network IDs used to be divided into classes, which were Class A, B, and C. These classes were allowed to have a range of addresses. This class-based system would work well for a while, but the rapid growth of the Internet it becomes evident that this addressing scheme had to be changed in order to support the many networks that were being created. A class full system would be created and still used the IP addressing fundament of a classless system. This 32-bit IP addressing system is subdivided into two portions; the network address space are the host address space. Class A addresses were created for a very large network with few logical network segments and many hosts that have the high-order bit set to zero. The first octet is used to define the network ID. Class A address cannot be greater than 127 because a value of 128 would require the left-most bit be set to 1. Class B addresses always have the first two high-order bits that are set to 10 and are used for medium-sized networks that have a moderate number of hosts connected to them. The Class B network ID, will utilize the first two octets for the network ID, which allows more network IDs and fewer hosts than a Class A network, because it uses an additional octet for the network. Class C addresses are for small networks with few hosts. These addresses have the first three high-order bits set to 110, because Class C addresses use the first......

Words: 294 - Pages: 2

Premium Essay

Nt 1310 Network Topology

...Network Topology Star Topology has its own cable that connects to a central hub or switch, multipoint repeater, or even a Multistation Access Unit. Data passes through the hub to reach other devices on the network. A hub, switch, or computer acts as a router to transmit messages this is in its simplest form. Star reduces the chance of failure in the network by connecting all of the systems to a central node. Star is the most common networks because of the ease of configuring and troubleshooting it. If a wire goes bad only one node will go down which prevents a huge impact on productivity. However, because a star involves a central hub or switch as well as a lot more cabling it cost more to implement. Bus topologies computers are connected to a single cable or trunk or backbone by a transceiver either directly or by using a short drop cable. All ends of the cable must be terminated, that is plugged into a device such as a computer or terminator. The number of computer affect the performance since only one computer at a time can send data the more computers you have on the network the more computers there will be waiting to send data. If there is a break in the line all computers will fail. Bus is inexpensive and very easy to install. They are limited in security and number of devices that can be on the network. Bus can only transmit slowly at 10 \Mb/s. Ring topology network computers are connected by a single loop of cable, the data signals travel around the loop in......

Words: 374 - Pages: 2

Premium Essay

Nt 1310 Unit 1

...Data enters the system it gets converted into binary computer language. This data is sent through the network and encapsulated into packets. These packets have headers and trailers which indicate the direction of travel. Therefore the packets carry the information to and from destination. In addition this includes a number place in other words it keeps its place in the order it was sent. The packets travel through routers as in goes through the network. The access network router would be the first router. The packets are not limited to just one router sometimes these packets will travel through multiple routers in multiple topologies. This can include Regional Networks, Long-Haul Networks, and Ocean Networks. The network and each router will determine which direction of travel is best path for the packet. As things change within the network something are slower than others it learns from it and makes changes for better performance. With this method the packets will more than likely arrive out of order. Depending if you use TCP or UDP, you will get an acknowledgement of the receipt of each packet to the sending system. The sending system will resend any lost information. When the all the packets get to the destination, they get put back in order based on the header and trailer information. Than the data goes the reverse order of encapsulation to be read at the server or computer. This all happens usually at the milliseconds, in reference to time taken. The server......

Words: 277 - Pages: 2

Premium Essay

Nt 1310 Unit 1

...Ryan Heath NT1310 12/14/14 Unit 1 Assignment 1 Cell Phones: Cell phones use both data and voice networks. Although most people text now a days and rarely do people call each other. The older cell phones used voice only, they didn’t have the capability of a data network. You can also stream audio and video using your cellular network. Landline Phones: Landline phones are voice only. There is no way to use data through a landline phone. It can be used for internet but that is through a dial up connection. Landlines work within a network of central hubs that started out with a human operator connecting you to another person. SMS/Text messaging: Text messaging is a data service that allows users to send messages back and forth between their devices. You can also send pictures through text messages. Fax Machines: A fax is sent immediately gets digitized and packaged in secure TCP packets and sent to natural data Inc. Fax machines use an analog data signal. Pager: A way to notify individuals of incoming calls by tone, it uses a data signal. This was the start of the text message area. People could use a series of numbers to send messages. VOIP: Voice over IP is a phone that uses digital technology to make phone calls on the internet rather than through phone lines. A VOIP phone allows us to bypass the phone companies completely, it uses data networks. Skype/Facetime: To use these services you have to have a data network in order to get on the internet to use...

Words: 505 - Pages: 3

Free Essay

Nt 1310 Midterm Exam Review

...1. Plenum and coaxial cable are not common cables used today. 2. A decibel is the unit of measurement that is a tenfold logarithmic ratio of power output to power input. 3. Frequency increases does not contribute to attenuation. 4. Mutual crosstalk is not a type of crosstalk. 5. The Federal Communications Commission (FCC) is part of the US government. 6. The National Fire Protection Association (NFPA) is responsible for the development and publication of the National Electric Code. 7. A telecommunications room can sometimes be referred to as a telecommunications room or a wiring closet. 8. Backbone cabling includes cabling between equipment rooms and building entrance facilities, in a campus environment it is the cabling between buildings’ entrances facilities, and vertical connections between floors. 9. The hub network architecture is not commonly used today. 10. 10Base-T networking only requires 2 wire pairs of an eight-pin modular jack. 11. According to the NEC, Article 800.100, primary conductors shall be grounded, the grounding conductor shall be insulated and listed as suitable for the purpose. 12. Knowing and following the electrical ad building codes helps protect the buildings occupants, helps when working with local, city, country, and state officials, and helps when working with electricians and contractors. 13. Patch cables are generally considered the weakest link in a network setup. 14. The security of a......

Words: 677 - Pages: 3

Free Essay

Nt 1310

...FUTURE STATEMENT Solar Technology Although not widely used, I believe the future of Solar energy technology products such as Solar panels is bright. Solar technology is one of the green energy sectors that is making a lot of difference here at home and around world. For instance, the use of solar panels in homes is very popular in most third world countries since energy cost is expensive. The cost and accessibility of this technology is much easier than here in the U.S. For instance in Africa, the use of solar panels in homes is very common. Cheap imports from China have made it affordable for most home owners. The panels are easily available and are installed by contractors without any red-tape if the person can afford it. Although, most of these countries are poor and lacks basic infrastructures, solar energy has given them the opportunity to be less dependent on fuel imports and benefit the technological advantages of a clean energy economy. On the other hand, here in the U.S. the use of solar panels in homes is not as popular as other countries. The average American homeowner doesn’t know where to buy these panels or how to get them installed. Home buyers have the perception that solar panels are not affordable so they are reluctant to consider them as an option when they build or buy a new house. Furthermore, the burden of getting licensing and permit scares off a lot of homeowners who otherwise would have benefited from this green energy technology. Regardless, I......

Words: 388 - Pages: 2

Premium Essay

Nt 1310 Unit 1 Assingment 1

...1. Cell phones a. Cell phones are on a voice network for the most part b. Cell phones do use data services. c. Cellphones can access networks for internet an voice 2. Landline Phones a. This is a Voice network b. No power is needed to use this network c. The network actually builds electricity why moving thought the house 3. SMS/Text Messaging a. SMS (Short message service) is a mechanism of delivery of short messages over the mobile networks. b. It is a store and forward way of transmitting messages to and from mobiles. c. The message (text only) from the sending mobile is stored in a central short message center (SMS) which then forwards it to the destination mobile. 4. Fax Machine a. Voice, although the two are becoming one and the same thing to a certain extent now. b. Internally all the large telephone companies are switching to unified data networks to carry all of their traffic, and tweaking the parameters for best results with each distinct type of traffic going onto the network. c. Fax Machines are not used nearly as much as email is used today 5. Pagers a. A way to notify individuals of incoming calls by a tone, it uses a data signal. b. Was also used to relay short messages to doctors in hospitels c. Was only capable of receaving signals not capable of sending them again. 6. VOIP (voice over IP) Phones a. Uses digital technology to make phone calls on the Internet rather than through phone lines. b. A VoIP phone allows us to bypass the......

Words: 326 - Pages: 2

Free Essay

Nt 1310 Unit 1 Ex 1

...Introduction One of the most important items about gaming is there are winners and losers (in a fun and entertaining way), which influences and entices players all over the world. All of the variables involved with the networks that provide gaming platforms are so dynamic and diverse. From games that are purely for fun or learning there will be a huge market for deploying bigger networks. This is one reason networks growth should grow exponentially. Below is what I have identified as a gaming or Local Exchange network. “Retrieved from, http://www.psu.com/a018031/” 12/17/2013 Posted January 17th, 2013 at 19:30 EDT by Timothy Nunes “Retrieved from, http://www.hcl-axon.com/Our_Products/gamedge/” 12/17/2013 “Retrieved from, http://compnetworking.about.com/od/homenetworking/ig/Home-Network-Diagrams/Hybrid-Network-Diagram.htm” 12/17/13 By Bradley Mitchell References • Home Wi-Fi Security Checklist Cited in the "Handbook of Electronic Security and Digital Forensics" and other titles! • Fixing Common Internet Connection Problems There's nothing more frustrating than a broken Internet connection. We have some tips that can help. Summary The development of a good gaming network has many components that work to enable the end user to have a full experience of entertainment and enjoyment. Some networks are much smaller which can be setup for home use. The ability to play a...

Words: 295 - Pages: 2

Premium Essay

Nt-1310 Unit 2 Activity 1 Cloud Computing

...Fidel Luna (15275168) NT-1310 Unit 2 Lab Cloud Computing Research iCloud Drive Inc. #566-533W Roulette Street, Pembina North Dakota, 58271 USA Founded in 2000, iCloud Inc. is recognized as a thought leader and innovator of Cloud services, bringing continuous innovation through high-performing cloud solutions to clients that want simple Internet Technology delivered in a less expensive way. iCloudDrive brings powerful backup, collaboration and sharing features to your business. It’s easy to use making it suitable for everyone – whether you’re a one-person business or a large enterprise. Provider | Cost | Speed | Space | APIs | Customer Service | Users | Ecryption | ICloud Express | $38.00/Month | n/a | 2 TB | All | Good | 3 | 256 Bit |   | $125.00/Month | n/a | 10 TB+ | All | Good | 10 + | 256 Bit | Rackspace General Purpose * High-performance, RAID 10-protected SSD storage * Redundant 10-Gigabit networking * Option of booting from Cloud Block Storage (additional charges apply for Cloud Block Storage) * Disk I/O up to ~35,000 4K random read IOPS and ~35,000 4K random write IOPS* Provider | Cost | Speed | Space | APIs | Customer Service | Users | Ecryption | General1-2 | $29.00/mo | 400Mb/s | 40GB SSD |   | 24x7x365 | 2 |   | General1-4 | $58.00/mo | 800Mb/s | 80GB SSD |   | 24x7x365 | 4 |   | General1-8 | $117.00/mo | 1,600Mb/s | 160GB SSD |   | 24x7x365 | 8 |   | OneDrive Store: Securely store all your files and share......

Words: 287 - Pages: 2