Free Essay

Unit 5 Ass.1

In: Computers and Technology

Submitted By chutch1126
Words 379
Pages 2
EIGRP and early IGRP are released by Cisco. They’re both distance vector protocols. EIGRP is enhanced edition of Interior Gateway Routing Protocol. Though it adopts distance vector algorithm, it has some features of link state protocol. EIGRP has improved a lot compared to IGRP; it relies on the Diffused Update Algorithm (DUAL) to calculate the shortest path a destination within a network. It is totally loop-free, and has very fast convergence speed among all the routing protocols. EIGRP is an enhanced distance vector protocol, relying on the Diffused Update Algorithm (DUAL) to calculate the shortest path to a destination within a network. The strengths of EIGRP are Fast convergence EIGRP is an advance distance vector protocol, one of its core strengths is its fast network convergence capabilities, unlike other routing protocols EIGRP keeps feasible successor routes right into the routing table, and this allows millisecond convergence should the successor route fail. Flexible in summarization Unlike OSPF, EIGRP allows you to summarize anywhere, in bigger environments where routers are advertising hundreds of networks, route summarization can greatly enhance router's and network operational capabilities, its less taxing on CPU/memory and cheaper to run / maintain. Unequal cost load- balancing EIGRP allows unequal cost load balancing, which means you can use 2 different cost links to load balance traffic, no other protocol can do this. It is VLSM friendly unlike other distance vector protocols, and EIGRP supports VLSM and discontinued networks. EIGRP is also less confusing than OSPF because it does not have different network types and EIGRP is easier to deploy in hub and spoke scenarios. EIGRP uses a flat network without areas, this can both be an advantage and disadvantage. OSPF is obviously an open standard so it's the logical choice if you have multiple vendors. It can perform well but it requires that you tweak SPF timers because by default in IOS there is a 5 second wait before running the SPF algorithm. OSPF uses areas which means you can segment the network more logically. OSPF can only summarize between areas. OSPF is link state so it has a better view of the entire network than EIGRP before it runs the SPF algorithm. Network administrators will usually be more comfortable with OSPF because it's more commonly deployed.…...

Similar Documents

Premium Essay

Unit 1 Ass a Choice

...should begin with the businesses strategic goals in clear perspective. I feel that if broadened over the entire organization initially such as employees, managers, line managers and other job families, a clear perspective may get lost. Summary The article “The new metrics: how to develop your own workforce scorecard” clearly identifies an organizations need for a workforce scorecard. The author gave a detailed outline of the reasons, methods, concepts and results of a scorecard. Scorecards are used to measure intangible assets. This could be a difficult process if not initiated in the proper perspective. Reference "The new metrics: how to develop your own workforce scorecard." Human Resource Department Management Report Nov. 2004: 1+. Academic OneFile. Web. 12 Oct. 2012....

Words: 521 - Pages: 3

Free Essay

Nt2580 Unit 5 Assignment 1

...It255 Unit5 Assignment TO: FROM: DATE: SUBJECT:Unit 5 Assignment 1: Testing and Monitoring Security Controls REFERENCE: Testing and Monitoring Security Controls (IT255.U5.TS1) How Grade: One hundred points total. See each section for specific points. Assignment Requirements Part 1:Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Explain why they might indicate suspicious activity.(Forty points. Twenty points for each event.) # | Security Event & Baseline Anomaly That Might Indicate Suspicious Activity | Reason Why It May Indicate Suspicious Activity | 1. | Authentication Failures | Unauthorized access attempts | 2. | Network Abuses | Employees are downloading unauthorized material. | 3. | | | 4. | | | 5. | | | 6. | | | Part 2: Given a list of end-user policy violations and security breaches, select three breaches and consider best options for monitoring and controlling each incident. Identify the methods to mitigate risk and minimize exposure to threats and vulnerabilities. (Sixty points. Twenty points for each breach.) # | Policy Violations & Security Breaches | Best Option to Monitor Incident | Security Method (i.e., Control) to Mitigate Risk | 1. | A user made unauthorized use of network resources by attacking network entities. | Monitor the logs | Fire the user | 2. | Open network drive shares allow storage privileges to outside users. |...

Words: 258 - Pages: 2

Free Essay

Unit 5 Ass 3

...Unit 5 Assignment 3 Cardiovascular The cardiovascular system, also known as the circulatory system, is a system of the body comprised of the heart, the blood, and the blood vessels. This system is responsible for transporting blood. As the cardiovascular system moves blood throughout the body, cells receive oxygen and nutrients. Carbon dioxide and other wastes are removed from the body as well. Carotid artery  The function of this carotid artery is that it carries blood away from the heart. The arteries are made up from blood vessels and these supply blood to the head neck and brain. The artery is on each side of the neck, left and right. Each carotid artery branches into internal and external vessels near the top of the thyroid. The only important function that the carotid artery has is to carry the blood to the head, neck and brain to supply it with blood. The right hand side and left side carotid arteries both link off. The right side is known as the internal carotid artery which supplies blood to the brain and the eyes. The left side of the carotid artery supplies blood to the throat, neck glands, tongue, face, mouth, ear and scalp. They both have different jobs where they have to supply blood too, both these jobs are important to supply the top half of our body with blood. Subclavian arteries  the Subclavian arteries carry blood away from the heart. Subclavian arteries are both on the right and left side of the body. The right Subclavian artery extends......

Words: 710 - Pages: 3

Free Essay

Nt1310 Unit 2 Ass 1

...RBOCS-The Regional Bell Operating Companies (RBOC) are the result of United States v. AT&T, the U.S. Department of Justice antitrust suit against the former American Telephone & Telegraph Company (later known as AT&T Corp.). On January 8, 1982, AT&T Corp. settled the suit and agreed to divest its local exchange service operating companies. Effective January 1, 1984, AT&T Corp.'s local operations were split into seven independent Regional Bell Operating Companies known as "Baby Bells". RBOCs were originally known as Regional Holding Companies (RHCs). Currently, three companies have the RBOCs as predecessors. They are AT&T Inc., Verizon, and Century Link. Some other companies are holding on smaller segments of the companies. ILEC- An incumbent local exchange carrier (ILEC) is a local telephone company in the United States that was in existence at the time of the breakup of AT&T into the Regional Bell Operating Companies (RBOCs), also known as the "Baby Bells."[1] The ILEC is the former Bell System or Independent Telephone Company responsible for providing local telephone exchange services in a specified geographic area. GTE was the second largest ILEC after the Bells, but it has since been absorbed into Verizon, a RBOC. ILECs compete with competitive local exchange carriers (CLEC). When referring to the technical communities ILEC is often used just to mean a telephone provider. In Canada, the term ILEC refers to the original telephone companies such...

Words: 496 - Pages: 2

Free Essay

Nt1330 Unit 5 Exercise 1

...the role first. Asses the duration of the hosting DCs outage, if it’s going to be short wait instead of seizing. As for finding which DCs currently hold which roles and which are global catalog servers. Determine whether a domain controller is a global catalog server: 1. Open Active Directory Sites and Services. 2. In the console tree a. expand the Sites container b. expand the site of the domain controller you want to check c. expand the Servers container d. expand the Server object. 3. Right-click the NTDS Settings object a. click Properties. 4. On the General tab, if the Global Catalog box is selected, the domain controller is designated as a global catalog server. How to Determine the RID, PDC, and Infrastructure FSMO Holders of a Selected Domain 1. Click Start a. click Run b. type dsa.msc c. click OK. 2. Right-click the selected Domain Object in the top left pane a. click Operations Masters. 3. Click the PDC tab to view the server holding the PDC master role. 4. Click the Infrastructure tab to view the server holding the Infrastructure master role. 5. Click the RID Pool tab to view the server holding the RID master role. How to Determine the Schema FSMO Holder in a Forest 1. Click Start a. click Run b. type mmc c. click OK. 2. On the Console menu, click Add/Remove Snap-in a. click Add b. double-click Active Directory Schema c. click Close d. click OK. 3. Right-click Active Directory Schema in the top left pane, a. click......

Words: 956 - Pages: 4

Premium Essay

Unit 5. Exercise 1 Security

...Montie Ramsarran July 18th, 2014 NT1230 Mr. Durniok Unit 5. Exercise 1 Security Re: Manager In response to your questions regarding if Windows 7 includes protection against some internet threats. Windows 7 comes with Microsoft Security Essentials which helps defend against viruses, trojans, worms and spyware. Windows Defender runs in the background and notifies you when you need to take specific action. However, you can use it anytime to scan for malware if your computer isn’t working properly or you clicked a suspicious link online or an email message. You also have Firewall protection on your computer, where you can access it from your “control panel” to make sure it is turned on. Not only does it protect you at home but in public places also. Your “advanced settings” on firewall shows you “incoming” and “outgoing” rules and also allows you to create your own rules. Microsoft Security Essentials uses green, yellow and red color codes to designate the security status of your PC and a color-coded icon in the taskbar tells you at a glance if your attention is needed. It’s simple—when you’re green, you’re good. However, if there’s a red or yellow threat, Microsoft Security Essentials will alert you and recommend what to do (you can act directly from the notification area without having to enter the application). In closing, Microsoft Security Essentials is designed for small business; it runs quietly in the......

Words: 259 - Pages: 2

Premium Essay

Comp 2 Ass. Unit 1

...Joseph Bender Assignments Unit 1 Minor: Issue one: The production and sale of cigarettes must be outlawed for the health of the American public. Two points are people would be healthier and people who smoked would have more money. Two counterpoints would be that there would be crime of people selling them illegally. Also that would taking away rights on the American people. Issue two: The majority of American people support prayer in school. I can’t but the points to this issues because I am strongly against this, but I can make 4 counter points. Having prayer and school goes against the rights of American people and so causing religious people to bring their religion into places where it does not belong. There is place for religion and that is in church where it belongs. Religion should be kept to yourself. Issue three: Capital punishment is no deterrent to crime. Two points are that homicide rates in states with death penalty are consistently higher than for those that don’t. There is no scientific proof that nations with capital punishment have a lower crime rate. Two counterpoints are that capital punishment is a relief for the victim’s family. If capital punishment happens that mean that person is off the streets for good and can never do it again Major: 1. Pros of tipping: might provide better service. Helps out the employees that might be getting paid that much. 2. Cons of tipping: They are already getting paid to do their job. There will be tip cup......

Words: 356 - Pages: 2

Free Essay

Pt1420 Unit 1 Rearch Ass.1

...Michael Campbell PT1420 Unit 1 Re Ass 1 10/10/2014 1. 1970s – The programming language was C, which was created by Dennis M. Richie. Before he created the C language there was the B language, which was created by Ken Thompson in 1969-70. The computers in that time wrote in assembly code and the user had to write many pages of code to do a task. When the B language was created, it made it possible to do a task in a few lines. Although the B language improved the systems it lacked use of structure and didn’t know data types. So in 1971-73 Dennis Richie wrote the C language in which he kept the B syntax but added data types and other changes that needed to be made. It was built for power and speed and developed for UNIX systems. Its also used for Windows, the MacOS and Linux. 2. 1980s – The programming language was Python, which was created by Guido van Rossum. It’s more of a scripting language and allows users to produce large quantities readable and functional code in a quick amount of time. Python teaches the user how to work with other languages, indentation, and modularity. It supports object – oriented, procedural, and functional program styles. C++ was also created and used many different types of computers. Program A was created by Arthur Whitney in 1988, and it focused on graphics, systems interfaces, utility support, and user community. 3. 1990s – The programming language was Ruby, which was created by computer scientist Yukihiro Matsumoto. It was......

Words: 454 - Pages: 2

Premium Essay

Unit 5 Assignment 1

...Shamone Gayles Unit 5 exercise 1: Guided Reading Chapter 10 1. What is the typical organization on an argument essay? Introduction /summary of opposing positions including strengths/ limitations of opposing positions/Your understanding of the issue, describing both strengths and limitations of your position/Reasons your understanding is better than the opposing views’ understanding/ Conclusion 2. What are points of contention, and how do you identify them? My position verses opposing positions, by coming up with the best arguments against your position yourself so you are prepared to counter them. 3. Why is it important to know the stance of your opposition? By knowing your opposition, you can identify the weaknesses in your stance and how to remedy them. 4. What is the difference between argument and research paper? In an argument you pick a topic that is controversial and debatable, whereas in a research paper, you do your research and only report what you find, while not trying to sway in either direction. Chapter 24 1. What is a good way to start the research process? Define your research question and sharpen it/ develop a working thesis that offers your best guess about how you will answer the research question/ devise a research plan to systematically collect the information needed to answer your research question and determine whether you’re working thesis is verifiable. 2. Why is it important to have a sharp research......

Words: 724 - Pages: 3

Free Essay

Unit 5 Assignment 1

...pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm Unit 5 Assignment 1:Future Statement Brain Mapping 8/1/2013 Troy Jones (16609262) GS 1140 | I find the future of Brain Mapping Technology very exciting! Think of it, science has already begun to do this. Can you imagine if we could look at the brain and find exactly where our actions come from? Thoughts, behaviors, actions, and brain trauma/disease just to name a few could be improved upon or better yet cured! This would have a huge impact on our society. Brain diseases like (ALS) Lou Gehrig’s disease for example could be impacted greatly. I personally lost my oldest brother to ALS last year. He was only 54 and died nine months after the diagnosis. It’s a brutal disease. I would like to in vision a future for people without ALS or Autism. Curing......

Words: 274 - Pages: 2

Premium Essay

Pm3110 Unit 5 Assignment 1

...Intro to Project Management Hector Diaz PM3110 7/23/15 Instructor: Muhammad Bashir Unit 5 Assignment 1; Simulation/Case Study: The Dulhasti Power Plant After reviewing case study 8.1 in unit 5 of the textbook Project Management: Achieving Competitive Advantage (2nd Edition), I was tasked to elaborate on the challenges of delivering an accurate cost estimation when working on harsh geographical conditions. It was observed in the case study that the geographical location chosen for the construction of the Dulhasti Power Plant in the provinces of Jammu and Kashmir, had become too much of a concern for investors and project coordinators, mainly due to a disputed border conflict between India and Pakistan. Not only did the budget increased exponentially over a 20-plus year period (due to the fact that this project was conceived in 1983), but concerns about the local terrorist and nationalist groups in and around the border began to raise numerous questions regarding safety and of course, budgeting (in the sense of hiring extra security to patrol the area). When the Indian government used a fixed-price contract to favor the lowest bids when initially beginning the project, it was believed to be the best method of approach at the...

Words: 438 - Pages: 2

Free Essay

Pt1420 Unit 1 Research Ass 1

...| Exploring Programming Language | Unit 1 Research Assignment 1 | | | 5/3/2014 | PT1420 | The five most popular programming languages in the 1970’s were: 1970: Pascal 1972: C 1972: Smalltalk 1972: Prolog 1973: SQL Pascal The Pascal programming language was developed by Niklaus Wirth. It was created in 1968 but it wasn’t published until 1970. It was developed to provide the features other programming languages didn’t offer at that time. His main reason for developing Pascal was efficiently implement and run, to allow for the development of structured and well organized programs, and to serve as a tool to teach the important concepts of computer programming. The program was named after a mathematician named Blaise Pascal. It was used as the primary language in the Apple Lisa and for the Mac in the early years of the computer. SQL SQL, which is short for, Structured Query Language, was designed by an IBM research center in 1974-1975. The Oracle Corporation introduced it as a commercial database system in 1979, the first time it was introduced. It has been a favorite query language for the use of database management systems for the microcomputer and mainframes, but is being supported by the PC database. C C was created at the Bell Laboratory in 1972 by Dennis Ritchie. It was created for the purpose in designing UNIX. Prolog Was created from 1971-1973 and was distributed in 1974-1975. It was created not as a programming language on purpose......

Words: 988 - Pages: 4

Premium Essay

Unit 5 Lab 1

...Physical Networking Unit 5 Lab 1 Wired and Wireless Networks The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the “need to run cables in difficult environments through walls, floors and ceilings. Cables need to be run from computer to computer and switch to switch. Process can be time consuming. Loose cables likely remain the single most common and annoying source of failure in a wired network.” (PACE University, n.d.) While a wireless network is a very useful and convenient networking device, however these types of networks a lot less secure and transmission speeds can suffer from outside interference. Although wireless networking is a lot more mobile than wired networking the range of the network is usually 150- 300 indoors and up to 1000 feet outdoors depending on the terrain. The cost for wired networking has become rather inexpensive. Ethernet cables, hubs and switches are very inexpensive. Broadband routers cost more, but these are optional components of a wired network, and their higher cost is offset by the benefit of easier installation and built-in security features. The primary parts of a wired network are the cables, network adapters, and routers.......

Words: 315 - Pages: 2

Free Essay

Unit 5 Assignment 1 Video

...Unit 5 Assignment 1: Video Summary NT1110 There are two major manufactures we use in today’s market which are Intel and AMD. There are some minor competitions but don’t stay on the market for long. The system bus for the CPU is also known as the Front-side bus as it inserts the CPU and has a 64 bit data pass. In the CPU theirs a controller that controls communication between the motherboard and other components with the CPU. The ALU is responsible for performing complex calculations. Communications between the controllers and the ALU’s uses a 32 bit wide internal data bus. A processor is usually measured in GHz. A system Bus is usually measured in MHz and has limiting factors of speed. The multiplier is the ratio between processor and the System bus. The system bus speed x multiplier equals the processor speed. CPU manufactures have come up with different ways to make the CPU work faster. Two multi-processing requires multiple processors (In other words your system must be designed to support more than one CPU on a single motherboard). Dual Core Processors have been recently developed, that means incorporating multiple processors with multiple ALU’s inside a CPU. These ALU’s process their information individually. There’s two cache memory’s which are SRAM and DRAM. SRAM is also called Static RAM, it is faster and more expensive then DRAM, it holds memory without being refreshed and DRAM must be refreshed. There are three types of RAM which are L1 cache, L2 cache, and L3......

Words: 644 - Pages: 3

Premium Essay

Unit 2 Ass 1

...Unit 2: Business resources P1: Within this assignment I will be looking into the recruitment documentation needed in a selected organisation. The organisation I will be assessing is Asda. Human Resource Management (HRM) is the function within Asda that focuses on recruitment, management, and providing direction for the people who work in the organization. Human Resource Management can also be performed by line managers. Human Resource Management is the organizational function that deals with issues related to people such as compensation, hiring, performance management, organization development, safety, wellness, benefits, employee motivation, communication, administration, and training. Human Resource Management is a process of managing manpower through proper selection, training and assigning right tasks to suitable persons in an organization. This is the recruitment documentation used in Asda: Firstly the human resources team decide what job is needed due to lack of staff and they look into what the colleague will have to do. This is called job analysis. Next is the job description and this describes what tasks the colleague will be undertaking. Along with this is the job specification and in this it describes what characteristics and skills are required for the role. After this they have to attract applicants and to do this they have to advertise the job internally and externally, the applicants apply through an application form or a CV. This tends to include......

Words: 1637 - Pages: 7