Nt1310 Unit 6 Assignment 1

In: Computers and Technology

Submitted By LuLuBean93
Words 726
Pages 3
3 types of cable testing tools:
Wire map testers - A wire-map tester transmits signals through each wire in a copper twisted-pair cable to determine if it is connected to the correct pin at each end. Wire mapping is the most basic test for twisted pair cables because the eight separate wire connections involved in each cable run are a common source of installation errors. Wire-map testers detect transposed wires, opens (broken or unconnected wires), and shorts (wires or pins improperly connected to each other)—all problems that can render a cable run inoperable.
Wire-map testing is nearly always included in multifunction cable testers, but in some cases it may not be worth the expense to spend thousands of dollars on a comprehensive device.
Dedicated wire-map testers are relatively inexpensive and enable you to test your installation for the most common faults that occur during installation and afterward. If you are installing voice-grade cable, for example, a simple wire-mapping test may be all that’s needed. Slightly more expensive devices do wire-map testing in addition to other basic functions, such as TDR length testing.
A wire-map tester consists of a remote unit that you attach to the far end of a connection and the battery-operated, handheld main unit that displays the results. Typically, the tester displays various codes to describe the type of faults it finds. In some cases, you can purchase a tester with multiple remote units that are numbered, so that one person can test several connections without constantly traveling back and forth from one end of the connections to the other to move the remote unit.
Continuity Testers - A continuity tester is an even simpler and less expensive device than a wire-map tester. It is designed to check a copper cable connection for basic installation problems, such as opens, shorts, and crossed pairs. These devices…...

Similar Documents

Nt1310 Unit 3 Assignment 1

...computer usually a mainframe” (Miss). “However, these "client" computers also serve as host computers to next level units” (Miss). Thus, the hierarchical network can theoretically be compared to a standard organizational chart or a large corporation. “Typically, the host computer at the top of the hierarchy is a mainframe computer. Lower-levels in the hierarchy could consist of minicomputers and microcomputers” (Miss). References History of Bus Topology? (2013). Retrieved 10 3, 2013, from Ask.com: http://www.ask.com/question/history-of-bus-topology Aabout.Biz. (n.d.). web page expired. Retrieved October 11, 2013, from http://www.aabout.biz/2012/04/ring-network.html Conjecture Corporation. (2003). What Is a Ring Network? Retrieved October 11, 2013, from wiseGEEK: http://www.wisegeek.com/what-is-a-ring-network.htm Laudon, J. (2013). e-Study Guide for: Essentials of Business Information Systems . Retrieved 10 3, 2013, from Google books: http://books.google.com/books?id=gFcRn3-mJkMC&pg=PT83&lpg=PT83&dq=Bus+networks+are+the+simplest+way+to+connect+multiple+clients,+but+may+have+problems+when+two+clients+want+to+transmit+at+the+same+time+on+the+same+bus.&source=bl&ots=mApjnMC9Ca&sig=ZztTD82 Miss, O. (n.d.). NETWORK TOPOLOGY. Retrieved 10 3, 2013, from COMMUNICATIONS - NETWORK TOPOLOGY: http://home.olemiss.edu/~misbook/conetom.htm Nikaido, A. (2013, 1 16). network topology. Retrieved 10 3, 2013, from Prezi:......

Words: 517 - Pages: 3

Unit 6 Assignment 1

...Chapter 6: Conceptual Review Questions (All Questions worth 5 points each) Match the information below with Questions 1 through 14. |A. Compound Interest |E. IRR |I. PMT |M. ROI | |B. CUMPRINC |F. NPER |J. PPMT |N. Simple Interest | |C. FV |G. NPV |K. PV |O. SLN | |D. IPMT |H. Payback Period |L. RATE |P. Type | 1. Function to calculate the interest percentage per period of a financial transaction 2. Function to calculate the value at the beginning of a financial transaction 3. Function to calculate value of the end of a financial transaction 4. Function to calculate periodic payments in or out of a financial transaction 5. Function to calculate the number of compounding periods in a financial transaction 6. Use a “1” for this argument to indicate that interest will be paid at the beginning of each compounding period 7. This type of interest is calculated based on original principal regardless of the previous interest earned 8. This type of interest is calculated based on principal and previous interest earned 9. Function to calculate straight line depreciation based on the initial capital investment, number...

Words: 622 - Pages: 3

Nt1310 Unit 7 Assignment 1

...Unit 7. Assignment 1. Refraction, Reflection and Optics Refraction: The most common real life example used when discussing refraction is a straw in water. When a straw is placed in a glass of water and viewed from the side, it appears to be broken or bent. This is due to the difference in the refractive indices of air and water. Since water is denser than air, the straw appears to bend as the light it reflects is slowed by the density of the water. This phenomenon also makes submerged objects, such as fish look closer to the surface than they actually are. Another common example is a rainbow, where sunlight is refracted by raindrops. Sunlight consists of a mixture of different wavelengths, or colors, of light, with blue, for example, having a shorter wavelength than red. When this light passes through raindrops, the shorter wavelengths are bent more than the longer ones, splitting the light into its different colors. Reflection: Pretty much everything you see could be considered reflection. The fact we can see is due to light reflecting off of objects and into our eyes. A good example, I guess, is the moon. When it glows at night that is just light from the sun reflecting onto the Moon's surface, and bouncing back, giving it that glow. Degradation of signal strength in fiber-optic transmission. The main factors that affect this is number of connectors, splicing, Quality of Fiber / connectors, also not using an Attenuator according to the distance, or using dirty......

Words: 256 - Pages: 2

Nt1310 Unit 1 Assignment 1

...Physical Networking Unit 1 Assignment 1 Cell phones – Cell phones use data networks to communicate over radio frequencies. The frequencies that they use are also shared with television, Bluetooth, and Wi-Fi. Landline phones – Landline phones use voice networks only because they do not need as much speed as anything else. Normal house phones use approximately 10 MB/s which is all that voice networks handle. SMS/Text messaging – Text messaging uses data networks because they can also be sending media like pictures and video. The other reason that I believe that text messaging uses data networking is because it is faster. Fax machines – Fax machines use voice because they only transmit exactly what is on the paper. It is not being transformed into little packets and sent over the internet to another place; it is just sent from one place to another through the phone line. Pagers – Pagers use the same as cell phones and that is data networks because it is wireless, and does not have to be plugged into anything. Pagers are not that common due to the cell phone industry growing swiftly. VOIP – VOIP as it says in the name of it uses a data network. It uses IP for talking so that the communication is more secure and not many people can tap in as easily as people can over regular phones. Skype/Facetime – Skype and facetime both use data networks to communicate because you are sharing video with somebody else. You are also receiving video, and video cannot be shared over a......

Words: 261 - Pages: 2

Unit 6 Assignment 1

...IS3340-WINDOWS SECURITY | Minimizing Recovery Time Strategies | Unit 6 Assignment 1 | | | 5/5/2014 | | This document outlines the required steps to follow, in-order to properly scan the necessary servers and workstations in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA(Microsoft Baseline Security Anaylizer) •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer you will be scanning and the computer with MBSA installed have Internet access, the latest security catalog (.cab file), authentication files, and WUA installer files will be automatically downloaded, if needed. If either the target computer or the computer with MBSA installed does not have Internet access, download the following files and place them in the C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\ directory on the computer that is performing the scan. 2) Scan computers Run MBSA and clear the Check for security updates check box when performing the scan. Using the Graphical Interface Tool The following procedure describes how to use the MBSA GUI tool. To use the MBSA GUI tool to scan for updates and patches 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. *......

Words: 487 - Pages: 2

Nt1310 Unit 3 Assignment 1

...exactly to two other nodes, forming a single continual pathway for each node - a ring” (Conjecture Corporation, 2003). In a ring network data travels from each node to the other node/s with each node handling every packet. A ring network provides only a pathway between any two nodes at one time. Ring networks may be disrupted by the failure of a link. A node failure or cable break will isolate every node attached to the ring. A malfunctioning that any workstation can create problems for the entire network. “A hierarchical network or a tree network resembles a star network in that several computers are connected to a central host computer usually a mainframe” (Miss). “However, these "client" computers also serve as host computers to next level units” (Miss). Thus, the hierarchical network can theoretically be compared to a standard organizational chart or a large corporation. “Typically, the host computer at the top of the hierarchy is a mainframe computer. Lower-levels in the hierarchy could consist of minicomputers and microcomputers” (Miss)....

Words: 311 - Pages: 2

Unit 6 Assignment 1

...Used to connect devices that contained DB9 pin connections usually mouse’s and keyboards. In todays computers Serial Ports have all been upgraded to USB ports. • Parallel Port- Used to connect printers or external devices such as hard disk drives. Parallel Parts are unique with a DB25 pin connection. They call it DSUB or DB25 cause the connection looks like a D • SRAM- also known as (Static random access memory) is a type of semiconductor memory where the word static indicates that, unlike dynamic ram or DRAM, it doesn’t need to be periodically refreshed. • DRAM- also known as (Dynamic Random Access Memory), DRAM is one of the most commonly found memory modules in PC compatible personal computers and workstations. Though out the assignment I have learned and gave my self a clear understanding on what certain terms and well older technology that has paved the way for our new technology to exist. The information in the video clips provided was very informative with helpful hints on what to expect from the A+ certification exam. We will use this information when we build our own system....

Words: 340 - Pages: 2

Unit 6 Assignment 1

...Cable Testers: How They Work and With Which Cable System ITT Technical Institute Physical Networking – NT1310 10/27/2014 After any size cable installation the technicians should check for errors, performance issues, signal loss and check for equipment that may cause interference and degrade network performance. The following paragraphs describe three (3) cable testers and how they work and which cable system(s) they are most suitable for. The first tester is the wire-mapper. Wire-mappers are used primarily with copper twisted-pair cable installations. These devices, according to Oliviero and Woodward (2011, p.422, 441) “Transmit signals through each pair in a twisted-pair cable to determine if it is connected correctly to the correct pin at each end.” The second tool is the tone generator. A tone generator is a two-piece unit that consists of a tone generator and a probe. This type of tester's primary function, amongst installers, is to identify specific locations in a punch-down block then label accordingly. According to Oliviero and Woodward (2011, p.442-443), these testers “Transmit[s] a signal, or, with an alligator clip, you connect the unit to an individual wire. The other unit is an inductive amplifier, which is a pen-like probe that emits an audible tone when touched to the other end of the conductor.” Primary functions are identify a particular cable within a bundle and to test for opens, shorts, and miswires of individual wires. Unfortunately, there......

Words: 399 - Pages: 2

Nt1310 Unit 1 Assignment 1

...ITT Technical Institute Springfield, MO Unit1 Activity1 Tom McKellips NT1310 Bryan Thurlkill September 26, 2013 Voice vs. Data * Cell Phones – Since a cell phone is considered a two way radio, which transmits the digital signal via radio waves-invisible light waves-that move through the air. Cell phones can be seen as both voice and data, depending on what type of cell you have. * Landline Phones – A simple phone that has to be plug into a jack, which is mostly used in business and in a few homes now days. The signal travels through the wires to a switch than to its destination. A landline phone sends a voice signal across the network. * SMS / Text Messaging - text messaging has become a very popular mode of communication. Short Message Service (SMS) is a communication protocol allowing the interchange of short text messages between mobile devices. SMS messages are presently transmitted over signaling channels of a voice network, such as over SS7 channels. * Fax Machines – Fax machines sends data through networks which is a lot faster than using regular mail. A fax machine takes a copy of a document than sends it through a transmission line to another fax which than prints out an exact copy of that same document. This transmission is sent through a data network. * Pagers - Pagers were the most popular wireless communications devices for several reasons: They are very easy to use, their batteries last several weeks, and they are light......

Words: 534 - Pages: 3

Unit 6 Assignment 1

...Unit 6 Assignment 1: Cable Testers In almost every application in dealing with cable installations, cable testing is a must. Some methods of testing cables include testing for attenuation, continuity testers, DC Resistance, a wire mapper and cable length. In all cable types- copper or fiber, 10BASE-T or 100BASEFX, the standards are constantly being changed and developed into a new standard for all future technologies. When testing cable, you can guarantee that the users will be satisfied when all connections prove effective for not just uninterrupted transmission but correct bandwidths to support. A wire mapper is the most common tool. It simply provides a test of a standard Cat5 cable to ensure each individual wire not only carries a strong signal through the entire length of the route, but it proves if each wire ends up in the correct pin number on the opposite end to receive the transmission. It will give the technician an idea if a cable has a short, or if it is a crossover cable. It is also very useful with telephone connections. It should be a part of each cable installation kit. Another common tool is a continuity tester. It shows if there is a direct connection between two points. If there is a closed electrical pathway for the tester to detect, then the device will make a sound. This is useful not only to test for a short, but also to determine and identify which cable is which in a closet full of many cables. This is also a very important tool in any......

Words: 437 - Pages: 2

Unit 6 Assignment 1 Questions

...Unit 6 Assignment 1: Homework Learning Objectives and Outcomes Name the main events in the development of SQL statements. Run SELECT queries with wild cards, DISTINCT key word, calculations, sorting and aliasing. Run queries with the WHERE clause to filter the result sets. Use the Aggregate functions COUNT, AVG, SUM, MIN, and MAX. Assignment Requirements Answer the true-or-false questions on the next page by filling out the answer sheet. Required Resources Textbook Submission Requirements Submit your completed answer sheet to your instructor at the beginning of Unit 7. Unit 6 True/False Questions Indicate whether the following statements are true or false on the student answer sheet. 1) SQL is the programming language used to manipulate data and data objects in a relational database management system. 2) SQL is a procedural language. 3) A declarative language is a language in which you tell the computer what to do not how. 4) DML, or Data Manipulation Language, contains all the commands for selecting and modifying data. 5) DDL, or Data Definition Language, contains all the commands for selecting and modifying data. 6) The * in SELECT * clause of an SQL statement is a wildcard for returning all columns in a table. 7) The DISTINCT keyword in a SELECT statement returns only unique rows. 8) The FROM keyword is used in a SELECT clause to determine which columns are included in the query. 9) An alias in SQL is a......

Words: 363 - Pages: 2

Nt1310 Unit 9 Assignment 1

...Unit 9 Assignment 1 3/2/2015 LEDs has a much lower power output than lasers and their bigger the light output pattern makes it harder to couple into fiber limiting the LED to be used with multimode fibers, LEDs have less bandwidth than a laser and are limited to operate up to about 250 MHz or around 200 Mbs. But of the way the LEDs are fabricated they are cheaper to make than lasers, they contain no hazardous material and last up to 10,000 hours. LEDs have a very small broad output which causes them to suffer chromatic dispersion in fiber. The bulbs create less heat during use which can lead to lower cooling costs and its green friendly, decreases amount of energy used by 5%. Laser Transmitter Laser transmitter have a much smaller and tighter light input and can be easily coupled to single mode fibers, this make the laser transmitter perfect for longer distances and high speed links. Laser has a high bandwidth capability some are used up to 10 GHz or 10 Gbps this makes Laser transmitters more expensive. Laser Transmitters have a narrow spectral output that suffers very little chromatic dispersion. Laser Transmitters avoid interference because the frequencies between the lasers have narrow beams that are less likely to have significant side lobes that could introduce interference. They could be applied when two or more buildings want to be connected to the same network or just to connect to or more networks. The transmitter takes an electron input and converts it to......

Words: 319 - Pages: 2

Nt1310 Unit 6 Exercise 1

...work is to be completed based on the dates from the attached schedule. Dates on the attached schedule include walk-through dates, bid submission dates, and expected project-start and completion dates. Questions and comments are welcomed; prospective contractors are encouraged to submit these questions in writing. (a) All bids are to be submitted in triplicate. (b) Each bid is to list all labor, material, and hardware costs in an itemized fashion. The detail is to include itemized unit pricing, cost per unit, and extended prices for each of the material and hardware components as well as the specific labor functions. (c) A cost, per outlet, to add or delete outlet locations is to be included in the pricing format. This cost is not to include any changes in hardware or patch-panel quantities. (d) There is also to be a scope of work provided that details all of the functions to be provided by the contractor for the project. (e) Quote optional Category 5e patch cables and station cables on a per-unit cost basis. List pricing for 3-foot, 5-foot, 7-foot, 9-foot, and 14-foot patch cables. (f) Quote optional network cutover assistance on a per-hour basis per technician....

Words: 596 - Pages: 3

Nt1310 Unit 3 Assignment 1

...topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet. Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link. A node failure or cable break will isolate every node attached to the ring. A malfunctioning that any workstation can create problems for the entire network. A hierarchical network or a tree network resembles a star network in that several computers are connected to a central host computer usually a mainframe. However, these "client" computers also serve as host computers to next level units. Thus, the hierarchical network can theoretically be compared to a standard organizational chart or a large corporation. Typically, the host computer at the top of the hierarchy is a mainframe computer. Lower levels in the hierarchy could consist of minicomputers and microcomputers. ...

Words: 287 - Pages: 2

Nt1310 Unit 6 Exercise 1

...NT1310 Physical Networking Unit 6 Exercise 1 Thomas Westbrook Due Date: Unit 6 Exercise 1: Connector Installation Twisted -Pair Cable * Measure the cable you want to put ends on, using a cable cutter trim off the excess * Use a cable stripper to strip about 1 ½ inches of the jacket from the end, then rotate the stripper around the cable twice to cut through the jacket * Remove the stripper and pull the trimmed jacket from the cable, so that you can see the inner conductors. Separate any visible jacket slitting cords that are present, trim it backto the edge of the jacket. * Untwist all the inner conductor pairs and spread them apart so that you can see each individual conductor * Line up the individual conductors so that the color matches the color-coding standard you are using * Trim the conductors so that the ends are even with each other, make sure that the jacketof the cable will be inside the connector. The total length of the exposed connectors after trimming should be no longer then ½ inch to 0.625 inches * Insert the conductors into the connector, make sure that all conductors line up properly with the pins as they were in the previous step. If they don’t line up, try again. Make sure to do this step carefully, it’s the last one before crimping * Carefully insert the connector and cable into the crimping tool. It has two dies that will press into the connector. Push the pins in the connector into the conductorsinside the......

Words: 421 - Pages: 2