Preview

NT 1310 Unit 5 LAB 1

Good Essays
Open Document
Open Document
417 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT 1310 Unit 5 LAB 1
Unit 5. Lab. New Building-Wired and Wireless

If I choose to design the new building with a wired network the main benefit is there would be a low chance on interception. Choosing a wired network will also have a lower risk of security issues; reliability and speed are primary benefits as well when using physical connections in a wired network. The basis of the new building will relay on loads of data to be moveable that is why a wired network allows the control. Wired LANs provide superior performance. A wired network is also more cost effective, the items needed to build such as Ethernet cables; hubs and switches are very inexpensive. But by using a wired network Ethernet cables, hubs and switches are extremely reliable and inexpensive. If I choose to use a wireless network in the designing of the new building the obvious benefit is a wireless network is neater. This means getting rid of all those unsightly cables that usually run around a building. The mobile computers do not need to be tied to an Ethernet cable and can roam freely within the WLAN range. By using wireless network it is vital that users have access to the network from anywhere in the building and that means giving them wireless access. As well as being able to use their own devices, wireless infrastructure means freedom to move around the building, from meeting room to meeting room. The tools that are used for installation are basically the same except for some particular networking tools. I will provide a list of the basic manual tools they are pull and push rods, bulk cable wall plates, wire pulling kits, fish tape/wire snakes, wall scopes and inspection cameras, wire racks, ceiling holes saws and low voltage boxes an mounting brackets. There are pros and cons to having a wireless and a wired buildings and it is fair to say that wireless becoming the norm is still some way off. A combination of wired and wireless is the way forward, at least for now. That way a business can

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT 1310 Unit 8 Lab 1

    • 595 Words
    • 2 Pages

    The most critical part, the Cable and Fiber Preparation where the fiber is mounted, is the ferrule. The Ferrule is a long, thin cylinder with the fiber mounted in the center hole. The center hole is sized to match fiber's cladding diameter which is usually 125um. When fiber connector ferrules are made from several types of materials including ceramic(Zirconia), stainless steel and plastic. The ferrule's job is to center and align the fiber and protects it from mechanical damage. The end of fiber is at the end of the ferrule, where the fiber end is polished smooth either flat or with a curvature. The ferrule is mounted in the connector body and then the connector body is attached to the fiber optic cable structure. Finally, a strain-relief rubber boot protects the connector-cable junction.…

    • 595 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Lab 8

    • 551 Words
    • 3 Pages

    The team also noticed some inconsistencies in the graph that they feel could be fixed by changing their code. One of these issues being that cutting off power completely from the AEV’s resulted in the motors having to do extra work in order to get started again. Possibly changing the code so the amount of power supplied to the motors gradually decreased over time instead of stopping the power completely, could make for a more efficient AEV. Theoretically speaking, when a plane begins to near its destination the pilot begins to lower the amount of thrust given to the engines, not cease thrust completely, so if the team were able to find a way to mimic this, they feel that their AEV could save energy overall, and become more productive.…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Lab

    • 91 Words
    • 1 Page

    Transfer the uniformly weighted crushed tablets into a beaker and add 100cm3 of dilute sulfuric acid to the beaker.…

    • 91 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 4 Lab

    • 370 Words
    • 2 Pages

    Read the paper “Post–Green Revolution Trends in Yield Potential of Temperate Maize in the North-Central United States” by Duvick and Cassman (In Blackboard – Seed Technology folder).…

    • 370 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 12

    • 348 Words
    • 2 Pages

    Provide accessories necessary to complete the installation, of the types specified or recommended for the purpose by the manufacturer of the equipment or accessories.…

    • 348 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    nt 1310 unit 9

    • 2641 Words
    • 8 Pages

    A laser transmitter projects a beam of laser light outward while raising and lowering the beam. The beam may define a conical surface of varying inclination. The transmitter includes a laser source that directs a beam generally vertically, and a beam diverting element. The beam diverting element is positioned in the path of the beam, intercepting the beam and redirecting it. The beam emerges from the transmitter as a non-vertical beam that is raised and lowered. The diverting element may include a pair of mirrors configured as pentagrams,…

    • 2641 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 6 Lab

    • 140 Words
    • 1 Page

    1.) Test for viscosity: Since DNA molecules are long strands that anneal to each other, they can be very viscous in liquid if they're at a high enough concentration. If I notice the sample sticking together while pipetting it, I'll often know that I have a lot of DNA in the sample.…

    • 140 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It/242 Week 4 Chekpoint

    • 379 Words
    • 2 Pages

    I believe that an Ethernet should be used. When a company which is spread out between multiple floors, such as XYZ Technology Consultants, a Token Ring Architecture is not the correct choice for this type of building. Token Ring Architecture, by design is a way to set up multiple computers together, enabling each PC to pass along information without data collision. However, Token Ring Networks, can also process data remarkably slower than Ethernet Architecture (sometimes as slow as 4 or 16 Mbps). Ethernet, by design are typically used in office buildings that are wired with twisted pair CAT-5 cables, or fiber optic cables for fast transmission of data, with each employee location fitted with an Ethernet jack to connect to the network. Utilizing this type of Architecture, if a problem arises in network…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab 7.1-3

    • 420 Words
    • 3 Pages

    1. It’s impractical for an organization to own the entirety of a WAN because it would be to maintain the entirety, it’s to maintain the entirety of a LAN because it’s easier to maintain and…

    • 420 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Lab 1

    • 918 Words
    • 4 Pages

    * The greater the distance between receptors and stimulus the lesser sensitive are the stimulus. The smaller area, the more sensitive.…

    • 918 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 NT1310 Lab 1

    • 712 Words
    • 3 Pages

    Ease of installation: Wireless networks have become commonplace with Wireless N being the current standard. While it is easy to purchase a wireless router, connect it to the Internet, and install in either a home or office setting, it is best to have a network professional install and configure the wireless router in your practice. You want to ensure that you have high security enabled and that there is sufficient wireless coverage throughout all areas within the practice.…

    • 712 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lan Topologies

    • 261 Words
    • 2 Pages

    We would have to buy five wireless nic-cards to start to accommodate the cabling issue in the warehouse as well as a wireless access point and a wireless router.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wireless networks have become very popular in many households this is in part because it makes things convenient for the user. They physically do not have to sit in front of a computer to get access to it. I have a wireless network in my home and it is at times very useful. I have the freedom to move around and access the internet from anywhere in my home. I do not have to sit in front of my computer and use the computer which would be wired. With that one advantage will also come a disadvantage one that comes to mind is video streaming which would be a little stronger coming from a wired network. New security has been configured also and would make it hard to access as it would have to be in a certain operating distance. In doing my research I came across a variety of hotspots. These hotspots are businesses that will offer wireless internet access to its customers. Some of these businesses will offer this access free while you are in their establishment others will offer a paid service fee for the privilege to access the internet. In my research I found that one establishment The FedEx Office requires a fee of $29.99 a month to use it wireless networks. Two others that I researched the local train station and a Dunkin Donuts offers its customers free wireless access. All three also provide a user agreement and in that agreement it states that the establishment is not responsible for the user content and is not liable for what downloads that the user will…

    • 281 Words
    • 2 Pages
    Satisfactory Essays