CHTP REVIEW: General Technology
|
|
- Randell Richardson
- 8 years ago
- Views:
Transcription
1 CHTP REVIEW: General Technology Cihan G-Han Cobanoglu, Ph.D., CHTP University of South Florida Sarasota-Manatee April 7, 2011
2 About Presenter Professor at University of South Florida Sarasota-Manatee (a.k.a Paraside) Chair of AH&LA Technology Committee Active with HFTP for 15 years (e.g.chtp Committee) Editor of Journal of Hospitality & Tourism Technology Author of 5 textbooks articles
3 Welcome to CHTP Exam! /CHTP.aspx
4 What To Expect Multiple Choice and True/False 4 Sections 250 Choose most correct answer 75% Passing grade in each section
5 Review Topics General Technology: Network Administration Emerging Technologies Telecom System Architecture Targeted Technology: Facilities Club Applications Resort / Spa Marketing / Web Applications Hotel Technology: Accounting / Payroll / HR Food and Beverage Lodging Applications Managing Technology: Time and Attendance Systems General Management System Strategies System Analysis and Selection
6 General Technology Section One
7 Poll Question I plan to take CHTP exam: a) I do not plan to take it b) Within 3 months c) Within 6 months d) Within 1 year or more
8 Poll Question What is your MAIN functional area: a) Accounting/Finance b) Information Technology (IT) c) Accounting & IT d) Operations e) Other
9 Network Operating Systems A combination of programs, gives some computers and peripherals the capability to accept requests for service across the network, and provide computers the capability to correctly use network devices.
10 Poll Question Which of the following is NOT an example of network operating systems? a) Windows XP Home Edition b) Windows 7 Server c) Novell d) Linux
11 Network Operating Systems NT Server 2003 Novell Linux UNIX (HP-UX= HP/s Unix AIX=Unix in France)
12 The Operating /System Kernel File Management Memory Management Peripheral Control Network Communication
13 Network Design Connectivity Provides communications across a defined network Advantages Data Sharing Application Sharing Device Sharing Communications (packets) Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN)
14 Network Architecture Definition: The technique used by a NIC/LAN adapter to control access to a cable and cable connectors. HFTP
15 Network Architecture Two Types: Peer to Peer: client-based Client Server: server based Have a higher startup cost than peer to peer networks; provide good control, backup, and management of critical data; offers security, data management, fast response and room for expansion, but DOES NOT need all the software installed on the server. HFTP
16 LAN Definition: A configuration of workstations that enables users in the same office to share data, programs, and output devices (such as printers). Cable Connections: Fiber, Twisted Pair, Coax, and Twinax Twinax is not the recommended line for moving large data or video files. Connection type and speed: 10Mbps, 100Mbps, 1000Mbps (Gigabyte)
17 Poll Question Which of the following cables is the fastest in terms of transmission speed of data? a) Fiber Optic b) Twisted pair c) Coaxial d) None of the above
18 Twisted Pair (a) Category 3 UTP. (b) Category 5 UTP. 18
19 Twisted Pair 19
20 Twisted Pair 20
21 Coaxial Cable A coaxial cable. 21
22 HFTP Coaxial Cable 22
23 Coaxial Cable 23
24 Fiber Optic 24
25 HFTP Fiber Optic 25
26 WAN Definition: Multiple connection of computer networks, from building to building, city to city, state to state, and country to country utilizing DSU/CSU router. CSU/DSU: Channel Services Unit/ Data Services Unit. Is used to connect computers, video equipment, and multiplexors to digital phone lines.
27 WAN Connections type and speed: ISDN (128Kbs)- Integrated Services Digital Network offers the lowest overall circuit cost type of service for connection of remote network sites to a central location. T1* (1.5Mbps) and T3* (up to 45Mbps) The standard speed is NOT 100Mbps. NOT Associated Technologies NIC s, Repeaters, Hubs & Apple Talk * These are U.S. centric terms
28 (1) HR, Payroll, ERP-G/L, Inventory Mgmt Systems HFTP (3) (5) Corporate or Franchisee Level Mgmt & User Workstations (4) Firewall (2) Web, , and DNS servers (3) (5) (7) Da Internet Site Server Mgmt Workstation Firewall Store Level (1) (6) Kitchen Printers (2) Electronic Payment Controller (4) Point-of-Sale Home User Level (1) Home Computer (2) VPN Router, Cable/DSL Modem 28
29 (1) HR, Payroll, ERP-G/L, Inventory Mgmt Systems HFTP Corporate or Franchisee Level (3) Mgmt & User Workstations (5) (4) Connection Firewall Type (2) Web, , and DNS servers (3) (5) (7) Da Internet Site Server Mgmt Workstation Firewall Store Level (1) (6) Kitchen Printers (2) Electronic Payment Controller (4) Point-of-Sale Home User Level (1) Home Computer (2) VPN Router, Cable/DSL Modem 29
30 Connection type and speed Telephone Cables 56Kbps ISDN 128Kbs (Latency is lower) T1 1.5Mbps T3 up to 45Mbps Cable 3.5Mbps DSL 1.5Mbps Fiber Optic 45Mbps- 2.5Gbps 30
31 Network Security Network Login and Passwords Promptly change your password on initial login for proper security procedures for user-level passwords Single Sign-on Components of a single sign-on system include authentication and a directory service.
32 Network Security PGP - Pretty Good Privacy Software that implements public key cryptology that requires a key pair of both a public key and a private key SSL Secure Socket Layer Is built upon Public key encryption, Digital Signature, and Digital Certificates, but NOT Single Key system using substitution encryption. To defeat SSL and PGP you would utilize Cryptanalysis, Reverse engineer of the implementation, and Pass phrase attack, but NOT insider security information.
33 Encryption Character
34 Dear Cihan, Fgct Ekjcp, Fgct Ekjcp, Dear Cihan, Source CODE: Character + 2 Destination 34
35 Network Security SNMP Simple Network Management Protocol an application layer protocol that facilitates the exchange of management information between network devices. Network File Access controls security rights for users files Biometric Technology Is capable of enhancing physical security such as guest and employee entry.
36 Firewalls Software and hardware that filters and secures your private network, allowing only authorized access and transmissions of your internal data.
37 Computer Viruses Malicious computer programs: Virus Unauthorized set of programmed code that attaches itself to other programs. Worm Independent programs that may replicate itself throughout the network. Trojan Horse Masquerades as a legitimate program but has malicious software inside Are computer bugs a virus??
38 Poll HFTP
39 TCP/IP TCP/IP Transmission Control Protocol/Internet Protocol Is NOT a telecommunication communications protocol. TCP Packets: Are numbered so they can be reassembled in the correct sequence at the destination. Are transmitted over the network as capacity becomes available. Forwarded across the network separately and do not necessarily follow the same route. Do not contain destination addresses only. Header information includes Total length of the packet, destination IP address, Source IP address, and Error checking information. DOES NOT include sender s login information.
40 Packet Switching TCP/IP Checking for valid packets, destination address, best route, assembling packets in order, but NOT for data compression. Static verses Dynamic Addresses DHCP: Dynamic Host Configuration Protocol is used to assign dynamic IP addresses on an as-requested basis. 3 Classes of IP Addresses
41 Class A IP Address Classes ###. xxx.xxx. xxx (ex. 26.x.x.x) (1-126).(1-254).(1-254).(1-254) Class B HFTP ###.###.xxx.xxx (ex x.x) ( ).(1-254).(1-254).(1-254) Class C ###.###.###.xxx (ex x) ( ).(1-254).(1-254).(1-254) IP Classes
42 Parallel Transmission Multiple channels to transmit several bits of data at a time Timed pulses sent on other wires within the same cable to coordinate the flow of data Parallel ports, parallel cable, user configuration of controller Over short distances -LAN
43 Serial Transmission HFTP Single channel to transmit bit by bit Bits travel as a sequence over a single wire with start and stop bits to coordinate data flow Serial cable, serial ports, user configuration of controller Long distances - telephone transmission
44 Modems Converts on and off digital pulses of computer data into on-and-off analog tones that can be transmitted over a normal telephone circuit. Uses: Allow computers to communicate over distances , internet, bulletin boards Polling, file transfer, system support
45 Smart Cards XML Bluetooth VPN VoIP HSIA ASP HFTP Today s Technologies
46 Smart Cards Embedded micro chips that store personal information, allow credit and commerce transactions, access to room and other information.
47 Bluetooth GPRS x 3G GSM 47
48 XML extended Markup Language Language that is not constrained to a fixed format and allows trading partners to create their own data tags for information exchange, has become the standard for all markup language, provides data in a format that is easily exchanged & non-proprietary.
49 XML Example Guest Reservation <?xml version="1.0"?> <Reservation GuestName="Mr. Jim Smith"> <GuestAddress> <GuestStreet>123 Peachtree St.</GuestStreet> <GuestCity>Atlanta</GuestCity> <GuestState>GA</GuestState> <GuestZip>30030</GuestZip> <HomePhone>(404) </HomePhone> </GuestAddress> <Payment Method="Credit Card"> <CardType>Visa</CardType> <CardNumber> </CardNumber> <ExpDate> </ExpDate> </Payment> <ReservationId> </ReservationId> <Property>NoTel Motel</Property> <ReservationMade> T10:23:44</ReservationMade> <CheckinDate> </CheckinDate> <CheckoutDate> </CheckoutDate> <NumOfNights>3</NumOfNights> <BedType>King Size</BedType> <Smoking>Non Smoking</Smoking> <PillowType>Polyester Fill</PillowType> <SpecialRequest>Godiva Dark Chocolate</SpecialRequest> </Reservation> HFTP
50 Bluetooth Distance Limitations 30 feet (10 meters) New Technology Communications between any electrically powered device or appliance
51 VPN Virtual Private Network Allow for secure connections that tunnel through the Internet to connect 2 private LAN s or Computers, which reduces costs overall.
52 VoIP Voice over Internet Protocol Set of facilities used to manage the delivery of voice information over the Internet. VoIP involves sending voice information in digital form in discrete packets rather than by using the traditional circuitcommitted protocols of the public switched telephone network
53 HSIA High Speed Internet Access Acceptable methods for providing HSIA service to guest rooms: Wireless proximity Telephone network Electrical wiring system Cable system
54 DSL ISDN Frame-relay T-1 T-3: OC-3/DS-3 Bandwidth
55 ASP Application Service Provider Is the server model in which hardware is housed and maintained off-site, yet users can access the application and data via a web-based Internet connection.
56 Telephone Switches HFTP Trunking Trunk lines are defined as a telecommunications line between 2 switching systems. Incoming call routing Uses caller ID Automatic Number Identification (ANI) information to retrieve customer records from a database and send the records and call to a specific call center operator. DeMarc The point where responsibility for telecom services into a building transfers from the carrier to the end user organization.
57 Telephone Switches HFTP Voice over IP Place voice and fax calls over internet connections. Does not provide HSIA or In-room internet connectivity, hotel operators to receive free telephone services. Automated Call Distributor (ACD) Useful for Reservations, PBX and Room Service departments. ACDs would not be used to automatically generate Express Checkout reports. Automatic check out is not a function of a PBX system.
58 Guest Room Telephones Features that may be included Data port sets 2 line capability ADA hearing impaired feature handset Hands free speaker phone capability One button dialing and redialing
59 Database Management Software Allow users to catalog and store information for future use Collection of related facts and figures designed to serve a specific purpose Possible Uses: Preparing mailing lists for marketing and promotional activities. Help managers sort through personnel records to identify performance review dates for employees that correspond to the dates on which they were hired
60 Database Structures Files organized in ways that facilitate searching for data, updating data, and generating accurate, timely and useful reports for management.
61 Files, Records, and Fields Files THE Database i.e... Inventory, purchases, suppliers Records individual information contains key field Fields identified by type of info. Text, Calculated, Logical, Date, etc.
62 Database Structures HFTP Hierarchical Resembles that of the root of a tree Arranges Files, Records, and Fields Master Records and Subordinate Records Data inherit attributes, or rights, from it s parent Relational Tables are related to each other through key field Tabular Structure Data appears only once and not replicated multiple times Flat One Large Table (Flat File) Files are stand-alone collections of data.
63 Data Management Concepts Data Warehouse Collection of data from different sources Provides input for decision making The repository of all data Data is received and stored following specific validation rules Data Mart Separate database designed for specific group of users (e.g. marketing, group sales, etc.) Data is extracted from Data Warehouse to protect its integrity Data Mining Statistical and rule-based reasoning to find patterns in data (e.g. forecasting occupancy) Should be performed against the Data Mart
64 Other Terms File Server - Computer that controls the flow of information along a network and stores files created by application programs, has large storage hard drive with space to share, and provides the capability to simultaneously access the same file. Application server - Enables several users to offload specialized tasks onto a shared computer. Secondary storage devices - Refers to Hard drives, CD-RW, DVD-RW, Zip Disks, Removable storage devices, but NOT RAM. High Availability - Options include Multi-processors, disk arrays, redundant power supplies, but NOT Spare Memory Modules.
65 Thank you! Any questions/comments: Dr. Cihan Cobanoglu Phone: +1 (302)
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationNetworking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
More informationMANAGEMENT INFORMATION SYSTEMS 8/E
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationTechnical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
More informationTelecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationRAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
More informationCompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
More informationNETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
More informationFuture Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help
Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.
More informationFBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts
Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationUnderstand Wide Area Networks (WANs)
Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks
More informationCore Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
More informationNetwork System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationWireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationLinksys Gateway SPA2100-SU Manual
Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your
More informationOCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL
More informationCOMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
More informationLocal Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral
More informationAcceptable Use Policy (AUP): Policy which provides rules governing use of district technology.
Glossary Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology. Access Fees: Fee charged to user for usage of services. Application: A program written to perform
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationIT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
More informationADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
More informationWANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.
WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More informationChapter 1 Instructor Version
Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More informationNetwork Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationGlossary of Telco Terms
Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business
More information4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19
4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software
More informationCHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two
More informationChapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
More informationCOMPUTER NETWORK TECHNOLOGY (40)
PAGE 1 OF 9 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2012 TOTAL POINTS (450) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationChapter 9 Communications and Networks
Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More informationFundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
More informationNetworking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationNetwork: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
More informationNetwork Technologies
Network Technologies Career Cluster Information Technology Course Code 10101 Prerequisite(s) Introduction To Information Technology Careers (Recommended), Computer Applications (Recommended), Computer
More informationCMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS. Chapter 5: Network Design and Troubleshooting Scenarios
CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS Chapter 5: Network Design and Troubleshooting Scenarios Objectives Discuss several considerations that must be made when networking computers together, from
More informationWAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com
WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
More informationNEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,
More informationUniversal Network Access Policy
Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety
More informationUsing MIS 3e Chapter 6A Appendix
Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
More informationVoIP Survivor s s Guide
VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the
More information1 Getting Started. Before you can connect to a network
1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote
More informationChapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system
Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any
More informationFrequently Asked Questions about Integrated Access
Frequently Asked Questions about Integrated Access Phone Service How are local, long distance, and international calls defined? Local access transport areas (LATAs) are geographical boundaries set by the
More informationDiscovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationCOURCE TITLE DURATION CompTIA A+ Certification 40 H.
COURCE TITLE DURATION CompTIA A+ Certification 40 H. Overview: The target student is anyone with basic computer user skills who is interested in: obtaining a job as an IT professional or PC technician.
More informationComputer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
More informationWAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationFirewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationInternet Public Network
Internet Public Network Bandwidth Data rate measured in bits (not bytes) per seconds Kbps (Kilobits per seconds) 125 chars/sec Mbps (Megabits per seconds) 1,250 chars/sec Gbps (Gigabits per seconds) 12,500
More informationVoIP Revealed Connecting Viking products to Your Network or the Internet
VoIP Revealed Connecting Viking products to Your Network or the Internet Viking Model K-1705-3 NETWORK or INTERNET Digital Phone Manufacturer of a wide variety of VoIP compatible products: Access Control
More informationCUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
More informationBCIS 4680 -- BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016
Office : BLB 290E, Business Leadership Building Office Hours: Tu &Th 9:00 am - 11:00 am, or by appointment/drop-in Telephone: 940-565-4660 Web Page: http://www.coba.unt.edu/bcis/faculty/capan/capan.htm
More informationCourse Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
More informationLocal Area Networks: Software
School of Business Eastern Illinois University Local Area Networks: Software (Week 8, Thursday 3/1/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Identify main functions of operating systems Describe
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More information7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
More informationChapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
More informationTechnical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
More informationNetworking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informationLesson 24 Network Fundamentals
Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationFundamentals of Network Security Graphic Symbols
Fundamentals of Network Security Graphic Symbols Overview Router Figure 1: IOS Router icon and photos A Router is an internetworking device which operates at OSI Layer 3. A Router interconnects network
More informationNETWORK ADMINISTRATOR
JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under
More informationITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationEUCIP - IT Administrator. Module 3 LAN and Network Services. Version 2.0
EUCIP - IT Administrator Module 3 LAN and Network Services Version 2.0 Module 3 Goals Module 3 Module 3, Local Area Network and Network Services, requires the candidate to be familiar with the procedure
More informationChapter 2 TCP/IP Networking Basics
Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)
More informationDL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationThink! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information
Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange
More informationWAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
More informationSmall Business Server Part 2
Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
More informationTelecommunications, the Internet, and Wireless Technology
Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks
More informationMulti-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
More informationStudy Guide CompTIA A+ Certification, Domain 2 Networking
Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the
More informationVoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
More informationCSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
More information