CHTP REVIEW: General Technology

Size: px
Start display at page:

Download "CHTP REVIEW: General Technology"

Transcription

1 CHTP REVIEW: General Technology Cihan G-Han Cobanoglu, Ph.D., CHTP University of South Florida Sarasota-Manatee April 7, 2011

2 About Presenter Professor at University of South Florida Sarasota-Manatee (a.k.a Paraside) Chair of AH&LA Technology Committee Active with HFTP for 15 years (e.g.chtp Committee) Editor of Journal of Hospitality & Tourism Technology Author of 5 textbooks articles

3 Welcome to CHTP Exam! /CHTP.aspx

4 What To Expect Multiple Choice and True/False 4 Sections 250 Choose most correct answer 75% Passing grade in each section

5 Review Topics General Technology: Network Administration Emerging Technologies Telecom System Architecture Targeted Technology: Facilities Club Applications Resort / Spa Marketing / Web Applications Hotel Technology: Accounting / Payroll / HR Food and Beverage Lodging Applications Managing Technology: Time and Attendance Systems General Management System Strategies System Analysis and Selection

6 General Technology Section One

7 Poll Question I plan to take CHTP exam: a) I do not plan to take it b) Within 3 months c) Within 6 months d) Within 1 year or more

8 Poll Question What is your MAIN functional area: a) Accounting/Finance b) Information Technology (IT) c) Accounting & IT d) Operations e) Other

9 Network Operating Systems A combination of programs, gives some computers and peripherals the capability to accept requests for service across the network, and provide computers the capability to correctly use network devices.

10 Poll Question Which of the following is NOT an example of network operating systems? a) Windows XP Home Edition b) Windows 7 Server c) Novell d) Linux

11 Network Operating Systems NT Server 2003 Novell Linux UNIX (HP-UX= HP/s Unix AIX=Unix in France)

12 The Operating /System Kernel File Management Memory Management Peripheral Control Network Communication

13 Network Design Connectivity Provides communications across a defined network Advantages Data Sharing Application Sharing Device Sharing Communications (packets) Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN)

14 Network Architecture Definition: The technique used by a NIC/LAN adapter to control access to a cable and cable connectors. HFTP

15 Network Architecture Two Types: Peer to Peer: client-based Client Server: server based Have a higher startup cost than peer to peer networks; provide good control, backup, and management of critical data; offers security, data management, fast response and room for expansion, but DOES NOT need all the software installed on the server. HFTP

16 LAN Definition: A configuration of workstations that enables users in the same office to share data, programs, and output devices (such as printers). Cable Connections: Fiber, Twisted Pair, Coax, and Twinax Twinax is not the recommended line for moving large data or video files. Connection type and speed: 10Mbps, 100Mbps, 1000Mbps (Gigabyte)

17 Poll Question Which of the following cables is the fastest in terms of transmission speed of data? a) Fiber Optic b) Twisted pair c) Coaxial d) None of the above

18 Twisted Pair (a) Category 3 UTP. (b) Category 5 UTP. 18

19 Twisted Pair 19

20 Twisted Pair 20

21 Coaxial Cable A coaxial cable. 21

22 HFTP Coaxial Cable 22

23 Coaxial Cable 23

24 Fiber Optic 24

25 HFTP Fiber Optic 25

26 WAN Definition: Multiple connection of computer networks, from building to building, city to city, state to state, and country to country utilizing DSU/CSU router. CSU/DSU: Channel Services Unit/ Data Services Unit. Is used to connect computers, video equipment, and multiplexors to digital phone lines.

27 WAN Connections type and speed: ISDN (128Kbs)- Integrated Services Digital Network offers the lowest overall circuit cost type of service for connection of remote network sites to a central location. T1* (1.5Mbps) and T3* (up to 45Mbps) The standard speed is NOT 100Mbps. NOT Associated Technologies NIC s, Repeaters, Hubs & Apple Talk * These are U.S. centric terms

28 (1) HR, Payroll, ERP-G/L, Inventory Mgmt Systems HFTP (3) (5) Corporate or Franchisee Level Mgmt & User Workstations (4) Firewall (2) Web, , and DNS servers (3) (5) (7) Da Internet Site Server Mgmt Workstation Firewall Store Level (1) (6) Kitchen Printers (2) Electronic Payment Controller (4) Point-of-Sale Home User Level (1) Home Computer (2) VPN Router, Cable/DSL Modem 28

29 (1) HR, Payroll, ERP-G/L, Inventory Mgmt Systems HFTP Corporate or Franchisee Level (3) Mgmt & User Workstations (5) (4) Connection Firewall Type (2) Web, , and DNS servers (3) (5) (7) Da Internet Site Server Mgmt Workstation Firewall Store Level (1) (6) Kitchen Printers (2) Electronic Payment Controller (4) Point-of-Sale Home User Level (1) Home Computer (2) VPN Router, Cable/DSL Modem 29

30 Connection type and speed Telephone Cables 56Kbps ISDN 128Kbs (Latency is lower) T1 1.5Mbps T3 up to 45Mbps Cable 3.5Mbps DSL 1.5Mbps Fiber Optic 45Mbps- 2.5Gbps 30

31 Network Security Network Login and Passwords Promptly change your password on initial login for proper security procedures for user-level passwords Single Sign-on Components of a single sign-on system include authentication and a directory service.

32 Network Security PGP - Pretty Good Privacy Software that implements public key cryptology that requires a key pair of both a public key and a private key SSL Secure Socket Layer Is built upon Public key encryption, Digital Signature, and Digital Certificates, but NOT Single Key system using substitution encryption. To defeat SSL and PGP you would utilize Cryptanalysis, Reverse engineer of the implementation, and Pass phrase attack, but NOT insider security information.

33 Encryption Character

34 Dear Cihan, Fgct Ekjcp, Fgct Ekjcp, Dear Cihan, Source CODE: Character + 2 Destination 34

35 Network Security SNMP Simple Network Management Protocol an application layer protocol that facilitates the exchange of management information between network devices. Network File Access controls security rights for users files Biometric Technology Is capable of enhancing physical security such as guest and employee entry.

36 Firewalls Software and hardware that filters and secures your private network, allowing only authorized access and transmissions of your internal data.

37 Computer Viruses Malicious computer programs: Virus Unauthorized set of programmed code that attaches itself to other programs. Worm Independent programs that may replicate itself throughout the network. Trojan Horse Masquerades as a legitimate program but has malicious software inside Are computer bugs a virus??

38 Poll HFTP

39 TCP/IP TCP/IP Transmission Control Protocol/Internet Protocol Is NOT a telecommunication communications protocol. TCP Packets: Are numbered so they can be reassembled in the correct sequence at the destination. Are transmitted over the network as capacity becomes available. Forwarded across the network separately and do not necessarily follow the same route. Do not contain destination addresses only. Header information includes Total length of the packet, destination IP address, Source IP address, and Error checking information. DOES NOT include sender s login information.

40 Packet Switching TCP/IP Checking for valid packets, destination address, best route, assembling packets in order, but NOT for data compression. Static verses Dynamic Addresses DHCP: Dynamic Host Configuration Protocol is used to assign dynamic IP addresses on an as-requested basis. 3 Classes of IP Addresses

41 Class A IP Address Classes ###. xxx.xxx. xxx (ex. 26.x.x.x) (1-126).(1-254).(1-254).(1-254) Class B HFTP ###.###.xxx.xxx (ex x.x) ( ).(1-254).(1-254).(1-254) Class C ###.###.###.xxx (ex x) ( ).(1-254).(1-254).(1-254) IP Classes

42 Parallel Transmission Multiple channels to transmit several bits of data at a time Timed pulses sent on other wires within the same cable to coordinate the flow of data Parallel ports, parallel cable, user configuration of controller Over short distances -LAN

43 Serial Transmission HFTP Single channel to transmit bit by bit Bits travel as a sequence over a single wire with start and stop bits to coordinate data flow Serial cable, serial ports, user configuration of controller Long distances - telephone transmission

44 Modems Converts on and off digital pulses of computer data into on-and-off analog tones that can be transmitted over a normal telephone circuit. Uses: Allow computers to communicate over distances , internet, bulletin boards Polling, file transfer, system support

45 Smart Cards XML Bluetooth VPN VoIP HSIA ASP HFTP Today s Technologies

46 Smart Cards Embedded micro chips that store personal information, allow credit and commerce transactions, access to room and other information.

47 Bluetooth GPRS x 3G GSM 47

48 XML extended Markup Language Language that is not constrained to a fixed format and allows trading partners to create their own data tags for information exchange, has become the standard for all markup language, provides data in a format that is easily exchanged & non-proprietary.

49 XML Example Guest Reservation <?xml version="1.0"?> <Reservation GuestName="Mr. Jim Smith"> <GuestAddress> <GuestStreet>123 Peachtree St.</GuestStreet> <GuestCity>Atlanta</GuestCity> <GuestState>GA</GuestState> <GuestZip>30030</GuestZip> <HomePhone>(404) </HomePhone> </GuestAddress> <Payment Method="Credit Card"> <CardType>Visa</CardType> <CardNumber> </CardNumber> <ExpDate> </ExpDate> </Payment> <ReservationId> </ReservationId> <Property>NoTel Motel</Property> <ReservationMade> T10:23:44</ReservationMade> <CheckinDate> </CheckinDate> <CheckoutDate> </CheckoutDate> <NumOfNights>3</NumOfNights> <BedType>King Size</BedType> <Smoking>Non Smoking</Smoking> <PillowType>Polyester Fill</PillowType> <SpecialRequest>Godiva Dark Chocolate</SpecialRequest> </Reservation> HFTP

50 Bluetooth Distance Limitations 30 feet (10 meters) New Technology Communications between any electrically powered device or appliance

51 VPN Virtual Private Network Allow for secure connections that tunnel through the Internet to connect 2 private LAN s or Computers, which reduces costs overall.

52 VoIP Voice over Internet Protocol Set of facilities used to manage the delivery of voice information over the Internet. VoIP involves sending voice information in digital form in discrete packets rather than by using the traditional circuitcommitted protocols of the public switched telephone network

53 HSIA High Speed Internet Access Acceptable methods for providing HSIA service to guest rooms: Wireless proximity Telephone network Electrical wiring system Cable system

54 DSL ISDN Frame-relay T-1 T-3: OC-3/DS-3 Bandwidth

55 ASP Application Service Provider Is the server model in which hardware is housed and maintained off-site, yet users can access the application and data via a web-based Internet connection.

56 Telephone Switches HFTP Trunking Trunk lines are defined as a telecommunications line between 2 switching systems. Incoming call routing Uses caller ID Automatic Number Identification (ANI) information to retrieve customer records from a database and send the records and call to a specific call center operator. DeMarc The point where responsibility for telecom services into a building transfers from the carrier to the end user organization.

57 Telephone Switches HFTP Voice over IP Place voice and fax calls over internet connections. Does not provide HSIA or In-room internet connectivity, hotel operators to receive free telephone services. Automated Call Distributor (ACD) Useful for Reservations, PBX and Room Service departments. ACDs would not be used to automatically generate Express Checkout reports. Automatic check out is not a function of a PBX system.

58 Guest Room Telephones Features that may be included Data port sets 2 line capability ADA hearing impaired feature handset Hands free speaker phone capability One button dialing and redialing

59 Database Management Software Allow users to catalog and store information for future use Collection of related facts and figures designed to serve a specific purpose Possible Uses: Preparing mailing lists for marketing and promotional activities. Help managers sort through personnel records to identify performance review dates for employees that correspond to the dates on which they were hired

60 Database Structures Files organized in ways that facilitate searching for data, updating data, and generating accurate, timely and useful reports for management.

61 Files, Records, and Fields Files THE Database i.e... Inventory, purchases, suppliers Records individual information contains key field Fields identified by type of info. Text, Calculated, Logical, Date, etc.

62 Database Structures HFTP Hierarchical Resembles that of the root of a tree Arranges Files, Records, and Fields Master Records and Subordinate Records Data inherit attributes, or rights, from it s parent Relational Tables are related to each other through key field Tabular Structure Data appears only once and not replicated multiple times Flat One Large Table (Flat File) Files are stand-alone collections of data.

63 Data Management Concepts Data Warehouse Collection of data from different sources Provides input for decision making The repository of all data Data is received and stored following specific validation rules Data Mart Separate database designed for specific group of users (e.g. marketing, group sales, etc.) Data is extracted from Data Warehouse to protect its integrity Data Mining Statistical and rule-based reasoning to find patterns in data (e.g. forecasting occupancy) Should be performed against the Data Mart

64 Other Terms File Server - Computer that controls the flow of information along a network and stores files created by application programs, has large storage hard drive with space to share, and provides the capability to simultaneously access the same file. Application server - Enables several users to offload specialized tasks onto a shared computer. Secondary storage devices - Refers to Hard drives, CD-RW, DVD-RW, Zip Disks, Removable storage devices, but NOT RAM. High Availability - Options include Multi-processors, disk arrays, redundant power supplies, but NOT Spare Memory Modules.

65 Thank you! Any questions/comments: Dr. Cihan Cobanoglu Phone: +1 (302)

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Networking Devices. Lesson 6

Networking Devices. Lesson 6 Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009 Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

NETWORKING TECHNOLOGIES

NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.

More information

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Understand Wide Area Networks (WANs)

Understand Wide Area Networks (WANs) Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Linksys Gateway SPA2100-SU Manual

Linksys Gateway SPA2100-SU Manual Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology.

Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology. Glossary Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology. Access Fees: Fee charged to user for usage of services. Application: A program written to perform

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,

More information

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability. WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Glossary of Telco Terms

Glossary of Telco Terms Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business

More information

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software

More information

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

COMPUTER NETWORK TECHNOLOGY (40)

COMPUTER NETWORK TECHNOLOGY (40) PAGE 1 OF 9 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2012 TOTAL POINTS (450) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

Chapter 9 Communications and Networks

Chapter 9 Communications and Networks Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

Fundamentals of Network Security - Theory and Practice-

Fundamentals of Network Security - Theory and Practice- Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

Network Technologies

Network Technologies Network Technologies Career Cluster Information Technology Course Code 10101 Prerequisite(s) Introduction To Information Technology Careers (Recommended), Computer Applications (Recommended), Computer

More information

CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS. Chapter 5: Network Design and Troubleshooting Scenarios

CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS. Chapter 5: Network Design and Troubleshooting Scenarios CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS Chapter 5: Network Design and Troubleshooting Scenarios Objectives Discuss several considerations that must be made when networking computers together, from

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,

More information

Universal Network Access Policy

Universal Network Access Policy Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety

More information

Using MIS 3e Chapter 6A Appendix

Using MIS 3e Chapter 6A Appendix Study Questions Using MIS 3e Chapter 6A Appendix How the Internet Works David Kroenke Q1: How does email travel? Q2: What is a communications protocol? Q3: What are the functions of the five TCP/IP-OSI

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

VoIP Survivor s s Guide

VoIP Survivor s s Guide VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the

More information

1 Getting Started. Before you can connect to a network

1 Getting Started. Before you can connect to a network 1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote

More information

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any

More information

Frequently Asked Questions about Integrated Access

Frequently Asked Questions about Integrated Access Frequently Asked Questions about Integrated Access Phone Service How are local, long distance, and international calls defined? Local access transport areas (LATAs) are geographical boundaries set by the

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

COURCE TITLE DURATION CompTIA A+ Certification 40 H. COURCE TITLE DURATION CompTIA A+ Certification 40 H. Overview: The target student is anyone with basic computer user skills who is interested in: obtaining a job as an IT professional or PC technician.

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Internet Public Network

Internet Public Network Internet Public Network Bandwidth Data rate measured in bits (not bytes) per seconds Kbps (Kilobits per seconds) 125 chars/sec Mbps (Megabits per seconds) 1,250 chars/sec Gbps (Gigabits per seconds) 12,500

More information

VoIP Revealed Connecting Viking products to Your Network or the Internet

VoIP Revealed Connecting Viking products to Your Network or the Internet VoIP Revealed Connecting Viking products to Your Network or the Internet Viking Model K-1705-3 NETWORK or INTERNET Digital Phone Manufacturer of a wide variety of VoIP compatible products: Access Control

More information

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01 CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective

More information

BCIS 4680 -- BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016

BCIS 4680 -- BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016 Office : BLB 290E, Business Leadership Building Office Hours: Tu &Th 9:00 am - 11:00 am, or by appointment/drop-in Telephone: 940-565-4660 Web Page: http://www.coba.unt.edu/bcis/faculty/capan/capan.htm

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

Local Area Networks: Software

Local Area Networks: Software School of Business Eastern Illinois University Local Area Networks: Software (Week 8, Thursday 3/1/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Identify main functions of operating systems Describe

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

Lesson 24 Network Fundamentals

Lesson 24 Network Fundamentals Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Fundamentals of Network Security Graphic Symbols

Fundamentals of Network Security Graphic Symbols Fundamentals of Network Security Graphic Symbols Overview Router Figure 1: IOS Router icon and photos A Router is an internetworking device which operates at OSI Layer 3. A Router interconnects network

More information

NETWORK ADMINISTRATOR

NETWORK ADMINISTRATOR JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under

More information

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

EUCIP - IT Administrator. Module 3 LAN and Network Services. Version 2.0

EUCIP - IT Administrator. Module 3 LAN and Network Services. Version 2.0 EUCIP - IT Administrator Module 3 LAN and Network Services Version 2.0 Module 3 Goals Module 3 Module 3, Local Area Network and Network Services, requires the candidate to be familiar with the procedure

More information

Chapter 2 TCP/IP Networking Basics

Chapter 2 TCP/IP Networking Basics Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange

More information

WAN Failover Scenarios Using Digi Wireless WAN Routers

WAN Failover Scenarios Using Digi Wireless WAN Routers WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

Telecommunications, the Internet, and Wireless Technology

Telecommunications, the Internet, and Wireless Technology Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Study Guide CompTIA A+ Certification, Domain 2 Networking

Study Guide CompTIA A+ Certification, Domain 2 Networking Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the

More information

VoIP / SIP Planning and Disclosure

VoIP / SIP Planning and Disclosure VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information