1 Information Technology Level 2 Class X Students Handbook CENTRAL BOARD OF SECONDARY EDUCATION Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi India
3 Information Technology Students Handbook CLASS X Level 2 CENTRAL BOARD OF SECONDARY EDUCATION Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi India
4 Information Technology Level - 2 Students Handbook - Class X PRICE: ` First Edition 2013, CBSE, India Copies: "This book or part thereof may not be reproduced by any person or agency in any manner." Published By : The Secretary, Central Board of Secondary Education, Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi Design, Layout : Multi Graphics, 8A/101, WEA Karol Bagh, New Delhi Phone: Printed By :
6 THE CONSTITUTION OF INDIA PREAMBLE 1 WE, THE PEOPLE OF INDIA, having solemnly resolved to constitute India into a [SOVEREIGN SOCIALIST SECULAR DEMOCRATIC REPUBLIC] and to secure to all its citizens : JUSTICE, social, economic and political; LIBERTY of thought, expression, belief, faith and worship; EQUALITY of status and of opportunity; and to promote among them all 2 FRATERNITY assuring the dignity of the individual and the [unity and integrity of the Nation]; IN OUR CONSTITUENT ASSEMBLY this twenty-sixth day of November, 1949, do HEREBY ADOPT, ENACT AND GIVE TO OURSELVES THIS CONSTITUTION. 1. Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "Sovereign Democratic Republic (w.e.f ) 2. Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "unity of the Nation (w.e.f ) ARTICLE 51A THE CONSTITUTION OF INDIA Chapter IV A FUNDAMENTAL DUTIES Fundamental Duties - It shall be the duty of every citizen of India- (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) to abide by the Constitution and respect its ideals and institutions, the National Flag and the National Anthem; to cherish and follow the noble ideals which inspired our national struggle for freedom; to uphold and protect the sovereignty, unity and integrity of India; to defend the country and render national service when called upon to do so; to promote harmony and the spirit of common brotherhood amongst all the people of India transcending religious, linguistic and regional or sectional diversities; to renounce practices derogatory to the dignity of women; to value and preserve the rich heritage of our composite culture; to protect and improve the natural environment including forests, lakes, rivers, wild life and to have compassion for living creatures; to develop the scientific temper, humanism and the spirit of inquiry and reform; to safeguard public property and to abjure violence; to strive towards excellence in all spheres of individual and collective activity so that the nation constantly rises to higher levels of endeavour and achievement; 1 (k) who is a parent or guardian to provide opportunities for education to his/her child or, as the case may be, ward between age of six and forteen years. 1. Ins. by the constitution (Eighty - Sixth Amendment) Act, 2002 S.4 (w.e.f )
7 Preface The national curriculum Framework, 2005, recommends that children s life at school must be linked to their life outside the school. This principle make a departure from the legacy of bookish learning which continues to shape our systems and caused a gap between the school home, community and the workplace. The student workbook on information Technology (IT) is a part of qualification package developed for the implementation of National Vocational Education Qualification Framework (NVEQF), an initiative of Ministry of Human Resource Development (MHRD), Government of India to set common principles and guidelines for a nationally recognised qualification system covering the school s vocational education and training institutions, technical education institutions, college and universities. It is envisaged that the NVEQF will promote transparency of qualifications, cross-sect oral learning, student qualifications, thus encouraging life-long learning. This student workbook, which forms a part of vocational qualification package for student s who have passed class IX or equivalent examination, was created by group of experts. The IT-ITes skill development council approved by the national occupation standards (NOS). The national occupation standards are a set of competency standards and guidelines endorsed by the representatives of IT industry for recognized and assessing skills and assessing skills and knowledge needed to perform effectively in the workplace. The CBSE has developed materials (units) for the vocational qualification package in IT/ITes sector for NVEQF levels 1 to 4; level 2 is equivalent to class X. Based on Nos occupation related core competencies (Knowledge, skills and abilities) were identified for development of curriculum and learning modules (units). This student workbook attempts to discourage rote learning and to bring about necessary flexibility in offering of courses necessary for breaking the sharp boundaries between different subjects areas. The workbook attempts to enhance this endeavour by giving higher priority and space to opportunities for contemplation and wondering, discussion in small groups and activities requiring hands on experience. Any suggestions, feedback from the readers for improvement in the future editions of the volume shall be heartily welcomed. Vineet Joshi Chairman, CBSE
9 Contents Preface Acknowledgement Networking Fundamentals 1 Digital Documentation - Advanced Word Processing 23 Digital Data Analysis - Advanced Operations on Spreadsheet 40 Advanced Digital Presentation 62 Digital Content Creation - Web Designing Fundamentals (HTML) Computer Systems Care
10 Unit Code ITCC-201 Unit Title Networking Fundamentals Evolution of Networking and Need for Networking Transmission of Data through different Switching Techniques Data Communication Terminologies Transmission Medium and Network Devices Network Types and Layouts ITDC-202 ITDC-203 ITDC-204 Digital Documentation - Advanced Word Processing Reviewing and editing documents with Track Changes Connecting Data from Spreadsheet with the Document using Mail Merge Feature Object Embedding and Linking Language Correction Securing Document Digital Data Analysis - Advanced Operations on Spreadsheet Managing Multiple Spreadsheets and Workbooks Organising and handling Spreadsheet Data Creating Charts Creating and Using Macros Securing Spreadsheets Advanced Digital Presentation Standardization of Slides Multimedia Components in Presentation Using Tables Using Charts Presentation Delivery Securing Presentation
11 ITDC-205 ITOC-206 Digital Content Creation - Web Designing Fundamentals (HTML) Basics of Webpage and HTML HTML - Basic Tags Paragraphs and Tables Web Page Layout Forms Multimedia Content in WebPages Computer Systems Care Hardware Safety and Security Software Safety, Security and Care
12 Unit - 1 Networking Fundamentals 1.1 Evolution of Networking and Need for Networking As you know, networking is widely used for accessing and sharing information; examples include web browsing, downloading & uploading, file sharing, printer sharing, etc. Today networking is popular with private and business users across the globe. In today's world, it can be extremely difficult to live without networks, since resource sharing (printers, shared folders etc) and Internet connectivity have become an integral part of our daily activities. A computer network, often simply referred to as a network, is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information. Networking is widely used for sharing of resources and information & for communication purposes. Networks can also help in reducing costs; for example you can buy a single printer and share it across multiple users. Network consists of one or more computers or devices connected in order to provide and access resources. Resources include a range of devices (example, Printer, CDROM, Hard Drives, etc.) and services (example, web service, mail service, etc.). Networks based on size are classified into LAN & WAN. LAN: Local Area Network refers to group of computers networked within a limited geographical area such as schools, colleges, offices, etc. WAN: Wide Area Network refers to computers networked across geographical areas, in other words they connect LAN's between different locations. For example, computers or devices in a branch office could connect to the computer networks at the head office through telephone lines or satellites. This session introduces you to the basic fundamental concepts of networking and Internet and using different types of Internet connection. 1
13 Ways to form a computer Network There are several ways to form a network as listed below: Use a cross-over cable (also referred to as Peer-to-peer cable) Use Serial and Parallel ports Use Bluetooth Use Wi-Fi (for more than two computers) Use Hub or Network Switch (for more than two computers) SOHO Router or Wi-Fi Router (Commonly found in home & small business networks) Networks are designed using the following architecture: Peer-to-peer (P2P) Networks in which all computers have an equal status are called peer to peer networks. Generally in such a network each terminal has an equally competent CPU. Peer-to-Peer Network Client- Server Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called client server networks. The computer(s) which provide services are called servers and the ones that use these services are called clients. Client-Server Network Note: Clients are referred to as "Service Requestors" and Servers as "Service Providers". Any machine that request a service is called as the client and machines that fulfill the requests is called the client. 2
14 Networks can have a combination of both Client/Server models and Peer-to-Peer. For example, you may be using a centralized mail server and/or access files from other machines in the network. Internet The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks. Internet is one of the most useful technologies of modern times which help us in our daily, personal and professional life. Internet is widely used by students, educational institutes; scientist and professionals to gather information for research and general information. Businesses use the Internet to access complex databases such as financial database. The Internet is the largest encyclopedia for all age groups. The Internet helps in maintaining contact with friends and relatives who live across different locations via Internet chatting systems and software. Internet is also becoming a major source of entertainment for the general public. Intranet Intranet refers to private computer network used by organizations for sharing resources; Intranets can be simple within a building or very large spread across the globe connected through various networking technologies. Intranets help employees of an organization to locate information much faster resulting in increased productivity. Though popularly referred to a company's internal website or portal, Intranet usually employs other protocols such as POP3, SMTP, FTP, etc. and may even offer a variety of services (you will read more about these in later sessions). Extranet Extranet is a computer network used outside the Intranet. For example, an organization may allow a vendor to view or access their resources such as their internal website for updating a product catalog or training material. However, this is highly restricted to Internet users (public). Extranets are usually accessed using VPNs (you will read more about this protocol later). World Wide Web World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a 3
15 system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks. Information is stored on web servers referred to as web pages are retrieved by using a web browser such as Firefox on the local computer. A Web Browser is software used to view websites and acts as an interface between the user and the World Wide Web. A Web server is a computer that stores web sites and their related files for viewing on the Internet. Some of the advantages associated with networking are: 4 Data Sharing: One of the most important uses of networking is to allow the sharing of data. Users can send text files, spread sheets, documents, presentations, audio files, video files, etc. to other users. Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For example, instead of purchasing 10 printers for each user, one printer can be purchased and shared among multiple users thus saving cost. Internet Access Sharing: You can purchase a single Internet connection and share it among other computers in a network instead of purchasing multiple Internet connection for each computer. This is very commonly found in Internet café (browsing centres), schools, colleges, companies, etc. Usage of network based applications such as web browsers, clients, chat application, audio & video calling, etc is another advantage. Data Transmission methods Data can be transferred over a network using the following techniques: Circuit Switching: In this method, a dedicated path is established between the endpoints before the data is transferred. Once a dedicated path is established, no other devices can use the circuit. Example: Dial-Up, ISDN. Packet Switching: In this method, data is divided into blocks referred to as packets. Multiple packets can be sent via different paths allowing more than two devices to communicate at the same time. Modes of operation can be connectionless or connection-oriented.
16 In connectionless mode, packets have source & destination address for routing that may take different paths. Example: Ethernet, IP, UDP. In connection-oriented mode, connection is defined (a virtual circuit is created) before a packet is transferred. Packet switching supports variable packet sizes. Example: X.25, Frame Relay, TCP. Cell Switching: Cell switching method is similar to that of packet switching but has a fixed size for the cells transmitting data. Cell switching is efficient when large amounts of data need to transferred. Example: ATM. Data transfer on the Internet Having talked of data transfer and the Internet, have you ever wondered how sitting in one corner of the world, you get information from another distant area in a few seconds? In very simple language, let's see what happens to a piece of data, say a Web page, when it is transferred over the Internet: The data is broken up into bits of same sized pieces called packets. A header is added to each packet explaining where the data has come from, where it should end up and where it fits in with the rest of the packets. Each packet is sent from computer to computer until it finds its destination. Each computer on the way decides where next to send the packet. All packets may not take the same route. At the destination, the packets are examined. If any packets are missing or damaged, a message is sent asking for them to be re-sent. This continues until all packets have been received intact. The packets are now reassembled into their original form. All this done in seconds! To access the Internet, you need an active internet connection. You need to gather and understand your requirement carefully before subscribing to an internet connection plan. In this exercise, you will learn how to choose an Internet connection. Some of the common questions that help you in your decision are: What is the purpose of getting this connection? Will you use the connection regularly? 5
17 How much data will be downloaded on an average per month? How much speed do you need? What technology is available in your particular area? What are the different plans available from the ISP? Is there any limitation or catch for the selected plan? To access Wi-Fi, you need an access point with an active Internet connection. Usually when you subscribe to an Internet connection, the ISP provides options to purchase or rent a Wi-Fi router that can act as both an internet connectivity device and an access point for Wi-Fi connectivity. Setting up a Wi-Fi network requires technical expertise; however, you can access the Wi-Fi network by connecting to an access point that is already setup for use. On computers that run Windows XP, you can view the list of wireless networks available by using the following procedure: Right-Click on the Wireless Icon in the system tray and Click View Available Wireless Networks. Windows XP will display the list of available Wi-Fi networks; you can choose any of the connection from the list. Select by Double-clicking on the name displayed in the list. 6 Note: You may be prompted to enter a password if the selected network is secure. You will receive a confirmation that you are connected to a wireless network. Now the system is ready to be used for network related applications such as Firefox, Chrome, Skype, etc.
18 Terminolgies and Technologies Signaling Methods In a network, communication happens between devices or computers through electrical, optical or radio-wave signals. Methods of signaling are widely categorized into baseband and broadband. Baseband: Data is sent as digital signals by using entire bandwidth of the media (Single Channel), supporting single communication at a time. Signals are sent over co-axial, twisted pair or fiber optic cables. Baseband supports higher transfer rates as compared to broadband; however, baseband is limited with distance. Baseband uses TDM (Time Division Multiplexing) to send multiple signals over a single cable. Example: Ethernet, Token Ring & FDDI. Broadband: Data is send as analog signals by using portion of a bandwidth. Broadband supports use of multiple signals at different frequencies (multiple channels). Signals are split into channels by using FDM (Frequency Division Multiplexing). Example: xdsl, where telephone lines are used for both voice (telephone) calls and data (Internet connectivity). Single Channel C1 C2 C Frequency Frequency Baseband vs. Broadband Channel Operation Channel operation refers to the mode of communication between connected devices or computers. Channel operation can be simplex, half-duplex or fullduplex. Simplex is a one way communication, similar to that of a radio. Halfduplex is a two way communication but only one way at a time, similar to that of a walkie-talkie. Fullduplex is two way simultaneous communication (data can be received and sent at the same time), similar to that of a telephone. Multiple Signaling Methods When multiple devices or computers are connected in a network, they use multiple signals that are combined at the source and separated at the destination by use of a 7
19 technique called multiplexing. For multiplexing, a device called the multiplexer is used for multiplexing / demultiplexing signals. Types of multiplexing include: TDM (Time Division Multiplexing) is a method in which multiple signals are combined and send over a single transmission media such as wires or radio waves. This is achieved by use of time sharing; multiple signals are transmitted for a defined amount of time in cycles. For example, a device sends and receives signals every alternate second. FDM (Frequency Division Multiplexing) is a method in which multiple signals are transmitted at different frequencies. Multiple signals can be sent at the same time over a single channel using this technique. For example, a device sends multiple signals at the same time using different frequencies similar to that of a radio (FM) or cable TV and the end device receives by tuning in to a particular channel. Getting access to the Internet To use the Internet, you need an Internet connection. Internet connections are provided by Internet Service Providers such as Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo, etc. Internet Service Provider An Internet service provider (ISP) is an organization which provides you with access to the Internet via a dial-up (using modem) or direct (hard wired) or wireless connection. Choosing connectivity depends on the availability of a particular technology, speed and connection type in your area. Usually small and medium business users, home users use connectivity types such as DSL, cable modem, dial-up, broadband wireless, WiMAX or 3G. Medium to large business users or customers with more demanding requirements may use high speed connectivity such as DSL (High Speed), ISDN, etc. Modem 8 Á modem is a device that converts digital computer signals into a form (analog signals) that can travel over phone lines. It also re-converts the analog signals back into digital signals. The word modem is derived from its function MOdulator/ DEModulator.
20 Channel Access Methods Channel access methods refer to how devices communicate using a shared medium such as bus networks, star networks, ring networks, hub networks & wireless networks. When multiple devices or computers are used in a shared medium, a predefined method of transmission needs to be defined. Channel access methods in circuit switching networks include FDM, TDM, etc and in packet switching networks include CSMA/CD, CSMA/CA, Token passing, etc. Ethernet Ethernet is a family of computer networking technologies for local area networks (LANs) and has largely replaced competing wired LAN technologies. Ethernet standard defines how communication happens between network interface cards, hub, switches, repeaters, etc. Devices on Ethernet networks use frames or Ethernet frames for communication. IEEE standard defines the Media Access Control (MAC) portion of the data link layer and the physical layer of the OSI model. Ethernet protocols are covered by this standard. CSMA/CD CSMA/CD (Carrier Sense Multiple Access/Collision Detect) as per IEEE standard is a mechanism that defines how transmission takes place in a network. Only one device in the collision domain may transmit at any one time, and the other devices in the domain listen to the network before sending any packets in order to avoid data collisions. Collisions also decrease network efficiency on a collision domain. If two devices transmit simultaneously, a collision occurs, and both devices device will wait for a random amount of time before attempting to transmit again. Collision domains are found in a hub environment where each host segment connects to a hub that represents only one collision domain and only one broadcast domain. Modern wired networks use a network switch to eliminate collisions. By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links. Collision domains are also found in wireless networks such as Wi-Fi.; CSMA/CA is used in wireless networks. CSMA/CA Carrier sense multiple access with collision avoidance (CSMA/CA) is a network multiple access method in which nodes attempt to avoid collisions by transmitting 9
21 only when the channel is sensed to be "idle". It is particularly important for wireless networks, where the collision detection of the alternative CSMA/CD is unreliable due to the hidden node problem. Token Passing Token passing is a channel access method where a signal called a token is passed between nodes that authorize the node to communicate. The most well-known examples are token ring and ARCNET. Addressing methods When multiple computers or devices are connected in a network, signals can be addressed as unicast, multicasts or broadcasts. Unicast refers to one-to-one communication, for example signal is sent from one computer to another. Multicast refers to one-to-may communication, for example signal from one computer or device is sent to selective set of computers or devices. Broadcast refers to one-to-all communication, for example single from one computer or device is sent to all devices and computers in a network. Types of Common Internet Connectivity There are different types of Internet Connectivity available today; it can be widely categorized into wired and wireless access. Following table is a summary of different types of Internet connectivity categorized into wired and wireless: Technology Type of Connectivity Dial-Up Wired DSL Wired Cable Internet Access Wired 3G Wireless WiMAX Wireless Wi-Fi Wireless Some of the commonly used Internet connectivity are: 10 Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) via telephone lines using a device called MODEM. Users dial a particular number provided by the ISP and gain access to the Internet.
22 Dial-up connections are extremely slow and in most cases, it is replaced by a high speed connection such as DSL or Cable Modem. DSL: Digital subscriber line(dsl) provide Internet access by transmitting digital data over wires of a local telephone network. DSL service is delivered along with wired telephone service on the same telephone line. On the customer premises, a DSL filter removes the high frequency interference, enabling simultaneous use of the telephone and data transmission. For using a DSL connection, you need a DSL modem and a subscription. Cable Internet Access: Cable Internet Access is a form of broadband Internet access that uses the cable television infrastructure. Cable Internet Access is provided through existing cable TV networks; this is similar to DSL that is provided over existing telephone lines. 3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G mobile telephony communications protocol that allows higher data transfer speeds and capacity. If support for 3G is available on your mobile phone, you can subscribe to the 3G connectivity with your ISP in order to get high speed Internet connection on your phone. WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide mobile broadband connectivity across cities and countries through a variety of devices. WiMAX is a long range system, covering many kilometres and is typically used where DSL or Cable Internet Access cannot be used; this could be difficulty in laying out cables for home or offices located in remote locations but need access to the Internet. WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections. Wi-Fi devices such as personal computer, smartphones, video game console, etc. can connect to a network resource such as Internet through a device called the Wireless Access Point (WAP). Wi-Fi is used here cables cannot be run (such as old buildings, outdoor areas) to provide network and Internet access. Wi-Fi can also be used where users require mobile connectivity. Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi- Fi access to the Internet for their customers. 11
23 Types of Cables for Internet Twisted-pair Ethernet cables can be wired "straight-through" or "Crossover". To connect a network interface card to a switch, hub or router, straight-through or patch cables are used. To connect similar devices (network interface card on computer to another network interface on another computer, hub to hub or switch to switch), crossover cables are used. Fiber Optic: A fiber optic cable is a cable containing one or more optical fibers. Fiber- Optic cables are ideal for transmitting data over very long distances at great speeds as light is used for the medium for transmission. Fiber optic cables are not susceptible to any EMI, Near-end Crosstalk (NEXT), or Far-end Crosstalk (FEXT). Note that you require special network interface cards & network switch that support the fiber optic interface which is usually expensive and common only in large enterprise networks or locations that are susceptible to EMI such as factories that use heavy machineries. Fiber-Optic cables consist of a high quality glass or plastic strands and a plastic jacket made of Teflon or PVC that protects the cable. Two types of Fiber-Optic cable exist: Single-Mode Fiber (SMF) used for longer distances and Multi-Mode Fiber (MMF) used for shorter distances. Signals are transmitted as light signals from source to destination. Either LED or Laser is used. In multi-mode fiber, light signals are transmitted in numerous dispersed path (singlemode fiber use single light source) and making it un-suitable for long distance transmissions. 1. Core, 2. Cladding, 3. Buffer, 4. Jacket Fiber Optic Cable 12 In some cases, plenum rated cables are used that have a special jacket to protect against fire and emit less smoke than normal cables. However, this is rare and often seen only in industrial or manufacturing sites.
IP TELEPHONY POCKET GUIDE BY BARRY CASTLE 2nd Edition September 2004 ShoreTel, Inc. 960 Stewart Drive Sunnyvale, CA 94085 408.331.3300 1.800.425.9385 www.shoretel.com email@example.com TABLE OF CONTENTS
A Division of Cisco Systems, Inc. Phone Adapter with 2 Ports for Voice-over-IP User Guide VoIP Model No. PAP2-NA Copyright and Trademarks Specifications are subject to change without notice. Linksys is
Table of Contents Introduction... 3 What is VoIP... 3 What is Asterisk... 4 Benefits and Costs... 6 Design... 9 Setting Requirements... 9 Core Selection/Distribution Selection... 9 VoIP, PSTN, Internet...
The Definitive IP PBX Guide Understand what an IP PBX or Hosted VoIP solution can do for your organization and discover the issues that warrant consideration during your decision making process. This comprehensive
A Model Curriculum for K 12 Computer Science Level I Objectives and Outlines Daniel Frost University of California, Irvine 5058 Donald Bren Hall Irvine, CA 92697-3425 949-824-1588 firstname.lastname@example.org Anita Verno
Introduction to Mobile Telephone Systems Lawrence Harte 1G, 2G, 2.5G, and 3G Wireless Technologies and Services 2nd Edition 1st Generation (1G) Analog Cellular Mobile Telephone System Subscriber Identity
NENA VoIP Technical Committee VoIP Characteristics NENA 08-503 - VoIP Characteristics (TID) Issue 0, June 10, 2004 Prepared by: National Emergency Number Association (NENA) VoIP Technical Committee - VoIP
IP Video Surveillance Guide Anixter is a leading global supplier of communications and security products, electrical and electronic wire and cable, fasteners and other small components. We help our customers
VMG1312-B Series Support Notes Jun2012 Edition 1.0 Index General Application Notes... 6 Why use VMG1312-B Series?...6 Application Scenario...8 Prologue... 10 Access Application Notes...12 Web GUI... 12
0929FMi.book Page 29 Friday, January 30, 2004 10:34 AM CHAPTER 2 BUILDING A BUSINESS CASE FOR VOIP To leap or to hide Trust evidence to decide; Faith makes risky guide. James Coggins Taking Charge of Your
CHAPTER 7 Information and communications technology (ICT) in small business WHY IT IS IMPORTANT We are currently living through a massive revolution in communications. Even in your lifetime so far, you
UPnP CERTIFIED TECHNOLOGY YOUR SIMPLE SOLUTION FOR HOME, OFFICE AND SMALL BUSINESS INTEROPERABILITY September 2010 INTRODUCTION Not long ago, consumers and small business owners were reasonably satisfied
Example Community Broadband Wireless Mesh Network Design Version 1.1: 20 June 2007 General Information Company Information Main Office Address City, state, ZIP Code Phone number 866-872-6936 Fax number
Copyright 2006-2013, 3CX Ltd. http://www.3cx.com E-mail: email@example.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious unless
DES-1228P 24-Port 10/100Mbps PoE Web Smart Switch with 4-Port 10/100/1000Base-T and 2-Port Combo SFP User Manual V1.20 TABLE OF CONTENTS About This Guide... 1 Purpose... 1 Terms/Usage... 1 Introduction...
Managed Workplace 2012 Setup Guide On Premise See All. Manage All. Service All. www.levelplatforms.com TABLE OF CONTENTS Welcome... vii About this Document... viii Where To Get More Help... viii Contact
Representing Chief Information Officers of the States May 2005 VoIP and IP TELEPHONY: Planning for Convergence in State Government Representing Chief Information Officers of the States VoIP and IP Telephony:
Towards a barrier-free information society Action Programme 2011 2015 Programmes and strategies 3/2011 Towards a barrier-free information society Action Programme 2011 2015 Ministry of Transport and Communications
Copyright 2007 Pirelli Broadband Solutions S.p.A. All rights reserved. This document contains Pirelli proprietary and confidential information. No part of this document may be copied, reprinted or reproduced
Broadband Over Power Lines A White Paper Prepared for: Seema M. Singh, Esq. Ratepayer Advocate State of New Jersey Division of the Ratepayer Advocate 31 Clinton Street, 11 th Floor Newark, New Jersey 07102
Firewall Strategies June 2003 (Updated May 2009) 1 Table of Content Executive Summary...4 Brief survey of firewall concepts...4 What is the problem?...4 What is a firewall?...4 What skills are necessary
Google Apps as an Alternative to Microsoft Office in a Multinational Company The GAPS Project Thesis presented in order to obtain the Bachelor s degree HES by: Luc BOURQUIN Supervisor: Thierry CEILLIER,
Voice over Internet Protocol (VoIP): The Dynamics of Technology and Regulation by Chintan Vaishnav Bachelor of Engineering, Electronics and Communications Rastriya Vidyalaya College of Engineering, Bangalore
Application of GST/PST to Voice Over Internet Protocol (VOIP) By: Ali Sheikh Rogers Communications Inc The author would like to thank Audrey Diamant of PricewaterhouseCoopers LLP for her valuable input
PERFORMANCE OF VOIP SERVICES ON A DOCSIS NETWORK TARGETED BY A DENIAL OF SERVICE ATTACK A Thesis Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the