{"id":298,"date":"2025-04-28T15:57:25","date_gmt":"2025-04-28T15:57:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mkenn270\/?page_id=298"},"modified":"2025-04-28T15:57:25","modified_gmt":"2025-04-28T15:57:25","slug":"it-315","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mkenn270\/it-315\/","title":{"rendered":"IT 315"},"content":{"rendered":"\n<p><strong>Introduction to Information Systems<\/strong><\/p>\n\n\n\n<p>The course introduces fundamental concepts, technologies, and issues in communications and data networks, including architectures, services, protocols, and cyber defense. Students learn to describe, design, and build basic network architectures based on specific needs.<\/p>\n\n\n\n<p>I completed a quiz that covered basic networking concepts like connection-oriented vs. connectionless protocols, network devices and layers (such as switches using the Data Link layer), signal transmission (like attenuation and crosstalk), and cabling standards. It also included questions on multiplexing, encapsulation, OSI layers, fiber optics, and simple calculations involving baud rate and bit rate. I successfully earned an 80% (B).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-28-at-11.50.52-AM.png\"><img loading=\"lazy\" decoding=\"async\" width=\"687\" height=\"552\" src=\"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-28-at-11.50.52-AM.png\" alt=\"\" class=\"wp-image-299\" srcset=\"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-28-at-11.50.52-AM.png 687w, https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-28-at-11.50.52-AM-300x241.png 300w, https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-28-at-11.50.52-AM-505x406.png 505w\" sizes=\"(max-width: 687px) 100vw, 687px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Question 9:<\/strong><\/p>\n\n\n\n<p>Encapsulation is when each network layer adds its own info to a message before sending it. <\/p>\n\n\n\n<p><strong>Question 10:<\/strong><\/p>\n\n\n\n<p>End-to-end layers are used only on the sender\u2019s and receiver\u2019s devices, not by network hardware like routers. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-28-at-11.51.23-AM.png\"><img loading=\"lazy\" decoding=\"async\" width=\"688\" height=\"574\" src=\"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-28-at-11.51.23-AM.png\" alt=\"\" class=\"wp-image-300\" srcset=\"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-28-at-11.51.23-AM.png 688w, https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-28-at-11.51.23-AM-300x250.png 300w, https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-28-at-11.51.23-AM-487x406.png 487w\" sizes=\"(max-width: 688px) 100vw, 688px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Question 21:<\/strong><\/p>\n\n\n\n<p>In a bus\/broadcast topology, every device on the network hears every message, even if it\u2019s not meant for them. <\/p>\n\n\n\n<p><strong>Question 22:<\/strong><\/p>\n\n\n\n<p>If a company wants a network that still works even if a cable is cut, they should use a ring network (SONET Ring), which can reroute traffic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Information Systems The course introduces fundamental concepts, technologies, and issues in communications and data networks, including architectures, services, protocols, and cyber defense. Students learn to describe, design, and build basic network architectures based on specific needs. I completed a quiz that covered basic networking concepts like connection-oriented vs. connectionless protocols, network devices and &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/mkenn270\/it-315\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">IT 315<\/span><\/a><\/p>\n","protected":false},"author":24729,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/pages\/298"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/users\/24729"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/pages\/298\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/pages\/298\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/media?parent=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}