Unit 3: Lab 1: Building a New Structure - Nfpa Codes

In: Computers and Technology

Submitted By kazsak13
Words 1394
Pages 6
Unit 3: Lab 1: Building a New Structure – NFPA Codes
The transmission of words, sounds, images, or data in the form of electronic or electromagnetic signals or impulses: Telecommunications what a concept. In order for us as a person and an IT Administrator is to stay safe. History has shown the safety departments about having to write policies which are used to provide recommended practices for the design and installation of safety standards with the Telecommunications infrastructure that will support a wide variety of existing and future services, using industry accepted design and installation methods.
To define standards that will enable the design and implementation of structured cabling systems for commercial buildings and between buildings. The telecommunications industry standards, codes and practices are defined in various state and agencies on web sites defined in a catalog that can purchase and downloaded and read for immediate enforcement of these guidelines used for each industry.
These policies are intended to answer faxes of infrastructure practices and not to be a substitute for knowledge of industry accepted practices, standards and codes. Policies are not intended to be used in lieu of a construction specification document, are used to abide to the specifications. Communications technologies can be complex and designed and installed by experienced professionals.
Telecommunications are considered a fourth utility, to be designed, funded and installed with the same importance as Electrical, Plumbing and HVAC. The designer has the responsibility of providing a design using accepted engineering and architectural practices and recommends a Registered Communications Distribution Designer (RCDD) to be used as a consultant for the design of the telecommunications. In many cases the need will arise to consult with other engineers from other trades or…...

Similar Documents

Building a New Structure - Rfp

...My RFP for this building is I will be wiring this entire building with Cat5e cable because it’s cheaper and better to use in a building like this. I will try and get the job done as quickly as possible; it probably will take me about 3 or 4 day to wire this building. I will provide all the labor, material, tools and equipment need for this job. Me and my team will do a great job on wiring your building and have it up in running in no time. I plan to have your Telco room in the back of the building in the left corner with all the theory rooms and labs surrounding it. I will have racks and switches setup in the Telco room for the other rooms , but for labs 4 and lab 1 I will have a switches in those rooms because those tow labs have the most computers in them and that’s a lot of cable to run from every computer in those rooms back to the Telco room . So I will just put the switches in the labs mount them on the wall or a have racks setup so the stiches and cables can be place and cable be neatly organized, and have to main cables running from those rooms back to the Telco room. Then with the other two labs , LRC I will do the same thing as I did with the other labs so it want be so much cable and they have their own switch in them , with the 5 theory rooms and front desk I will have 3 cables in each room going back to the Telco room . All the cables in all rooms will be organized and in the Telco room will have the cables on racks so they are neat and if a cable...

Words: 695 - Pages: 3

Nfpa Codes

...NFPA NFPA1 – First and foremost NFPA 1 requires that a full range of fire and life safety issues, from fire protection systems and equipment and occupant safety in new and existing buildings. Such as fire alarms, fire extinguishers, proper fire exits and a fire exit plan. NFPA13 – Deals with the issue of the installation of sprinkler systems. It assures proper design and installation of sprinklers systems for all types of fires whether it’d be electrical, fuel, or a grease fire. NFPA101 – ( Life Safety Code) One of the most widely used source for strategies to protect people based on building construction protection and occupancy features that minimize the effects of fire and related hazards. Unique in the field it is the only document that covers life safety in both new and existing structures. FCC – (Federal Communications Commission) The FCC issues guidelines that govern the installation of telecommunications cabling and the design of communications devices built in the United States. Part 68 – Governs the direct connections of Terminal Equipment to the Public Switched Telephone Network, and to wire-line carrier owned facilities used to provide private line services. It also contains rules concerning hearing aid compatibility and volume control for telephones, dialing frequency for automated dialing machines, source identification for fax transmissions, and technical criteria for inside wiring. CC Docket No. 85-229 – Includes the computer inquiry III Review of......

Words: 383 - Pages: 2

Nt1310 Building a New Structure Rfp

...Computer Science /Electrical Engineering Lab Building Request for Proposal Contractor’s Requirements: (a) The successful contractor must be a certified installer of the infrastructure components being provided and show proof thereof. (b) The contractor must be an authorized reseller of the networking and infrastructure components quoted and show proof thereof. (c) Work will be supervised by a Registered Communications Distribution Designer (RCDD) during all phases of the installation. An RCDD must be on site and available to technicians and installers any time work is being performed. Purpose: (a) The purpose of the “CS/EE Lab Building RFP” is to provide a functional specification for a comprehensive technology network system, including required network cabling and components and required network devices. The purpose of this is also to provide adequate details and criteria for the design of this technology network system. (b) The contractor shall provide cables, network equipment, and components necessary to construct an integrated local area networking infrastructure. (c) The contractor shall be responsible for the installation of the technology network systems This document provides specifications to be used to design the installation of a networking infrastructure and associated equipment. The contractor shall furnish all labor, materials, tools, equipment, and reasonable incidental services necessary to complete an acceptable installation of......

Words: 1866 - Pages: 8

Nfpa Codes

...NFPA CODES NFPA 70E requirements for safe work practices protect personnel by reducing exposure to major electrical hazards. Originally developed at OSHA's request, NFPA 70E helps companies and employees avoid workplace injuries and fatalities due to shock, electrocution, arc flash, and arc blast, and assists in complying with OSHA 1910 Subpart S and OSHA 1926 Subpart K. NFPA 76: This standard provides requirements for fire protection of telecommunications facilities where telecommunications services such as telephone (landline, wireless) transmission, data transmission, internet transmission, voice-over internet protocol (VoIP) transmission, and video transmission are rendered to the public. A.1.1 It is not intended that this standard apply to private telecommunications facilities. Private telecommunications facilities include rooms specifically used for a business to deliver telecommunications to its employees, containing telecommunication for employees of a company. However, private telecommunications facilities do not include facilities that are owned by non-utility business that provide telecommunications services to the public, including, but not limited to, large medical facilities, universities, large corporate telecommunications networks, military bases, and private prisons. Telecommunications facilities are referred to as telephone exchanges in NFPA 101 and NFPA 5000. The 2012 edition of NFPA 101 classifies telephone exchanges as special-purpose industrial......

Words: 1197 - Pages: 5

Unit 3 Lab 1

...1. What are the three fundamental elements of an effective access control solution for information systems? A:Identification, Authentication, and Authorization 2. 2. What two access controls can be setup for a Windows Server 2003 folders and authentication? A:Authentication and Access control. 3. lf you can browse a file on a Windows network share but are not able to copy it or modify it what type of access controls and permissions are probably configured? What type of Access Control would best describe this access control situation? A: List Folder Contents – Security Policy based control. 4. What is the mechanism on a Windows Server where you can administer granular policies and permissions on a Windows network using role-based access? A:Group Policy Editor 5. What is two-factor authentication and why is it an effective access control technique? A:Two Factor uses two of the three characteristics in Authentication types (Knowledge, Ownership, Characteristics) 6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve C-1-A for departmental LANs, departmental folders, and data. A: creates security principals in the Active Directory domain partition 7. Is it a good practice to include the account or user name in the password? Why or why not? A:It is not a good idea to have a user name in the password, because it easy for people can try to hack or decode the password. 8. Can a user who is defined in the...

Words: 329 - Pages: 2

Building a New Structure - Rfp

...Building a New Structure - RFP The successful contractor must be a certified installer of the infrastructure components being Provided and show proof thereof. The contractor must be an authorized reseller of the networking And infrastructure components quotes to show proof. All work will be supervised by a Registered Communications Distribution Designer during all phases of the installation. An RCDD must be on site And available to technicians and installers any time work is being performed. The purpose of the Technology Network Infrasture RFP is to provide a functional specification for a Comprehensive technology network system, including required network cabling and components and Required network devices. The purpose of this is to provide adequate details and criteria for the Design of this technology network system. The contractor shall provide cables, network equipment, And components necessary to construct an integrated local area networking infrastrure. All work shall include all components for both a horizontal and riser data cable plant from workstation Outlet termination to wire-room terminations. All cable plant components, such as outlets, wiring – Termination blocks, racks, patch cables, intelligent-hub equipment, and so forth will be furnished, Installed, and tested by this contractor. The data cable plant is designed to support a 1000Mbps Ethernet computer network. The network cable system design will provide the connectivity...

Words: 423 - Pages: 2

Unit 3 Lab 3

...Unit 3 Lab 3 In order to find your IP address, press your window key and R key to bring up the search box. Type CMD to bring up command prompt, then type ipconfig to get your IP address, Subnet mask and default gateway. For this computer I got, • IP Address : 10.61.108.40 • Subnet Mask : 255.255.252.0 • Default Gateway : 10.61.110.1 Everyone is assigned an IP address, it’s like you house address you need it in order to surf the web your IP address is tied to you and to be able to create a routing table ,that enables faster communication. When you open a web browser and type in a domain, it’s going to take you to that domain. Once again a domain name is like your house address but using words to get there. There are 2 ways you can put in a domain name, you can type www.whatever.com or whatever.com. In the 90’s when internet was introduced to the public, you had to type www in order to get to a website now you don’t have to use www it will automatically fill it in when you press the enter key. When you use the address bar you will see http (Hyper Text Transfer Protocol) or https, the “S” stands for secure socket layer, a secured page mainly for payments online or credit card information. Open Application is the process of accessing the physical layer to tell the OS to start the application. It’s one of many hidden system folders containing important files and documents that help Windows operating systems to run. This will establish a......

Words: 290 - Pages: 2

Constructing a New Structure- Building Codes

...Constructing a new Structure- Building Codes The information in this document should be useful in making design-related decisions that will not only satisfy the move to our new building Information Technology (IT) requirements but also meet the needs of the building and its future occupants with respect to voice, video and data communications. The intention of this document is to provide a comprehensive understanding and reference guide that can be referred to when moving to our new building. Moving into our new building we need to follow certain cable codes and specification. A properly designed network is based around components or wiring units. The components should also follow certain performance specifications so that when installing we will know exactly what types of applications will be supported. The cable specifications and building codes requirements that we use will be based on * ANSI/EIA/TIA standards 568-C-- Commercial Building Telecommunications Cabling Standard * ANSI/EIA/TIA 569-- Commercial Building Standards for Telecommunications Pathways and Spaces; ANSI/EIA/TIA 606- Administration Standard for the Telecommunications Infrastructure of Commercial Buildings * ANSI/EIA/TIA 607-Commercial Building Grounding and Bonding Requirements for Telecommunications; BICSI Telecommunications Distribution Methods Manual (TDMM) and NFPA 70--National Electric Code (NEC). Cabling has changed over time. Cabling installations have evolved from proprietary......

Words: 2982 - Pages: 12

Unit 1 Lab

...Students will be provided with a copy of the VMware image of the Linux distribution and tools that will be used through out this course when I return to class on September 25, 2012. Accompanying this lab students will need to answer the questions from the Security Strategies in Linux Platforms and Applications lab book. To accomplish the lab assignment below, students will need to obtain a copy of the Fedora Image provided to you by the Substitute Instructor and complete a basic VMware installation of Fedora. The questions in the lab book will be based on the installation experience. Assigned Pages: 6-10 Questions: 1 through 15. This assignment is due by the end of class for Unit 1. 1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time? Accurate time is important because of the date/time stamps (records) that occur on both log-in's and any changes that were made. This allows the logs to be checked to see what individual made the changes, or was logged-in at the time the changes were implemented. 2. During the install, a password has been set for the "root" user. What is the "root" user, and when is it appropriate to use this account? The "root" user is name or account that by default has access to all commands and files. It is also referred to as the root account, root user and the superuser. It would be appropriate to use this......

Words: 1655 - Pages: 7

Building a New Structure

...This lab I went to the Madison building codes web site. I will put in the codes from off the web page. I’m writing this as notes and a check out list. Here is a list of the steps to do first. * Processing of permit applications for all types of construction * Review of commercial and residential construction plans * Issuing building and various related trade permits * Conducting various inspections of new commercial and residential construction including alterations, additions, new detached structures, and swimming pools * Evaluating existing buildings to verify code compliance based on occupancy * Investigation of complaints relating to violations of the property maintenance code and other sections of the City Code of Ordinances * Providing assistance to developers, contractors and citizens regarding building code requirements * Educating the public concerning safety, health and welfare in the built environment * Investigating unlicensed businesses * Enforcing city sign regulations, as well as grass and weed control regulations * Monitoring and enforcing regulations pertaining to junk, abandoned, unlicensed or inoperable vehicles * Repairing and maintaining the interior and exterior of City Hall and the Madison City Library Here is a list of the codes Codes The City currently enforces the 2006 International Residential Code and the 2009 International Building Code and related International Codes for Plumbing, Mechanical, and...

Words: 328 - Pages: 2

Unit 7. Lab 1. New Building – Safety Plan

...Unit 7. Lab 1. New Building – Safety Plan Making safety a priority may be as simple as sending a letter to all employees outlining your plans to make safety as important as quality. Your employees should believe just as strongly as you do in safety. Hire the safest employees, starting in the interview process. Get a sense of how prospective employees feel about a total commitment to safely. Have they worked in other organizations where safety is a top priority? Always make the prospect aware of the physical demands the job entails. Review your workers compensation losses and ask your insurance carrier for a list of all of your workers compensation claims for the past 6 years. Look for trends, note the type of injury, the job the employee was performing when hurt, the name of the employee and the equipment or tools being used . Focus on the common causes that are responsible for the greatest number of you claims. Get all employees involved in the safety effort. Solicit employee suggestions on what they think can be done to prevent accidents and take action on these suggestions. Many businesses have regulations imposed on them by state and federal agencies. Your state’s insurance department or labor department may have employer requirements related to workers compensation and the provision of medical services OSHA has several volumes of rules and regulations that may affect your business. You should contact your trade association, chamber of commerce or state business and......

Words: 1431 - Pages: 6

Building a New Structure Rfp

...dynamically. Unless you don’t mind MANUALLY managing 218 hosts, you should definitely go with DHCP. The router will be well capable of handing out addresses for 145 hosts. Since there is only one location used in this case, only one network should be used as it will only complicate things to have more than one network. Since DHCP is being used as the suggestion, whether we should use a router and/or firewall, or utilizing Windows Server…the answer is yes. The router for dishing out the IP addresses and the firewall should be used for security purposes. Using Windows Server just for DHCP is rather overkill. Using these suggested methods should also accommodate for at least 50% growth within the next few years. Rey Lozada NT1330 homework Unit 1: Assignment June 19, 2015 Window 2008 Networking Services Domain Name System (DNS) - are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses. Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network Routing and Remote Access Service (RRAS) is a Microsoft API and server software that makes it possible to create applications to administer......

Words: 385 - Pages: 2

Building a New Structure

...Lairquneder Robinson 06 April 2015 Building a New Structure A lot of thought, decision, and design goes into building a new structure on a school campus. A few of those decisions goes towards what wiring and cabling the building will have. There are quite a few codes, standards, and specifications that needs to be followed. Some of those guidelines are NFPA, NEMA, FCC, UL, and NEC. NFPA stands for National Fire Protection Association. NFPA was founded in 1896 as a nonprofit organization to help protect property, people, and the environment from fire damage. It’s now an international organization representing over 100 countries with 65,000 members. NFPA’s mission is to help reduce the risk of fire through safety requirements, research, codes, and fire-related education. NFPA is published every three years. It covers issues related to electrical safety requirements and it’s not used as a design specification or instruction manual. NFPA publishes 300 codes and standards. They are designed to minimize the risk and effects of fire. Its over 200 technical codes-and standard- development committees and is comprised of over 2,000 volunteer seats. The volunteers vote on revision and proposals in a process that is accredited by the ANSI (American National Standards Institute). NFPA also provides free online access to its codes and standards. NEMA stands for the National Electrical Manufacturers Association. NEMA is the association of medical imaging and electrical......

Words: 716 - Pages: 3

Nfpa Codes

...NFPA Codes The FCC works towards six goals in the areas of broadband, competition, the spectrum, the media, public safety and homeland security, and modernizing itself. The FCC also provides varied degrees of cooperation, oversight, and leadership for similar communications bodies in other countries of North America. NFPA is responsible for 380 codes and standards that are designed to minimize the risk and effects of fire by establishing criteria for building, processing, design, service, and installation in the United States, as well as many other countries. Its more than 200 technical code- and standard- development committees have over 6,000 volunteer seats. Volunteers vote on proposals and revisions in a process that is accredited by the American National Standards Institute (ANSI). Sponsoring a variety of life-saving campaigns and training programs, the NFPA devotes much of its efforts to protecting lives and property through education. The organization provides many resources for fire, electrical, and life-safety instructions. UL: was known throughout the 20th century as Underwriters Laboratories and participated in the safety analysis of many of that century's new technologies, most notably the public adoption of electricity and the drafting of safety standards for electrical devices and components. UL provides safety-related certification, validation, testing, inspection, auditing, advising and training services to a wide range of clients, including......

Words: 379 - Pages: 2

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they......

Words: 16182 - Pages: 65

Bloom Into You ... | Dunkirk.1958.COMPLETE.BLURAY... | Bakemonogatari