* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Wireless Network - Optimal Resume at KAPLAN UNIVERSITY
Distributed firewall wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Computer network wikipedia , lookup
Computer security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Network tap wikipedia , lookup
Wireless security wikipedia , lookup
Airborne Networking wikipedia , lookup
Running head: TELECOMMUNICATIONS Telecommunications Ohida Sultana Kaplan University June 19, 2015 1 2 TELECOMMUNICATIONS White Paper Template The benefit of business creates a whitepaper format with a particular methodology. “A whitepaper is a persuasive, authoritative, in-depth report on a specific topic that presents a problem and provides a solution”(Kolowich, 2014). Every template has some segments including length, structure, density, format and style. It is very useful for business purposes. This is a white paper about telecommunications that needs a white paper format, but I write a research paper about telecommunications with APA format. Telecommunication Channel Characteristics Telecommunication is an electronic signal that exchanges information over significant distance by electrical wire or cable via telephone, radio and television. Simplex Channel Simplex Channel transmissions and signals are transmitted only one direction. One station (transmitter) send data and other station (receiver) receive it. The information will be broadcast only one time. For example: Television, Radio, computer to printer communication, keyboard to computer. Half-Duplex Channel Half-Duplex channel transmissions and signals may be transmitted both directions, but only one at a time. Half-Duplex channel is a one-lane bridge where one side can talk at a time. One station has finished transmitting its data then other station can respond it. It is one node data transmission A collision well be occurred on the network when both try to talk at the same time. For example: CB radio, Walkie-Talkie, Wi-Fi connection. 3 TELECOMMUNICATIONS Full-Duplex Channel Full-Duplex channel data can be transmitted both directions simultaneously for a single carrier. The both station can send and receive data at the same time. It is a two-lane bridge that is collision free and faster data transmissions. For example: Telephone, Switch and UTP Ethernet cable, and LAN connection. Bandwidth Channel The spectrum of an electronic signal is transmitted one point to another point with the range of frequencies by a given time period. Channel bandwidth can transferred more information at a same time. Data transfer rate is expressed with Bits per second (bps), Megabits per second (Mbps), Gigabits per second (Gbps). An electronic signal uses a medium frequency signal component. It is measured in hertz (cycles per second). It is most useful for mobile services. Broadband Communications: Broadband Communications is high speeds communication systems that can transmit data very quickly. It is typically provide channel for data that can be transmitted in different directions by many different users. For examples: wireless network, the coaxial CATV system, DSL, ATM, and ISDN. Network The number of computers in use worldwide that need to connected each other or linked through printers, software, devices, cables, telephone lines, and satellites are need to use the network connection. 4 TELECOMMUNICATIONS Wide Area Network (WAN) WAN networks generally cover a large geographical area. It is a telecommunications network that has a number of interconnection with switching nodes. If one device is routed form a transmission, than the destination device find out these these internal nodes. It is providing switching facilities for moving the data from node to node until its reach the destination. WAN communication provides the electronic flow of data across the national borders with national and international laws regulation. Local Area Network (LAN) LAN networks Generally cover a small area such as home, office or several floors in a building. It is used unshielded twisted-pair and fiber-optic cable. LAN has a different configuration such as switched LANs, and wireless LANs. It has peer-to-peer network that computer can share files to hardware device such as printer. Metropolitan Area Network (MAN) MAN is a telecommunications network. It is cover a geographical area that spans a town or city. It is lager than LAN and smaller than WAN. MAN uses the fiber optical cable with high-speed connections. It cannot own by a single organization. Difference between client/server and peer to peer network Peer to Peer Network It has no central server, central storage or Client/Server It has centralized security database. authentication of user. This network shares files equally for each It is control access to shared resources on workstation and user can access most files. server. Home or small business installed peer-to-peer A big organization such as school installed 5 TELECOMMUNICATIONS network. client/server network. It is inexpensive to set up without security. It is expensive with security. Each workstation can support about ten clients. Each workstation can support a lot of clients. Unsecure user name and password Secure user name and password. It is generally simple. It is more complex. Its need a basic operating system. Its need a special operating system. It is difficult to back up and protect data. It easer to back up and protect data. The number of nodes increase makes a big The node can increase easily as needed. problem. Recommends Network Type Wireless Network A wireless local-area network (LAN) is widely used in business environments. It is radio waves to connect devices (such as laptop, tablet, iPad/iPhone, kindle) to the Internet and the business network. Its provide a lot of benefit for the area of mobility and easy of installation and configuration. Wireless network has a facility with cross-building interconnection that is used point-topoint wireless link. The wireless links provide nomadic access between a LAN hub and a mobile data terminal equipped with an antenna. “The utility of such a connection is to enable an employee returning from a trip to transfer data from a personal portable computer to a server in the office. Nomadic access is also useful in an extended environment such as a business operating out of a cluster building” (Stallings, 2007,P.526). This access is useful for user to 6 TELECOMMUNICATIONS move around the various locations with their portable computer. Wireless network provide robust security protection and it is a low cost system. Telecommunications Hardware Router This communications device is useful to connect between two or more distinct networks. It is follow the packet switching network that the data is broken into packets. Each packet will be transmitted between sender to recipient individually and capable of taking various paths. A packet may be travelled through a number of points with router after that is arrived in the destination. It is very large and heavy-duty pieces of hardware. It is handle a huge amount of traffic. Router has both connections such as wired and wireless. It is provided a wireless connection that is called wireless router. Modem It is a telecommunication hardware device that convert modulate and demodulate data signals and can be transmitted over the communication media. Modem is the first two letters ‘mo’ means modulation that means digital signals are translated into analog signals such as telephone line is analog signal. Other hand, the last three letters ‘dem’ means demodulation that means analog signals are translated into digital signals such as computer is digital signal. The different types of modems are the high-speed cable and DSL connection such as cable modem, cellular modem, DSL and VoIP modem. The first analog modem transmitted 300bps, now the high-speed cable analog modem can support up to 50 Mbps. Wireless modem connect to user and computer from wireless network. 7 TELECOMMUNICATIONS Multiplexers It is a communication device sends multiple signals or data streams over a communication link at a same time. The sender sends a complex signals and receiver recovers the separate signals that process called de-multiplexing. It is selected low-speed analog and digital input signals that is converted high-speed analog and digital signals within a signal shared device or transmission conductor such as a copper wire or fiber optical cable. It is reduced the number of communications links and cost. Multiplexing is used to long-distance phone lines with many phones call and high-speed signal transmitted on a single long-distance phone line It has multiple input switch and single output switch. Network Security The business organization needs to protect their network with automated tools such as encryption with symmetric encryption. The symmetric encryption shares a single encryption/decryption key. A public-key also provides two keys, one for encryption and a paired key for decryption. The secure networking applications are Symmetric encryption and public-key encryption. The business organizations more important evident such as their files and their other information that is store on the computer need to protect from thwart hacker. “The generic name for the collection of the tools designed to protect data and to thwart hackers is computer security” (Stallings, 2007,p .703). Other issue, the network distribution systems use for communications facility that is carrying data between computer and computer, and also terminal user and computer. These systems can be affected the computer security, so the computer is needed to protect data during the data transmission and need to guarantee that transmissions are authentic that is called network security. TELECOMMUNICATIONS 8 The business organization needs both network security such as hardware and software. The network security system has many software components such as Anti-virus and Antispyware, Firewall (ACL, DMG, Router), Intrusion prevent system (IPS), Virtual Private Networks (VPNs) to protect the computer form viruses, worms, and Trojan horses, spyware and adware, hacker attacks, identity theft. The network security is most important for all business organizations. It is protected most important business assets and protected a business’s reputation. It is reduces the risk of legal action from data theft. For these reasons, all business organization need to reset their entire password, update the network server, update the computer applications, and also run antiviruses software with daily basis. TELECOMMUNICATIONS 9 Reference Stair, R & Reynolds, G. (2012). Chapter 5: Database system, Data centers, and Business Intelligence. (Eleventh Edition). Principle of Information Systems. (Pp.251-291), Boston, MA Stallings, William. (2007). (Eighth Edition). Data And Computer Communications. (Pp.524-528, 702-711). Pearson Prentice Hall. Upper Saddle River, NJ Kolowich, Lindsay. (2014,June). What Is a Whitepaper? Retrieved form http://blog.hubspot.com/marketing/what-is-whitepaper-faqs Wolf, Micheal. (2002, April). Home Networking: What Type Is Best? [Blog post]. Retrieved form http://www.informit.com/articles/article.aspx?p=26437&seqNum=3