Introduction to Networks

Introduction to Networks
Introduction to Networks

Want help to write your Essay or Assignments? Click here

Introduction to Networks (Client/Server, Peer-to-Peer, and Home/Small Office)

Summary Description of the Website’s Structure

The professional support website named Network Computing.com that was retrieved in November 7 is basically built upon a structural theme that informs and reinforces the users mental models on how they can get access to the contents provided.  These elements therefore govern the manner in which the navigational systems of the web site mold its user’s mental models on the manner in which information is organized (Kini, 2002).

This therefore points out to the essentials that are required in the development of a site which includes hierarchies and sequences as depicted in the website. The information in the website is organized in a sequential manner an element that is chronologically done with topics aligned in series from the general to the specific subjects. Since this website can be considered as an educational site, there is an incorporation of straight sequences.

Discussion on What I Have Learnt From This Website

It is essential to point out that one of the subjects that interest me in the website is that which is related to the manner in which Cloud systems are used to cure M&A IT integration challenges. As determined through the website, the integration of IT systems and the transfer of data remains a challenging task. However, companies have the opportunity and the capacity to incorporate the use of cloud systems in the integration of their functions with the aim of streamlining there functions (Kini, 2002).

According to the site, it has been established that data transfer systems and the way in which they are integrated remains an afterthought in M&A negotiations. However, this may represent one of the biggest challenges through the divestment process.

Introduction to Networks

Want help to write your Essay or Assignments? Click here

Some other lines of business owners have faced challenges in the making of more complex systems. Through the use of IT, these business lines have the capacity to strictly timeline there systems through the combination of the cloud systems, a factor that impacts the functions of their organizations (Stephanie, 2016). Large data transfers, data centre approaches to consolidation and the application of level standardization approaches have been also found to be a challenging task for entities, and still becomes more complex across multiple organizations.

The site therefore depicts the answer to the challenges that have been faced in the integration of M&A systems that come from different unexpected sources. Through the utilization of public cloud, organizations are bound to find relief in the issues and the challenges that have been faced in their IT experiences (Stephanie, 2016).

This therefore requires that a divesting approach to a company’s functions is moved to the cloud which creates a neutralizing environment that clarifies data ownership and provides clear projections across the accessed controls.

An instance is given of the Hess Corporation which shares details of the manner in which divestment in the retail and energy marketing industry can be leveraged through the use of other web services such as Amazon. This approach treats the marketing business of an organization as an element that needs to be incorporated in a neutral zone during the process of transition (Stephanie, 2016). Hess Corporation in this case made use of the automation approach in building several servers a day that made use of the AWS tools in the creation of backup systems that would monitor and set up networks.

Introduction to Networks

Want help to write your Essay or Assignments? Click here

Companies that look for opportunities to acquire divested systems may therefore incorporate the proponents of cloud services in its operations and ensure its staff is acquainted with the cloud skills in a move to make the organization appealing to the buyers. This therefore points out organizations in the use and integration of public cloud services as an option to the challenges that have been faced in the IT world (Stephanie, 2016).

However, there are some other factors that need to be considered such as the strategic alignment approaches, financial synergies and the cultural fit, an approach that clearly depicts the need to incorporate infrastructural systems that enable the smooth transition of these systems in the right approach. Some of the helpful links that have broadened my knowledge on this subject therefore include: http://www.cloudsystems.com/

In my view, I find this information essential as my professional resource since it provides insights into several elements that enhance my knowledge on the approaches of integrating the cloud systems to the functions of an organization. With this information, I am in a capacity to decisively adopt the cloud systems within the functions of an entity in as a means of making the functions of such an organization appealing to the clients (Rimac, Borst, & Walid, 2008).

I therefore find this information very essential to many organizations that are struggling to make a transition into the IT world to develop infrastructures that fit into the current culture.

Introduction to Networks

Want help to write your Essay or Assignments? Click here

Evaluation of the Program

The website known as Network Computing.com is an educational site that moulds and informs the minds of its users on several elements as noted in the site. The site provides to its users more informative information on the use of different IT systems in the enhancement of their business functions (Loo, 2003).

The manner in which the site is developed therefore makes it appealing to the users to find the right information required. The information in the website is organized in a sequential manner an element that is chronologically done with topics aligned in series from the general to the specific subjects.

References

Kini, R. B. (2002). Peer-To-Peer Technology: A Technology Reborn. Information Systems Management,19(3), 74.

Loo, A. W. (2003). The Future of Peer-To-Peer Computing. Communications of the ACM46(9), 57-61.

Rimac, I., Borst, S., & Walid, A. (2008). Peer-assisted content distribution networks: performance gains and server capacity savings. Bell Labs Technical Journal (John Wiley & Sons, Inc.)13(3), 59-69. doi:10.1002/bltj.20323

Stephanie Tayengco (2016). The Cloud Cures M&A IT Integration Headaches. Retrived  From: http://www.networkcomputing.com/cloud-infrastructure/cloud-cures-ma-it-integration-headaches/2097909404

Introduction to Networks

Want help to write your Essay or Assignments? Click here

Enterprise Networking Essay Paper

Enterprise Networking
Enterprise Networking

Want help to write your Essay or Assignments? Click here

Enterprise Networking

Introduction

Advents of computer innovations for collecting, storing, handling and communicating information are changing how people and organizations use and disseminate information.  Moreover, they are also creating moral dilemmas (Lynch, 2000).   Cloud computing, for instance, has become a preference for many companies because of the cost-efficacy that comes with it regarding delivering IT services.

Companies can cut down running costs by finding and paying for resources that they need.  With cloud computing, businesses can leverage the burden connected with handling numerous resources across the organization. At the same time, they can now concentrate on value creation and novelty for the business. Ultimately, cloud computing representations offer business agility. This allows for the enterprise to meet demand while enabling companies to realize market expectations with a competitive edge.                   

Computer networks were established not just as accurate means of communication and information sharing but as sources of power. However, the speed and proficiency of information systems, which comprise of local and global networks, repositories, and programs for processing data, compel people to confront exclusively new rights and obligations regarding the use of information by contemplating standards of conduct shaped before computers were invented (Amrhein and Quint, 2009). This paper evaluates the ethical issues surrounding information Enterprise Networking of networks such as cloud computing. 

Enterprise Networking

Want help to write your Essay or Assignments? Click here

Novelty in data storage methods and the plummeting storage expenses have been answerable for the multiplying repositories on individuals, employees, clients and prospective clients preserved by private and public entities.  The novelties in data storage have enhanced the violation of personal privacy.  Information storage systems are so cheap, which means that anyone can have their data stored almost for free.

On the other hand, dominant players in the search industry such as Google, America Online (AOL) and Yahoo among others, generate more than 200 million searches in 24 hours (Amrhein and Quint, 2009). These vast collections of ‘consumer intentions’ has become easy targets of private firms looking for a market edge. It has also made it possible for government agencies and private investigators to mine necessary information about persons.  

Enterprise Networking           

Want help to write your Essay or Assignments? Click here

Different people generate computer data about themselves in various ways such as; online purchases, telephone calls, magazine subscriptions, renting videos, searches, surfing the internet for information and federal government records among others. If properly mined, this data can tell so much about one’s preferences and habits (Fulda. 2001). This is how lucrative individual information stored on private firms has become fodder that drives big corporations.

Data mining entails using personal information that can result in disruption of important normative values (Fulda, 2001). As such, this can lead to ethical issues that have to do with violation of individuals’ privacy. For instance, violation of privacy comes in when information about a person is used, transmitted or obtained without his/her consent; such moves can lead to an unfair judgment of individuals. Nonetheless, when information is used anonymously to make different profiles its no longer connects to individual people, as such no direct violation of privacy as the patterns do not reveal “authentic” personal information.                                     

While everyone has the right to information safety, cloud computing undermines information privacy, because hackers and system operators, for instance, may have access to information directories at their discretion (Chee and Franklin, 2010). These two individuals may do whatever they deem fit, even if it means backing up information that was thought to be secure (Lynch, 2000). 

Moreover, they can have access to information without any trace, an aspect that makes the enforcement of privacy right somewhat intricate.  While selling individual information has become a lucrative business for many firms, it preys on the private lives of persons. Companies with 800 and 900 numbers can collect basic information about all their callers.

This information can be procured and sold freely, however, if organizations become too deliberate at it, they risk losing clients. This is also applicable to on-line services like Prodigy, which may have access to subscriber’s profiles. Many companies have been gathering the information mainly to monetize it.

Enterprise Networking

Want help to write your Essay or Assignments? Click here

Privacy is a claim of people, or institutions in determining when, how and to what degree data about them are conveyed. In simple words, privacy is individuals’ right to control what happens with their personal data (Lynch, 2000). There is no right to privacy dimnesions in America. However, some level of protection is afforded federal and state laws. The use of a computer can threaten the private lives of people’s identity.

The internet generates significant amounts of personal data, which presents insights into their interests as well as personality. The federal and government agencies have been allowed access, verify and even retain individual data.  And yet, permitting government agencies to hack and approve the retention of personal web and phone metadata will lead to significant problems. The central ethical issue involved in this case culminates to the loss of personal privacy (Lynch, 2000).                                                                         

This is because government agencies will have access to any form of information about people, for example, websites they visit, people they email, places they were, purchases thy have made among others. Much as people can control what they say and write, they do not have control over personal webs and phone metadata. However, according to the America Computer Society Code of professionalism, it is important for members of society to maintain professional guidelines to improve and increase ICT industry, by ensuring individuals’ data is not used for the wrong purpose.

Also, they should not use personal information to discriminate them, since Code on professionalism stipulates the opposite. In other words, all persons have the right to equal treatment. Discrimination is not a professional act.

Enterprise Networking

Want help to write your Essay or Assignments? Click here

If it’s wrong for ordinary citizens to snoop on government’s private data, equally it is unethical for government agencies to hack and approve the retention of personal web and phone metadata (Lynch, 2000).  Furthermore, there is also the likelihood of other individual gaining access to the information.

The privacy issue is a regular incidence even in financial institutions, yet the code on professionalism has not had the opportunity to develop while developing its legislations; ACS is attempting to increase public confidence in ICT sector. For that reason, it has little experience when it comes to protecting stored information. The volume is stored information will be enormous, leading to petabytes of information as well as the cloud.                               

Already, the intelligence agencies use the data they have on ordinary citizens in wrong ways. The stored information is the basis of nosy snoops and oppression. In fact, immense information hacking cannot be used to control terrorism, because it’s not suitable. But it can be used in minor frauds, unpaid charges among others. Hacking and retention law are unethical on fundamental human rights.

The government is in charge of serving people, and not treats them like some form of presumptive criminals. People should be watching the state and not the opposite. In conclusion, modern technologies have changed not just how things are run but has also come with ethical issues. This calls for innovative policies to guarantee the rights of individuals and companies alike.

Want help to write your Essay or Assignments? Click here

References

Amrhein, D., and Quint, S. (2009) Cloud computing for the enterprise: Part 1: Capturing the cloud. IBM Corporation. Retrieved on December 1, 2011 from http://www.ibm.com/developerworks/websphere/techjournal/0904_amrhein/0904_amrhein.html

Chee, B. and Franklin, C. (2010) Applications for Clouds. Chapter 4 in Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center. CRC Press. Retrieved on December 1, 2011, from http://media.techtarget.com/searchSystemsChannel/downloads/Cloud_Computing_Techn_Strat_of_the_Ubiq_Data_Cent_Chapter_4.pdf

Fulda.J.S. (2001). Data Mining and Privacy. In R. Spinello and H.Tavani, editors, Readings in CyberEthics, pages 413–417.

Lynch, M. (2000) Ethical Issues in Electronic Information Systems. University of Texas. Sections on Electronic Networks (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#Elec_Nets); Access to networks         (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#Access); and Electronic Databases        (http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#ED) retrieved December 20, 2011.

Want help to write your Essay or Assignments? Click here

Enterprise-Level Networking Essay

Enterprise-Level Networking
Enterprise-Level Networking

Enterprise-Level Networking

Want help to write your Essay or Assignments? Click here

Introduction

The paper sets out to analyze the website structure of http://er.eEducause.edu. Apart from stating the purpose, it will also examine the pros and cons that come with the structure and layout in general. Subsequently, the paper will discuss important lessons learned from the article on Enterprise-Level Networking and whether or not the source is appropriate for research.

A summary description of the website’s structure, purpose, pros and cons

The usability and design of http://er.eEducause.edu are rather complex. As such, it calls for searching several pages and hyperlinks to get that exact data one intends to use.  A site with the right usability should be easy to use without necessary examining some pages or hyperlinks to get what they are searching for (Clark, 2002). Again, search engine optimization is the basis for any successful website.

However, Educause.edu has not been optimized appropriately; this is a deterrent factor when it comes to search engine ranking. On the other hand, the website has various content formats such as videos, slides, pictures, and text. If well optimized, this may turn the internet site into a resourceful hub.  Loading speed for the website is quite remarkable.

Enterprise-Level Networking

Want help to write your Essay or Assignments? Click here

The quality of videos and pictures are excellent. Nonetheless, modern information websites are mainly generated by way of social media platforms and other associated sites that enhance user interaction. The website has been integrated with youtube.com and twitter; this creates a channel to enhance information sharing. Moreover, the website has a blog that presents a platform for discussion. The capability for users to respond to the articles allows for the interaction with other users that have similar or divergent opinions (Clark, 2002).

Articles are clustered in a category format; this allows for quick peruse. Navigation is done from the right-hand side of the website.  Again, the website has a module that permits members to log into the system. For instance, end users can only make comments by becoming members. Apart from social media and blog interaction, a guest can drop an email using the contact link provided at the footer panel. In the end, the homepage layout is simple and professional.

Lessons Learned

Based on this website, it is clear that during initial adoption, the majority of IT firms concentrate on the abilities of the project. For instance, in the wireless systems, the main capability is providing internet connectivity across the organization without necessarily connecting to a wall outlet. Such capability presents various benefits to different areas; employees can access the system as well as the internet during the meeting, scholars can work from anywhere when they gather data, and students can use their laptops across the campus (Grochow, 2015).  

Enterprise-Level Networking

     Want help to write your Essay or Assignments? Click here

Besides the immediate advantages, IT workers often raise the likelihood of unique benefit, which is wireless networks can minimize or eliminate the importance of wired systems, hence decrease the cost of infrastructure. Furthermore, several new wireless tools would require additional bandwidth; something wired networks will need to comply with. Another aspect to put into consideration is the newness of wireless systems and the relevance to replace the whole infrastructure in the long run.                                                                                                                     

This website is useful because it demonstrates the need for installing new infrastructures while maintaining old ones or adopting new technology and learning that the new editions supersede it. Therefore, whereas one can expect different benefits from new infrastructure, there is often a risk that such benefits may not be attained. A thorough risk assessment will search for the effects of estimated benefits being unsuccessful and other possible risks such as consequences on a network of departments.

Allowing employee participation is a primary strategy to eliminate surprises while showing that risks have to be assessed comprehensively (Grochow, 2015). By and large, with a new infrastructure, risks and benefits are described with no much information to draw upon. This implies the assessment is significantly qualitative, but some aspects can be quantified. Subjective analysis can come from surveys or experiences from other organizations.

References

Grochow, J. M. (2015). IT Infrastructure Projects: A Framework for Analysis. Accessed 23/January/2016 at http://er.educause.edu/articles/2015/1/it-infrastructure-projects-a-framework-for-analysis

Clark, .T. (2002). “IP SANs – A Guide to iSCSI, iFCP, and FCIP Protocols for Storage Area Networks”, Pearson Education, Inc.

Want help to write your Essay or Assignments? Click here

The Benefits of TCP Protocol

The Benefits of TCP Protocol
The Benefits of TCP Protocol

TCP Protocol

The benefits of TCP Protocol include: control of flow the rate of data exchange, segment size, network control and flow control. On the other hand, the benefits of UDP Protocol include its time sensitivity and ability of its servers towards answering small queries from a large pool of clients (McKeen & Smith, 2014). The differences between TCP and UDP include:  TCP is more reliable than UDP; TCP transmissions are ordered in a sequence whereas messages sent through UDP may not be in a sequence; and finally TCP connection is heavyweight while that of UDP is lightweight (McNurlin, 2009).

TCP Protocol is used in remote surgery because of its preferred in a procedure that requires error correction facilities at network interface level. UDP Protocol is the choice for online gaming and online shopping, which are time sensitive applications for online gaming and the servers are requiring the ability of answering small queries from a large pool of clients for online shopping (O’Brien, 2013).

Basic Data Transfer: The TCP is able to transfer a continuous stream of octets in each direction between its users by packaging some number of octets intosegments for transmission through the internet system. In general, the TCPs decide when to block and forward data at their own convenience.

Reliability: The TCP must recover from data that is damaged, lost, duplicated, or delivered out of order by the internet communication system. This is achieved by assigning a sequence number to each octet transmitted, and requiring a positive acknowledgment (ACK) from the receiving TCP.

The Transmission Control Protocol (TCP) is intended for use as a highly reliable host-to-host protocol between hosts in packet-switched computer communication networks, and in interconnected systems of such networks.

Precedence and Security: The users of TCP may indicate the security and precedence of their communication. Provision is made for default values to be used when these features are not needed.

References

Matthews, H. S. & Williams, E. (2012). Telework Adoption and Energy Use in Building and Transport Sectors in the United States and Japan. Journal of Infrastructural Systems, 11(1), 21-30. doi:10.1061/(ASCE)1076-0342(2005)11:1(21)

McKeen, J. D. & Smith, H. A. (2014). Making IT Happen: Critical Issues in IT Management, Wiley Series in Information Systems. New York, NY: Prentice Hall.

McNurlin, B. (2009). Information Systems Management in Practice (8th ed.). New York, NY: Prentice Hall.

O’Brien, J. (2013). Management Information Systems: Managing Information Technology in the Internetworked Enterprise. Boston, MA: Irwin McGraw-Hill. ISBN 0-07-112373-3

Sardeshmukh, S. R., Sharma, D., & Golden, T. (2012). Impact of Telework on exhaustion and job engagement: A job demands and resources model. New Technology, Work and Employment, 27(3), 193-207. doi:10.1111/j.1468-005X.2012.00284.x

Want help to write your Essay or Assignments? Click here

Understanding Frame Relay

Understanding Frame Relay
Understanding Frame Relay

Understanding Frame Relay

            Frame relay is one of the inventions in the computer technology industry that have significantly transformed transmission of data among different devices. According to Mir and Sharma (2014), frame relay is a transmission service that has been designed into a packet-mode, and that helps to minimize the degree of data recovery and detection of an error within a network. In this respect, frame relay assists organizations to achieve a higher throughput by reorganizing the communication process. Frame relay allows for the transmission of data between Wide Area Networks (WANs) and local area network (LANs) (Basu, Jha, and Mohanty, 2015).

            Frame relay works by placing data into a small variable unit known as a frame. For instance, the network that has been created by a frame relay tends to create a permanent virtual circuit (PVC), which allows the customer to easily view a continuous connection without making a full payment (Basu, Jha, and Mohanty, 2015). To achieve maximum success from frame relay technology, an organization must choose a high level of service quality, and prioritize some frames while at the same time making others less relevant. Frame relay works by minimizing error detection rate between WANs and LANs, which makes it very efficient for interconnecting these networks (Walton, 1998).

Understanding frame relays: How they work

            Frame relay has a link-layer service that is connection-oriented to give rise to one functional unit. Being that frame relay falls on layer two protocol of X.25, it comprises of features that increase its ability to reduce error detection rates between LANs and WANs (Walton, 1998). These characteristics include; multiplexing, an indication of the most important and less important frames, insertion of zero bits, and frame delineation, nonduplication of frames preservation of frames, and protection of the probability of frame loss. These layer characteristics resemble those of OSI network layer protocol which frame relay is made up of (Basu, Jha, and Mohanty, 2015).

 Frame relay is used by today’s organizations to speed up the transmission of data among networks. According to Basu, Jha, and Mohanty (2015), the use of frame relay to improve networking performance is common in many organizations today. An example of one organization that utilizes frame relay is AT&T.

As Alexander, Alexander, Zhang, and Zhang, (2000), point out, frame relay that has been designed in the form of an integrated service is rapidly gaining strategic importance in both private and public sectors. These authors further assert that frame relay is mostly used by modern organizations to increase the worth of services that they offer and to achieve competitive advantage.

An integrated service that incorporates frame relay is used by today’s organizations to give customers what they desire as far as network connection and speed are concerned (Mir and Sharma, 2014).

There are many reasons why frame relay is still used today. when understanding frame relay, the reasons are provided. First, it assists organizations to minimize costs of internetworking. Second, today’s organizations can increase performance and minimize the complexity of networks. Third, companies which have successfully implemented frame relay can enjoy protocol independence and to increase interoperability (Basu, Jha, and Mohanty, 2015). Based on these benefits, contemporary organizations should consider utilizing frame relay with other technologies such as ATM and IP, to maximize network performance (Alexander et al., 2000).

Reference List

Alexander, H., Alexander, R. B., Zhang, J. & Zhang, Q. (2000). Value added service-voice, data, frame relay, ATM, IP all on one. Communication Technology Proceedings,  doi:10.1109/ICCT.2000.889280

Basu, A., Jha, K., & Mohanty, S. (2015). Wide area networking using frame relay cloud. International Journal of Computer & Mathematical Science, 4(7): 1-6.

Mir, S., A. & Sharma, M. (2014). A comparative study of x.25, frame relay and ATM in high speed networks. International Journal for Research in Applied Science and Engineering Technology, 2 (IV): 243-245.

Walton, D. (1998). Frame relay to ATM interworking. BT Technology Journal, 16(1): 96-105.

Want help to write your Essay or Assignments? Click here.