Cs402 : Computer Communications System Assessment Answers
Question:
Research based projects must include at least 6 relevant recent journal papers in the bibliography.
Answer:
Introduction:
Computer network plays an important role in the field of the communication system and it provides a platform to send and receive data from one device to another. Any communication system uses two basic processes such as transmitter and receiver both are suitable to exchange information between two peripheral devices [1]. The main purpose of this report is to describe different types of design issues faced by computer networks. In the field of computer science network is a process to interconnect two or more computing devices with the help of data links. The physical connection between device and network is done by using either wired cables or wireless protocols. This report is divided into two parts such as computer network issues and real-life example (case study).
Computer communications system and network design/ implementation issues
From last few years computer networks change the way of communication because ICT developed various modern technologies by which consumers can share data from one location to another without using any data wires [2]. The main problem occurs in a communication system is the lack of security and in this modern generation, many organization uses computer networks that also face this type of problem. This section explains challenged faced in the implementation of computer networks and it is not easy to maintain the security of any computer network for which any business industry hire security staff to manage a large number of networks. There are following the design or implementation issues faced in computer networks
Performance degradation
It is a very common problem faced when any computer network is designed and many organization loss data integrity and speed. Every communication system whether it is small or large suffers from the issue of performance but in the field of large communication it is growing very fast [3]. The management teams of any industry establish communication network at a low cost by which they adopt less efficacy equipment’s and they do not provide high-speed connectivity. In large network many other components are used, for example, mid-point, endpoints, and additional data links to interconnect types of equipment. Information and technology produced simple methods or process to solve the problem of performance. Make sure, when users purchase any computer network then he will check the proper configuration system by which consumers can resolve the issue of speed.
Host identification
For host identification, any security team requires proper configuration system because without IP address and subnets user will not able to share any data from one device to another. This problem does not occur in small communication system because they can easily configure with the help of manual process but it cannot be done in the large communication network [4]. For the big network, few mechanisms are used such as domain controllers, DHCP, and their network protocols and if any person purchases low-quality equipment’s then he can suffer from a problem of identification. Proper identification can improve the overall performance of user networks but they should focus on the security of data.
Security Issues
Security is one of the most common issues in the field of communication and DDOS attack is generally occur in computer networks. All these types of problems depend upon the size of the network system and hackers always target a large computer network because they have large vulnerable points. Any consumer uses more password system which required the number of hardware and software and the hacker can try malicious process to encrypt all personal information [5].
Configuration conflicts
Any small network consists of a number of IP address with unique hostnames and there are few possibilities that a particular system will conflict with another device. That is why users require the number of routers by which they can bypass the issue of conflicts and large network use multiple host process to reduce this type of problem [6]. Therefore consumers can adopt configuration steps when they design a new communication system and implement any network which can handle an issue of interface.
Case study
WhatsApp is one of the biggest online communities which provide various communication services to consumers. It uses a large number of computer devices and networks to communicate with users but in the year 2017 it suffered from configuration conflict and data breach issues [7]. At that time users were not able to send and receive any message and thousands of consumers were faced with this issue. In this modern generation number of organizations and customers uses this messaging app and management teams control this problem within one hour. Therefore if any users design any computer network then he will adopt the complete configuration process with security because there are many third-party sellers they provide low-quality equipment’s.
Recommendation:
In the last five years, information and technologies established many wireless networks like the internet of thing, LTE, and Wi-Fi which are very secure. Design and implementation issue in a communication system can be removed if an organization follow the proper guideline and use high-quality components. There are a few important steps can be used for this type of issues which are the following:
- Check WAN and LAN connectivity
- Verify wireless networks and adapter
- Configure AP and router setting
- Check the setting of IP and TCP network
- Configure network connectivity by using ping
- Control wireless network issue
- Adopt security plans and policies
- Use authentic servers and websites
- Look for a security conflict
- Ensure that RADIUS is working properly
- Check 802.1 EAP system and user login [7].
- Check network connection problems and resolve them immediately
Conclusion:
The communication system is a medium by which any user can transfer data from one device to another. Any network provides interconnection between two or more computing devices with the help of connecting wires. When an organization establishes a large number of the network then they can face various implementation issues, for example, Performance degradation, Configuration conflicts, and Security Issues. This report explained all these types of the issue faced in communication systems and methods to reduce the problem of security in networks. Consumers should adopt security programmes like encryption and cryptography by they can improve the privacy of their networks. Ensure that the organization should implement any communication system with proper configuration because lack of configuration can enhance the issue of conflict.
References:
- A. Z., Abbasi, N., Islam and Z. A. Shaikh. “A review of wireless sensors and networks' applications in agriculture.” Computer Standards & Interfaces, 36(2), pp. 263-270, 2014.
- A., Akhunzada, E., Ahmed, A., Gani, M. K., Khan, M., Imran and S. Guizani. “Securing software-defined networks: taxonomy, requirements, and open issues.” IEEE Communications Magazine, 53(4), pp. 36-44, 2015.
- O. Ben-Assuli, “Electronic health records, adoption, quality of care, legal and privacy issues and their implementation in emergency departments.” Health Policy, 119(3), pp. 287-297, 2015.
- M., Chen, Y., Ma, Y., Li, D., Wu, Y., Zhang and C. H. Youn. “Wearable 2.0: Enabling human-cloud integration in next-generation healthcare systems.” IEEE Communications Magazine, 55(1), pp. 54-61, 2017.
- B., Han, V., Gopalakrishnan, L., Ji and S. Lee. “Network function virtualization: Challenges and opportunities for innovations.” IEEE Communications Magazine, 53(2), pp. 90-97, 2015.
- J., Liu, S., Zhang, N., Kato, H., Ujikawa and K. Suzuki. “Device-to-device communications for enhancing the quality of experience in software-defined multi-tier LTE-A networks.” IEEE Network, 29(4), pp. 46-52, 2015.
- Q., Yan, F. R., Yu, Q., Gng and J. Li. “Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges.” IEEE Communications Surveys & Tutorials
Buy Cs402 : Computer Communications System Assessment Answers Online
Talk to our expert to get the help with Cs402 : Computer Communications System Assessment Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.