ICT220 Telecommunications and Networks : Several Organizations
1. Infrastructure
E.g. Internet connection, LAN, Wireless LANs, Other wireless technologies (Blutooth LE, RF, etc), Cellular/WAN, IoT specific technologies/infrastructures
2. Existing Technology Solutions E.g. LoRaWAN, OpenIoT
3. Data Storage and Processing Facilities
E.g. Data centers, Cloud computing, distributed storage and processing
Answer:
Introduction
The report is mainly describing about the specifications of telecommunications networks which are helpful in deploying the efficiency within several organizations and functional areas of operations. In contrast with these facts, the connections between the cables and nodes are elaborated within this report. The tracking and other monitoring activity can be obtained with respect to the IP monitoring and management processes involved within any significant telecommunications architecture used within any organization (Al-Mamary et al., 2014). Additionally, there are specific requirement for managing the network architectural development within any telecommunication network that reduces the operational cost of the system, all of these are elaborated within this report.
A. Network Infrastructure
A.1. Network Convergence and unified communicationsThe network convergence and uniform communication is the process of reducing the cost effectiveness incurred into the network architecture with respect to various fundamental and functional aspects involved within the concerned network architecture. There are different communication processes that are used for different number of connected nodes and these are considered within the network architecture. This technique increases the network traffic and processing speeds for managing significant operations within the network architecture (Bankov et al., 2017). The network traffic is responsible for redirecting the data flow in different branches. The data gets prioritized generation of information that helps the internal networks in pointing network administrators for managing immediate response collection for organizational data within specific network infrastructure. In contrast with these facts, the network failure is recognized as the network congession that sh
ould be recognized as the network administrator for managing significant development and deployment of external and internal accesses of data by the users and concerned heads of operations. The network administrator immediately operates and solves the queries with respect to the highlighted issues introduced within the system architecture of the concerned network infrastructure. The organizational data are manipulated and functionalized with respect to their demands and needs for managing headquarters of sunshine coast (Bernardos et al., 2014). There should be intranet architecture distribution among the global headquarters of Sunshine coast. These processes and operational procedures avoids the external access of data sets and functional aspects involved within the system architecture of their infrastructure.
A.2 LAN types and cabling plan
There are various LAN types available for managing the significant development of network architecture with respect to functional and fundamental operations off computers and servers involved within network. The switches and hubs should be matched with the LAN cabling system then only the system architecture will be providing effective services to the network architecture (Chen & Zhao, 2014). The routers utilized within the LAN should be configured and interconnected to specific devices. Therefore, the LAN should be selected with respect to the functional factors as mentioned as follows:
- Speed of operation
- Cost
- Manageability
- Extra service opportunities
- Expandability
A.3. WAN connection with Branches
The interconnection of devices and other important network elements must be connected with proper cables and caballing plans. There is various physical connectivity and these connections are managed and operated with respect to the telecommunication network architecture. The interconnection of devices are managed and connected with respect to various functional aspects and interconnection of devices (Chumak, Serga & Hillebrands, 2014). The length of cables is also effective in these types of operations. UTP is installed for managing the transfer operations within the network architecture. the length should be 100 m and these needs to be managed with respect to cables and should also be restricted within 5 meters. In addition to this, the routers, physically accessible devices and switches are considered as telecommunications elements.
A.4. Transmission media and connecting devices
The transmission of information and data involved within the network architecture are managed with the help of cabling options and telecommunication’s industrial standards involved within the network architecture (Eckhoff & Sommer, 2014). RJ-45 connector is used for making connections between the end cables. In addition to this, pin 1 and 2 of this RJ-45 jack are used for sharing files and packages and information within the network architecture.
In contrast with these facts, the connection of different devices includes copper cables are mainly used for connecting devices and crossover cables for data transfers involved within the network architecture.
A.5. IP and DNS management
IP data management system is nothing but the proper setting of IP and DNS activities that are managed with respect to various functional and non-functional aspects involved within the system architecture of the network architecture. IP is mainly required for recognizing the devices and functional elements involved within the system architecture (Glaser et al., 2015). In contrast with these facts, the IP addresses are used for scheduling schemes and functional ads for managing significant development of number of host devices involved within the network architecture. The automated software applications are used for managing the system architecture.
B. Existing Technology Solutions
B.1 LoRaWANAccording to Bankov, Khorov and Lyakhov (2017), LoRaWAN can be defined as the media access control protocol that is used for wide area networks. The design is made for allowing low powered devices for communicating over the long range wireless connections with the help of Internet connected applications. The LoRaWAN can be mapped to the second and third layer present in the OSI model of network communication. There are three types of devices that can be used for LoRaWAN specifications in Sunshine Coast Council such as Class A, Class B, and Class C. The class A is a bidirectional communication method that can be used as a gateway for communication. The uplink and the downlink messages of the network can be randomly sent through the channel. LoRaWAN specification would be targeted for the development of the organization and improvement of the network communication. The communication between end to end devices is easily managed by the use of frequency channels and data rates. The uplink and the downlink messages of the system can be arbitrarily sent through the channel. LoRaWAN determination would be focused for the advancement of the association and change of the system correspondence (Michelusi & Levorato, 2016). The correspondence between end to end gadgets is effectively overseen by the utilization of recurrence channels and information rates.
B.2 OpenIoTAs opined by Soldatos et al. (2015), OpenIoT can be explained as the cloud based support and development of the sensor clouds that are developed for the development of the open source middleware for assisting the information gathering by the use of the sensor cloud connections. The deployment of the smart implementation model would be helpful for forming the improved modulation and development. OpenIoT can be used simply for the development of the connection with the sensors and the natural way of connection and extension with the IoT solution. The internet of things is a major item for the integration of internet connectivity, service delivery, open IoT, utility models, and cloud computing. The OpenIoT solutions monitor and assist the smart campus, living, and crowd sensing. The primary benefit of using the middleware connectivity of OpenIoT is that it forms ready to use training and academic process. The OpenIoT forms the platform that covers the maximum aspects of the services that are provided by IoT. The OpenIoT arrangements screen and help the keen grounds, living, and group detecting. The essential advantage of utilizing the middleware availability of OpenIoT is that it shapes prepared to utilize preparing and scholarly process (Jayaraman et al., 2016). The OpenIoT frames the stage that covers the most extreme parts of the administrations that are given by IoT.
B.3 Comparison between LoRaWAN and openIoT
The working principle of LoRaWAN and Open IoT are almost similar in all cases and for similar purposes these wireless applications are used LoRaWAN is referred to as a media access control protocol that is used for the wide area network. In order to communicate along with the internet connected applications, over a wide ranged wireless connection. With the second and third layer of OSI network model, the LoRaWAN could be connected. In the industrial, scientific and medical (ISM) radio bands, this WAN could be deployed on the top of FSK or LoRa. The LoRaWAN stack is divided into four different steps including data, MAC pack, Frame module and Regional ISM bands. The data is consists of conversion details and APIs whereas; the MAC packet consists of LoRaWAN, class B and class C extension. Three different kinds of devices could be defined by LoRaWAN specification. It has been found that the class A must be implemented by LoRaWAN devices however; the Class B and Class C devices are the extension of Class A devices.
Based on the type of business and network infrastructure, different tools are used by the enterprises. Open source IoT could lead the network infrastructure towards major success, by following certain steps. It provides open collaboration opportunity to the system developers. In order to understand the specification and requirement for machine to machine service layers, those are embedded within the software and hardware could be developed with the help of openIoT. The entry level barriers could be minimized by using the Open source IoT.
C. Data Processing Facilities
C.1 Data storage solutionThe data storage solutions include the online cloud storage and the tools for managing huge amount of data (Lu et al., 2016). The data storage solutions can be devoted for forming the support to the development of the operations. The data storage would be formed for the development of the incidental development and improvement. The data storage solution includes,
Cloud Services: The cloud services act as the primary development model for the implementation of the storage solution for the Sunshine coast council. As stated by Lu et al. (2016), the cloud services include the Hadoop and Cloudera. The Hadoop is helpful for huge amount of data processing and developing the management of the large amount of the data processing. The cloud based storage is helpful for the integration of the developed storage system. The cloud system in developed for the integration of the existing facilities and formation of the platform independent data storage system.
Data mining and backup: The data mining and backup is a major development factor for the implementation of the improved processes. The integration of the data processing would be developed for the development of the data mining. The data mining is helpful for the integration of the data and forming the support to the implementation of the processes.
C.2 Data processing models
The data processing models are useful for the integration of the network infrastructure and implementation of the developed model. There are the five models that can be used for the integration of the data and developing smarter functions for the operations (Chumak, Serga & Hillebrands, 2014). The following table would evaluate the five models,
Models of Data Processing |
Description |
Multiprocessing model |
The Multiprocessing model is helpful for the processing of the multiple data at a single time |
Multi-programming model |
The Multi-programming model is helpful for the processing of the multiple programs at a single time without affecting the speed of operations |
Batch processing model |
The Batch processing model is helpful for the processing of the large amount of data along with an increment of the efficiency of operations |
Time-sharing model |
The Time-sharing model is helpful for the processing of the data in terms of the time and time frame of operation |
Online processing model |
The Online processing model is developed for the implementation of the processes and deployment of the data availability at the same time |
Conclusion
This can be concluded that development and deployment processes proposed within the network infrastructure segment of this report is highlighting the designs and operational processes of administrators. The functionalities of network administrators are elaborated within this report with respect to organizational data requirements and functional data set management processes. Additionally, the unauthorized accesses has been also highlighted within this report with respect to various functional and fundamental aspects related to telecommunications and management of networking processes and system architecture within organizations. The rights are also elaborated within this report in order to make the key personal responsible for these elaborations. The users need to be careful while operating these data. This report is also focusing on the marketing growth and functional activities of different organizations that are operating on different telecommunication operations involved within organizations.
Recommendation
Security: Security is referred to as one of the most important aspects that are strictly required to be considered by the network developers. While developing such network infrastructure, proper encryption and decryption technologies are required to be considered for securing the system from the external attackers. With the help of encryption none of the unauthenticated users will be able to access information, from the storage server.
Technical co ordination: In order to co-ordinate the technologies properly along with the existing network infrastructure it is necessary to understand and study about the technologies properly so that the issues associated to network infrastructure can be completely mitigated
Hiring expert team: Expert network development team is needed to be hired by the management authority to develop and implement the network system accurately. The technology developers must hire expert team so that the technology oriented issues could be mitigated from the network infrastructure.
References
Al-Mamary, Y.H., Shamsuddin, A. & Abdul Hamid, N.A., (2014). Key factors enhancing acceptance of management information systems in Yemeni companies. Journal of Business and Management Research, 5, pp.108-111.
Al-Mamary, Y.H., Shamsuddin, A. & Aziati, N., (2014). The meaning of management information systems and its role in telecommunication companies in Yemen. American Journal of Software Engineering, 2(2), pp.22-25.
Bankov, D., Khorov, E., & Lyakhov, A. (2017, June). Mathematical Model of LoRaWAN Channel Access. In Proceedings of the IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Macao, China (pp. 12-15).
Bernardos, C.J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L.M., Jin, H.& Zúñiga, J.C., (2014). An architecture for software defined wireless networking. IEEE wireless communications, 21(3), pp.52-61.
Chen, S. & Zhao, J., (2014). The requirements, challenges, and technologies for 5G of terrestrial mobile telecommunication. IEEE Communications Magazine, 52(5), pp.36-43.
Chumak, A. V., Serga, A. A., & Hillebrands, B. (2014). Magnon transistor for all-magnon data processing. Nature communications, 5, 4700.
Eckhoff, D. & Sommer, C., (2014). Driving for big data? Privacy concerns in vehicular networking. IEEE Security & Privacy, 12(1), pp.77-79.
Glaser, M., Rist, C. & Gronostay, B., Unify Gmbh & Co. Kg, (2015). Method for calling up a media file in a telecommunication system, computer program product for executing the method, and telecommunication system for calling up the media file. U.S. Patent Application 14/703,040.
Jayaraman, P. P., Calbimonte, J. P., & Quoc, H. N. M. (2016). The Schema Editor of OpenIoT for Semantic Sensor Networks. arXiv preprint arXiv:1606.06434.
Lu, Y., Wu, W., & Wang, K. Y. (2016). High-Speed Transmission and Mass Data Storage Solutions for Large-Area and Arbitrarily Structured Fabrication through Maskless Lithography. Journal of Electrical and Computer Engineering, 2016.
Michelusi, N., & Levorato, M. (2016). Energy-Based Adaptive Multiple Access in LoRaWAN IoT Systems with Energy Harvesting. arXiv preprint arXiv:1611.04150.
Soldatos, J., Kefalakis, N., Hauswirth, M., Serrano, M., Calbimonte, J. P., Riahi, M., ... & Skorin-Kapov, L. (2015). Openiot: Open source internet-of-things in the cloud. In Interoperability and open-source solutions for the internet of things (pp. 13-25). Springer International Publishing.
Buy ICT220 Telecommunications and Networks : Several Organizations Answers Online
Talk to our expert to get the help with ICT220 Telecommunications and Networks : Several Organizations Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.