This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Communication

Technology advancement in communication

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Technology advancement in communication

Part A

Technology advancement in communication has created the general idea of a global village. Currently, communication around the globe appears cheaper, faster and more reliable; all thanks to the existence of communication networks. Communication networks exist differently and apply to different levels of communication (Kermarec et al. 2015). Most communication networks define themselves by the geographical areas they cover, interconnections and their modes of operation.

An example of the different networks that this assignment works to explain is the Wide Area Network, in most cases abbreviated as WAN. A vast area network is one of the telecommunication networks and interconnects computers over a large geographical area. The area covered by a vast area network includes a radius of approximately not less than one kilometre. An extensive area network commonly applies in businesses, educational institutions and government entities to relay data and information to their clients or partners, students or employees and citizens respectively over extended geographical positions. The internet itself is an example of an extensive area network as it connects computers over a large geographic area; in this case, the globe.

Don't use plagiarised sources.Get your custom essay just from $11/page

For operation, different telecommunication networks require different topologies. A network topology is the arrangement of nodes interconnecting computers within the system. The nodes are the peripheral devices needed for the interconnected computers to share information and data among themselves. Nodes may include switches and routers which form hubs and transmission lines for data packets as they flow within the computer network. The network topology may either categorize on either its physical layout or logical layout. The physical design is accounted for by physical interconnections of wires while the logical layout of the network refers to the relationship between the nodes and a predefined logical arrangement.

Just like any other telecommunication network, a Wide Area Network presumes a given network topology.

While other network topologies may apply in a Wide Area Network, a more comprehensive area network may use different network topologies depending on the organization’s needs, its constraints and capabilities. An extensive area network may use the star topology, full mesh topology, half mesh topology or the ring topology. In the star topology, there exists a central hub from where each side of the network connects, thus forming a star (Masala, Ruiu & Grosso, 2018). The star topology may be expensive in an extensive area network as there is a lot of hardware required. A failure of the single central hub affects the whole system, which makes it less considered in a wide area network.

For the mesh topology, every device on the network connects. In a wide area network, optical cables are used most of the time to connect devices. Combining all the tools in a wide net will mean a high cost of acquiring and laying the connecting lines hence the mesh topology is used, but not frequently, in a wide area network (Symoens, 2000). The ring topology is the most used for extensive area networks. Each site is connected to two other places in the WAN to form a ring. The ring topology enables the router in the WAN to redirect data packets in case a path is busy. A single cable problem doesn’t affect the whole network hence making ring topology a good option for WANs.

For penetration testing in a WAN, the hacker may have some little knowledge about the network and apply the partial knowledge test or have no clue to the network’s loophole and use the zero-knowledge test where he/she starts off the ethical hacking process from scratch. The best practice for securing a WAN requires users of the WAN to connect through a Virtual Private Network. With this, even a hacker with partial knowledge test may find it hard to ethically hack the internet since no path of the network’s use is recorded by any user.

 

Part B

Reflection

A study of the outline of telecommunications as a course has proved to be a defining field as most operations across the globe are becoming digitalized. A review of telecommunications, on network types, is set to enable the learner to decide on the most appropriate network type to use according to the business’ needs and constraints. Knowledge gained on network types is set to enable the learner to understands network concepts and have a full grasp of the full functionality of the different network types. Skills from the telecommunications course are set to enable the learner to design an appropriate network model based on the organization’s requirements.

The knowledge and skills gained are also beneficial to help the learner offer consultancy and decide, on behalf of an institution or business, the most appropriate network model to use after a study of their activities. A survey of network topologies is also of much importance to a learner handling any given network model and troubleshooting to correct errors in the network. A study of network models drives a learner into studying accompanying network topologies. In examples, a review of WAN empowers the learner to organize a functional network model in their desired work environment. A case is as demonstrated in the next diagram.

 

The diagram above provides a sample of how a WAN or LAN connection of computers in an organization may be beneficial. In the description, the machines appear interconnected, and information can efficiently operate within an organization to its clients outside and within the institution itself.

A study of network topologies enables the learner to understand and give importance to choosing the right network topologies after determining which network model to implement. The knowledge on network topologies enables a learner define which cabling design to use in any given network topology (Mell & Grance, 2011). For example, in a bus topology, knowledge from the telecommunications course aids a learner to understand and economise on operational costs and subsequent maintenance costs in any network topology. For a topology requiring interconnection for every device in the network, like a star topology, knowledge from the course is set to do the learner good in laying and maintaining the connections to keep the network instability. The learner easily troubleshootstroubleshoots and determine a hitch in the relationship,, which affects a part of the whole network.

The course also shapes the learner to understand the nodes and resources in a network. This knowledge arms the learner with the ability to scrutinize every resource in the system and to ensure they are in perfect condition. Knowledge from the telecommunications course also aids the learner has skills in cybersecurity and network security. The experience enables them to identify and block any penetration testing approaches and devise the most appropriate practice of testing to secure the network. An observation I made confirms the vulnerability of most local area networks and wide area networks. After designing and building networks, most technicians left out the vital after – service role of maintaining the system; especially security-wise. Most LANs and WANs are vulnerable to penetration testing. This case can become averted by the knowledge and skills gained from this telecommunications course.

 

 

 

 

 

 

 

References

Kermarec, F., Lamberton, M., Tate, M., & Mouque, E. (2015). U.S. Patent No. 9,065,680. Washington, DC: U.S. Patent and Trademark Office.

Masala, G. L., Ruiu, P., & Grosso, E. (2018). Biometric authentication and data security in cloud computing. In Computer and Network Security Essentials (pp. 337-353). Springer, Cham.

Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.

Symoens, J. (2000). Preparing Exchange for high availability. InfoWorld22(15), 60-62.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask