0
Telecommunications in Information Systems
Student Name
Student Details
University Details
1
Table of Contents
Answer 1 …
Preview text
0
Telecommunications in Information Systems
Student Name
Student Details
University Details
1
Table of Contents
Answer 1. ………………………….. ………………………….. ………………………….. ………………………….. … 2
Answer 2. ………………………….. ………………………….. ………………………….. ………………………….. … 3
Answer 3. ………………………….. ………………………….. ………………………….. ………………………….. … 3
Answer 4. ………………………….. ………………………….. ………………………….. ………………………….. … 4
Answer 5. ………………………….. ………………………….. ………………………….. ………………………….. … 5
References ………………………….. ………………………….. ………………………….. ………………………….. .. 7
2
Answer 1.
Hub
Hub is an integral part of a network system where it is a physical layer of networking
device that has been used for connecting the multiple devices into a common network
(Javatpoint, 2022) . Hubs are generally used for establishing con nections in the computers
through LAN which has many ports to intend the communication between two networks. Hub
resides in layer 1 of the OSI model
Bridge
A bridge is an interconnection of computer networks that provides an interconnection
between other networks that have been using the same protocol. It works as a data link layer
which will provide communication between two devices where it resides in layer 2 of the OSI
model.
Switch
A switch is a device that has been used for connecting the different types of devices
such as computer, printer, and wireless access points where they are interrelated with each
other and allows each other to talk to each other by exchanging the data packets and it also
resides in layer 2 of OSI model through providing data link.
Router
A router is a digital device that has been used for establishing the connection between
two or more packet -switched networks (Cloudflare, 2022) . The principle of a router is mainly
related to managing traffic bet ween one network to another. The router helps in establishing
the network between two systems by creating a local area network ( LAN) system. In the OSI
model router reside in the third layer of the network control layer.
Firewall
A firewall is a network security device that will evaluate analyze , monitor, and filters
incoming and outcoming traffic which has been based on security policies . The firewall
resides in layer 3 or 4 of the network wherein layer 3 is combined with the network layer and
layer 4 is combined with the transport layer.
3
Answer 2.
VPN stands for Virtual private network where it is mainly used for protecting the
personal information which a user doesnâ€t want to share with someone else (Kaspersky,
2022) . It p rotects by masking the IP address of the device where it provides encryption to
data and routing it through the combination of secured networks. VPN hides the online
identity of its users by providing their data security by assuring the user that the inter net
access is secured for them.
Software VPN device
A software VPN device is a software application that has been a downloadable device
for personal computers which will create a VPN service hosted through a third -party facility
(Turan et al., 2016) . It will provide a visual interface for establishing secured and encrypted
connections. The primary example of software device is Pulse, Cisco connects, and many
more .
Hardware VPN device
A Hardware VPN device is a physical device that allows you to create and develop a
private network from outside the edge of that network where it includes its processor,
capabilities, and system which has been used as a network system. The primary example of
the hardware device is Pac star 455, 451, 551, and many more .
VPN works through establishing a system and network between the user and the
internet where through VPN data traffic is routed encrypted through the virtual tunnel. It
works like a filter that turns out the data into “gibberish” where it acts as the intermedi ary of
sorts by hiding the IP address from the service provider. The primary purpose behind using
VPN is to hide an online presence that is accessible to a third party. The primary downsides
of using a VPN are as follows –
ï‚· Its slowdowns the network connecti on.
ï‚· Website block for VPN users.
ï‚· Sell browsing data to third parties.
Answer 3.
Wireless standards are a set of well -defined services and protocols that will identify
how a wi -fi network system acts during the transmission of the data. The four types of
wireless technologies/standards are as follows –
4
802.11ax
It is the most popular wireless standard system which has been a new standard
operating operation in both the 2.4 and 5GHZ spectrum (Atkinson, 2017) . It is implemented
wi th a hardware chip that is fully backward and compatible with different types of Wi -fi
standards.
802.11ay
It is a technical update of the previous network system which includes high –
performance wireless technology for developing a secure network where it operates on the
frequency of 60GHZ range .
IEEE 802.11ah
It is a modern implication where it is useful for establishing a connection between a
wide range of networks through connecting tons of IoT sensors (Electronics -notes, 2022 ).
The primary advantage of this wireless network is that it supports the dense deployment of
IoT sensors.
802.11af
This wireless technology is also known as the name of super wi -fi system through
providing white space frequencies that have been main ly used for achieving a wide range of
wireless connections in those areas where network systems are weak .
802.11ax is different from others because it operates in both ranges 2.4GHZ and
5GHZ with high range adaptation with creating more channel s. 802.11a y operates on a
frequency of 60GHZ with an area of 300 to 500 meters for the extended transmission
whereas IEEE 802.11ah is a sub GHZ standard that utilizes the exemption of ISM bands
through longer -range connectivity. 802.11af is mainly designed for opera ting the traditional
wi -fi network using the latest developments. The most effective network is IEEE 802.11ah
because it provides wide coverage in the network.
Answer 4.
In general, terms cloud computing is the delivery of computing services that primarily
includes storage space, server, database, networks, intelligence, and many more components
on internet space which is generally called cloud space (Sadiku, Musa & Momoh, 20104) .
The primary advantages of cloud computing are as follows –
5
ï‚· It provide s a high range of security for its users by providing a combination of
modern technologies.
ï‚· It improves the performance of worldwide networks by improving productivity and
speed by providing self -service to its user.
IaaS
It is known as infrastructure as a service model which will provide cloud computing
services through providing storage, networking, and many more things on -demand where it
has been used for managing remote center data infrastructure (Manvi & Shyam, 2014) . This
model is mainly used when th e user wants to control a high -performing application.
PaaS
Platform as a service is a cloud -based platform that provides the advantage to the
large organizations to manage and run their applications more effectively without developing
IT infrastructure. It is mainly used for solving and managing complex platforms where it
offers an array that is mainly developed to help businesses in dealing with a complex tasks.
The primary example of PaaS is the testing of the software.
SaaS
Software as a service model that provides direct access to the user through utilizing a
web browser without the implication of any software application . I. It is a software license
model which will provide the access to users through subscription -based external services.
The primary example of SaaS is salesforce.
Answer 5.
IoT stands for Internet of things where it is defined as the combination and network of
physical things that have been combined with modern technologies such as sensors, software,
and many more things (Shafique et al., 2020) . The primary function of I oT is that it has been
use d for connecting and exchanging the data between two devices to develop a system of the
internet. It is a system of interrelated devices that will provide unique identifiers which can
share the data from one medium to another medium more frequently where it works through
a biochip transponder . The various issues with IoT are as follows –
ï‚· The primary is sue is related to the security of the user data because it will provide
incorrect access control to the user.
6
ï‚· Lack of data encryption (Langkemper, 2022) .
ï‚· Vulnerabilities in applications with insufficient privacy protection.
ï‚· In-effective physical security with less user interaction.
Yes, IoT is the wave of the future because it has the potential to be limitless through
advancing the internet services where it improves network agility by providing integrated AI
system which will help in improving the performance of the internet system. In the future is a
key success factor for remotely via voice commands with a simple click. It is more applicable
in for the business units for the effective implication of their strategies.
IoT is a completely changing factor for the internet because it automates the process
of connecting more effectively by providing access to the user for monitoring the data more
effectively. It will create and develop an advanced level of internet ecosystem that will find
new technologies such as 5G, software development, and ML.
7
References
Atkinson, D. (2017). Four Wireless Standards Youâ€ll Want to Watch in the Next Few Years .
https://solutionsreview.com/wireless -network/four -wireless -standards -youll -want -to-
watch -in-the -next -few –
years/#:~:text=802.11ax,compatible%20with%20previous%20WiFi%20standards.
Cloudflare. (2022). What is a router? https://www.cloudflare.com/en -in/learnin g/network –
layer/what -is-a-router/
Electronics -notes. (2022). IEEE 802.11ah: sub GHz Wi -Fi . https://www.electronics –
notes.com/articles/connectivity/wifi -ieee -802 -11/802 -11ah -sub -ghz -wifi.php
Javatpoint. (2022). What is the hub? https://www.javatpoint.com/hu b
Kaspersky. (2022). What is VPN ? How it works, types of VPN .
https://www.kaspersky.com/resource -center/definitions/what -is-a-vpn
Langkemper, S. (2022). The Most Important Security Problems with IoT Devices .
https://www.eurofins -cybersecurity.com/news/sec urity -problems -iot -devices/
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of network and computer
applications , 41 , 424 -440.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and
challenges. IEEE potentials , 33 (1), 34 -36.
Shafique, K., Khawaja, B. A., Sabir, F., Qazi, S., & Mustaqim, M. (2020). Internet of things
(IoT) for next -generation smart systems: A review of current challenges, future trends
and prospects for emerging 5G -IoT scenarios. Ieee Access , 8, 23022 -23040.
Turan, F., De Clercq, R., Maene, P., Reparaz, O., & Verbauwhede, I. (2016). Hardware
Acceleration of a Software -based VPN. In 2016 26th International Conf erence on
Field Programmable Logic and Applications (FPL) (pp. 1 -9). IEEE.