The Disadvantages Of Adsl

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Ans: If a person has a basic knowledge of networks and knows the way networks are created as well, he can utilize the resources of the networks in a better way as he knows all the locks and strong points of network, where there is a loophole. He can secure his networks too.

You can place both TCP/IP clients and servers and IPX clients and servers on the same Ethernet network, and each client will talk to its server. How do you think this is possible? Support your answers from the literature. Discussion

Ans: It is very much possible to place both TCP/IP clients and servers and IPX clients and servers. For this purpose, I would have configured TCP/IP and IPX protocol of both clients. I also have to insure that the both clients are on the same subnet mask then it can communicate over either protocol.

What is the most effective network topology and why? Be sure to support your answers. Discussion

Ans: If for reliability, a fully-connected can't be beat. If one part of it goes down, it's fully redundant, and the network will be fine. For practically meeting reliability, I'd say a Mesh. Some redundancy, less cumbersome, easier set up. For practicality, reliability, and cost, star is the only way to go. A real network technician doesn't have a "best" topology. Every network has different needs, and you need to find the topology to meet that need.

Explain the data link layer switch operation. What is the practical importance of this? Support your answer. Discussion

Ans: Layer 2 devices (Bridges and switches) read each frame on the network. Then insert the source MAC address in a filter table and stay tracking the port on which the frame was arrived. Switches and Bridges create logs in the filter table for this information. Routers always find the particular network while switches and bridges always find the particular device. The routing table exists in a router to "map" the internetwork while filter tables exist in the switches and network to "map" the individual devices. Filter table only sends frames to the segment where the destination MAC address is situated. If the destined host is on the same segment like the frame, switch or bridge will prevents the frame to going to any other segments. But if the destination is on another segment, the frame will be transmitted only to that segment. This whole method is called transparent bridging. When an interface of layer 2 device gets a frame with destination MAC address which is not listed in the filter table, it will send that frame to all connected segments. After it, when an unknown host which was sent that frame responds to this sending deed, the layer 2 device (sending device) will update its filter table concerning that host’s position. In this process, the destination address of the transmitting frame is a broadcast address and switch or bridge (layer 2 devices) by default forward all broadcasts to each connected segments.

The major advantage of using switches is that every switch port is a separate collision domain. But the broadcast domain is the same for all ports of the switch or bridge. So they always normally forward all broadcasts instead. The other advantage of the switched LAN above the hubs LAN is that every host on each segment of the switch can transmit at the same time, while the hub never offers this kind of efficient service, because they permit transmission only to one host per network segment at a time.

Identify multiple wireless technologies. Compare them to one another and with Ethernet. Be sure to support your answer. Discussion

Ans: There are several wireless technologies available nowadays which are as following:

Bluetooth

WI-Fi

3G (Third Generation)

Comparison:

In comparison with other wireless technologies, Bluetooth has low cost and low power consumption. It is a radio frequency cable for short distance communication. It has a range of approx 33 meters with a bandwidth of 2.4GHz. Its data transfer rate is approximately 1.5MB per seconds.

On the other hand, WI-Fi or wireless LAN is a network based on series of IEEE specifications named as 802.11. It supports longer communication range, ranging from 100 to 150 feet with a bandwidth of 2.4GHz. It can support data transfer from 11 to 54 MB per seconds.

3G or Third Generation has transformed the wireless communication into real time connectivity and online. 3G supports range all over the globe. It can support bandwidth ranging from 800Mhz to 1900Mhz which is lower as compared to other wireless devices and a data rate of 2 MB per seconds.

Ethernet or Wired LAN is a connection based on two or more computers connected directly via wire. Because of wired connectivity computer needed to be placed close or on same workplace which means less range. It can support 100 GHz bandwidth and data transfer in Giga bits per seconds.

Telephone modems convert analog signals to digital signals and digital signals to analog signals. Codecs convert analog signals to digital signals and digital signals to analog signals. How are modems different from codes? Support your answer. Discussion

Ans: Modem is an electronic device and used for transferring data from one place to another on a digital or analogue medium. Then information is encoded into analogue or digital signals based on the type of communication medium used and then transferred. At receiving end, the received information is decoded and then interpreted.

On the other hand, codecs are softwares that helps computer in understanding digital information in files and presenting it to the user. So codecs are the program that helps the user in understanding information and modems are device which listens and transfer information and interpret it.

Several Internet access systems are asymmetric, with higher downstream speeds than upstream speeds. What are the benefits and disadvantages of such a system? How will you know whether this is good for your system? Support your answer. Discussion

Ans: Asymmetric systems have higher downstream than upstream speed, such type of connections is very much suitable for Internet consumers who need to download files rapidly, but they don't really need to upload files too often or faster.

Benefits:

ADSL is especially suited for gamers and streaming multimedia and downloading huge files.

ADSL is an "always on" service, means it automatically stays connected as long as your system is powered on, unless the connection is manually disconnected via software or hardware.

ADSL doesn’t require the use of a second phone line.

ADSL provides affordable broadband access.

Disadvantages of ADSL:

The location of the subscriber should remain within the boundaries of 5km from the telephone exchange, the greater the distance, the lesser will be the speed.

The user cannot upload the large file quickly.

Reason:

ADSL is much better because of the reasons;

It is cheaper than others.

 You can hold phone conversations without needing a separate line.

ADSL is ideal for most of the homes and middle level business firms, where they have to download much more data as compared to uploading.

For security reasons, many organizations do not allow error reply messages to leave their internal internets. How, specifically, could hackers use information in echo reply messages to learn about the firm's internal hosts? Does the same thing apply to ping requests? Support your answer. Discussion

Ans: Many organizations do not allow error reply messages to leave their internal internets because the hackers are always searching for vulnerabilities. When they found any, they exploit it and generate the error reports so that they can get the internal information of the system. It is better not displaying the echo messages, as due to these echo messages hacker could get to know that the system is being hacked or not. The errors are produced in special conditions such as:

The network is inaccessible: this error would help map the network.

The host is inaccessible: would show what hosts are online

Protocol inaccessible: shows what protocols are supported

Port inaccessible: some servers would indicate through this error message that no process is listening on that port

The datagram is too vast: would show what technology is used in the network

ICMP error messages are not usually involved in directly attacking the network but would help an attacker apprehend more about the network and know how and where to attack it. So this information should not leave the network because it should not be accessible to people outside the network. PING is an application of ICMP.

While there are many commercially available tools for managing your network, what are five (5) tools for network management that are available through open source/freeware/shareware that you would recommend. Provide a justification for why that tool was chosen and what purpose it would serve. (What information will you gain from each tool and what will you do with that information?) Essay 

Ans:

NetXMS

It’s an open source project runs on both windows and Linux. SNMP is used as well as Linus or windows agents. It also automatically discovers network nodes. The installation process is much easier as compare to other available softwares. It supports a broad range of databases like MySQL, MS SQL and SQLite etc and unified web based user interface.

OpenNMS

OpenNMS is also Open Source Solution build on Java, PostgreSQL and Tomcat. It is the oldest one available and is also free. It can be used for a large number of IP hosts. Basic network monitoring is quite easy. It also provides ICMP response time monitoring.

Groundwork Monitor

It is an open source network monitoring system built around PHP and Apache. Nagios and NMap are also wrapped up with it. It supports lots of agents, provides commercial support and active development.

Nagios

Free open source network solution implemented by the largest number of users. A Linux based solution which provides the much powerful agents as compare to others.

HP OpenView

It is a De-facto Standard. Usually, it is deployed in large heterogeneous IT infrastructures. It is very powerful with lots of available add-ons.

What is the best form of authentication? Why? Support your answer from the literature. Discussion

Ans: The best authentication technique is the usage of biometric devices that require the verification of biological or behavioral actions. Biometric devices can analyze fingerprints, faces, hand figures, irises, retinas, handwriting and voice. The reason why biometric is the best form of authentication is that the biometric is difficult to replicate any other person’s retinal pattern or voice, as a result the information is protected from invaders. It is also easy to use, as there is no need to remember any passwords or personal identification numbers.

What role does strategic management play in network management? Why? How does one go about it? Support your answer. Discussion

Ans: Strategic management plays a pivotal role in network management, because network management denotes to the broad subject of handling computer networks. There are a wide variety of hardware and software  products that assist network administrators in managing a network. Network management includes these areas, including Security, Performance and Reliability. Strategic management guides that how, why and what technology product should be used or implemented in order to get a long term reliability and benefits. While designing the networks, one should know the aims of their organization like whether they want to gain the market share or whether they want to set the monopoly in the market etc. If the firm has a clear vision, aims and objectives then they can make a much more accurate strategies.

What is cloud computing? How does that relate to Software as a Service (SaaS)? Service oriented architecture (SOA)? Simple Object Access Protocol (SOAP)? Support your answer. Discussion

Ans: Cloud computing are the services or applications which are available to users with an Internet connection. It has brought a change in how systems are developed, how the resources are organized and in the ways of delivering services.

(Ref. Introduction to Cloud Computing and Security- Securing the Cloud, 2011, Pages 1-27 - Vic (J.R.) Winkle)

Cloud computing is a subscription based services available over the internet. For example your email clients like Gmail, hotmail and yahoo, where these services available to take care of all your emails over the internet. You don’t have to have all those emails in your personal computers.

The concept of software as a service is one in which the user is able to use the some required service provided at cloud infrastructure, through web browsers. E.g. web-based email, games etc. The user does not have the rights to control, manage or change the cloud infrastructure like the OS, servers, network settings/details, preferences etc.

Software as a service is a refinement, a hierarchical view of the cloud. It uses Service oriented architecture (SOA) to describe high level services provided on a cloud. SOA is encouraged to be used by organizations if they are moving toward cloud computing. SOAP is a protocol for communication between clients and cloud services.

(Ref. A reference model for developing cloud Applications - Mohammad Hamdaqa, Tassos Livogiannis and Ladan Tahvildari )

Is Software as a Service a secure mechanism for software acquisition? Why or why not? Be thorough in your answer and provide substantive support. It might help to think of this in terms of a specific company or class of companies. Essay

Ans: Software as a Service (SaaS) has the potential to transform the way information-technology (IT) departments relate to and even think about their role as providers of computing services to the rest of the enterprise. The emergence of SaaS as an effective software-delivery mechanism creates an opportunity for IT departments change their focus from deploying and supporting applications to managing the services that those applications provide. A successful service-centric IT, in turn, directly produces more value for the business by providing services that draw from both internal and external sources and align closely with business goals.

Understanding SaaS

Simply put, SaaS can be defined as "software deployed as a hosted service and accessed over the Internet." SaaS as a concept is often associated with the application service providers (ASPs) of the 1990s, which provided "shrink-wrap" applications to business users over the Internet. These early attempts at Internet-delivered software had more in common with traditional on-premise applications than with modern SaaS applications in some ways, such as licensing and architecture. Because these applications were originally built as single-tenant applications, their ability to share data and processes with other applications was limited, and they tended to offer few economic benefits over their locally installed counterparts.

Today, SaaS applications are expected to take advantage of the benefits of centralization through a single-instance, multi-tenant architecture, and to provide a feature-rich experience competitive with comparable on-premise applications. A typical SaaS application is offered either directly by the vendor or by an intermediary party called an aggregator, which bundles SaaS offerings from different vendors and offers them as part of a unified application platform.

In contrast to the one-time licensing model commonly used for on-premise software, SaaS application access is frequently sold using a subscription model, with customers paying an ongoing fee to use the application. Fee structures vary from application to application; some providers charge a flat rate for unlimited access to some or all of the application's features, while others charge variable rates that are based on usage.

On the technical side, the SaaS provider hosts the application and data centrally—deploying patches and upgrades to the application transparently, and delivering access to end users over the Internet through a browser or smart-client application. Many vendors provide application programming interfaces (API) that expose the applications data and functionality to developers for use in creating composite applications. A variety of security mechanisms can be used to keep sensitive data safe in transmission and storage. Application providers might provide tools that allow customers to modify the data schema, workflow, and other aspects of the application's operation for their user.

Benefits of Consuming SaaS

Of course, just because you can add SaaS to your IT infrastructure is not by itself a reason to do it; there has to be a viable business reason, too. SaaS offers substantial opportunities for organizations of all sizes to shift the risks of software acquisition, and to move IT from a reactive cost center to being a proactive, value-producing part of the enterprise.

Managing the Risks of Software Acquisition

Traditionally, deploying large-scale business-critical software systems, such as ERP and CRM application suites, has been a major undertaking. Deploying these systems across a large enterprise can cost hundreds of thousands of dollars in upfront licensing cost, and usually requires an army of IT personnel and consultants to customize and integrate it with the organization's other systems and data. The time, staff, and budget requirements of a deployment of this magnitude represent a significant risk for an organization of any size, and often puts such software out of the reach of smaller organizations that would otherwise be able to derive from it a great deal of utility.

The on-demand delivery model changes some of these. SaaS applications don't require the deployment of a large infrastructure at the client's location, which eliminates or drastically reduces the upfront commitment of resources. With no significant initial investment to amortize, an enterprise that deploys a SaaS application that turns out to produce disappointing results can walk away and pursue a different direction, without having to abandon an expensive on-premise infrastructure.

Additionally, if custom integration is not required, SaaS applications can be planned and executed with minimal effort and roll-out activities, creating one of the shortest time-to-value intervals possible for a major IT investment. This has also made it possible for a number of SaaS vendors to offer risk-free (and often literally free) "test drives" of their software for a limited period, such as 30 days. Giving prospective customers a chance to try the software before they buy it helps eliminate much of the risk surrounding software purchase.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now