189 - COMPUTER NETWORK
VerifiedAdded on  2023/04/04
|16
|4321
|231
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Computer Networks
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
ABSTRACT ....................................................................................................................................3
BACKGROUND ............................................................................................................................4
ADVANTAGES .............................................................................................................................5
DISADVANTAGES .......................................................................................................................6
LEGAL AND ETHICAL ISSUES..................................................................................................6
CONCLUSIONS .............................................................................................................................6
POSTER ..........................................................................................................................................7
PORTFOLIO ...................................................................................................................................7
REFERENCES................................................................................................................................9
ABSTRACT ..................................................................................................................................10
BACKGROUND ..........................................................................................................................11
ADVANTAGES ...........................................................................................................................12
DISADVANTAGES .....................................................................................................................12
LEGAL AND ETHICAL ISSUES ...............................................................................................13
CONCLUSION .............................................................................................................................13
POSTER ........................................................................................................................................14
PORTFOLIO .................................................................................................................................14
REFERENCES..............................................................................................................................16
2
ABSTRACT ....................................................................................................................................3
BACKGROUND ............................................................................................................................4
ADVANTAGES .............................................................................................................................5
DISADVANTAGES .......................................................................................................................6
LEGAL AND ETHICAL ISSUES..................................................................................................6
CONCLUSIONS .............................................................................................................................6
POSTER ..........................................................................................................................................7
PORTFOLIO ...................................................................................................................................7
REFERENCES................................................................................................................................9
ABSTRACT ..................................................................................................................................10
BACKGROUND ..........................................................................................................................11
ADVANTAGES ...........................................................................................................................12
DISADVANTAGES .....................................................................................................................12
LEGAL AND ETHICAL ISSUES ...............................................................................................13
CONCLUSION .............................................................................................................................13
POSTER ........................................................................................................................................14
PORTFOLIO .................................................................................................................................14
REFERENCES..............................................................................................................................16
2
Title 1: Hardware I/O and external storage, Cloud computing at OS aspects
ABSTRACT
Computer optimisation is a process which was initiated right from the invention of this
device. Information became an existing entity and very significant for those working with large
volumes of the same. Customer relationship management business is completely based on
operations like storage, transferring and managing information related with consumers and
customers. Cloud computing and strong hardware have enabled businesses to gain more control
over their operations through effective data management and customer relations. The expansion
of storage facilities from physical devices to clouds has changed the functionality of operating
systems. Hardware input and output was traditionally performed through mouse, keyboards and
printers. Currently Haptic sensors are used for the input i.e. through touch or sensitive
connection with the human body.
A great transition has taken place in the external storage capabilities of the computer with
help of internet and cloud computing. The legal and ethical issues related with privacy and
sharing of data are always considered as a point of risk for the businesses. Loss of privacy
indicates that misuse of information can take place which further leads to exploitation. Apart
from various advantages, there is a significant drawback of security threat when cloud computing
operating systems are considered. Furthermore, the control and flexibility for users is reduced as
the architecture or design infrastructure has certain limitations. It can be said that with effective
use of cloud computing technologies, customer relationship management operations can be
effectively executed.
3
ABSTRACT
Computer optimisation is a process which was initiated right from the invention of this
device. Information became an existing entity and very significant for those working with large
volumes of the same. Customer relationship management business is completely based on
operations like storage, transferring and managing information related with consumers and
customers. Cloud computing and strong hardware have enabled businesses to gain more control
over their operations through effective data management and customer relations. The expansion
of storage facilities from physical devices to clouds has changed the functionality of operating
systems. Hardware input and output was traditionally performed through mouse, keyboards and
printers. Currently Haptic sensors are used for the input i.e. through touch or sensitive
connection with the human body.
A great transition has taken place in the external storage capabilities of the computer with
help of internet and cloud computing. The legal and ethical issues related with privacy and
sharing of data are always considered as a point of risk for the businesses. Loss of privacy
indicates that misuse of information can take place which further leads to exploitation. Apart
from various advantages, there is a significant drawback of security threat when cloud computing
operating systems are considered. Furthermore, the control and flexibility for users is reduced as
the architecture or design infrastructure has certain limitations. It can be said that with effective
use of cloud computing technologies, customer relationship management operations can be
effectively executed.
3
BACKGROUND
Computers have certain components which together help in processing the inputs and
outputs provided by users. Operating systems and hardware devices are integral part of this
computer system irrespective of the mode of operation. Operating system (OS) is like an
administrator that handles hardware and software applications and also contributes to common
services associated with computers. Few years back, individuals just used to dream of having a
system which could be operated with bare hands i.e. without the use of any peripheral device
(Arora, Parashar and Transforming, 2013). Nowadays, this dream is reality. From smartphones
to desktops and every computer systems, everything is manageable by Haptic sensors.
Furthermore, the smart technology has also led to developments in the ways in which data or
information can be stored. The external devices that are prominently used include hard drives
and pen drives with different storage capabilities. Apart from these storage devices, internet
based platforms have also emerged recently. Amongst these cloud computing is the renowned
when it comes to computer based sharing of information (Jadeja and Modi, 2012).
I/O hardware or devices require human beings as the operator. They are not automated
and are completely based on manual functioning. The computer receives and interprets the
information which is fed through these devices. Modem, SD Card, USB Thumb drives, digital
cameras, etc. are some other I/O devices which enable both storage of information and effective
communication with the computerised system. The operating system is made compatible with
these devices by using device drivers (Zissis and Lekkas, 2012). These are software based
programs that have codes which enable smooth functioning of every external device that is being
in-tact with the computer. Operating system aspects of cloud computing include the
compatibility and accessibility for the users in different operational areas.
The basic models of cloud computing include three types of services i.e. SaaS, PaasS and
IaaS with expanded forms as Software as a Service, Platform as a Service and Infrastructure as a
Service. Web browsers, application development programs and languages and the resources
which are applied for build up of these services are quite important for the developer. From the
past 5-6 years, there is a sudden growth or emergence in the adaption of cloud computing aspects
by business organisations (Wei and et. al., 2014). The ease and convenience which is gained by
4
Computers have certain components which together help in processing the inputs and
outputs provided by users. Operating systems and hardware devices are integral part of this
computer system irrespective of the mode of operation. Operating system (OS) is like an
administrator that handles hardware and software applications and also contributes to common
services associated with computers. Few years back, individuals just used to dream of having a
system which could be operated with bare hands i.e. without the use of any peripheral device
(Arora, Parashar and Transforming, 2013). Nowadays, this dream is reality. From smartphones
to desktops and every computer systems, everything is manageable by Haptic sensors.
Furthermore, the smart technology has also led to developments in the ways in which data or
information can be stored. The external devices that are prominently used include hard drives
and pen drives with different storage capabilities. Apart from these storage devices, internet
based platforms have also emerged recently. Amongst these cloud computing is the renowned
when it comes to computer based sharing of information (Jadeja and Modi, 2012).
I/O hardware or devices require human beings as the operator. They are not automated
and are completely based on manual functioning. The computer receives and interprets the
information which is fed through these devices. Modem, SD Card, USB Thumb drives, digital
cameras, etc. are some other I/O devices which enable both storage of information and effective
communication with the computerised system. The operating system is made compatible with
these devices by using device drivers (Zissis and Lekkas, 2012). These are software based
programs that have codes which enable smooth functioning of every external device that is being
in-tact with the computer. Operating system aspects of cloud computing include the
compatibility and accessibility for the users in different operational areas.
The basic models of cloud computing include three types of services i.e. SaaS, PaasS and
IaaS with expanded forms as Software as a Service, Platform as a Service and Infrastructure as a
Service. Web browsers, application development programs and languages and the resources
which are applied for build up of these services are quite important for the developer. From the
past 5-6 years, there is a sudden growth or emergence in the adaption of cloud computing aspects
by business organisations (Wei and et. al., 2014). The ease and convenience which is gained by
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
institution when considering the transfer of information and data handling has led to greater
inclination towards cloud computing.
Hardware and external device manufacturing cost has reduced significantly because of
these infrastructural features. The I/O devices or peripherals which are implemented in the
computing systems transmit the information from user's end to computer processor. It interprets
this command or information in terms of computer based language. The output of the command
is witnessed in the form of display on the monitor or the respective screen. The operating system
of this computer system has to be compatible with cloud computing so that in case of quick
transfer of information, the input can be transferred from through these particular devices (Jadeja
and Modi, 2012). Touchpad or trackpad is also a pointing device which transmits or interprets
the information from user to computer.
ADVANTAGES
The operating system acts as the administrator of resources, memory or the input/output
devices. The hardware devices and external storage are like complementary devices which
enhance the basic operations of the system. Common individuals cannot input the commands and
instructions which are required for initiating a process. This ease of communication has been
achieved with help of I/O devices. On the other hand, cloud computing has enabled the vision of
storing large volumes of information at just one place without actually acquiring physical spaces.
The centralised host server brings in more administration and efficient management (Arora,
Parashar and Transforming, 2013). Especially multinationals and large scale enterprises have
experienced great benefits after the adoption of cloud computing systems.
External storage devices like pen drives, hard drives, etc. are portable. Users have the
facility of taking their stored information in the form of these devices to different places without
gathering resources or worrying about the maintenance costs. Cloud computing and
compatibility with different operating systems has helped reducing the costs which are involved
in purchase of external storage devices (Jadeja and Modi, 2012). The information stored or
uploaded over a crowd is directly accessed by the individual irrespective of their place or mode
of operation. Being an internet based application, there are no risks involved in transportation of
cloud or the information in physical form.
5
inclination towards cloud computing.
Hardware and external device manufacturing cost has reduced significantly because of
these infrastructural features. The I/O devices or peripherals which are implemented in the
computing systems transmit the information from user's end to computer processor. It interprets
this command or information in terms of computer based language. The output of the command
is witnessed in the form of display on the monitor or the respective screen. The operating system
of this computer system has to be compatible with cloud computing so that in case of quick
transfer of information, the input can be transferred from through these particular devices (Jadeja
and Modi, 2012). Touchpad or trackpad is also a pointing device which transmits or interprets
the information from user to computer.
ADVANTAGES
The operating system acts as the administrator of resources, memory or the input/output
devices. The hardware devices and external storage are like complementary devices which
enhance the basic operations of the system. Common individuals cannot input the commands and
instructions which are required for initiating a process. This ease of communication has been
achieved with help of I/O devices. On the other hand, cloud computing has enabled the vision of
storing large volumes of information at just one place without actually acquiring physical spaces.
The centralised host server brings in more administration and efficient management (Arora,
Parashar and Transforming, 2013). Especially multinationals and large scale enterprises have
experienced great benefits after the adoption of cloud computing systems.
External storage devices like pen drives, hard drives, etc. are portable. Users have the
facility of taking their stored information in the form of these devices to different places without
gathering resources or worrying about the maintenance costs. Cloud computing and
compatibility with different operating systems has helped reducing the costs which are involved
in purchase of external storage devices (Jadeja and Modi, 2012). The information stored or
uploaded over a crowd is directly accessed by the individual irrespective of their place or mode
of operation. Being an internet based application, there are no risks involved in transportation of
cloud or the information in physical form.
5
DISADVANTAGES
The computer is completely based on the central processing unit and its dimensions. I/O
devices which are considered in hardware category have to be linked or associated with this unit
so that respective information can be easily transferred or communicated. The need of efficient
peripherals was recognised when there is no medium to communicate or transfer the commands
by user. The computer has to be provided some sort of instruction in a particular medium. Be it
touch or through keyboard or mouse (Ren, Wang and Wang, 2012). This instruction is further
interpreted to get the coded message. This often creates a delay in getting output and hence there
is a drawback assessed. The hardware or I/O devices have to be made efficient enough in
reducing the operational run time.
Cloud computing systems also have some disadvantages which have been depicted as
follows:
ï‚· Security and privacy is hindered when the platform undergoes downtime or outage.
ï‚· Resources and links which are associated with the cloud are like gateways for hackers
and breachers to get desired information after hacking security walls.
ï‚· The cloud computing services are addressing lack of control and flexibility when it
comes to extended functionality.
LEGAL AND ETHICAL ISSUES
There are different legal frameworks that have been devised by the government for
gaining control over the unethical practises that undergo on online or internet based platforms.
Information technology sector is subjected to vulnerability from hackers and breachers with their
agenda of performing online thefts. Furthermore, the companies have increased their dependency
over cloud computing services (Zissis and Lekkas, 2012). If improper or non-standardised
pricing is adapted by the companies in providing specific platforms then ethical issues arise.
Henceforth, use of cloud computing and external devices must be planned pre-cautiously so that
probability of unethical practises is reduced.
CONCLUSIONS
This report depicts the functioning of I/O devices or hardware and external storage when
it comes to customer relationship management. There has to be effectiveness in every business
6
The computer is completely based on the central processing unit and its dimensions. I/O
devices which are considered in hardware category have to be linked or associated with this unit
so that respective information can be easily transferred or communicated. The need of efficient
peripherals was recognised when there is no medium to communicate or transfer the commands
by user. The computer has to be provided some sort of instruction in a particular medium. Be it
touch or through keyboard or mouse (Ren, Wang and Wang, 2012). This instruction is further
interpreted to get the coded message. This often creates a delay in getting output and hence there
is a drawback assessed. The hardware or I/O devices have to be made efficient enough in
reducing the operational run time.
Cloud computing systems also have some disadvantages which have been depicted as
follows:
ï‚· Security and privacy is hindered when the platform undergoes downtime or outage.
ï‚· Resources and links which are associated with the cloud are like gateways for hackers
and breachers to get desired information after hacking security walls.
ï‚· The cloud computing services are addressing lack of control and flexibility when it
comes to extended functionality.
LEGAL AND ETHICAL ISSUES
There are different legal frameworks that have been devised by the government for
gaining control over the unethical practises that undergo on online or internet based platforms.
Information technology sector is subjected to vulnerability from hackers and breachers with their
agenda of performing online thefts. Furthermore, the companies have increased their dependency
over cloud computing services (Zissis and Lekkas, 2012). If improper or non-standardised
pricing is adapted by the companies in providing specific platforms then ethical issues arise.
Henceforth, use of cloud computing and external devices must be planned pre-cautiously so that
probability of unethical practises is reduced.
CONCLUSIONS
This report depicts the functioning of I/O devices or hardware and external storage when
it comes to customer relationship management. There has to be effectiveness in every business
6
function so that stakeholders do not suffer any sort of negations. The report depicts advantages
and disadvantages of the hardware devices and operating system aspects of cloud computing. It
can be inferred that there is a requirement of more safety features on these platforms so that any
sort of loop hole or drawback is not assessed by the users.
It has also been realised from the findings of this report that there are certain legal and
ethical issues related with operation system compatibility of cloud computers and the hardware
devices. These include non-standard pricing and high risk of loss of information. The processing
of outcomes is also delayed in these kinds of operations (Wei and et. al., 2014). Hence, it is
important to develop a system that reduces the run-time of interpretation of inputs and execution
of outputs from hardware to software. Assembly level languages can be improvised and better
codes can be generated which will further instigate effective functioning of these cloud
computing services.
POSTER
The computer organisation is incomplete without hardware and software amalgamation.
This includes the use of I/O functions by the users as hardware and the inclusion of cloud
computing in different operating systems through software. The application of such computer
systems is much better in the corporate market structure because of ease and convenience that is
being provided by these technologies. The data handling and management of different business
functions has become easier. On the contrary, there is a need to fight the legal and ethical issues
which have been associated with this subject. No individual or customer should be exploited in
any manner with help of unethical practises in handling cloud computing.
PORTFOLIO
Introduction
The computer organisation and operating systems are considered as interlinked because
absence of any one feature can result in total disruption of entire computer system. An
architecture has to be produced before designing and implementing a code for the design.
Hardware and software are the two main components of this architecture which involves proper
specification and then designing or implementation into real time practise. I/O and external
devices are the basic components that help in transmitting the information from user to the
7
and disadvantages of the hardware devices and operating system aspects of cloud computing. It
can be inferred that there is a requirement of more safety features on these platforms so that any
sort of loop hole or drawback is not assessed by the users.
It has also been realised from the findings of this report that there are certain legal and
ethical issues related with operation system compatibility of cloud computers and the hardware
devices. These include non-standard pricing and high risk of loss of information. The processing
of outcomes is also delayed in these kinds of operations (Wei and et. al., 2014). Hence, it is
important to develop a system that reduces the run-time of interpretation of inputs and execution
of outputs from hardware to software. Assembly level languages can be improvised and better
codes can be generated which will further instigate effective functioning of these cloud
computing services.
POSTER
The computer organisation is incomplete without hardware and software amalgamation.
This includes the use of I/O functions by the users as hardware and the inclusion of cloud
computing in different operating systems through software. The application of such computer
systems is much better in the corporate market structure because of ease and convenience that is
being provided by these technologies. The data handling and management of different business
functions has become easier. On the contrary, there is a need to fight the legal and ethical issues
which have been associated with this subject. No individual or customer should be exploited in
any manner with help of unethical practises in handling cloud computing.
PORTFOLIO
Introduction
The computer organisation and operating systems are considered as interlinked because
absence of any one feature can result in total disruption of entire computer system. An
architecture has to be produced before designing and implementing a code for the design.
Hardware and software are the two main components of this architecture which involves proper
specification and then designing or implementation into real time practise. I/O and external
devices are the basic components that help in transmitting the information from user to the
7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
computer. The processor present in the computer interprets this command and then executes
according to programming requirements. On the other hand, operating system manages all the
resources that are employed in the entire functioning along with cloud computing. The use
internet based platform for data handling and collection is cloud computing.
Analysis
The setting up or infrastructural cost for using a cloud computing software along with
operation system enabling is very less. The advantages which are addressed by organisations or
institutions that deploy such strategic technologies are plenty. It is important to analyse these
benefits with the disadvantages so that processing of data management tools is not hindered. The
security and flexibility features of these software have to be aligned with I/O devices so that
delay or run time required for functioning is reduced. When commands are provided to the
computer with help of external device like the keyboard or mouse, there is some amount of time
required for entire processing. This time can be reduced when certain operations are advanced
through less extensions or plug-in requirements.
There is a huge risk involved with use of external storage elements. The risk or losing the
device or misplacing or getting data corrupted is very high with these kinds of devices. For
example, pen drives and hard drives if kept anywhere or connected with any sort of corrupted or
virus struck device then data stored in these would be lost. On the other hand, cloud computing
services help in reducing this risk and brining in more effectiveness in handling information. The
use of this software based technology has to be guided with security features so that data is
protected on these platforms also.
Conclusions
The use of I/O devices and external storage when interrupt driven can become more
efficient and fast in terms of speed. This brings in more effectiveness in the computer
organisation as software then can interpret correct commands. The cloud computing aspects
when collaborated with operating systems then input and output can be effectively provided to
the users. The disadvantages that often come up with cloud computing can be resolved using
ethical practises and the use of security walls and ultimate virus protection.
8
according to programming requirements. On the other hand, operating system manages all the
resources that are employed in the entire functioning along with cloud computing. The use
internet based platform for data handling and collection is cloud computing.
Analysis
The setting up or infrastructural cost for using a cloud computing software along with
operation system enabling is very less. The advantages which are addressed by organisations or
institutions that deploy such strategic technologies are plenty. It is important to analyse these
benefits with the disadvantages so that processing of data management tools is not hindered. The
security and flexibility features of these software have to be aligned with I/O devices so that
delay or run time required for functioning is reduced. When commands are provided to the
computer with help of external device like the keyboard or mouse, there is some amount of time
required for entire processing. This time can be reduced when certain operations are advanced
through less extensions or plug-in requirements.
There is a huge risk involved with use of external storage elements. The risk or losing the
device or misplacing or getting data corrupted is very high with these kinds of devices. For
example, pen drives and hard drives if kept anywhere or connected with any sort of corrupted or
virus struck device then data stored in these would be lost. On the other hand, cloud computing
services help in reducing this risk and brining in more effectiveness in handling information. The
use of this software based technology has to be guided with security features so that data is
protected on these platforms also.
Conclusions
The use of I/O devices and external storage when interrupt driven can become more
efficient and fast in terms of speed. This brings in more effectiveness in the computer
organisation as software then can interpret correct commands. The cloud computing aspects
when collaborated with operating systems then input and output can be effectively provided to
the users. The disadvantages that often come up with cloud computing can be resolved using
ethical practises and the use of security walls and ultimate virus protection.
8
REFERENCES
Books and Journals
Arora, R., Parashar, A. and Transforming, C. C. I., 2013. Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications. 3(4). pp.1922-1926.
Jadeja, Y. and Modi, K., 2012, March. Cloud computing-concepts, architecture and challenges.
In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International
Conference on (pp. 877-880). IEEE.
Ren, K., Wang, C. and Wang, Q., 2012. Security challenges for the public cloud. IEEE Internet
Computing. 16(1). pp.69-73.
Wei, L. and et. al., 2014. Security and privacy for storage and computation in cloud
computing. Information Sciences. 258. pp.371-386.
Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation
computer systems. 28(3). pp.583-592.
9
Books and Journals
Arora, R., Parashar, A. and Transforming, C. C. I., 2013. Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications. 3(4). pp.1922-1926.
Jadeja, Y. and Modi, K., 2012, March. Cloud computing-concepts, architecture and challenges.
In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International
Conference on (pp. 877-880). IEEE.
Ren, K., Wang, C. and Wang, Q., 2012. Security challenges for the public cloud. IEEE Internet
Computing. 16(1). pp.69-73.
Wei, L. and et. al., 2014. Security and privacy for storage and computation in cloud
computing. Information Sciences. 258. pp.371-386.
Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation
computer systems. 28(3). pp.583-592.
9
Title 2: Data Communications, Cloud Computing at Services and Security
ABSTRACT
Digitalisation is the major transformation that has occurred due to changes in basic
technical operations from analog computing to digital aspects. Computerised systems are
considered as digital networks and the communication or transfer of information that takes place
between two or more computers is called data communication. There is a deep link between data
communication and cloud computing. The services that are provided over these systems include
file transfer, storage options, analysis, integration with different operation systems, etc. These
many advantages make business organisations inclined towards working with enabling of cloud
computing as the prime storage locations.
But the security and services of cloud computing and data communications are not so
efficient as is perceived by lame people. There are different types of operating systems which are
based on the type of use and the number of users engaged. The availability of options for multi-
tasking and with multiple users opens gates for hackers and breachers to track personal and
private information and then use it for their own benefits. These kinds of ethical and legal issues
often arise with data communication and cloud computing services. Often organisations that
integrate cloud computing services face the legal issue of infrastructure cost reduction. Hence, it
is important to execute a plan which will help in reducing the risks which are associated with
cloud computing services and hampering data communications.
10
ABSTRACT
Digitalisation is the major transformation that has occurred due to changes in basic
technical operations from analog computing to digital aspects. Computerised systems are
considered as digital networks and the communication or transfer of information that takes place
between two or more computers is called data communication. There is a deep link between data
communication and cloud computing. The services that are provided over these systems include
file transfer, storage options, analysis, integration with different operation systems, etc. These
many advantages make business organisations inclined towards working with enabling of cloud
computing as the prime storage locations.
But the security and services of cloud computing and data communications are not so
efficient as is perceived by lame people. There are different types of operating systems which are
based on the type of use and the number of users engaged. The availability of options for multi-
tasking and with multiple users opens gates for hackers and breachers to track personal and
private information and then use it for their own benefits. These kinds of ethical and legal issues
often arise with data communication and cloud computing services. Often organisations that
integrate cloud computing services face the legal issue of infrastructure cost reduction. Hence, it
is important to execute a plan which will help in reducing the risks which are associated with
cloud computing services and hampering data communications.
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
BACKGROUND
Conversation or communication is initiated when there are two or more entities sharing
some thoughts or exchanging their ideas. This transfer of digital data between two or more
individuals or systems is considered as data communication. According to (AlZain and et. al.,
2012), the entire computing and use of technologies for analysing and decoding the messages is
performed in digital communications. Before implementing the cloud computing services, it is
important to understand and analyse the concept of cloud. It should be adaptable and appropriate
for the area so that future outcomes are justified. Often considered as stacks, this kind of service
is very convenient and provides on-demand access to different configurable resources.
When combining digital or data communications with cloud computing services, the term
used for this technology is cloud communications. Every individual irrespective of their purpose
of functioning is focusing on better connectivity and easier sharing of information (Dinh and et.
al., 2013). Unlike earlier times when people could share information through telegram or letters,
the current technological base has enabled transfer of information through emails, newsletters,
social media websites, etc. An internet based infrastructure is established that helps in hosting the
entire information from different sources over one server or centre.
A significant invention developed under cloud computing services is cloud telephony.
The organisation or institute that adopts to this kind of technology has its own private branch
exchange which means that all the telecommunication processes taking place in this particular
region or area shall belong to the organisation itself. Hosting this kind of a network is much more
secure and limits the interference caused by external environment (Mohamed, Abdelkader and
El-Etriby, 2012). The shift or transition of companies especially those with information
technology from software based application to cloud based platforms has reduced infrastructural
costs and also increased the facilities for concerned technologies. The nature of information that
is being transferred over the cloud computing services especially the communications branch
includes voice, data and video data. This implies that all types of information irrespective of their
characteristic can be transferred and shared over the internet through cloud computing and
communications (AlZain and et. al., 2012).
Concerns regarding security if information transfer have been arising with time. Hacking
and online thefts are two important global issues which are causing the organisations to consider
11
Conversation or communication is initiated when there are two or more entities sharing
some thoughts or exchanging their ideas. This transfer of digital data between two or more
individuals or systems is considered as data communication. According to (AlZain and et. al.,
2012), the entire computing and use of technologies for analysing and decoding the messages is
performed in digital communications. Before implementing the cloud computing services, it is
important to understand and analyse the concept of cloud. It should be adaptable and appropriate
for the area so that future outcomes are justified. Often considered as stacks, this kind of service
is very convenient and provides on-demand access to different configurable resources.
When combining digital or data communications with cloud computing services, the term
used for this technology is cloud communications. Every individual irrespective of their purpose
of functioning is focusing on better connectivity and easier sharing of information (Dinh and et.
al., 2013). Unlike earlier times when people could share information through telegram or letters,
the current technological base has enabled transfer of information through emails, newsletters,
social media websites, etc. An internet based infrastructure is established that helps in hosting the
entire information from different sources over one server or centre.
A significant invention developed under cloud computing services is cloud telephony.
The organisation or institute that adopts to this kind of technology has its own private branch
exchange which means that all the telecommunication processes taking place in this particular
region or area shall belong to the organisation itself. Hosting this kind of a network is much more
secure and limits the interference caused by external environment (Mohamed, Abdelkader and
El-Etriby, 2012). The shift or transition of companies especially those with information
technology from software based application to cloud based platforms has reduced infrastructural
costs and also increased the facilities for concerned technologies. The nature of information that
is being transferred over the cloud computing services especially the communications branch
includes voice, data and video data. This implies that all types of information irrespective of their
characteristic can be transferred and shared over the internet through cloud computing and
communications (AlZain and et. al., 2012).
Concerns regarding security if information transfer have been arising with time. Hacking
and online thefts are two important global issues which are causing the organisations to consider
11
cloud computing and shift from traditional businesses to that of online as threat oriented. The
demand of customers in the current scenario is to take utmost advantage of their online
operations without getting caught or infected by the online security threats.
ADVANTAGES
There are various benefits that are reaped through data communication and cloud service
quality. Cloud computing aids for streamlining IT processes that are used in business. Major
advantage for implementing this practice is that it is easy to implement and it allows businesses
to retain business processes and applications. Accessibility of data and information is made
easier and it aids for maximizing the internet cloud infrastructure. Productivity and efficiency by
ensuring your application accessible. No hardware are required for implementing this practices
in effective way (Yang and Jia, 2012).
Physical stronger centre is not required for implementing these practices and overall cost
per head is lower with cloud hosting services. It supports the management of the company for
making use of extra time and cost for making improvements in the infrastructure of the company.
The clouds in cloud computing services are easily accessible and it aids for adding or subtracting
the resources as per the needs of the business (Zissis and Lekkas, 2012). System will grow in
effective way by making use of these services. Along with this faster and more accurate
retrievals of computer application and data is made possible by making use of these services.
DISADVANTAGES
There are some disadvantages that are associated with data communication and cloud
service security. These practices are challenging to control and due to that impact is observed on
making use of these practices. It is critical that systematic and organized approach should be
used for carrying out the practices ineffective way. When these services are moved to cloud
issues related to information technology are faced (Mohamed, Abdelkader and El-Etriby, 2012).
It becomes difficult for handling the issues and due to that it is a big disadvantage for making use
of data communication and cloud service security. Some cloud services are having limited
version due to that they prove less effective as compared to other cloud computing services.
Security is the major issue that is being faced in implementing cloud computing services
and it is critical that best service standards should be used so that issues should not be faced
12
demand of customers in the current scenario is to take utmost advantage of their online
operations without getting caught or infected by the online security threats.
ADVANTAGES
There are various benefits that are reaped through data communication and cloud service
quality. Cloud computing aids for streamlining IT processes that are used in business. Major
advantage for implementing this practice is that it is easy to implement and it allows businesses
to retain business processes and applications. Accessibility of data and information is made
easier and it aids for maximizing the internet cloud infrastructure. Productivity and efficiency by
ensuring your application accessible. No hardware are required for implementing this practices
in effective way (Yang and Jia, 2012).
Physical stronger centre is not required for implementing these practices and overall cost
per head is lower with cloud hosting services. It supports the management of the company for
making use of extra time and cost for making improvements in the infrastructure of the company.
The clouds in cloud computing services are easily accessible and it aids for adding or subtracting
the resources as per the needs of the business (Zissis and Lekkas, 2012). System will grow in
effective way by making use of these services. Along with this faster and more accurate
retrievals of computer application and data is made possible by making use of these services.
DISADVANTAGES
There are some disadvantages that are associated with data communication and cloud
service security. These practices are challenging to control and due to that impact is observed on
making use of these practices. It is critical that systematic and organized approach should be
used for carrying out the practices ineffective way. When these services are moved to cloud
issues related to information technology are faced (Mohamed, Abdelkader and El-Etriby, 2012).
It becomes difficult for handling the issues and due to that it is a big disadvantage for making use
of data communication and cloud service security. Some cloud services are having limited
version due to that they prove less effective as compared to other cloud computing services.
Security is the major issue that is being faced in implementing cloud computing services
and it is critical that best service standards should be used so that issues should not be faced
12
related to cloud computing services. Customers are having minimal control over the services that
are being provided and they are left with control only on minimal services including application,
data and services. Some cloud computing services are not flexible to use and it will aid for
creating challenges in implementing the cloud computing services that are offered by the
organization.
LEGAL AND ETHICAL ISSUES
Communication process which is initiated over the internet or through the use of
computer systems and technically advanced components has to be safe and secure from different
kinds of risks and threats. The legal issue related with data communications and cloud computing
services is sharing or protection of personal information over the internet. Privacy includes
information or credentials related to the respective individual in terms of bank account details or
personal information (Yang and Jia, 2012). When security breach takes place then legal issues
arise and when respective institution uses private information for unethical benefits then ethical
issues arise. The cloud computing security has to be strong for strengthening data
communications.
CONCLUSION
The use of networking and security must go hand in hand. The current demands of
operational market indicate that organisations must develop their communication channels with
involvement of digital techniques. This helps in reducing the costs and efforts which are often
required in analog communication networks. The concept of data communications has been
depicted in this report with regards to the current marketing scenario. Business organisations
have transformed their functioning and processes through two major developments and these are
data communications and cloud services. These have enabled the data management and control
over various aspects of informatics.
In this report, the cloud services and security has been discussed. There is a significant
use cloud computing platforms in developing a centralised system for collecting, storing and
transferring information regarding a particular subject. It has been identified that control and
flexibility is not much provided in cloud services which means that data communications is not
much secure. The security regarding transfer or sharing of information if not maintained can
13
are being provided and they are left with control only on minimal services including application,
data and services. Some cloud computing services are not flexible to use and it will aid for
creating challenges in implementing the cloud computing services that are offered by the
organization.
LEGAL AND ETHICAL ISSUES
Communication process which is initiated over the internet or through the use of
computer systems and technically advanced components has to be safe and secure from different
kinds of risks and threats. The legal issue related with data communications and cloud computing
services is sharing or protection of personal information over the internet. Privacy includes
information or credentials related to the respective individual in terms of bank account details or
personal information (Yang and Jia, 2012). When security breach takes place then legal issues
arise and when respective institution uses private information for unethical benefits then ethical
issues arise. The cloud computing security has to be strong for strengthening data
communications.
CONCLUSION
The use of networking and security must go hand in hand. The current demands of
operational market indicate that organisations must develop their communication channels with
involvement of digital techniques. This helps in reducing the costs and efforts which are often
required in analog communication networks. The concept of data communications has been
depicted in this report with regards to the current marketing scenario. Business organisations
have transformed their functioning and processes through two major developments and these are
data communications and cloud services. These have enabled the data management and control
over various aspects of informatics.
In this report, the cloud services and security has been discussed. There is a significant
use cloud computing platforms in developing a centralised system for collecting, storing and
transferring information regarding a particular subject. It has been identified that control and
flexibility is not much provided in cloud services which means that data communications is not
much secure. The security regarding transfer or sharing of information if not maintained can
13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
invite large number of breachers to use this data for personal benefits. The credentials and
private information about companies and their stakeholders is at stake in such a situation. Hence,
security services must be strengthened by platform developers and designers.
POSTER
Data communications and cloud services are often considered as one and the same. But
there is a basic difference between these two aspects. The former one is completely based on
digital communication between two or more entities while the latter is a technology that is used
for managing information that is present in large volumes. Considering a networking which is
stabilised with these aspects is much more value for money deal. Business enterprises can have
the advantage of having their own individual telecommunications network and exchange limited
to internal surroundings with help of data communications and cloud services. Hence, this kind
of technology must be encouraged in real life implementation.
PORTFOLIO
Introduction
Imagining a situation in which there is no exchange of information or thoughts is quite
devastating. No individual would be able to develop and explore new lands or opportunities
because he/she will not be aware about the existence of the same. There has to be some sort of
communication between two or more individuals for bringing in changes and developments.
Data communications is also a kind of process which involves the use of digital data and its
transmission is taking place between two or more computer systems. On the other hand, cloud
computing services are the integration of data communications with cloud storage platforms.
This kind of transformation is highly beneficial in gaining a control and stability over the
business processes and activities in an efficient way.
Analysis
Considering the services and security aspect of networking and internet, it is important to
protect the important data of users and customers of various organisations trading over the
internet. This protection or safeguarding has to be performed against the risks and threats that
originate due to hackers and breachers. The data communications network is secure unless and
until there is any sort of interference from external sources. However, it has been witnessed a lot
14
private information about companies and their stakeholders is at stake in such a situation. Hence,
security services must be strengthened by platform developers and designers.
POSTER
Data communications and cloud services are often considered as one and the same. But
there is a basic difference between these two aspects. The former one is completely based on
digital communication between two or more entities while the latter is a technology that is used
for managing information that is present in large volumes. Considering a networking which is
stabilised with these aspects is much more value for money deal. Business enterprises can have
the advantage of having their own individual telecommunications network and exchange limited
to internal surroundings with help of data communications and cloud services. Hence, this kind
of technology must be encouraged in real life implementation.
PORTFOLIO
Introduction
Imagining a situation in which there is no exchange of information or thoughts is quite
devastating. No individual would be able to develop and explore new lands or opportunities
because he/she will not be aware about the existence of the same. There has to be some sort of
communication between two or more individuals for bringing in changes and developments.
Data communications is also a kind of process which involves the use of digital data and its
transmission is taking place between two or more computer systems. On the other hand, cloud
computing services are the integration of data communications with cloud storage platforms.
This kind of transformation is highly beneficial in gaining a control and stability over the
business processes and activities in an efficient way.
Analysis
Considering the services and security aspect of networking and internet, it is important to
protect the important data of users and customers of various organisations trading over the
internet. This protection or safeguarding has to be performed against the risks and threats that
originate due to hackers and breachers. The data communications network is secure unless and
until there is any sort of interference from external sources. However, it has been witnessed a lot
14
of times that the entire process can be broken at any instance if proper firewall or network
security is not provided. Being a software engineer, I am very much aware about the threats and
legal issues which are addressed by organisations when operating online or through internet
based platforms.
There are a set of policies and technologies which need to be deployed simultaneously
with the cloud computing services so that security measures are not impacted negatively by any
sort of unethical practises. The data communications channel is established between set of
computer or information systems. The links and components of this system are part of the
infrastructural design that is prepared in developing the cloud computing system. The
organisation that implements this kind of system experience significant reduction in costs of
infrastructural development. Service models that can be implied within data communications
include SaaS, PaaS and IaaS. These three systems differ at the application stage. Furthermore,
cloud computing systems are deployed by those organisations which need to gain or host
applications that are completely based on the internet.
Conclusions
It can be inferred from all these findings that increasing number of multinationals and
higher growing population has caused acquisition of large volumes of data. This has to be
handled and managed so that business processes are not hindered. The use of data
communications and cloud computing services helps in brining more effectiveness in handling
information. Services can be improved and organisational excellence can be achieved when this
kind of technologies are implemented effectively.
15
security is not provided. Being a software engineer, I am very much aware about the threats and
legal issues which are addressed by organisations when operating online or through internet
based platforms.
There are a set of policies and technologies which need to be deployed simultaneously
with the cloud computing services so that security measures are not impacted negatively by any
sort of unethical practises. The data communications channel is established between set of
computer or information systems. The links and components of this system are part of the
infrastructural design that is prepared in developing the cloud computing system. The
organisation that implements this kind of system experience significant reduction in costs of
infrastructural development. Service models that can be implied within data communications
include SaaS, PaaS and IaaS. These three systems differ at the application stage. Furthermore,
cloud computing systems are deployed by those organisations which need to gain or host
applications that are completely based on the internet.
Conclusions
It can be inferred from all these findings that increasing number of multinationals and
higher growing population has caused acquisition of large volumes of data. This has to be
handled and managed so that business processes are not hindered. The use of data
communications and cloud computing services helps in brining more effectiveness in handling
information. Services can be improved and organisational excellence can be achieved when this
kind of technologies are implemented effectively.
15
REFERENCES
Books and Journals
AlZain, M. A. and et. al., 2012, January. Cloud computing security: from single to multi-clouds.
In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 5490-
5499). IEEE.
Dinh, H. T. and et. al., 2013. A survey of mobile cloud computing: architecture, applications,
and approaches. Wireless communications and mobile computing. 13(18). pp.1587-1611.
Mohamed, E. M., Abdelkader, H. S. and El-Etriby, S., 2012, May. Enhanced data security model
for cloud computing. In Informatics and Systems (INFOS), 2012 8th International
Conference on (pp. CC-12). IEEE.
Yang, K. and Jia, X., 2012. Data storage auditing service in cloud computing: challenges,
methods and opportunities. World Wide Web. 15(4). pp.409-428.
Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation
computer systems. 28(3). pp.583-592.
16
Books and Journals
AlZain, M. A. and et. al., 2012, January. Cloud computing security: from single to multi-clouds.
In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 5490-
5499). IEEE.
Dinh, H. T. and et. al., 2013. A survey of mobile cloud computing: architecture, applications,
and approaches. Wireless communications and mobile computing. 13(18). pp.1587-1611.
Mohamed, E. M., Abdelkader, H. S. and El-Etriby, S., 2012, May. Enhanced data security model
for cloud computing. In Informatics and Systems (INFOS), 2012 8th International
Conference on (pp. CC-12). IEEE.
Yang, K. and Jia, X., 2012. Data storage auditing service in cloud computing: challenges,
methods and opportunities. World Wide Web. 15(4). pp.409-428.
Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation
computer systems. 28(3). pp.583-592.
16
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.