Telecommunication in Information Systems

Verified

Added on  2022/08/08

|9
|1651
|19
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: Telecommunication in Information Systems
Telecommunication in Information Systems
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Telecommunication in Information Systems 1
Table of Contents
Introduction & Background:......................................................................................................2
Business requirements:...............................................................................................................2
Business Continuity:..............................................................................................................2
Elasticity for Supporting the Strategic Business Trends:.......................................................3
IT as a Business Innovation Enabler:.....................................................................................3
Nature of the Business:..........................................................................................................3
Business Priorities:.................................................................................................................3
Cost benefit analysis:.................................................................................................................3
Network diagram:.......................................................................................................................4
Local area network:....................................................................................................................4
Wide area network:....................................................................................................................5
Virtual private network:.............................................................................................................5
Conclusion:................................................................................................................................6
References:.................................................................................................................................7
Document Page
2Telecommunication in Information Systems
Introduction & Background:
The purpose of this paper is to make a networking solution for Factal Apps. The
company is a software development start up. The company was founded by 3 friends, the
main focus of the company is on developing mobile apps and they have developed as well as
marketed a popular application successfully for the people who are seeking for jobs (Hsieh et
al., 2017). The plan of the company is to elaborate their organisation into three offices
including one small head quarter in DC, one sales office in Brooklyn and lastly one
development office in San Francisco. The company need a standardised LAN design for all
of the offices a WAN design which will allow all of the staffs to collaborate and
communicate efficiently and quickly. The company also needs a VPN solution for the
branches.
Business requirements:
The Factal Apps is developing applications for mobile devices. They have
successfully launched an application for the job seekers (Jamal et al., 2018). As they want to
operate the business form three branches, the company needs a networking solution to
establish connection between the branches. The business requirements for network
development are as follows:
Business Continuity:
The business continuity refers to the ability of continuing activities related to business
by following one outage that may result from natural disaster or a system outage such as a
fire which can damage a data centre (Singh, & Singh, 2016). The business needs an approach
or mechanism for building and improving the resiliency level for recovering and reacting
from outages that are unplanned. The resiliency is not needed that much in all over the
network.
Document Page
3Telecommunication in Information Systems
Elasticity for Supporting the Strategic Business Trends:
The elasticity is referring to the flexibility level, where a certain design is able to
provide in response to the changes of business (Theodorou & Mamatas, 2017). As the
organisation is having three branches that are inter-connected to each other, any growth in the
network needs will introduce a huge level of complexity in control plane, cabling and
manageability.
IT as a Business Innovation Enabler:
In the present market, most of the businesses can understand how the information
technologies can enhance the services of them as well as how they can provide new
innovations to their customers (Nguyen, Krunz & Dutkiewicz, 2018). The business
innovation is having the ability to increase customer satisfaction or compete in the market.
Nature of the Business:
It is very much important to understand the nature of the business. In this phase the
industry can identify the origin of the business as well as aid in understanding some of the
direct requirements that are not explicitly mentioned.
Business Priorities:
Each of the businesses is having a priority sets which are based on the typical
strategies that are adopted for achieving the goals (Draper et al., 2016). The network
designers have to be aware of the priorities of the business for aligning them with the design
priorities.
Cost benefit analysis:
The aim of cost benefit analysis is to having a systematic approach for figuring out
the minuses and pulses for several paths through a project. The cost benefit analysis for this
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4Telecommunication in Information Systems
organisation will provide the best approaches for achieving the goals by saving on the
investments.
Network diagram:
Local area network:
LAN is a computer network for connected and communicated with several numbers
of computer through any medium. The smallest geographical area is covered by Local Area
Network. By using this computer network, the tools and data can be shared by the personal
desktop and the workstations (Govindan, Fattahi & Keyvanshokooh, 2017). Pair twisted
cable and the coaxial cable is needed for LAN. As this network covers the small area, it
minimize the noise. The network components for LAN are Network cards which will allow
the computers to communicate over the network. Network cables will be required there for
Document Page
5Telecommunication in Information Systems
carrying information between wired LAN and computers. Network switches will be also
required which will assign each of the computers with a specific MAC address.
Wide area network:
It is a computer network which is used to cover the largest geographical area. It is
bounded within state or country. A WAN is actually the connection of LAN between the
other's LAN trough the medium like radio waves and telephone lines (Ceselli, Premoli &
Secci, 2017). Transmission of data is performed through WAN that are optic wire, satellites
and microwaves. Although the date rate of WAN is slow, it provides the features that is
increasing the number of distance, servers etc. Because of large geographical area it caused
error and noise problem during transmission. It is an expensive network which helps one to
connect the group of countries. The components of WAN are a wireless router which will
convert the LAN network connection into wireless network. Network switches will be
required too that will assign each of the computers with a specific MAC address.
Virtual private network:
VPN, virtual private network is a mechanism of employing, encrypting,
authentication and integrity protection so that one can use public network as if it is private
network. In other words, it means that one can virtually convert the private network into
public network. It gives allowance to the user that one can remotely access the private
network. It provides highly security mechanism. Nowadays VPN brings popularity as it
connects the business networks with safety across the internet (Draper et al., 2016). It is used
to connect the smart phone, pc, tab or another server on internet and gives the permission for
browsing the internet by using the internet connection. A VPN concentrator firewall is
needed in the network. In the mobile and computer devices, VPN client software is needed to
be installed for making connection.
Document Page
6Telecommunication in Information Systems
Conclusion:
Thus, it can be concluded from the report that the LAN can be wired and wireless
connection. Wired connection increase the security and the speed where wireless connection
is less congestion. Maintenance and the architecture of LAN is easy. LAN can be used in
buildings, schools, offices, hospitals. WAN has good and bad side. It leads to security
problems, troubleshooting problems but it is good for centralized data, global business,
sharing of resources. The networking solution that is provided will help the organisation to
operate easily.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7Telecommunication in Information Systems
References:
Ceselli, A., Premoli, M., & Secci, S. (2017). Mobile edge cloud network design
optimization. IEEE/ACM Transactions on Networking, 25(3), 1818-1831.
Draper-Gil, G., Lashkari, A. H., Mamun, M. S. I., & Ghorbani, A. A. (2016).
Characterization of encrypted and vpn traffic using time-related. In Proceedings of
the 2nd international conference on information systems security and privacy
(ICISSP) (pp. 407-414).
Govindan, K., Fattahi, M., & Keyvanshokooh, E. (2017). Supply chain network design under
uncertainty: A comprehensive review and future research directions. European
Journal of Operational Research, 263(1), 108-141.
Hsieh, K., Harlap, A., Vijaykumar, N., Konomis, D., Ganger, G. R., Gibbons, P. B., & Mutlu,
O. (2017). Gaia: Geo-distributed machine learning approaching {LAN} speeds.
In 14th {USENIX} Symposium on Networked Systems Design and Implementation
({NSDI} 17) (pp. 629-647).
Jamal, T., Amaral, P., Khan, A., Zameer, A., Ullah, K., & Butt, S. A. (2018). Denial of
service attack in wireless LAN. ICDS 2018, 51.
Nguyen, D. N., Krunz, M., & Dutkiewicz, E. (2018). Full-Duplex MIMO Radios: A Greener
Networking Solution. IEEE Transactions on Green Communications and
Networking, 2(3), 652-665.
Singh, R. K., & Singh, R. (2016). 4G LTE cellular technology: network architecture and
mobile standards. International Journal of Emerging Research in Management &
Technology, 5(12).
Document Page
8Telecommunication in Information Systems
Theodorou, T., & Mamatas, L. (2017, November). CORAL-SDN: A software-defined
networking solution for the Internet of Things. In 2017 IEEE Conference on Network
Function Virtualization and Software Defined Networks (NFV-SDN) (pp. 1-2). IEEE.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]