Data Communication and Network Routing Report: Issues and Analysis
VerifiedAdded on  2021/02/20
|13
|3565
|27
Report
AI Summary
This report provides an in-depth analysis of data communication and network routing, with a specific focus on Broadband over Power Line (BPL) technology. It begins by defining key terminology and acronyms relevant to the field, such as network, server, wired, wireless, LAN, WAN, Ethernet, and firewall. The report then delves into the application of BPL technology, discussing its advantages and comparing it to alternatives like DSL. It explores the relationship between different network components and technologies, including wired and wireless networks (WAN, WLAN), and examines the issues and vulnerabilities associated with BPL, such as frequency interference, radio noise, usability, legislation, and regulation, and reflects on the potential applications of the technology. The report highlights the importance of network security and the need to address vulnerabilities to ensure reliable and efficient data transmission. Finally, the report concludes with a recommendation for future development in the field.

Data Communication and Network Routing
1
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Contents
INTRODUCTION...........................................................................................................................3
TASK...............................................................................................................................................3
Terminology and acronyms.........................................................................................................3
Discuss about the analysis the use of broadband over power line technology that covers
different issues.............................................................................................................................4
Analysis of issues and vulnerabilities in the industry related the usability, legislation,
regulation and reflecting on the potential application of technology..........................................7
CONCLUSION................................................................................................................................9
RECOMMENDATION...................................................................................................................9
REFLECTION...............................................................................................................................11
REFERENCES..............................................................................................................................13
2
INTRODUCTION...........................................................................................................................3
TASK...............................................................................................................................................3
Terminology and acronyms.........................................................................................................3
Discuss about the analysis the use of broadband over power line technology that covers
different issues.............................................................................................................................4
Analysis of issues and vulnerabilities in the industry related the usability, legislation,
regulation and reflecting on the potential application of technology..........................................7
CONCLUSION................................................................................................................................9
RECOMMENDATION...................................................................................................................9
REFLECTION...............................................................................................................................11
REFERENCES..............................................................................................................................13
2

INTRODUCTION
Data communication is an approach for exchange information or data between the source
and receiver by using transmission medium. It can be used the communicating devices which are
building same and restricted geographical areas. For the communication purpose, Broadband
over power lines is basically different type of method that help for transmitting large amount of
data from one place to other. This type of communication method is used public electric power
distribution through wires. It is also working on the network layer in the OSI model and another
internet layer. In this BPL infrastructure, it is directly interconnected with the hard ware and
other peripherals which facilities information sharing between them.
This report will discuss about the Broadband over power line technology that applicable in
the data communication and also exploring the relationship between the multiple components.
Furthermore, it will analyse the issues and vulnerabilities of business related the legislation,
regulations, usability where reflect the other type of technology applications.
TASK
Terminology and acronyms
ï‚· Network and server: Network refer to all types of component that can involve in the
computer and other hardware for the purpose of communication. In network, Server plays
important role and known as nerve centre of network because it has required to increase the
efficiency and power of workstations. In this way, all data must be stored in the machine.
ï‚· Work station: It mainly refers to the individual person and its own system. At workplace,
the back office and front office employees has owned computer where they connect with
the one network system (Gomathi and Manickam, 2018).
ï‚· Wired: It applicable in the workstations where it connects with the plug into the network
outlet by using the physical cables. It helps for transmitting the data from client to server
side.
ï‚· Wireless: This type of network broadcast the signals that easily access data form
workstations. It allows for transmitting through tablet and other hardware system. it always
maintains the network connection between the one or more system. A wireless network has
needed the essential security requirement that help for protecting and maintaining in proper
manner.
3
Data communication is an approach for exchange information or data between the source
and receiver by using transmission medium. It can be used the communicating devices which are
building same and restricted geographical areas. For the communication purpose, Broadband
over power lines is basically different type of method that help for transmitting large amount of
data from one place to other. This type of communication method is used public electric power
distribution through wires. It is also working on the network layer in the OSI model and another
internet layer. In this BPL infrastructure, it is directly interconnected with the hard ware and
other peripherals which facilities information sharing between them.
This report will discuss about the Broadband over power line technology that applicable in
the data communication and also exploring the relationship between the multiple components.
Furthermore, it will analyse the issues and vulnerabilities of business related the legislation,
regulations, usability where reflect the other type of technology applications.
TASK
Terminology and acronyms
ï‚· Network and server: Network refer to all types of component that can involve in the
computer and other hardware for the purpose of communication. In network, Server plays
important role and known as nerve centre of network because it has required to increase the
efficiency and power of workstations. In this way, all data must be stored in the machine.
ï‚· Work station: It mainly refers to the individual person and its own system. At workplace,
the back office and front office employees has owned computer where they connect with
the one network system (Gomathi and Manickam, 2018).
ï‚· Wired: It applicable in the workstations where it connects with the plug into the network
outlet by using the physical cables. It helps for transmitting the data from client to server
side.
ï‚· Wireless: This type of network broadcast the signals that easily access data form
workstations. It allows for transmitting through tablet and other hardware system. it always
maintains the network connection between the one or more system. A wireless network has
needed the essential security requirement that help for protecting and maintaining in proper
manner.
3

ï‚· LAN: A Lan stands for local area network which refers to the portion of network which is
not publicly access the information through internet. It mainly used in the office and home
for accessing the information or data.
ï‚· VAN: It is based on the wide area network that can cover the large areas and more
expensive as compare to LAN. It is described the large and dispersed network which
covered the whole area (Mirzaei, Farahani and Yazdani, 2018).
ï‚· Ethernet: It is a backbone of the network system because it mainly consists of cables
which typically transfer the data from one device to other. It directly established the
connection between computers and other devices.
ï‚· Firewall: It is a type of device that perform the specific function where it always keeps
protect the information and also control the overload in the network system. It is a crucial
part which help for securing the information on network. It also useful for controlling the
bad thing from the internet coming in the network system.
Discuss about the analysis the use of broadband over power line technology that covers different
issues.
BPL is a type of communication method that offers various type of services such as audio,
video etc. it also considered as an affordable for business purpose. This type of technique is
mainly applicable the wired for data transmission through copper wire, cables etc. It is very cost
effective that’s why, many companies are establishing the setup and infrastructure for
maintaining the communication. BPL is based on the broadband over the existing medium and
low voltage electric distribution network. The speed must be higher than the Cable modem and
DSL. It is mainly providing the services to office where it has already existing connections.
This type of technology must use the existing line for installing the new transport
infrastructure which has an ability to connect with one electric line. It useful for sending and
receiving data at the high speed.
DSL
It is a type of wired transmission that can use traditional copper wire for data
transmission to business. The availability of DSL service may depend on the distance from one
place to other. A modem easily connects with the wireless router through wires by using Ethernet
cables. In this technology, the line connects with the subscriber line at the different office and
also combine with multiple signals.
4
not publicly access the information through internet. It mainly used in the office and home
for accessing the information or data.
ï‚· VAN: It is based on the wide area network that can cover the large areas and more
expensive as compare to LAN. It is described the large and dispersed network which
covered the whole area (Mirzaei, Farahani and Yazdani, 2018).
ï‚· Ethernet: It is a backbone of the network system because it mainly consists of cables
which typically transfer the data from one device to other. It directly established the
connection between computers and other devices.
ï‚· Firewall: It is a type of device that perform the specific function where it always keeps
protect the information and also control the overload in the network system. It is a crucial
part which help for securing the information on network. It also useful for controlling the
bad thing from the internet coming in the network system.
Discuss about the analysis the use of broadband over power line technology that covers different
issues.
BPL is a type of communication method that offers various type of services such as audio,
video etc. it also considered as an affordable for business purpose. This type of technique is
mainly applicable the wired for data transmission through copper wire, cables etc. It is very cost
effective that’s why, many companies are establishing the setup and infrastructure for
maintaining the communication. BPL is based on the broadband over the existing medium and
low voltage electric distribution network. The speed must be higher than the Cable modem and
DSL. It is mainly providing the services to office where it has already existing connections.
This type of technology must use the existing line for installing the new transport
infrastructure which has an ability to connect with one electric line. It useful for sending and
receiving data at the high speed.
DSL
It is a type of wired transmission that can use traditional copper wire for data
transmission to business. The availability of DSL service may depend on the distance from one
place to other. A modem easily connects with the wireless router through wires by using Ethernet
cables. In this technology, the line connects with the subscriber line at the different office and
also combine with multiple signals.
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Problems and Issues of broadband Over power line
The major issues arise regarding frequency and strength because BPL mainly used the
frequency between 10 to 30 Mhz. sometimes, it is automatically creating the interfere within
short wave frequency in broadband over power lines. On the other hand, it also increases
problem of RF noise that can identify the radio noise. It mainly includes the different factors:
increase radiations through light discharges.
Network technologies exploring the relationship between different type of components.
Network technology is an advancement of networking that allows for business to transmit
the data through digitally. It applicable for exchanging the data between small and large
information system which primarily applicable in the business and other type of institutions. A
network engineer is responsible person for maintaining the configuration, troubleshooting and
installation of technology by using different medium such as data files, audio and video etc. By
using network system, the end users are able to send the files, data and messages by using
distributed channel which help for sharing the information through intranet or internet
connection (Mitra and Sharma, 2018).
For the development of network that may involves for assessing the administrative and
requirements of informational in the organization. Network technologies are mainly defined as
system that can use to connect with multiple devices through cables, wireless connection. Wired
technology must be including the routers, cables, switches etc. It helps for controlling the data
communication between one device to another. There are different types of network technologies
such as Wired and Wireless network technology. Wired technology must be including the
routers, cables, switches etc. on the other hand, Wireless technology must be included WLAN,
MAN, WAN, PAN etc. It helps for controlling the data communication between one device to
another.
Wireless Network Technologies
Wireless is a term that refer to the medium which made of electromagnetic waves where
all devices will have used sensors and antenna. This technology doesn’t require for wired for the
purpose of data and voice communication (Nadeem and et.al., 2018).
WAN (Wide Area Network)
Wide Area network is a term that cover large distance area and it is the largest network
on earth. It is a collection of LAN which dispersed the geographically areas. A network device
5
The major issues arise regarding frequency and strength because BPL mainly used the
frequency between 10 to 30 Mhz. sometimes, it is automatically creating the interfere within
short wave frequency in broadband over power lines. On the other hand, it also increases
problem of RF noise that can identify the radio noise. It mainly includes the different factors:
increase radiations through light discharges.
Network technologies exploring the relationship between different type of components.
Network technology is an advancement of networking that allows for business to transmit
the data through digitally. It applicable for exchanging the data between small and large
information system which primarily applicable in the business and other type of institutions. A
network engineer is responsible person for maintaining the configuration, troubleshooting and
installation of technology by using different medium such as data files, audio and video etc. By
using network system, the end users are able to send the files, data and messages by using
distributed channel which help for sharing the information through intranet or internet
connection (Mitra and Sharma, 2018).
For the development of network that may involves for assessing the administrative and
requirements of informational in the organization. Network technologies are mainly defined as
system that can use to connect with multiple devices through cables, wireless connection. Wired
technology must be including the routers, cables, switches etc. It helps for controlling the data
communication between one device to another. There are different types of network technologies
such as Wired and Wireless network technology. Wired technology must be including the
routers, cables, switches etc. on the other hand, Wireless technology must be included WLAN,
MAN, WAN, PAN etc. It helps for controlling the data communication between one device to
another.
Wireless Network Technologies
Wireless is a term that refer to the medium which made of electromagnetic waves where
all devices will have used sensors and antenna. This technology doesn’t require for wired for the
purpose of data and voice communication (Nadeem and et.al., 2018).
WAN (Wide Area Network)
Wide Area network is a term that cover large distance area and it is the largest network
on earth. It is a collection of LAN which dispersed the geographically areas. A network device
5

such as router connect with the WAN for sharing the data from other system and it also maintain
the address of WAN or LAN.
WAN always differs from the Local area network because it does not belong to the one
individual and organization. It can be used the different types of technologies such as Frame
relay, X.25 and ATM for establishing the connectivity over the long distance.
WLAN (Wi-Fi)
It is the most efficient network protocol that allow the hardware devices to communicate
without having internet cords. It is mainly representing the wireless local area network. This type
of protocol is the most popular for the purpose of data communication within the specific
locations. Wi-Fi is to be considered the business and home which provide the facility for
accessing data (Qiao and et.al., 2018).
This technology will explore the relationship with the other devices like router which
help for transmitting signals. On the other hand, ISP uses to deliver that services of nearby
devices where signals reached.
Wired Network Technologies
Wired Network technology mainly refers to the physical medium for consisting the
cables and it applicable for carry multiple electrical signals from one place to another. This type
of wired network one internet connection being taken by suing the cable Modem.
LAN (Local Area Network)
It is a based on the computer network that relatively cover small areas which mostly often
to confined the single type of buildings and room. A LAN connect with the network devices over
the short distances and operating the limited space. It is typically owned and controlled or
managed by the individual and organization. Many LAN connect with the workstation and other
personal devices (Rath, Swain and Pattanayak, 2018). Each node has own CPI with which
execute the programs and also able to access the data through device. It useful for sending data
or information by using chat session, email etc.
This type of network is exploring the relationship with the network component such as
protocols and topology where protocol will help to identify the network uses from peer to peer
and communication between client or server. LAN must be deploying the wireless network
technology for collecting the data through network interface card from the computer system.
6
the address of WAN or LAN.
WAN always differs from the Local area network because it does not belong to the one
individual and organization. It can be used the different types of technologies such as Frame
relay, X.25 and ATM for establishing the connectivity over the long distance.
WLAN (Wi-Fi)
It is the most efficient network protocol that allow the hardware devices to communicate
without having internet cords. It is mainly representing the wireless local area network. This type
of protocol is the most popular for the purpose of data communication within the specific
locations. Wi-Fi is to be considered the business and home which provide the facility for
accessing data (Qiao and et.al., 2018).
This technology will explore the relationship with the other devices like router which
help for transmitting signals. On the other hand, ISP uses to deliver that services of nearby
devices where signals reached.
Wired Network Technologies
Wired Network technology mainly refers to the physical medium for consisting the
cables and it applicable for carry multiple electrical signals from one place to another. This type
of wired network one internet connection being taken by suing the cable Modem.
LAN (Local Area Network)
It is a based on the computer network that relatively cover small areas which mostly often
to confined the single type of buildings and room. A LAN connect with the network devices over
the short distances and operating the limited space. It is typically owned and controlled or
managed by the individual and organization. Many LAN connect with the workstation and other
personal devices (Rath, Swain and Pattanayak, 2018). Each node has own CPI with which
execute the programs and also able to access the data through device. It useful for sending data
or information by using chat session, email etc.
This type of network is exploring the relationship with the network component such as
protocols and topology where protocol will help to identify the network uses from peer to peer
and communication between client or server. LAN must be deploying the wireless network
technology for collecting the data through network interface card from the computer system.
6

Broadband over power line is the most suitable technology that can be used at homes,
workplaces. It mainly used the pre-wired power grid that easily reach different rooms. The setup
of BPL technology become attractive to the people because it doesn’t mess with network cables.
For Example- The products of BPL are based on the home plug and viable accurate solutions. It
is quickly supporting the two different circuits in proper manner. The power line of BPL
naturally covers the different areas and companies experimented the broad band line over power
technology. It can be identified that there are different limitations of network prevented through
BPL.
ï‚· Price and market competition- At workplace. It accesses the internet technology,
especially in mobile phones so that it continues to improve the services and achieve
success in global marketplace.
ï‚· Performance- while many companies are tried to upgrade their power grid to use BPL
because it helps for maintain the communication and cover high speed in particular areas.
ï‚· Radio interference- Broadband over power line is generating the signal interference
through lines but sometimes, it affects on the government regulatory and radio operators.
Analysis of issues and vulnerabilities in the industry related the usability, legislation, regulation
and reflecting on the potential application of technology.
Vulnerability is defined as the weakness in terms of information system, internal control
and implementing that easily exploited through threats. In the organization, it has required to
maintain the cyber security through technical aspects such as Flaw determined in the software
and issues generate in the configuration.
As per analysis, it can be identified that broadband over line communication method
rapidly changes due to increase the demand and also implementing new innovative features.
Apart from that it also increases the issues related the usability regulations and legislation which
reflecting on the potential applications.
Usability- The security without usability in the network that should be increased the
failure because it doesn’t handle the situation and conditions. It has a chance in the broadband
power line method because it can be used wired. In this way, it will require the proper
investment towards the security should not contain the extra process but the cost of doing
enterprise being able to reap the advantage of new firm (Rezaei, Hempel and Sharif, 2018). In
7
workplaces. It mainly used the pre-wired power grid that easily reach different rooms. The setup
of BPL technology become attractive to the people because it doesn’t mess with network cables.
For Example- The products of BPL are based on the home plug and viable accurate solutions. It
is quickly supporting the two different circuits in proper manner. The power line of BPL
naturally covers the different areas and companies experimented the broad band line over power
technology. It can be identified that there are different limitations of network prevented through
BPL.
ï‚· Price and market competition- At workplace. It accesses the internet technology,
especially in mobile phones so that it continues to improve the services and achieve
success in global marketplace.
ï‚· Performance- while many companies are tried to upgrade their power grid to use BPL
because it helps for maintain the communication and cover high speed in particular areas.
ï‚· Radio interference- Broadband over power line is generating the signal interference
through lines but sometimes, it affects on the government regulatory and radio operators.
Analysis of issues and vulnerabilities in the industry related the usability, legislation, regulation
and reflecting on the potential application of technology.
Vulnerability is defined as the weakness in terms of information system, internal control
and implementing that easily exploited through threats. In the organization, it has required to
maintain the cyber security through technical aspects such as Flaw determined in the software
and issues generate in the configuration.
As per analysis, it can be identified that broadband over line communication method
rapidly changes due to increase the demand and also implementing new innovative features.
Apart from that it also increases the issues related the usability regulations and legislation which
reflecting on the potential applications.
Usability- The security without usability in the network that should be increased the
failure because it doesn’t handle the situation and conditions. It has a chance in the broadband
power line method because it can be used wired. In this way, it will require the proper
investment towards the security should not contain the extra process but the cost of doing
enterprise being able to reap the advantage of new firm (Rezaei, Hempel and Sharif, 2018). In
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

the industry, it can optimise the security and understand that how to make the trade-off usability
which help for protecting in proper manner.
Usability is the important part in the BPL (broadband over power lines) technology but it
can show as an issue in the network system regarding security because there are more chances in
the business to harm the sensitive data and information of industry. It must be reflecting the
network technology where it has chances of data loss because unauthorised people access the
information. For Example- In wireless network, it easier for people to track the data and uses the
information for accessing the IP Address. On the other hand, hacker easily access the data
through wired system due to connection loss and many more.
Legislation- The legal obligation always increases for using the network technologies for
both administrators as well as users. It is relatively changing but the development always created
for further development. The Network system is promoting the effective cooperation and
exchange the risk regarding information so that legislation encouraging the cyber security for
preventing the incident related the user confidence, system operations (Usman and et.al., 2018).
In BPL, it may present the risk which need for the regulatory framework in the
management of network security. On the other hand, the legal issues regarding the new and
emerging network fall within the overall scope of business due to evidence and inventions in
signal changing.
For developing the wired infrastructure that must be required to follows all the
legislation for implementing the limited bandwidth in the network otherwise it can represent
against the government legislation.
The most common vulnerabilities in the business of lack of IT security management but
they have the best quality of solution of cyber security but it might not enough for properly
managed and controlled. They also missed the alert message so that attacker easily hacks all the
information.
Rules and regulations- There are various types of issues that easily complicated with the
use of technology. It has increased the issues regarding data privacy of client and employee those
who work in the company. Each and every data transmission frequency used by the rules and
regulation. The law will effect on the security of Broadband over power lines technology
because there are chances to lose the connection between one or more network because of
8
which help for protecting in proper manner.
Usability is the important part in the BPL (broadband over power lines) technology but it
can show as an issue in the network system regarding security because there are more chances in
the business to harm the sensitive data and information of industry. It must be reflecting the
network technology where it has chances of data loss because unauthorised people access the
information. For Example- In wireless network, it easier for people to track the data and uses the
information for accessing the IP Address. On the other hand, hacker easily access the data
through wired system due to connection loss and many more.
Legislation- The legal obligation always increases for using the network technologies for
both administrators as well as users. It is relatively changing but the development always created
for further development. The Network system is promoting the effective cooperation and
exchange the risk regarding information so that legislation encouraging the cyber security for
preventing the incident related the user confidence, system operations (Usman and et.al., 2018).
In BPL, it may present the risk which need for the regulatory framework in the
management of network security. On the other hand, the legal issues regarding the new and
emerging network fall within the overall scope of business due to evidence and inventions in
signal changing.
For developing the wired infrastructure that must be required to follows all the
legislation for implementing the limited bandwidth in the network otherwise it can represent
against the government legislation.
The most common vulnerabilities in the business of lack of IT security management but
they have the best quality of solution of cyber security but it might not enough for properly
managed and controlled. They also missed the alert message so that attacker easily hacks all the
information.
Rules and regulations- There are various types of issues that easily complicated with the
use of technology. It has increased the issues regarding data privacy of client and employee those
who work in the company. Each and every data transmission frequency used by the rules and
regulation. The law will effect on the security of Broadband over power lines technology
because there are chances to lose the connection between one or more network because of
8

limited data transmissions (Roy and et.al., 2018). The government has been passed the law to
implement in the business for protecting the business operations.
The business doesn’t have complete inventory and all type of information technology
assets in the network where hardware devices identify the multiple platform and running but it
has increased the misuse and leak the account data by phishing which easily harm the
information that available on the accounts through network system. This type of vulnerability is
the biggest problem arise in the overall infrastructure of organization.
CONCLUSION
As per discussion, it concluded that Data communication is a type of process for exchange
information or data between the source and receiver by using transmission medium. BPL
important which help for selecting the path along with the data that can transfer from source to
destination. It is also interconnected with the hard ware and other peripherals which facilities
information sharing between them. it may connect by either wireless network.
It summarised that the Broadband over power lines technology that applicable in the data
communication and also exploring the relationship between the multiple components. It also
analysed the issues and vulnerabilities generated in BPL and also related to the legislation,
regulations, usability where reflect the other type of technology applications.
RECOMMENDATION
It has been recommended to use the Broadband over power lines technology for
communication purpose because it also covers wide area in particularly workplace, homes etc.
BPL technology is mainly offering national communication system and maintain the new
transmission infrastructure in proper manner. In this way, it has been found that radio spectrum
plays important role and also supporting the different operations of BPL, particularly in different
areas where electric power line must be used.
It recommended that NCS participate in the standardization of BPL that make efforts to
maintain services. The BPL standards will identify the different aspects in terms of security,
bonding, operating practices and grounding.
9
implement in the business for protecting the business operations.
The business doesn’t have complete inventory and all type of information technology
assets in the network where hardware devices identify the multiple platform and running but it
has increased the misuse and leak the account data by phishing which easily harm the
information that available on the accounts through network system. This type of vulnerability is
the biggest problem arise in the overall infrastructure of organization.
CONCLUSION
As per discussion, it concluded that Data communication is a type of process for exchange
information or data between the source and receiver by using transmission medium. BPL
important which help for selecting the path along with the data that can transfer from source to
destination. It is also interconnected with the hard ware and other peripherals which facilities
information sharing between them. it may connect by either wireless network.
It summarised that the Broadband over power lines technology that applicable in the data
communication and also exploring the relationship between the multiple components. It also
analysed the issues and vulnerabilities generated in BPL and also related to the legislation,
regulations, usability where reflect the other type of technology applications.
RECOMMENDATION
It has been recommended to use the Broadband over power lines technology for
communication purpose because it also covers wide area in particularly workplace, homes etc.
BPL technology is mainly offering national communication system and maintain the new
transmission infrastructure in proper manner. In this way, it has been found that radio spectrum
plays important role and also supporting the different operations of BPL, particularly in different
areas where electric power line must be used.
It recommended that NCS participate in the standardization of BPL that make efforts to
maintain services. The BPL standards will identify the different aspects in terms of security,
bonding, operating practices and grounding.
9

REFLECTION
My learning experience was quite good because I always trying to understand the depth
knowledge about the network system at workplace. I always used the Personal Area network in
mobile phones which protect the data and information. I believe that network system is central
part of every organization that can store all information of enterprises. In this way, it has required
to maintain the privacy and security policy for decreasing the unauthorized access and reduce
loss of data or information. I understand that broadband over power line method is not enough
for maintain the data communication because it has faced many challenges for designing and
modulations. It has been generated the errors and bugs during executions. I found that I have
analysed the security issues because unauthorised person may be trying to damage the
connections.
I also determine that Information technology team to manage all type of requirement and
maintaining the security aspects but it is very expensive and time consuming to set up the entire
infrastructure. My strength is the knowledge about the network technologies that help for me to
find the best platform of executions. The learning aspects of networking to use in the
professional growth and development. I have gained the more knowledge and appreciation for
the other learning professionals. I believed that information sharing always help for clear the
doubt regarding the network technologies. I am finding the important resources that contribute in
the network infrastructure development. I spending a lot of time working on the network
technology that can use for designing the efficient infrastructure with full of security and
implementing my own idea to create network model which help for me to understand the overall
processing of network architecture.
10
My learning experience was quite good because I always trying to understand the depth
knowledge about the network system at workplace. I always used the Personal Area network in
mobile phones which protect the data and information. I believe that network system is central
part of every organization that can store all information of enterprises. In this way, it has required
to maintain the privacy and security policy for decreasing the unauthorized access and reduce
loss of data or information. I understand that broadband over power line method is not enough
for maintain the data communication because it has faced many challenges for designing and
modulations. It has been generated the errors and bugs during executions. I found that I have
analysed the security issues because unauthorised person may be trying to damage the
connections.
I also determine that Information technology team to manage all type of requirement and
maintaining the security aspects but it is very expensive and time consuming to set up the entire
infrastructure. My strength is the knowledge about the network technologies that help for me to
find the best platform of executions. The learning aspects of networking to use in the
professional growth and development. I have gained the more knowledge and appreciation for
the other learning professionals. I believed that information sharing always help for clear the
doubt regarding the network technologies. I am finding the important resources that contribute in
the network infrastructure development. I spending a lot of time working on the network
technology that can use for designing the efficient infrastructure with full of security and
implementing my own idea to create network model which help for me to understand the overall
processing of network architecture.
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

11

REFERENCES
Book and Journals
Gomathi, R.M. and Manickam, J.M.L., 2018. Energy efficient shortest path routing protocol for
underwater acoustic wireless sensor network. Wireless Personal Communications. 98(1).
pp.843-856.
Mitra, R. and Sharma, S., 2018. Proactive data routing using controlled mobility of a mobile sink
in Wireless Sensor Networks. Computers & Electrical Engineering. 70. pp.21-36.
Nadeem, A. and et.al., 2018. A review and classification of flying Ad-Hoc network (FANET)
routing strategies. Journal of Basic and Applied Scientific Research. 8(3). pp.1-8.
Rath, M., Swain, J., Pati, B. and Pattanayak, B.K., 2018. Network Security: Attacks and Control
in MANET. In Handbook of Research on Network Forensics and Analysis
Techniques (pp. 19-37). IGI Global.
Rezaei, F., Hempel, M. and Sharif, H., 2018. A survey of recent trends in wireless
communication standards, routing protocols, and energy harvesting techniques in E-
health applications. In Wearable Technologies: Concepts, Methodologies, Tools, and
Applications (pp. 1479-1502). IGI Global.
Roy, S.S. and et.al., 2018. Building a sustainable Internet of Things: Energy-efficient routing
using low-power sensors will meet the need. IEEE Consumer Electronics Magazine. 7(2).
pp.42-49.
Usman, M. and et.al., 2018. QASEC: A secured data communication scheme for mobile Ad-hoc
networks. Future Generation Computer Systems.
Qiao, P. and et.al., 2018, August. Joint Effects of Application Communication Pattern, Job
Placement and Network Routing on Fat-Tree Systems. In Proceedings of the 47th
International Conference on Parallel Processing Companion (p. 36). ACM.
Mirzaei, R., Farahani, R. and Yazdani, N., 2018, December. Public-Key Based Routing In
Internet For Anonymous Data Communication. In 2018 9th International Symposium on
Telecommunications (IST) (pp. 58-64). IEEE.
12
Book and Journals
Gomathi, R.M. and Manickam, J.M.L., 2018. Energy efficient shortest path routing protocol for
underwater acoustic wireless sensor network. Wireless Personal Communications. 98(1).
pp.843-856.
Mitra, R. and Sharma, S., 2018. Proactive data routing using controlled mobility of a mobile sink
in Wireless Sensor Networks. Computers & Electrical Engineering. 70. pp.21-36.
Nadeem, A. and et.al., 2018. A review and classification of flying Ad-Hoc network (FANET)
routing strategies. Journal of Basic and Applied Scientific Research. 8(3). pp.1-8.
Rath, M., Swain, J., Pati, B. and Pattanayak, B.K., 2018. Network Security: Attacks and Control
in MANET. In Handbook of Research on Network Forensics and Analysis
Techniques (pp. 19-37). IGI Global.
Rezaei, F., Hempel, M. and Sharif, H., 2018. A survey of recent trends in wireless
communication standards, routing protocols, and energy harvesting techniques in E-
health applications. In Wearable Technologies: Concepts, Methodologies, Tools, and
Applications (pp. 1479-1502). IGI Global.
Roy, S.S. and et.al., 2018. Building a sustainable Internet of Things: Energy-efficient routing
using low-power sensors will meet the need. IEEE Consumer Electronics Magazine. 7(2).
pp.42-49.
Usman, M. and et.al., 2018. QASEC: A secured data communication scheme for mobile Ad-hoc
networks. Future Generation Computer Systems.
Qiao, P. and et.al., 2018, August. Joint Effects of Application Communication Pattern, Job
Placement and Network Routing on Fat-Tree Systems. In Proceedings of the 47th
International Conference on Parallel Processing Companion (p. 36). ACM.
Mirzaei, R., Farahani, R. and Yazdani, N., 2018, December. Public-Key Based Routing In
Internet For Anonymous Data Communication. In 2018 9th International Symposium on
Telecommunications (IST) (pp. 58-64). IEEE.
12

13
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.