Network Infrastructure and Client Management System: Literature Review

Verified

Added on  2023/06/04

|18
|3954
|374
Literature Review
AI Summary
This literature review examines client management systems within network infrastructure, drawing upon five articles. The review covers various aspects such as the advantages and disadvantages of client management systems, the role of auditors in management, wireless communication technologies, advancements in Ethernet technology like Cat6 and VDSL2, and the importance of corporate training. The articles are summarized, compared for similarities and contradictions, and their potential contributions to a report are identified. The review highlights the importance of network neutrality, ethical concerns related to wireless technology, and the evolution of corporate training to address skill gaps. The review concludes by emphasizing the significance of port scanning and network discovery in maintaining network security.
Document Page
Running head: NETWORK AND INFRASTRUCTURE
1
Network and Infrastructure
Student name:
Institutional affiliation:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK AND INFRASTRUCTURE
2
Client Managent Systems
Client management system is a software that enables a firm or a business to nurture good
relationship with its customers. This relationship usually for helping sustain customers and drive
sales. Advantages of this is that it helps in increasing the profits of the firm since the firm or the
business is capable to sustain its prospect customers. it also helps in creating good relationship
between the business and the customers for long, increasing sales opportunity, generating
insights for beter decisions, making accurate sales forecast and faster collection of data. On the
other hand it has some disadvantages which include high cost of running the software, it may
lack identity since it does not keep privacy and it requires hiring experts to run it.
Article summary 1
Title: GHG Reporting and Impression Management:
Authors: Talbot, D., & Boiral, O.
Journal name: Journal Of Business Ethics
Journal year: 2018
Journal page number: 367-383
Journal volume: volume 2
URL: https://ideas.repec.org/a/kap/jbuset/v147y2018i2d10.1007_s10551-015-2979-4.html
Talbot, D., & Boiral, O. (2018). GHG Reporting and Impression Management: An Assessment
of Sustainability Reports from the Energy Sector. Journal Of Business Ethics, 147(2), 367-383.
Document Page
NETWORK AND INFRASTRUCTURE
3
The article is about expanding roles of auditors in a management network firm. This involves
client management system which one of the products is SCCM. Most organizations tend to
require auditing and assurance services to ensure that all activities are occurring within the
necessary standards. The article makes use of a company by the name Woodside Petroleum
Limited. In this company, the emissions from all available facilities are monitored and reported
internally every month. To minimize its emissions, Woodside has set specific targets and kept
track of KPIs (Alavi & Leidner, 2011). As for external reporting, this company does so annually
to the Federal Government.
Important conclusion
It is clear that the role of auditors is so much more than just presenting documents for decision
making. They also have a role in identifying any discrepancies and raising the alarm openly to
prevent any contracts that will put their career at risk. It is because there are legal liabilities that
mean they will have to face the consequence of any shortcoming in their line of duty.
Fortunately, it is not always that they will be found liable (Laudon & Laudon, 2015). There is a
law which ensures that companies do not use the auditors as shields for any deal gone bad.
Aspects that could be used in the report
The method used by this Company is titled The Woodside Carbon Abatement Portfolio (CAP)
which was established back in 2010 (Chang, 2016). It is used company-wide as the primary
approach towards evaluation, tracking, and informing any possible technical initiatives decisions
meant to minimize the carbon emissions. It is essential in keeping track of initiatives such as
those that are intended to improve the energy efficiency of power generation systems, or those
that are meant to reduce flaring by employing a hierarchy of controls.
Document Page
NETWORK AND INFRASTRUCTURE
4
Similarities with other articles
They are similar in that they can be used to collect information which can then be used by
decision-makers to come up with practical measures. Auditing and Assurance services are not
similar professional services (Schell & Haggerty, 2015).
Contraditions
They need to be used side by side to ensure that they will trigger the identification of essential
information. The information will then be used to determine whether or not there is a need to
make changes for improvements in activities (Koneru, Perumal & Vennapusala, 2016).
Article summary 2
Title: Wireless Communications and types
Author name: Mary, R.
Journal name: Engineers Garage
Journal year: 2012
URL: http://www.engineersgarage.com/articles/wireless_communication
Mary, R. (2012). Engineers Garage. Retrieved from Wireless Communications and types:
About the article
The article is about Network neutrality, which is a knowledge that internet service providers
(ISPs) in client management system, comprising cable firms like wireless providers like Sprint
and Time Warner, ought to treat all internet traffic in the same way. It states that your ISP should
not be permitted to degrade or block. Since 1980’s, internet traffic has improved a lot due to
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK AND INFRASTRUCTURE
5
entrance of picture and mp3 based sites. Every management firm need network in order to
interact well between employees and employers (Wu, Battle & Madden, 2014).
Importance conclusions presented in the article
With businesses using wireless networks to allow employees a larger range to get work done
within the network. Along with the fact that consumer accessibility of business websites are
getting very easy to utilize. This brings forth more jobs and more revenue into the company
(Cao, 2017).
Aspects of the article that could be used in the report
The wireless network is constantly growing and growing at a large rate. All types of information
are being transmitted by the use of smart phones, tablets, pc’s, laptops and more. Even though
wireless networks are available just about everywhere they are often password protected from
hackers. When a wireless network is accessed without permission this is a crime. There are
certain ethical and legal concerns that may arise from wireless technology and here is a list of a
few of them: Ward Driving happens when someone drives around searching for a Wi-Fi signal
no matter if they are the owner of this wireless network or not (Becerra-Fernandez & Sabherwal,
2014). Next we have, Unauthorized Access is as simple as it sounds. Someone accessing an open
network that is not authorized to.
Similiraties with other articles
Network in other articles has always been a topic of debate as it could be both positive and
negative. For some big firms it is highly desired for reasons like assuring quality of facility,
whereas for others it is equally dangerous. This could be the similarity with other articles
Contradiction with other articles
Document Page
NETWORK AND INFRASTRUCTURE
6
This article says that that advancement would be the Worldwide Interoperability for Microwave
Access (WiMAX). This new technology will improve the existing wireless networking system
without you having to change your hardware (Coronel & Morris, 2016). Which other articles do
not support.
Article summary 3
Title: Beyond 100G ethernet
Authors: Winzer, P.
Conference name: IEEE Communications Magazine
Conference year: 2010
URL: https://dl.acm.org/citation.cfm?id=1840462
APA reference: Winzer, P. (2010). Beyond 100G ethernet. IEEE Communications Magazine.
The conference was about recommendation to using a cat6 and the VDSL2 technology
transmitting data up to 400 meters in management systems. The recommendation stated that, it
would save costs incurred in purchasing expensive Ethernet cables or switches in order to extend
the network scope (Benes, Tuck & Wheeler, 2017). In addition, VDSL2 converts one’s data from
Ethernet to VDSL2 and therefore facilitating the process of sending high-bandwidth data across
long expanses or distances, which is up to 400 meters. This novel technology utilizes traditional
coaxial cable in place of expensive Cat5 cables. Notably, level oneVDS-0202 extender
transforms VDSL2. It is also an Ethernet over VDLS2 extensor with 400 meters at 100Mbps
downstream.
The important conclusion presented in the article
Document Page
NETWORK AND INFRASTRUCTURE
7
Since technology is always altering, evolving and adapting to cater for many necessities, cat6e
would be the most appropriate to use. Some of the advantages of the cat6 cables in comparison
with the cat5 cables are the double bandwidths and better safety margins (Stein, Rucker &
Jacobson, 2016). Further, the cables are capable of future proofing one’s business in case of new
technology advances.
Aspects of the article that would be used in the report
Cat5e is capable of running up to 100mb but it is important to ensure that one find an
appropriate place on both ends using a fiber run. The cable also offers performance up to 100
MHz and is apposite for utmost varieties of Ethernet over warped pair.
Similiraties with other articles
Other articles also recommend cat5e because it is rated to go up to 1g. Also a cat6 cable would
do if you were considering the price. This article supports the same statement since a cat6 cable
is capable of running up to 10g but for short distances at the same speed as cat5e if plugged into
1g ports (Raza, Patel, Anderson & Coffey, 2016).
Contradictions with others
I do not understand why cat6 is cheaper but I think it has to do with the supply and demand from
suppliers and customers respectively.
Summary article 4
Title: Corporate Training
Authors: TheTrainingClinic
Conference name: What is It and Why Do You Need It
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK AND INFRASTRUCTURE
8
Conference year: 2016
URL: https://thetrainingclinic.com/articles/corporate-training
APA reference: TheTrainingClinic (2016). “Corporate Training: What is It and Why Do You
Need It?.” Accessed at:
About the article
The article tries to answer what is corporate training and why is it important. There were various
results of the article. The first is that corporate training has evolved and it has even moved
beyond the training of new hires, leaders, and salespeople. Some of the strategic partners in a
company who are essential are the learning and development professionals and the corporate
trainers (Talón-Ballestero & Rojo-Álvarez, 2018). However, in today’s forms, many of the
companies have faced a gap regarding skills, and most of the organizations have taken about
three to five years to take seasoned professionals and make them productive.
The important conclusion presented in the article
It is discovered that corporate organizations help a company to compete against other companies.
The first example of corporate training is formal classroom training. This has helped solve the
issue of the skill gap. There have been technological advancements within companies, this has
helped many employees learn how to use the technology, and they have learned when to use
these platforms (Theaker, 2017).
Aspects of the article that would be used in the report
Document Page
NETWORK AND INFRASTRUCTURE
9
The employees have been taught about the company’s values, mission, and vision. This has
helped the workers to work towards a common goal hence creating a healthy competition
between the company and other firms.
Similiraties with other articles
Most articles in this helps in training individuals to have more skills within a company. all article
have sparked up curiosity where one wants to research more on how corporate training can be
carried out and how effective each method it is (Vourlekis, 2017).
Contradiction of the article
The contradiction on me is that to know more about whether there are expenses that come with
corporate training and how many of the companies have applied it. There other various
contradictions of the results of the article in me. The first is that I learned on the importance of
corporate training in a company..
.
Summary article 5
Title: Important Tech Breakthroughs of the Past 5 Years
Authors: Planes, A.
Conference name: The Motley Fool
Conference year: 2013
URL: http://www.fool.com/investing/general/2013/06/15/the-5-most-important-tech-
breathroughs-of-the-past-5-years
Document Page
NETWORK AND INFRASTRUCTURE
10
APA reference: Planes, A. (2013, June 15). The Motley Fool. Retrieved from The 5 Most
Important Tech Breakthroughs of the Past 5 Years:
About the article
The conference says that Port Scanning is the ethical or legal concern that is most popular and
deserves the most attention. It is through port scanning that a hacker can find services that they
can break into. When a hacker finds a potential victim, they run a scan that locates multiple
ports. Since port scanning is similar to network discovery it is safe to say that it is necessary to
consider this very important. Port scanning is often used by system administrators to diagnose
problems on their own network. They are allowed to use it because there are currently no laws
against them using it. It depends on the situation and circumstances, whether it be used or not. As
long as it doesn’t harm or no one suffers damage someone that uses port scanning is safe from
being brought up on charges (Ward, Webber & Graziano, 2016).
Aspects of the article that would be used in the report
Over the past two years there have been a lot of improvements in wireless technology. You see
the improvements from network speed to currently what deemed a great improvement of the
smart phone. With the debate between Apple and Samsung with their smart phones, Samsung
seems to be in the lead with the newest addition to the wireless technology world. They have
recently added the Samsung Galaxy S7 Edge. This phone has been created with “all” aspects of
nature in thought (Wang, & Raicu, 2014).
Similiraties with other articles
It clear to see that with the constant improvements on the smart phone that more users are going
to gravitate to it. Some apps that are available on smart phones are not the same on a PC and vice
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK AND INFRASTRUCTURE
11
versa. I have read and researched that 5 generation articles say the same thing. While 4G has
allowed users to begin to offer video that is transforming the cable television and iPTV space, by
allowing users to watch T.V. on their smartphones over the wireless network. 5G is said to allow
that at much greater speeds (Minoli, Sohraby & Occhiogrosso, 2017).
Contradiction of the articles
It contradicts when it says that with the advancements happening the way that they are it is safe
to say that more and more people are going to be using smart phones. So there will be a need for
a wireless network that can actually handle the vast number of wireless transmissions that will
occur.
Summary article 6
Title: Law of Negligence and Limitation of Liability Act.
Authors: Australian Government.
Website name: Law of Negligence and Limitation of Liability Act.
Website year: (2016).
URL: https://www.legislation.gov.au/Details/C2016Q00058
APA reference: Australian Government. (2016). Law of Negligence and Limitation of Liability
Act.
About the article
The article says that an auditor has liability to its clients to exercise ‘due care' by adhering to
professional standards. Failure to this, a company will be at an advantage when fighting the
auditors for negligence as noted in the case study of Warehousing Ltd against CFW Ltd. To
Document Page
NETWORK AND INFRASTRUCTURE
12
prepare efficiently for this case, Warehousing Ltd. needs to understand the tort of negligence as
it is what will apply in this case. The tort of negligence refers to a legal wrong which one
individual suffers as a result of another who fails to take proper care to prevent a foreseeable
risk.
Aspects of the article that would be used in the report
There are four aspects of a tort of negligence which must be present in the report before
Warehousing Ltd. wins its case against CFW Ltd. These include; duty to care, breach of duty to
care, cause, and harm. The duty to care refers to the presence of a legal obligation to the plaintiff.
Without this relationship of considerable proximity, there is no way the plaintiff can sue the
defendant successfully. Fortunately, the two parties transacted legally, thereby creating the
presence of this duty to care. The CFW Ltd. had a duty to ensure that the financial documents
presented to Warehousing Ltd. were all up to date with the right information (Schultz, Ives, &
Woods, 2015).
Similiraties with other articles
A contractual relationship is present in most article that shows similiraties, as is the case in this
situation whereby one company has assumed ownership of the other.
Contradiction of the article
Contradiction on wrong documents were presented despite the fact that they knew it would
impact the other company. This shows that they breached the duty to care as they knew it was
their obligation as desired by law but still chose to fake the content of the report thereby
misleading the buyer.
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]