StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Telecommunications and Networking - Assignment Example

Cite this document
Summary
The paper examines the concepts of telecommunication and networking and cloud computing. The author discusses the new functionalities, advantages, and limitations in the existing setups. The paper also aims to describe the challenges faced by present-day cloud computing concepts and services…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Telecommunications and Networking
Read Text Preview

Extract of sample "Telecommunications and Networking"

?Telecommunication and Networking (Cloud Computing Cloud computing is a fundamental new paradigm in which computing is migrating from personal computers sitting on a person's desk (or lap) to large, centrally managed datacenters. How does cloud computing differ from Web services, Grid computing, and other previous models of distributed systems? What new functionality is available to application developers and service providers? How do such applications and services leverage pay-as-you-go pricing models to meet elastic demands? Introduction: Cloud computing is a word in voyage in modern times and is aiming to change the pattern of how computer operations are being handled. As a result of this, the most notable changes are visible in the applications and approach of the Web servers. The web servers’ functions have undergone new definition in manner in which they facilitate the clients directly or indirectly (Terry, 2010).Cloud computing is defined as a scalable infrastructure on which the servers rely their operations. The data available in the remote networks and remote infrastructure allowing ease of access and rapid transmission (ACM, 2009). Cloud computing has number of characteristics to it which make it more distinctive and unique compared to the conventional form of web servers that were in practice in past. It also provides various applications and functionalities that separate them from their predecessors. These features include software as a Service feature, platform as a service feature and finally, infrastructure as a service feature. These three factors are the characteristic attributes of the cloud computing. Other features include advanced algorithms, service oriented architecture availability, massive broadband availability. New Functionality: Virtualization is another factor characteristic of cloud computing which differentiates it from the earlier technologies that were present in the market for the purpose of clients-servers operations (Josyula, et al., 2012). Cloud computing has an edge relevant to the capital expense as well and no major deployment is needed prior to the operations. It rather targets Operation expenses. The need for internally purchased servers is also eliminated with the help of cloud computing concept. More servers’ installation is another edge which can be enjoyed in the case of incumbent technology (Terry, 2013). Advantages: Other advantages include: economic advantages, reduction in the variable costs, ease of operations, scalability, disaster recovery and handling costs control, further enhanced automated network, data security, all these are few of the advantages served by Cloud computing technologies. 2-A central challenge of cloud computing is providing scalable, secure, self-managing, and fault-tolerant data storage for long-running services. What data models are supported by existing cloud-based storage systems? What are the technical trades-offs between the key-value stores commonly provided and relational databases? How do application developers choose a particular storage system? How does one design cloud-based storage systems to ensure that a user's data survives for 100 years, even as companies come and go? The data models employed ensure scalability and flexibility enabled infrastructure. Various models are in practice for these purposes which include one dimensional vs. multi dimensional models, access path optimization, and multi data centre models. Cloudy is another model designed for the purpose of bringing about more flexibility in the cloud mechanism and system. Relational model is another model in existence that is being used by Cloud computing technique for the purpose of service providing to the clients. Key value, queue, xml are few other models being incorporated (Weiss, 2007). Tradeoff: Consideration of the pricing, service level agreements, and Application program Interface are few of the technical tradeoffs. Performance trade off is a serious factor in Read Optimized data base. Limitations in the existing setups: Allowing for limited cloud interface support is one of the limitations faced, followed by the limited support availability for low level models. Data model inside the cloudy model enables handling the data bases properly. This data model incorporates the D.P.I which is a unique identifier for data items. It incorporates the basic functions such as reading of the command, writing, and followed by writing instruction. Application developers choose a particular storage system with considerations of the database in practice, the clients at hand, and the infrastructure available. All these factors are taken into account while applications are developed. A multi tier backup system is in place, which ensures the survival of data for hundreds of years. Besides this, the database systems in place, with metadata networks, the backups are provided which ensure the safety even if the companies are replaced. A scalable file system is a multi tier system, examples of it include Google Inc and its online search engine. Amazon is another example that uses extensively scalable system. 3-Cloud computing currently relies heavily on virtualized CPU and storage resources to meet elastic demands. What is the role of virtualization in cloud-based services? Are current virtualization technologies sufficient? Basic Theme of Cloud Computing: Cloud computing is based on the idea of on demand supply as a result making sure that the resources are provided only when sought for. It entails a per action payment and per action response. It can be safely said that the concept of cloud computing is based on virtualization of the C.P.U and other storage devises. Virtualization allows for space storage and fast retrieval of data. Other features and functions provided by virtualization include multi facet applications support, flexibility in choice of environment to choose from, and most importantly the option of creation of a private cloud, all these are the services provided by virtualization technique in the cloud computing terminology. It is an established fact that virtualization has changed the manner in which the operations are being performed yet there are certain short comings in this area which can be improved to make the entire concept more effective. The underlying network is still reliant on other sources for purpose of establishing communication link amongst themselves. The ever expanding volume of storage and servers is a threat and efforts need to be done to facilitate the massive expansion in terms of storage volume. Accommodating large scaled data centers would require changes and improvements. Network architecture can be redesigned in this regard to make virtualization concept more valid in times to come. Virtual machine domain of virtualization technology is also an area that seeks improvements and development. 4- Cloud computing is viewed as risky for various reasons, especially as cloud storage systems are increasingly used to store valuable business data and intensely private data, and even mix data from different individuals on the same servers. When all of a person's (or business') data is stored in the cloud, what steps can be taken to ensure the privacy of that data and to reassure users that their data will not be inadvertently released to others? What explicit steps can cloud providers take to overcome fears of data leakage, outages, lack of long-term service viability, and an inability to get data out of the cloud once placed there? While Virtualization provides alternatives against the conventional form of storage, it has certain vulnerabilities and considerations attached to it (Zeng, 2012). These come in form of security considerations, since all of the data is presented on the servers that are online and any malicious content can penetrate into it. This factor has a direct impact on the legal aspect, individuals privacy aspect and design consideration. While it provides array of advantages over its counterpart, the security concern makes it less safe and changes are needed to make it more secure for operations(Rittinghouse & Ransome, 2009). Following are few of the security vulnerabilities and possible protective actions which can help making cloud computing concept more secure and more viable (Pfleeger & Pfleeger, 2012). Organizations have undertaken the cloud computing concept and implemented it in full capacity, in order to ensure maximum data protection; standardized data management schemes should be adopted. Providing clear guidelines to the users both at server end and clients’ ends is a measure that can be taken to make the concept of cloud computing a more secure one. Data handling processes should be incorporated into the systems that allow for clear definition of tasks, roles and responsibilities of the stakeholders involved. Besides this, the use of Paas, Saas and Iaas in a proper manner would not only enable the servers to run the programs in a safe manner but also provide the clients with secure services (Chee & Franklin, 2010). An explicit step can be taken in form of third party cloud computing system which provides protection against the potential threats. 5- In conclusion, you are required to reflect on the Assignment: How did you allocate time for research and writing? What did you learn from the Assignment? Problems and solutions encountered along the way. The assignment enabled me understanding certain basic concepts pertinent to cloud computing. Not just this, it enabled me understanding and studying various other emerging technologies that are present around. For example, the concept of cloud computing enabled me understanding the concept of virtualization, virtual machines, security and privacy. Since all these amalgamate into modern emerging technologies, therefore each of them is relevant to one another and hence study of one allows study of other as well. Time was allocated to the assignment in different sections and portions. Broadly dividing, the first part was assigned to understanding of the topic; cloud computing. Getting to know the basic concepts and terms associated with it, knowing its application domain, a little history of how it has evolved and how it has been adopted and now how it is contributing to the modern technological times, all this was done in first part. The second part constituted the study of relevant questions, which was provided as Task1, Task 2, Task 3, and Task 4. Each targeting different areas, for example one was about the privacy concerns and the factors that enable knowing how safe cloud computing is, second was how effective it is, and third was whether the concept of virtualization has reached its peak or it still needs further changes and improvements in terms of the security and safety to the customers. First half was dedicated to the research, and collection of data and material relevant in order to get a familiarity of the concepts involved. Once sufficient concepts were developed and sufficient material was obtained, it was followed by the writing process. Writing was based on everything that was collected and comprehended in the research phase. Research set foundation for the writing phase. On technical front, problems were identifying the areas of safety and security towards the clients in the overall concept of cloud computing. I had to research various research papers(reference) in this regard to investigate the possible solutions and options available that would make cloud computing a safer technology not just for the clients but the servers and giants of the technological domain in present day. Study of various journals, reports and publications by individuals as well as organizations were studied. For example Microsoft has invested time and resources into the domain of cloud computing securities and possible vulnerabilities that may exist. The study of that report helped in understanding and presenting the challenges faced to the present day cloud computing concepts and services. This was answered in detail in task number four in the section of possible solutions to making customers safe and overall concept of cloud computing an overall success for coming days. Writing process was the next phase, after having collected all the data and information, the collected data was put into words in form of first draft. The first draft contained a rough sketch of the material and information collected. This was followed by the second draft, which was relatively refined, and the third draft contained nearly the material almost refined. Finally the sections were put into place and each fitting in to the questions asked in form of the aforementioned tasks. The research enabled studying the topic in detail, and also enabled understanding the basic concepts of a research body with start being taken as study of subject in form of literature review, followed by the methodology to be adopted, allowing to understand what exactly to follow. Finally, it was followed by the execution and writing stage. Problems encountered were the total new concept of cloud computing and relevant technologies, since the entire concept is a novel one and is mostly limited to the mega websites and servers and at a university level and college level understanding the entire concept sought some detailed and technical study of the subject. Other problems that occurred were that of gaining access to the entire material, since some of them were copy righted, and for purchase, making purchase and order in such a short time was another challenge. Understanding of the technical jargon at some places, along with study of certain basic algorithms was another problem encountered. Other problems involved were non lack of direct guidance, since this was totally new in its nature. Although the concept was briefly discussed in the subject of networks and internet technologies, yet the technical details could be understood only by conducting a thorough research in to it as in form of this assignment. Time management factor was also handled properly, since specific time was allotted for the entire assignment and I had to divide the time into pre homework phase and the execution phase which included data collection, understanding of the basic concepts, and then conducting research to finally reach a level where final draft could be drafted and written text could be presented in form of these tasks. Conclusion: The overall process was a learning curve, enabled knowing various new concepts, apart from this, it also enabled handling such new ideas and how to go about research study. It would help in further studies and especially for the final term and in later semesters where similar new ideas based projects might be handed over as assignments. The assignment would also help preparing for practical life, where one is faced with similar concepts of learning and implementing new concepts in the field, with every day inventions and scientific and computer world expansions, more developments are bound to take place. The learning curve included getting a familiarity of new concepts and opening up the mind to similar concepts which may be encountered in future studies and practical life. References: ACM, 2009. Cloud Computing: An Overview, s.l.: acmqueue. Chee, B. J. & Franklin, J. C., 2010. Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center. s.l.:CRC Press. Pfleeger, C. P. & Pfleeger, S. L., 2012. Analyzing Computer Security: A Threat - Vulnerability - Countermeasure Approach. s.l.:Prentice Hall Professional. Rittinghouse, J. W. & Ransome, J. F., 2009. Cloud Computing: Implementation, Management, and Security. s.l.:CRC Press. Terry, D., 2010. ACM Tech Pack on Cloud Computing, s.l.: Microsoft Research. Terry, D., 2013. CLOUD COMPUTING, s.l.: Greenwich School of Management Telecommunications and Networking. Josyula, V., Or, M. & Page, G., 2012. Cloud computing. s.l.:Cisco Press. Weiss, A., 2007. Cloud computing: PC functions move onto the web, s.l.: netWorker. Zeng, D., 2012. Advances in Computer Science and Engineering. s.l.:Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Telecommunications and Networking Assignment Example | Topics and Well Written Essays - 2250 words, n.d.)
Telecommunications and Networking Assignment Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/information-technology/1472036-telecommunications-and-networking-cloud-computing
(Telecommunications and Networking Assignment Example | Topics and Well Written Essays - 2250 Words)
Telecommunications and Networking Assignment Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/1472036-telecommunications-and-networking-cloud-computing.
“Telecommunications and Networking Assignment Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1472036-telecommunications-and-networking-cloud-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Telecommunications and Networking

Literature Review & Project Specification

Further more this kind illegitimate use of telecommunications keeps on rising. To date there are very few routes in the Internet that support fully ATM-based backbone transmission, fast routers, QoS (Quality of Service) services and/or un-congested bandwidth resources.... Literature Review - The use of telephony in the daily activities is continuously increased....
12 Pages (3000 words) Essay

Mobile Telecommunications and Vibrant Technology

hellip; Almost every aspect of human activities made use of the technology which made it inseparable with the needs of the modern society. telecommunications is one area where ICT's impact is widely felt.... In fact, most often people made it a habit to relate interchangeably telecommunications with ICT and most people sometimes cannot clearly identify the difference either.... Developments cope with these needs and telecommunications became mobile with cellular pagers, cellular phones, and recently with mobile videophones....
11 Pages (2750 words) Article

Development of Computing Networking for the Company

The objective of the paper is to develop a Network for a company.... The company has four separate offices, Bristol, Cardiff, Swindon, and Stoke.... Each office has its own requirements, which are based upon the function of that office.... The specific objective is to create a network layout on each site....
5 Pages (1250 words) Term Paper

Integrated Service Digital Network

Novel algorithms and techniques in Telecommunications and Networking.... The paper “Integrated Service Digital Network” seeks to evaluate an original internet service of high-speed.... It sparked the development of high-speed internet amid service givers in the 1990's....
1 Pages (250 words) Assignment

Strategic Management - Effective Strategy Planning

The steady technological development that has happened in the domains of Telecommunications and Networking technology since the beginning of the previous decade has transformed the world… Because of the well developed capability of communication and digital networking, there has been a free flow of information across market around the world....
11 Pages (2750 words) Coursework

BGP routing protocol

Novel Algorithms and Techniques in Telecommunications and Networking.... It is a networking term that is used in communication networks over the digital medium.... it is dynamic protocol.... It is a path vector protocol (Sobh & Mahmood)).... It works in an autonomous system environment....
1 Pages (250 words) Research Paper

Modelling of the Telecommunications and Networking

The paper "Modelling of the Telecommunications and Networking" discusses 4G technology in the 21st century in the arena of telecommunications, the creation of a seamless live video system over the WLAN using the multicast technology, the differences in diffusion at the firm level for the 3G phone.... he first paper is an assessment of 4G technology in the 21st century in the arena of Telecommunications and Networking.... The development in the IPv6 technology has provided every device with its unique IP address promising a shining future to the networking technology....
11 Pages (2750 words) Assignment

Telecommunications and Networking - Reliability and Quality of Service

… The paper "Telecommunications and Networking - Reliability and Quality of Service" is a wonderful example of an assignment on information technology.... The paper "Telecommunications and Networking - Reliability and Quality of Service" is a wonderful example of an assignment on information technology.... Junction networking, web Quality of Service publication indicates that reliability is one of the policies provided by a Data Distribution Service (DDS) and it dictates whether the DDS is performing in the required manner....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us