Telecommunication infrastructure

Undergraduate
Essay
Technology
Pages 7 (1757 words)
Download 0
The ultimate purpose of the project is providing integrated telecommunication infrastructure for three merged companies: TV broadcasting company, radio broadcasting company and publishing company. The suggested solution must combine computer networks of the three companies into powerful, reliable and fast information exchange network that provides comprehensive background for accomplishment of various business duties.

Introduction


Ring topology: All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Ring topologies are relatively expensive and difficult to install, but they offer high bandwidth and can span large distances.
Tree topology: A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable. (Webopedia 2005)
A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following characteristics of a network: access method, allowed physical topologies, types of cabling, and speed of data transfer. Protocol summary Winkelman (2005) is given in Table 1.
Moskowitz defines a virtual private network (VPN) as a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. ...
Download paper
Not exactly what you need?

Related papers

Network Infrastructure Assignment
The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both…
Telecommunication and Networks
Telecommunication can be defined as the assisted transmission of information over a distance for the purposes of communication. Communication has evolved overtime from the use of smoke and drums to the use of the modern day telecommunication devices which are sophisticated, fast, efficient, effective and able to transfer with credibility and authenticity huge amounts of information within a…
Telecommunication infrastructure
Ring topology: All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Ring topologies are relatively expensive and difficult to install, but they offer high bandwidth and can span large distances.…
UK Fixed Line Telecommunication Industry
As and when this happens, BT will be superiorly poised to leverage its huge infrastructure to add to its revenues. (Prodhan G. and Biilingham E., 2009)…
Data communications and Network Fundamental
The existing situation in the company's network infrastructure does not allow achieving best performance and security that are necessary at current stage of its development.…
Earth Curvature and GPS Surveying Essay
GPS is used mostly on land, sea and airborne navigation, also in surveying, geophysical exploration, mapping and geodesy, vehicle location system, farming and transportation systems. Also for telecommunication infrastructure applications include network timing and enhanced 999 for mobile users. It is also important to global delivery of precise and common time to fixe and mobile users.…
Network Infrastructure
The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both…