06.09.2018 Views

CIS 505 Full Course Discussions STR

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>CIS</strong> <strong>505</strong> <strong>Full</strong> <strong>Course</strong> <strong>Discussions</strong> <strong>STR</strong><br />

Just Click on Below Link To Download This <strong>Course</strong>:<br />

https://www.coursetutor.us/product/cis-<strong>505</strong>-full-course-discussions-str/<br />

Or<br />

Email us on<br />

help@coursetutor.us<br />

<strong>CIS</strong> <strong>505</strong> <strong>Full</strong> <strong>Course</strong> <strong>Discussions</strong> <strong>STR</strong><br />

<strong>CIS</strong> <strong>505</strong> Week 1 Discussion 1<br />

I will be totally honest this weeks discussion caught me totally off guard especially with the fourth of<br />

July just passing, but when I think of networking trends the first thing that comes to mind, and I am<br />

sure this is the same for many of you too. Are networking trends like cloud computing,<br />

Virtualization, and software-defined networks(SDN). With software-defined networks, organizations<br />

can do things like move intelligence out to the software layer making hardware much simpler<br />

<strong>CIS</strong> <strong>505</strong> Week 1 Discussion 2<br />

Identify an acceptable system response time for interactive applications. Compare how<br />

this response time relates to an acceptable response time for Websites. This is a question<br />

that I have heard many times, and to be honest I really don’t think there is anyone specific<br />

time. I think you must analyze your site in terms of who your customers and visitors are.<br />

Where are they located? What are their equipment and connection needs etc…<br />

A frequently adopted definition of a real-time system is that in a real-time system not only the result<br />

of a computation is of importance, but also the time this very result is delivered. e.g., in an antilock<br />

braking system (ABS) not only the breaking pressure must be calculated, but also the time of<br />

application is critical to gain a functioning ABS.<br />

<strong>CIS</strong> <strong>505</strong> Week 2 Discussion 1<br />

Take a position on the following statement, “Mainframe computers are still needed even though<br />

personal computers and workstations have increased in capabilities.” Defend your position by


providing at least one example to support your position. Are mainframe computers still needed?<br />

You bet they are I will give you one really good reason why they are. With the increasing number of<br />

people online, increasing speeds increased bandwidths that make increased requests to<br />

enterprises. For example, let’s look at credit card giant Visa. Visa probably handles over 120,00<br />

transactions every second. It is imperative that government, universities, and<br />

commercial businesses of all sizes keep up with this demand and with the number of small servers<br />

that it would require to do this it just would not be feasible. Then if we look at the modern<br />

mainframes they not only can run their own environment, but they can ritualize hundreds or even<br />

thousands of pedestrian servers at the same time Just food for thought.<br />

Analyze the differences between distributed data processing and centralized data<br />

processing. Provide an example of each. Then compare each to the processing used in<br />

cloud computing.<br />

A centralized cloud storage data-center topology is defined as a topology in which the cloud storage<br />

provider has one or a few data-centers located in a small geographical area because the distance<br />

between the end-user and the data-center can potentially be large. An advantage of a centralized<br />

data center topology is the economies of scale of operational expenses A disadvantage is the<br />

higher risk of single-point-of-failure. Table 1 gives an overview of some providers that have all their<br />

data-centers in a small geographical area. A distributed cloud storage data-center topology is a<br />

topology in which the cloud storage provider has multiple data-centers spread over a large<br />

geographical area and in which the user stores and retrieves data from the data-center closest to it.<br />

Testa et al. explained that DNS-based load-balancing algorithms are primarily used to determine<br />

the data-center to which traffic has to be directed the algorithm shows how the clients are<br />

distributed over the data-centers. The content switch constantly monitors the traffic load of the datacenters<br />

are called step 1. A client was resolved using the DNS servers because these IP addresses<br />

can give an indication of data-center location.<br />

An example of a distributed data processing is<br />

For example, an organizational-distributed network comprising of three computers can have each<br />

machine in a different branch. The three machines are interconnected via the Internet and are able<br />

to process data in parallel, even while at different locations. This makes distributed dataprocessing<br />

networks more flexible. An example of a centralized data processing system is:


centralized processing. The processing performed on one computer or in a cluster of coupled<br />

computers in a single location. Access to the computer is via “dumb terminals,” which send only<br />

input and receive output or “smart terminals,” which add screen formatting. All data processing is<br />

performed on the central computer.<br />

<strong>CIS</strong> <strong>505</strong> Week 2 Discussion 2<br />

By Definition: A packet switched network Packet-switched networks move data in separate, small<br />

blocks — packets — based on the destination address in each packet. When received, packets are<br />

reassembled in the proper sequence to make up the message. Circuit-switched networks require<br />

dedicated point-to-point connections during calls. Circuit-switched networks and packet-switched<br />

networks have traditionally occupied different spaces within corporations. Circuit-switched networks<br />

were used for phone calls and packet-switched networks handled data. But because of the reach of<br />

phone lines and the efficiency and low cost of data networks, the two technologies have shared<br />

chores for years. (L. Copeland,2000).The reason Packet switches are more appropriate for the<br />

Internet is, because: With the internet being packet switched, your computer can send off packets<br />

to one host, then send packets off to another host before receiving a response from the first host. It<br />

can even receive response packets from the first host while it is sending off packets to the second<br />

host.<br />

<strong>CIS</strong> <strong>505</strong> Week 3 Discussion 1<br />

IPv6 (Internet Protocol version 6) is a set of specifications from the Internet Engineering Task Force<br />

(IETF) that’s essentially an upgrade of IP version 4 (IPv4). IP addresses for IPv6 are 128 bits and<br />

IPv4 are 32 bits. IPv6 was designed with security in mind while IPv4 had no security. Both the<br />

IPv6 and IPv4 define network layer protocol and how data is sent from one computer to another<br />

computer over packet-switched networks such as the Internet. IPv6 contains addressing and<br />

control information to route packets for the next generation Internet. Network address translation<br />

(NAT) is eliminated which caused several networking problems. This age of video/audio, interactive<br />

games or e-commerce needs the capabilities that IPv6 brings. QoS is a set of service requirements<br />

to deliver performance guarantee while transporting traffic over the network which used in the IPv6.<br />

IPv6 is stronger in security for mobile devices because each device gets a reliable IP address<br />

which permits businesses to outline a security policy for each device that will apply wherever that


device is used. A higher level of data protection due to encryption being mandatory. IPv6 built to<br />

have encryption from the start to finish. An issue with IPv6 would be the switching of IP addresses<br />

for possible hackers. This makes it difficult to track and trace criminals<br />

<strong>CIS</strong> <strong>505</strong> Week 3 Discussion 2<br />

Fat server places more function on the server while the fat client does the opposite. Fat servers are<br />

groupware, transactions, and the web server. Databases and file servers are examples of fat<br />

clients. Distributed objects can be either. In most scenarios, the client machines in a fat server<br />

based client / server environment are thin clients. That is, they have very insufficient processing<br />

capabilities and principally rely on the fat server. Transaction and object servers encapsulate the<br />

database. Fat servers try to minimize network interchanges by creating more abstract levels of<br />

service. These applications are easier to manage and deploy on the network because most of the<br />

code runs on servers.<br />

Fat clients are used for decision support and personal software. The more traditional form of<br />

client/server is fat clients. Versatility and possibilities for generating front-end tools that let endusers<br />

create their own applications. Fat clients can work independently; the functioning is smooth<br />

as there is no load on the server. Software licensing costs are decreasing as a result of which thick<br />

clients seem to be becoming more popular.<br />

An intranet is a private computer network that operates within an organization and facilitates<br />

internal communication and information sharing with the same technology used by the<br />

internet. The major difference is that an intranet is confined to an organization, while the Internet is<br />

a public network that operates between organizations.<br />

The Internet serves businesses by creating opportunities for networking, information retrieval,<br />

communications, marketing, and sales. The internet is used by companies as a tool to sell<br />

products to consumers all around the globe. Companies such as eBay or Amazon are online<br />

stores that sell various of products. Companies can also use the Internet for internal<br />

communications and other electronic activities, which many small businesses do in lieu of<br />

developing their own networks.<br />

Pros of an Intranet are increased employee productivity, allows for greater collaboration, provides a<br />

social networking platform, simplifies decision making, streamlined data management. Cons are


one’s company could be at risk without a strong security foundation, time-consuming and<br />

expensive, and can be counterproductive.<br />

The Internet is an accessible, unrestricted space, while an intranet is created to be a secret space.<br />

An intranet may be obtainable from the Internet, but as a precept, it’s guarded by a password and<br />

open only to employees or other approved users. If we execute a single interspersed system, we<br />

only need one developer organization. From within a business, an intranet server may react much<br />

more swiftly than a regular Web site. This is because the unrestricted Internet is at the tolerance of<br />

passage spikes, server failures and other obstacles that may impede the network. Within an<br />

organization, however, users have much more bandwidth and network hardware may be more<br />

stable. This makes it simpler to serve high-bandwidth content, such as audio and video, over an<br />

intranet.<br />

<strong>CIS</strong> <strong>505</strong> Week 4 Discussion 1<br />

Hyper Text Transfer Protocol (HTTP) or Hyper Text Transfer Protocol Secure (HTTPS) basically<br />

HTTPS is the secure version of HTTP. The secure form encrypts all communication between the<br />

browser and the website. HTTPS is used for the highly confidential online transactions such as<br />

banking and shopping. The padlock icon in the web browser is an indication that HTTPS is in<br />

effect. HTTP is a set of standards that allow users of the web to exchange information found on<br />

web pages. HTTPS provides confidentiality, integrity, and identity. HTTP I see it will soon<br />

disappear since HTTPS provides a more secure way of communicating. Sites that do not use<br />

HTTPS judiciously are crippling the privacy controls you thought were protecting your data. HSTS<br />

(Hyper Strict Transport Security makes sure communication is only used during HTTPS which is<br />

needed to prevent downgrade attacks and cookie hijacking.<br />

HTTP came around when internet protocols were simple text-based. Hackers can easily obtain<br />

information sent over HTTP because it is in plain text form. HTTPS sends information in encrypted<br />

text format which is hard to read for hackers. Protocols for HTTPS are SSL and TLS. SSL or<br />

secure sockets layer and TLS or Transport Layer Security use asymmetric public key infrastructure<br />

(PKI) which uses two keys to encrypt communication. The two keys are a public key and a private<br />

key. An example of a private key would be replacing letters with numbers. The only way it can be<br />

deciphered if the receiver knows the key pattern. A public key is provided by the sharing of a secret


etween two entities. Such as if person A had a message for person B the keys would be sent and<br />

the encryption could only be decoded by these two people.<br />

<strong>CIS</strong> <strong>505</strong> Week 4 Discussion 2<br />

Inelastic traffic does not adjust its material in answer to network conditions. Apps such as Skype,<br />

Facebook Messenger, or Google hangouts are examples of Inelastic traffic. These apps implement<br />

free options to voice and video calls.<br />

Elastic traffic alters its material between and end hosts in reply to network situation. Elastic traffic is<br />

TCP-friendly. The cloud is used in many ways and Elastic Computing is when supplies can be<br />

ascended up and down effortlessly by the cloud service provider. Cloud computing is about<br />

equipping on-demand computing resources with the simplicity of a mouse click. A number of<br />

resources which can be sourced through cloud computing incorporate almost all the facets of<br />

computing from raw processing power to massive storage space. The knack of a service provider to<br />

running malleable computing command when and wherever mandatory. The flexibility of these<br />

means can be in relations of processing power, storage, and bandwidth.<br />

Elastic Traffic can adjust, over wide ranges, to changes in delay and throughput across the internet<br />

and still meet the needs of its applications. Elastic traffic was created for the internet due to its<br />

support of TCP/IP. Organizers flourish on building innovative commodities and services to satisfy<br />

purchaser requirements, although, prices decide if a corporation earns a profit. If prices are<br />

inexpensive, businesses can’t cover their liabilities, and if costs are too great, they may not lure just<br />

shoppers to break even. Elastic demand illustrates a situation where the quantity of product<br />

consumers wants to buy is very sensitive to its price, which can be an important consideration when<br />

setting or changing prices.<br />

<strong>CIS</strong> <strong>505</strong> Week 5 Discussion 1<br />

Routing and Switching Selection Criteria. Please respond to the following:<br />

Compare distance-vector and link state routing and analyze the limitations that would<br />

prevent the usage of each.<br />

Distance vector routing protocols are designed to run on small networks (usually fewer than 100<br />

routers). Examples of distance vector routing protocols include RIP and IGRP. Distance vector


protocols are generally easier to configure and require less maintenance than link-state protocols.<br />

On the downside, distance vector protocols do not scale well because they require higher CPU and<br />

bandwidth utilization. They also take longer to converge than do link-state protocols. Distance<br />

vector protocols always choose the route with the fewest number of hops as the best route. This<br />

can be a problem when the best route to a destination is not the route with the least number of<br />

hops.<br />

Link state routing protocols are designed to operate in large, enterprise-level networks. Examples of<br />

link state protocols include OSPF and NLSP. Link state routing protocols are very complex and are<br />

much more difficult to configure, maintain, and troubleshoot than distance vector routing protocols.<br />

Additionally, link state convergence occurs faster than distance vector convergence. This is<br />

because link state establishes a neighbor relationship with directly connected peers and shares<br />

routing information with its neighbors only when there are changes in the network topology. Link<br />

state routing protocols can be difficult to configure and maintain.<br />

http://www.techrepublic.com/article/should-you-use-distance-vector-or-link-state-routing-protocols/<br />

Choose the method best suited for designing a new routing protocol for a LAN architecture.<br />

Justify your decision.<br />

The best method for designing a new routing protocol for a LAN is employ two or three tiers of<br />

LANs. Within a department, a low-cost, moderate speed LAN supports a cluster of personal<br />

computers and workstations. These departmental LANs are lashed together with a backbone LAN<br />

of higher capacity. The architecture of a LAN is best described in terms of a layering of protocols<br />

that organize the basic functions of a LAN.<br />

<strong>CIS</strong> <strong>505</strong> Week 5 Discussion 2<br />

Suggest a way to improve the way LLC and MAC are used for LAN operation.<br />

The MAC layer is responsible for detecting errors and discarding any frames that contain errors.<br />

The LLC layer optionally keeps track of which frames have been successfully received and<br />

retransmits unsuccessful frames. The relationship between LLC and the MAC protocol can be seen<br />

by considering the transmission formats involved. User data are passed down to the LLC layer,<br />

which prepares a link-level frame, known as an LLC protocol data unit (PDU). This PDU is then<br />

passed down to the MAC layer where it is enclosed in a MAC frame. In a wireless environment,


data packets may be lost entirely, partially lost due to truncation, or corrupted by bit errors.<br />

However, adaptive packet shrinking and forward error correction (FEC) policies significantly<br />

increase the useful throughput of a wireless LAN, while the fixed policies are effective only in some<br />

environments & can be added fairly easily to the MAC and LLC implementations.<br />

Stallings, William. (10/2008). Business Data Communications, 6th Edition. [VitalSource Bookshelf<br />

Online]. Retrieved from https://strayer.vitalsource.com/#/books/9781323079324/<br />

Eckhardt, D. A., & Steenkiste, P. (1998, October). Improving Wireless LAN Performance via<br />

Adaptive Local Error Control. Retrieved<br />

from http://repository.cmu.edu/cgi/viewcontent.cgi?article=1526&context=compsci<br />

Evaluate guided and unguided transmission medium to determine which you would use to<br />

design a new facility.<br />

Transmission media can be classified as a guided or unguided. With guided media, the waves are<br />

guided along a solid medium, such as copper twisted pair, copper coaxial cable, or optical fiber.<br />

The atmosphere and outer space are examples of unguided media, which provide a means of<br />

transmitting electromagnetic signals but do not guide them; this form of transmission is usually<br />

referred to as wireless transmission. For a new facility I would initially go with guided transmission<br />

media and then add unguided transmission media. Guided transmission capacity depends on the<br />

distance and on whether the medium is point-to-point or multipoint. Unguided transmission and<br />

reception are achieved by means of an antenna, is directional & puts out focused beam. However,<br />

the transmitter and receiver must be aligned but can spread signals out in all directions & can also<br />

be received by many antennas.<br />

<strong>CIS</strong> <strong>505</strong> Week 6 Discussion 1<br />

Asynchronous Transfer Mode (ATM) was made for multimedia applications or similar items due to<br />

the large bandwidths they carried. ATM is better suited for applications using real-time<br />

transmission of video signals. If ATM is preferred, a significant overhead is involved in integration<br />

into the ATM layers. The fastest ATM products at the moment operate at 622Mbit/s.<br />

Gigabit Ethernet offers routine improvements for prevailing networks without having to change the<br />

cables, protocols and applications already in use. Gigabit Ethernet advantage is basically its origin<br />

in the proven technology of Ethernet. Meaning it is fully compatible with existing Ethernet


technologies. This means a performance enhancement for existing networks without having to<br />

change the cables, protocols and applications already in use. Users can therefore work on the<br />

basis that migration from Ethernet to Gigabit Ethernet will be very easy and transparent.<br />

Applications that run through Ethernet will also work by Gigabit Ethernet. At 1000Mbit/s, Gigabit<br />

Ethernet is almost twice as fast as ATM. Speeds are seamlessly transmitted at a higher rate.<br />

Compare and contrast the advantages of Fast Ethernet, Gigabit Ethernet, and 10-Gbps Ethernet.<br />

Fast Ethernet carries traffic at a rate of 100Mbit per second. When Fast Ethernet was upgraded by<br />

improving the speed and reducing the bit.<br />

10-Gbps advantage is the speed. It has better hardware and rack space efficiency, simple<br />

virtualization, and greater scalability. In standard Ethernet, bit was transmitting in one second and<br />

in Fast Ethernet it takes 0.01 microsecond for one bit to transmit.<br />

Gigabit Ethernet is another term of Ethernet in computing network, for carrying on the traffic at the<br />

rate of 1billion bits per second. This method is expressed in the IEEE 802.3 standard and is<br />

presently being used as the fortitude in many enterprise networks. Gigabit is carried primarily on<br />

optical fiber. Optical fiber is the medium that transmit information when light pulses along a glass<br />

or plastic strand or fiber.<br />

Connecting Gigabit Ethernet using the lower speed Ethernet mechanisms is easy because one can<br />

use LAN switches or routers to modify one physical line speed to the other. Gigabit Ethernet uses<br />

64 – 1514-byte packets IEEE 802.3 frame format which is found in Ethernet technologies and Fast<br />

Ethernet. Changes are not necessary because the frame format and size are the same. This<br />

mutative advancement track permits Gigabit Ethernet to be flawlessly joined into current Ethernet<br />

and Fast Ethernet networks.<br />

<strong>CIS</strong> <strong>505</strong> Week 6 Discussion 2<br />

Wireless LAN. Please respond to the following:<br />

<br />

Analyze the characteristics of wireless LANs and assess the security concerns of this<br />

technology in organizations such as universities or hospitals. Identify additional areas of<br />

concern for organizations that implement a wireless LAN. Then, explain whether the<br />

implementation of a WAN would solve these problems. Explain your rationale.


Rank the following IEEE 802.11 standard addresses in order of importance with the first<br />

one being the most important. Justify the reason for your chosen order.<br />

<br />

o Association<br />

o Re-association<br />

o Disassociation<br />

o Authentication<br />

A Wireless LAN performs a malleable data communication system regularly increasing satisfactorily<br />

than interchanging a wired LAN within a edifice or college grounds. WLANs use radio frequency to<br />

conduct and obtain data over the air, diminishing the essential for wired correlations.<br />

Wireless safekeeping is vital. Wireless indicators often circulate afar tangible obstacles, the peril of<br />

someone struggling to force an entry using the wireless foundation is sophisticated paralleled to<br />

someone attaining sensible admittance to a wired port.<br />

Guests and Personnel should be placed on different Wi-Fi networks so that important information<br />

cannot fall into the wrong hands. One’s goal to provide sufficient Wi-Fi signal only to the areas<br />

where it’s required. If one has Wi-Fi signal that extends outside structure ramparts and out into<br />

communal cosmoses, one chances of alluring potential threats from criminals who may try to<br />

interrupt one’s network or impede with the wireless signal. Limiting Wi-Fi signal would solve this<br />

issue.<br />

Association: Once authentication is complete, mobile devices can associate (register) with an<br />

AP/router to gain full access to the network. Association allows the AP/router to record each mobile<br />

device so that frames are properly delivered. Association only occurs on wireless infrastructure<br />

networks, not in peer-peer mode. A station can only associate with one AP/router at a time.<br />

http://www.intel.com/content/www/us/en/support/network-and-i-o/wirelessnetworking/000006508.html<br />

Disassociation: A station or access point may invoke the disassociation service to terminate an<br />

existing association. This service is a notification; therefore, neither party may refuse termination.<br />

Stations should disassociate when leaving the network. An access point, for example, may<br />

disassociate all its stations if being removed for maintenance.<br />

http://www.informit.com/articles/article.aspx?p=24411&seqNum=7


Re-association: The re-association service enables a station to change its current state of<br />

association. Re-association provides additional functionality to support BSS-transition mobility for<br />

associated stations. The re-association service enables a station to change its association from one<br />

access point to another. This keeps the distribution system informed of the current mapping<br />

between access point and station as the station moves from one BSS to another within an ESS.<br />

Re-association also enables changing association attributes of an established association while the<br />

station remains associated with the same access point. The mobile station always initiates the<br />

association service.<br />

http://www.informit.com/articles/article.aspx?p=24411&seqNum=7<br />

Authentication: 802.11 authentication is the first step in network attachment. 802.11 authentication<br />

requires a mobile device (station) to establish its identity with an Access Point (AP) or broadband<br />

wireless router. No data encryption or security is available at this stage.<br />

The Institute of Electrical and Electronics Engineers, Inc.(IEEE) 802.11 standard defines two linklevel<br />

types of authentication:<br />

Open System<br />

Shared Key<br />

http://www.intel.com/content/www/us/en/support/network-and-i-o/wirelessnetworking/000006508.html<br />

<strong>CIS</strong> <strong>505</strong> Week 7 Discussion 1<br />

The Advantages of VPNs for an organization include cost savings and network scalability. A VPN<br />

can save organizations money in several situations: eliminating the need for expensive longdistance<br />

leased lines, reducing long-distance telephone charges, & offloading support costs. The<br />

cost to an organization of building a dedicated private network may be reasonable at first but<br />

increases exponentially as the organization grows. Internet based VPNs avoid this scalability<br />

problem by simply tapping into the public lines and network capability readily available& offers<br />

superior reach and quality of service.<br />

http://compnetworking.about.com/od/vpn/f/vpn_benefits.htm


From the e-Activity, compare three VPN services available to organizations to determine the<br />

primary differences among each. Discuss the pros and cons of each VPN service and<br />

suggest the type of organization that would best fit each network provider.<br />

PPTP VPN – This is the most common and widely used VPN protocol. They enable authorized<br />

remote users to connect to the VPN network using their existing Internet connection and then log<br />

on to the VPN using password authentication. They don’t need extra hardware and the features are<br />

often available as inexpensive add-on software. PPTP stands for Point-to-Point Tunneling Protocol.<br />

The disadvantage of PPTP is that it does not provide encryption and it relies on the PPP (Point-to-<br />

Point Protocol) to implement security measures.<br />

SSL – SSL or Secure Socket Layer is a VPN accessible via https over web browser. SSL creates a<br />

secure session from your PC browser to the application server you’re accessing. The major<br />

advantage of SSL is that it doesn’t need any software installed because it uses the web browser as<br />

the client application. A disadvantages is its optional (as opposed to in-built) user authentication.<br />

This is a major security weakness. Also, SSL tunneling (basically mimics IPSec) is not supported<br />

on Linux or non-Windows OS.<br />

MPLS VPN – MPLS (Multi-Protocol Label Switching) are no good for remote access for individual<br />

users, but for site-to-site connectivity, they’re the most flexible and scalable option. These systems<br />

are essentially ISP-tuned VPNs, where two or more sites are connected to form a VPN using the<br />

same ISP. An MPLS network isn’t as easy to set up or add to as the others, and hence bound to be<br />

more expensive.<br />

For individual users, PP2P VPNs offer the best deal, but for large offices or ones with complex<br />

requirements for connectivity MPLS VPNs might be the best option.<br />

http://techpp.com/2010/07/16/different-types-of-vpnprotocols/<br />

http://www.addictivetips.com/windows-tips/what-is-vpn-how-to-create-and-connect-tovpn-network/<br />

http://www.itproportal.com/2007/05/18/benefits-and-disadvantages-of-ssl-vpns/#ixzz493EMNfIL<br />

<strong>CIS</strong> <strong>505</strong> Week 7 Discussion 2<br />

Frame relay is a packet switching technology for connecting network points in Wide Area Networks<br />

(WAN). It is a connection oriented data service and establishes a virtual circuit between two end<br />

points. Data transfer is done in packets of data known as frames. These frames are variable in


packet size and more efficient due to flexible transfers. Frame Relay was originally introduced for<br />

ISDN interfaces though it is currently used over a variety of other network interfaces as well.<br />

ATM is a network switching technology that uses a cell based methodology to quantize data. ATM<br />

data communication consists of fixed size cells of 53 bytes. An ATM cell contains a 5byte header<br />

and 48 bytes of ATM payload. This smaller size, fixed-length cells are good for transmitting voice,<br />

image and video data as the delay is minimized. ATM is a connection oriented protocol and<br />

therefore a virtual circuit should be established between sending and receiving points. It establishes<br />

a fixed route between two points when the data transfer starts. Another important aspect of ATM is<br />

its asynchronous operation in time division multiplexing. ATM provides a good quality of service in<br />

networks where different types of information such as data, voice, and are supported. With ATM,<br />

each of these information types can pass through a single network connection.<br />

Advantages & Disadvantages<br />

Although ATM uses fixed size packets (53 bytes) for data communication, frame relay uses variable<br />

packet sizes depending on the type of information to be sent. Both information blocks have a<br />

header in addition to data block and transfer is connection oriented. Frame Relay is used to<br />

connect Local Area Networks (LAN) and it is not implemented within a single area network contrast<br />

to ATM where data transfers are within a single LAN. ATM is designed to be convenient for<br />

hardware implementation and therefore, cost is higher compared to frame relay, which is software<br />

controlled. Therefore, frame relay is less expensive and upgrading is easier. Frame relay has a<br />

variable packet size. Therefore, it gives low overhead within the packet which results it an efficient<br />

method for transmitting data. Although fixed packet size in ATM, can be useful for handling video<br />

and image traffic at high speeds, it leaves a lot of overhead within the packet, particularly in short<br />

transactions.<br />

https://learningnetwork.cisco.com/thread/74127<br />

Suppose you are in charge of selecting ATM or frame relay as a WAN alternative for your<br />

technological needs of a communication technology organization. Choose one of the WAN<br />

alternatives and justify your decision.<br />

A WAN alternative I would choose for my technological needs of a communication technology<br />

organization would be Frame Relay. Frame Relay networking services deliver a permanent virtual<br />

circuit (PVC), which means that customers benefit from what looks like a continuous, dedicated<br />

connection, without having to pay for a full-time leased line. At a service provider level, the route


which each frame travels to its destination is allocated dynamically and can be charged based on<br />

actual usage. It’s a proven technology, resilient, is more cost effective than leased lines, and is<br />

more scalable than a network of private circuits.<br />

http://www.theregister.co.uk/2003/11/24/what_wan_technology_is_right/<br />

<strong>CIS</strong> <strong>505</strong> Week 8 Discussion 1<br />

The three mentioned satellites are used for communications, whether marketable or in customary<br />

native groundwork is inaccessible or capricious, circle in the earth in three orbits. Satellites are<br />

used as a way to communicate around the globe. The broadcast industry as well as the<br />

telecommunication companies and weather satellites uses GEO to serve as its main access to<br />

communicate.<br />

Geo configuration advantages are the stationary relative to the earth which leaves no issues for<br />

frequency changes due to the relative motion of the satellite and antennas on earth. Tracking is<br />

simplified by earths stations. At 35,838 km above the earth, the satellite can communicate with<br />

roughly one-fourth of the earth; three satellites in geostationary orbit separated by 120x cover most<br />

of the inhabited portions of the entire earth, excluding only the areas near the north and south<br />

poles.<br />

LEO or the original AT&T satellite proposal was for low earth orbititng satellites, but most of the<br />

early commercial satellites were geostationary. The idea of LEO sattelites is to use constellations of<br />

inexpensive. A LEO satellite can be “seen” by a point on earth on the order of minutes before the<br />

satellite passes out of sight. If intermediate orbits are used—higher than the LEOS and lower than<br />

GEOS—a point on earth can see the satellite for periods on the order of hours. Such orbits are<br />

called medium-earth-orbiting satellites(MEOS). These orbits are on the order of 10,000 km above<br />

the earth, and require fewer handoffs. While propagation delay to earth from such satellites (and<br />

the power required) is greater than for LEOS, they are still substantially less than for GEOS. ICO<br />

Global Communications, established in January 1995, proposed a MEO system. Launches began<br />

in 2000; 12 satellites, including two spares, are planned in 10,400 km orbits. The satellites will be<br />

divided equally between two planes tilted 45x to equator. Proposed applications are digital voice,<br />

data, facsimile, high-penetration notification, and messaging services.<br />

http://www.informit.com/articles/article.aspx?p=23761


http://www.harriscaprock.com/blog/high-throughput-satellite-communications-systems-meo-vs-leovs-geo/<br />

“VSAT systems provide high speed, broadband satellite communications for Internet or private<br />

network communications. VSAT is ideal for mining camps, vessels at sea, satellite news gathering,<br />

emergency responders, oil & gas camps or any application that requires a broadband Internet<br />

connection at a remote location. VSAT is an excellent way to connect your remote sites and<br />

workers with Internet communications for email, web access, video transmissions, Voice over IP<br />

telephone services, or other IP applications for your field operations. VSAT enables you to expedite<br />

your business processes by integrating field operations with your corporate wide area network.”<br />

http://www.networkinv.com/technology/vsat/vsat-for-usa/<br />

Coverage for the USA is on Galaxy 16, Galaxy 18 & AMC 9 satellites, provide options for<br />

connectivity across the USA. The coverage at sea is Maritime VSAT services.<br />

The business applications currently being used to support VSAT is Television distribution, Longdistance<br />

telephone transmission, and Private business networks. Because of their broadcast<br />

nature, satellites are well suited to television distribution and are being used extensively for this<br />

purpose in the United States and throughout the world. In its traditional use, a network provides<br />

programming from a central location. Programs are transmitted to the satellite and then broadcast<br />

down to a number of stations, which then distribute the programs to individual viewers. A more<br />

recent application of satellite technology to television distribution is direct broadcast satellite (DBS),<br />

in which satellite video signals are transmitted directly to the home user. GEOS (Geosynchronous<br />

Earth Orbit Satellites) are used mainly for communications and broadcasts. Business applications<br />

could be for satellite broadcasts, maritime phone calls, meteorological applications and cable and<br />

satellite tv as well.<br />

LEOS (Low Earth Orbit Satellites) are also used in business for communications but on a more<br />

personal scale. LEOS are used for email and mobile phone networks, video conferencing, high<br />

bandwidth data connections and in government or business, can be used for spying and espionage<br />

operations.<br />

MEOS (Middle Earth Orbit Satellites) are used in business for navigation. MEOS make up the<br />

backbone of the GPS enabled applications that are out there.


VSAT (Very Small Aperture Terminals) is being used to support businesses in a couple different<br />

ways. First, it allows for businesses in remote locations to have access to Internet resources.<br />

Laying cable is time consuming and very costly for rural areas. VSAT technology allows businesses<br />

to remain competitive no matter where they are. VSAT allow for a high QoS which allows them to<br />

be great partnered with VPN access for businesses. The QoS is also improved because most<br />

VSAT connections are only single hop resulting in less lag and loss.<br />

References:<br />

http://old.repertoiremag.com/Article.asp?Id=524<br />

<strong>CIS</strong> <strong>505</strong> Week 8 Discussion 2<br />

<br />

Compare the four items related to channel capacity: data rate, bandwidth, noise, and error<br />

rate. Determine the most important and justify its significance over the remaining items.<br />

Describe real-world examples of attenuation and white noise. Examine the effect on the<br />

information-carrying capacity of the link and present a way to avoid these types of<br />

interruptions. Data Transmission is the process of sending digital or analog data over a<br />

communication medium to one or more computing, network, communication or electronic<br />

devices. Data Rate is the term associated with the rate of data transferred between two<br />

or more computing and telecommunication devices or systems. Bandwidth is a wider<br />

term, which is basically associated with the computer networking and digital technologies<br />

and measures the bit rate of communication resources available or consumed. Noise is<br />

unwanted electrical or electromagnetic energy that degrades the quality of signals and<br />

data. Error rate is the degree of errors encountered during data transmission over a<br />

communications or network connection.<br />

Noise is the most important component in the channel capacity. Noise can disrupt the flow of<br />

information. There are so many different types of noise one could face in a business setting:<br />

Environmental, Physiological-Impairment, Semantic, Syntactical, Organizational, Cultural, and<br />

Psychological. Issues in communications that derives from the above mentioned noises could affect<br />

the sender, the message itself, the channel it is being sent through, or the recipient of that<br />

message.


Attenuation is a loss of communication signal strength measured in decibals (dB). Amplification is<br />

used to surge signal potency. Range, Interference and Wire size are the reasons attenuation<br />

happens. DSL uses attenuation. Typical values for line attenuation on a DSL connection are<br />

between 5dB and 50dB.<br />

White noise is a type of noise that is produced by combining sounds of all different frequencies<br />

together.All the imaginable tones the human ear can hear and combine them all together would<br />

form white noise.White noise is random noise that has a flat spectral density.The audible frequency<br />

range 20-20000 hertz. An example of white noise is the sound of the ocean or the sound the train<br />

or subway makes as it moves across the tracks. Ambulances, Fire Trucks or Police vehicles all use<br />

white noise.The white noise is over heard through traffic and makes these emergency vehicles<br />

more noticeable. When looking at the four items I would say that error rate is the most important<br />

because it is great that you may get more stuff transferred faster with less time but if it has a lot of<br />

errors in the data then it is not as useful.<br />

Techopedia explains Attenuation<br />

Attenuation can relate to both hard-wired connections and to wireless transmissions.<br />

There are many instances of attenuation in telecommunications and digital network circuitry.<br />

Inherent attenuation can be caused by a number of signaling issues including:<br />

Transmission medium – All electrical signals transmitted down electrical conductors cause<br />

an electromagnetic field around the transmission. This field causes energy loss down the<br />

cable and gets worse depending upon the frequency and length of the cable run. Losses<br />

due to<br />

Crosstalk from adjacent cabling causes attenuation in copper or other conductive metal<br />

cabling.<br />

Conductors and connectors – Attenuation can occur as a signal passes across different<br />

conductive mediums and mated connector surfaces.<br />

Repeaters are used in attenuating circuits to boost the signal through amplification (the opposite of<br />

attenuation). When using copper conductors, the higher the frequency signal, the more attenuation<br />

is caused along a cable length. Modern communications use high frequencies so other mediums<br />

which have a flat attenuation across all frequencies, such as fiber optics are used instead of<br />

traditional copper circuits.


Different types of attenuation include:<br />

Deliberate attenuation can occur for example where a volume control is used to lower the<br />

sound level on consumer electronics.<br />

Automatic attenuation is a common feature of televisions and other audio equipment to<br />

prevent sound distortion by automatic level sensing that triggers attenuation circuits.<br />

Environmental attenuation relates to signal power loss due to the transmission medium,<br />

whether that be wireless, copper wired or fiber optic connected.<br />

References<br />

http://compnetworking.about.com/od/networkdesign/g/what-is-attenuation.htm<br />

http://www.livescience.com/38387-what-is-white-noise.html<br />

<strong>CIS</strong> <strong>505</strong> Week 9 Discussion 1<br />

Digital Transmission. Please respond to the following:<br />

Compare the data communication technologies of guided media and unguided media. This<br />

should include transmission media, data link control protocols, and multiplexing.<br />

Guided media is a physical path in which the signals prorogate; twisted pair, coaxial cable, and fiber<br />

optic. Unguided media usually employs an antenna for transmitting via air, vacuum, or water. Thus,<br />

the reason unguided transmission techniques are usually used for broadcast radio, terrestrial<br />

microwave, and satellite. Network environments are very costly due to the efforts need to protect<br />

transmission. High Level Data Link Control (HDLC) is a group of protocols or rules for transmitting<br />

data between network points. It’s one of the most used of many protocols. Data Link controls helps<br />

with the flow and error control of the transmission. Multiplexing aides in achieving transmission<br />

efficiency.<br />

An analog wave form (or signal) is characterized by being continuously variable along amplitude<br />

and frequency. In the case of telephony, for instance, when you speak into a handset, there are<br />

changes in the air pressure around your mouth. Those changes in air pressure fall onto the<br />

handset, where they are amplified and then converted into current, or voltage fluctuations. Those<br />

fluctuations in current are an analog of the actual voice pattern—hence the use of the term analog<br />

to describe these signals. Digital transmission is quite different from analog transmission. For one<br />

thing, the signal is much simpler. Rather than being a continuously variable wave form, it is a series<br />

of discrete pulses, representing one bits and zero bits. Each computer uses a coding scheme that


defines what combinations of ones and zeros constitute all the characters in a character set (that is,<br />

lowercase letters, uppercase letters, punctuation marks, digits, keyboard control functions).<br />

References<br />

http://www.informit.com/articles/article.aspx?p=24687&seqNum=5<br />

Digital transmission has several advantages over analog transmission. Analog circuits require<br />

amplifiers, and each amplifier adds distortion and noise to the signal. In contrast, digital amplifiers<br />

regenerate an exact signal, eliminating cumulative errors. An incoming (analog) signal is sampled,<br />

its value is determined, and the node then generates a new signal from the bit value; the incoming<br />

signal is discarded. With analog circuits, intermediate nodes amplify the incoming signal, noise and<br />

all. Voice, data, video, etc. can all by carried by digital circuits.<br />

References:<br />

http://web.cs.wpi.edu/~cs513/s07/week2-physcont.pdf<br />

<strong>CIS</strong> <strong>505</strong> Week 9 Discussion 2<br />

T-1 Lines. Please respond to the following:<br />

From the e-Activity, analyze the multiplexing techniques of DSL and cable modem Internet<br />

and suggest the one you prefer. Explain your decision.<br />

Multiplexing takes multiple signals and merges them into one, complex signal to be<br />

transmitted. Once the receiving devices catches the multiplexed signal, it is then divided into it’s<br />

original, multiple form. Cable modems use a new specification, named DOCSIS 3.1, to remain<br />

competitive and add multiple enhances. One of these enhancements is Orthogonal Frequency<br />

Division Multiplexing (OFDM). This transmission technique divides bandwidth into smaller subcarriers<br />

which helps decrease interference and allow for better data transmission on parallel<br />

channels. This standard provides the ability to define multiple downstream profiles on a single<br />

channel. The DOCSIS 3.1 specification also uses time and frequency multiplexing to transmit<br />

signals through a single channel. This makes OFDM and other legacy channels to operate<br />

simultaneously on separate or on the same frequencies.<br />

Compare and contrast the use of leased lines in a WAN or LAN setting. Then recommend<br />

what you would use if you were a CIO. Support your response with evidence or examples.


WANs are often built using leased lines. These leased lines involve a direct point-to-point<br />

connection between two sites. Point-to-point WAN service may involve either analog dial-up lines or<br />

dedicated leased digital private lines. An analog signal is a continuously varying electromagnetic<br />

wave that may be transmitted over a variety of media, depending on frequency. The principal<br />

advantages of digital signaling are that it is generally cheaper than analog signaling and is less<br />

susceptible to noise interference. Therefore, my recommendation would be in support of leasing<br />

lines in a WAN setting. A wide area network allows companies to make use of common resources<br />

in order to operate. Internal functions such as sales, production and development, marketing, and<br />

accounting can also be shared with authorized locations through this sort of network. The wide area<br />

network has made it possible for companies to communicate internally in ways never before<br />

possible.<br />

Download Now

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!