StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Telecommunications and Networking - Essay Example

Cite this document
Summary
An essay "Telecommunications and Networking" reports that a perception of an imaginary cloud that illustrates the Internet or most likely a corporate network environment. The imaginary Internet cloud of a corporate network environment is trustworthy for data transportation…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Telecommunications and Networking
Read Text Preview

Extract of sample "Telecommunications and Networking"

Telecommunications and Networking A comprehensive description covering all the concepts of cloud computing is defined as “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (for example, networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service-provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” (Mell, Grance 2010) ‘Cloud Computing’ matches a perception of an imaginary cloud that illustrates the Internet or most likely a corporate network environment that is represented by a cloud. The imaginary Internet cloud of a corporate network environment is trustworthy for data transportation. Moreover, it is incorporated with advanced cloud generalization. In order to extend the cloud-computing concept, there are services along with network components consisting of routers, switches, application servers, and data servers. The components of the network are installed to operate at the back-end for providing advanced services that are proficient to develop web application (What is cloud computing?). Moreover, cloud computing consists of applications that are represented as a service on the web and the provision of hardware / software services provided by companies operating data centers. Likewise, the services provided over the Internet are referred as (Software as a Service) ‘SaaS’. Few sellers use the term (Infrastructure as a service) IaaS and (Platform as a service) PaaS ’in order to demonstrate their products and services. However, these terms are avoided and not accepted globally, due to variation (ARMBRUST, FOX et al. 2010). The Commerce Department’s National Institute of Standards and Technology (NIST) have illustrated some helpful definitions that focus on three concepts (Ryan, Loeffler 2010): Cloud infrastructure as a service ‘IaaS’ consists of provisioning elementary computing resources. Cloud software as a service ‘SaaS’ access software application that operates on a cloud infrastructure. Cloud platform as a service (PaaS) provides the accessibility to users for implementing and developing applications with programming language and tools supported by the providers. The core components of a cloud are consists of the data center hardware and software. When these resources are made available to the public, they are referred as public clouds and the service provided by the cloud is called as utility computing. Moreover, private clouds are only available to private organizations and are not accessible by public. Accordingly, cloud computing is the combination of ‘SaaS’ and utility computing (ARMBRUST, FOX et al. 2010). Furthermore, cloud computing is a successful contributor economically for cyber infrastructure as it “makes applications dramatically easier to develop and deploy, thus expanding the feasible scope of applications possible within budget and organizational constraints, and shifting the scientist’s and engineer’s effort away from information technology development and concentrating it on scientific and engineering research. Cyber infrastructure also increases efficiency, quality, and reliability by capturing commonalities among application needs, and facilitates the efficient sharing of equipment and services” (Vouk 2008)(Vouk 2008). Business Trends Information Technology organization has already invested millions since the 1990’s, to contribute in reshaping cloud computing. For instance, a popular slogan from Sun that was “Network is a computer” was recognized in 1980’s. Furthermore, salesforce.com, a ‘SaaS’ enabled website is providing services since 1999. Today, cloud computing represents a more innovative and productive approach, in order to provide online services along with online operating systems. Microsoft Azure provides an online operating system along with the set of development tools and services. Moreover, Google Docs provides online word processors along with spreadsheets and presentation applications similar to Microsoft Office. Furthermore, Google Apps gives the freedom to the developers to execute their codes and applications on Google infrastructure. Sun Microsystems provides computing power by charging $1 per hour for one CPU. In addition, Amazon provides web services named as EC2 and S3. Moreover, Yahoo has also announced recently that it will utilize ‘Apache Hadoop framework’ that will enable users to work on thousand of nodes and one million bytes of data. Accordingly, the contribution of cloud computing is covering every aspect of computation required for small, medium and large businesses (Han 2010). However, there security issues associated with cloud computing, cloud computing still promises to cope up with the task as it posses potential to redesign information technology contribution towards businesses. The most spectacular feature of cloud computing is that it provides flexible capacity for businesses. Moreover, it eliminates the cost of unnecessary hardware, software, maintenance and power. It also minimizes cost associated with launching corporate projects and application deployment, redefining business strategy by labeling it with cost perceptive. In the context of austerity, cloud computing provides a light of hope for organizations to reform their business with cost effective solutions (Shivakumar, Raju 2010). Hybrid cloud models are dominating currently as in a report titled as “2010 trends to watch cloud computing” Laurent Lachal who is a senior analyst employed at Ovum said “Enterprises will mix and match public and private cloud elements with traditional hosting and outsourcing services to create solutions that fit short and long-term requirements," he further said. "The past 18 months have seen a significant shift in focus away from public clouds towards private ones, owing to a powerful mix of vendor push and user pull” (Ho 2010). Virtualization In simple words, it is defined as “the creation of a product, service, or organization that has an electronic rather than a physical existence” (Virtualization. 2007). Virtualization in the context of cloud computing refers to Server Virtualization, Desktop Virtualization, Storage Virtualization and Network Visualization. Server Virtualization is related with replicating the resources such as processors, applications and users along with the physical server. Moreover, server virtualization can be divided in to 3 categories i.e. Mainframe, Midrange and commodities. Mainframe includes virtual machine that is used for running an operating system virtually and ‘z Linux’ a virtual server for Linux developed by IBM. The Midrange virtualization includes Solaris containers and zones and the commodity virtualization consists of VM ware, Oracle VM and Xen. The desktop virtualization is categorized in two PC / MAC and Virtual desktop infrastructure (VDI). The category named as PC / MAC includes virtual box, virtual PC etc. VDI consists of Oracle VDI and desktop virtualization by Citrix. The next category is the storage virtualization, which includes storage area networks and arrays developed by Exadata, Netapps etc. Lastly, there is a category named as network visualization consisting of Virtual Local Area Networks (VLAN). Benefits Cloud computing provide many cost effective short term and long-term benefits. The organizations can avail services from multiple cloud-computing providers, to improve computerized business processes and high availability of services within the organization. Cloud computing also provides standardization of APIs, by operating on compatible applications to enable hybrid cloud computing. Moreover, organizations operating on IT infrastructure save staff, and financial resources. Cloud computing is also flexible and facilitate organizations to initialize a project robustly without upsetting on the cost, that may include disk storage, CPU and RAM. Likewise, organizations can buy spaces for data storage on data centers located in different geographical area, that enables them to protect their data in terms of natural disasters and hazards. Furthermore, one more advantage that is significant is related to the uptime and availability of services at all times. In addition, cloud computing is also efficient for handling large data sets. The data is analyzed in terabytes by pay for use business model to facilitate academic institutions by distributed computing with hundreds of computers in a short time cost (Han 2010). Furthermore, the integration of cloud computing and semantic web has produced a new revolutionary e-portfolio. Previously, e-portfolios have faced various challenges and limitations by the development and implementation approach. However, a research by (Kim, Ng et al. 2010) on a design based on Private-Public data index systems that integrate cloud computing applications and storage with the architecture of Semantic web architecture. The integration aided semantic web-based virtualization along with advanced intellectual search achievable. Green Computing Virtualization Virtualization has played a dominating role to provide isolation due to security issues while running applications on divided computing devices. Moreover, virtualization apart from isolation provides other vast benefits including design plainness, space reduction in a server room, cost reduction due to centralized management and minimal power consumption. A study was conducted by (Guster, Hemminger et al. 2009), to utilize virtualization for reducing data center infrastructure and to promote green computing. The study was conducted on nine workstations. These workstations were virtualized in to nine different zones on a sole workstation. The conclusion in terms of cost associated with power, the savings were $600 per year and cooling cost savings were $ 300 per year. The total savings were $900 per year. Furthermore, space savings in a corporate environment can also be added. Virtualization Security David Jackson who is a senior security architect employed at Logica’s security practice highlights virtualization security benefits. Virtualization can be installed with a clean image over an environment that can be infected by viruses or threats. Moreover, it facilitates people to share systems without exposing the personal and classified data. Organizations can centrally monitor application by factors including type, time and levels that are granted to each user. Furthermore, virtualization provides an isolated testing environment for debugging and testing new applications against threats and viruses (Mortleman 2009). Besides, in order to test the new application in an isolated virtualized environment, Jackson cautioned organizations as he said “Virtualisation can make the environment more complex by adding a new layer of software that must be maintained, including performance and availability monitoring, upgrades and patches. Add to this the increased complexity of diagnosing problems and managing virtual images, and you begin to see why an unprepared enterprise can easily be sidelined” (Mortleman 2009). Enterprises have been increasingly adopting server virtualization technologies in recent years. Security risk identification and related controls have also been receiving increased discussion lately. Guidance is also available on virtualization security configurations from independent groups, such as benchmarks from the Center for Internet Security and the virtualization vendors. This writing will revisit the risks and controls, which will be a basis for discussion of assessment techniques. As security assessors, auditors and compliance validators see more of the physical environment disappearing and being replaced by the virtual foundation, gathering the necessary metrics from virtual environment will be a key part of assurance activities. In order to secure the virtual environment from threats and vulnerabilities, organizations should follow security safeguards such as: Security teams should take a number of steps to ensure the improved protection of virtual environments, including (10 THINGS you should know now about... VIRTUALIZATION SECURITY. 2009): Speed Traps “Virtualization platforms have made it far easier and much faster to create and deploy servers and applications than was possible when physical limitations governed system rollouts” Net Perimeter “The traditional physical character of the network perimeter is impacted by the rate and quantity of change inside the data center brought about by x86 server virtualization” Stress Points “Increased stress is created by the sheer proliferation of VMs and the speed with which they can be built and torn down. Network security personnel must interject to ensure that these swiftly made systems do not start leaking data or carrying malware just as quickly” On the Move “The rapid movement of systems inside the data center also creates security stress. Unlike, physical systems, when a VM moves, it is far from certain that the security policies that govern how that resource is protected will move with it” Relative Effectiveness “Security tools and practices that worked in the physical world can be seriously compromised by the very qualities that make virtual machines so appealing mobility, demand-based provisioning, high utilization of individual physical server resources, and the blurring of roles between system and network personnel” VM Safeguards “Look for security products that can run as a virtual machine to secure inter virtual machine traffic and application activity. VMware, through its VMsafe API in vSphere 4, has set the stage for security vendors to see traffic that was previously difficult to monitor. Expect more products from major security vendors in this arena” CPU Cost Concerns “Because of the nature of virtualization, security products that consume even 2 to 3 percent of CPU per VM will likely soon be too expensive to implement” Security Policy “Aside from CPU cycles, security policy will have to be adapted to face the new reality imposed by VM proliferation, spontaneity, and mobility. It is very likely that IT managers will have to increase the number and expertise of security personnel devoted to security policy creation and maintenance as the percentage of VMs increases in the data center” Guest Services “Concentrate on the guest operating systems and applications, not the virtual machines. Much of the technological basis for server virtualization necessarily isolates VMs from one another” Management Relief “New capabilities in vSphere, including host profiles, which significantly reduce human labor and the chance for human error in host configuration that ease management while also improving the security posture of the virtual environment. Emphasize this dual-purpose approach with systems management staff” Issues As cloud-computing usage is increasing with its connectivity to the public through an Internet, new opportunities are also originating for hackers, cyber terrorists, viruses and worms. These threats will increase and focus on cloud computing enabled services and applications for stealing classified data, denial of service attacks on data centers etc. ‘Google apps’ is the major player in the market for providing ‘SaaS’, it was attacked and hacked. The report from cyber forensics indicated that the attacks were originated from China (Bisong, Rahman 2011). As the data is located and hosted geographically in different countries, different laws are associated with each country for data stored in the machines. Moreover, it is very difficult to save the classified data, if the host nation becomes hostile when the government changes and become uncooperative. Even though, cloud-computing services are reliable in terms of availability, there are incident that took place where a complete unavailability of cloud computing services was halted for hours and even days due to bugs. Similarly, Google Gmail went offline for two hours; Citrix ‘GoToMeeting’, Amazon.com ‘Simple Storage Service’ was also down for eight hours too. The organizations, that are completely dependent on cloud computing and they cannot do any business for hours or days, the loss could be disastrous (Bisong, Rahman 2011). Some of the threats for cloud computing involves incorrect usage of cloud computing services, malicious codes, viruses, vulnerabilities related to shared services and technology, traffic sniffing, data loss, data leakage, intruders, weak security of API’s, unidentifiable security profiles etc. Virtualization has many drawbacks as it requires additional hardware resources and the estimation for hardware resource requirements is not viable. Moreover, there are situations where RAM becomes an issue, as the server requires extra hardware to execute a virtual environment for an application. Even though, the server is equipped with RAM in megabytes or terabytes, motherboards limits RAM after certain amount that will create issues if multiple environments needs to be deployed on the server. Moreover, virtualization has no standards defined for virtual server management increasing management for featured tools. Conclusion After reviewing the concept of cloud computing and virtualization along with its vast benefits and drawbacks, the concept benefits the organizations to avoid purchasing and maintaining computing devices and software. Moreover, the amplification and flexibility of this benefit is provided by cloud computing. The accessibility is every time available, enabling organizations to access business applications and information any time from any location, whenever the user require. The cost is also a significant factor, as the organization only pays for the technology capacity it uses. Even though, cloud computing is spreading globally, threats and risk associated with it are also rising and needs to e considered as well. In comparison to these threats and risks, security teams are also working to improve security of cloud computing services. Cloud computing is a revolutionary technology that will keep on improving with new innovative technological developments. Virtualization on the other hand has dominated the economic factors in order to facilitate organizations to save cost in terms of power, space, hardware, software and maintenance. Virtualization has defined hybrid cloud models for businesses to overcome business challenges with significant cost savings. Moreover, virtualization possesses challenges in terms of security and certain security factors must be adhered for protecting virtual environments. However, virtual environments provide isolated environments for testing new applications and tools for any potential threats, weaknesses and vulnerabilities. Similarly, virtualization also is vulnerable and certain factors needs to be considered for securing virtualization in cloud computing. In addition, virtualization requires extra hardware resources without determining exact RAM requirements. Above all, Cloud computing and virtualization defines numerous options for businesses and innovation for Information Technology that will eliminate resource utilization and offering great features for the current digital era. References , What is Cloud Computing? | Cloud Computing Journal. Available: http://cloudcomputing.sys-con.com/node/579826 [2/25/2011, 2011]. RYAN, W.M. and LOEFFLER, C.M., 2010. Insights into Cloud Computing. Intellectual Property & Technology Law Journal, 22(11), pp. 22-28. ARMBRUST, M., FOX, A., GRIFFITH, R., JOSEPH, A.D., KATZ, R., KONWINSKI, A., LEE, G., PATTERSON, D., RABKIN, A., STOICA, I. and ZAHARIA, M., 2010. A View of Cloud Computing. Communications of the ACM, 53(4), pp. 50-58. HAN, Y., 2010. On the Clouds: A New Way of Computing. Information Technology & Libraries, 29(2), pp. 87-92. KIM, P., NG, C.K. and LIM, G., 2010. When cloud computing meets with Semantic Web: A new design for e-portfolio systems in the social media era. British Journal of Educational Technology, 41(6), pp. 1018-1028. BISONG, A. and RAHMAN, S.M., 2011. An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications, 3(1), pp. 30-45. Virtualization. 2007. Bloomsbury Business Library - Business & Management Dictionary, , pp. 7812-7812. GUSTER, D., HEMMINGER, C. and KRZENSKI, S., 2009. Using Virtualization to Reduce Data Center Infrastructure and Promote Green Computing. International Journal of Business Research. MORTLEMAN, J., 2009. Security advantages of virtualisation. Computer Weekly, , pp. 23-23. MELL, P. and GRANCE, T., 2010. The NIST Definition of Cloud Computing. Communications of the ACM, 53(6), pp. 50-50. SHIVAKUMAR, B.L. and RAJU, T., 2010. Emerging Role of Cloud Computing in Redefining Business Operations. Global Management Review, 4(4), pp. 48-52. HO, A., 2010. Hybrid cloud models rule. Enterprise Innovation, 6(1), pp. 11-11. 10 THINGS you should know now about... VIRTUALIZATION SECURITY. 2009. eWeek, 26(12), pp. 42-42. VOUK, M.A., 2008. Cloud Computing -- Issues, Research and Implementations. Journal of Computing & Information Technology, 16(4), pp. 235-246. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Telecommunications and Networking Essay Example | Topics and Well Written Essays - 2750 words - 3”, n.d.)
Telecommunications and Networking Essay Example | Topics and Well Written Essays - 2750 words - 3. Retrieved from https://studentshare.org/information-technology/1576385-telecommunications-and-networking
(Telecommunications and Networking Essay Example | Topics and Well Written Essays - 2750 Words - 3)
Telecommunications and Networking Essay Example | Topics and Well Written Essays - 2750 Words - 3. https://studentshare.org/information-technology/1576385-telecommunications-and-networking.
“Telecommunications and Networking Essay Example | Topics and Well Written Essays - 2750 Words - 3”, n.d. https://studentshare.org/information-technology/1576385-telecommunications-and-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Telecommunications and Networking

Literature Review & Project Specification

Further more this kind illegitimate use of telecommunications keeps on rising. To date there are very few routes in the Internet that support fully ATM-based backbone transmission, fast routers, QoS (Quality of Service) services and/or un-congested bandwidth resources.... Literature Review - The use of telephony in the daily activities is continuously increased....
12 Pages (3000 words) Essay

Development of Computing Networking for the Company

The objective of the paper is to develop a Network for a company.... The company has four separate offices, Bristol, Cardiff, Swindon, and Stoke.... Each office has its own requirements, which are based upon the function of that office.... The specific objective is to create a network layout on each site....
5 Pages (1250 words) Term Paper

Flextronics International Singapore Limited

They are the original equipment manufacturers in networking, computer, medical and consumer products.... The company is concentrating on the manufacturing of the products on psychogenic needs of the customers considering their biogenic needs simultaneously.... This helps in innovation of the products as the company is studying the consumer behavior and the market needs continuously....
13 Pages (3250 words) Case Study

Integrated Service Digital Network

Novel algorithms and techniques in Telecommunications and Networking.... The paper “Integrated Service Digital Network” seeks to evaluate an original internet service of high-speed.... It sparked the development of high-speed internet amid service givers in the 1990's....
1 Pages (250 words) Assignment

Strategic Management - Effective Strategy Planning

The steady technological development that has happened in the domains of Telecommunications and Networking technology since the beginning of the previous decade has transformed the world… Because of the well developed capability of communication and digital networking, there has been a free flow of information across market around the world....
11 Pages (2750 words) Coursework

BGP routing protocol

Novel Algorithms and Techniques in Telecommunications and Networking.... It is a networking term that is used in communication networks over the digital medium.... it is dynamic protocol.... It is a path vector protocol (Sobh & Mahmood)).... It works in an autonomous system environment....
1 Pages (250 words) Research Paper

Cloud Computing in Telecommunications and Networking

telecommunications & NetworkingConcept descriptionCloud computing is a description of software, computation, storage and data access that don't need the knowledge of the end user about the configuration and the place where the service delivery telecommunications & NetworkingConcept descriptionCloud computing is a description of software, computation, storage and data access that don't need the knowledge of the end user about the configuration and the place where the service delivery system is....
11 Pages (2750 words) Assignment

Telecommunications and Networking - Reliability and Quality of Service

… The paper "Telecommunications and Networking - Reliability and Quality of Service" is a wonderful example of an assignment on information technology.... The paper "Telecommunications and Networking - Reliability and Quality of Service" is a wonderful example of an assignment on information technology.... Junction networking, web Quality of Service publication indicates that reliability is one of the policies provided by a Data Distribution Service (DDS) and it dictates whether the DDS is performing in the required manner....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us