Information Technology Infrastructures

Men Fixing Information Technology Infrastructures
Information Technology Infrastructures
  1. With consideration to Ethernet, why is it necessary to have a common language for communication across devices?

Sample Paper on Information Technology Infrastructures

Q1. With consideration to Ethernet, why is it necessary to have a common language for communication across devices?

Like in human interactions, it is important to have a universal language for effective communication. In computer interactions, these are called protocols. [blur] For Ethernet devices, these protocols are important in that they describe accurate requirements and interactions, such as the structure or format of the message; the method through which networking devices share information regarding pathways with other networks; when and how system and error messages are passed across devices; as well as the setup and termination of data transfer sessions. [/blur]

Q2 IPv4 works great for most people still today. So why in your opinion do we need IPv6?

[blur] IPv6 allows for the modern approaches to Internet networking such as, advanced security, mobility, traffic efficiency and quality of service. Other valuable benefits include: address abundance IPv4 packet limits the number of likely addresses for internet devices to 4.3 billion, which is inadequate for the large number devices now globally networked; easier management; end-to-end transparency, as IPv6s vast address space allows node-to-node addressing, security and better performance; and platform innovation. [/blur]

Q3. Why is it important for a router to have a metric for determining an optimal route?

[blur] Router metrics are exploited by a router to determine whether one route should be selected over another. A metric can include elements such as speed of the path, path reliability, packet loss, latency, number of hops and load, among others. This information is used by other routers in making router decisions. These metrics can include any number of values that facilitate a router in determining the best route between multiple routes to a destination. [/blur]

Q4 Why are wireless technologies more expensive to implement for WAN technology than physical connections? Do you think that wireless WANs will eventually replace wired?

[blur] One of the key elements driving the cost of deploying WWANs is security what company broadcasts go where give that it is susceptible to eavesdropping. In addition, elements such as environmental factors, terrain, and weather, easily affect performance and throughput. As such, the cost associated with circumventing these challenges; in turn drive the overall costs up. Given that mobile computing devices are becoming cheaper, smaller, and more powerful. The demand for linking mobile devices to richer-content networks is also rising rapidly. As such, wireless WANs seem to offer a fitting solution. [/blur]

Q5 Wardriving is the act of searching for Wifi networks by a person in a moving vehicle, using a portable computer or smartphone. Often this is done with the intent to exploit or otherwise compromise the network. What do you think of the practice?

[blur] Wardriving can be used maliciously to redirect traffic and steal user information such as credit card information to some extent. Nonetheless, ethical hackers can as well use it to offer constructive advice to WiFi owners, in regards to strengthening their security. Presently, legal implications in regards to this phenomenon are still a grey area. As such, the illegality is based on the intent and extent of the infringement by the war driver. According to online sources, common cases of this practice are used to: sell WiFi owners security services; access adult sites anonymously; in addition to experiencing the thrill. In my opinion, this practice drives WiFi security innovations to superior heights. [/blur]

Q6 Security is a basic for any network because malicious users, hackers, are out there. Why do you think hackers do what they do? Is it simply about criminal activity to gain money or is there a greater reason behind their activity?

[blur] For most hackers, hacking is a casual hobby they hack simply to see what they can and cannot break into. Others do so to because they are obsessed with defeating computer system or gaining notoriety, while others have criminal intent, such as steal sensitive information, commit fraud or to some extent act of terrorism. [/blur]

Q7 There has been a recent argument that operating systems don't matter anymore. That the services provided are all that is important, and whatever can provide those services is fine. Is this idea too general? Are there situations where it matters or are operating systems only commodities used to present applications?

[blur] With the evolution of numerous operating systems such as Linux, and Windows, as well as a wide array of user applications and integration technologies, operating systems do not matter in most situations. Presently, only specific applications work with specific operating systems. Primarily, certain operating systems offer certain better functions, for instance, for design and film production, Mac OS offers advanced features compared to Windows. Thus, operating systems do matter, based on the tasks at hand. [/blur]

Q8. Last Week I asked if OS were no longer relevant. Cloud computing, virtualization, and multi-platform apps have made it a lot less important. But a side effect of these changes has been less need for IT professionals in some organizations. Do you think the job market for IT is changing permanently or are the jobs just moving from local to more concentrated cloud operations?

[blur] With the increase in cloud adoption, IT jobs relatively decrease as physical infrastructure moves to cloud. Most IT jobs further move from client premises to data centers. I believe jobs related to user support will reduce as there will be less need for onsite IT professionals, since only an internet connection is required to access the cloud. Thus the IT job marketing is changing permanently. [/blur]

Work Cited

FASB. ASC - 606-10-25-2 : Revenue from Contracts with Customers. An amendement of the FASB Accounting Standards Codification. Norwalk, CT: Financial Accounting Standards Board - FASB, 2014. Print.

Information Technology Infrastructures

  • Order

  • Payment

  • Processing

  • Delivery

Validation error occured. Please enter the fields and submit it again.
Thank You ! Your email has been delivered.