Summative Discussion Board Review and reflect on the knowledge you have gained from this course. Based on your review and reflection, write at least 3 paragraphs on the following: What were the most c

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

Summative Discussion Board

Review and reflect on the knowledge you have gained from this course. Based on your review and reflection, write at least 3 paragraphs on the following:

  • What were the most compelling topics that you learned in this course?
  • How did participating in discussions help your understanding of the subject matter? Is anything still unclear that could be clarified?
  • What approaches could have yielded additional valuable information?
  • The main post should include at least 1 reference to research sources, and all sources should be cited using APA format.

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about his or her Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting?
  • What additional questions do you have after reading the posting?
  • What clarification do you need regarding the posting?
  • What differences or similarities do you see between your posting and other classmates’ postings?

Summative Discussion Board Review and reflect on the knowledge you have gained from this course. Based on your review and reflection, write at least 3 paragraphs on the following: What were the most c
16 Operating System and Network Upgrade Student Name Course Name and Number Computer Networking Project Name Network Communication Protocols Date 11/08/2021 Table of Contents I.Distributed Network Requirements Analysis 3 a.Introduction 3 b.Summary 3 II.Communication Protocols Analysis and Recommendations 5 a.Transmission Control Protocol/Internet Protocol 6 b.Diameter Protocol 7 c.Hypertext Transfer Protocol 7 d.Recommendation and Applicability at AT&T 8 III.Network Traffic Analysis and Recommendations 9 IV.Network Design and Architecture 13 V.Future Needs Analysis and Recommendations 13 VI.References 15 Distributed Network Requirements Analysis Introduction Competition is one of the challenges that organizations continue to face as they run their day-to-day operations. To remain competitive in the market, an effective distribution network should be in place. This will help the organizations to effectively communicate messages through the various computers that act as nodes to reach the intended targets unaltered and at the right time. Distributed networks also allow the computers to work more efficiently by allowing dependency on one another. The objective of this paper will address the concepts of a distributed network by performing a requirements analysis to establish the need for a distributed network at AT & T. Summary The company selected for the project will be AT&T. two years ago, AT&T was the world’s largest telecommunications company in the world (Kumar, 2019). It is the largest company that provides mobile telephone services in the United States. AT&T is also known as being the best provider of fixed telephone services in the United States. recently, AT&T completed an acquisition of Verizon Wireless. As a result of the strategic move, AT&T acquired both Verizon Wireless, Alltel, and Unicell in the United States. To ensure that AT&T remains at the top of the business, it is important to upgrade the operating systems and the networks being used at AT&T to ensure effectiveness and better productivity. The company is large as it had 229,055 employees worldwide in 2020 with its headquarters in Dallas, Texas, in the United States (AT&T, 2021). The current CEO of the firm is John T. Stankey. The firm has embraced inclusivity and diversity. The benefits that AT&T would accrue from distributed networking will include increased efficiency, scalability, and increased reliability of the services provided by the telecommunications giant in the United States. Through distributed networking, the areas of functionality that AT&T could have improved include improving scalability, improving reliability, improving the efficiency of services rendered, automatic backup and recovery, as well as automated disaster recovery. Scalability – Increase the number of physical hosts to unlimited seamlessly Reliability – increase uptime and availability to 99.99 percent Efficiency – implement multi-processor cores to replace the single-processor cores used Automatic backup and recovery – backing up data regularly. Automatic disaster recovery – Retrieving backed-up data to ensure normal operations after security incidences. The connectivity requirements for the proposed network include opening UDP ports 1025 – 65535and adequate bandwidth. On the other hand, the security requirements for the proposed network include installing firewall and proxy rules to allow SSL traffic over port 443, installing regular system updates, using Linux operating system, and installing antivirus software. All the new infrastructure that will be added will be implemented in form of a virtualized environment using VMware & ESXi Hypervisors. The container environment will be implemented for more than 50 percent of the new virtualized environment. The other requirements that may affect the design and architecture of the network will include budget limitations, limitations imposed by using the existing network infrastructure, the existing operating systems, and lack of training needs to meet the standards required. Communication Protocols Analysis and Recommendations The communications that will be supported at AT&T with the proposed network will include tasks that require accuracy. There is a wide range of communication protocols that could be used at AT&T. the majority of the tasks that will be conducted at AT&T and its network will require the data being worked on to be accurate at all times. Mobile users will have to be identified correctly and authenticated before being allowed to access services from the network. Furthermore, the network parameter settings controlling how base stations behave and interact with the mobile users will have to be configured in the right manner to prevent miscommunications that would cause disastrous effects to the company. More users are shifting to the use of mobile devices to access the internet, Voice over IP, social media platforms, and video conferencing. Effective communication protocols will help AT&T communicate effectively in a more cost-effective and scalable manner as the firm expands and increases its network coverage. It will also allow AT&T to shift communications easily from Ethernet to wireless and back to Ethernet connections with ease. Transmission Control Protocol/Internet Protocol The Transmission Control Protocol/Internet Protocol (TCP/IP) offers a more reliable and connection-oriented mode for communication. According to Boyko, Varkentin, and Polyakova (2019), the TCP/IP protocol is a preferred option when an organization desires to transport important information like Call Detail Records (CDR). The billable information had to be sent securely to the billing department, roaming partners at both the local and international spheres, and the care team. Using the TCP/IP model, a header is attached to the data that is about to be transmitted with the right parameters such as the acknowledgment number, the sequence number, as well as a checksum. These parameters will help to accurately assemble the data at the receiving end while the data that may have been lost or corrupted during the transmission, upon confirmation using the checksum, will be retransmitted. This ensures both the reliability and accuracy of the data transmitted and received by the other entity. As a result, the TCP/IP model is thus the most effective communication protocol to be used at AT&T. Diameter Protocol Diameter is considered to be another important Authentication Authorization Accounting (AAA) protocol widely adopted and used across all Internet-Protocol (IP) networks and in the telecommunications network industry (Joshi & Mohapatra, 2019). It is considered to be an improvement of the RADIUS protocol. Diameter has helped to address some of the common limitations that existed with the implementation of the RADIUS protocol. For instance, Diameter has helped to overcome challenges in secured communications, scalability, fault-tolerance, node capabilities, reliability in transmission, clarity of the defined procedures, and load balancing. Based on the requirement analysis, Diameter could also be an effective communication protocol that could support the proposed network at AT&T. However, Diameter has architectural flaws that cannot be offset through blocking traffic or filtering (Joshi & Mohapatra, 2019). Hypertext Transfer Protocol The third communication protocol that could be implemented to support the proposed network based on the results of the requirements analysis at AT&T is the Hypertext Transfer Protocol (HTTP). The HTTP is an application layer protocol that can be used to communicate data on the Web. The HTTP protocol can help the business effectively market itself on the web by increasing the visibility of the firm on the internet. It acts as a request-response protocol that allows the users to effectively interact with the web resources over a TCP protocol. Methods such as GET, POST, HEAD, and DELETE are used on the HTTP to perform various tasks. For example, GET can be used to access specific resources, POST is used to add content, HEAD is used to request specific resources without the body content, while DELETE helps to get rid of certain resources (Extrahop, 2021). However, HTTP does not offer a reliable exchange. Recommendation and Applicability at AT&T The recommended communications protocol will be TCP/IP protocol. Boyko, Varkentin, and Polyakova (2019) affirm that the TCP/IP model is an open protocol suite which makes it available for use by both individuals and companies. It is also highly scalable and thus could be expanded and condensed based on the growth of AT&T. The TCP/IP model is also highly interoperable which makes it available for cross-platform communications among heterogeneous networks. Furthermore, the TCP/IP model is highly reliable because packets that are corrupted, lost, or compromised in any way can be retransmitted. This could be verified using the accompanying checksum. The TCP/IP model is thus more appropriate for use at AT&T based on the business analysis requirements established. Network Traffic Analysis and Recommendations Effective network distribution is one of the essential requirements in AT&T. For AT&T to be able to cover all the 50 states in the United States and other countries globally, it requires to enhance some of its networking systems and connectivity equipment to reduce its competition with other countries. One of the most significant achievements of the company is opening UDP ports 1025 – 65535. Despite opening the UDP ports as an achievement, AT&T needs to upgrade its computers from traditional computers to modern ones to allow efficiency and reliability when processing requests. If the computers are upgraded, they will be unable to process the requests from the network ports on time. This might not be convenient to many customers, and they might end up moving to AT&T competitors (Urbanek, 2017) When focusing on the operating system of AT&T, the company is using Linux operating system, which is protected by the firewall with various proxy rules to allow SSL traffic and antivirus software. Using Linux operating systems, firewalls and antivirus software is essential in protecting the computers from the traffic of the work station, thus reducing the threats. Though firewalls are essential to the company, they might be a threat where they might block users from accessing various websites, which is an inconvenience to various customers. Due to the inconvenience, customers may migrate to the competitors of the company. On the other antivirus software might block some requests and make changes on the web pages, thus making it hard for customers to access the information they would like. The best antivirus program would be Kaspersky antivirus for Linux, which offers multi-layered protection to the computers in the workstation. Furthermore, with the efficiency of this software, it is possible to reduce all types of malware, thus protecting the workstation. On the other hand, firewall blocking can be reduced by allowing various support teams to monitor their requests, enhancing its efficiency of passing information. To facilitate efficiency in the network’s communication, AT&T has installed a Transmission Control Protocol that facilitates essential information like call detail records. With this communication strategy, customers can communicate without worrying about data loss as any parameters are lost through the communication. The biggest threat of this communication strategy is that these communication methods do not offer encryption unless AT&T protect the service by TLS to obtain a secure key of protecting the information of the connection. If the customers know there is no protection on their network, they are likely to migrate to the company’s competitors who protect their data. AT&T is leveraging from diameter protocol which facilitates Authentication Authorization Accounting. With this communication protocol, the company has been able to secure communications, enhance the scalability of the network, facilitate reliability in transmission, define various operating procedures and balance the workload of the network. This will allow the computers of the network to run for long and efficiently, thus reducing competition between the company’s customers. Diameter protocol can be enhanced by using software such as DSI Diameter Stack. This software facilitates high performance by enabling user applications to interface directly to LTE and IMS networks. AT&T is proposing Hypertext and Transfer Protocol (HTTP), which will be used for communication via the internet. This will be essential as it will help businesses promote their services by using the internet. With this communication protocol, AT&T users will be able to interact with the internet resources, thus relying on the network. Furthermore, this communication allows various functions such as GET, HEAD, DELETE, and POST. By the communication strategy carrying out all these functions, the users will be able to do various tasks via the web, thus facilitating efficiency (Urbanek, 2017). This communication protocol allows various tasks to be done efficiently. If an HTTP connection is well installed, it will attract more customers, thus reducing competition to other companies. Inconclusively, the company is making a good proposal plan on what to implement to reduce customer competition, but there are various changes it has to consider before implementing the proposed plan on network distribution. Before installing the proposed network distribution plan, it has to ensure that the bandwidth is adequate and is compatible with the network services that AT&T wants to provide. Furthermore, to implement the proposal, the company needs to upgrade the computer from traditional to modern computers to handle the workload efficiently. Installing essential software such as Kaspersky will facilitate multiple layer protection, and the DSI diameter stack can facilitate efficiency to the computers, thus allowing them to process the requests on time. If the network is effective and reliable, customers will prefer using it over other networks, thus reducing the company’s competition. Network Design and Architecture Applications Application panel SDN Controller SDN controller Control plane SDN switch SDN switch SDN switch SDN switch SDN switch SDN switch SDN switch SDN switch SDN switch Data Plane Future Needs Analysis and Recommendations AT&T is one of the global leading firms in communication. To continue leading and expanding its market share, the company should plan for the future. As technology is a changing variable, more investment in technology will propel the company to new heights. There are many changes that take place within the telecommunications’ industry and AT&T should ensure all through that it is in the forefront from the launch of new products and migration to the new network frequencies. For instance, in the contemporary society, most countries globally have shifted from 4G to 5G. AT&T should leverage on such occurrences to ensure that the firm is among early adopters while maintaining an hybrid system that support the client base that are still using past technologies like 3G and 4G. Firms that will survive in the future will require to move and operate with market trends as consumer loyalty, taste and preference keeps changing depending on the availability of goods and services that favor their needs. Investment in a continuous research and development is imperative for the success of the firm. Research and development enables a firm to make the right and strategic decisions that will ensure the firm remains competitive. A R&D department that is well facilitated ensures a company remains competitive through the introduction of new products and services, finds on new ways of cutting down on cost and ensures a firm is abreast on current trends of the market. As technology keeps on advancing, costing of products fairly allows a firm to be competitive. For instance, a reduction in operational and production costs, can allow for the reduction of the retailing prices of the services and products offered by the firm to their client base. A reduction in costs can benefit a business by retaining of existing clients and also getting into new market segments. Almost all businesses require technology backed internet for their operations. Investing heavily will allow AT&T venture into more productive markets that will increase cash inflows. References AT&T (2021). AT&T’s Workforce Diversity. Retrieved from https://about.att.com/pages/diversity Boyko, A., Varkentin, V., & Polyakova, T. (2019). Advantages and Disadvantages of the Data Collection Method Using SNMP. In 2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) (pp. 1-5). IEEE. Extrahop. (2021). Network protocol library. Retrieved from https://www.extrahop.com/resources/protocols/ Joshi, A., & Mohapatra, A. K. (2019). Security analysis of wireless authentication protocols. International Journal of Sensors Wireless Communications and Control, 9(2), 247-252. Kumar, B. R. (2019). AT&T–Time Warner Acquisition. In Wealth Creation in the World’s Largest Mergers and Acquisitions (pp. 121-129). Springer, Cham. Ordonez, C., Johnson, T., Srivastava, D., & Urbanek, S. (2017, August). A tool for statistical analysis on network big data. In 2017 28th International Workshop on Database and Expert Systems Applications (DEXA) (pp. 32-36). IEEE.

Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper