diff_months: 10

Please read Section 1.2.2 Physical Media on pages 46-49 of Chapter 1: Computer Networks and the Internet.

Download Solution Now
Added on: 2024-12-25 14:00:05
Order Code: SA Student Hamid IT Computer Science Assignment(7_22_27358_247)
Question Task Id: 453842

Please read Section 1.2.2 Physical Media on pages 46-49 of Chapter 1: Computer Networks and the Internet.

This section discusses the importance of physical media in connecting the source and the receiver. This also categorizes physical media into guided (wired) media and unguided (wireless) media. Wireless media will be explained in the next module.

Kurose, J. and Ross, K. (2017). Computer networking: A top-down approach (7th ed.). Essex, England: Pearson Education Limited. Retrieved from https://ebookcentral-proquest-com.ezproxy.laureate.net.au/lib/think/reader.action?docID=5573712&ppg=47Please read pages 8-10 in Chapter 1: Introduction to Data Cabling.

This reading introduces you to the four major types of wired communication media (unshielded twisted-pair, shielded twisted-pair, coaxial and fibre-optic). It highlights the significance of selecting and recommending the proper type of wired media depending on the application.

Oliviero, A., & Woodward, B. (2014). Cabling: The complete guide to copper and fiber-optic networking (5th ed.). Hoboken: John Wiley & Sons. Retrieved from https://ebookcentral-proquest-com.ezproxy.laureate.net.au/lib/think/reader.action?docID=1645636&ppg=46Please read Section 6.4.2 Ethernet on pages 502-509 of Chapter 6: The Link Layer and LANs.

This reading discusses why Ethernet is the most prevalent wired LAN technology and why it will likely remain so in the foreseeable future. It will help you to learn more about the Ethernet structure and the different technology flavours of the Ethernet.

Kurose, J. and Ross, K. (2017). Computer networking: A top-down approach (7th ed.). Essex, England: Pearson Education Limited. Retrieved from https://ebookcentral-proquest-com.ezproxy.laureate.net.au/lib/think/reader.action?docID=5573712&ppg=504One of the things that made the Internet possible is the wired communications media that connects countries and continents. Checkout the submarine cable map connecting everyone around the world.

TeleGeography. (2019). Submarine Cable Map. Retrieved from https://www.submarinecablemap.comPlease read pages 6-9 of Chapter 1: Historical Sketch of Wireless Communications.

This short reading provides the history of wireless communications and compares different technologies that can be employed when sending a message.

Kim, H. (2015). Wireless communications systems design. Hoboken, N.J.: Wiley. Retrieved from https://ebookcentral-proquest-com.ezproxy.laureate.net.au/lib/think/reader.action?docID=4038416&ppg=26

Please read Section 7.1 and 7.2 on pages 548-556 of Chapter 7: Wireless and Mobile Networks.

This resource explores wireless communication including the network characteristics inherent in wireless media.

Kurose, J. and Ross, K. (2017). Computer networking: A top-down approach (7th ed.). Essex, England: Pearson Education Limited. Retrieved from https://ebookcentral-proquest-com.ezproxy.laureate.net.au/lib/think/reader.action?docID=5573712&ppg=550

Please read pages 1-7 in Chapter 1: Introduction to Wireless Networks.

This reading further explores fundamentals in wireless communication in its various delivery forms and the importance of the electromagnetic spectrum.

Anandamurugan, S., & Nandhini, P. (2016). Wireless networks (Computer science, technology and applications). Hauppauge, New York: Nova Science. Retrieved from http://search.ebscohost.com.ezproxy.laureate.net.au/login.aspx?direct=true&db=nlebk&AN=1385389&site=ehost-live

: Cloud computing is currently a buzzword in data and networking. Therefore, it is important to first go through the definition of cloud computing by the National Institute of Standards and Technology (NIST). This reading also discusses the essential characteristics, service models and deployment models.

Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Gaithersburg, MD: National Institute of Standards and Technology. Retrieved from https://csrc.nist.gov/publications/detail/sp/800-145/final

Please read pages 32-35 of Chapter 4: Basic Cloud Platforms.

In this reading, you will learn more about popular cloud computing services such as Amazon Web Services, Microsoft Azure and Google Cloud.

Longbottom, C. (2017). The evolution of cloud computing: How to plan for change. Swindon, UK: BCS, The Chartered Institute for IT. Retrieved from http://search.ebscohost.com.ezproxy.laureate.net.au/login.aspx?direct=true&db=nlebk&AN=1610296&site=ehost-live&ebv=EB&ppid=pp_32Please read pages 67-81 of Chapter 4: Price and Value Models.

This reading will show that cloud computing consumption also has associated cost elements. In addition, this reading will also explore the different price models for cloud computing.

Ruparelia, N. (2016). Cloud computing. Cambridge, MA: The MIT Press. Retrieved from http://search.ebscohost.com.ezproxy.laureate.net.au/login.aspx?direct=true&db=nlebk&AN=1238001&site=ehost-live&ebv=EB&ppid=pp_Cover

Please read pages 219-227 of Chapter 11: Future Outlook.

This reading investigates the future of cloud computing and cover concepts such as the Internet of Things (IoT) and greater efficiency.

Ruparelia, N. (2016). Cloud computing. Cambridge, MA: The MIT Press. Retrieved from http://search.ebscohost.com.ezproxy.laureate.net.au/login.aspx?direct=true&db=nlebk&AN=1238001&site=ehost-live&ebv=EB&ppid=pp_Cover

Please read pages 61-70 in Chapter 3: Cloud Computing Software Security Fundamentals.

In this reading you will learn about cloud computing security fundamentals. This can include objectives like confidentiality, integrity and availability. This reading will also outline factors affecting cloud security such as authentication and authorisation.

Krutz, R.L., & Vines, R.D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Indianapolis, IN: John Wiley & Sons. Retrieved from https://ebookcentral-proquest-com.ezproxy.laureate.net.au/lib/think/reader.action?docID=589027&ppg=89Please read the following sections in Chapter 16: Cloud Security

Pages 135-136: Assume that security is breached

Pages 138-139: Badly protected walled garden

Pages 142-143: For few more concepts on security breach.

These sections will explain why it is important not to assume that everything is secure within a cloud-based server.

Longbottom, C. (2017). The evolution of cloud computing: How to plan for change. Swindon, UK: BCS, The Chartered Institute for IT. Retrieved from http://search.ebscohost.com.ezproxy.laureate.net.au/login.aspx?direct=true&db=nlebk&AN=1610296&site=ehost-live&ebv=EB&ppid=pp_135

: Please read the following sections in Chapter 5: Security and Governance

Pages 103-105: Focus on the question of who enforces security.

Pages 108-111: Examine monitoring security through firewalls, user authentication and client-side defence.

Ruparelia, N. (2016). Cloud computing. Cambridge, MA: The MIT Press. Retrieved from http://search.ebscohost.com.ezproxy.laureate.net.au/login.aspx?direct=true&db=nlebk&AN=1238001&site=ehost-live&ebv=EB&ppid=pp_103 Please read pages 125-127 of Chapter 4: Cloud Computing Risk Issues.

This reading focuses on the three fundamental tenets of information security and will help you to assess the security available for a cloud computing service.

Krutz, R.L., & Vines, R.D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Indianapolis, IN: John Wiley & Sons. Retrieved from https://ebookcentral-proquest-com.ezproxy.laureate.net.au/lib/think/reader.action?docID=589027&ppg=153

This journal article identifies key actions such as the development of the culture of cybersecurity through public and private partnership, and reforming Australias current privacy laws.

Choo, K. (2010). Cloud computing: Challenges and future directions. Trends & Issues in Crime and Criminal Justice, 400, 1-6. Retrieved from https://search-proquest-com.ezproxy.laureate.net.au/docview/804788537?accountid=176901

  • Uploaded By : Pooja Dhaka
  • Posted on : December 25th, 2024
  • Downloads : 0
  • Views : 158

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more