The Datacom Group Limited is an information technology organization that provides IS services to its customers and staffs which includes the database, webpage and email services. Currently this organization provides various types of services to its customers which includes consulting and management services, ITO services, cloud services, data centre services, payroll services and software development services. This organization was firstly started in New Zealand but later it was expanded to Australia, Vietnam, Malaysia and in many other countries also. Various department of the Datacom uses the information technologies in some different way. Considering the data centre services, here the information technology is used as composed networked computer and storage (Putnam et al. 2014). The Datacom group also uses the information technology for the security purposes. In this security related department information technology is used for implementing measures and for designing the system that will safeguard important information regarding the organization. Also, in the cloud service department the information technology is used for transferring the data from one location to another location.
In this report various types of data that has been used by the organization will be discussed briefly. The Datacom Group executes various type of activities day by day and for that it requires many network devices. This network devices will be identified and discussed in this case. Also, seven layers of the OSI model will be explained in this report regarding opening the website of the organization.
Mainly in the organizations like Datacom Group digital data are used and exchanged. Thus the main data which is used by Datacom Group are in the digital forms and these types of data are the multimedia data including graphics, audio, images and videos. Also, there are other organization specific data are available within the organization that are used by the exclusive software which runs within the organization. Apart from that, some uncommon data which is used by the organization is the encrypted type of file including zip and rar files.
All the data stored within the organization can be accessed by the staff members of it. In this organization all the data stored in a centralised type of database and this data can be accessed by the staffs of the organizations using their individual computer system. For accessing the data from the central server all the computers are connected to the central server through different type of access network including Ethernet, FTTH, DSL and Wireless LANs (Sikdar 2013). This access networks connects end system with the immediate routers.
2.2 IT infrastructure solutions for storing and accessing data:
There are various types of IT infrastructure are available for storing and accessing the data at the database using the concept of networking. The main two IT infrastructure for storing and accessing the data are the remote server IT infrastructure and the cloud computing IT infrastructure. The remote server IT infrastructure is also known as the traditional type of IT infrastructure (Masa’deh 2013).
In the remote server infrastructure model there are various types of hardware, software and network equipment are used and all of this equipment are connected through the remote server (Beverly and Berger 2015). This type of remote servers are mainly located in the office premises which provides data access to all the employees of the organization regarding business data and applications. Employees and the staffs are also able to store data within this server by having proper access to the server.
Cloud computing IT infrastructure for accessing and storing data are quite different compared with the remote server infrastructure. Cloud computer infrastructure are far more abstract as a hosting solution. In this infrastructure it is not accessible via some physical hardware, instead of it all the servers, networks and the data are hosted within the cloud environment (Sahu, Pateriya and Gupta 2013). In this case just by normally using internet connection data can be stored and accessed from the cloud environment, but proper user credentials are required for accessing some individual data until those data are available for public. The cloud IT infrastructure can minimise the maintenance of traditional type of database servers which is having a huge cost.
Currently the Data Group requires a wide range of network devices for performing its day by day activities. These network devices are the workstations, network interface cards, servers, hubs, switches, bridges and router.
3.1 Functions of the Identified devices:
For All the departments in the organisation the main application software which are required for data communication between servers and clients are the web browsers, database software and instant messaging software.
4.1 Justification of the answer:
In a client server architecture for the data communication first of all it is very much important to access the data (Oluwatosin 2014). In this case for accessing the data a secure communication channel need to be built between server and client. This secure communication channel can be achieved by using a secure web browser. Thus web browsers are essential in the process of data communication among client and server all the department of organisation. Also the data can be downloaded or new data can be uploaded to the main server using the web browser which are very much essential for data communication purposes.
After the web browsers, database management software are also important for the data communication purposes (DeBrabant et al. 2013). In the client server architecture many times is it is important to update the database manually as per the request of clients or there can be some internal requirement for updating the database. For this type of manual changes Database Management software are crucial.
Instant messaging software are also very much important for a proper data communication in the client server architecture. In many cases client may want to pass an information directly to the server and in this type of situation instant messaging software applications become very much useful (Hong, Lee and Suh 2013). Information can be passed easily using these messaging software and this is one of the most important part of data communication in every department of the organisation.
When an employee tries to open the homepage of organisation data movements are done in seven layers of OSI model. These 7 layers are the application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer (Bora et al. 2014). In the scenario of web page opening a web browser is used for accessing the homepage. Here the web browser is an application and it works in the application layer of OSI model. The requested data by the web browser is process in the presentation layer by converting the files stored in the web server in some understandable format. The next layer is the session layer and this layer is used for establishing a TCP connection with the web server. This TCP connection is created when a web browser requests some data from the web server which can be the homepage of the organisation (Bonaventure and Seo 2016). After the webpage is delivered to the web browser the TCP connection is closed and the use of session layer ends here. Data goes through transport layer when the TCP connection is established among the web server and web browser.
The TCP connection parts the homepage of the organisation in manageable chunks so that it can be reassembled later. Unique addresses are required for connecting to every web server from different web browsers and for that internet protocols are used which is the network layer protocol (Deering and Hinden 2017). When the request is made by the web browser for the access of homepage it must be sent to the network card. Network card convert this into a message and send this through a default gateway. This requests are made in the data link layer of the OSI model. Lastly in the physical layer big streams are transmitted as one and zero and bit synchronisation ensured by physical layer. The bit synchronisation is used for ensuring end user data is assembled in a correct order and sent to the destination.
(Figure 1: Data flow through OSI model)
6. Conclusion:
From the above discussion it can be concluded that information technology and the information system is very much important for many organisation to perform their daily operations. In this paper Datacom Group Corporation has been selected for evaluating the role of information system in IT related organisations. In this report first of all the services used by this organisation is elaborated briefly and how every department of the organisation is using the information technology discussed properly. This selected organisation uses various types of data in their daily activities. Thus how this data can be accessed by the staff members of the organisation is illustrated in this report. Also, two very important IT infrastructure solution is discussed here which is used for storing and accessing data at the database through networking environment. As this organisation is currently using a large IT infrastructure solution important network devices are required to run this infrastructure. Thus different types of network devices has been identified in this case function of each devices is explained. Data communication between the server and client is also an important concept of this organisation. Thus the application software which are required for the data communication has been discussed. Lastly, the seven layers of OSI model has been used in this case for explaining the data movement when an employee tries to open the homepage of the organisation website.
References:
Beverly, R. and Berger, A., 2015, March. Server siblings: Identifying shared IPv4/IPv6 infrastructure via active fingerprinting. In International Conference on Passive and Active Network Measurement (pp. 149-161). Springer, Cham.
Bonaventure, O. and Seo, S., 2016. Multipath TCP deployments. IETF Journal, 12(2), pp.24-27.
Bora, G., Bora, S., Singh, S. and Arsalan, S.M., 2014. OSI reference model: An overview. International Journal of Computer Trends and Technology (IJCTT), 7(4), pp.214-218.
DeBrabant, J., Pavlo, A., Tu, S., Stonebraker, M. and Zdonik, S., 2013. Anti-caching: A new approach to database management system architecture. Proceedings of the VLDB Endowment, 6(14), pp.1942-1953.
Deering, S. and Hinden, R., 2017. Internet protocol, version 6 (IPv6) specification (No. RFC 8200).
Drutskoy, D., Keller, E. and Rexford, J., 2013. Scalable network virtualization in software-defined networks. IEEE Internet Computing, 17(2), pp.20-27.
Flajslik, M. and Rosenblum, M., 2013. Network interface design for low latency request-response protocols. In Presented as part of the 2013 {USENIX} Annual Technical Conference ({USENIX}{ATC} 13) (pp. 333-346).
Hong, J., Lee, O.K. and Suh, W., 2013. A study of the continuous usage intention of social software in the context of instant messaging. Online Information Review, 37(5), pp.692-710.
Karakolis, T. and Callaghan, J.P., 2014. The impact of sit–stand office workstations on worker discomfort and productivity: a review. Applied ergonomics, 45(3), pp.799-806.
Masa’deh, R.E.M., 2013. The impact of information technology infrastructure flexibility on firm performance: An empirical study of Jordanian public shareholding firms. Jordan Journal of Business Administration, 153(954), pp.1-42.
Oluwatosin, H.S., 2014. Client-server model. IOSRJ Comput. Eng, 16(1), pp.2278-8727.
Perez-Botero, D., Szefer, J. and Lee, R.B., 2013, May. Characterizing hypervisor vulnerabilities in cloud computing servers. In Proceedings of the 2013 international workshop on Security in cloud computing (pp. 3-10). ACM.
Putnam, A., Caulfield, A.M., Chung, E.S., Chiou, D., Constantinides, K., Demme, J., Esmaeilzadeh, H., Fowers, J., Gopal, G.P., Gray, J. and Haselman, M., 2014. A reconfigurable fabric for accelerating large-scale datacenter services. ACM SIGARCH Computer Architecture News, 42(3), pp.13-24.
Sahu, Y., Pateriya, R.K. and Gupta, R.K., 2013, September. Cloud server optimization with load balancing and green computing techniques using dynamic compare and balance algorithm. In 2013 5th International Conference and Computational Intelligence and Communication Networks (pp. 527-531). IEEE.
Sikdar, B., 2013. A study of the environmental impact of wired and wireless local area network access. IEEE Transactions on Consumer Electronics, 59(1), pp.85-92.
Takahashi, R., Tashiro, K. and Hikihara, T., 2015. Router for power packet distribution network: Design and experimental verification. IEEE Transactions on Smart Grid, 6(2), pp.618-626.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download