University : Abbey International College UniLearnO is not sponsored or endorsed by this college or university.
Subject Code : ICTPMG610
Country : Australia
Assignment Task


Knowledge Evidence

  • To complete the unit requirements safely and effectively, the individual must:
  • explain the key attributes of common telecommunications applications and related equipment
  • identify and evaluate the connections to carrier infrastructure or equipment 
  • identify current legislation relating to the design of installation of telecommunications equipment and connection to carrier services
  • evaluate the advantages of leasing and purchase options to assist in delivering cost effective solutions
  • identify and evaluate network and transmission equipment
  • outline network topologies, and interface and interconnect solutions

 

outline work health and safety (WHS) issues that need to be built into a plan, with consideration of:

  • electrical safety 
  • materials handling 
  • physical hazards
  • confined spaces
  • heights
  • lifting
  • describe and evaluate the power requirements and electrical safety aspects of the installation plan
  • describe typical performance parameters and typical faults that may be encountered in client equipment and related connection and transmission media
  • identify various test equipment types suitable for tests to be made
  • identify warranty information for equipment supplies and contractor work guarantees.

 

A consequence of defining ‘telecommunications’ broadly is that every layer involved in communication at a distance becomes part of the telecommunications industry. For each of the following industry participants, explain the key attributes of common telecommunications applications or related equipment they provide:

  • Networking service providers
  • Communications equipment suppliers
  • Networking equipment suppliers
  • Software suppliers
  • Utility or on-demand service providers
  • Networking service providers

 

1- A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services. The primary customers of NSPs are other service providers, including internet service providers (ISPs), which, in turn, sell internet access to businesses and consumers. Several network service providers also function as ISPs themselves, however. NSPs are also referred to as backbone providers.
An ISP can purchase wholesale bandwidth from an NSP, which provides connectivity for their customers. Customers then access the network through their ISP's last-mile infrastructure, which, in turn, connects to the NSP's backbone.

  • From there, the NSP routes all traffic and provides the infrastructure needed for network connectivity. The NSP builds, maintains and expands its infrastructure to meet traffic demands. The ISP is responsible for its own network, sales, marketing and customer service. ISPs can also purchase other services from an NSP -- such as cloud-based services or web hosting -- that are sold to the end customer under the ISP's brand name, a strategy known as white labeling.
  • Communications equipment suppliers
  • Communication equipment facility consisting of the physical plants and equipment for disseminating information and communication system. Booster amplifier, booster station, relay link, relay station, relay transmitter, booster - an amplifier for restoring the strength of a transmitted signal.
  • Networking equipment suppliers
  • Networking hardware typically refers to equipment facilitating the use of a computer network. Typically, this includes routers, switches, access points, network interface cards and other related hardware. This is a list of notable vendors who produce network hardware.
  • Network equipment is used to combine, split, switch, boost, or direct packets of information along a computer or telecommunications network. This product area includes hubs, switches, routers, bridges, gateways, multiplexers, transceivers and firewalls.
  • Software suppliers
  • An software vendor (aka ISV or software publisher) builds, develops, and sells consumer or enterprise software products that operate on at least one computer hardware or operating system platform, virtual machine, and even the cloud.
  • An software vendor applications range from basic utility or productivity to enterprise business processes (CRM), enterprise resource planning (ERP), and automation tools. Independent software vendors also specialize in developing and building applications for specific business niches, such as marketing, finance, and education.
  • Utility or on-demand service providers
  • Utility computing is more than just another name for outsourcing or the next stage in the evolution of application or managed service providers. Unlike the technology-centric xSPs of the Internet bubble that tried to sell their own proprietary solutions, UCPs generally mix a variety of third-party hardware, software and networking products into a set of remote and on-site services. And unlike the fixed prices and strict service-level agreements of traditional outsourcing contracts, UCPs offer more flexible service arrangements and variable pricing models.

 

Q- In August 2018 the Australian Government banned Chinese-owned tech giant Huawei from taking part in the rollout of 5G mobile infrastructure over national security concerns. What project risks relating to connections to carrier infrastructure or equipment were the Government concerned about?

  • Chinese communications giant Huawei and tech firm ZTE have been banned from participating in the rollout of Australia’s 5G mobile network. The government controversially ruled out Huawei to be part of the 5G network all three mobile carriers rolled out.
  • Fifth generation (5G) is the next evolution of mobile technology. It is a high-performance network with very low latency and offering faster data speeds and enhanced capacity. Low latency makes it very useful for emerging technologies such as autonomous cars. The 5G network promises the ability to improve the daily lives of Australians, strengthen our connectivity and accelerate our networks.
  • A long history of cyber incidents shows cyber actors target Australia and Australians. Government has found no combination of technical security controls that sufficiently mitigate the risks.
  • The government considers that the involvement of vendors who are likely to be subject to extrajudicial directions from a foreign government that conflict with Australian law, may risk failure by the carrier to adequately protect a 5G network from unauthorised access or interference.
  • 5G requires a change in the way the network operates compared to previous mobile generations. These changes will increase the potential for threats to our telecommunications networks, and these threats will increase over time as more services come online.
  • The security of 5G networks will have fundamental implications for all Australians, as well as the security of critical infrastructure, over the next decade. It is vital that security and integrity underpinned the opportunities opened up by 5G networks.
  • The Government says Huawei could be used by China for spying, via its 5G equipment. It points to Mr Ren's military background and Huawei's role in communications networks to argue it represents a security risk. Mr Ren was member of China's army, the People's Liberation Army, for nine years until 1983. He is also a member of China's Communist party.
  • But Huawei says this is not relevant: "When Ren Zhengfei was a young man, you needed to be a Communist Party member to have any position of responsibility."
  • Washington has banned US firms from doing business with Huawei (for example, designing and producing chips) and wants its allies to ban it from their 5G networks. Australia and New Zealand have joined the US.
  • For the UK, pressing ahead with using Huawei equipment could have affected vital UK-US trade talks (after Brexit) and the US warned such a decision could risk future security co-operation. But deciding to ban Huawei from 5G in the UK, could risk Chinese retaliation such as a possible cyber-attack.
  • The government introduced the telecommunications sector security reforms to provide a framework for Australia’s security agencies and industry to share sensitive information on threats to telecommunications networks.
  • The reforms introduce four new measures:
  • A security obligation, which requires carriers and carriage service providers to protect their networks and facilities against threats to national security from unauthorised access or interference.
  • A notification requirement, which requires carriers and nominated carriage service providers to tell government of any proposed changes to their telecommunications systems or services that are likely to have a material adverse effect on their capacity to comply with their security obligation.
  • The ability for government to obtain more detailed information from carriers and carriage service providers in certain circumstances to support the work of the Critical Infrastructure Centre; and
  • The ability to intervene and issue directions in cases where there are significant national security concerns that cannot be addressed through other means.
  • The government’s telecommunications sector security reforms, which commence on September 18, place obligations on telecommunications companies to protect Australian networks from unauthorised interference or access that might prejudice our national security.

 


Q-Total cost of ownership, or TCO, is a formula that assesses direct and indirect costs and benefits related to the purchase of any IT component, compared to the provision of a similar service from an outsourced supplier. Evaluate some of the elements required to establish a TCO. Additionally, Based on TCO, evaluate the advantages of leasing and purchase options to assist in delivering cost effective solutions.

Q- identify and evaluate network and transmission equipment related to Telecommunication infrastructure.
Q- Managing WHS issues in the telecommunications industry basically comes down to managing risk. Outline some of the issues with working in confined spaces, electrical safety, materials handling, physical hazards, heights, lifting that would need to be addressed in a WHS risk management plan.


 

This ICTPMG610 - Management Assignment has been solved by our Management Experts at UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment Experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Eureka! You've stumped our genius minds (for now)! This exciting new question has our experts buzzing with curiosity. We can't wait to craft a fresh solution just for you!

  • Uploaded By : Roman
  • Posted on : March 04th, 2019

Whatsapp Tap to ChatGet instant assistance