Annotated Bibliography Assignment on Wireless Networks
Task:Write an Annotated Bibliography for your Capstone Topic with a collection of 12 articles following a set structure. The Annotated Bibliography is a critical examination of the most relevant, recent and scholarly research on the topic area that is not just a summary of the articles you have read on done in Topics 1 to 5.
As a CSU student you can download and install EndNote X7 for Windows or Mac OS platforms from https://online.csu.edu.au/division/dit/software/core.html
For Group Work OPTION teams only: Assessment Item 3 Annotated Bibliography is done INDIVIDUALLY by ALL students.
Ensure that the Annotated Bibliography submitted by you is your own work and has not been submitted elsewhere and comply with the University's requirements for academic integrity.
You can get help in Building and Writing an Annotated Bibliography from Topic 3 Tutorial Topic in the ITC571 Interact2 site sidebar menu and other study advices and tips from:
Study Resources (PDF files to download): http://student.csu.edu.au/study/resources
APA style Referencing from http://student.csu.edu.au/study/referencing-at-csu.
The CSU Library website for LibGuides in Information Technology, Computing and Mathematics at http://libguides.csu.edu.au/cat.php?cid=66969
EndNote Bibliographic software and tutorials LibGuide at http://libguides.csu.edu.au/endnote
Review the emerging technology (use internet for journals, conference papers, magazines, news articles, online databases, eBooks) and submit a 12-article Annotated Bibliography on your topic.
A good place to start a collection of articles in your annotated bibliography is via the PRIMO search tool located on the CSU Library website at http://www.csu.edu.au/division/library
A good place to start a collection of articles in your annotated bibliography is via the PRIMO search tool located on the CSU Library website at http://www.csu.edu.au/division/library
Library Resources: Information Technology Journal Databases: http://www.csu.edu.au/division/library/find-info/databases/subject/infotech
Information Technology & Computing LibGuides : http://libguides.csu.edu.au/itc
The following questions may be useful while reviewing the topic:
- What is the new technology?
- What does it do and what are the special features it has?
- When is it coming out in the market and how much will it cost?
- What industry will the new technology affect? (Medical, agricultural, computer, business, etc….).
- In your opinion, will the new technology be beneficial to society? Why or why not.
- What did you learn from a critical analysis of your sources of information on this new technology?
TASK 2 Self-Evaluation Report on Originality: Select an 800-word sample of annotations from Task 1 and submit it for testing at either Turnitin turnitin.com or Small SEO Tools Plagiarism Checker http://smallseotools.com/plagiarism-checker/ sites.
Save a copy of the originality report obtained from the chosen site
Critically evaluate and interpret the originality report, from your context or point of view as your personal Self-Evaluation Report on Originality
Append this short evaluation report to the saved copy of originality report from the chosen site as Task 2 completed.
The research is being conducted on the topic as Wireless Networks. The use of wireless networks is seen in every industry and business sector. The personal communications and networking is also carried out with the ad of these networks. They have transformed the picture of information sharing and information exchange. With all of these benefits, there are a few issues associated with these networks. The primary sets of issues include privacy and security concerns.
Savazzi, S., Rampa, V., & Spagnolini, U. (2014). Wireless Cloud Networks for the Factory of Things: Connectivity Modeling and Layout Design. IEEE Internet Of Things Journal, 1(2), 180-195. doi: 10.1109/jiot.2014.2313459
The authors in this research article have focussed upon the use and application of the cloud-based wireless networks in complex business operations. The area of application selected is industrial plants and manufacturing. There are several automated processes, tools, and techniques that have been created so that the prediction around connectivity and validation of deployment can be easily carried out. The authors have also explored the emerging technologies and their impact on the wireless networks. One such technology that has been discussed is Internet of Things (IoT). IoT is a technology that provides an inter-connection of different gadgets, devices, processes, and tools. With the increased use of IoT in the business sectors, the overall wireless networking architecture has also changed. Wireless networks in industrial plants can be utilized to carry out the tasks, such as prediction regarding the wireless coverage, verification regarding the layout of the plant, and many more. The authors have also discussed the Graph-theoretic approach.
Lin, Y., Shao, L., Zhu, Z., Wang, Q., & Sabhikhi, R. (2010). Wireless network cloud: Architecture and system requirements. IBM Journal Of Research And Development, 54(1), 4:1-4:12. doi: 10.1147/jrd.2009.2037680
There has been a lot of transformation and development observed and witnessed in the areas of networking, mobile connectivity, and technologies. The primary aim of the network engineers, network analysts, and the resources working in the field of networking is to make sure that the overall costs associated with networking and communication is brought down for the end-users. Also, it is aimed that the user experience and the ease of usage is maximized. For this purpose, the authors in their research work have described the wireless system architecture that the business organizations may implement to provide enhanced services and access to their users. There are a few advanced developments that have been done in the field, such as software radio along with the remote head technologies that may be used and amalgamated with the cloud-based applications and services. The coupling and amalgamation of these technologies with the cloud-based platform may give rise to a few issues. Some of these may include problems with synchronization, I/O throughput, etc.
Flammini, A., & Sisinni, E. (2014). Wireless Sensor Networking in the Internet of Things and Cloud Computing Era. Procedia Engineering, 87, 672-679. doi: 10.1016/j.proeng.2014.11.577
The authors in their research work have focussed upon the developments that have taken place in the field of wireless networks over the years. The latest development that has been witnessed is the development and implementation of wireless sensor networks that are also referred as WSNs. The authors have also explored the emerging technologies and their impact on the wireless networks. One such technology that has been discussed is Internet of Things (IoT). IoT is a technology that provides an inter-connection of different gadgets, devices, processes, and tools. The users now have better connectivity and accuracy with the involvement of IoT. For the business users, the networking architecture is more flexible and agile.
Alnezari, A., & Rikli, N. (2017). Achieving Mobile Cloud Computing through Heterogeneous Wireless Networks. International Journal Of Communications, Network And System Sciences, 10(06), 107-128. doi: 10.4236/ijcns.2017.106006
The authors have researched upon the topic as heterogeneous wireless networks and have discussed the application of these networks in mobile computing technologies. The authors have explained a fuzzy logic model to carry out the simple to complex set of activities. The discussion on the compatible operating systems, such as Android as a mobile OS will make use of Google App Engine to access the model and the networking architecture. The users will be provided with the benefits of enhanced processing speed and mobility.
Bhatt, R., Arvind, A., & Bhatt, P. (2016). An Integration Framework of Three-Dimensional Wireless Multimedia Sensor Network with Cloud Computing for Surveillance Applications. Indian Journal Of Science And Technology, 9(32). doi: 10.17485/ijst/2016/v9i32/100744
Wireless networks have a lot many uses and applications in a variety of different fields and areas. One such application of wireless networks is in the area of surveillance. These networks are used in investigations and the authors have researched upon the use and application of wireless networks in these areas. The latest development that has been witnessed in wireless networks is the development and implementation of wireless sensor networks that are also referred as WSNs. The authors have explored the integration of wireless sensor networks with cloud computing to carry out surveillance and investigation tasks. There are also three-dimensional wireless networks that have been developed and are being used in several areas, such as underwater monitoring, urban warfare, and a lot more. Marine applications of these 3-D networks amalgamated with cloud computing is one the recent developments. These can also be used for the purpose of surveillance in multi-storied buildings.
Li, S., Xu, L., Wang, X., & Wang, J. (2012). Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterprise Information Systems, 6(2), 165-187. doi: 10.1080/17517575.2011.654266
The business enterprises in the current times are making use of the latest technologies and systems to automate their business processes and activities. One such development is the implementation of Enterprise information systems (EIS) in the business organizations. These are being implemented to automate the enterprise processes and to allow the resources engaged with the enterprises to carry out the processes with ease. Wireless networks are being designed and developed to meet the needs of the enterprises and to make sure that the desired outcomes are achieved. Hybrid wireless networks are being developed for this purpose and the implementation of the same has resulted in the enhancement of the capabilities of enterprise information systems. There are various issues of unauthorized access and breaking of the authentication measures that are witnessed in association with the EISs. The use of hybrid wireless networks will make sure that the access control is enhanced.
Amirthavarshini, L., Varshini, R., & Kavya, S. (2015). Wireless Sensor Networks in Green Cloud Computing. Retrieved from https://www.ijser.org/researchpaper/Wireless-Sensor-Networks-in-Green-Cloud-Computing.pdf
One of the primary concerns that the business organizations and enterprises have observed is the negative impact of the computing resources on the environment. This is because the data servers and other resources emit the contents that are harmful for the environment. The problem of electronic-waste (e-waste) is also a global concern. As a result, the business organizations and the end-users are consciously developing the mechanisms through which the negative impact on the environment may be controlled and prevented. The demand of the information and data usage has gone up over the years. The business enterprises in the current times deal with huge clusters of data. This has led to the establishment of cloud computing centres for virtual data storage. One of the step towards sustaining the environment is the development and implementation of green cloud computing. The high energy emissions can be brought down with this attempt. Wireless networks are an integral part of the initiative and it is not possible to implement the system without the involvement of wireless networks. The authors have covered the details of the concept and the role of wireless networks in the same.
Chen, M., Zhang, Y., Hu, L., Taleb, T., & Sheng, Z. (2015). Cloud-based Wireless Network: Virtualized, Reconfigurable, Smart Wireless Network to Enable 5G Technologies. Mobile Networks And Applications, 20(6), 704-712. doi: 10.1007/s11036-015-0590-7
Technology is witnessing a lot of development and transformation with every passing year. There has been a lot of transformation and development observed and witnessed in the areas of networking, mobile connectivity, and technologies. The primary aim of the network engineers, network analysts, and the resources working in the field of networking is to make sure that the overall costs associated with networking and communication is brought down for the end-users. Also, it is aimed that the user experience and the ease of usage is maximized. The aim now is to provide the users with increased mobility and the same has paved the path for fifth generation of networking. It is being referred as 5G and will allow the users to experience faster networking speed and connectivity. The technology is an amalgamation of varied sets of technologies and methods including wireless networks, Big Data, Business Intelligence, cloud computing, and a lot more. This generation of networking will come along with the enhanced performance of the networks and will also provide enhanced connectivity capacity.
Moura, J., & Hutchison, D. (2016). Review and analysis of networking challenges in cloud computing. Journal Of Network And Computer Applications, 60, 113-129. doi: 10.1016/j.jnca.2015.11.015
Wireless networks have transformed the picture of information sharing and information exchange. With all of these benefits, there are a few issues associated with these networks. The primary sets of issues include privacy and security concerns. The authors have covered the various issues and challenges that come along with the networking technologies including cloud computing and wireless networks. These technologies have allowed the users to experience enhanced levels of mobility along with the automation of the services and applications. However, there are certain issues associated with the technologies, such as load balancing, fault tolerance capabilities, and data congestion. There are various security and privacy issues that may also come up with these networks and technologies. These many include man in the middle attacks, eavesdropping attacks, denial of service attacks, and many others.
Dash, S., Mohapatra, S., & Pattnaik, P. (2010). A Survey on Applications of Wireless Sensor Network Using Cloud Computing. Retrieved from http://ijcset.excelingtech.co.uk/vol1issue4/10-vol1issue4.pdf
Cloud computing is a technology that is being widely used in a lot many business sectors and organizations all across the globe. The technology is also coupled with the wireless networks to develop further applications and services. The integration of the two technologies and the benefits that these provide to the end-users has been discussed in the research work. The capabilities of both of these technologies improve upon the integration with each other. Some of the latest applications that have been explored and are being implemented include health care monitoring & tele-health services, military applications, prediction of the weather changes, and transport monitoring. These technologies integrated with each other can also be applied in the areas of marketing and entertainment.
Yin, Z., Yu, F., Bu, S., & Han, Z. (2015). Joint Cloud and Wireless Networks Operations in Mobile Cloud Computing Environments With Telecom Operator Cloud. IEEE Transactions On Wireless Communications, 14(7), 4020-4033. doi: 10.1109/twc.2015.2416177
Every industry has been impacted positively or negatively with the developments and enhancements in technology. One such industry that has witnessed positive impacts is the telecom industry. There have been various transformations and developments that have been witnessed in the areas of cloud computing along with the wireless networks. The integration of the two technologies and the benefits that these provide to the end-users has been discussed in the research work. The capabilities of both of these technologies improve upon the integration with each other. The authors have made use of quantitative methodology for carrying out the research to bring out the developments and the impact of the changes on networking and telecommunication. There are also a few challenges that have come up in terms of security attacks and privacy concerns.
Song, C. (2017). A Novel Wireless Sensor Network Architecture Based on Cloud Computing and Big Data. International Journal Of Online Engineering (Ijoe), 13(12), 18. doi: 10.3991/ijoe.v13i12.7890
There are several technologies being used by the business enterprises in the current times. Two of the primary technologies include cloud computing and Big Data. These have allowed the business enterprises to manage their data and information sets correctly and with much ease. Wireless networks are integrated with both of these technologies to provide the business users with the benefits of inter-connected frameworks and enhanced processing speed. The management and organization of the data sets also become easier as a result. The authors have explored the use and integration of these two technologies with the wireless networks.
Wireless networks have become an integral part of the personal and professional activities owing to the capabilities that they provide to the end-users in terms of connectivity, mobility, and enhanced processing speed. There is a lot of research that has been done in the area of wireless networks and an overview of the same has been covered in the section above. There are newer developments being done in the field of wireless networks that need to be researched upon. The advanced security tools based on wireless networks shall be researched upon so that the overall security status may be improved. Also, the integration of new and advanced technologies with wireless networks must be explored by the researchers and technocrats.
Task 2: Self-Evaluation Report<
The references that have been used for preparing the annotated bibliography are the published journal articles and research papers. These have been analysed and studied to extract the primary aim and objective of research along with the main points covered by the authors in their respective works. It has been ensured that the work done by the researchers is interpreted on the basis of own views and thoughts without impacting the integrity of the information. It has been ensured that the originality of the work is maintained all throughout and the plagiarism level in the work done is negligible. Proof-reading of the text was done multiple times along with the use of automated tools to ensure and validate the originality as per the expectations.