Management of Business Telecommunications

MANAGEMENT OF BUSINESS TELECOMMUNICATION 1
MANAGEMENT OF BUSINESS TELECOMMUNICATIONS
Student’s Name
Code and Course Name
Professor’s Name
Institution Name
Due Date
MANAGEMENT OF BUSINESS TELECOMMUNICATION 2
Contents
Management of Business Telecommunications.............................................................................. 3
Abstract ............................................................................................................................... 3
Introduction and Background Information ......................................................................... 4
The key network elements that are used by the Infosys company ...................................... 5
The Infosys recent improvement on the network elements ................................................ 5
Peters of Kensignton ....................................................................................................................... 7
Secure Sockets Layer (SSL) Transactions .......................................................................... 7
Advanced Payment Methods .............................................................................................. 9
Customer User Accounts .................................................................................................... 9
Business Continuity Plan .................................................................................................. 10
Customer Shopping Bags Online ...................................................................................... 10
Conclusion ........................................................................................................................ 11
References List.................................................................................................................. 12
MANAGEMENT OF BUSINESS TELECOMMUNICATION 3
Management of Business Telecommunications
Abstract
Networks characterize business communication. The network elements facilitate external
and internal communications; hence, they are configured to meet the organizational
requirements. For the case of Infosys and Peters Kensignton, they configure their communication
elements such as the exchanges and transmission systems. Infosys network has more
sophisticated elements because it is bigger than Peters Kensington. The analysis of the
companies shows that they two organizations believe communication is the backbone of the
business.
MANAGEMENT OF BUSINESS TELECOMMUNICATION 4
Introduction and Background Information
Business communication is the sharing of information or data between persons either
internally or externally. Internal communication is the sharing of information in within an
organization for example between the departments or the employees within a certain department.
External communication is a type of communication where the information is shared between
organizations; it involves companies with their stakeholders or between organizations with
similar interests (HILES 2011).
Communications require some inputs or the elements to be effective. Currently, most of
the organizations communications are facilitated by the internet among other information
technology devices (KAZI 2006). For the communication to act as a tool for converting the
world into a small village, it requires cloud services to enable international connectivity.
Currently, there are some of the mechanism which speeds up the communications of the
organization (LEE 2009). 5G, Fiber Everywhere, Visualization, SDN & NFV, Everywhere
Connectivity for IoT & IoE, Cognitive Networks, Big Data, Cyber Security, Green
Communications, Smarter SmartPhones, Connected Sensors, Network Neutrality, Internet
Governance and Molecular Communications are some of the communication tools that are
trending in the communication industry.
For a big company like Infosys, more sophisticated communication elements are required
as compared to the Peters of Kensington. Infosys and Peters Kensington are online based, and
they have branches or warehouse in some part in India and Sydney respectively. Therefore, the
two organizations are offering services and selling products to customers both in the warehouses
and via online (SCHOENING 2005). Online transactions are more convenient and cost effective
to both organizations. Though Infosys is bigger than Peters Kensington, they both need to
embrace online services by configuring well-informed communication networks.
MANAGEMENT OF BUSINESS TELECOMMUNICATION 5
Infosys communication system should be compatible or can be able to facilitate software
development, maintenance, and independent validation services. Other services regarding
banking Suite, Cloud % Big Data, Customer Service, Digital Marketing, Distribution Sourcing &
Procurement. The above services offered by Infosys are supposed to be protected thus cyber
security is essential to protect the data in the virtual servers and the data which is transmitted via
the network (GERSHON 2009).
Peters Kensington offers online services to customers in various parts of the world. Peters
Kensington is currently selling products such as Cutlery, Homeware, Books Kid’s Toys,
Watches, Dinnerware, Glassware Beauty and Travel bags. The products are supposed advertised
via The Internet to win potential customers and also to sell the image of the company.
The key network elements that are used by the Infosys company
Infosys believes in that there is an essence of being vendor-agnostic integration layer
which integrates various Software-Defined Networking elements. Vendor-agnostic integration
layer is capable of abstracting hybrid network elements and giving a homogeneous API interface
towards the top layers as well as the north-bound systems like the OSS or BSS and NMS. The
flexibility of the Infosys’s network is due to the flawless bandwidth thus leads to optimal
spending in the organization.
The Infosys recent improvement on the network elements
Due to the customer’s need of the eco-friendly SMS, tweet and email as techniques of
reducing the cost, Infosys is currently communicating with the customers in a less costly
communication because the printing cost has been reduced by the employment of SMS, tweets,
and emails in the communication department of the organization (POPOVSKIJ, BARKALOV
& TITARENKO 2011).
MANAGEMENT OF BUSINESS TELECOMMUNICATION 6
Customers such as banks, utilities, and telcos have more customers that are supposed to
be attended every time via online mode; hence the improvement of the customer care, green
credentials, the bottom lines with the communication Hub launch and the new client
communication management solution which is offered by the Infosys Australia.
The communication hub serves as the central integration platform that captures data from
the core systems of the company and enables it to be quickly formatted and transmitted to
multiple customers’ communication channels such as SMS/MMS, The Web, email and even
social networking sites. For instance, the payment dues notices can be automatically routed
through SMS or email depending on the customer preference and the promotions can be done via
the social networks such as Facebook official site. The saving which is made when information
is sent via the SMS, email, and Facebook are significant because electronic communication
involves less printing.
The new technology management system known as Communication Environment
Manager (CEM) has facilitated the management of the complex communication. Communication
Environment Manager helps the auditors when trailing the source of the communication, the
channel and the receiver of certain messages both internal and external communication.
Therefore, enterprise reporting capabilities have been improved by the Communication
Environment Manager. Though the communication was initially offered in New Zealand and
Australia it is currently effective and has lead to the communication efficiencies in Infosys.
The big data Management for Infosys is more effective and advanced as compared to the
one which is used by the Peter Kensington. Infosys recently launched BigDataEdge to simplify
the big data analysis to discover the relevant information. The business user is empowered due to
the vigorous insights development from the big amounts of unstructured and structured data thus,
MANAGEMENT OF BUSINESS TELECOMMUNICATION 7
better decision making in the businesses are mean on real-time mode. With the Infosys
BigDataEdge, businesses reduce the time taken to mine the information by up to 40% and
generate insights up to 8 times faster.
The Infosys BigDataEdge includes the rich visual interface with over 50 customizable
dashboards and about 250 built-in the algorithm. The algorithms assist the business since it has
the reusable rules thus making the business to work systematically because the set of rules are
used to systematically to avoid the need for technical intervention. The data connectors allow
easy access to the dashboard.
Peters of Kensignton
Secure Sockets Layer (SSL) Transactions
Secure Sockets Layer uses technology to encrypt passwords and other login details that
are transmitted during a transaction. Peters of Kensignton protects the confidential details of
customers by ensuring encryption of customers’ credentials. Peters of Kensignton has created a
link that is encrypted to ensure security between the server and the client
http://www.petersofkensington.com.au/Public/Default.aspx. The security is done between the
web server and a browser. A Secure Socket Layer is a security protocol. The transmitted data is
checked and described by the protocols before transmission. The cost of using a Secure Socket
Layer is $139 per year (ALWAYN 2004). A big and international company like Peters of
Kensignton should be able to afford to pay the amount to ensure the security of the customer.
Due to the wide range of products offered online by Peters of Kensignton, secure logins should
be maintained to protect the rights of consumers. Secure Sockets Layer signatures are done
digitally and can perform in browsers that are known as the Trusted Root CA store (CHANG
2000). To ensure that a website is secure, Peters of Kensignton registered with the CA. The
MANAGEMENT OF BUSINESS TELECOMMUNICATION 8
secure connection of a Secure Socket Layer is illustrated in the diagram below (RESCORLA
2001);
Peters of Kensignton Secure Server Connection
Fig 1.
Key:
1. The connection of browser to the server under secure SSL.
2. A copy of SSL certificate sent that contains a server’s public key.
3. Checking of the certificate against trusted CAs list.
4. Encryption and decryption are done using a private key.
5. Transmitted data on the Server and Browser now encrypted with the session key.
Visitors to the site are guaranteed of security and privacy of the information provided.
Online purchasing is vulnerable to hackers but with the help of Secure Socket Layers, Peters of
Kensignton has ensured security to customers ((MUTHU & LI 2013).
WEB
BROWSER
WEB
SERVER
1
2
3
4
MANAGEMENT OF BUSINESS TELECOMMUNICATION 9
Advanced Payment Methods
Business transactions were traditionally carried out by the exchange of liquid money
against the service or product purchased. Peters of Kensignton accepts plastic and wire transfer
money while making payments. The plastic money includes the use of VISA cards, MasterCard,
and American Express (KAINDL 2004). Wire transfer money methods include PayPal, Skrill,
and Payoneer. Due to the global trading exercise, the improved methods of payment by Peters of
Kensignton encourages people from all places in the world to trade freely and wait for the
shipment of the items purchased.
Customer User Accounts
Technology has pushed to the creation and designing of websites for companies. On the
websites created, options for the user to create customer accounts have been provided. The user
accounts are protected by getting linked with an email address of the user or customer with a
password that is private and confidential to the customer (GROVER 1986). Since every customer
has his/ her account on the site of a company like Peters of Kensignton, every conversation
remains known by the customer and the company. In cases where a customer is given a discount
by meeting a minimum quantity discount, the rest of the other customers will not have the
information so as to base a bargaining point. The accounts maintain privacy and do not reveal the
privileges given to customers who have been trading with Peters of Kensignton for long.
Unlike retail stores that are operated from premises, the virtual retail shops never close.
The online sites operate 24 hours, seven days in a week. Peters of Kensignton have created an
environment where shoppers and other visitors can have access to the available products in the
store and place orders or enquiries (SHEPHERD & AUGENTI 2012). The online sites also
create networking opportunities. People do access the sites while with friends, relatives or
workmates. The curious people would like to ask questions about the site that one has opened. In
MANAGEMENT OF BUSINESS TELECOMMUNICATION 10
the process of the person telling about Peters of Kensignton, word would have spread about the
company and more visitors tour the site for more information. Considering the wide variety of
items available in the online store of Peters of Kensignton, customers keep increasing in number
each time they get word about the products available for sale.
Business Continuity Plan
Risks are prone to every business that deals with stock or any other kind of service
provided to customers. Peters of Kensignton has ensured security of customers and continuous
supply of goods and products even if any disaster such as fire, theft, or loss of data in the
databases gets lost. The company has insured information and products for any risk. Should the
database crash and data is lost, measures have been put in place to recover the information
without loss (HILES 2011). The insurance companies are involved to help incases a disaster
occurs that might render the company stakeholders and customers to lose money. Because of the
guaranteed security of customers with a continuous flow of supply as well as the money
deposited in the accounts held with Peters of Kensignton, customers feel secure to continue
trading with a partner who cares for the needs of the customer and ensures that no shortages shall
be experienced. Businesses that are trading for a going concern gain much trust and confidence
from customers than companies that are trading for a specific period then shut down.
Customer Shopping Bags Online
Peters of Kensignton has created a shopping bag for the customers. The shopping bags
are meant to store information of items a customer intends to purchase shortly. The list is
compiled, and when the customer is done by selecting the products of interest, the list is
forwarded to place an order. The advantage of the shopping bags is to help customers not to
forget on the list of items that are to be purchased. Some customers do prepare a shopping list for
more than a week. The shopping bag acts as a reminder of what is to be bought (MUTHU & LI
MANAGEMENT OF BUSINESS TELECOMMUNICATION 11
2013). Also, Peters of Kensignton staff can check from the shopping bags on the list of items that
customers will purchase after a few days. When the list is known to the company representatives,
the products are mad available for dispatch once the customer has confirmed the order.
Conclusion
A well-designed website and explanatory profile of a company trading online can market
an organization more than sales representatives can market. The essential idea about online
business is that people from all locations in the world have access to the information. Apart from
the information being available to the people all over the world, such companies operating
through online have the target to open shops in many locations to serve customers and have an
easy time to deliver ordered products to customers (JONES 2004). Effective communication in
business creates a good relationship with the customers as well as the outside world. New
customers visit the sites of businesses that deal with online transactions because of the good
recommendation given by the current customers who are satisfied with the services.
MANAGEMENT OF BUSINESS TELECOMMUNICATION 12
References List
(2003). Operations support systems: solutions and strategies for the emerging network :
comprehensive report. Chicago, International Engineering Consortium.
ALWAYN, V. (2004). Optical network design and implementation. Indianapolis, Ind, Cisco
Press.
CHANG, C.-S. (2000). Performance Guarantees in Communication Networks. London, Springer
London. http://dx.doi.org/10.1007/978-1-4471-0459-9.
GERSHON, R. A. (2009). Telecommunications and business strategy. New York,
Routledge/Taylor and Francis Group.
GROVER, K. C. (1986). Foundations of Business Telecommunications Management. Boston,
MA, Springer US. http://dx.doi.org/10.1007/978-1-4613-2193-4.
HILES, A. (2011). The definitive handbook of business continuity management. Hoboken, N.J.,
Wiley. http://public.eblib.com/choice/publicfullrecord.aspx?p=624759.
http://www.petersofkensington.com.au/Public/Default.aspx
JONES, N. V. (2004). Telecommunications management. College Station, TX,
Virtualbookworm.com Publishing.
KAINDL, H. (2004). Networks 2004: 11th International Telecommunications Network Strategy
and Planning Symposium, June 13-16, 2004, Vienna, Austria ; [proceedings]. Berlin
[u.a.], VDE-Verl.
KAZI, K. (2006). Optical networking standards: a comprehensive guide. New York, NY,
Springer.
LEE, I. (2009). Handbook of research on telecommunications planning and management for
business. Hershey, Information Science Reference.
MANAGEMENT OF BUSINESS TELECOMMUNICATION 13
MUTHU, S. S., & LI, Y. (2013). Assessment of environmental impact by grocery shopping bags:
an eco-functional approach.
http://public.eblib.com/choice/publicfullrecord.aspx?p=1466561.
POPOVSKIJ, V., BARKALOV, A., & TITARENKO, L. (2011). Control and adaptation in
telecommunication systems mathematical foundations. Berlin, Springer.
RESCORLA, E. (2001). SSL and TLS: designing and building secure systems. Boston [u.a.],
Addison-Wesley.
SCHOENING, H. M. (2005). Business management of telecommunications. Upper Saddle River,
N.J., Pearson/Prentice Hall.
SHEPHERD, J., & AUGENTI, N. L. (2012). How to start a home-based online retail business.
Guilford, Conn, Globe Pequot Press.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.