Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

WK3 Discussion and Reply

Please see attachment for instructions

 

 

W3 Discussion Instructions: Broadband access solutions

 

In 250 word, answer the questions below with 4 evidence base scholarly articles in APA format. 

1. Discuss important trends in broadband solutions that are emerging

2. What would you like to see in the next several years emerge or refined as “the standard” for broadband communications.

In 400 word total, replying to the 2 post below. Each reply must be 200 word. 

 

 


J.N Post #1

My first IT job was working for AT&T, working in the helpdesk department supporting DSL services.  Digital Subscriber Line (DSL) was classified as broadband because it had higher data rates than dial-up.  I recall how customers were increasing the number of devices at home and DSL couldn’t provide enough speed.  Many customers were hesitant to switch over to AT&T fiber services, they didn’t trust it… weren’t sure if it was going to work.  However, younger customers understood that their smart homes needed faster speeds and upgraded to fiber services.

 

Fiber-to-the-Home (FTTH) is becoming more popular offering ultra-high-speed internet with reliable multi-gigabit speeds, due to the increasing demand for bandwidth for more connected devices and media content.  With effort s to expand broadband access to rural and underserved areas, supported by federal bunding programs like BREAD Broadband Equity, Access, and Deployment, is designed to close the digital divide.  Personally, since I didn’t grow up with internet access, I would like to see the following emerge as “the standard” for broadband communications:  fiber access to all households, regardless of location, providing consistent/ high-speed connectivity, affordable high-speed internet service, and AI-powered networks enhancing network efficiency predicting outages, and enabling personalized services.

  

References:

 

Bedolla, O. (2025, January 22). 
9 telecom trends shaping 2025. Intraway Blog.

 

Comer, Douglas E.. 
The Internet Book : Everything You Need to Know about Computer Networking and How the Internet Works, CRC Press LLC, 2018.
 ProQuest Ebook Central,

 

Community Broadband Networks | Rural Broadband | Corning. (n.d.-a).

 

 


D.J Post #2:

 

Broadband technology is advancing rapidly, with exciting developments anticipated in the years ahead. One significant trend is the continued expansion of fiber-to-the-home (FTTH) networks. These networks offer unmatched gigabit-level speeds, lower latency, and dependable connectivity. FTTH is ideal for modern day  applications that require higher speeds such as 4K streaming, virtual reality, and cloud computing. Internet Service Providers (ISPs) like Verizon, AT&T, and Google are investing heavily in FTTH infrastructure, aiming to make it the standard for broadband in metropolitan areas.

Wireless broadband technologies are also breaking new ground with the rollout of 5G networks worldwide. These networks are providing faster speeds, ultra-low latency, and support for a massive number of connected devices. These emerging networks are becoming critical for enabling smart cities, the Internet of Things (IoT), autonomous vehicles, and edge computing.  On the horizon is the development of sixth-generation (6G) networks. Early research is already underway, promising even greater speed and highly advanced applications, including real-time holographic communication.

The utilization of satellite has become another path companies are looking to for broadband solutions. Companies like Starlink and OneWeb are deploying low-earth orbit (LEO) satellite constellations to deliver high-speed internet to remote and disadvantaged areas. These systems will play an essential role in bridging the digital divide by providing reliable internet access where traditional fiber or wireless infrastructure is impractical. In the future, the integration of FTTH, 5G, and satellite technologies will create a robust and inclusive broadband ecosystem. Achieving interoperability, standardization, and equitable access will be critical to ensuring everyone benefits from these technological advancements. 

References:

Becher, Brooke. “6G: What It Is, How It Works, When It Will Launch | Built In.” 
Builtin.com, 17 Oct. 2023, builtin.com/hardware/6g.

Excitel. “The Future of Broadband Emerging Technologies and Trends.” 
Excitel, 31 July 2024, 
www.excitel.com/blogs/the-future-of-broadband-emerging-technologies-and-trends/.

“Exploring the Potential of LEO Satellites for Broadband Access | Bipartisan Policy Center.” 
Bipartisanpolicy.org, bipartisanpolicy.org/blog/leo-satellites-broadband-access/.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

SQL & Data Management

Write a SQL query to find the second-highest salary from an Employee table without using LIMIT. Given a Sales table with Date, Product_ID, and Revenue, write a query to find the cumulative revenue per product over time. Design a normalized database schema for an e-commerce application handling customers, orders, and

SQL 1

SQL help Exercise 8: Write your SQL statement in a file named CIS276DA_Lesson3Exercise8_MEID.sql. Run the script and export the results to CIS276DA_Lesson3Exercise8_MEID.csv. Exercise 9: Write your SQL statement in a file named CIS276DA_Lesson3Exercise9_MEID.sql. Run the script and export the results to CIS276DA_Lesson3Exercise9_MEID.csv. Exercise 10: Write your SQL statement in a

framework

  This week you identify an appropriate theoretical foundation or practice orientation as the theoretical framework through which to view your proposed project. Let’s discuss how you are determining an appropriate theoretical framework for your proposed study. Choose one of the following for your post: Discuss the theoretical foundation or

questionnare

 in the files are the screenshots of my learning styles questionnaire The simple online learning style inventory you took this week, Index of Learning Styles QuestionnaireLinks to an external site., evaluated whether you are active or reflective, sensing or intuitive, visual or verbal, or sequential or global. For this discussion,

Help SQL

SQL Statements Exercise 8: Write your SQL statement in a file named CIS276DA_Lesson3Exercise8_MEID.sql. Run the script and export the results to CIS276DA_Lesson3Exercise8_MEID.csv. Exercise 9: Write your SQL statement in a file named CIS276DA_Lesson3Exercise9_MEID.sql. Run the script and export the results to CIS276DA_Lesson3Exercise9_MEID.csv. Exercise 10: Write your SQL statement in a

Project 1

Follow the attach instructions to complete this work. Project #1: Supply Chain Risk Analysis Overview For this project, you will write a research-based report on Cyber and IT supply chain risks which the client company, Sifers-Grayson must be aware of. This report will be presented to the company’s executive leadership

Cyber

Many security experts argue that their primary concern isn’t hardware or software. It’s peopleware. Successful attacks often rely on some form of social engineering either to obtain access information or for the attack itself. Phishing, in particular, has become a growing concern. Research a phishing technique, including an actual case

assignement 4 CR

Nova Southeastern University College of Engineering and Computing Winter 2025 – Master Level Course Term Code: 202530 – CRN: 30675 Sec: L01 Cr: 3.0 Dates: 8 weeks: 01/06/2025 – 03/02/2025 MSIT 650 Platform and Network Tech (3 Credits) Midterm Exam Check Syllabus and Calendar for % and due date Make

CMAP 605

Unit 8 Assignment Directions: Project 3: Paper for Cybersecurity Conference Read the scenario and then write a white paper that follows all the steps listed below. For more information on writing white papers, visit the UMGC Library Writing Center. Scenario Your company requires you to present a white paper at

An application is requesting an I/O operation from the OS, which consists of several steps. The current step is: Block the current application. What are the next two steps?

An interrupt occurs. Data transfer for the current application completes. Execute kernel function in kernel mode. Transfer execution to another application. An interrupt occurs. Block the current application. Data transfer for the current application completes. Transfer execution from another application back to the kernel in kernel mode. this are the option give me the

Worksheet

To complete this assignment, review the prompt and grading rubric in the Module Four Worksheet Activity Guidelines and Rubric. You will also need the Module Four Worksheet. When you have finished your work, submit the assignment here for grading and instructor feedback.

Activity

To complete this assignment, review the prompt and grading rubric in the Module Four Activity Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.

Computer Science assignment

A. Description of the Assignment Imagine that a company has been using the Linux operating system / kernel for all of its products that are used in a broad range of commercial applications in the past, but the company is currently considering developing an operating system / kernel for real-time

chapter 1 powerpoint presentation

Presentation Document Project Always think of the end user interaction. How will any individual interact with the product you create? Products must comply with law. Your goal is for the end user to have a positive experience with the product while being compliant. Microsoft PowerPoint (Microsoft 365 App) is the

Computer Science A quick assignment on DABS

JUnit Assignment Description: You work for a large flooring company that sells hard wood and carpeted floors. Salesmen go out to people’s home to sell them flooring. You created a program that allows the salesmen to compute the area of a room. Salesmen typically carry laptops on each sales call.

research and critical analysis jan 25 2025

CLASS/HW: 1st Research Article – Screenshots, Methodology & Results (W. 3) Assignment Content Top of Form Prep Task Ensure you have your FIRST research article intended to be used in your Literature Review for later. (1) CONFIRM: that you have applied the required search parameters – last 10 years, full

neural networks that computes the XOR

  Project 2: neural networks that computes the XOR Construct by hand a neural network that computes the XOR function of two inputs. Make sure to specify what sort of units you are using. Show how to build neural network with no hidden layer to implement XOR. If this is

Activation Function

Suppose you had a neural network with linear activation functions. That is, for each unit the output is some constant c times the weighted sum of the inputs.  Assume that the network has one hidden layer. For a given assignment to the weights w, write down equations for the value