Introduction
Computer technologies and communication networks need to be
available and accessible anytime and anywhere. Current network architectural
design should ensure that network utilities are accessible from any device.
Current networks are highly evolving to support and incorporate new
technologies, support new classes of applications as well as support new
services. New network requirements
involve proper mitigation of insecurity challenges. Networks designs should scale and adapt to
unforeseen events, vulnerabilities, and uncertainties across multiple network
support utilities. Current network designs include different types of
applications, storage size, and topology, wireless mobility patterns, and
incorporates heterogeneity of devices and networking technologies that enhance
security. Current networks design incorporate needs for enhancing easily
control using manageable application. Network architectures are currently
designed with adequate resources and energy efficient and effective support of
the growth of traffic and users virtually. Major network architecture
integrates secure and resilient procedures to prevent failures and attacks.
Networking Technology and Systems (NeTS) involves the use of programs that
supports transformative research. NeTS
integrate fundamental and scientific technologies that advance in networking as
well as systems. NeTS promote high-performance networks and future Internet architectures.
The information and communication technology (ICT) industry
is experiencing very dramatic changes in networking architecture. The current
environments are embracing virtual technologies developed using VMware
technology. The growth and development of IT have led to great transformations
in the field of distribution of network resources. Various essential resources can be shared
such as repository systems, storage locations and hardware and software components.
Trends in network technology and are a major trigger and driving forces for the
evolution of future networks. New network infrastructures are expected to
implement 5th Generation (5G) architectural design. The current changes in
paradigm include changes in design and operations of networks and its services.
Various changes such as rise of cloud networking, the rise towards
Virtualized Networks and
Infrastructure
Software Defined Networking (SDN) and Software Defined
Infrastructure (SDI) are being used in recent network infrastructures to
facilitate high-level potential in acting as major drivers of network
innovation. SDN and SDI design are being
incorporated into networks to enable novel network functionality, wired and
wireless network domains. In network systems, NeTS architecture is being
improved and transformed by technologies associated that support SDN and SDI
(Lee, Murray, & Qiao, 2015). The current trends that have been implemented
in current network technology include. Current trends of networks involve
embedding techniques for mapping applications onto virtualized infrastructure.
Applications installed in network infrastructures include securing and
monitoring systems such as analysis tools. Another improvement includes
embedding resources such as performance enhancing tools such as Hadoop servers
and databases to support big data concepts.
Current networks infrastructures are supported using resilience systems
such as the installation of data recovery and backup systems.
Another trend involves managing virtualized infrastructures
through the allocation of resources to various network system users. Current
networks are designed to support network of things. Network resources are
dynamically changed and shifted among users especially in cases where the
virtualized infrastructures are dynamically shared. New 5th generation
protocols for controlling of virtualized infrastructure are being incorporated
in modern network architecture. Novel virtualization techniques that enhance
the easier accessibility of network resources as well as availing network in
mobile devices are being applied in wireless networks (Lee, Murray, & Qiao,
2015). The new wireless support operations include incorporation of spanning
the home technology, easy access hot spots, enterprise virtual network infrastructures
for wireless devices and cellular network domains.
Wireless Network Architectures
Current trends have a diverse multitude of wireless network
architectures that are emerging to support communication. Techniques currently
are applied to enhance the development of conventional wireless network
infrastructures for effective communication design principles. Various trends
wireless techniques are associated with novel physical layer techniques as well
as virtual technological trends. The various wireless trends that are applied
to enhance novel technologies use of Ultra-wideband millimeter-wave wireless
networks that enhance spanning frequencies above 20 gigahertz (Sukant et al.,
2015). The bandwidth allows streaming of various multimedia applications such as
video conferencing, real-time chatting, among other business operations. Trends
in wireless architectures incorporate free-space optics and visible light
communications that enforce high-level securities due to strong privacy,
confidentiality, and personalization. Current trends in wireless architectures
have promoted features such as high-bandwidth network systems that enhance
streaming of data and information across wireless devices. Wireless
architectural designs have incorporated agile frequency to provide multiple and
standardized resource allocation. Mobile devices can generate shared bandwidth
through establishing peer connection. Bandwidth can be transformed to wired
architecture through the implementation of airborne communication platforms. Airborne
communication platforms have also facilitated the development of manned and
unmanned systems that implement wireless technology. Drones, as well as high-altitude balloons,
are being used as modern aircraft for controlling and managing security. Drones
are effectively applied in surveillance for terror attacks.
New wireless architecture support systems by promoting
pervasive machine to machine communications at large scale. The trend has
facilitated implementation of highly functioning systems that are
energy-harvesting. The energy can be easily distributed across devices to
minimize and reduce energy consumption. Trends in wireless systems involve the
implementation of ultra-low power sensors that enhances minimization of power
consumption. The power-oriented systems enable perpetual operations within
wireless networks. Such technologies have facilitated direct implementation of
a dynamic spectrum of access; the technology has facilitated effective and
efficient support of various technology-based communication. The technology has
facilitated dynamic utilization in radio systems such as radio frequency
identification systems (RFID) (Sukant et al., 2015). Wireless systems have
facilitated cognitive of radios frequencies within communication sector.
Virtual Networks
Virtualization has improved computing and information
technology through enhancing server consolidation and support to the cloud
computing. Virtualization technology is
one of most dominant computing platform worldwide. Through virtualization,
network security has been highly improved in current network architectures.
Techniques such as the application of VMware technologies have led to various
ways in which security has been enhanced in modern network infrastructures
(Sperotto, et al., 2015). Current trends in networked systems are defining new
ways in which security can be improved via network virtualization techniques.
Virtual Networks have the ability to
micro-segment network traffic to create pervasive virtual firewalls. The
virtual firewalls are usually software-based which are distributed across the
data center. Virtual Networks have resonated in the market through
implementation of VMware technology. Implementation of the virtual network has
created a variety of new opportunities for having improved security practices.
Virtual Networks have improved network security such as protection on perimeter
defenses. It has also facilitated the improvement of security by ensuring
security on traffic inside of the data centers, databases, and other repository
locations. One way Virtual Networks has achieved security measures is through
virtual micro-segmentation implemented through VMware technology (Wen, Tiwary,
& Le-Ngoc, 2015). VMware architecture as part of the virtual technology
allows new virtual networks to be easily created. It also allows network
policies to be easily defined and get assigned to the networks. Virtual
technology allows only certain types of traffic to flow across network
infrastructures. Virtual systems ensure that network systems have parameters
and set methods of dealing with attacks. When an infectious threat attempts to
use the network, it is not authorized to access network. Since virtualization
supports segmentation of networks, segmented networks provide high-level
security through mitigating an attacking agent trying to gain access to the
network. Even if intruder succeeds to get in the system, he has no freedom to
rein within the data center, databases or repository locations. Intruders are
limited and get confined in a single segmented network.
Virtual Networks enhance perimeter
security through modifying ability to develop virtual firewalls. Through VMware
technology, firewalls get distributed throughout the data center, across
databases and server systems. However, in physical network infrastructure
configurations and setups, for the physical firewall are implemented. Software
and hardware firewalls are still used as a perimeter defense a technology
referred to as north and south traffic. It takes security consideration for
that is data and information coming into and going out of an environment. New
trends in virtual networks technologies, allows virtual firewalls to be placed
inside as well as get distributed throughout the data center (Tomovic,
Pejanovic-Djurisic, & Radusinovic, 2014). It allows for east and west
traffic control, management and monitoring by ensuring and facilitating server to
server operations. In virtual networks, all components are protected by virtual
firewall rules.
Virtual networks and other
application that rely on virtual technologies can be applied in different
network segments to enable hiding of utilities from other parties. Networks or
applications can be segmented to belong to a specific group of users. Network
applications and software can easily be scanned for malware and other attacks.
Vulnerability testing on networks can be implemented on network segments (Lee,
Murray, & Qiao, 2015). Activities
such as monitoring and checking information flow are more easily on virtual
platforms. Security applications which include Intruder Detection Systems (IDS)
as well as Intruder prevention systems can run as software inserted
applications directly onto the virtual networks. Rather than requiring physical
devices virtual interfaces require software applications that can be
implemented more effectively across the network rather than on a dedicated
system. Another trend in virtual networks is the addition of security
intelligence systems and security analytical systems within virtual networks.
Intelligence systems can be built into virtualized networks to enhance
scanning, and monitoring abnormal activities on the network.
Conclusion
Software Defined Networking (SDN)
and Network Function Virtualization (NFV) has changed new ways of network
architecture. New architectures are being created taking new opportunities for
all network oriented network resources.
New changes include easy, flexibility and programmability of desired
network architecture. Network designs have gained openness, and responsiveness
while reducing the cost of subscribing to networks. Meanwhile, modern network
infrastructure has solved some issues such as network and service management.
For future network design will include resulting in emerging networking
paradigm (Kim, Kim, & Chung, 2015).
New network infrastructure incorporates information-centric networking
and programmable networking to support mobile devices.
References
Sperotto, A., Doyen, G.,
Latre, S., Famaey, J., Charalambides, M., Velan, P., & Celeda, P. (2015).
Report on the 8th International Conference on Autonomous Infrastructure,
Management, and Security (AIMS 2014): Monitoring and Securing Virtualized
Networks and Services. Journal
of Network and Systems Management.
Wen, H., Tiwary, P. K., &
Le-Ngoc, T. (2015). Multi-perspective virtualization and software-defined
infrastructure framework for wireless access networks. Mobile Networks and Applications :
the Journal of Special Issues on Mobility of Systems, Users, Data and
Computing, 20, 1, 19-31.
Tomovic, S.,
Pejanovic-Djurisic, M., & Radusinovic, I. (2014). SDN Based Mobile
Networks: Concepts and Benefits. Wireless
Personal Communications : an International Journal, 78, 3,
1629-1644.
Kim, G.-H., Kim, Y.-G., &
Chung, K.-Y. (2015). Towards virtualized and automated software performance
test architecture. Multimedia
Tools and Applications : an International Journal, 74, 20,
8745-8759.
Lee, B., Murray, N., &
Qiao, Y. (2015). Active Accounting and Charging for Programmable Wireless
Networks. Mobile Networks and
Applications : the Journal of Special Issues on Mobility of Systems, Users,
Data and Computing, 20, 1, 111-120.
Sukant K. Mohapatra, Jay N. Bhuyan, & Hira N. Narang.
(2015). planning and managing virtualized next generation networks. International Journal of Computer
Networks & Communications, 7, 6, 1-16
Sherry Roberts is the author of this paper. A senior editor at Melda Research in best nursing writing services if you need a similar paper you can place your order for custom nursing papers.
No comments:
Post a Comment