Introduction
The telecommunication industry has been
a critical area within the global since it has plays the vital role of uniting
the world regardless of the difference in distance. Communication provides a
comprehensive understanding of how resources “information and ideas” can be
shared thus distributed globally. The development of the communication process
over the decades well highlights the evolution and thus the trends within the
telecommunication industry. The introduction of networks got the greatest
impact on the communication sector as it got things done simpler than before
and the most enticing thing was the internetworking that got the attention of
every business and any individual that is informed.
The connection to the global network has
increased tremendously, and this creates some sought of issues that must get
handled accordingly. The demand for the network has seen the growth in threats
of attacks thus the demands for having standards and better techniques of
managing the networking as well as the used devices. Thus, the interest is to
have the understanding of the trends in the sections of the network security,
the current wireless networks, and the software-defined networking.
Network Security
Computer network security has become the
area of interest with technological change that has seen challenges to do with
network intrusion. Network intrusion was initially considered as a simple task
that network engineers could handle. However, it has been found that delivering
integrity, availability, and confidentiality within a network has become a
total issue. At any given time, the establishment of a network that has no
appropriate security measures will mean a challenge in delivering the network
functions.
The enhancement of security within
networks has been improved such that network engineers are incorporating the
security measures from the scratch that is the initial stages of developing the
network. The determination of appropriate security measures was a little
challenging in the past unlike the current availability of scanning devices
that provide recommendation over the vulnerable devices and points that are
susceptible to attacks. The current increase in the use of networks has seen
the increase in demand for bandwidth, new computing approaches which have
introduced change in network security designing and management. It comes about
that the network will deliver the given function upon having best security
extension measures (Sengupta, Kaulgud & Sharma, 2011).
The security measures were initially
being integrated at selected levels within a network. However, the current
network security integration has seen the implementation of the security
measure at all levels in the so called the in depth approach to controlling
network intrusion and attacks. In the initial designs there existed a big
communication gap between the vendor of security approach and the network
designer hence rendering the network susceptible to attacks. However, the
current approaches have seen the introduction of better authentication,
non-repudiation and authorization approaches. These approaches have given the
power of easily detecting and blocking the malicious threats of SQL injection,
Trojans, Viruses, denial of service, sniffing and others. This has been
achieved with the use of programs such as the Network Mapper, and Nokto that
run within our networking devices and works by scanning the network devices including
the servers.
The notable trend that has taken the
attention of network analysts and engineer is the protocol trends. The network
was laid within the IPv4 protocol that was limited in the number of IP
addresses that it could provide to the global. The demand for IP addresses did
increase with the technological advancement of developing application that has
the capability of connecting to the global network. Therefore, there is the
full experience of moving from the IPv4 protocol to the IPv6 protocol that has
no limited IP address generation. The IPv6 protocol is characterized by the
extension of the IPSec security mechanism at all network levels and this has
even boosted the management of the network (Raicu & Zeadally, 2003).
Confidentiality extension within the
network is a critical attribute that been improved by the introduction of this
powerful protocol IPv6 protocol, the secure socket layer (SSL), intrusion
detection systems (IDS) and intelligent firewalls. The mechanism has ensured
that the attacks of Denial of Service (DoS), Sniffing and IP spoofing have been
well controlled. On the other hand, the integrity attribute has been given the
power with the introduction of security mechanisms such as the integration of
secure socket layer, PSec, intelligent DS as well as the intrusion detection
systems (IDS). Furthermore, network function availability have been guaranteed
against the Systems Boot Record
Infectors, Spamming by the adoption of intelligent firewalls, Secure Socket
Layer, advanced authorization and
authentication techniques, and suitable Anti-Malware software.
Software-defined
networking
Software-defined networking is an
approach that has got the network engineers administrators to undertake their
roles, duties, and responsibilities on an OpenFlow protocol. They will get
confined to eh principles and procedures of managing the network highlighted
services by using abstraction approach of the considered lower level
functionality. The businesses and organizations are ever aiming at improving
the functionality and service delivery of the networks towards meeting the
defined objectives. Therefore, software-defined networking is a technique that
means a lot to industries and businesses since the approach gives the network
engineers and administrators to provide responses promptly so as to meet the
ever-changing requirements of the business.
The software-defined networking technique
has given the communication industry another face that has given the users of
the network guarantee when it comes to technical support. The most enticing
thing that has changed over the time is the assurance to the network users of
the availability of service delivery at all times that is at the right time and
the right place. The software-defined networking has provided the capability of
working within a limited space with the negligible experiencing human error in
service rather function delivering (Xia, Wen, Foh, Niyato & Xie, 2015).
The software defined WAN (SD-WAN)
newcomers for instances the CloudGenix and VeloCloud have got the hard time to
suit within the industry regardless of the support that is offered by the
experienced SD-WAN vendors. The most concern of these experienced SD-WAN
vendors is the increasing of the services than the number of vendors.
Therefore, they sound to focus on the service delivery rather the service
providers. According to such trend the service function chaining will fortunately
take over the current adopted business data centers that seems to work
collaboratively with the network virtualization and multi-tenancy in provision
of the subsequent service towards accomplishing the business needs and
requirements.
Wireless networks
The networks were initially designed
such that it used a dedicated channel for transmission of signal which is a
cable. The wired network gave network engineers headache in management of the
physical cabling and this have given business challenges with the common issue
of physical damaging of the cables. During the time the technologies developed
did support the wired network specifically and this inhibited the growth of
networking industry. The wireless networks got their introduction with the invention
of signal transmission in the air and the approach of networking is taking over
the old wired networks. Businesses and organization are considering less
cabling to reduce the extra expenses as well. The network model is an
influencing factor when t comes to determination of the network functionalities
and the associated good network attributes that business at all time will
desire to possess. Therefore, this wireless network has become ubiquitous to
most businesses, institutions, organizations and even in homes.
The wireless network began a supplement
to the wired network which did play part of the reducing the number of
networking devices and other associated expenses of configuring subsequent
connectors of the devices. At the same time, it came up to improve on the
number of persons that can be able to have the connection to the network as
establishing a new user or link within wireless networks is such simple and
easy. The wireless networks did rely on the microwave technology at most but we
can bear witness what the satellite technology is doing when it comes towards
connecting the global (Bolla, Bruschi, Davoli & Cucchietti, 2011). The
world has become a small village that can get navigated within the shortest
time possible. An enticing thing is the current HD displays that are
accomplished via the satellite technology when it comes to football displays
from Europe and this is common worldwide.
The integration of security in this
wireless network is relatively friendly, and this is amongst the top factors
that are pushing for the business to consider applying the wireless networks.
At the same time, the movement and adoption of wireless networks have seen
improved ease management of the network. Currently the introduction of wireless
routers, data links have ensured that network connection is advanced. This is a
trend that has been influencing when it comes to advancement with wireless
networks. It is evidenced by the move from the Wave 1 to Wave 2 as at 2015.
The mobile networks give another trend as far
as wireless networks are concerned. The mobile phones are being used as
networking devices in the creation of networks through the current technique of
network tethering using the mobile phone. Also, the use ad-hoc network provides
another scenario of network tethering. The standards governing the wireless
networks are changing with the introduction of the LI-FI based transmission
that uses light that is outdoing the wireless local area network (WLAN) that at
most adopts the 802.1 standards.
Conclusion
Communication is critical when it comes
to the success of business and understanding at the level of human living. The
establishment of networks did facilitate the process of communication is
majorly about sharing of resources which are limited. However, the networks
have been entailed with some concerns that must get addressed to make sure the
established function is accomplished. It requires the appropriate management
that will ensure the delivery of the functions accordingly.
The most concern is the security which
is an attribute that has really given network engineers a headache. However,
based on the outlined trends the section is under control accordingly. In the
current networks, we are assured of confidentiality, availability as well as
the integrity of our information. The increase in the number of devices
accessing the global network shows why new technologies are coming up to ensure
the umber is well accommodated. Ideally, all these are brought about by the
wireless networks.
References
Bolla,
R., Bruschi, R., Davoli, F., & Cucchietti, F. (2011). Energy efficiency in
the future internet: a survey of existing approaches and trends in energy-aware
fixed network infrastructures. IEEE Communications Surveys & Tutorials,
13(2), 223-244.
Raicu,
I., & Zeadally, S. (2003, February). Evaluating IPv4 to IPv6 transition
mechanisms. In Telecommunications, 2003. ICT 2003. 10th International
Conference on (Vol. 2, pp. 1091-1098). IEEE.
Sengupta,
S., Kaulgud, V., & Sharma, V. S. (2011, July). Cloud computing security--trends
and research directions. In 2011 IEEE World Congress on Services (pp. 524-531).
IEEE.
Xia,
W., Wen, Y., Foh, C. H., Niyato, D., & Xie, H. (2015). A survey on
software-defined networking. IEEE Communications Surveys & Tutorials,
17(1), 27-51.
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in nursing essay help USA if you need a similar paper you can place your order from custom college papers.
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in nursing essay help USA if you need a similar paper you can place your order from custom college papers.
No comments:
Post a Comment