Friday, December 21, 2018

Networking trends


Introduction
The telecommunication industry has been a critical area within the global since it has plays the vital role of uniting the world regardless of the difference in distance. Communication provides a comprehensive understanding of how resources “information and ideas” can be shared thus distributed globally. The development of the communication process over the decades well highlights the evolution and thus the trends within the telecommunication industry. The introduction of networks got the greatest impact on the communication sector as it got things done simpler than before and the most enticing thing was the internetworking that got the attention of every business and any individual that is informed.
The connection to the global network has increased tremendously, and this creates some sought of issues that must get handled accordingly. The demand for the network has seen the growth in threats of attacks thus the demands for having standards and better techniques of managing the networking as well as the used devices. Thus, the interest is to have the understanding of the trends in the sections of the network security, the current wireless networks, and the software-defined networking.

Network Security
Computer network security has become the area of interest with technological change that has seen challenges to do with network intrusion. Network intrusion was initially considered as a simple task that network engineers could handle. However, it has been found that delivering integrity, availability, and confidentiality within a network has become a total issue. At any given time, the establishment of a network that has no appropriate security measures will mean a challenge in delivering the network functions.
The enhancement of security within networks has been improved such that network engineers are incorporating the security measures from the scratch that is the initial stages of developing the network. The determination of appropriate security measures was a little challenging in the past unlike the current availability of scanning devices that provide recommendation over the vulnerable devices and points that are susceptible to attacks. The current increase in the use of networks has seen the increase in demand for bandwidth, new computing approaches which have introduced change in network security designing and management. It comes about that the network will deliver the given function upon having best security extension measures (Sengupta, Kaulgud & Sharma, 2011).
The security measures were initially being integrated at selected levels within a network. However, the current network security integration has seen the implementation of the security measure at all levels in the so called the in depth approach to controlling network intrusion and attacks. In the initial designs there existed a big communication gap between the vendor of security approach and the network designer hence rendering the network susceptible to attacks. However, the current approaches have seen the introduction of better authentication, non-repudiation and authorization approaches. These approaches have given the power of easily detecting and blocking the malicious threats of SQL injection, Trojans, Viruses, denial of service, sniffing and others. This has been achieved with the use of programs such as the Network Mapper, and Nokto that run within our networking devices and works by scanning the network devices including the servers.
The notable trend that has taken the attention of network analysts and engineer is the protocol trends. The network was laid within the IPv4 protocol that was limited in the number of IP addresses that it could provide to the global. The demand for IP addresses did increase with the technological advancement of developing application that has the capability of connecting to the global network. Therefore, there is the full experience of moving from the IPv4 protocol to the IPv6 protocol that has no limited IP address generation. The IPv6 protocol is characterized by the extension of the IPSec security mechanism at all network levels and this has even boosted the management of the network (Raicu & Zeadally, 2003).
Confidentiality extension within the network is a critical attribute that been improved by the introduction of this powerful protocol IPv6 protocol, the secure socket layer (SSL), intrusion detection systems (IDS) and intelligent firewalls. The mechanism has ensured that the attacks of Denial of Service (DoS), Sniffing and IP spoofing have been well controlled. On the other hand, the integrity attribute has been given the power with the introduction of security mechanisms such as the integration of secure socket layer, PSec, intelligent DS as well as the intrusion detection systems (IDS). Furthermore, network function availability have been guaranteed against the  Systems Boot Record Infectors, Spamming by the adoption of intelligent firewalls, Secure Socket Layer, advanced authorization and  authentication techniques, and suitable Anti-Malware software.

Software-defined networking
Software-defined networking is an approach that has got the network engineers administrators to undertake their roles, duties, and responsibilities on an OpenFlow protocol. They will get confined to eh principles and procedures of managing the network highlighted services by using abstraction approach of the considered lower level functionality. The businesses and organizations are ever aiming at improving the functionality and service delivery of the networks towards meeting the defined objectives. Therefore, software-defined networking is a technique that means a lot to industries and businesses since the approach gives the network engineers and administrators to provide responses promptly so as to meet the ever-changing requirements of the business.
The software-defined networking technique has given the communication industry another face that has given the users of the network guarantee when it comes to technical support. The most enticing thing that has changed over the time is the assurance to the network users of the availability of service delivery at all times that is at the right time and the right place. The software-defined networking has provided the capability of working within a limited space with the negligible experiencing human error in service rather function delivering (Xia, Wen, Foh, Niyato & Xie, 2015).
The software defined WAN (SD-WAN) newcomers for instances the CloudGenix and VeloCloud have got the hard time to suit within the industry regardless of the support that is offered by the experienced SD-WAN vendors. The most concern of these experienced SD-WAN vendors is the increasing of the services than the number of vendors. Therefore, they sound to focus on the service delivery rather the service providers. According to such trend the service function chaining will fortunately take over the current adopted business data centers that seems to work collaboratively with the network virtualization and multi-tenancy in provision of the subsequent service towards accomplishing the business needs and requirements.
Wireless networks
The networks were initially designed such that it used a dedicated channel for transmission of signal which is a cable. The wired network gave network engineers headache in management of the physical cabling and this have given business challenges with the common issue of physical damaging of the cables. During the time the technologies developed did support the wired network specifically and this inhibited the growth of networking industry. The wireless networks got their introduction with the invention of signal transmission in the air and the approach of networking is taking over the old wired networks. Businesses and organization are considering less cabling to reduce the extra expenses as well. The network model is an influencing factor when t comes to determination of the network functionalities and the associated good network attributes that business at all time will desire to possess. Therefore, this wireless network has become ubiquitous to most businesses, institutions, organizations and even in homes.
The wireless network began a supplement to the wired network which did play part of the reducing the number of networking devices and other associated expenses of configuring subsequent connectors of the devices. At the same time, it came up to improve on the number of persons that can be able to have the connection to the network as establishing a new user or link within wireless networks is such simple and easy. The wireless networks did rely on the microwave technology at most but we can bear witness what the satellite technology is doing when it comes towards connecting the global (Bolla, Bruschi, Davoli & Cucchietti, 2011). The world has become a small village that can get navigated within the shortest time possible. An enticing thing is the current HD displays that are accomplished via the satellite technology when it comes to football displays from Europe and this is common worldwide.
The integration of security in this wireless network is relatively friendly, and this is amongst the top factors that are pushing for the business to consider applying the wireless networks. At the same time, the movement and adoption of wireless networks have seen improved ease management of the network. Currently the introduction of wireless routers, data links have ensured that network connection is advanced. This is a trend that has been influencing when it comes to advancement with wireless networks. It is evidenced by the move from the Wave 1 to Wave 2 as at 2015.
 The mobile networks give another trend as far as wireless networks are concerned. The mobile phones are being used as networking devices in the creation of networks through the current technique of network tethering using the mobile phone. Also, the use ad-hoc network provides another scenario of network tethering. The standards governing the wireless networks are changing with the introduction of the LI-FI based transmission that uses light that is outdoing the wireless local area network (WLAN) that at most adopts the 802.1 standards.
Conclusion
Communication is critical when it comes to the success of business and understanding at the level of human living. The establishment of networks did facilitate the process of communication is majorly about sharing of resources which are limited. However, the networks have been entailed with some concerns that must get addressed to make sure the established function is accomplished. It requires the appropriate management that will ensure the delivery of the functions accordingly.
The most concern is the security which is an attribute that has really given network engineers a headache. However, based on the outlined trends the section is under control accordingly. In the current networks, we are assured of confidentiality, availability as well as the integrity of our information. The increase in the number of devices accessing the global network shows why new technologies are coming up to ensure the umber is well accommodated. Ideally, all these are brought about by the wireless networks.
References
Bolla, R., Bruschi, R., Davoli, F., & Cucchietti, F. (2011). Energy efficiency in the future internet: a survey of existing approaches and trends in energy-aware fixed network infrastructures. IEEE Communications Surveys & Tutorials, 13(2), 223-244.
Raicu, I., & Zeadally, S. (2003, February). Evaluating IPv4 to IPv6 transition mechanisms. In Telecommunications, 2003. ICT 2003. 10th International Conference on (Vol. 2, pp. 1091-1098). IEEE.
Sengupta, S., Kaulgud, V., & Sharma, V. S. (2011, July). Cloud computing security--trends and research directions. In 2011 IEEE World Congress on Services (pp. 524-531). IEEE.
Xia, W., Wen, Y., Foh, C. H., Niyato, D., & Xie, H. (2015). A survey on software-defined networking. IEEE Communications Surveys & Tutorials, 17(1), 27-51.


Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in nursing essay help USA if you need a similar paper you can place your order from custom college papers.
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in nursing essay help USA if you need a similar paper you can place your order from custom college papers.

No comments:

Post a Comment

Buy thesis Online for Cheap

We are keen on ensuring that, any time students Buy thesis Online papers from our website, they get good grades that align with their expec...