Network design and management trends
There have been several major trends in networking that have led to the growth of technological systems as discussed in the paper.
Trends in Security
Security is a major issue of consideration in every organization since it helps to safeguard all the information and data files for the day-to-day operations. There have been several advanced cyber-threats over the last few years with complex malware and other security threats being availed in the market at a low price. There has been an increase in security threats that requires organizations to invest more in installed advanced security infrastructure. The cloud, mobile devices, data analytics, and the Internet of things have changed the way business operate and makes the security functionality challenging to sustain. One major trend is DevOps which involves rapid release, automation, and progressive integration and deployment. It has become a normality in software development, but the constant change of codes, updating features and the addition of new capabilities is likely to introduce bugs and security vulnerabilities. Security professionals are working hard to understand the future security threats, trends, and best practices to ensure that they are not caught unawares. The Information Security Forum identified the biggest security threats as leaks to sensitive data from the Internet of Things devices and government-sponsored cyber attacks. Also termed as necessary is the incorporation of cyber insurance due to large-scale data breaches. Fraudsters have also changed their tactics with various phishing scams across enterprises. Cyber security inertia has been observed in various organizations that remain behind regarding security. Hacked companies still consider innovation other than cyber security and companies are reluctant on data breach preparedness.
Physical security and monitoring trends include the use of UHD video surveillance, IP networking, and SSDs. The development of 4K video surveillance cameras has led to the ultra-high definition for both physical security and monitoring. The cameras offer 24 hours recording, hence necessary to have a large storage capacity. SSDs provide enhanced reliability, ruggedness, and performance making them useful in video surveillance. IP Networking is replacing CCTV surveillance due to its benefits of shifting from analog to IP to add on security surveillance. The usage and design of IP surveillance systems provide a dedicated power source for remote cameras and devices using power-over-Ethernet (PoE) (Tari, Premarathne, Bertok & Khalil, 2015).
Figure 1: UHD security system
Retrieved from https://www.electronichouse.com/home-security/swann-promises-4k-resolution-with-new-uhd-security-system/
Trends in Wireless Networks
Many firms are seeking for ways to incorporate wireless products in the everyday tasks. Transportation companies and small cars and trucks are using GPS-enabled cell phones to track the movement of cars. The users log onto their computers and check the location of the vehicles instantly. Other wireless applications allow people to gain access to company database anywhere and regulate the inventory while away.
Convergence is a trend in wireless networks that involves the use of various technologies to deliver required capacity and coverage. It can be used to provide in-building wireless network, addressing the dead spots, offloading the capacity from the major networks, and reducing the network density in the high traffic areas. The significant challenge for the business environment is doing more with less. There are simple solutions created by combining the best elements of the wireless technologies mentioned. Convergence helps to have high capacity and flexible coverage of DAS without interference. The method is effective in routing traffic where needed and ensures optimal quality of service. Licensed spectrum is a top priority for mobile operators seeking to deliver quality services. However, the use of unlicensed spectrum has become common in enhancing the mobile experience and providing operational cost savings. Convergence solutions enable the licensed and unlicensed spectrum to work together for seamless operation of the 2G, 3G, 4G, 5G, and Wi-Fi services. Other IP-based solutions can be integrated including access points and security cameras (Stapleton, 2016).
RAN virtualization is also a trend in wireless networks used by mobile operators in optimizing the use of spectrum. RAN virtualization seeks to simplify the huge computing tasks like complex wireless network and optimizing the mobile operator’s spectrum. The method provides the benefit of using the existing hardware and changing the wireless ecosystem to the cloud or data center. The digital and software-reconfigurable platform allows mobile operators to migrate to a software-defined virtualized network (Tseliou, Adelantado & Verikoukis, 2016).
Network management tools
The major trend in networking in the recent past is network deployment and support infrastructure to allow easy control, support, and device management. The recent trend involves the implementation of the standardized management hardware and software devices that control all the network appliances. Vendors like IBM and HP ought to control systems with the characteristics of being modular, scalable, and reliable to facilitate communication with other networked devices. The Internet of Things (IOT) allows the access to various types of hardware interfaces through PCI compliance standards, multimedia systems, and content for real-time communications. IOT technologies help to configure security features and also the automatic management of communication devices (Kraijak & Tuwanut, 2015). The type of technology also provides effective and reliable perimeter security control through automated stateful packet inspection through firewall configurations. Other useful uses include controlling Wi-Fi services that led to the incorporation of Bring Your Own Device (BYOD) technology that enabled employees to coordinate business activities at any location.
Kraijak, S., & Tuwanut, P. (2015, October). A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends: In Communication Technology (ICCT), 2015 IEEE 16th International Conference on (pp. 26-31) IEEE
Stapleton S. (2016) Future trends of wireless Networks. Web.
Tari, Z., Yi, X., Premarathne, U. S., Bertok, P., & Khalil, I. (2015). Security and Privacy in Cloud Computing: Vision, Trends, and Challenges. IEEE Cloud Computing, 2(2), 30-38
Tseliou, G., Adelantado, F., & Verikoukis, C. (2016). Scalable RAN Virtualization in Multitenant LTE-Heterogeneous Networks: IEEE Transactions on Vehicular Technology, 65(8), 6651-6664