Northcentral University**We aren't endorsed by this school
Course
TIM 7010
Subject
Information Systems
Date
Dec 22, 2024
Pages
6
Uploaded by ProfessorFerret3008
Your Name (Assignment 2) 1Module 1 Assignment 2Your NameProfessor: 27 October 2024
Your Name (Assignment 2) 2In today’s day and age there are many different types of networks that are utilized. These different types of networks are Wide Area Networks (WAN), Local Area Networks (LAN), Personal Area Networks (PAN), Metropolitan Area Networks (MAN), Cellular Networks, Data Center Networks, Cloud Networks, Virtual Private Networks (VPN), and Internet of Things (IoT) Networks. Wide Area Networks (WAN) are utilized for linking local area networks over different areas and distances which helps in the ability for communication between large distances. Some of the most common protocols for WANs are Internet Protocol (IP) and Multiprotocol Label Switching (MPLS). Internet Protocol (IP) allows for easier data exchanges utilizing unique addresses of devices via the internet. Multiprotocol Label Switching (MPLS) is utilized to improve performance with directing the path of data across networks and it manages the traffic through the network. (Goss, 2023) Local Area Networks (LAN) is utilized to connect devices in locations such as offices, schools, and homes. Common protocols for LANs are Wi-Fi (IEEE 802.11) which allows for mobile devices without the utilization of cables and Ethernet (IEEE 802.3) is utilized for high speed wired connections with the network. (Goss, 2023) Personal AreaNetworks (PAN) are utilized for personal device connection within a close proximity to the access point and provide a seamless connection from personal devices and IoT applications. One protocols for PANs is Zigbee which utilized short range networks that are energy efficient which are utilized in IoT applications. Another protocol for PANs is Bluetooth which is a short-range connection which allows for communication from one device to another. (Gratton, 2013) Metropolitan Area Networks (MAN) is the gap between LAN and WAN throughout cities with user connectivity and is utilized by governments, corporations, and universities. One Protocol forMAN is SONET/SDH which is a protocol that is often utilized in metropolitan areas for
Your Name (Assignment 2) 3telecommunication. Another protocol for MAN is Asynchronous Transfer Mode (ATM) which gives reliable high speed data transfer and is utilized by ISPs in city wire services. (Network protocols handbook2007) Cellular Networks are for mobile connectivity with cellular towers. Cellular networks have the protocols of 4G LTE and 5G which has different functions. 4G LTE provides high speed networks and 5G provides ultra-high-speed networks which provides support for a massive number of IoT devices. (Dahlman et al., 2014) Data Center Networks provide support for different interconnection devices such as storage, network resources within data centers, and servers. Data Center Networks are utilized to support data transfers in large volumes that is scalable and highly reliable. Some of the protocols for Data Center Networks is Ethernet and Fiber Channel. Ethernet links storage, virtual machines, and servers to provide flexibility and ease of management. Fiber Channel protocol gives high speed connection to be utilized for storage area networks (SANs) for data centers. Cloud Networks are utilized for processing, data storage, networking at a scalable infrastructure. Cloud networks provide less infrastructure cost, flexibility, and scalability. There are two common protocols for cloud networks which are HTTP/HTTPS and VXLAN (Virtual Extensible LAN). HTTP/HTTPS provides secure data transfers and are widely used in web-based cloud services. VXLAN (VirtualExtensible LAN) is utilized to encapsulate traffic and to scaling of cloud data centers. (Lee, 2014) Virtual Private Networks (VPN) is utilized to secure the connection with public networks and provides better data privacy and remote working security. Two protocols for VPN are SSL/TLS and IPsec. SSL/TLS provides security for data transfers utilizing web-based VPNs and IPsec is utilized to secure IP communication and encryption. (Rao & Nayak) Internet of Things (IoT) Networks provides real-time data exchanges and automation utilizing devices, sensors, andmachines. Protocols for IoT are LoRaWAN and MQTT (Message Queuing Telemetry Transport).
Your Name (Assignment 2) 4LoRaWAN provides long-range communication for IoT devices which are utilized in agriculture and smart cities and MQTT is utilized for IoT devices that are remote and limited bandwidth. (Goss, 2023)Currently there are a few challenges with networks which are latency and performance, security and privacy, scalability and bandwidth demand, interoperability and flexibility, energy efficiency and sustainability, and finally reliability and uptime. The challenge with latency and performance is that if there is a high latency it will cause an issue with performance with application such as IoT, gaming, and real-time communication. To fix challenges with latency and performance are Network Function Virtualization (NFV) which will allow reduction in dependency on hardware that is physical, and Edge Computing helps to reduce latency by moving the data closer to the main source. Security and privacy are common due to the expansion of networks becoming vulnerable to cyber threats. Some of the solutions to fix security and privacy are AI-Powered Threat Detection which does real time identification and responses to activity that seems suspicious, Encryption and Multi-Factor Authentication (MFA) is used a lot of the times by remote workers to increase data access points, and finally Zero Trust Architecture which provides authenticate and authorization of every request. (Chowdary, 2024) Scalability and bandwidth demand challenges are the volume of data created by devices and increased network need for scale. Solutions for the scalability and bandwidth challenge are 5G and Wi-Fi6 which provides higher connection speed, reducing latency, and enhancing data and Software-Defined Networking (SDN) allows for rapid adjustment of bandwidth and connectivityto match demand. Interoperability and flexibility challenge is complexity of legacy systems and integrating different network technologies. Solutions for interoperability and flexibility are cloudnetworking which provides resource sharing across geographic locations and platforms, and it
Your Name (Assignment 2) 5increases adaptability. And another solution was open standards and APIs which provides flexibility and support with different devices and platforms. Energy efficiency and sustainability challenge is that there is demands of network which utilizes more energy and this can be unsustainable and costly. Solutions for energy efficiency and sustainability are AI and machine learning optimization which verifies and shut down resources that are utilizing energy and GreenNetworking Practices which optimizes power utilization. Reliability and uptime challenge is that downtime can be disrupted and cause excessive cost and loss of productivity. Solutions for reliability and uptime are automated network monitoring and self-healing protocols which detects and resolves network issues prior to them affecting performance and then there is redundant systems and load balancing as a solution which maintains uptime utilizing traffic redistribution to prevent overload and equipment failure. (Rao & Nayak) In conclusion, the networks and protocols provide for effective contribution in present-day data networks. The reason this is the case is because the need to make sure that data networks stay operational and are cost effective for all involved. If we leave issues for networks unsolved it not only causes issues with security and privacy but also it can become excessive in cost for the users and providers of networks. The contributions that are given with the network protocols are that networks will have less issues with latency, are more cost effective, and balancing of high performance.
Your Name (Assignment 2) 6ReferencesChowdary, V. (2024). Internet of things in modern computing: Theory and applications. CRC Press. CSDL: IEEE Computer Society. CSDL | IEEE Computer Society. (n.d.). Dahlman, E., Parkvall, S., & Sköld, J. (2014). 4G LTE. Academic Press. Goss, M. (2023, May 16). 12 common network protocols and their functions explained: TechTarget. Networking. Gratton, D. A. (2013). The Handbook of Personal Area Networking Technologies and protocols. Cambridge University Press. Lee, G. (2014). Cloud networking: Understanding cloud-based data center networks. Elsevier. Network protocols handbook. (2007). . Javvin Technologies, Inc. Rao, U. H., & Nayak, U. (n.d.). The infosec handbook. SpringerLink.