Network design and management trends

Network design and management trends


Network design and management trends

Institutional affiliation
In the world of network design and management, activities such as the utilization of a
broad range of functions such as the methods, activities, and procedures for the administration of
operation of the computer network systems. This means that network design and management is
focused on the reliability, efficiency, and capabilities of data transfer channels. This subject is
focused on network operation, maintenance, and administration and networking provision. For
that reason, all these elements of network design and the management trends focus of smooth
functioning of the network resources and the configuration of the elements to support the
features. Some of the trends over the past years that are discussed in this paper include
virtualization, software defined networking, and security.

Assessment of risks in organizations information systems, the information technology
security professionals go through new threats every day as years pass by. In security, threats are
constantly changing. This means that there should be the use of new solutions that help with
dealing with this. Over the past two years, factors such as world politics have been the main
determinant of the intensity and nature of network security in the public and private sectors. In
this case, it leads to the development of certain trends in security (Huang, 2015).
Some of the general trends include the malware mainstream. Main stores such as iOS
and Apple have been a great victim to malware where the apple app developers were tricked into
incorporating their codes into their application package which lead to infecting the system under
wraps through a clever cloak under the Apple code. This trend has been quite malicious, and as
more apps are developed into the market, iOS is the main target for hackers.

Another trend in the year 2015 is increased fines and change in data protection
legislation changes. Under the European Union’s data protection rules, the European Union
approved the General Data Protection Regulation. This was a huge step forward to protect the
residents of the EU. This is the provision of a dependable set of regulations across borders. This
means that the future will be faced with several penalties if the data is not secured in compliance
with the regulations as it would have unavoidable impacts on the business entity about how they
deal with security (Huang, 2015).
Another general trend is the Ransom ware where there have been a couple of high
profile incidents that occurred within that year. It is a more visible and stronger system as
compared to spams or malware. This is because malware has the potential to take down small
and medium businesses if they are not taken care of, regarding payment. Small and medium
businesses tend to turn to the best approach to security investments as they remain weak spots for
attacks from hackers as they would find security gaps (Stallings, 2017).
Some of the trends within the cyber and network consolidation subset of security include
employee education and social engineering. This is one of the best ways to deal with
prevention of breaches as hackers tend to grow more sophisticated and clever in their attacks.
This trend means that the business entities should focus on social engineering such that
employers need to educate the staff members. This is to make them more security savvy through
the smart use of technology. Use of exploit kits by cyber criminals has become quite the trend
over the past year. Some poorly secured websites are frequently attacked through exploit kits.
This is one of the major problems cyber security has faced. This involves the use of the same
malware kits by the hackers repeatedly. They have become stock tools of the trade used by
criminals to attack the users with malware of their choice (Stallings, 2017).
Software defined networking
This is known as the technological approach to networking in computers that enable
administrators to initialize, change, control and manage the network behavior through open
interfaces programmatically. It is associated with OpenFlow protocol after its emergence in
2011. This is therefore accompanied with trends that have surfaced over the years based on
software defined networking. The ability of new environments is managed by the software
defined applications and infrastructure as using hard codes, and predefined networks can be
hectic. This means that IT needs to build dynamic relationships and the SDA’s come in at this
point. The trends from the past two years will enable better understanding on this matter.
Software defined networking is slowly but surely making its way into the enterprise.
Some of the general trends include the software-defined WAN where WAN operations are
improved. A couple of SDN products based on WAN were common in the past year as they were
made to make management less complicated and more cost efficient. Network automation is
another trend that requires a great shift in networking thinking. This means that organizations
have to move carefully and cautiously on the automation regardless of the year’s experience in
virtualization of the computer resources (Morreale & Anderson, 2016).
Open networking and the SDN are in this together as they are driven by the demand for
more efficiency and flexibility. Thus this has led to traditional networking equipment’s using the
architectural features to make it a top-notch enterprise. This trend has been greatly adapted by
social networks such as Facebook where it provides the flexibility and scalability needed for
functioning. Facebook, for instance, has resources to build their networking gear and other
companies are encouraged to follow this lead (Azodolmolky, 2015).
Some of the trends within the network consolidation subset of software-defined
networking include the network functions virtualization which has gained momentum and
utilization in the service provider industry. This aspect is aimed to make networks more efficient
and agile by replacing the physical network hardware with virtual systems. In software defined
networking, Internet Protocol version 6 (IPv6), is another trend that has been evolving for a
while now. Being the most recent version of internet protocol, it is a trend that involves the
minimization of packet header processing by routers (Morreale & Anderson, 2016).
In this case, virtualization has become one of the most influential trends in the IT industry
as more institutions depend on it for the benefits that come with it at every level of the business
operations. Throughout the world, firms of every nature and purpose are taking the liking
towards the virtual aspect, hybrid and cloud-based systems that would reduce cost as they
increase profit, market share, IT management and improvement of the business processes.
There have been certain changes in the area which started with the incorporation of
vitalization in monitoring in a way that helps in the storage of resources, both internally and
externally. This is to improve application and service provisioning and network uptime. This has
therefore been one of the major areas of focus in within the recent years as many companies tend
to completely move towards supporting their computing and server needs in the cloud instead of
the physical resources (Comparison between Virtualization and Cloud Computing, 2016).
This trend could be moving forward in the future and gaining common ground due to
reasons such as operating on cheap commodity processors. Virtualization was limited to the
expensive mainframes, until recently when things changed. There have been new hypervisors
which run on the current existing of up to times 86 commodity processors. They have opened up
virtualization capabilities to larger audiences from all over (Mukhedkar, Vettathu & Chirammal,
Another reason would be the improvements in technology. The major consideration of
vitalization technology is for the reduction of dependency on physical devices. This is relevant as
there are cheaper and larger servers which are available with no boundaries. Consolidation of
servers to less physical resources allows the company to keep data in the main centers organized
to minimize hardware costs (Mukhedkar, Vettathu & Chirammal, 2016).Impact on energy
utilization through the trend of green computing is quite reasonable and the processors become
more powerful as more energy is needed for them to run. The consolidation of servers and server
virtualization leads to a reduction in energy consumption as they minimize the hardware being
used in the data center
Some of the trends within the server consolidation subset of virtualization include the
reduction of physical machines in the network room. This is the most beneficial result of
server virtualization. Through the utilization of services such as Amazon, older companies, and
new ones host their computing and servers virtually in the cloud. Positive infiltration of the
consumer market is another trend of virtualization that helps in the download of a softwareonly
cell phone for use on personal devices as it becomes easier to deploy and use. Last but not
least, hosting and maintenance costs are reduced. This is bound to continue through to the
future as it has become a fair common place for development within the network.
The current Google trends include the end of privacy, 3D printing regarding virtual
manufacturing, body-area networking, and computing. The sources of these common trends
include industry analytic such as Gartner, venture capital investments, Google searches by
people and activities in technical industry. The Google trends are known as an easy method to
find the most common searched subject all over the world, but it differs. For instance, on the
subject of virtualization on servers, network, and storage, the world learns on server
virtualization. The figure from Google trend that best represents virtualization, according to the
most searched subjects, is the Game of Thrones which relates to the aspect of using virtual
reality, such as in the dragon scenes, to create scenes and aspects of the film to make the film the
Azodolmolky, S. (2015). Software defined networking with OpenFlow. Birmingham, UK: Packt
Comparison between Virtualization and Cloud Computing. (2016). International Journal Of
Science And Research (IJSR), 5(6), 195-199.
Huang, S. (2015). Network security. [Place of publication not identified]: Springer.
Morreale, P., & Anderson, J. (2016). Software defined networking.
Mukhedkar, P., Vettathu, A., & Chirammal, H. (2016). Mastering KVM Virtualization.
Birmingham: Packt Publishing, Limited.
Stallings, W. (2017). Cryptography and network security. Boston: Pearson.


There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.