Identify and research three current trends in computer networking. Each technolo
ID: 3919942 • Letter: I
Question
Identify and research three current trends in computer networking. Each technology must be related to the networking field. The technologies selected must be current, meaning current to the industry within the past three years. · Your report must contain the following sections.
Each section must be a minimum of 4 paragraphs that discuss each trend/technology identified. ·
Technologies that will not be accepted are listed below.
IoT or anything related to IoT Virtualization Software Defined Networking Cloud Computing
The topic selected must be a current technology in the field of networking. This technology must be a networking technology within the last three years. Check with your instructor if you are unsure of the topic.
1. Introduction/Background of Application
2. This report must use proper grammar and be spell-checked.
3. Current Industry Uses
4. Features and Functionality, and Application of each technology.
5. Advantages/Disadvantages of Each Technology
Explanation / Answer
Wireless Datalink for Unmanned Aircraft Systems
Unmanned Aircraft System is the aircraft system which works without any human operator or
pilot onboard. It is controlled by the Ground Controllers. We can call it an ecosystem which
includes aircraft, control station, communications, payload, remote crew of pilot and observer,
The key challenges are Long Distance, High-Speed, and Spectrum.
Application of Wireless Communication with Unmanned Aerial Vehicle
1. Security
Security is the major concern in every field. UAS can be used for civil security, for protection of threats (terrorist attack, crimes), for recording a scene, aerial traffic, etc. Manned aircraft system is much expensive than Unmanned aircraft system and they take a longer time to get ready for engagement while microdrones can be instantly ready for action.
2. Disaster Management
UAS can play a vital role in disaster management. It is used in the detection of disaster and warning. It can work and record the scenes on hazardous conditions and get the estimation of disaster damage also which is quite difficult for manned aircraft. We can do an aerial survey through UAS and collect the data, images and further we can geo-rectify those images with the real time with the help of any GIS Software.
3. Crop Management
UAS be used for crop monitoring and health assessment. It can scan the ground and spray the correct amount of land which improves crop farming. This will increase efficiency with a minimum amount of chemical penetrating into groundwater. In irrigation, it can identify the field that which part is dry or wet by using sensors.
4. Survey
UAS is able to record the scenes and carry cameras to capture highly accurate images. It is very helpful in data collection. It can do aerial surveying and mapping, can hover in one spot, rotate 360 degrees or fly in a grid, can work in complex, irregular or dangerous sites. It can survey any site, can capture the scenes where manned aerial vehicle cannot survey because of life loss.
Advantages
Disadvantages:
4D Networks
When Internet Protocol (IP) was developed decades ago, the global, data-intensive internet was an inconceivable consequence. As a result, IP is plagued with complexities and inefficiencies due to network services being grafted on in order to bring it up to speed with contemporary networks. As a counterweight, the 4D Network research project, hosted at Carnegie Mellon University, aims to replace IP as the basis of computer networking. 4D, in this case, refers to four network planes: decision, dissemination, discovery and data. 4D networking takes a clean-slate approach to network control, and is guided by three principles: Network-level objectives that can be expressed as goals for the network in its entirety; timely and accurate network-wide views of topology, traffic and events; and providing direct control to network operators. If 4D does indeed overtake IP as the go-to networking protocol, it could have massive implications for networks as we know them – but given IP’s track record, we wouldn’t hedge our bets on that happening anytime too soon.
Functionality
Decision plane: The decision plane makes all decisions driving network control, including reachability, load balancing, access control, security, and interface configuration. The decision plane directly configures the data plane based on network-level objectives, such as a reachability matrix, load-balancing goals, survivability requirements, and planned maintenance events.
Dissemination plane: The dissemination plane provides a robust and efficient communication substrate that connects routers/switches with decision elements. The dissemination plane moves management information created by the decision plane to the data plane and state identified by the discovery plane to the decision plane, but does not create state itself.
Discovery plane: The discovery plane is responsible for discovering the physical components in the network and creating logical identifiers to represent them. The discovery plane defines the scope and persistence of the identifiers, and carries out the automatic discovery and management of the relationships between them.
Data plane: The data plane handles individual packets based on the state that is output by the decision plane. This state includes the forwarding table, packet filters, link-scheduling weights, and queue-management parameters, as well as tunnels and network address translation mappings.
Advantages
Disadvantages
Blockchain
The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value.”
Blockchain, at its core, is merely another form of distributed database technology with special properties, such as:
Features
1. Decentralized technology
Decentralized technology enables us to store assets in a network that can be accessed over the Internet. The assets can be anything ranging form a token, a contract, chain-of-evidence documents, or property registry documents. Through decentralized technology, the owner has direct control via their private key, which is directly linked to the asset. The owner can transfer the asset whenever desired and to anyone.
2. Public Lodger
A blockchain is a public ledger that provides information of all the participants and all digital transactions that have ever been executed. A block is the “prevailing” part of a blockchain which is supposed to keep the record of the recent transactions, and once they are completed, it goes into the blockchain. Blocks are added in sequential manner with the next block containing hash of the previous block. A new block is generated as soon as the previous block gets entered in the blockchain database. This technology helps in recording of each transaction and shares it across the network.
3. Authenticity
Every block can be divided into two parts, namely the header and the transaction part. The header includes the previous block’s hash and it references the previous hash it is building upon. It also stores the hash of the current transaction which is meant to be connect the next block when added. The blockchain is distributed and updated with the new block added. Thus in this way other locations can continue to maintain it if any of the copy of blockchain is compromised. This makes the blockchain immutable. By comparing the hash of the data the authenticity of the data can be verified which helps in achieving an independently verifiable system.
4. Mining
The role of the miner is to create the block containing a number of latest transaction, it has to encrypt data by all the computational process and thus provide the proof of work. The miner gets rewarded financially by doing it. The miners compete with each other in order to be the first one to add the recent block on the top of the blockchain. The added block is then verified by other nodes when other blocks are added on top of it.
Advantages
Disadvantages
Network speed/cost: Blockchain networks require Nodes to run. But as many of the networks are new, they lack the number of Nodes to facilitate widespread usage.