Network control, engineering and management, Basic Computer Science

Assignment Help:

Network Control, Engineering and Management

Network control in this sense involves traffic management, and the engineering of the networks to support varying traffic loads. In telephone networks there are a set of engineering rules and traffic models have been developed over the years to optimize  the use of transmission and switching. Some of these rules are not applicable to data networks, and a different set of models. Telephone networks were originally engineered on a static basis such that there was no rearrangement for changing traffic patterns. More modern networks (such as the Internet) are engineered on a more dynamic basis.

Network Management encompasses operating the network as well as administration and maintenance known in short as OAM. A comprehensive architecture (TMN) has been developed for public networks, whereas for the internet and data applications a more basic model is used (SNMP).

Photonic Networks

Current networks involve optical transmission with electrical switching. With the first generation of photonic networks utilize slow switches based on micro-electronic machines (MEMs). These network can manipulate wavelengths, but not individual traffic flows. To manipulate individual traffic flows photonically will require fast, large switches. In this section we examine the advantages and limitations of photonic networks, and look at the technologies required to make them a reality.

Service Architectures

Services in telephone networks were based in the local switches. With the development of Common Channel Signalling systems, the opportunity arose to provide centralized provision of services. In fact for services such as 1-800 number  dialling the service could not easily be provided on a local switch basis but required a centralized database. The concept of centralized services solidified in the Intelligent Network and Advanced Intelligent Netork architectures.

Future Networks

It is clear that for long distance high capacity networks optical fibre is now ubiquitous. In the access there are coaxial cable, copper and wireless. For new networks in developing countries the access will almost certainly be wireless as the cost pf providing a copper-based infrastructure is prohibitive. In the future there will be expansion of the types of wireless access networks to cover both smaller and greater areas. 3rd Generation wireless will be replaced by 4th generation.

However, the structure and profitability of the industry will be more influential on the architecture than the technology. Will there be enough profit in the industry to fuel new types of capabilities, or will the industry degenerate in the same manner as the airline industry to a point where survival is the main question.


Related Discussions:- Network control, engineering and management

Expalin Processes Vs Threads?, In many respect threads operate in the simil...

In many respect threads operate in the similar way as that of processes. A number of the similarity and differences are: Similarities • Similar to processes threads share CPU and o

Control unit of the processor, Control Unit of the processor: The  Con...

Control Unit of the processor: The  Control Unit  of the processor is that unit which controls and coordinates the execution of instructions by the processor. It is responsibl

Computer architecture, Consider a CPU that implements two parallel fetch-ex...

Consider a CPU that implements two parallel fetch-execute pipelines for superscalar processing. Show the performance improvement over scalar pipeline processing and no-pipeline pro

Excell, grades computation

grades computation

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

Trap doors and Logic Bombs, Trap doors:  This is a way of bypassing normal...

Trap doors:  This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impac

Definition of assembler structure, In assembly language code lines have t...

In assembly language code lines have two fractions, the earliest one is the name of the instruction which is to be executed, and the next one are the parameters of the command. For

Programs - programming language, Programs - programming language: Prog...

Programs - programming language: Programs to implement algorithms on the computer must be written in a language that the computer can understand. It is fruitful, therefore, to

Central processing unit (cpu), Central Processing Unit (CPU): The CPU ...

Central Processing Unit (CPU): The CPU is the physical device that controls computer operations. It is considered as the 'brain' of the computer system. The CPU comprises thre

The gigo principle, The GIGO Principle : This is a simple principle with a...

The GIGO Principle : This is a simple principle with a clear message and universal application - Garbage In - Garbage out! Always try and enter any data in the form you want to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd