Network control, engineering and management, Basic Computer Science

Assignment Help:

Network Control, Engineering and Management

Network control in this sense involves traffic management, and the engineering of the networks to support varying traffic loads. In telephone networks there are a set of engineering rules and traffic models have been developed over the years to optimize  the use of transmission and switching. Some of these rules are not applicable to data networks, and a different set of models. Telephone networks were originally engineered on a static basis such that there was no rearrangement for changing traffic patterns. More modern networks (such as the Internet) are engineered on a more dynamic basis.

Network Management encompasses operating the network as well as administration and maintenance known in short as OAM. A comprehensive architecture (TMN) has been developed for public networks, whereas for the internet and data applications a more basic model is used (SNMP).

Photonic Networks

Current networks involve optical transmission with electrical switching. With the first generation of photonic networks utilize slow switches based on micro-electronic machines (MEMs). These network can manipulate wavelengths, but not individual traffic flows. To manipulate individual traffic flows photonically will require fast, large switches. In this section we examine the advantages and limitations of photonic networks, and look at the technologies required to make them a reality.

Service Architectures

Services in telephone networks were based in the local switches. With the development of Common Channel Signalling systems, the opportunity arose to provide centralized provision of services. In fact for services such as 1-800 number  dialling the service could not easily be provided on a local switch basis but required a centralized database. The concept of centralized services solidified in the Intelligent Network and Advanced Intelligent Netork architectures.

Future Networks

It is clear that for long distance high capacity networks optical fibre is now ubiquitous. In the access there are coaxial cable, copper and wireless. For new networks in developing countries the access will almost certainly be wireless as the cost pf providing a copper-based infrastructure is prohibitive. In the future there will be expansion of the types of wireless access networks to cover both smaller and greater areas. 3rd Generation wireless will be replaced by 4th generation.

However, the structure and profitability of the industry will be more influential on the architecture than the technology. Will there be enough profit in the industry to fuel new types of capabilities, or will the industry degenerate in the same manner as the airline industry to a point where survival is the main question.


Related Discussions:- Network control, engineering and management

Data communications, Data communication as a need developed in the 1960s wi...

Data communication as a need developed in the 1960s with the interconnection of peripheral devices to mainframe computers. Within the immediate vicinity of the mainframe computer t

Computer, identify application software from the list? ms excel linux inter...

identify application software from the list? ms excel linux internet explorer adobe photshop sound card driver window disk manger adobe dream weaver windows file explorer

About the faculty posts, is there any oppurtunity for a mca to teach mcasub...

is there any oppurtunity for a mca to teach mcasubjects online

Differentiate the client–server and peer-to-peer models of d, The client-se...

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Python Strings and Python Lists, Python Strings: Strings in Python are rec...

Python Strings: Strings in Python are recognized as an adjacent set of characters in among quotation marks. Python permits for either pairs of single or double quotes. Subsets of s

Hacking, how can i hack a server

how can i hack a server

Functions, each of the following functions has the form f(x ) = (ax+b) mod ...

each of the following functions has the form f(x ) = (ax+b) mod n. assume that each function has type N base n arrow N base n, so that we can think of f as a cipher for an alphabet

Introduction to Computer and Programming Concept, Classify computer systems...

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

E-mail, E-MAIL: Internet has changed the art of writing letters to ema...

E-MAIL: Internet has changed the art of writing letters to email.  Email is one of the ways on Internet to send messages to another person across the network. E-mail and posta

Pipelining, tellme the types of pipelining

tellme the types of pipelining

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd