Network control, engineering and management, Basic Computer Science

Assignment Help:

Network Control, Engineering and Management

Network control in this sense involves traffic management, and the engineering of the networks to support varying traffic loads. In telephone networks there are a set of engineering rules and traffic models have been developed over the years to optimize  the use of transmission and switching. Some of these rules are not applicable to data networks, and a different set of models. Telephone networks were originally engineered on a static basis such that there was no rearrangement for changing traffic patterns. More modern networks (such as the Internet) are engineered on a more dynamic basis.

Network Management encompasses operating the network as well as administration and maintenance known in short as OAM. A comprehensive architecture (TMN) has been developed for public networks, whereas for the internet and data applications a more basic model is used (SNMP).

Photonic Networks

Current networks involve optical transmission with electrical switching. With the first generation of photonic networks utilize slow switches based on micro-electronic machines (MEMs). These network can manipulate wavelengths, but not individual traffic flows. To manipulate individual traffic flows photonically will require fast, large switches. In this section we examine the advantages and limitations of photonic networks, and look at the technologies required to make them a reality.

Service Architectures

Services in telephone networks were based in the local switches. With the development of Common Channel Signalling systems, the opportunity arose to provide centralized provision of services. In fact for services such as 1-800 number  dialling the service could not easily be provided on a local switch basis but required a centralized database. The concept of centralized services solidified in the Intelligent Network and Advanced Intelligent Netork architectures.

Future Networks

It is clear that for long distance high capacity networks optical fibre is now ubiquitous. In the access there are coaxial cable, copper and wireless. For new networks in developing countries the access will almost certainly be wireless as the cost pf providing a copper-based infrastructure is prohibitive. In the future there will be expansion of the types of wireless access networks to cover both smaller and greater areas. 3rd Generation wireless will be replaced by 4th generation.

However, the structure and profitability of the industry will be more influential on the architecture than the technology. Will there be enough profit in the industry to fuel new types of capabilities, or will the industry degenerate in the same manner as the airline industry to a point where survival is the main question.


Related Discussions:- Network control, engineering and management

Time sharing system , Time Sharing System: With the use multiprogrammi...

Time Sharing System: With the use multiprogramming, the batch processing can be quite  efficient. However, for many jobs, it is desirable to provide a mode in which the user i

Loading instructions, They are particular register instructions. They are u...

They are particular register instructions. They are used to load bytes or sequences of bytes onto a register. LODS (LODSB) (LODSW) LAHF LDS LEA LES LODS (LODSB) (LODSW) INSTRUCTION

Definition of procedure, A procedure is a compilation of instructions to wh...

A procedure is a compilation of instructions to which we can express the flow of our program, and once the execution of these instructions is over power is given back to the next l

Immediate addressing, These addressing modes are: With immediate addressing...

These addressing modes are: With immediate addressing, no lookup of data is essentially required. The data is located in the operands of the instruction itself, not in a different

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Bootstrap loader, Bootstrap loader: The critical programs are loaded i...

Bootstrap loader: The critical programs are loaded into memory by the bootstrap loader at start-up time and will remain resident as long as the computer is running. The bootst

Distinguish between the cryptoprovider and the managed class, QUESTION ...

QUESTION (a) Using the Luhn 10 check formula verify whether the following account number is compliant: 49927398716. Show details of your workings (b) Why is it advisable to

Communication networks and local area networks, Communication Networks: ...

Communication Networks: Communication networks are made up of transmission lines, concentrators, switching mechanisms and non-data processing components. Due to increased comp

Introduction to computer, Computer: People call a lot of things, compu...

Computer: People call a lot of things, computers. Some of them are cheap, but can only process numerical information. Such devices would better be described as 'calculators' r

How is python Using Blank Lines and Waiting for the User, A line holds onl...

A line holds only whitespace, probably with a comment, is identified as a blank line, and Python completely avoids it. In an interrelated interpreter session, you need to enter an

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd