Evolving Networking Technologies: Developments and Future Directions

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

EVOLVING NETWORKING TECHNOLOGIES

This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today.

In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.

The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.

The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:

  • Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.
  • Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.
  • Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today’s vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.

Audience

This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.

Author(s): Shaurya Gupta, Kanta Prasad Sharma, Ashish Sharma, Dac-Nhuong Le
Publisher: Wiley-Scrivener
Year: 2023

Language: English
Pages: 267
City: Beverly

Cover
Title Page
Copyright Page
Contents
List of Figures
List of Tables
Foreword
Preface
Acknowledgments
Acronyms
Chapter 1 5G Technologies, Architecture and Protocols
1.1 Evolution of Wireless Technologies
1.2 5G Cellular Network Architecture
1.2.1 5G E2E Network Architecture
1.2.2 Network Slicing Architecture
1.2.3 NFV Management and Orchestration
1.2.4 NGMN Envisioned 5G Design
1.3 5G Energy Efficiency
1.3.1 Full Duplex
1.3.2 High Network Data Rate
1.3.3 Dense Small Cell Deployment
1.3.4 Massive MIMO Antennas
1.4 Security in 5G
1.5 5G Applications
1.5.1 Rapid Data Transmission
1.5.2 5G Flexibility for Smart Mobility
1.5.3 5G in Smart Cities
1.5.4 5G Augmented Reality
1.6 Conclusion
References
Chapter 2 Scope and Challenges of IoT and Blockchain Integration
2.1 Introduction
2.2 Literature Review
2.3 Internet of Things and Its Centralized System
2.3.1 Application Layer
2.3.2 Network Layer
2.3.3 Device Layer
2.4 Blockchain Technology
2.4.1 Characteristics of Blockchain
2.4.2 Working Mechanisms of Blockchain
2.4.3 Example of Blockchain Transactions
2.4.4 Need for Blockchain Technology
2.5 Integration of Blockchain and IoT Technology
2.5.1 Interactions of IoT and Blockchain Integrations
2.5.2 Blockchain Platforms for IoT
2.5.3 Advantages of Integrating IoT with Blockchain
2.5.4 Challenges of Blockchain and IoT Integration
2.5.5 Applications of IoT-Blockchain Integration
2.6 Conclusion
References
Chapter 3 Data Communication and Information Exchange in Distributed IoT Environment
3.1 Introduction
3.2 IoT Technologies and Their Uses
3.2.1 How WSN Works
3.2.2 Communication with RIFD-Enabled Devices
3.2.3 WWW - Things on the Web
3.3 Centralized vs. Distributed Approach
3.3.1 Centralized System and Its Physiognomies
3.3.2 Advantages
3.3.3 Disadvantages of Centralized System
3.4 Distributed System Architecture
3.4.1 Advantages of Distributed System Architecture
3.4.2 Drawbacks of Distributed System Architecture
3.5 Data Communication Taking Place in Distributed IoT Environment
3.5.1 Internet of Things (IoT) Protocol
3.5.2 Constrained Application Protocol (CoAP)
3.5.3 Message Queuing Telemetry Transport (MQTT)
3.5.4 Wi-Fi
3.5.5 Zigbee
3.5.6 Extensible Messaging and Presence Protocol (XMPP)
3.5.7 Data Distribution Service (DDS)
3.5.8 Advanced Message Queuing Protocol (AMQP)
3.5.9 Smart Home and IoT Applications: An Example
3.5.10 IoT Services, Machines and Applications
3.5.11 Sensor-Based IoT Services
3.5.12 Application in IoT Environment
3.5.13 Future of IoT in a COVID-19 Pandemic
3.6 Conclusion
References
Chapter 4 Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction
4.1 Introduction
4.2 Cloud-Based Solutions
4.2.1 Information and Communications Technology
4.2.2 Artificial Intelligence and Machine Learning
4.2.3 Data Analytics and Business Intelligence
4.3 Impact of Industry 4.0 in the Cloud Computing Industry
4.3.1 Agriculture and Forestry
4.3.2 Entertainment, Media, and Hospitality
4.3.3 Robotics and Automation, Manufacturing and Maintenance
4.4 Significance and Impact of Cloud in the Pandemic Outbreak
4.5 Conclusion and Future Directions
References
Chapter 5 Network Security in Evolving Networking Technologies: Developments and Future Directions
5.1 Introduction
5.2 Background on Attacks, Security Services and Challenges
5.2.1 Types of Attacks Possible on Network
5.2.2 Security Services
5.2.3 Challenges
5.3 Evolution of Network Security Strategies
5.4 Different Evolving Security Approaches
5.4.1 Conventional Approaches
5.4.2 Confidentiality Approaches
5.4.3 Privacy Approaches
5.4.4 Availability Approaches
5.4.5 Modern Approaches
5.5 Discussion
5.6 Conclusion
References
Chapter 6 The State of CDNs Today and What AI-Assisted CDN Means for the Future
6.1 Introduction
6.2 CDN and Its Challenges
6.2.1 Replica Server Placement
6.2.2 Content Replication
6.2.3 Request Routing
6.2.4 Load Balancing
6.3 Importance of AI in CDN
6.4 Pandemic and CDN
6.5 Security Threats in CDN
6.6 Conclusion
References
Chapter 7 Challenges and Opportunities in Smart City Network Management Through Blockchain and Cloud Computing
7.1 Introduction
7.2 Literature Review
7.2.1 Smart City and Network Management
7.2.2 Blockchain and Network
7.3 Blockchain and Smart City
7.3.1 Smart Healthcare
7.3.2 Smart E-Voting
7.3.3 Smart Logistics and Supply Chains
7.4 Cloud Computing and Challenges
7.4.1 Cloud Computing
7.5 Research Methodology
7.6 Conclusion
References
Chapter 8 Role of IoT in Smart Homes and Offices
8.1 Introduction
8.2 Smart Building Constituents
8.3 Concept of Smart Office Service Devices
8.4 IoT in Smart Homes and Offices
8.4.1 Smart Environment Models
8.4.2 IoT Control Systems for Smart Home Devices
8.4.3 Prevailing Designs in Smart Homes
8.4.4 Smart Home Constituents
8.4.5 Cloud Topological Structure
8.4.6 Smart Home-Based Cloud Architectural Design
8.5 Future Research Directions and Limitations of Smart Home-Based Technology
8.6 Conclusion
References
Chapter 9 Role of IoT in the Prevention of COVID-19
9.1 Introduction
9.2 A Modern Era Problem
9.2.1 Current Risk
9.2.2 Awareness by Social Media
9.2.3 Review of Current Solutions
9.2.4 Current Treatment
9.3 Technology
9.3.1 Touchless User Interface
9.3.2 IR Sensor Working Principle
9.4 IoT Sensors and Board
9.4.1 Arduino UNO Board
9.4.2 Arduino USB Cable
9.4.3 Pulse Rate Sensor
9.4.4 IR Sensor
9.4.5 Temperature Sensors
9.4.6 Proximity Sensors
9.4.7 Pressure Sensors
9.4.8 LCD Display
9.4.9 Relay
9.4.10 Power Supply
9.4.11 Jumping Wires
9.5 Use of IoT in COVID-19 Prevention
9.6 Conclusion
References
Chapter 10 Role of Satellites in Agriculture
10.1 Introduction
10.2 Processing Satellite Images
10.3 Product Levels of Satellite Remote Sensing Data
10.3.1 A Brief Discussion and Review of Analysis Techniques
10.3.2 Machine Learning
10.3.3 Deep Learning
10.4 Future Challenges
10.5 Conclusion
References
Chapter 11 Search Engine Evaluation Methodology
11.1 Introduction
11.2 Performance Evaluation Forum
11.2.1 Text Retrieval Conference
11.2.2 Text Retrieval Conference Tracks
11.3 Search Engine Evaluation Parameters
11.3.1 Precision
11.3.2 Recall
11.3.3 Problems with Precision and Recall
11.3.4 Discounted Cumulative Gain
11.3.5 Normalized DCG
11.3.6 Click-Through
11.3.7 Eye Tracking
11.3.8 Coverage
11.3.9 Response Time
11.4 Factors Affecting Search Engines
11.4.1 Evaluation
11.4.2 Query Formulation
11.4.3 User Feedback to a Web Page
11.4.4 W3 Rules
11.4.5 Web Developers’ Fake Techniques
11.5 Conclusion
References
Chapter 12 Synthesis and Analysis of Digital IIR Filters for Denoising ECG Signal on FPGA
12.1 Introduction
12.2 Literature Survey
12.3 Methods and Materials
12.3.1 Conversion of MATLAB Code into Verilog HDL
12.3.2 Synthesis of Digital Filters on FPGA
12.4 Results and Discussion
12.4.1 Butterworth Filter
12.4.2 Chebyshev-I Filter
12.4.3 Chebyshev-II Filter
12.4.4 Elliptic Filter
12.5 Conclusion and Future Scope
References
Chapter 13 Neural Networks and Their Applications
13.1 Introduction
13.2 Main Work of Neuron
13.3 Comparison Between Artificial Neural Network (ANN) and Biological Neural Network (BNN)
13.4 How Artificial Neural Network Works
13.4.1 Processing of ANN Building Blocks
13.4.2 Neural Network Learning Rules
13.5 Neural Networks and Their Applications
13.5.1 Image Processing and Character Recognition
13.5.2 Business Forecasting
13.5.3 Financial Prediction
13.5.4 Additional Neural Network Uses in the Economic World
13.5.5 The Traveling Salesman Problem
13.5.6 Medicine
13.5.7 Electronic Nose
13.5.8 Security
13.5.9 Loans and Credit Cards
13.5.10 Other Applications of Neural Networks
13.6 Conclusion and Future Scope
References
Editors
EULA