There is a continuous change happening in Network applications,
protocols, topologies and usage patterns. The Network of the Future (NF) is
going to be outfitted by the modern and advance technologies that give higher
available bandwidth, fast routing, switching and content delivery over advanced
optical, infrared and satellite network. The visions of NF in terms of offered
services are:
·
Support wide spreading access and advanced mobility even in hostile
atmospheres.
·
Provide international access to all closed infrastructures, like
governmental, financial, medical and military networks, maximizing the need for
global authentication and confidentiality frameworks, as well as availability
of networking services and infrastructures.
·
Increase the number of devices connected to netwokls to trillions
by inter-connecting on the IP or access level mobile or embedded things that
monitor user' actions and locations.
·
Support complicated services that get to learn from users'
preferences and multiply the usage of social networks, requiring more advanced
privacy frameworks.
·
increase the amount of digital content which can be accessed by
individuals, supporting the needs for flexible and encrypted techniques for
Digital Rights Management (DRM), and
·
Move to an information- centric paradigm, where composite services
are going to be orchestrated for information that is either published for a
group of authorized subscribers or published in a public domain.
Meanwhile, during the growth of the internet, there is another
growth in malicious activity that has been increased in terms of frequency,
scale, sophistication and impact.
However, the countermeasures of security and privacy have also become
more essential than ever. A lot of effort is directed towards developing
mechanisms that decrease the harm of such threats. But in the same time we find
the current mechanism rely on specific network characteristics that change and
vary through time, not ensuring them to be applicable in NF. The security
mechanisms that are designed for the NF have to operate separately from the
network design and characteristics. In addition to that, the security and
privacy mechanisms are expected to be flexible and adaptive enough to fit
enough in domains where vulnerabilities have been recognized or attacks have
been reported, and scalable enough to increase their countermeasures to multiple
control areas. As a result, measuring security and privacy is of a great
importance to make more flexible decisions and increase the focus of
countermeasures where appropriate.
Vision
The
estimated target date for prototyping and phased deployment of Future Networks
should roughly fall between 2015 and 2020. This estimate is based on two factors: The first one is the status of
the existing and developing technologies that might be employed in the
experimentation and advancement of FNs. The second one is that any actual
development that might happen well beyond that estimate will be too speculative
and outside the mandate of this document.
Any international
multi-service infrastructure contains a number of networks and network
technologies put in various vertical (stacked) and horizontal (peered)
combinations.
The nature of such
combined network implies a mixture of networks at various stages of evolution.
Some current components might be replaced by a new network technology, some may
be optimized by a future technique and about the completely new ones, they may
be added. In addition to that, the
components of network will change and vary dynamically from one telecommunication
instance to another relying on the service being considered, features invoked
and routing choices related.
Various development
and migration strategies may be used to accommodate coming and future network
technologies. Each case of these is to
be examined on its merits and its relation to the role taken by the network
technology with consideration as part of the future global infrastructure.
Usage scenarios and
deployment cases also will need to be taken in consideration when the research
has been completed for the area(s) under consideration , and appropriate
conclusions reached and agreed.
For networks that
will come in the future to be a part of essential social infrastructure, they
should be researched and developed with consideration to the following three
points of view: Network for/of
Individual, Network for/of Society and Network for/ on Earth.
Objectives
“Design goals” should be supported by Future
Networks.
The design goals of Future Network can be
discussed from the four kinds of view: commercial view, social view, and
operation and management view.
6.1 Service View
Firstly from service view, FN will need to provide satisfaction for
an extremely wide range of customer demands. FN should:
·
be programmable network architecture that is easy to
implement any kind of service network. Diverse users actually demanded this
service network. As a result, Future Network forms a network of networks, i.e.
meta-network architecture.
·
To give support to bandwidths ranging from narrow ones to
ultra-wide ones.
·
Support a good wide range of latency to adapt
applications and services characteristics.
·
To provide a place for a huge number of wide variety of terminal
devices.
·
provide apps and services that don't depend on user terminals or
devices.
·
provide high reliability network services.
·
support flexible mobility to guarantee widespread/ pervasive communication
atmosphere.
·
To acquire and get equipped with developed security mechanisms against
DDoS attacks, tapping, impersonation, etc.
·
To have the ability to manage digital assets like digital content
copyrights.
Social View
From the
corner of social view, FN is considered as a new model of future social infrastructure
that gives allows and enables social growth and environmental conservation. FN
should:
·
Support private and/or public social apps such as
collaborations, health care, transportation, and so on.
·
Provide services that take part in saving the
environment.
·
To make its design consider power consumption
incorporating device, system, provisioning, operations, and management aspects
carefully
Commercial View
In Future Network, each participant is
technically guaranteed proper economic returns according to their
participation, thus the tussle is resolved.
Operation and Management View
Regarding Operation and management view,
Future Network should ease complexity of operation and management. FN should:
·
enable flexible migration between different
network services.
·
be able to place both in-service and experimental
technologies and use them properly.
·
be able to support and sustain new technologies.
·
have the capacity to be deployed flexibly.
·
support effective utilization networked ICT resources
depending on the changes in demand.
·
support the automation of network and service
management like self-stabilization and self-management functions etc.
·
have the capacity to provide customized service for
individual customers depending on their context.
·
consider the customer's QoE ( Quality of Experience)
besides QoS.
·
provide several platforms that are easy to be used by
the customers to create new businesses.
·
have the capacity to get accurate real-time information
of network and service resource status and health.
·
give support to simple and flexible knowledge
representation of network and service management information.
·
have the capacity to acquire full, clear, consistent,
connected and filtered management data.
·
give support to statistical intelligent mechanisms of
learning to process massive management information and data.
·
Support easy, strong, reliable, secure and predictable
network and service resource control.
·
support false-positive and negative free fault
detection, diagnosis and network isolation and service resources.
·
support aware management collaboration of
network and service.
Methodology
Results:-
Mobility
·
Future Network has to support localization and
optimization of the signaling and data paths.
·
Future Network also has to enable the network
administrator to have control over signaling and data path.
·
Future network should have the capacity to locate the functional
entities (e.g. mobility management) anywhere in the network (both in the access
network and the mobile core).
·
Future network should have the capacity to provide the discovery
function (network devices and resources) of the connected devices in both
distributed and centralized fashions.
·
Future Networks should have the ability to connect devices that
aren't fully capable of mobility and/or security without degradation of those
features.
Mobility between virtualized networks
·
Future Network should have the capacity to support for the user to
shift from one virtualized network (or LNP) to another.
Self-optimization Network
Then, Future Network
doesn't only want flexibility of physical networks, it also needs flexibilities
of logical networks because many network services are restricted by dependence
of physical networks now. In case Future Networks has both flexibilities,
several network properties will be distributed anywhere, anytime, everybody and
everything to all of this network users (and more). To be aware of such a
property distributions, Future Networks must have a functional partitioning of
network properties user required in logical.
Future Networks
might exceed or overcome the physical limit that includes such as capacity of
optical fiber, electrical devices frequency and so on, by cooperated with
technologies from devices level (
optical and electrical) system level to network architecture level.
• variable
bandwidth and latency technology
• NW
resource cooperation technology
• traffic
centralized/distribution control technology
• electrical/optical
optimal function assignment
• hardware/software
optimal function assignment
• data
format/protocol conversion technology
Conclusion
The significant part about any type of
security is coming to know where the threat comes from.
If you don't know the threat, so how will you protect yourself? So,
it's a fact that being updated with the latest security flaws and
vulnerabilities is a full time job that if you aren't doing, expect intruder to
want to get into your network. Aretha technology is now true and could be placed where the
network and software security industries are leading.
ليست هناك تعليقات:
إرسال تعليق