A Comprehensive Report on Current and Emerging Trends in Networking

Verified

Added on  2023/06/10

|14
|4996
|175
Report
AI Summary
This report provides an overview of current trends in networking, focusing on 5G technology, cloud computing services, and Bluetooth applications in smart homes. It discusses the capabilities and challenges of 5G, including its potential economic impact and technical limitations, alongside the advantages and disadvantages of cloud computing, such as data security concerns and accessibility. The report also examines how Bluetooth technology is utilized in smart homes for various applications like lighting and temperature control, highlighting its role in creating wireless communication networks. Additionally, the report touches upon the importance of securing enterprise networks and addresses data privacy concerns arising from digitalization, offering a comprehensive look at the evolving landscape of modern networking technologies. Desklib provides access to this and many other solved assignments for students.
Document Page
CURRENT TRENDS IN
NETWORKING
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY...................................................................................................................................4
CONCLUSION..............................................................................................................................10
REFERENCES................................................................................................................................1
Document Page
INTRODUCTION
Networking refers to the process of exchanging the information, data or the ideas with the
variety of the people in order to accomplish the professional or personal goals in effective as well
as efficient manner. The present report is based on the advancement in technology and internet.
The report will determine the emerging trends that includes 5G network along with the capability
and the challenges. Apart from that the report will shade a light on the cloud technology with
the pros and cons of adopting the cloud technology. Moreover the study will discuss the impact
of current and emerging short range communication technology in the particular area. The aim of
the report is to determine the current rend of the networking. In context to that the study will
compare two technique and mechanism which is utilized for securing the enterprise network.
Lastly the study examine the data privacy concern that is arises because of digitalization existing
system.
MAIN BODY
Emerging trends in wireless technology (5G technology)
The new emerging trends in wireless technology keep bringing innovation and creativity in the
emerging world. The new trend that is 5G is continuously improving the performance as the
speed of the network also increased in an appropriate manner. Basically the 5G is the most
trending topic among the people as it is a 5th generation network or the technology standardized
which is introduce for the youngster or the multinational organisation. The 5G network offer the
fastest download speed to the people and higher the connectivity (Sharma, Chehri, and Fortier,
2021). It is emerging trend in the world of wireless technology which keep connected the people
with each other even who belongs to different areas or the boundaries. The 5G is the future
generation process which is already laughed in various areas after 4G network. Basically it is
update of the network which boost the data volume and enhance the range of application. The
aim of bring the 5G networks is to bring the advancement in connectivity.
It deliver assistance in providing the fast network services, high speed internet facilities due to
that the individual person able to access the internet network anywhere in appropriate manner.
The emerging trend in wireless technology is quite different form the previous wireless networks
as the more values and the feature are updated in the network. The innovative features include
interconnecting peoples, controlling devices, machines as well as objectives. It deliver
assistance in providing the better experiences to the potential customers or users and encourage
Document Page
them to connect with the world. The 5G is more reliable as well as massive network capability
due to that the user are experience new services and development. Along with that it is more
secure as compare to the other networks as it contribute in the speedy programmes. Moreover it
will enhance the economic growth of the various countries or the deliver positive impact on the
economic growth of the world. another benefit the people obtain from the utilization is that they
are able to obtain more job roles and responsibility as it will increase the employability rate.
Another merit of being in trend is that it deliver assistance in bringing all the network at one
place or platform in an appropriate manner. in the modern era everyone is depending on the
technology so it is important to have the technology which is fast and speedy to perform better
and able to dela with the forthcoming challenges. it is easy to mange and operate as compare to
other wireless technology. It provide broadcasting data which is in Gigabyte that support approx.
60000 connection. Along with that it has some disadvantages too which includes battery drain or
heat (Sun, Ma and Tang, 2018). During the utilization of the 5G many people face the issue of
huge battery sewer as it required better and superior powers of phone. Along with that the
because of consumption the phone are to hot to touch or use some time which least to major
issue or short circuit electric issues which also harm the human or living body. For the
installation of the 5G network the requirement of well skilled and proper equipment ore on the
priority and the maintenance of the network is much mostly as per the other generation network.
Increment in demand of the 5G phone the price of smartphone also increased which affect the
affordability cycle of the individual person. It is not fully operate all over the world as it is under
development. During the utilization of the emerging network many of the users face various
challenges or the issues associated with the network which consume time in the process of
resolution. Beside that in the forthcoming time the claimed speed seems like difficult to
accomplish as the technical support is not adequate.
Many of the digital users are stuck with their old phone and didn’t willing to buy new phones as
the prices of the product is keep increasing and affecting the household income of the individual
person (Hui, 2018). The availability of the 5G network is low which means it is available in the
specific areas only. It reduce the life of the mobile phones and create many battery problems.
Along with that it also arise the issue of cybersecurity as the 5G has How power to attract the
data rapidly. Due to that many companies is not able to protect their information in an
appropriate manner. The process of implementing the network is extremely costly . The people
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
are facing some sort of health issues as it consist of high radiation power which is hazardous for
the environment or the living things . Beside this it has many challenges as it has higher
frequency which is easily targeted and trackable. The organization need to implement or modify
the infrastructure as it required innovation in the smartphone or the accessories. Basically it is
for the better connectivity and better world (Samanta and Williamson, 2021).
2)Cloud computing services in the past decade years
The cloud computing is the delivering the services of computer including the databases,
networking, software, storage, servers and intelligence as well as helps in change the business
needs and low the operation costs over the internet to offer the flexible, faster innovation and
economics scales. The cloud computing has influence the applications and services which are
delivered in the past decade (Dang, 2019). cloud computing helps in provides ability to rapidly
with the new features of security and update the governance frameworks.
Transformation of telephony services: cloud computing has influence and transformed
over the past decade which is particularly impact on the telephony. Due to the cloud
computing, the services, mobility and efficiency are increase and grown in
telecommunication channels because the VoIP services have become the best rather than
old and traditional phones. In the new technologies, the company can take advantages of
the cloud computing and take advantages of cloud computing opportunities to enhance
the efficiencies of the business. VoIP allow the facilities to call as well as internet
facilities which are most useful for the customers. The business and customers have on
travelling workforce, off-site as well as workers and employees can call if they are away
from the desks. In addition, cloud computing helps company to provide access storage as
well as data which are required (Sunyaev, 2020). It also helps and easy in grow and
expand the business as well as moving to old office to new location.
Transformed cyber security sector: the cloud computing has change the various
aspects in the cybersecurity sectors from the last decades which are beneficial and
functionally of cloud computing. The cybersecurity is helps in needs to understand the
risk as well as prevent the security issues which are faced by the systems that caused to
hosting data and information in a cloud based environment. It helps in measure the secure
data's as well as keep safe in order to business and company. The clod computing has
helps in provide the large storage as well as safety side that is great advantage for the
Document Page
company. The company can store the data on the cloud computing with the safety as well
as they can access their data on the one place.
Faster, cheaper and easier: the cloud computing get positive impact the financial
industry and made things faster, easier and cheaper for the business and large firms. This
is beneficial for the business as well as industries all across the world (GuangHua and
Lihong, 2018). IT sectors costs are also getting the low with the help of cloud computing
because without cloud computing faces the high prices in the IT sectors. The
development and improves in the cloud computing is helps in release the speeds and
efficiency in the business as well as workloads. It is so easier for the cloud users that they
can manage and handle their web browsers and control the files through the internet
assess. With the one click on internet the business can easily and fast use the cloud
computing for storage of their personal data's and information.
Advantages of cloud computing:
The cloud technology is trending in the technology worlds because every company is change
their services for the company growth and development.
Back up and restore the data: the advantages of the cloud computing is back up and
restoring the data with the help of internet assess. Is data are back up on the cloud then
every one can easily get as well as restore the data with the help of using cloud.
Good Accessibility: cloud computing is easily store the information using the Internet
connection as well as they can easily access the data and information anytime, anywhere
as they want (Abdalla and Varol, 2019). It helps in increase the accountability and
productivity for the business profit and achieve the target in the easy way.
Unlimited storage: with the helps of cloud technologies, everyone can back up their
images, videos, audio, etc. in one place with the huge storage as well as restore the data
as they want at anywhere.
Disadvantages of the cloud computing:
cloud Data and security: the cloud computing is provided the best security as well as
they ensure that their cloud environment must be safe. But there are some risks which can
be done with the cloud computing business critical files such as data loss, theft, hacking,
services attacks, data leakage.
Document Page
Limited control: the cloud computing provide the monitors and manage the limited
cloud infrastructure (Buyya, 2018). The business will be able to monitor and manage the
services which are operated on the cloud computing technology, but they cannot access
the administration tasks such as managing firmware.
3)Bluetooth at smart homes
Bluetooth the wireless connection in the communication technologies world. It is
commonly used by the new generation. It is used for transit the as well as share the data at the
high speeds with the help of using radio waves (Todtenberg and Kraemer, 2019). It is the short
range radio which is used for the communication with the different types of devices such as
computers, mobile phones, entertainment systems as well as any electronic gadgets which are
access the Bluetooth services. The Bluetooth device are also used for create the links and easily
access the data shares and receive. It is mostly used in the mobile phones. The Bluetooth
technologies can be used in the smart homes and it is so effective in the smart homes.
Bluetooth are used in the smart homes from a sensor for operating the services and
networks such as control lightning and control the temperature. In the modern generation and
technologies are more effective because everything is become wireless as well as replace the
cables between the hub, sensors and services with the help of Bluetooth. The Bluetooth can also
be used by the internet technologies to cut the cost as well as make it easier. There are various
features which helps in make the smart home.
Wireless connection: Bluetooth helps in made the smart homes with the design in the
fiction homes because everyone fights with the sound system (Antonioli and
Tippenhauer, 2020). People and family member's can manage and control the sound
systems from their room or bedrooms with the help of Bluetooth connection. It also helps
in manage the time of everyone. With the help of sensor network, whole family members
can control the every room of building parameter like temperature, air quality and
lightening as well as some sensors are outside of the building to monitor as well as track
the task. The Bluetooth services are included in the various devices of smart homes
which affect the exterior and interior of the buildings like lights, water heating, heater as
well as provide the comfort systems for building sound systems.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Energy harvesting: Energy harvesting Bluetooth technology is used in the smart homes
for the effectiveness. It is that way where plugged in are not required for the battery and it
is more sustainable for the homes as well as it access the low cost. It can help in the
energy booster and save the energy. With the help of Bluetooth, the smart homers are
relied on the batteries and wires, they are directly connect the Bluetooth that helps in
monitor and mange the harvesters. The Bluetooth helps in save the energy harvesters
with the wireless technology to create the free sensor solution for the homes as well as for
the internet.
There are various advantages of the Bluetooth at the smart homes. It is also referred as
automation system with the Bluetooth. It helps in improve the quality of life comfort as well as
improve the convenience at the home. It also helps in save the time as well as electricity.
Managing all home from one device: At the smart homes, everyone can manage the all
homes form the one place as well as anywhere as they want (Hasan, 2018). It helps in
save the times. Every home member's can manage and control the sounds, lights and
temperature, etc. from the one place.
Maximize the home securities: the Bluetooth connection are provide securities to the
automation home which are based on the internet. It helps in maximize the home
securities because the automation home detect the any type of fraud at that time which
are effective.
Home management: easily manage the home with the help of Bluetooth as well as
without any hectic of family member. If the home are big or multiple building are there in
the home then the management is made easier with the help of Bluetooth connection in
the home (Wan, 2018).
Remote control: home is become the remote control with the help of wireless connection
easily remote the home with the connection of Bluetooth. The remote control to the every
device of the homes such as TV, fan, AC, etc. everyone can control with the help of
remote such as room temperature, room air, sound or music, heater, etc.
There are one Disadvantages of Bluetooth at smart home which is the limited to short distance.
Limited to short distance: the Bluetooth connectivity is limited short distance. In the
home, the family members can remote and control in the limited spaces as well as near
the devices which are connected with the Bluetooth.
Document Page
Data privacy concerns that arise due to digitizing existing systems
Digitalization has been growing from day to day and due to that are various privacy concern has
been arising and it is affecting business as well as individual. Along with this, it has been found
that company has to take proactive action in order to control their own data from infringement.
In addition to this, technology innovation has been helping company in increasing their overall
growth through marinating functional unit in the organization. Along with this, the major issue
arising in digitalisation is right to privacy as there is high chance of hacking the personal data
and sharing it to online business company (Almeida and et.al., 2020). For example: Facebook
has been accused with sharing of their customer private data with other online retailers. There
has been too much od data flowing and due to digitisation and because of that user has to protect
itself from theft and company has to protect its intellectual property. Moreover, company in
order to protect their data make use of legal contract and they are suppressed with terms and
condition page in which reader can learn about the acts followed by organization.
Although company has to keep in their mind that there are two sets of user such as one
that can take risk with privacy concern and others are not. In addition to this, it is important for
business protect as it hard to escape digital web and it is crucial for organization is that it should
control the amount of data it produce as well as follows all privacy rules. However, it is
important for all type of business to make use of data protection act in order to keep their
employees and customer data safe. This act gives individual the right of access to information
about itself that has been store by company (Björkdahl, 2020). Although this act is related with
privacy as it secure information of company from fraudulent activity like hacking and phishing
as well as theft. So it helps business in working effectively and it also ensure that safety of data
though implementing protection of data plan. Along with this, data privacy act can be used by
the organization in order to maintain privacy of the employees and customer. This act helps in
protecting the privacy of individual while ensuring free flow of information to promote
innovation and growth. Moreover, it regulates the collection, recording and blocking the
personal data from misuse. Thus, more importantly it helps in keeping the personal data secure
and protected such as financial statements and business transaction. It is advantageous for the
company as it allows in building the confidence of the customer and increase their loyalty
through purchasing item or online things. Thus, it increases revenue of the company both offline
Document Page
and online as well as reduce risk (Sestino and et.al., 2020). Moreover, it is a responsibility of
organization to use data protection and be accountable to their customer and serve them wisely.
Comparison between two techniques or protocols which is utilized to secure enterprise network
The enterprises are leading the markets in effective as well as efficient manner at different places
so it important to considers to security of the network for saving the essential information or data
of the company. Therefore the network security deliver assistance in protecting the affiliation
from any sort of issues. Along with that it deliver support in improving overall performances of
the enterprises in domestic as well as international marketplace. Due to that the company is able
to attract large numbers of the customers toward the productivity and services of the company in
a profitable way. In the current period of time security of the huge data is becoming essential
part as the scams and threats are increasing rapidly all over the world (Mohapatra and et.al.,
2020). In order to that the different types of the protocol available in effective as well as efficient
manner Which are critically mentioned as follows :
data loss prevention (DLP): is refers to the defending tool which protect the data of the
organisation in effective as well as efficient manner. It is considered as one of the essential tool
and techniques which allow the organization to deliver the competitive advantages in domestic
as well as international marketplace. It help in solving the various issues of the organization in
adequate manner. Basically the main objective of the data loos prevention is to secure the
sensitive information of the business enterprise by detecting malarious or the abnormal
information or the data transfer. It help to provide security to the customers or the employees
which re associated with the organization.
Furthermore it help in building trust and delivering the transparency in front of customer which
also improve the reputation of the brand in the domestic as well as international marketplace. It
control the unwanted activity which is regarding the network (Huang and et.al., 2018). For
instance, it control the transformation of personal information of the consumer, employees or the
suppliers of the association. In the utilization of the data prevention the organization deliver
limited access to the corporate people. Basically it considers the authentic users. Another
benefit of utilizing this security system is to improve the working environment or the
performance of the company in an appropriate manner. It increase the awareness about the
content access by the user in the organization. Due to that the company is able to secure the
information within the company and did not leak outside the firm. So the private information
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
will remain private and did not deliver information to the competitors about the plans of action.
On the other hand it have some disadvantages for the organization as it create confusion as the
organization dot know the place of storing the data. Along with that the members of the
organization able to access and collect the limited information or the resources for performing
the task in adequate manner.
Virtual payment network (VPN): it refers to the type of the technologies tool and technique
which is developed for addressing the issues regarding the safety and securities. Basically it is
utilized for extending the private network with the assistances of the public network which
includes internet too. It is considered as the plans of action for secure connectivity. It is
renowned as the online privacy system which is much better than private Wi-Fi too. It provide
private tunnel for the information or the data of the organization. It is considered as the easy
way to provide the security and safety to the large numbers of the customers in effective as well
as efficient manner (Hua, and Shunwuritu, 2021). The VPN access the data which is goes
through the services provider of the information. With the assistance of that it is easy to trace the
location and identity of the individual person as it included IP address. Along with that it help in
protecting the data from the hackers or scammers which leads to illegal activity. Basically it
help in addressing the issues regarding the cybersecurity or cyber crimes. Some websites or the
sites which is banned buy the authority for the welfare of the public. It deliver assistance in
hiding the private information of the customers, employees or the organization in effective as
well as efficient manner
CONCLUSION
From the above report it will be concluded that the trends of networking contributing largely in
economics of different nation in ap proper way. The networking is most essential tool and
technique for connecting the world together and exchangeable the ideas or sharing the
information with the wide variety of the people. As the years are passing the technology is
keeping increasing the value and making progress in effective as well as efficient manner. The
presented report highlighted the trends of making which deliver positive as well as negative
aspects on the name of development. The drawbacks of the networking harming the people but
also providing the job opportunity in adequate manner. From the above discussion it is analysed
that the wireless technology is the most suitable for the customers or the organization for
performing the function with the comfortability and flexibility. The wireless networking
Document Page
technology is keep making life of the people easier. Due to that advantages the people are fully
depend on these factors. It also contribute in delivering fast services to the consumers which
satisfy them and in creasing the profitability and productivity of the organization.
Document Page
REFERENCES
Books and journals
Abdalla, p.a. and varol, a., 2019, june. Advantages to disadvantages of cloud computing for
small-sized business. In 2019 7th international symposium on digital forensics and
security (isdfs) (pp. 1-6). Ieee.
Almeida, f. and et.al., 2020. The challenges and opportunities in the digitalization of companies
in a post-covid-19 world. IEEE Engineering management review. 48(3). pp.97-103.
Antonioli, d., Tippenhauer, n.o. and rasmussen, k., 2020, may. Bias: bluetooth impersonation
attacks. In 2020 ieee symposium on security and privacy (sp) (pp. 549-562). Ieee.
Björkdahl, j., 2020. Strategies for digitalization in manufacturing firms. California Management
review. 62(4). pp.17-36.
Buyya, r., and et.al., 2018. A manifesto for future generation cloud computing: research
directions for the next decade. ACM Computing surveys (csur). 51(5). pp.1-38.
Dang, l.m., and et.al., 2019. A survey on internet of things and cloud computing for
healthcare. Electronics. 8(7).p.768.
Guanghua, y. and lihong, w., 2018. Advantages and paths of developing cloud computing
industry in heilongjiang province. IETI Transactions on social sciences and
humanities. 1. pp.37-42.
Hasan, m., and et.al., 2018, november. Smart home systems: overview and comparative analysis.
In 2018 fourth international conference on research in computational intelligence and
communication networks (icrcicn) (pp. 264-268). Ieee.
Hua, j. and shunwuritu, n., 2021. Research on term extraction technology in computer field based
on wireless network technology. Microprocessors And microsystems. 80. p.103336.
Huang, v. K., and et.al., 2018. New trends in the practical deployment of industrial wireless:
from noncritical to critical use cases. IEEE Industrial electronics magazine. 12(2).
pp.50-58.
Hui, s. R., 2018. Technical and safety challenges in emerging trends of near-field wireless power
transfer industrial guidelines. IEEE Electromagnetic compatibility magazine. 7(1).
pp.78-86.
Mohapatra, h. and et.al., 2020. An efficient energy saving scheme through sorting technique for
wireless sensor network. International Journal. 8(8). pp.4278-4286.
Samanta, a. and williamson, s.s., 2021. A survey of wireless battery management system:
topology, emerging trends, and challenges. Electronics. 10(18). p.2193.
Sestino, a. and et.al., 2020. Internet of things and big data as enablers for business digitalization
strategies. Technovation. 98. p.102173.
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Sharma, t., Chehri, a. and fortier, p., 2021. Review of optical and wireless backhaul networks and
emerging trends of next generation 5g and 6g technologies. Transactions On emerging
telecommunications technologies. 32(3). p.e4155.
Sun, l., Ma, d. and tang, h., 2018. A review of recent trends in wireless power transfer technology
and its applications in electric vehicle wireless charging. Renewable And sustainable
energy reviews. 91. pp.490-503.
Sunyaev, a., 2020. Cloud computing. In internet computing (pp. 195-236). Springer, cham.
Todtenberg, n. and kraemer, r., 2019. A survey on bluetooth multi-hop networks. Ad Hoc
networks. 93.p.101922.
Wan, q. and liu, j., 2018, march. Smart-home architecture based on bluetooth mesh technology.
In iop conference series: materials science and engineering (vol. 322, no. 7, p. 072004).
Iop publishing.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]