Computer network engineering

{{short description|Technology discipline within engineering}}

Computer network engineering is a technology discipline within engineering that deals with the design, implementation, and management of computer networks. These systems contain both physical components, such as routers, switches, cables, and some logical elements, such as protocols and network services. Computer network engineers attempt to ensure that the data is transmitted efficiently, securely, and reliably over both local area networks (LANs) and wide area networks (WANs), as well as across the Internet.{{Cite web |last=Shinde |first=Siddhesh |date=2023-01-25 |title=What Does a Network Engineer do? Top Skills, Salary, & More! |url=https://emeritus.org/blog/technology-network-engineer-do/ |access-date=2024-11-05 |website=Emeritus |language=en-US}}

Computer networks often play a large role in modern industries ranging from telecommunications to cloud computing, enabling processes such as email and file sharing, as well as complex real-time services like video conferencing and online gaming.{{Cite web |last=Lombardi |first=Phil |date=2024-08-15 |title=What Is a Network Engineer? (Definition, Duties and Skills) |url=https://www.indeed.com/career-advice/finding-a-job/what-is-a-network-engineer |access-date=2024-11-05 |website=Indeed}}

Background

The evolution of network engineering is marked by significant milestones that have greatly impacted communication methods. These milestones particularly highlight the progress made in developing communication protocols that are vital to contemporary networking. This discipline originated in the 1960s with projects like ARPANET, which initiated important advancements in reliable data transmission. The advent of protocols such as TCP/IP revolutionized networking by enabling interoperability among various systems, which, in turn, fueled the rapid growth of the Internet. Key developments include the standardization of protocols and the shift towards increasingly complex layered architectures. These advancements have profoundly changed the way devices interact across global networks.{{Cite journal |last=Bochmann |first=Gregor v. |last2=Rayner |first2=Dave |last3=West |first3=Colin H. |date=2010-12-20 |title=Some notes on the history of protocol engineering |url=https://www.sciencedirect.com/science/article/abs/pii/S1389128610001763 |journal=Computer Networks |volume=54 |issue=18 |pages=3197–3209 |doi=10.1016/j.comnet.2010.05.019 |issn=1389-1286|url-access=subscription }}

Network infrastructure design

The foundation of computer network engineering lies in the design of the network infrastructure. This involves planning both the physical layout of the network and its logical topology to ensure optimal data flow, reliability, and scalability.{{Cite book |title=Cycling and sustainability |date=2012 |publisher=Emerald |isbn=978-1-78052-298-2 |editor-last=Parkin |editor-first=John |edition=1. |series=Transport and sustainability |location=Bingley}}

= Physical infrastructure =

The physical infrastructure consists of the hardware used to transmit data, which is represented by the first layer of the OSI model.

== Cabling ==

Copper cables such as ethernet over twisted pair are commonly used for short-distance connections, especially in local area networks (LANs), while fiber optic cables are favored for long-distance communication due to their high-speed transmission capabilities and lower susceptibility to interference. Fiber optics play a significant role in the backbone of large-scale networks, such as those used in data centers and internet service provider (ISP) infrastructures.{{Cite journal |last1=Okoro |first1=Rc |last2=Menkiti |first2=Ai |last3=Onuu |first3=Mu |date=2008-11-04 |title=Choice Of Computer Networking Cables And Their Effect On Data Transmission |url=http://www.ajol.info/index.php/gjpas/article/view/16833 |journal=Global Journal of Pure and Applied Sciences |volume=14 |issue=4 |doi=10.4314/gjpas.v14i4.16833 |issn=1118-0579|doi-access=free }}

== Wireless networks ==

In addition to wired connections, wireless networks have become a common component of physical infrastructure. These networks facilitate communication between devices without the need for physical cables, providing flexibility and mobility.{{Cite web |last=LaBrie |first=Greg |title=6 Benefits of Wireless Networking + Wireless Networking Solutions |url=https://blog.wei.com/6-benefits-of-wireless-networking-wireless-networking-solutions |access-date=2024-11-21 |website=blog.wei.com |language=en-us}} Wireless technologies use a range of transmission methods, including radio frequency (RF) waves, infrared signals, and laser-based communication, allowing devices to connect to the network.{{Cite journal |last1=Hua |first1=Ju |last2=Shunwuritu |first2=Na |date=2021-02-01 |title=Research on term extraction technology in computer field based on wireless network technology |url=https://linkinghub.elsevier.com/retrieve/pii/S0141933120304956 |journal=Microprocessors and Microsystems |volume=80 |pages=103336 |doi=10.1016/j.micpro.2020.103336 |issn=0141-9331|url-access=subscription }}

Wi-Fi based on IEEE 802.11 standards is the most widely used wireless technology in local area networks and relies on RF waves to transmit data between devices and access points.{{Cite journal |last1=Deng |first1=Cailian |last2=Fang |first2=Xuming |last3=Han |first3=Xiao |last4=Wang |first4=Xianbin |last5=Yan |first5=Li |last6=He |first6=Rong |last7=Long |first7=Yan |last8=Guo |first8=Yuchen |date=29 July 2020 |title=IEEE 802.11be Wi-Fi 7: New Challenges and Opportunities |url=https://ieeexplore.ieee.org/document/9152055 |journal=IEEE Communications Surveys & Tutorials |volume=22 |issue=4 |pages=2136–2166 |doi=10.1109/COMST.2020.3012715 |arxiv=2007.13401 |issn=1553-877X}} Wireless networks operate across various frequency bands, including 2.4 GHz and 5 GHz, each offering unique ranges and data rates; the 2.4 GHz band provides broader coverage, while the 5 GHz band supports faster data rates with reduced interference, ideal for densely populated environments. Beyond Wi-Fi, other wireless transmission methods, such as infrared and laser-based communication, are used in specific contexts, like short-range, line-of-sight links or secure point-to-point communication.{{Cite web |last=NIC.br |title=WiFi 2.4 GHz and 5 GHz bands – Internet Citizen |url=https://cidadaonarede.nic.br/en/videos/wifi-2-4-ghz-and-5-ghz-bands |access-date=2024-11-05 |website=cidadaonarede.nic.br |language=}}

In mobile networks, cellular technologies like 3G, 4G, and 5G enable wide-area wireless connectivity. 3G introduced faster data rates for mobile browsing, while 4G significantly improved speed and capacity, supporting advanced applications like video streaming. The latest evolution, 5G, operates across a range of frequencies, including millimeter-wave bands, and provides high data rates, low latency, and support for more device connectivity, useful for applications like the Internet of Things (IoT) and autonomous systems. Together, these wireless technologies allow networks to meet a variety of connectivity needs across local and wide areas.{{Cite web |title=Cellular Network – an overview {{!}} ScienceDirect Topics |url=https://www.sciencedirect.com/topics/computer-science/cellular-network |access-date=2024-11-05 |website=www.sciencedirect.com}}{{Unreliable source?|date=November 2024|reason=AI generated summary of research articles}}

== Network devices ==

Routers and switches help direct data traffic and assist in maintaining network security; network engineers configure these devices to optimize traffic flow and prevent network congestion. In wireless networks, wireless access points (WAP) allow devices to connect to the network. To expand coverage, multiple access points can be placed to create a wireless infrastructure. Beyond Wi-Fi, cellular network components like base stations and repeaters support connectivity in wide-area networks, while network controllers and firewalls manage traffic and enforce security policies. Together, these devices enable a secure, flexible, and scalable network architecture suitable for both local and wide-area coverage.{{Cite web |date=2015-07-08 |title=Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter) |url=https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-gateways/ |access-date=2024-11-05 |website=GeeksforGeeks |language=en-US}}

= Logical topology =

File:NetworkTopologies.svg

Beyond the physical infrastructure, a network must be organized logically, which defines how data is routed between devices. Various topologies, such as star, mesh, and hierarchical designs, are employed depending on the network’s requirements. In a star topology, for example, all devices are connected to a central hub that directs traffic. This configuration is relatively easy to manage and troubleshoot but can create a single point of failure. In contrast, a mesh topology, where each device is interconnected with several others, offers high redundancy and reliability but requires a more complex design and larger hardware investment. Large networks, especially those in enterprises, often employ a hierarchical model, dividing the network into core, distribution, and access layers to enhance scalability and performance.{{Cite web |title=Logical Topology – an overview {{!}} ScienceDirect Topics |url=https://www.sciencedirect.com/topics/computer-science/logical-topology |access-date=2024-11-05 |website=www.sciencedirect.com}}

Network protocols and communication standards

{{Main|Lists of network protocols}}

Communication protocols dictate how data in a network is transmitted, routed, and delivered. Depending on the goals of the specific network, protocols are selected to ensure that the network functions efficiently and securely.{{Cite web |title=9 Types Of Network Protocols & When To Use Them |url=https://www.forbes.com/advisor/business/types-network-protocols/ |access-date=2024-11-05 |website=Forbes Advisor}}

The Transmission Control Protocol/Internet Protocol (TCP/IP) suite is fundamental to modern computer networks, including the Internet. It defines how data is divided into packets, addressed, routed, and reassembled. The Internet Protocol (IP) is critical for routing packets between different networks.{{Cite book |last1=Parziale |first1=Lydia |title=TCP/IP Tutorial and Technical Overview |last2=Britt |first2=David T. |last3=Davis |first3=Chuck |last4=Forrester |first4=Jason |last5=Liu |first5=Wei |last6=Matthews |first6=Carolyn |last7=Rosselot |first7=Nicolas |publisher=IBM |year=2006}}

In addition to traditional protocols, advanced protocols such as Multiprotocol Label Switching (MPLS) and Segment Routing (SR) enhance traffic management and routing efficiency.{{Cite report |url=https://www.rfc-editor.org/rfc/rfc3031 |title=Multiprotocol Label Switching Architecture |last1=Viswanathan |first1=Arun |last2=Rosen |first2=Eric C. |date=January 2001 |publisher=Internet Engineering Task Force |issue=RFC 3031 |last3=Callon |first3=Ross}}{{Cite report |url=https://www.rfc-editor.org/rfc/rfc8402 |title=Segment Routing Architecture |last1=Filsfils |first1=Clarence |last2=Previdi |first2=Stefano |date=July 2018 |publisher=Internet Engineering Task Force |issue=RFC 8402 |last3=Ginsberg |first3=Les |last4=Decraene |first4=Bruno |last5=Litkowski |first5=Stephane |last6=Shakir |first6=Rob}} For intra-domain routing, protocols like Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) provide dynamic routing capabilities.{{Cite journal |last1=Patel |first1=Haresh N. |last2=Pandey |first2=Rashmi |date=2014 |title=Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summarization and Route Redistribution |url=https://d1wqtxts1xzle7.cloudfront.net/35316889/U4904141144-libre.pdf?1414551747=&response-content-disposition=inline%3B+filename%3DExtensive_Reviews_of_OSPF_and_EIGRP_Rout.pdf&Expires=1730833821&Signature=UlgRSpmIwBAWBkK2ukI8LUog93j3Qpy1kBemrOEuybQquXDj-b-4hsHXdjIj~g1yOTwhQCzFnCKXuheLC1GcxXyfMf4c1S7R7xAL41z7dzXhJQ1XNyBDUep1HjyQjyF-5el7xzuUmp7~WkurUGdT7WnTFG~1rreW22vcI4mGfvc~fEG3dIxvH-Iav6JNPoRVueHq28brwS3NUGoc5Tu~Z31GhOk346mov34AOuIWPty4DIOcJsaQHFQRPjwYiR8DclHSj0KxBlu46gmkhYBZN4nIgPXkn221vwzuwn1JJ2Dys3fHr26ZZnAa2C-hOLD3OuDex7O65K3krf4lOKAwKA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA |journal=Journal of Engineering Research and Applications |volume=4 |issue=9 |pages=141–144 |via=IJERA}}

On the local area network (LAN) level, protocols like Virtual Extensible LAN (VXLAN) and Network Virtualization using Generic Routing Encapsulation (NVGRE) facilitate the creation of virtual networks.{{Cite journal |last1=Sudrajat |first1=Mirdan Syahid Mulya |last2=Perdana |first2=Doan |last3=Negara |first3=Ridha Muldina |date=2017-09-01 |title=Performance Analysis of VXLAN and NVGRE Tunneling Protocol on Virtual Network |url=https://zenodo.org/record/4106284 |journal=Bulletin of Electrical Engineering and Informatics |language=en |volume=6 |issue=3 |pages=295–300 |doi=10.11591/eei.v6i3.622 |issn=2302-9285}} Furthermore, Internet Protocol Security (IPsec) and Transport Layer Security (TLS) secure communication channels, ensuring data integrity and confidentiality.{{Cite book |last1=Kotuliak |first1=I. |last2=Rybar |first2=P. |last3=Truchly |first3=P. |chapter=Performance comparison of IPsec and TLS based VPN technologies |date=October 2011 |title=2011 9th International Conference on Emerging eLearning Technologies and Applications (ICETA) |chapter-url=http://dx.doi.org/10.1109/iceta.2011.6112567 |publisher=IEEE |pages=217–221 |doi=10.1109/iceta.2011.6112567|isbn=978-1-4577-0052-1 }}

For real-time applications, protocols such as Real-time Transport Protocol (RTP) and WebRTC provide low-latency communication, making them suitable for video conferencing and streaming services. Additionally, protocols like QUIC enhance web performance and security by establishing secure connections with reduced latency.{{Cite report |url=https://www.rfc-editor.org/info/rfc8834 |title=Media Transport and Use of RTP in WebRTC |last1=Perkins |first1=C. |last2=Westerlund |first2=M. |date=January 2021 |publisher=RFC Editor |issue=RFC8834 |doi=10.17487/rfc8834 |language=en |last3=Ott |first3=J.}}{{Cite book |last1=Cook |first1=Sarah |last2=Mathieu |first2=Bertrand |last3=Truong |first3=Patrick |last4=Hamchaoui |first4=Isabelle |chapter=QUIC: Better for what and for whom? |date=May 2017 |title=2017 IEEE International Conference on Communications (ICC) |chapter-url=https://ieeexplore.ieee.org/document/7997281 |publisher=IEEE |pages=1–6 |doi=10.1109/ICC.2017.7997281 |isbn=978-1-4673-8999-0}}

Network security

{{Main|Cybersecurity engineering}}

As networks have become essential for business operations and personal communication, the demand for robust security measures has increased. Network security is a critical component of computer network engineering, concentrating on the protection of networks against unauthorized access, data breaches, and various cyber threats. Engineers are responsible for designing and implementing security measures that ensure the integrity and confidentiality of data transmitted across networks.{{Cite journal |last=Marin |first=G. A. |date=November 2005 |title=Network Security Basics |url=https://ieeexplore.ieee.org/document/1556540 |journal=IEEE Security and Privacy Magazine |language=en |volume=3 |issue=6 |pages=68–72 |doi=10.1109/MSP.2005.153 |issn=1540-7993|url-access=subscription }}

Firewalls serve as barriers between trusted internal networks and external environments, such as the Internet. Network engineers configure firewalls, including next-generation firewalls (NGFW), which incorporate advanced features such as deep packet inspection and application awareness, thereby enabling more refined control over network traffic and protection against sophisticated attacks.{{Cite journal |last=Malecki |first=Florian |date=2012-12-01 |title=Next-generation firewalls: security with performance |url=https://linkinghub.elsevier.com/retrieve/pii/S1353485812701149 |journal=Network Security |volume=2012 |issue=12 |pages=19–20 |doi=10.1016/S1353-4858(12)70114-9 |issn=1353-4858|url-access=subscription }}

In addition to firewalls, engineers use encryption protocols, including Internet Protocol Security (IPsec) and Transport Layer Security (TLS), to secure data in transit. These protocols provide a means of safeguarding sensitive information from interception and tampering.{{Cite journal |last=Turner |first=Sean |date=November 2014 |title=Transport Layer Security |url=https://ieeexplore.ieee.org/document/6938667 |journal=IEEE Internet Computing |volume=18 |issue=6 |pages=60–63 |doi=10.1109/MIC.2014.126 |issn=1089-7801|url-access=subscription }}{{Cite journal |last=Alshamrani |first=Hani |date=2014 |title=Internet Protocol Security (IPSec) Mechanisms |url=https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=9d6de8b03e1e52e3e40d49736cb6710891da7647 |journal=International Journal of Scientific & Engineering Research |volume=5 |issue=5 |pages=85–87 |via=IJSER}}

For secure remote access, Virtual Private Networks (VPNs) are deployed, using technologies to create encrypted tunnels for data transmission over public networks. These VPNs are often used for maintaining security when remote users access corporate networks{{Cite book |last1=Scott |first1=Charlie |title=Virtual Private Networks |last2=Wolfe |first2=Paul |last3=Erwin |first3=Mike |publisher=O'Reilly Media |year=1999}} but are also used ion other settings.

To enhance threat detection and response capabilities, network engineers implement Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).{{Cite web |last=Jayaraman |first=Nepolian |date=2023-12-15 |title=IDS vs. IPS: Key Difference and Similarities Best for Cybersecurity |url=https://www.eccouncil.org/cybersecurity-exchange/network-security/ids-and-ips-differences/ |access-date=2024-11-05 |website=Cybersecurity Exchange |language=en-US}} Additionally, they may employ Security Information and Event Management (SIEM) solutions that aggregate and analyze security data across the network.{{Cite journal |last1=González-Granadillo |first1=Gustavo |last2=González-Zarzosa |first2=Susana |last3=Diaz |first3=Rodrigo |date=January 2021 |title=Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures |journal=Sensors |language=en |volume=21 |issue=14 |pages=4759 |doi=10.3390/s21144759 |doi-access=free |issn=1424-8220 |pmc=8309804 |pmid=34300500|bibcode=2021Senso..21.4759G }} Endpoint Detection and Response (EDR) solutions are also used to monitor and respond to threats at the device level, contributing to a more comprehensive security posture.{{Cite book |last1=Arfeen |first1=Asad |last2=Ahmed |first2=Saad |last3=Khan |first3=Muhammad Asim |last4=Jafri |first4=Syed Faraz Ali |chapter=Endpoint Detection & Response: A Malware Identification Solution |date=2021-11-23 |title=2021 International Conference on Cyber Warfare and Security (ICCWS) |chapter-url=https://ieeexplore.ieee.org/document/9703010 |publisher=IEEE |pages=1–8 |doi=10.1109/ICCWS53234.2021.9703010 |isbn=978-1-6654-1208-7}}

Furthermore, network segmentation techniques, such as using VLANs and subnets are commonly employed to isolate sensitive data and systems within a network. This practice limits the potential impact of breaches and enhances overall security by controlling access to critical resources.{{Cite web |title=What Is Network Segmentation? |url=https://www.paloaltonetworks.com/cyberpedia/what-is-network-segmentation |access-date=2024-11-05 |website=Palo Alto Networks |language=en-US}}

Network performance and optimization

As modern networks grow in complexity and scale, driven by data-intensive applications such as cloud computing, high-definition video streaming, and distributed systems, optimizing network performance has become a critical responsibility of network engineers. Network performance and optimization tools aim for scalability, resilience, and efficient resource use with minimal, if any, negative performance impact.{{Cite web |title=What Is Network Optimization? Definition & Best Practices |url=https://www.forbes.com/advisor/business/software/what-is-network-optimization/ |access-date=2024-11-05 |website=Forbes Advisor}}

= Quality of Service (QoS) =

Modern network architectures require more than basic Quality of Service (QoS) policies. Advanced techniques like service function chaining (SFC) allow engineers to create dynamic service flows, applying specific QoS policies at various points in the traffic path.{{Cite report |url=https://www.rfc-editor.org/rfc/rfc7665 |title=Service Function Chaining (SFC) Architecture |last1=Halpern |first1=Joel M. |last2=Pignataro |first2=Carlos |date=October 2015 |publisher=Internet Engineering Task Force |issue=RFC 7665}} Additionally, network slicing, widely used in 5G networks, enables custom resource allocation for different service types, aiding high-bandwidth or low-latency services when necessary.{{Cite journal |last=Zhang |first=Shunliang |date=June 2019 |title=An Overview of Network Slicing for 5G |url=https://ieeexplore.ieee.org/document/8685766 |journal=IEEE Wireless Communications |volume=26 |issue=3 |pages=111–117 |doi=10.1109/MWC.2019.1800234 |issn=1536-1284|url-access=subscription }}

= Intelligent load balancing and traffic engineering =

Beyond traditional load balancing, techniques such as intent-based networking (IBN) and AI-driven traffic optimization are now implemented to predict and adjust traffic distribution based on usage patterns, network failures, or infrastructure performance. In hybrid cloud infrastructures, Software-Defined WAN (SD-WAN) optimizes connectivity between on-premises and cloud environments, dynamically managing routes and bandwidth allocation. Policies like data center interconnect (DCI) ensure high-performance connections across geographically distributed data centers.{{Cite journal |last1=Velasco |first1=L. |last2=Barzegar |first2=S. |last3=Tabatabaeimehr |first3=F. |last4=Ruiz |first4=M. |date=2022-01-01 |title=Intent-based networking and its application to optical networks [Invited Tutorial] |url=https://opg.optica.org/jocn/abstract.cfm?uri=jocn-14-1-A11 |journal=Journal of Optical Communications and Networking |language=EN |volume=14 |issue=1 |pages=A11–A22 |doi=10.1364/JOCN.438255 |hdl=2117/361160 |issn=1943-0639|hdl-access=free }}{{Cite journal |last1=Umoga |first1=Uchenna Joseph |last2=Sodiya |first2=Enoch Oluwademilade |last3=Ugwuanyi |first3=Ejike David |last4=Jacks |first4=Boma Sonimitiem |last5=Lottu |first5=Oluwaseun Augustine |last6=Daraojimba |first6=Obinna Donald |last7=Obaigbena |first7=Alexander |date=2024 |title=Exploring the potential of AI-driven optimization in enhancing network performance and efficiency |url=https://magnascientiapub.com/journals/msarr/content/exploring-potential-ai-driven-optimization-enhancing-network-performance-and-efficiency |journal=Magna Scientia Advanced Research and Reviews |volume=10 |issue=1 |pages=368–378 |doi=10.30574/msarr.2024.10.1.0028 |issn=2582-9394|doi-access=free }}{{Cite book |last1=Yang |first1=Zhenjie |last2=Cui |first2=Yong |last3=Li |first3=Baochun |last4=Liu |first4=Yadong |last5=Xu |first5=Yi |chapter=Software-Defined Wide Area Network (SD-WAN): Architecture, Advances and Opportunities |date=July 2019 |title=2019 28th International Conference on Computer Communication and Networks (ICCCN) |chapter-url=https://ieeexplore.ieee.org/document/8847124 |publisher=IEEE |pages=1–9 |doi=10.1109/ICCCN.2019.8847124 |isbn=978-1-7281-1856-7}}{{Cite book |last1=Chen |first1=Nan |last2=Fan |first2=Yongbing |last3=He |first3=Xiaowu |last4=Liu |first4=Yi |last5=Li |first5=Qiaoling |chapter=Research on Cloud Datacenter Interconnect Technology |series=Lecture Notes in Computer Science |date=2015 |volume=9461 |editor-last=Cai |editor-first=Ruichu |editor2-last=Chen |editor2-first=Kang |editor3-last=Hong |editor3-first=Liang |editor4-last=Yang |editor4-first=Xiaoyan |editor5-last=Zhang |editor5-first=Rong |editor6-last=Zou |editor6-first=Lei |title=Web Technologies and Applications |chapter-url=https://link.springer.com/chapter/10.1007/978-3-319-28121-6_8 |language=en |location=Cham |publisher=Springer International Publishing |pages=79–86 |doi=10.1007/978-3-319-28121-6_8 |isbn=978-3-319-28121-6}}

= Proactive network monitoring and predictive troubleshooting =

Traditional network monitoring tools are supplemented by telemetry streaming and real-time analytics solutions.{{Cite journal |last1=Paolucci |first1=Francesco |last2=Sgambelluri |first2=Andrea |last3=Cugini |first3=Filippo |last4=Castoldi |first4=Piero |date=2018-08-01 |title=Network Telemetry Streaming Services in SDN-Based Disaggregated Optical Networks |url=https://ieeexplore.ieee.org/document/8263153 |journal=Journal of Lightwave Technology |volume=36 |issue=15 |pages=3142–3149 |doi=10.1109/JLT.2018.2795345 |bibcode=2018JLwT...36.3142P |hdl=11382/521445 |issn=0733-8724|hdl-access=free }} Intent-based networking systems (IBNS) help automatically identify performance deviations from established service intents, while predictive maintenance techniques, powered by machine learning (ML), allow engineers to detect hardware failures or traffic congestion before they impact users.{{Cite journal |last1=Carvalho |first1=Thyago P. |last2=Soares |first2=Fabrízzio A. A. M. N. |last3=Vita |first3=Roberto |last4=Francisco |first4=Roberto da P. |last5=Basto |first5=João P. |last6=Alcalá |first6=Symone G. S. |date=2019-11-01 |title=A systematic literature review of machine learning methods applied to predictive maintenance |url=https://linkinghub.elsevier.com/retrieve/pii/S0360835219304838 |journal=Computers & Industrial Engineering |volume=137 |pages=106024 |doi=10.1016/j.cie.2019.106024 |issn=0360-8352|url-access=subscription }} Self-healing networks, using software-defined networking (SDN), can make automatic adjustments to restore performance without always requiring manual intervention.{{Cite book |last1=Thorat |first1=Pankaj |last2=Raza |first2=S. M. |last3=Nguyen |first3=Dung T. |last4=Im |first4=Giyeol |last5=Choo |first5=Hyunseung |last6=Kim |first6=Dongsoo S. |chapter=Optimized self-healing framework for software defined networks |date=2015-01-08 |title=Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication |chapter-url=https://dl.acm.org/doi/10.1145/2701126.2701235 |series=IMCOM '15 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=1–6 |doi=10.1145/2701126.2701235 |isbn=978-1-4503-3377-1}}

= Network function virtualization (NFV) and edge computing =

With the advent of network function virtualization (NFV), engineers can virtualize network functions, such as routing, firewalls, and load balancing.{{Cite journal |last1=Han |first1=Bo |last2=Gopalakrishnan |first2=Vijay |last3=Ji |first3=Lusheng |last4=Lee |first4=Seungjoon |date=February 2015 |title=Network function virtualization: Challenges and opportunities for innovations |url=https://ieeexplore.ieee.org/document/7045396 |journal=IEEE Communications Magazine |volume=53 |issue=2 |pages=90–97 |doi=10.1109/MCOM.2015.7045396 |issn=0163-6804|url-access=subscription }} Additionally, edge computing brings processing and storage closer to end users, which is relevant to applications requiring low-latency, such as IoT and real-time analytics.{{Cite book |last1=Varghese |first1=Blesson |last2=Wang |first2=Nan |last3=Barbhuiya |first3=Sakil |last4=Kilpatrick |first4=Peter |last5=Nikolopoulos |first5=Dimitrios S. |chapter=Challenges and Opportunities in Edge Computing |date=November 2016 |title=2016 IEEE International Conference on Smart Cloud (SmartCloud) |chapter-url=https://ieeexplore.ieee.org/document/7796149 |publisher=IEEE |pages=20–26 |doi=10.1109/SmartCloud.2016.18 |isbn=978-1-5090-5263-9|url=https://pure.qub.ac.uk/en/publications/0fcdd6a4-f345-40a9-a5d9-a9940f3ef108 }}

= Multipath protocols and application-layer optimization =

Multipath transport protocols, such as Multipath TCP (MPTCP), optimize the use of multiple paths simultaneously, improving high availability and distribution of network load.{{Cite book |last1=Barré |first1=Sébastien |last2=Paasch |first2=Christoph |last3=Bonaventure |first3=Olivier |chapter=MultiPath TCP: From Theory to Practice |series=Lecture Notes in Computer Science |date=2011 |volume=6640 |editor-last=Domingo-Pascual |editor-first=Jordi |editor2-last=Manzoni |editor2-first=Pietro |editor3-last=Palazzo |editor3-first=Sergio |editor4-last=Pont |editor4-first=Ana |editor5-last=Scoglio |editor5-first=Caterina |title=Networking 2011 |chapter-url=https://link.springer.com/chapter/10.1007/978-3-642-20757-0_35 |language=en |location=Berlin, Heidelberg |publisher=Springer |pages=444–457 |doi=10.1007/978-3-642-20757-0_35 |isbn=978-3-642-20757-0}} This can be useful in networks that support redundant connections or where latency must be minimized. Simultaneously, application-layer optimizations focus on fine-tuning traffic at the software level to better deliver data flow across distributed systems, reducing overhead and enhancing throughput.{{Cite report |url=https://www.rfc-editor.org/rfc/rfc5693.html |title=Application-Layer Traffic Optimization (ALTO) Problem Statement |last1=Seedorf |first1=Jan |last2=Burger |first2=Eric |date=October 2009 |publisher=Internet Engineering Task Force |issue=RFC 5693}}

Cloud computing engineering

{{Main|Cloud engineering}}

The advent of cloud computing has introduced new paradigms for network engineering, focusing on the design and optimization of virtualized infrastructures. Network engineers can manage the integration of on-premises systems with cloud services with the intention of improving scalability, reliability, and security.{{Cite web |date=2020-08-11 |title=Cloud Networking |url=https://www.geeksforgeeks.org/cloud-networking/ |access-date=2024-11-05 |website=GeeksforGeeks |language=en-US}}

= Cloud network architecture =

Cloud network architecture requires the design of virtualized networks that can scale to meet varying demand.{{Cite web |date=2023-05-16 |title=Cloud Architecture Explained with Examples |url=https://svitla.com/blog/cloud-architecture-explained/ |access-date=2024-11-05 |website=svitla.com |language=en-US}} Virtual private cloud (VPC) and hybrid cloud models allow organizations to extend their internal networks into cloud environments, balancing on-premises resources with public cloud services.{{Citation |last1=Beach |first1=Brian |title=Virtual Private Cloud |date=2019 |work=Pro PowerShell for Amazon Web Services |pages=85–115 |editor-last=Beach |editor-first=Brian |url=https://link.springer.com/chapter/10.1007/978-1-4842-4850-8_5 |access-date=2024-11-05 |place=Berkeley, CA |publisher=Apress |language=en |doi=10.1007/978-1-4842-4850-8_5 |isbn=978-1-4842-4850-8 |last2=Armentrout |first2=Steven |last3=Bozo |first3=Rodney |last4=Tsouris |first4=Emmanuel |editor2-last=Armentrout |editor2-first=Steven |editor3-last=Bozo |editor3-first=Rodney |editor4-last=Tsouris |editor4-first=Emmanuel|url-access=subscription }} Cloud interconnect solutions, such as dedicated connections, can minimize latency and optimize data transfer between on-premises and cloud infrastructures.

= Software-defined networking (SDN) =

Software-defined networking (SDN) is central to cloud networking, enabling centralized control over network configurations. SDN, combined with NFV, allows the management of network resources through software, automating tasks such as load balancing, routing, and firewalling. Overlay networks are commonly employed to create virtual networks on shared physical infrastructure, supporting multi-tenant environments with enhanced security and isolation.{{Cite journal |last1=Son |first1=Jungmin |last2=Buyya |first2=Rajkumar |date=2018-05-23 |title=A Taxonomy of Software-Defined Networking (SDN)-Enabled Cloud Computing |url=https://dl.acm.org/doi/10.1145/3190617 |journal=ACM Comput. Surv. |volume=51 |issue=3 |pages=59:1–59:36 |doi=10.1145/3190617 |issn=0360-0300|url-access=subscription }}{{Cite journal |last1=Yi |first1=Bo |last2=Wang |first2=Xingwei |last3=Li |first3=Keqin |last4=Das |first4=Sajal k. |last5=Huang |first5=Min |date=2018-03-14 |title=A comprehensive survey of Network Function Virtualization |url=https://linkinghub.elsevier.com/retrieve/pii/S1389128618300306 |journal=Computer Networks |volume=133 |pages=212–262 |doi=10.1016/j.comnet.2018.01.021 |issn=1389-1286|url-access=subscription }}

= Cloud network security =

Cloud security involves securing data that traverses multiple environments. Engineers implement encryption, Identity and access management (IAM), and zero trust architectures to protect cloud networks. Firewalls, intrusion detection systems, and cloud-native security solutions monitor and safeguard these environments. Micro-segmentation is used to isolate workloads and minimize the attack surface, while VPNs and IPsec tunnels secure communication between cloud and on-premises networks.{{Cite book |last1=Kandukuri |first1=Balachandra Reddy |last2=V. |first2=Ramakrishna Paturi |last3=Rakshit |first3=Atanu |chapter=Cloud Security Issues |date=2009 |pages=517–520 |title=2009 IEEE International Conference on Services Computing |chapter-url=http://dx.doi.org/10.1109/scc.2009.84 |publisher=IEEE |doi=10.1109/scc.2009.84|isbn=978-1-4244-5183-8 }}

= Performance optimization =

Optimizing network performance in the cloud is relevant for applications requiring low latency and high throughput. Engineers deploy content delivery networks to reduce latency and configure dedicated connections, and traffic engineering policies ensure optimal routing between cloud regions.{{Cite journal |last1=Zolfaghari |first1=Behrouz |last2=Srivastava |first2=Gautam |last3=Roy |first3=Swapnoneel |last4=Nemati |first4=Hamid R. |last5=Afghah |first5=Fatemeh |last6=Koshiba |first6=Takeshi |last7=Razi |first7=Abolfazl |last8=Bibak |first8=Khodakhast |last9=Mitra |first9=Pinaki |last10=Rai |first10=Brijesh Kumar |date=2020-04-17 |title=Content Delivery Networks: State of the Art, Trends, and Future Roadmap |url=https://dl.acm.org/doi/10.1145/3380613 |journal=ACM Comput. Surv. |volume=53 |issue=2 |pages=34:1–34:34 |doi=10.1145/3380613 |issn=0360-0300|url-access=subscription }}

= Tools and protocols =

Cloud networking relies on protocols such as VXLAN and Generic Routing Encapsulation (GRE) to facilitate communication across virtualized environments. Automation tools enable Infrastructure As Code (IaC) practices, allowing for more scalable and consistent deployment of cloud network configurations.{{Cite report |url=https://www.rfc-editor.org/rfc/rfc2784.html |title=Generic Routing Encapsulation (GRE) |last1=Li |first1=Tony |last2=Farinacci |first2=Dino |date=March 2000 |publisher=Internet Engineering Task Force |issue=RFC 2784 |last3=Hanks |first3=Stanley P. |last4=Meyer |first4=David |last5=Traina |first5=Paul S.}}{{Cite book |last1=Kumar |first1=Manish |last2=Mishra |first2=Shilpi |last3=Lathar |first3=Niraj Kumar |last4=Singh |first4=Pooran |chapter=Infrastructure as Code (IaC): Insights on Various Platforms |series=Advances in Intelligent Systems and Computing |date=2023 |volume=1432 |editor-last=Shakya |editor-first=Subarna |editor2-last=Du |editor2-first=Ke-Lin |editor3-last=Ntalianis |editor3-first=Klimis |title=Sentiment Analysis and Deep Learning |chapter-url=https://link.springer.com/chapter/10.1007/978-981-19-5443-6_33 |language=en |location=Singapore |publisher=Springer Nature |pages=439–449 |doi=10.1007/978-981-19-5443-6_33 |isbn=978-981-19-5443-6}}

IoT

The Internet of Things (IoT) is a central theme discussed in this review paper. It represents a comprehensive framework addressing various challenges associated with connecting the internet and the physical world. Currently, the internet plays a vital role in daily life, significantly transforming human experiences. A key aspect of this technological advancement is the integration of multiple technologies with communication systems. One of the most crucial applications of IoT includes the identification and tracking of smart objects. Wireless Sensing Networks (WSN) enable universal sensing mechanisms, impacting many facets of contemporary living. The growth of these devices within a communicative and responsive network will ultimately form the Internet of Things. In this context, sensors and actuators seamlessly interact with the surrounding environment, facilitating information sharing across various platforms to develop a common operating picture (COP). The IoT envisions a future where the digital and physical domains are interconnected through advanced information and wireless communication technologies. This survey outlines the visions, concepts, technologies, challenges, innovative directions, and applications of the Internet of Things (IoT).{{Cite journal |last=Gourav |first=Misra |date=2016 |title=Internet of Things (IoT) – A Technological Analysis and Survey on Vision, Concepts, Challenges, Innovation Directions, Technologies, and Applications (An Upcoming or Future Generation Computer Communication System Technology) |url=https://d1wqtxts1xzle7.cloudfront.net/51529818/IoT-libre.pdf?1485531649=&response-content-disposition=inline%3B+filename%3DInternet_of_Things_IoT_A_Technological_A.pdf&Expires=1733925804&Signature=ROdVt7n0j5KKwWti1c7a7jo~7civd-FLZAVycvOb97S2hV0H8JOTiLal4qPSBcgxn~V7qURirpP1zIot2oBY3M9SdV1HLHNgbKslZmNw7cA2KwcfFkFdjHTssyQjmckXZ9FfRbijP18otplRe5hOlLmCkYfrWtYdT8lh3ERKKyk4Xqu5uXCUsthcfxRQiIqir8snWrOQo4Ds8M68I1RPJN7DnRQQ3YI-wkZ2eIY5RZNMf03Vm7~LLUZydhfpgvSRjVRGJ587kwiihC132eLYIkRGcw1nchxfQbdda4Bkhu4J-4BkJ6F7PlVGhIqbCXXveZjXFXHgMn7zRo0KzoWgPQ__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA](https://d1wqtxts1xzle7.cloudfront.net/51529818/IoT-libre.pdf?1485531649=&response-content-disposition=inline%3B+filename%3DInternet_of_Things_IoT_A_Technological_A.pdf&Expires=1733925804&Signature=ROdVt7n0j5KKwWti1c7a7jo~7civd-FLZAVycvOb97S2hV0H8JOTiLal4qPSBcgxn~V7qURirpP1zIot2oBY3M9SdV1HLHNgbKslZmNw7cA2KwcfFkFdjHTssyQjmckXZ9FfRbijP18otplRe5hOlLmCkYfrWtYdT8lh3ERKKyk4Xqu5uXCUsthcfxRQiIqir8snWrOQo4Ds8M68I1RPJN7DnRQQ3YI-wkZ2eIY5RZNMf03Vm7~LLUZydhfpgvSRjVRGJ587kwiihC132eLYIkRGcw1nchxfQbdda4Bkhu4J-4BkJ6F7PlVGhIqbCXXveZjXFXHgMn7zRo0KzoWgPQ__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA) |journal=Science and Education Publishing |volume=4 |issue=1 |pages=23–32 |via=Journal Article}}

References