Computer Network Engineering
   HOME

TheInfoList



OR:

Computer network engineering is a technology discipline within
engineering Engineering is the practice of using natural science, mathematics, and the engineering design process to Problem solving#Engineering, solve problems within technology, increase efficiency and productivity, and improve Systems engineering, s ...
that deals with the
design A design is the concept or proposal for an object, process, or system. The word ''design'' refers to something that is or has been intentionally created by a thinking agent, and is sometimes used to refer to the inherent nature of something ...
, implementation, and management of
computer network A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
s. These systems contain both physical components, such as routers, switches, cables, and some logical elements, such as
protocols Protocol may refer to: Sociology and politics * Protocol (politics), a formal agreement between nation states * Protocol (diplomacy), the etiquette of diplomacy and affairs of state * Etiquette, a code of personal behavior Science and technology ...
and
network service In computer networking, a network service is an application running at the network layer and above, that provides data storage, manipulation, presentation, communication or other capability which is often implemented using a client–server or pe ...
s. Computer network engineers attempt to ensure that the data is transmitted efficiently, securely, and reliably over both
local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, campus, or building, and has its network equipment and interconnects locally managed. LANs facilitate the distribution of da ...
s (LANs) and
wide area network A wide area network (WAN) is a telecommunications network that extends over a large geographic area. Wide area networks are often established with leased telecommunication circuits. Businesses, as well as schools and government entities, use ...
s (WANs), as well as across the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. Computer networks often play a large role in modern industries ranging from
telecommunications Telecommunication, often used in its plural form or abbreviated as telecom, is the transmission of information over a distance using electronic means, typically through cables, radio waves, or other communication technologies. These means of ...
to
cloud computing Cloud computing is "a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand," according to International Organization for ...
, enabling processes such as email and file sharing, as well as complex real-time services like
video conferencing Videotelephony (also known as videoconferencing or video calling) is the use of audio signal, audio and video for simultaneous two-way communication. Today, videotelephony is widespread. There are many terms to refer to videotelephony. ''Vide ...
and online gaming.


Background

The evolution of network engineering is marked by significant milestones that have greatly impacted communication methods. These milestones particularly highlight the progress made in developing communication protocols that are vital to contemporary networking. This discipline originated in the 1960s with projects like ARPANET, which initiated important advancements in reliable data transmission. The advent of protocols such as TCP/IP revolutionized networking by enabling interoperability among various systems, which, in turn, fueled the rapid growth of the Internet. Key developments include the standardization of protocols and the shift towards increasingly complex layered architectures. These advancements have profoundly changed the way devices interact across global networks.


Network infrastructure design

The foundation of computer network engineering lies in the design of the network infrastructure. This involves planning both the physical layout of the network and its logical topology to ensure optimal data flow, reliability, and scalability.


Physical infrastructure

The physical infrastructure consists of the hardware used to transmit data, which is represented by the first layer of the
OSI model The Open Systems Interconnection (OSI) model is a reference model developed by the International Organization for Standardization (ISO) that "provides a common basis for the coordination of standards development for the purpose of systems inter ...
.


Cabling

Copper cables such as
ethernet over twisted pair Ethernet over twisted-pair technologies use twisted-pair cables for the physical layer of an Ethernet computer network. They are a subset of all Ethernet physical layers. Early Ethernet used various grades of coaxial cable, but in 1984, Star ...
are commonly used for short-distance connections, especially in local area networks (LANs), while fiber optic cables are favored for long-distance communication due to their high-speed transmission capabilities and lower susceptibility to interference. Fiber optics play a significant role in the backbone of large-scale networks, such as those used in
data center A data center is a building, a dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommunications and storage systems. Since IT operations are crucial for busines ...
s and
internet service provider An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, no ...
(ISP) infrastructures.


Wireless networks

In addition to wired connections,
wireless network A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking allows homes, telecommunications networks, and business installations to avoid the costly process of introducing cables int ...
s have become a common component of physical infrastructure. These networks facilitate communication between devices without the need for physical cables, providing flexibility and mobility. Wireless technologies use a range of transmission methods, including
radio frequency Radio frequency (RF) is the oscillation rate of an alternating electric current or voltage or of a magnetic, electric or electromagnetic field or mechanical system in the frequency range from around to around . This is roughly between the u ...
(RF) waves,
infrared Infrared (IR; sometimes called infrared light) is electromagnetic radiation (EMR) with wavelengths longer than that of visible light but shorter than microwaves. The infrared spectral band begins with the waves that are just longer than those ...
signals, and laser-based communication, allowing devices to connect to the network.
Wi-Fi Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
based on
IEEE 802.11 IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of medium access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer com ...
standards is the most widely used wireless technology in local area networks and relies on RF waves to transmit data between devices and access points. Wireless networks operate across various
frequency bands Spectral bands are regions of a given spectrum, having a specific range of wavelengths or frequencies. Most often, it refers to electromagnetic bands, regions of the electromagnetic spectrum. More generally, spectral bands may also be means in ...
, including 2.4 GHz and 5 GHz, each offering unique ranges and data rates; the 2.4 GHz band provides broader coverage, while the 5 GHz band supports faster data rates with reduced interference, ideal for densely populated environments. Beyond Wi-Fi, other wireless transmission methods, such as infrared and laser-based communication, are used in specific contexts, like short-range, line-of-sight links or secure
point-to-point communication In telecommunications, a point-to-point connection refers to a communications connection between two communication endpoints or nodes. An example is a telephone call, in which one telephone is connected with one other, and what is said by one c ...
. In mobile networks, cellular technologies like 3G, 4G, and 5G enable wide-area wireless connectivity. 3G introduced faster data rates for mobile browsing, while 4G significantly improved speed and capacity, supporting advanced applications like
video streaming Video on demand (VOD) is a media distribution system that allows users to access videos, television shows and films digitally on request. These multimedia are accessed without a traditional video playback device and a typical static broadcasting ...
. The latest evolution, 5G, operates across a range of frequencies, including millimeter-wave bands, and provides high data rates, low latency, and support for more device connectivity, useful for applications like the
Internet of Things Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
(IoT) and autonomous systems. Together, these wireless technologies allow networks to meet a variety of connectivity needs across local and wide areas.


Network devices

Routers and
switches In electrical engineering, a switch is an electrical component that can disconnect or connect the conducting path in an electrical circuit, interrupting the electric current or diverting it from one conductor to another. The most common type o ...
help direct data traffic and assist in maintaining network security; network engineers configure these devices to optimize traffic flow and prevent
network congestion Network congestion in data networking and queueing theory is the reduced quality of service that occurs when a network node or link is carrying more data than it can handle. Typical effects include queueing delay, packet loss or the blocking of ...
. In wireless networks,
wireless access point In Computer networking device, computer networking, a wireless access point (WAP) (also just access point (AP)) is a networking hardware device that allows other Wi-Fi devices to connect to a wired network or wireless network. As a standalone ...
s (WAP) allow devices to connect to the network. To expand coverage, multiple access points can be placed to create a wireless infrastructure. Beyond Wi-Fi, cellular network components like
base stations Base station (or base radio station, BS) is – according to the International Telecommunication Union's (ITU) Radio Regulations (RR) – a " land station in the land mobile service." A base station is called '' node B'' in 3G, '' eNB'' in LT ...
and
repeater In telecommunications, a repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Some ...
s support connectivity in wide-area networks, while network controllers and firewalls manage traffic and enforce security policies. Together, these devices enable a secure, flexible, and scalable network architecture suitable for both local and wide-area coverage.


Logical topology

Beyond the physical infrastructure, a network must be organized logically, which defines how data is routed between devices. Various topologies, such as
star A star is a luminous spheroid of plasma (physics), plasma held together by Self-gravitation, self-gravity. The List of nearest stars and brown dwarfs, nearest star to Earth is the Sun. Many other stars are visible to the naked eye at night sk ...
,
mesh Medical Subject Headings (MeSH) is a comprehensive controlled vocabulary for the purpose of indexing journal articles and books in the life sciences. It serves as a thesaurus of index terms that facilitates searching. Created and updated by th ...
, and
hierarchical A hierarchy (from Greek: , from , 'president of sacred rites') is an arrangement of items (objects, names, values, categories, etc.) that are represented as being "above", "below", or "at the same level as" one another. Hierarchy is an importan ...
designs, are employed depending on the network’s requirements. In a star topology, for example, all devices are connected to a central hub that directs traffic. This configuration is relatively easy to manage and troubleshoot but can create a single point of failure. In contrast, a mesh topology, where each device is interconnected with several others, offers high redundancy and reliability but requires a more complex design and larger hardware investment. Large networks, especially those in enterprises, often employ a hierarchical model, dividing the network into core, distribution, and access layers to enhance scalability and performance.


Network protocols and communication standards

Communication protocol A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of a physical quantity. The protocol defines the rules, syntax, semantics (computer science), sem ...
s dictate how data in a network is transmitted, routed, and delivered. Depending on the goals of the specific network, protocols are selected to ensure that the network functions efficiently and securely. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite is fundamental to modern computer networks, including the Internet. It defines how data is divided into packets, addressed, routed, and reassembled. The Internet Protocol (IP) is critical for routing packets between different networks. In addition to traditional protocols, advanced protocols such as
Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses. Whereas network addresses identify endpoints, the labels iden ...
(MPLS) and
Segment Routing Segment routing, a form of computer networking, is a modern variant of source routing that is being developed within thSPRINGand IPv6 working groups of the IETF. In a segment routed network, an ingress node may prepend a header to packets that ...
(SR) enhance traffic management and routing efficiency. For intra-domain routing, protocols like
Open Shortest Path First Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single Autonomous syste ...
(OSPF) and
Enhanced Interior Gateway Routing Protocol Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration. The protocol was designed by Cisco Systems as a proprietary p ...
(EIGRP) provide dynamic routing capabilities. On the local area network (LAN) level, protocols like
Virtual Extensible LAN Virtual eXtensible LAN (VXLAN) is a network virtualization technology that uses a VLAN-like encapsulation technique to encapsulate OSI layer 2 Ethernet frames within layer 4 UDP datagrams, using 4789 as the default IANA-assigned destination U ...
(VXLAN) and Network Virtualization using Generic Routing Encapsulation (NVGRE) facilitate the creation of virtual networks. Furthermore, Internet Protocol Security (IPsec) and
Transport Layer Security Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is widely used in applications such as email, instant messaging, and voice over ...
(TLS) secure communication channels, ensuring data integrity and confidentiality. For real-time applications, protocols such as
Real-time Transport Protocol The Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP networks. RTP is used in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applic ...
(RTP) and
WebRTC WebRTC (Web Real-Time Communication) is a free and open-source project providing web browsers and mobile applications with real-time communication (RTC) via application programming interfaces (APIs). It allows audio and video communication and ...
provide low-latency communication, making them suitable for video conferencing and streaming services. Additionally, protocols like
QUIC QUIC () is a general-purpose transport layer network protocol initially designed by Jim Roskind at Google. It was first implemented and deployed in 2012 and was publicly announced in 2013 as experimentation broadened. It was also described at an ...
enhance web performance and security by establishing secure connections with reduced latency.


Network security

As networks have become essential for business operations and personal communication, the demand for robust security measures has increased. Network security is a critical component of computer network engineering, concentrating on the protection of networks against unauthorized access,
data breach A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information". Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage. There ...
es, and various cyber threats. Engineers are responsible for designing and implementing security measures that ensure the integrity and confidentiality of data transmitted across networks. Firewalls serve as barriers between trusted internal networks and external environments, such as the Internet. Network engineers configure firewalls, including next-generation firewalls (NGFW), which incorporate advanced features such as
deep packet inspection Deep packet inspection (DPI) is a type of data processing that inspects in detail the data (Network packet, packets) being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep ...
and application awareness, thereby enabling more refined control over network traffic and protection against sophisticated attacks. In addition to firewalls, engineers use encryption protocols, including Internet Protocol Security (IPsec) and
Transport Layer Security Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is widely used in applications such as email, instant messaging, and voice over ...
(TLS), to secure data in transit. These protocols provide a means of safeguarding sensitive information from interception and tampering. For secure remote access, Virtual Private Networks (VPNs) are deployed, using technologies to create encrypted tunnels for data transmission over public networks. These VPNs are often used for maintaining security when remote users access corporate networks but are also used ion other settings. To enhance threat detection and response capabilities, network engineers implement
Intrusion Detection Systems An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
(IDS) and Intrusion Prevention Systems (IPS). Additionally, they may employ
Security Information and Event Management Security information and event management (SIEM) is a field within computer security that combines security information management (SIM) and security event management (SEM) to enable real-time analysis of security alerts generated by applications an ...
(SIEM) solutions that aggregate and analyze security data across the network.
Endpoint Detection and Response Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is a cybersecurity technology that continually monitors an "endpoint" (e.g. a client device such as a mobile phone, laptop, Internet of things devi ...
(EDR) solutions are also used to monitor and respond to threats at the device level, contributing to a more comprehensive security posture. Furthermore, network segmentation techniques, such as using
VLAN A virtual local area network (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer ( OSI layer 2).IEEE 802.1Q-2011, ''1.4 VLAN aims and benefits'' In this context, virtual refers to a ...
s and
subnet A subnet, or subnetwork, is a logical subdivision of an IP network. Updated by RFC 6918. The practice of dividing a network into two or more networks is called subnetting. Computers that belong to the same subnet are addressed with an identica ...
s are commonly employed to isolate sensitive data and systems within a network. This practice limits the potential impact of breaches and enhances overall security by controlling access to critical resources.


Network performance and optimization

As modern networks grow in complexity and scale, driven by data-intensive applications such as
cloud computing Cloud computing is "a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand," according to International Organization for ...
, high-definition video streaming, and distributed systems, optimizing network performance has become a critical responsibility of network engineers. Network performance and optimization tools aim for scalability, resilience, and efficient resource use with minimal, if any, negative performance impact.


Quality of Service (QoS)

Modern network architectures require more than basic
Quality of Service Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network, or a cloud computing service, particularly the performance seen by the users of the network. To quantitat ...
(QoS) policies. Advanced techniques like service function chaining (SFC) allow engineers to create dynamic service flows, applying specific QoS policies at various points in the traffic path. Additionally, network slicing, widely used in 5G networks, enables custom resource allocation for different service types, aiding high-bandwidth or low-latency services when necessary.


Intelligent load balancing and traffic engineering

Beyond traditional load balancing, techniques such as intent-based networking (IBN) and AI-driven traffic optimization are now implemented to predict and adjust traffic distribution based on usage patterns, network failures, or infrastructure performance. In hybrid cloud infrastructures, Software-Defined WAN (SD-WAN) optimizes connectivity between on-premises and cloud environments, dynamically managing routes and bandwidth allocation. Policies like data center interconnect (DCI) ensure high-performance connections across geographically distributed data centers.


Proactive network monitoring and predictive troubleshooting

Traditional network monitoring tools are supplemented by telemetry streaming and real-time analytics solutions. Intent-based networking systems (IBNS) help automatically identify performance deviations from established service intents, while
predictive maintenance Predictive maintenance techniques are designed to help determine the condition of in-service equipment in order to estimate when maintenance should be performed. This approach claims more cost savings over routine or time-based preventive maint ...
techniques, powered by
machine learning Machine learning (ML) is a field of study in artificial intelligence concerned with the development and study of Computational statistics, statistical algorithms that can learn from data and generalise to unseen data, and thus perform Task ( ...
(ML), allow engineers to detect hardware failures or traffic congestion before they impact users. Self-healing networks, using software-defined networking (SDN), can make automatic adjustments to restore performance without always requiring manual intervention.


Network function virtualization (NFV) and edge computing

With the advent of
network function virtualization Network functions virtualization (NFV) is a network architecture concept that leverages IT virtualization technologies to virtualize entire classes of network node functions into building blocks that may connect, or chain together, to create and de ...
(NFV), engineers can virtualize network functions, such as routing, firewalls, and load balancing. Additionally,
edge computing Edge computing is a distributed computing model that brings computation and data storage closer to the sources of data. More broadly, it refers to any design that pushes computation physically closer to a user, so as to reduce the Latency (engineer ...
brings processing and storage closer to
end user In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product. The end user stands in contrast to users who support or maintain the product, such as sysops, system administrato ...
s, which is relevant to applications requiring low-latency, such as IoT and real-time analytics.


Multipath protocols and application-layer optimization

Multipath transport protocols, such as
Multipath TCP Multipath TCP (MPTCP) is an ongoing effort of the Internet Engineering Task Force's (IETF) Multipath TCP working group, that aims at allowing a Transmission Control Protocol (TCP) connection to use multiple paths to maximize throughput and increa ...
(MPTCP), optimize the use of multiple paths simultaneously, improving high availability and distribution of network load. This can be useful in networks that support redundant connections or where latency must be minimized. Simultaneously, application-layer optimizations focus on fine-tuning traffic at the
software Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital comput ...
level to better deliver data flow across distributed systems, reducing overhead and enhancing
throughput Network throughput (or just throughput, when in context) refers to the rate of message delivery over a communication channel in a communication network, such as Ethernet or packet radio. The data that these messages contain may be delivered ov ...
.


Cloud computing engineering

The advent of cloud computing has introduced new paradigms for network engineering, focusing on the design and optimization of virtualized infrastructures. Network engineers can manage the integration of on-premises systems with cloud services with the intention of improving scalability, reliability, and security.


Cloud network architecture

Cloud network architecture requires the design of virtualized networks that can scale to meet varying demand.
Virtual private cloud A virtual private cloud (VPC) is an on-demand configurable pool of shared resources allocated within a '' public cloud'' environment, providing a certain level of isolation between the different organizations (denoted as ''users'' hereafter) usi ...
(VPC) and hybrid cloud models allow organizations to extend their internal networks into cloud environments, balancing on-premises resources with public cloud services. Cloud interconnect solutions, such as dedicated connections, can minimize latency and optimize data transfer between on-premises and cloud infrastructures.


Software-defined networking (SDN)

Software-defined networking (SDN) is central to cloud networking, enabling centralized control over network configurations. SDN, combined with NFV, allows the management of network resources through software, automating tasks such as load balancing, routing, and firewalling. Overlay networks are commonly employed to create virtual networks on shared physical infrastructure, supporting multi-tenant environments with enhanced security and isolation.


Cloud network security

Cloud security Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud com ...
involves securing data that traverses multiple environments. Engineers implement encryption,
Identity and access management Identity and access management (IAM or IdAM) or Identity management (IdM), is a framework of policies and technologies to ensure that the right users (that are part of the ecosystem connected to or within an enterprise) have the appropriate acce ...
(IAM), and zero trust architectures to protect cloud networks. Firewalls, intrusion detection systems, and cloud-native security solutions monitor and safeguard these environments. Micro-segmentation is used to isolate workloads and minimize the attack surface, while VPNs and IPsec tunnels secure communication between cloud and on-premises networks.


Performance optimization

Optimizing network performance in the cloud is relevant for applications requiring low latency and high throughput. Engineers deploy
content delivery network A content delivery network (CDN) or content distribution network is a geographically distributed network of proxy servers and their data centers. The goal is to provide high availability and performance ("speed") by distributing the service spat ...
s to reduce latency and configure dedicated connections, and traffic engineering policies ensure optimal routing between cloud regions.


Tools and protocols

Cloud networking relies on protocols such as VXLAN and Generic Routing Encapsulation (GRE) to facilitate communication across virtualized environments. Automation tools enable Infrastructure As Code (IaC) practices, allowing for more scalable and consistent deployment of cloud network configurations.


Emerging trends

Network engineering is rapidly evolving, driven by advancements in technology and new demands for connectivity. One trend is the integration of
artificial intelligence Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of re ...
(AI) and machine learning (ML) into network management. AI-powered tools are increasingly used for network automation and optimization, predictive analytics, and intelligent fault detection. AI's role in
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
is also expanding, where it is used to identify and mitigate threats by analyzing patterns in network behavior. The development of quantum networking offers the potential for highly secure communications through
quantum cryptography Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution, which offers an information-theoretically secure soluti ...
and
quantum key distribution Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key known only to them, which then can b ...
(QKD). Quantum networking is still in experimental stages. Space-based internet systems are also a growing trend in network engineering. Projects involving
low Earth orbit A low Earth orbit (LEO) is an geocentric orbit, orbit around Earth with a orbital period, period of 128 minutes or less (making at least 11.25 orbits per day) and an orbital eccentricity, eccentricity less than 0.25. Most of the artificial object ...
(LEO)
satellite constellation A satellite constellation is a group of artificial satellites working together as a system. Unlike a single satellite, a constellation can provide permanent global or near-global pass (spaceflight), coverage, such that at any time everywhere on E ...
s, like
SpaceX Space Exploration Technologies Corp., commonly referred to as SpaceX, is an America, American space technology company headquartered at the SpaceX Starbase, Starbase development site in Starbase, Texas. Since its founding in 2002, the compa ...
's
Starlink Starlink is a satellite internet constellation operated by Starlink Services, LLC, an international telecommunications provider that is a wholly owned subsidiary of American aerospace company SpaceX, providing coverage to around 130 countries ...
, aim to extend Internet access to remote and underserved areas. In the future, the rollout of 6G networks may improve data transfer rates, latency, and connectivity. 6G is expected to support new technologies such as real-time
holographic Holography is a technique that allows a wavefront to be recorded and later reconstructed. It is best known as a method of generating three-dimensional images, and has a wide range of other uses, including data storage, microscopy, and interfe ...
communication, virtual environments, and AI-driven applications. These advancements will most likely require new approaches to
spectrum management Spectrum management is the process of regulating the use of radio frequencies to promote efficient use and gain a net social benefit.Martin Cave, Chris Doyle, William Webb, ''Modern Spectrum Management'', Cambridge University Press, 2007 The ter ...
, energy efficiency, and sustainable infrastructure design to meet the projected growth of spending on
digital transformation Digital transformation (DT) is the process of adoption and implementation of digital technology by an organization in order to create new or modify existing products, services and operations by the means of translating business processes into a d ...
.


IoT

The Internet of Things (IoT) is a central theme discussed in this review paper. It represents a comprehensive framework addressing various challenges associated with connecting the internet and the physical world. Currently, the internet plays a vital role in daily life, significantly transforming human experiences. A key aspect of this technological advancement is the integration of multiple technologies with communication systems. One of the most crucial applications of IoT includes the identification and tracking of smart objects. Wireless Sensing Networks (WSN) enable universal sensing mechanisms, impacting many facets of contemporary living. The growth of these devices within a communicative and responsive network will ultimately form the Internet of Things. In this context, sensors and actuators seamlessly interact with the surrounding environment, facilitating information sharing across various platforms to develop a common operating picture (COP). The IoT envisions a future where the digital and physical domains are interconnected through advanced information and wireless communication technologies. This survey outlines the visions, concepts, technologies, challenges, innovative directions, and applications of the Internet of Things (IoT).


References

{{Engineering fields Networks Computer networks Computer engineering Computer networks engineering Engineering disciplines