Abstract
The new technology demands and rapid utilization of Information technology (IT) have been increasing day by day, in all over the world. The growing demands of advance Information technology (IT) infrastructures within several Industries and organizations, and the implementation of non-propriety protocols with propriety protocols , caused major performance issues in the terms of communication, data exchange and security. In this proposal, detail survey has been conducted that is based on several computer or/and Information technology (IT) networks deployment with their security requirements and issues. The proposed research thoroughly study the implementations related with communication networks included local area network (LAN) and wide area network (WAN) as part of traditional networks, mobile networks, real time networks and cloud computing networks. Also study the existing Implementations of common protocols that have been used during communication (network communication). This research reviews the exiting implementations related with propriety and non-propriety protocols within networks infrastructures with security implementations. After reviewed the exiting work or implementations in detail, this research proposal proposed a generic model to overcome the communication issues, security weaknesses and proper implementation of security mechanisms with proper placement. The proposed model also tries to overcome the issues that have been situated between real time protocols and traditional protocols during communication.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.