With the extensive proliferation of the internet and convergence of IT & Communication Technologies, more and more people are networked and business processes are also automated and interlinked. Such a scenario makes the need for very reliable data security measures indispensable both during storage of data as well as during transmission. To ensure data security and business integrity in a networked world, extensive research and technological development is being carried out in the industry as well as in academics.

y Network Security& Techniques:Protecting the computer systems in the network
from unwanted intrusions and unauthorized access. Network Security Threats:There are many network security threats spread on the internet today. Some of the common threats are:
y y y y y y y

Viruses, worms, and Trojan horses Spy-ware and adware Zero-day attacks, also called zero-hour attacks Hacker attacks Denial of service attacks Data interception and theft Identity theft

y Routing and Switching Techniques. Basic switching techniques
y y y y

Circuit switching (CS) Store-and-forward (SF) switching Virtual cut-through (VCT) switching Wormhole (WH) switching

y Encryption Techniques and Cryptography. y Steganography (Data Hiding in image, audio, video). y Data Security. y Cross Layer Design. y Coding and modulation Techniques. y Wireless Communication (Bluetooth, Infrared, Hybrid Network, Access Techniques and Security). y Biometrics. y Privacy Preserving Access Control

3G is starting to reach widespread use. VDI technology provides companies with a true winwin with: . Virtual Desktop Infrastructure (VDI) brings virtualization to the desktop environment delivering enterprise-class control and manageability while maintaining the familiar end-user environment. VDI virtualizes desktop images that can be deployed from a centralized hosting server. maintenance and software licensing. Enterprises today are seeking economic sensible solutions without creating new learning curves for the end user. 4G remains in its infancy. also known as single-fabric networking.EMERGIN TRENDS IN COMPUTER NETWORK: In networking it s certainly all about mobility and the underlying strategies supporting it. 1:VDI: Desktop computing is a core technology in IT infrastructures offering enormous flexibility and mobility but at high operational costs in IT support. Only 19 percent say that network virtualization is not at all on their radar. By contrast. while another 24 percent say they re evaluating or tracking it. which is already in use in 41 percent of the organizations we surveyed. This provides the reduction of operational costs and improved security while maintaining the current end user experience ² no learning curve. In addition. The real surprise here is network virtualization. help desk. 17 percent of respondents say they re currently testing or piloting network virtualization.

Additional cost savings come from central management and deployment of applications and updates. and. 2: Cloud Security: Cloud computing security (sometimes referred to simply as "cloud security") is an evolving sub-domain of computer security. Need for better access control and identity management. 4. Public cloud services may be free or offered on a pay-per-usage model. Smart phone data slinging .y y y Cost Efficiency Green Solution Improved Manageability VDI provides the end user with a virtual PC that looks and behaves exactly like their current PC whether working at the office. Ongoing compliance concerns. The user¶s profile and files are stored centrally so there is no need to carry around files. and the associated infrastructure of cloud computing. technologies. applications. 3: Private cloud: Private cloud (also called internal cloud or corporate cloud) is a marketing term for a proprietary computing architecture that provides hosted services to a limited number of people behind a firewall. 2. and controls deployed to protect data. network security. VDI provides the ability to consolidate the number of servers supporting desktops resulting in cost savings. For IT. in which a service provider makes resources. Emergence of cloud standards and certifications. 5. such as applications and storage. It refers to a broad set of policies. 4: Public Cloud: A public cloud is one based on the standard cloud computing model. 3. Cloud security issues in 2011: 1. Risk of multiple cloud tenants. available to the general public over the Internet. . information security. eliminating mundane trips to the user¶s desk for break/fix improving the work experience for IT and HelpDesk personnel. more broadly. while traveling or at home.

Expected issues considered to be resolved in this 4G mobile technology are as follows. and instantly move into vacant channels while avoiding occupied ones. 3G mobile technologies have been developed into iPhone presently with added features is known as Smartphone. 6:OFDM Based 4G Cellular Standards: Orthogonal Frequency Division Multiplexing (OFDM) is the cutting edge physical layer technology slated to be employed in the forthcoming 4G wireless cellular standards such as 3GPP Long Term Evolution (LTE/LTEA). In OFDMA. the concept is again of division multiple accesses but this is neither time like TDMA nor code divided CDMA rather frequency domain equalization process symbolizes as OFDMA. y 4G mobile technology is going to be able to download at a rate of 100Mbps like mobile access and less mobility of 1GBps for local access of wireless y Instead of hybrid technology used in 3G with the combination of CDMA and IS-95 a new technology OFDMA is introduced 4G. This optimizes the use of available radio-frequency (RF) spectrum while minimizing interference to other users. Third generation mobile phones having the features of high speed data transfer rate. Bluetooth and gaming are very thrilling. First and foremost priority is giving to the security issue. SMS. mobile internet. y It is considered to embed IP feature in the set for more security purpose as high data rates are send and receive through the phone using 4G mobile technology. EMERGING TRENDS IN TELICOM NETWORK MANAGEMENT: . high speed internet access. Many changes rather improvements are expected in the coming 4G mobile technology. Now people are breathtakingly waiting for the 4G mobile technology. Such 4G cellular standards are envisaged to support data rates in excess of 100 Mbps through MIMO. HDTV on demand. MMS. interactive gaming amongst others. video calling. Worldwide Interoperability for Microwave Access (WiMAX) and high speed WLAN standards. 5:cognitive radio: Cognitive radio (CR) is a form of wireless communication in which a transceiver can intelligently detect which communication channels are in use and which are not. Such factors are driving the wireless telecommunication designers and operators to invest heavily in the development of OFDM compatible technologies and applications with the aim of tapping into the potentially vast revenue opportunity in futuristic 4G cellular networks. At the same time there is a tremendous effort towards fixed mobile convergence to enable seamless mobility across future WLAN and cellular networks.4G: 4G Mobile Technology is in progress and still not set standards are defined. dynamic carrier aggregation and thus enable a diverse plethora of applications in the wireless ecosystem such as broadcast/multicast video. International Telecommunication Union using Radio defined 4G mobile technology as IMT-Advanced (International Mobile telecommunication Advanced).