Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions
Abstract
:1. Introduction
- 1.
- Summary of traditional and state-of-the-art enterprise networking technologies and the impact on organizational transformation.
- 2.
- Discussion of the challenges and opportunities of enterprise networks, with special focus on security challenges and their limitations towards achieving seamless and reliable network connectivity.
- 3.
- Presentation of new trends and potential future research directions in the deployment of enterprise networks for next-generation business solutions.
2. Enterprise Networking Architecture
2.1. Access Layer
2.2. Distribution Layer
2.3. Core Layer
2.4. The Enterprise Campus
2.5. The Enterprise Edge
2.6. The Service Provider Edge
3. Benefits of an Optimized Enterprise Network System
3.1. Drive Towards Efficiency and Productivity
3.2. Enhanced Security Provisioning
3.3. Reduced IT Downtime
3.4. Cost Minimization
3.5. Effective Cloud Integration
4. Enterprise Network Functionality
4.1. Data Flow and Communication Protocols
4.2. Centralized Management with SDN
4.3. Embedded Security Architecture: Zero Trust and SASE
4.3.1. Zero Trust Network Architecture
4.3.2. Secure Access Service Edge
4.4. Cloud and Multi-Cloud Integration
4.5. Network Monitoring and AI-Driven Analytics
4.6. Network Virtualization and Cloud-Managed Networking
5. New Trends and Future Research Directions in Enterprise Networking
5.1. SD-WAN
Category | Survey Techniques | Challenges | Solutions & Performance | Technological Interventions |
---|---|---|---|---|
Security-based Techniques | Intrusion Detection and Prevention (IDPS), VPNs | High false positive rates, low detection latency | AI-driven threat detection [53,54], automated mitigation, Improved WAN optimization [4,37,72] | Deep learning-based intrusion detection [6], early network monitoring tools [74] |
Zero Trust Network Architecture (ZTNA) | Implementation complexity, integration with legacy systems | Micro-segmentation [67], continuous authentication [8] | Cloud-native Zero Trust [81] | |
Cybersecurity Mesh Architecture (CSMA) | Data inconsistency, real-time analysis difficulty | Data aggregation and tool integration [89], threat intelligence [90] | Threat-sharing platforms [91], federated learning for cybersecurity [39] | |
Cloud and SDN-based interventions | Cloud Networking | Security breaches, Cost management | Multi-cloud strategies [92], hybrid cloud security models [38] | Software-defined cloud networking, SASE [4,69] |
Software-Defined Networking (SDN) | Control plane vulnerabilities, compatibility issues | Open-source SDN controllers [93], policy-based automation [83] | AI-driven network orchestration [65], intent-based networking [94] | |
Cloud and SDN-based interventions | Software-Defined WAN (SD-WAN) | Complexity in deployment, security risks, high power consumption | AI-based traffic routing [95], AI-driven integrated security SASE [72], Energy-saving control [80], Ultra-low latency [88] | Cloud-native SD-WAN [84,85], Hybrid & Multi-cloud networking [37,38], AI-based optimization [75] |
AI-Driven and Automation solutions | AI-based network Optimization | High computational costs, trustworthiness of AI decisions | Federated learning [39], cloud-based AI platforms [74] | Predictive analytics [75], real-time network self-healing [1,75] |
Edge Computing, Network automation | Difficult policy translation, scalability concerns | Adaptive control mechanisms [43] | AI-powered policy automation [96,97] | |
Self-Healing Networks | Complexity in automation, fault prediction accuracy | Reinforcement learning models [77] | Autonomous networks & Self-configuring AI agents [76] |
5.2. Network Automation
5.3. Hybrid and Multi-Cloud Networking
5.4. Network-as-a-Service (NaaS)
5.5. Edge Computing and 5G Integration
5.6. Cybersecurity Mesh Architecture (CSMA)
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
API | Application Programming Interface |
ASN | Autonomous System Number |
BGP | Border Gateway Protocol |
CASB | Cloud Access Security Broker |
CSMA | Cybersecurity Mesh Architecture |
ECNM | Enterprise Composite Network Model |
FaaS/FWaaS | Firewall-as-a-Service |
IaaS | Infrastructure-as-a-Service |
IAM | Identity and Access Management |
ISP | Internet Service Provider |
IoT | Internet of Things |
IT | Information Technology |
LAN | Local Area Network |
ML | Machine Learning |
MPLS | Multiprotocol Label Switching |
NaaS | Network-as-a-Service |
NPM | Network Performance Management |
OSPF | Open Shortest Path First |
PaaS | Platform-as-a-Service |
PDP/PEP | Policy Decision/Enhancement Point |
PSTN | Public Switched Telephone Network |
QoS | Quality of Service |
SaaS | Software-as-a-Service |
SASE | Secure Access Service Edge |
SDN | Software-Defined Networking |
SD-WAN | Software-Defined Wide Area Network |
SWG | Secure Web Gateway |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TLS | Transport Layer Security |
UCPE | Universal Customer Pemises Equipment |
VLANs | Virtual LANs |
VPNs | Virtual Private Networks |
WAN | Wide Area Network |
ZTNA | Zero Trust Network Access |
References
- Prangon, N.F.; Wu, J. AI and Computing Horizons: Cloud and Edge in the Modern Era. J. Sens. Actuator Netw. 2024, 13, 44. [Google Scholar] [CrossRef]
- Eshmurodov, A. Innovations in IT: Shaping the Future of Digital Transformation. Am. J. Eng. Mech. Archit. 2024, 2, 118–125. [Google Scholar]
- Wehner, B.; Ritter, C.; Leist, S. Enterprise social networks: A literature review and research agenda. Comput. Netw. 2017, 114, 125–142. [Google Scholar] [CrossRef]
- Nadaf, S.M.; Rath, H.K.; Simha, A. A novel approach for an enterprise network transformation and optimization. In Proceedings of the 2012 Annual IEEE India Conference (INDICON), Kochi, India, 7–9 December 2012; pp. 317–322. [Google Scholar]
- Velayutham, A. Secure Access Service Edge (SASE) Framework in Enhancing Security for Remote Workers and Its Adaptability to Hybrid Workforces in the Post-Pandemic Workplace Environment. Int. J. Soc. Anal. 2023, 8, 21. [Google Scholar]
- Sathupadi, K. A hybrid deep learning framework combining on-device and cloud-based processing for cybersecurity in mobile cloud environments. Int. J. Inf. Cybersecur. 2023, 7, 61–80. [Google Scholar]
- Zohaib, S.M.; Sajjad, S.M.; Iqbal, Z.; Yousaf, M.; Haseeb, M.; Muhammad, Z. Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work. Information 2024, 15, 734. [Google Scholar] [CrossRef]
- Rose, S.; Borchert, O.; Mitchell, S.; Connelly, S. Zero Trust Architecture; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [CrossRef]
- Chandramouli, R. Guide to a Secure Enterprise Network Landscape; US Department of Commerce, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022.
- Souppaya, M.; Scarfone, K. Guide to enterprise telework, remote access, and bring your own device (BYOD) security. NIST Spec. Publ. 2016, 800, 46. [Google Scholar]
- Shin, B. A Practical Introduction to Enterprise Network and Security Management; Auerbach Publications: Boca Raton, FL, USA, 2021. [Google Scholar]
- Iskandar, A.I.; Arham, A.F.; Shohaime, N. The use of social media, e-mail and instant messaging as the predictors of an employee’s work performance. J. Acad. 2017, 5, 127–136. [Google Scholar]
- Cascio, W.F.; Montealegre, R. How technology is changing work and organizations. Annu. Rev. Organ. Psychol. Organ. Behav. 2016, 3, 349–375. [Google Scholar] [CrossRef]
- Raza, M. Enterprise Networking Explained: Types, Concepts and Trends. 2021. Available online: https://www.bmc.com/blogs/enterprise-networking/ (accessed on 16 December 2024).
- Wen, Y. Enterprise IP LAN/WAN Design, The System Admin. Company (TAOS), Version 1.1, 2001. Available online: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=0b3bc2def28f31309c0cb3250576bbf0be29b45a (accessed on 16 December 2024).
- Iftikhar, A.; Qureshi, K.N.; Shiraz, M.; Albahli, S. Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review. J. King Saud-Univ.-Comput. Inf. Sci. 2023, 35, 101788. [Google Scholar] [CrossRef]
- Lv, H.; Zhang, Y.; Li, H.; Chang, W. Security Assessment of Enterprise Networks Based on Analytic Network Process and Evidence Theory. In Proceedings of the 2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM), Manchester, UK, 23–25 October 2021; pp. 305–313. [Google Scholar]
- Hosam, O.; Abousamra, R.; Hassouna, M.; Azzawi, R. Security Analysis and Planning for Enterprise Networks: Incorporating Modern Security Design Principles. In Industry 4.0 Key Technological Advances and Design Principles in Engineering, Education, Business, and Social Applications; CRC Press: Boca Raton, FL, USA, 2024; pp. 85–117. [Google Scholar]
- Palanivel, K. Modern network analytics architecture stack to enterprise networks. Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET) 2019, 7, 2634–2651. [Google Scholar] [CrossRef]
- Weerasinghe, B. Modern Network Management and Security within Large Enterprise Network; University of Sri Jayewardenepura: Nugegoda, Sri Lanka, 2020; p. 5. [Google Scholar]
- Onu, F.; C, I. Comparative Study of Optic Fibre and Wireless Technologies in Internet Connectivity. Int. J. Comput. Appl. Technol. Res. 2016, 5, 403–411. [Google Scholar] [CrossRef]
- Jyothi, K.K.; Reddy, B.I. Study on virtual private network (VPN), VPN’s protocols and security. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2018, 3, 919–932. [Google Scholar]
- Nemmi, E.N.; Sassi, F.; La Morgia, M.; Testart, C.; Mei, A.; Dainotti, A. The parallel lives of autonomous systems: ASN allocations vs. BGP. In Proceedings of the the 21st ACM Internet Measurement Conference, Virtual Event, 2–4 November 2021; pp. 593–611. [Google Scholar]
- Awasthi, A. Network Classification for an Enterprise. Int. J. Sci. Res. (IJSR) 2020, 9, 635–637. [Google Scholar]
- Seneviratne, S.; de Silva, R. Framework for Enterprise Local Area Network Design: An Object-Connectivity Approach. In Proceedings of the 10th International Conference on Information Technology Convergence and Services (ITCSE 2021), Sydney, Australia, 26–27 June 2021; Volume 11. [Google Scholar]
- Mo, Z. Small and Medium-Sized Enterprise Office LAN Construction Scheme. In Proceedings of the International Conference on Education, Management, Computer and Society, Shenyang, China, 1–3 January 2016; Atlantis Press: Dordrecht, The Netherlands, 2016; pp. 1149–1151. [Google Scholar]
- Dr, N.; Hussain, R. A exploration of Multi-Protocol Label Switching (MPLS) network: A review. J. Crit. Rev. 2020, 7, 2664–2671. [Google Scholar]
- Srivastava, S.; Singh, J.P. Efficiency of Multi-Protocol LABEL Switching over Traditional Switching. In Proceedings of the 2021 5th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 22–23 October 2021; pp. 1–4. [Google Scholar]
- Goutam, S.; Goutam, A. Recent Trends in Deployment of Multi-Protocol Label Switching (MPLS) Networks in Universities. In Global Higher Education Practices in Times of Crisis: Questions for Sustainability and Digitalization; Emerald Publishing Limited: Bingley, UK, 2024; pp. 255–269. [Google Scholar]
- Saxena, R.; Patel, A.S. Generalized Multi-protocol Label Switching based Virtualization for Cloud Computing. In Proceedings of the 2022 International Conference on Connected Systems & Intelligence (CSI), Trivandrum, India, 31 August–2 September 2022; pp. 1–8. [Google Scholar]
- Mwape, J.C. Performance Evaluation of Internet Protocol Security (IPSec) over Multiprotocol Label Switching (MPLS). Ph.D. Thesis, The University of Zambia, Lusaka, Zambia, 2024. [Google Scholar]
- Guo, Y. Transformation from On-Premise Software to Cloud Computing-Based Services: A Case Study of SAP Practices; The University of Manchester (United Kingdom): Manchester, UK, 2021. [Google Scholar]
- Wescott, A.P. Analysis of On-Premise Data Center Transition; Capitol Technology University: Laurel, MD, USA, 2020. [Google Scholar]
- Khan, H.U.; Samad, H.S.I.A. Enterprise strategic shift of technology: Cloud-based systems verses traditional distributed system. Int. J. Enterp. Netw. Manag. 2020, 11, 320–346. [Google Scholar] [CrossRef]
- Kajati, E.; Papcun, P.; Liu, C.; Zhong, R.Y.; Koziorek, J.; Zolotova, I. Cloud based cyber-physical systems: Network evaluation study. Adv. Eng. Inform. 2019, 42, 100988. [Google Scholar] [CrossRef]
- Ganesh, C.; Saran, A.; Flora, G.D.; Saravanan, M. A cloud-based router management system for enterprise network management. In Proceedings of the 2022 International Conference on Computer, Power and Communications (ICCPC), Chennai, India, 14–16 December 2022; pp. 153–157. [Google Scholar]
- Nair, R.R.; Sreevidya, D.; Mohan, C.R.; Banerjee, J.; Chouhan, K.; Dharamvir. Comprehensive Approaches to Securing Multi-Cloud Architectures: Best Practices and Emerging Solutions. In Proceedings of the 2024 IEEE 7th International Conference on Contemporary Computing and Informatics (IC3I), Greater Noida, India, 18–20 September 2024; pp. 1631–1636. [Google Scholar]
- Maxwell, R. The Challenges of Enterprise-Scale Hybrid and Multi-cloud Architectures. In Azure Arc Systems Management: Governance and Administration of Multi-Cloud and Hybrid IT Estates; Springer: Berlin/Heidelberg, Germany, 2024; pp. 1–13. [Google Scholar]
- Merseedi, K.J.; Zeebaree, S.R. The cloud architectures for distributed multi-cloud computing: A review of hybrid and federated cloud environment. Indones. J. Comput. Sci. 2024, 13. [Google Scholar] [CrossRef]
- Shukla, A.; Patel, J.; Panzade, K.; Sardana, H. Cisco Cloud Infrastructure; Cisco Press: San Jose, CA, USA, 2023. [Google Scholar]
- Alsowail, R.A.; Al-Shehari, T. A multi-tiered framework for insider threat prevention. Electronics 2021, 10, 1005. [Google Scholar] [CrossRef]
- CCNA Discovery Learning Guide. Designing and Supporting Computer Networks 2008. Available online: https://ptgmedia.pearsoncmg.com/images/9781587132117/samplepages/1587132117_Sample.pdf (accessed on 16 December 2024).
- Karakus, M.; Durresi, A. A survey: Control plane scalability issues and approaches in software-defined networking (SDN). Comput. Netw. 2017, 112, 279–293. [Google Scholar] [CrossRef]
- da Costa Cordeiro, W.L.; Marques, J.A.; Gaspary, L.P. Data plane programmability beyond openflow: Opportunities and challenges for network and service operations and management. J. Netw. Syst. Manag. 2017, 25, 784–818. [Google Scholar]
- Hamroz, M. Enterprise Campus Design: Multilayer Architectures and Design Principles, 2023. Available online: https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2023/pdf/BRKENS-2031.pdf (accessed on 16 December 2024).
- Reid, A.; Lorenz, J.; Schmidt, C.A. Introducing Routing and Switching in the Enterprise, CCNA Discovery Learning Guide; Cisco Press: San Jose, CA, USA, 2008. [Google Scholar]
- Academy, C.N. Connecting Networks Companion Guide; WebEx Communications; Pearson Education: London, UK, 2014; p. 576. [Google Scholar]
- Communications, T. What Is a Core Network and How Does It Work? 2024. Available online: https://www.tatacommunications.com/knowledge-base/network-core-network-explained/ (accessed on 16 December 2024).
- Andrieiev, O. Enterprise Networking Explained: Type, Benefits and Trends. 2024. Available online: https://jelvix.com/blog/what-is-enterprise-networking (accessed on 12 March 2025).
- Ayegba, J.O.; Lin, Z.L. An overview on enterprise networks and company performance. Int. Entrep. Rev. 2020, 6, 7–16. [Google Scholar]
- Nikitina, N. The concept of increasing the efficiency of the enterprise in modern conditions. E3S Web Conf. 2023, 389, 09003. [Google Scholar]
- Rashmi Shree, V.; Antony, Z.C.; Jayapandian, N. Enhanced Data Security Architecture in Enterprise Networks. In Proceedings of the International Conference on Computer Networks, Big Data and IoT (ICCBI-2018), Madurai, India, 19–20 December 2018; pp. 857–864. [Google Scholar]
- Lyu, M.; Gharakheili, H.H.; Sivaraman, V. A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection. IEEE Access 2024, 12, 89363–89383. [Google Scholar]
- Mishra, A. Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods (English Edition); BPB Publications: Noida, India, 2022. [Google Scholar]
- Wang, S.S.; Franke, U. Enterprise IT service downtime cost and risk transfer in a supply chain. Oper. Manag. Res. 2020, 13, 94–108. [Google Scholar]
- Osemwengie, L.; Jafari, F.; Karami, A. Designing a Cost-Efficient Network for a Small Enterprise. In Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 1; Springer: Berlin/Heidelberg, Germany, 2022; pp. 255–273. [Google Scholar]
- Mollahoseini Ardakani, M.R.; Hashemi, S.M.; Razzazi, M. A cloud-based solution/reference architecture for establishing collaborative networked organizations. J. Intell. Manuf. 2019, 30, 2273–2289. [Google Scholar]
- Jia, D.; Wu, Z. Enterprise collaborative integrated management system based on IoT cloud technology. Mob. Inf. Syst. 2022, 2022, 6098201. [Google Scholar]
- Fernando, C. Building Enterprise Software Systems with Hybrid Integration platforms. In Solution Architecture Patterns for Enterprise: A Guide to Building Enterprise Software Systems; Springer: Berlin/Heidelberg, Germany, 2022; pp. 109–146. [Google Scholar]
- Lowe, S.D.; Green, J.; Davis, D. Building a Modern Data Center; ActualTech Media: Bluffton, SC, USA, 2016; pp. 103–157. [Google Scholar]
- Nath, P.B.; Uddin, M.M. Tcp-ip model in data communication and networking. Am. J. Eng. Res. 2015, 4, 102–107. [Google Scholar]
- Miajee, M.R.K. Network layer: TCP/IP Model. Am. Int. J. Sci. Eng. Res. 2018, 1, 22–25. [Google Scholar]
- Shahid, K.; Ahmad, S.N.; Rizvi, S.T.H. Optimizing Network Performance: A Comparative Analysis of EIGRP, OSPF, and BGP in IPv6-Based Load-Sharing and Link-Failover Systems. Future Internet 2024, 16, 339. [Google Scholar] [CrossRef]
- Nisar, K.; Jimson, E.R.; Hijazi, M.H.A.; Welch, I.; Hassan, R.; Aman, A.H.M.; Sodhro, A.H.; Pirbhulal, S.; Khan, S. A survey on the architecture, application, and security of software defined networking: Challenges and open issues. Internet Things 2020, 12, 100289. [Google Scholar]
- Bernini, G.; Piscione, P.; Seder, E. AI-driven Service and Slice Orchestration. In Shaping the Future of IoT with Edge Intelligence; River Publishers: Aalborg, Denmark, 2024; p. 15. [Google Scholar]
- Yan, X.; Wang, H. Survey on zero-trust network security. In Proceedings of the Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, 17–20 July 2020; Proceedings, Part I 6. Springer: Berlin/Heidelberg, Germany, 2020; pp. 50–60. [Google Scholar]
- Basta, N.; Ikram, M.; Kaafar, M.A.; Walker, A. Towards a zero-trust micro-segmentation network security strategy: An evaluation framework. In Proceedings of the NOMS 2022–2022 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 25–29 April 2022; pp. 1–7. [Google Scholar]
- Seiffert, A. Secure Access Service Edge (SASE): Transforming Network and Security 2021. Available online: https://www.cancom.at/_Resources/Persistent/f83d7d9927c6003fb271aaa16fe9f8a859475c0d/PaloAltoExpertForum_SASE%203.0.pdf (accessed on 12 March 2025).
- Yiliyaer, S.; Kim, Y. Secure access service edge: A zero trust based framework for accessing data securely. In Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 26–29 January 2022; pp. 0586–0591. [Google Scholar]
- Fopa Mamene, M. Secure Access Service Edge (SASE): Architecture, Implementation and Performance Evaluation. Ph.D. Thesis, Hochschule Rhein-Waal, Kleve, Germany, 2024. [Google Scholar]
- Huang, J.; Sun, J.; Yuan, X.; Zheng, Z. Intelligent Connectivity Solution for Enterprise Networking Services. In Proceedings of the 3rd International Conference on Digital Economy and Computer Application (DECA 2023), Shanghai, China, 22–24 September 2023; Atlantis Press: Dordrecht, The Netherlands, 2023; pp. 660–668. [Google Scholar]
- Gundu, S.R.; Panem, C.A.; Thimmapuram, A. Hybrid IT and multi cloud an emerging trend and improved performance in cloud computing. SN Comput. Sci. 2020, 1, 256. [Google Scholar]
- Dickinson, M.; Debroy, S.; Calyam, P.; Valluripally, S.; Zhang, Y.; Antequera, R.B.; Joshi, T.; White, T.; Xu, D. Multi-cloud performance and security driven federated workflow management. IEEE Trans. Cloud Comput. 2018, 9, 240–257. [Google Scholar]
- Li, F.; Xu, G. AI-driven customer relationship management for sustainable enterprise performance. Sustain. Energy Technol. Assess. 2022, 52, 102103. [Google Scholar]
- Papaioannou, A.; Dimara, A.; Kouzinopoulos, C.S.; Krinidis, S.; Anagnostopoulos, C.N.; Ioannidis, D.; Tzovaras, D. LP-OPTIMA: A Framework for Prescriptive Maintenance and Optimization of IoT Resources for Low-Power Embedded Systems. Sensors 2024, 24, 2125. [Google Scholar] [CrossRef] [PubMed]
- Dimara, A.; Vasilopoulos, V.G.; Papaioannou, A.; Angelis, S.; Kotis, K.; Anagnostopoulos, C.N.; Krinidis, S.; Ioannidis, D.; Tzovaras, D. Self-healing of semantically interoperable smart and prescriptive edge devices in IoT. Appl. Sci. 2022, 12, 11650. [Google Scholar] [CrossRef]
- Avgeris, M.; Leivadeas, A.; Lambadaris, I. A reinforcement-learning self-healing approach for virtual network function placement. In Proceedings of the NOMS 2023–2023 IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, 8–12 May 2023; pp. 1–5. [Google Scholar]
- Fowler, B. Cloud network engineering. In AWS for Public and Private Sectors: Cloud Computing Architecture for Government and Business; Springer: Berlin/Heidelberg, Germany, 2023; pp. 23–41. [Google Scholar]
- Anicho, O.; Abdullah, T. Impact of Cloud-based Infrastructure on Telecom Managed Services Models. Data Sci. J. Comput. Appl. Inform. 2020, 4, 71–88. [Google Scholar]
- Saxena, S.; Khan, M.Z.; Singh, R. Green computing: An era of energy saving computing of cloud resources. Int. J. Math. Sci. Comput. 2021, 7, 42–48. [Google Scholar]
- Tomar, M.; Ramalingam, S.; Krishnaswamy, P. Cloud-Native Enterprise Platform Engineering: Building Scalable, Resilient, and Secure Cloud Architectures for Global Enterprises. Aust. J. Mach. Learn. Res. Appl. 2023, 3, 601–639. [Google Scholar]
- Segeč, P.; Moravčik, M.; Uratmová, J.; Papán, J.; Yeremenko, O. SD-WAN-architecture, functions and benefits. In Proceedings of the 2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA), Košice, Slovenia, 12–13 November 2020; pp. 593–599. [Google Scholar]
- Arzo, S.T.; Naiga, C.; Granelli, F.; Bassoli, R.; Devetsikiotis, M.; Fitzek, F.H. A theoretical discussion and survey of network automation for IoT: Challenges and opportunity. IEEE Internet Things J. 2021, 8, 12021–12045. [Google Scholar]
- Troia, S.; Zorello, L.M.M.; Maralit, A.J.; Maier, G. SD-WAN: An open-source implementation for enterprise networking services. In Proceedings of the 2020 22nd International Conference on Transparent Optical Networks (ICTON), Bari, Italy, 19–23 July 2020; pp. 1–4. [Google Scholar]
- Troia, S.; Zorello, L.M.M.; Maier, G. SD-WAN: How the control of the network can be shifted from core to edge. In Proceedings of the 2021 International Conference on Optical Network Design and Modeling (ONDM), Gothenburg, Sweden, 28 June–1 July 2021; pp. 1–3. [Google Scholar]
- Wang, J.; Bewong, M.; Zheng, L. SD-WAN: Hybrid Edge Cloud Network between Multi-site SDDC. Comput. Netw. 2024, 250, 110509. [Google Scholar]
- Ashok, P.; Hallur, G. Demystifying Domain-Specific Key Drivers in Telecom Technologies. In Proceedings of the 2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS), Chennai, India, 14–15 December 2023; pp. 1–9. [Google Scholar]
- Qin, Z. SD-WAN for Bandwidth and Delay Improvements on the Internet. In SHS Web of Conferences; EDP Sciences: Les Ulis, France, 2022; Volume 144, p. 02004. [Google Scholar]
- Sullivan, D. Cybersecurity Mesh Architecture For Dummies, Fortinet Special Edition; Fortinet Publication: Sunnyvale, CA, USA, 2023. [Google Scholar]
- McLaughlin, K. Interweaving the Strands of AI and soar onto the Cybersecurity Mesh: A deep dive into the Cybersecurity Mesh and its role in modern digital defense strategies. EDPACS 2023, 68, 27–33. [Google Scholar] [CrossRef]
- Dias, I.; Ruan, L.; Ranaweera, C.; Wong, E. From 5G to beyond: Passive optical network and multi-access edge computing integration for latency-sensitive applications. Opt. Fiber Technol. 2023, 75, 103191. [Google Scholar] [CrossRef]
- Hong, J.; Dreibholz, T.; Schenkel, J.A.; Hu, J.A. An overview of multi-cloud computing. In Web, Artificial Intelligence and Network Applications: Proceedings of the Workshops of the 33rd International Conference on Advanced Information Networking and Applications (WAINA-2019) 33; Springer: Berlin/Heidelberg, Germany, 2019; pp. 1055–1068. [Google Scholar]
- Saraswat, M.; Tripathi, R. Cloud computing: Analysis of top 5 CSPs in SaaS, PaaS and IaaS platforms. In Proceedings of the 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India, 4–5 December 2020; pp. 300–305. [Google Scholar]
- Njah, Y.; Leivadeas, A.; Falkner, M. An AI-driven intent-based network architecture. IEEE Commun. Mag. 2024, 1–8. [Google Scholar] [CrossRef]
- Huang, T.; Tan, S.; Tang, Q.; Zhang, C.; Xie, R.; Yu, F.R. NT-SCDC: Realizing Service Customized Networking in Distributed Clouds with NaaS Ticket. IEEE Netw. 2023, 38, 236–243. [Google Scholar]
- Rehman, Z.; Tariq, N.; Moqurrab, S.A.; Yoo, J.; Srivastava, G. Machine learning and internet of things applications in enterprise architectures: Solutions, challenges, and open issues. Expert Syst. 2024, 41, e13467. [Google Scholar]
- Nozari, H.; Ghahremani-Nahr, J.; Szmelter-Jarosz, A. AI and machine learning for real-world problems. In Advances In Computers; Elsevier: Amsterdam, The Netherlands, 2024; Volume 134, pp. 1–12. [Google Scholar]
- Chi, H.R.; Wu, C.K.; Huang, N.F.; Tsang, K.F.; Radwan, A. A survey of network automation for industrial internet-of-things toward industry 5.0. IEEE Trans. Ind. Inform. 2022, 19, 2065–2077. [Google Scholar]
- Nour, B.; Pourzandi, M.; Debbabi, M. A survey on threat hunting in enterprise networks. IEEE Commun. Surv. Tutor. 2023, 25, 2299–2324. [Google Scholar]
- Krishnasamy, E.; Varrette, S.; Mucciardi, M. Edge computing: An overview of framework and applications. In PRACE Technical Report; PRACE aisbl: Bruxelles, Belgium, 2020. [Google Scholar]
- Kashif, U.A.; Memon, Z.A.; Siddiqui, S.; Balouch, A.R.; Batra, R. Architectural design of trusted platform for IaaS cloud computing. In Cloud Security: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2019; pp. 393–411. [Google Scholar]
- Aleem, S.; Ahmed, F.; Batool, R.; Khattak, A. Empirical investigation of key factors for saas architecture. IEEE Trans. Cloud Comput. 2019, 9, 1037–1049. [Google Scholar]
- Salas, G.D. Introduction to the Network Virtual Deployment for NaaS. 2022. Available online: https://hal.science/hal-03634559v1 (accessed on 12 March 2025).
- Globa, L.; Sulima, S.; Romanov, O.; Skulysh, M. Dynamic Reconfiguration of Computing Resources to Support NaaS Technology. In Proceedings of the International Conference on Applied Innovation in IT; Anhalt University of Applied Sciences: Köthen, Germany, 2023; Volume 11, pp. 17–22. [Google Scholar]
- Hassan, N.; Yau, K.L.A.; Wu, C. Edge computing in 5G: A review. IEEE Access 2019, 7, 127276–127289. [Google Scholar]
- Liu, Y.; Peng, M.; Shou, G.; Chen, Y.; Chen, S. Toward edge intelligence: Multiaccess edge computing for 5G and Internet of Things. IEEE Internet Things J. 2020, 7, 6722–6747. [Google Scholar] [CrossRef]
- Pham, Q.V.; Fang, F.; Ha, V.N.; Piran, M.J.; Le, M.; Le, L.B.; Hwang, W.J.; Ding, Z. A survey of multi-access edge computing in 5G and beyond: Fundamentals, technology integration, and state-of-the-art. IEEE Access 2020, 8, 116974–117017. [Google Scholar] [CrossRef]
- Liyanage, M.; Porambage, P.; Ding, A.Y.; Kalla, A. Driving forces for multi-access edge computing (MEC) IoT integration in 5G. ICT Express 2021, 7, 127–137. [Google Scholar] [CrossRef]
- Al-Dulaimy, A.; Sharma, Y.; Khan, M.G.; Taheri, J. Introduction to edge computing. In Edge Computing: Models, Technologies and Applications; Institution of Engineering and Technology: London, UK, 2020; pp. 3–25. [Google Scholar]
- Ramos-Cruz, B.; Andreu-Perez, J.; Martínez, L. The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research. Neurocomputing 2024, 581, 127427. [Google Scholar] [CrossRef]
- Tank, B.; Gandhi, V. A Comparative Study on Cloud Computing, Edge Computing and Fog Computing. In Recent Developments in Electronics and Communication Systems; IOS Press: Clifton, VA, USA, 2023; pp. 665–670. [Google Scholar]
- Mozaffariahrar, E.; Theoleyre, F.; Menth, M. A survey of Wi-Fi 6: Technologies, advances, and challenges. Future Internet 2022, 14, 293. [Google Scholar] [CrossRef]
- Morais, D.H. 5G NR, Wi-Fi 6, and Bluetooth LE 5: A Primer on Smartphone Wireless Technologies; Springer Nature: Berlin/Heidelberg, Germany, 2023. [Google Scholar]
Edge Computing Architecture Layer | ||||
---|---|---|---|---|
Characteristics | IoT | Edge | Fog | Cloud |
Data | Source | Process | Process | Process |
Storage Limits | Extremely Limited | Limited | Limited | Unlimited |
Deployment | Distributed | Distributed | Distributed | Centralized |
Components | Physical devices | Edge Nodes | Fog Nodes | Virtual Cloud res. |
Response Time | No response time | The fastest | Fast | Slow |
Location awareness | Aware | Aware | Aware | Aware |
Nodes Count | The largest | Very large | Large | Small |
Computational limits | Limited | Limited | Limited | Unlimited |
Data source distance | The source | The nearest | Near | Far |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Afolalu, O.; Tsoeu, M.S. Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions. Future Internet 2025, 17, 133. https://doi.org/10.3390/fi17040133
Afolalu O, Tsoeu MS. Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions. Future Internet. 2025; 17(4):133. https://doi.org/10.3390/fi17040133
Chicago/Turabian StyleAfolalu, Oladele, and Mohohlo Samuel Tsoeu. 2025. "Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions" Future Internet 17, no. 4: 133. https://doi.org/10.3390/fi17040133
APA StyleAfolalu, O., & Tsoeu, M. S. (2025). Enterprise Networking Optimization: A Review of Challenges, Solutions, and Technological Interventions. Future Internet, 17(4), 133. https://doi.org/10.3390/fi17040133