New Computer Network Paradigms and Virtual Organizations

Author(s):  
Guillermo Agustín Ibáñez Fernández

A computer network consists of computers that communicate via any physical media through a network formed by links and nodes, the nodes being the computers. Computer networks have evolved along their short history. Computer networks have changed drastically in mission and implementation from the early projects supported by the Advanced Research Projects Agency (ARPA) and from other organizations, tracing back the origins to 1962. The ARPA network (ARPANET) consisted initially of a small set of nodes at research centres and universities, connected with links at 56 kbps across the United States. ARPANET was the core of the early Internet, a network for research centres and universities. Computer networks are based on the concept of packet switching within a shared communication medium, as opposite to circuit switching, the dominant paradigm for the precedent telegraph and telephone networks. In 1968 Paul Baran proposed a network system based on nodes that forward datagrams or packets from different users over a common line between computer systems from origin to destination. The packet switching paradigm provides resiliency of network against network node failures, the independent routing of datagrams per node makes possible that the datagrams reach their destination even in presence of multiple node failures. Computer networks hardware and communication protocols evolved through time: the Network Control Protocol (NCP) evolved to the four layer (1978) TCP/IP protocol stack. TCP/IP became dominant against the complex seven layer Open Systems Interconnection (OSI) stack proposed (1977) by International Standard Organization (ISO), too complex for implementation and interoperability. A view of the Internet Engineering Task Force (IETF) and Institute of Electrical and Electronic Engineers (IEEE) protocols stack is shown in Figure 1. The role of IP protocol as simple interconnection protocol between networks using dissimilar LAN technologies (Token Ring, Token Bus, ATM LANE, Ethernet, Wi-Fi) has been essential to build the Internet. However, with the widespread deployment of high performance/cost Ethernet and its self compatibility (10/100/1 Gigabit/10 Gigabit), Ethernet is becoming more and more the interconnecting technology, and Metro Ethernet Services are offered by network service providers. Computer networks are based on communication standards. The reference standardization organizations for computer networks, but not the only ones, are the Internet Engineering Task Force, which is the standard organization for Internet Protocols, and the Institute of Electrical and Electronics Engineers (IEEE) LAN MAN Group (IEEE 802) that elaborates and approves standards on the lower layers of protocol stack. The International Standards Organizations (ISO) and the International Telecommunications Union are also key organizations for computer networks, given the convergence of telecommunication and data networks. The evolution of computer networks affects all protocol layers, including the application layer. The development of increasingly sophisticated computer applications that seamlessly integrate data and communications, creating a new virtual space where actors interact is the objective of “social” applications and collaborative software.

Author(s):  
Guillermo Agustín Ibáñez Fernández

A computer network consists of computers that communicate via any physical media through a network formed by links and nodes, the nodes being the computers. Computer networks have evolved along their short history. Computer networks have changed drastically in mission and implementation from the early projects supported by the Advanced Research Projects Agency (ARPA) and from other organizations, tracing back the origins to 1962. The ARPA network (ARPANET) consisted initially of a small set of nodes at research centres and universities, connected with links at 56 kbps across the United States. ARPANET was the core of the early Internet, a network for research centres and universities. Computer networks are based on the concept of packet switching within a shared communication medium, as opposite to circuit switching, the dominant paradigm for the precedent telegraph and telephone networks. In 1968 Paul Baran proposed a network system based on nodes that forward datagrams or packets from different users over a common line between computer systems from origin to destination. The packet switching paradigm provides resiliency of network against network node failures, the independent routing of datagrams per node makes possible that the datagrams reach their destination even in presence of multiple node failures.


2010 ◽  
pp. 2343-2352
Author(s):  
Guillermo Agustín Ibáñez Fernández

A computer network consists of computers that communicate via any physical media through a network formed by links and nodes, the nodes being the computers. Computer networks have evolved along their short history. Computer networks have changed drastically in mission and implementation from the early projects supported by the Advanced Research Projects Agency (ARPA) and from other organizations, tracing back the origins to 1962. The ARPA network (ARPANET) consisted initially of a small set of nodes at research centres and universities, connected with links at 56 kbps across the United States. ARPANET was the core of the early Internet, a network for research centres and universities. Computer networks are based on the concept of packet switching within a shared communication medium, as opposite to circuit switching, the dominant paradigm for the precedent telegraph and telephone networks. In 1968 Paul Baran proposed a network system based on nodes that forward datagrams or packets from different users over a common line between computer systems from origin to destination. The packet switching paradigm provides resiliency of network against network node failures, the independent routing of datagrams per node makes possible that the datagrams reach their destination even in presence of multiple node failures.


Author(s):  
Siti Aisyah

Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.


Author(s):  
Jiankun Hu

he history of computer networks can be traced back to the early 1960s, when voice-grade telephone networks dominated the communication networks. With the increasing importance of computers, as well as the ever-increasing expense of centralized mainframe computers that were growing in size, there was a need to decentralize computer systems. This trend also highlighted the need to connect computers together, by means of computer networks, so that their capacity could be shared among geographically distributed users. Unlike the circuit switching telephone networks, where voice is transmitted at a constant rate between sender and receiver, the traffic in computer networks tends to be bursty. To meet the requirements of data communications, people began to invent more efficient and robust networks, i.e., packet switching networks. The first published work on packet-switching techniques was that of Leonard Kleinrock (Kleinrock, 1961, 1964). The first packet-switching computer network called ARPANET was developed in 1969 and then became the ancestor of today’s public Internet (Kurose & Ross, 2001).


2021 ◽  
Vol 5 (3) ◽  
pp. 848
Author(s):  
Haeruddin Haeruddin

The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.


1993 ◽  
Vol 04 (03) ◽  
pp. 269-289 ◽  
Author(s):  
S. CAVALIERI ◽  
A. DI STEFANO ◽  
O. MIRABELLA

In this paper, the authors adopt a neural approach to deal with the problem of routing in a packet switching network. The aim is to define a routing strategy which will combine the advantages of both the centralized and the distributed approaches. The neural approach presented is based on the idea of inserting a neural network (N/N) into each node in the computer network which will be responsible for computing the route between its node and the immediately adjacent one. Two distributed routing solutions are presented in the paper based on an optimizing network and a mapping network. The routing obtainable and the implementation resources needed for the two approaches are evaluated. Finally, the performance offered by the neural strategies proposed is compared with that offered by classical distributed and centralized routing solutions. As a parameter of merit, the effect of overloading caused by the additional traffic present in each solution is used.


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Computer viruses are a nightmare for the computer world. It is a threat to any user who uses a computer network. The computer will not be infected by a virus if the computer is not connected to the outside world. In this case, this is the internet. The Internet can be used as a medium for the spread of the virus to the fullest. There are many types of viruses that are spread through the internet. Some of them are aimed at making money, and there are only as a disrupt activity and computer performance. Some techniques are done to prevent the spread of the virus. Here will be explained how to tackle the virus optimally. The benefit is that the computer used will be free from virus attacks and safe to exchange data publicly. Techniques used include the prevention and prevention of viruses against computer networks are to know the characteristics and workings of the virus.


Author(s):  
Khaled A. Shuaib

There are mainly two types of used communication systems; circuit switched and packet switched networks. In circuit switched networks, there must be a dedicated path and a sequence of connected links between the calling and called stations. A connection with the proper resources has to be established prior to the start of information exchange. An example of circuit switched network is the phone network. On the other hand, packet switched networks rely on allowing multiple communicating end systems to share the entire or part of a path simultaneously. The Internet, a world wide computer network, is based on the concept of packet switching empowered by the Internet Protocol (IP). IP is basically a transmission mechanism used by devices communicating in a network as part of a protocol suite.


10.28945/2857 ◽  
2005 ◽  
Author(s):  
Andrzej Zaliwski

The business organizations currently functioning inside cyberspace are vulnerable to threats and forms of crimes that were unknown prior to the Internet era. New challenges for security have emerged from this situation. It has become increasingly necessary to educate a large number of professionals to be better prepared to maintain the growing number of computer networks. Also, there is a need to place strong emphasis on the security aspects of a network. These goals are impossible to realize without solving the following problems: lack of safe infrastructure, where security experiments can not compromise the organization’s security; and the complexity of existing security auditing methodologies which limits the number of professionals who are able to use them. The complexity makes difficult to obtain a bird-eye view of the whole company’s security system in a way similar to tactical and strategic military map. This hinders the ability to have a single complete status of an organization. This paper describes a tool that can be used to overcome the above problems.


Sign in / Sign up

Export Citation Format

Share Document