New Computer Network Paradigms and Virtual Organizations

2010 ◽  
pp. 2343-2352
Author(s):  
Guillermo Agustín Ibáñez Fernández

A computer network consists of computers that communicate via any physical media through a network formed by links and nodes, the nodes being the computers. Computer networks have evolved along their short history. Computer networks have changed drastically in mission and implementation from the early projects supported by the Advanced Research Projects Agency (ARPA) and from other organizations, tracing back the origins to 1962. The ARPA network (ARPANET) consisted initially of a small set of nodes at research centres and universities, connected with links at 56 kbps across the United States. ARPANET was the core of the early Internet, a network for research centres and universities. Computer networks are based on the concept of packet switching within a shared communication medium, as opposite to circuit switching, the dominant paradigm for the precedent telegraph and telephone networks. In 1968 Paul Baran proposed a network system based on nodes that forward datagrams or packets from different users over a common line between computer systems from origin to destination. The packet switching paradigm provides resiliency of network against network node failures, the independent routing of datagrams per node makes possible that the datagrams reach their destination even in presence of multiple node failures.

Author(s):  
Guillermo Agustín Ibáñez Fernández

A computer network consists of computers that communicate via any physical media through a network formed by links and nodes, the nodes being the computers. Computer networks have evolved along their short history. Computer networks have changed drastically in mission and implementation from the early projects supported by the Advanced Research Projects Agency (ARPA) and from other organizations, tracing back the origins to 1962. The ARPA network (ARPANET) consisted initially of a small set of nodes at research centres and universities, connected with links at 56 kbps across the United States. ARPANET was the core of the early Internet, a network for research centres and universities. Computer networks are based on the concept of packet switching within a shared communication medium, as opposite to circuit switching, the dominant paradigm for the precedent telegraph and telephone networks. In 1968 Paul Baran proposed a network system based on nodes that forward datagrams or packets from different users over a common line between computer systems from origin to destination. The packet switching paradigm provides resiliency of network against network node failures, the independent routing of datagrams per node makes possible that the datagrams reach their destination even in presence of multiple node failures.


Author(s):  
Guillermo Agustín Ibáñez Fernández

A computer network consists of computers that communicate via any physical media through a network formed by links and nodes, the nodes being the computers. Computer networks have evolved along their short history. Computer networks have changed drastically in mission and implementation from the early projects supported by the Advanced Research Projects Agency (ARPA) and from other organizations, tracing back the origins to 1962. The ARPA network (ARPANET) consisted initially of a small set of nodes at research centres and universities, connected with links at 56 kbps across the United States. ARPANET was the core of the early Internet, a network for research centres and universities. Computer networks are based on the concept of packet switching within a shared communication medium, as opposite to circuit switching, the dominant paradigm for the precedent telegraph and telephone networks. In 1968 Paul Baran proposed a network system based on nodes that forward datagrams or packets from different users over a common line between computer systems from origin to destination. The packet switching paradigm provides resiliency of network against network node failures, the independent routing of datagrams per node makes possible that the datagrams reach their destination even in presence of multiple node failures. Computer networks hardware and communication protocols evolved through time: the Network Control Protocol (NCP) evolved to the four layer (1978) TCP/IP protocol stack. TCP/IP became dominant against the complex seven layer Open Systems Interconnection (OSI) stack proposed (1977) by International Standard Organization (ISO), too complex for implementation and interoperability. A view of the Internet Engineering Task Force (IETF) and Institute of Electrical and Electronic Engineers (IEEE) protocols stack is shown in Figure 1. The role of IP protocol as simple interconnection protocol between networks using dissimilar LAN technologies (Token Ring, Token Bus, ATM LANE, Ethernet, Wi-Fi) has been essential to build the Internet. However, with the widespread deployment of high performance/cost Ethernet and its self compatibility (10/100/1 Gigabit/10 Gigabit), Ethernet is becoming more and more the interconnecting technology, and Metro Ethernet Services are offered by network service providers. Computer networks are based on communication standards. The reference standardization organizations for computer networks, but not the only ones, are the Internet Engineering Task Force, which is the standard organization for Internet Protocols, and the Institute of Electrical and Electronics Engineers (IEEE) LAN MAN Group (IEEE 802) that elaborates and approves standards on the lower layers of protocol stack. The International Standards Organizations (ISO) and the International Telecommunications Union are also key organizations for computer networks, given the convergence of telecommunication and data networks. The evolution of computer networks affects all protocol layers, including the application layer. The development of increasingly sophisticated computer applications that seamlessly integrate data and communications, creating a new virtual space where actors interact is the objective of “social” applications and collaborative software.


Author(s):  
Jiankun Hu

he history of computer networks can be traced back to the early 1960s, when voice-grade telephone networks dominated the communication networks. With the increasing importance of computers, as well as the ever-increasing expense of centralized mainframe computers that were growing in size, there was a need to decentralize computer systems. This trend also highlighted the need to connect computers together, by means of computer networks, so that their capacity could be shared among geographically distributed users. Unlike the circuit switching telephone networks, where voice is transmitted at a constant rate between sender and receiver, the traffic in computer networks tends to be bursty. To meet the requirements of data communications, people began to invent more efficient and robust networks, i.e., packet switching networks. The first published work on packet-switching techniques was that of Leonard Kleinrock (Kleinrock, 1961, 1964). The first packet-switching computer network called ARPANET was developed in 1969 and then became the ancestor of today’s public Internet (Kurose & Ross, 2001).


2012 ◽  
Vol 2012 ◽  
pp. 1-18 ◽  
Author(s):  
Yi-Kuei Lin ◽  
Louis Cheng-Lu Yeng

Evaluating the reliability of a network with multiple sources to multiple sinks is a critical issue from the perspective of quality management. Due to the unrealistic definition of paths of network models in previous literature, existing models are not appropriate for real-world computer networks such as the Taiwan Advanced Research and Education Network (TWAREN). This paper proposes a modified stochastic-flow network model to evaluate the network reliability of a practical computer network with multiple sources where data is transmitted through several light paths (LPs). Network reliability is defined as being the probability of delivering a specified amount of data from the sources to the sink. It is taken as a performance index to measure the service level of TWAREN. This paper studies the network reliability of the international portion of TWAREN from two sources (Taipei and Hsinchu) to one sink (New York) that goes through a submarine and land surface cable between Taiwan and the United States.


1993 ◽  
Vol 04 (03) ◽  
pp. 269-289 ◽  
Author(s):  
S. CAVALIERI ◽  
A. DI STEFANO ◽  
O. MIRABELLA

In this paper, the authors adopt a neural approach to deal with the problem of routing in a packet switching network. The aim is to define a routing strategy which will combine the advantages of both the centralized and the distributed approaches. The neural approach presented is based on the idea of inserting a neural network (N/N) into each node in the computer network which will be responsible for computing the route between its node and the immediately adjacent one. Two distributed routing solutions are presented in the paper based on an optimizing network and a mapping network. The routing obtainable and the implementation resources needed for the two approaches are evaluated. Finally, the performance offered by the neural strategies proposed is compared with that offered by classical distributed and centralized routing solutions. As a parameter of merit, the effect of overloading caused by the additional traffic present in each solution is used.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


2017 ◽  
Vol 3 ◽  
pp. 237802311772765 ◽  
Author(s):  
Michael J. Rosenfeld

Most public opinion attitudes in the United States are reasonably stable over time. Using data from the General Social Survey and the American National Election Studies, I quantify typical change rates across all attitudes. I quantify the extent to which change in same-sex marriage approval (and liberalization in attitudes toward gay rights in general) are among a small set of rapid changing outliers in surveyed public opinions. No measured public opinion attitude in the United States has changed more and more quickly than same-sex marriage. I use survey data from Newsweek to illustrate the rapid increase in the 1980s and 1990s in Americans who had friends or family who they knew to be gay or lesbian and demonstrate how contact with out-of-the-closet gays and lesbians was influential. I discuss several potential historical and social movement theory explanations for the rapid liberalization of attitudes toward gay rights in the United States, including the surprising influence of Bill Clinton’s 1992 presidential campaign.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


Sign in / Sign up

Export Citation Format

Share Document