You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/259893762

Network Overview

Article · January 2013

CITATIONS READS
0 4,418

3 authors, including:

Christian Bach Ammar Odeh


University of Bridgeport University of Bridgeport
95 PUBLICATIONS   554 CITATIONS    58 PUBLICATIONS   382 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

PhD Thesis on "Proposing a Holistic Quality Framework to Enhance the Reliability and Validity of Software Defects Prediction Performance Evaluation" View project

Text Steganography View project

All content following this page was uploaded by Christian Bach on 03 February 2014.

The user has requested enhancement of the downloaded file.


Network Overview

Network Overview
BadrBaatiah and Christian Bach
University of Bridgeport, Bridgeport, CT06604, USA, E-mail: Bbaatiah,cbach}@bridgeport.edu

Abstract: Different strategies used to protect data against


attackers, whose try to read data and analysis message transfer
between sender and receiver. Nowadays network represent
main road for message transfer over internet, special after heavy
use of wireless network. In this paper we explore network
classification and main advantages and disadvantages. Next a
novel secure scenario presented in this paper, with some
mathematical concepts and analysis results. The main
advantages of proposed algorithm and drawback of it.
Keywords: Communication, Bridge, switch, protocol,
infrastructure, Ad-hoc, guide connection, Router, Firewall,
Virtual network.

I. INTRODUCTION life, some authors classify wireless network into two


In past message transfer between two cities inside categories infrastructure and ad-hoc networks.
same country may take days or weeks. But now by Where infrastructure have some organized point to
using internet huge amount of information can be send and receive data, this organized points usually
transfer from side to other side during second or called access point (AP) where any used want to send
less [1-3]. Networks development start from wire data its send data into AP, access point will accept
networks between two computers and then extend data or reject. Next step AP organize to send
to connect two small wireless networks [4, 5]. Which information into receiver direct and this is called
used in different application like office work, downlink where first connection is called uplink. [12]
marketing,education, and home used. First class of Ad-hoc networks not organized like
computer network is a wired network, which infrastructure where user send data over network
sometimes called guided communication [6-8]. to other receiver without care about upload
Second class is called wireless so unguided information or download information. By this way
communication, which depends on electromagnetic information transfer between network nodes more
to send and receive data [9, 10]. fast but less secure. Ad-hoc networks [13]classified
Wire network classify in to different categories into two categories Mobile Ad-hoc network
depends on classification categories, where some (MANET), and Vehicular Ad-hoc network
books classify them on geographicalconcepts, (VANET). Where MANET is most applicable
where other classify networks depends on its networks at this time special after many provider
topology. Where most of this classification can be in market that offer different services over its
accepted depends on its goals and it’s used in network. On other hand VANET play basic rule in
different applications [11]. human life where its development to include
Where wireless network can be classified emergency car, and traffic control, and accident
depends on its structure and how it’s used in human occurrence [11, 13].

I J W C N, 5(2) December 2013 123


BadrBaatiah, Christian Bach

Different advantages acquired from network X.25 developed for commercial services and
design, sharing information where some produced TCP/IP networks [16].
information can be send for more than one user at
Nowadays, computer networks developed in
the same time without copy and paste it. Which
different categories and in other classes from LAN
reduce efforts and costs used to send messages.In
networks and other for WAN networks. Moreover
addition hardware also can be shared where one
direction of development for software where new
printer can be used for the whole department and
protocols design for transfer data between devices
this reduces cost to pay more than one printer in
in additions other classes for peripherals devices
department. More over memory also can be shared
that support network system [15, 16].
where more than one user can used same
information where they use same memory. But in Also other class of network is produce by
other hand shared memory may create some devices ability, where all of these classes used to
problem for in consistent data where update for improve distributed system like Ameba operating
used variable by other processor may effect on its system. Where Andrew introduced new network
old value [1, 9, 11] operating system by connecting multi-processor
where the main purpose of this network
Moreover other important concept is network
timesharing system. First class is called Peer-to-Peer
protocol, where message transfer between different
P2P, where each device has same ability over
network carrier, and each carrier have specific
network, where each computer node has ability to
properties and ability can provide. Network
do. Any node can send data into other node and
protocol set of rules that organize communication
process it. Memory also can be distributed over
between network parties.in following research we
nodes which enable each part to connect and got
will explore some software concepts [9].
information from other [6]. Next class called client-
server, where server hold memories and whole data
MOTIVATION in traditional system, moreover processing operator
In this research we explore some categories of wire inside server serve for connected nodes. In additional
networks depend on scale of network, and some server can be used to protect data by using Firewall
historical review. Other hardware concepts and system to burn any attacker attempts. The main
range of each device and advantages. First version disadvantage of this system is single point of failure,
of network produce 1950 for military purposes, then where if server has a problem then whole system
new version of commercial produced for airline will be down. In addition the connection between
reservation system [14] in 1964 other big system devices will be lost. Also heavy load on network and
produced by Dartmouth to improve overloaded on server may reduce system speed [16].
telecommunication purpose to increase system
extension, where this experiment improve also Main Contributions and Paper Organization
routing process and management communication
In this paper we explore different network issue
of telephone. Paul and Leonard develop network
and some classification categories The main goal is
systems by divide message into packet, and each
to explain classes of network, scale, and network
packet may take different path to send and receive
with examples in our survey we mention some
information thought it [15]. in 1965 a novel
ways to improve some security algorithms over
invitation introduced by Thomas and Lawrence by
wire and wireless.
creating new wide network which is called wide
area network (WAN), where Roberts is a program The organization of the paper is as the
manager for network in ARPANET. In same year following. In section II we present and discuss some
widely telephone switch network introduced, after network classes. In section III we will explore some
four years a group of universities work to gather to classes of wire network. Conclusion mentioned in
produce new version ARPANET network. In 1972 section V.

124 I J W C N, 5(2) December 2013


Network Overview

II. NETWORK the communication is no belong for long time


Network usually classify into two classes, wire and between devices all time the connection only
wireless. Where wire network communicated created when there is a message want to send. So
between devices by using physical wire to the virtual network enable devices to be connected
communicated between devices and its usually can virtual to other devices at all-time where the
be classify by using its scale in the following section connection is not really occur, or occur when
we classify networks depends on its size. necessary [21].
4. Metropolitan Area Network: Which represent
the middle geographical extend between LAN and
WAN.Where MAN can be used to cover city or
large area. MAN is large than LAN and small than
1. Personal Area Network: PAN or personal area WAN. Also large university used this kind of
network where this kind of network used to network to communicate between labs and offices.
communicated devices with computer inside small Usually MAN did not belong to single organization
place relatively to other networks. For example but sometimes to more than one. Which represent
computer can be connected to other devices like high speed network can be used where it can use
printer, fax, and telephones with personal computer same ability of LAN and less size than WAN. One
where usually those kind of communications can of the famous example for MAN Distributed Queue
be wire, but most of new PAN communication Dual Bus (DQDB), which is defined by Electrical
depends on wireless ability by using Bluetooth or and Electronics Engineers IEEE 802.6.[22]
infrared. Which enable communication with limited 5. Wide Area Network: Which represent
range, and enable user move fixable around the connection between devices in world where any
range. But in other hand data transfer unsecure over information transfer from any device in any country
devices where electromagnetic waves transfer over to other device in any other side. Where usually
public media [17, 18]. used in large scale geographically. Where usually
2. Local Area Network: Other office and small governments used this network to communicate
communities need to transfer data between between its institutions , more over global
computers and also they want to reduce to cost of businesses can employ this kind of communication
hardware equipment’s used like printer and fax, to support connection between company parts, and
and sometimes can be usedto share memory and also marketing for its stuff [23].
processor. Local Area Network (LAN) applied in
limited geographical area like universities and III. NETWORK TOPOLOGY
laboratory, home, and schools. Ethernet usually Other classification techniques applied for wire
used to communicate between devices in LAN. network is called topology, which represent the
Where it’s very easy to create network by using communication strategy and physical organization
phone cables and other power lines. Other of network nodes those classes, applied in LAN
advantages of this kind of networks are creating usually which represent the atom size of any
some group of this devices by creating some subnet network.
networks. Usually LAN networks can be transfer 1. Point to Point Connection: Which represent
data between devices by using other the simplest kind of communication between two
communication devices which is called switching devices but device is connect only to one computer
system or called switch system, (switch, hub) where and this enable two users to connect direct without
switch contain three layers only. [19, 20] any reservation for line between devices. The main
3. Virtual Private Networks: VPN represent one disadvantage of this method is connection will be
categories of networks that can employee some fail of wire is disconnected and this will disable the
networks to connect with other computers where connection between other[24].

I J W C N, 5(2) December 2013 125


BadrBaatiah, Christian Bach

3. Star Topology: Where some switch used to


organize connection between devices where any
information send from sender to switch and then
from switch to receiver , and any connection must
Figure 1: Point to Point follow this process.so if any problem happen in any
node nothing will happen to network and the
2. Bus Connection: Where only one wire use to normal work for that network. Moreover if hub or
connect more than two devices where only one link switch wants to send data only can broadcast
to connect the whole device. Usually each device information over that network. In other hand if hub
has ability to send and receive data over that bus stops working the whole network will be down. But
and this reducescost of connection. In other hand if the high performance of star topology provided
two devices decide to send data at same time then compared to bus network. Moreoverit’s easy to add
data will be lost, collision occurs when two or more new node to hub. And failed of one point stop then
device try to send data at same moment. At the end data will be continue for next one. And it’s easy to
of bus there is a terminator which is used to absorb detect problem in any node. Huge dependency on
remaining data. On other hand if collision occurred central point may create high load on hub [25]. Also
each device will wait a random amount of time then performance will be affected when number of
resend data again. So new technology used to connected nodes increase.
reduce the problem of collision by using sensor,
where each device has a sensor at the end of lower
level. When device start to send data it will ask
sensor to check if there is any propagation data over
bus , if there is a data it will wait random amount
of time then sense again , if sensor sense empty link
then send data and reserve the link. The main
drawback of reservation system is if huge of data
want to be send then the bus will give busy signal
for long time [25] Moreover bus connection is
scalable where at any time by increase the length
of link between computers. But all in all its limited
.if the bus disconnected new two bus network can
be created from this disconnection. Other authors
suggested different level of Bus network [24].
Figure 3: Star Connection

4. Hierarchical Topology: And sometimes called


tree network topology was information send and
receives from upper and lower level. Where each
node has three component two sons and one
parent.if data send from top to down then each root
node decide which son can receive data .the main
advantage of this network is ability to divide and
still working [26].
5. Fully Connected Network: Where node
connected to all nodes around it so number of
Figure 2: Bus Connection connected node is n(n-1)/2 where n is number of

126 I J W C N, 5(2) December 2013


Network Overview

nodes. Where there is no switching nor do In other hand ring topology has some problem
broadcasting and the main problem occur where also, each send packet must pass all nodes over
huge of physical nodes needed to transfer data network regardless if it arrives to its destination or
between nodes. In other hand there is no collision not. And this may break security over network more
between nodes [26] over privacy of users also will be violated. In other
hand packet direction is limited to clock wise where
if any disconnect occurred then the whole network
will be stop until fixed where send packet did not
back to sender so he will not release token.other
problem faced ring topology is extension problem
in other words if designer looking to add new
device he need to connect this device into two part
after and before not only this but also its need to
update the whole routing table for all nodes in that
network. And this may consume efforts and time
over cost of money. Bandwidth will distributed over
all devices and this may lead to reduce performance
of network if devices increase [27].
7. Hybrid Topology: Which combine all of the
Figure 4: Fully Connected Network above topologies or some time contain part of them
in this categories by connect between bus, star, and
ring to connect between devices and component of
6. Ring Topology: Where nodes connected like networks.
a ring between other where each node have same
ability like next one and the strategy for send packet Hybrid offer numbers of advantage like
over network is work one by one depend on control scalability of network where network can be
packet which called token control packet. If any extend to be connecting with other network.
node want to send data over network it will wait Moreover hybrid provides a huge ability of
until he receive token packet after that it will catch flexibility and ability to change from one for to
token packet and keep it, then start stream its data other form[28]. Also effectiveness of hybrid is very
over network until its finish and data will take high where hybrid combine between at least two
around when it receive last packet sent it then token kind of network and this enable network to work
can be released different advantages and to gather depends on its strength points. on other
disadvantage over ring strategy the first advantage hand hybrid represent the complex kind of
is when wire disconnect the network direct convert network compered to all other designs. Also
to bus topology, ring topology is very organized intelligent hub needed to enable routing
special where collision can’t be created between information from any two nodes over different
node data where only one user can send data at small networks. Moreover design and establish
time if it has token. Moreover if there is a huge data Hybrid network is so costly and consume a huge
over network then performance is still good. Also efforts from network designer and cost of money
it’s not like star topology where its need central also play a key role to design network, in addition
control point between nodes so there is no single the time is costly where sending packet between
point of fail. If network need some additional nodes will need different software and also other
component like printer or scanner over it, efficiency hardware. Other designer present other problem
of network will not be affected. Also all nodes have is how to detect error over network if you have a
same probability to control all sources over ring problem, where this network consist of different
network [19]. ability [10].

I J W C N, 5(2) December 2013 127


BadrBaatiah, Christian Bach

IV. CONCLUSION International Journal of Contemporary Hospitality


Management, Vol. 17, pp. 65-77, 2005.
Our paper explores the main categories of computer
[9] C. L. Rutledge, “Wireless Communications Systems
network classification, author classify whole Employing Free-space Optical Communications Links,”
network into two classes wire and wireless where ed: Google Patents, 1998.
wire class support only the guided communication [10] A. García-Zambrana and A. Puerta-Notario, “Improving
and the remaining like mobile and access point PPM Schemes in Wireless Infrared Links at High Bit Rates,”
Communications Letters, IEEE, Vol. 5, pp. 95-97, 2001.
classify as wireless .where wired networks classifies
[11] J. Srivastava, P. Desikan, and V. Kumar, “Web Mining:
them into class size of geographical area covers over Accomplishments & Future Directions,” in National Science
each class. Second method classify networks Foundation Workshop on Next Generation Data Mining
depends on networks design. Where a huge number (NGDM’02), 2002, pp. 51-69.
of books and research discuss that categories and [12] C. S. R. Murthy and B. Manoj, Ad hoc Wireless Networks:
disadvantages faced each one of them and also the Architectures and Protocols: Prentice Hall, 2004.

advantages can be provided from each class. [13] O. Tonguz, N. Wisitpongphan, F. Bai, P. Mudalige, and
V. Sadekar, “Broadcasting in VANET,” in 2007 Mobile
Otherpaper classifies networks into internet and Networking for Vehicular Environments, 2007, pp. 7-12.
intranet and this is only the size of network. In next
[14] N. B. Ellison, “Social Network Sites: Definition, History,
step we looking to apply some review in wireless and Scholarship,” Journal of Computer Mediated
networks where its divide into two categories ad- Communication, Vol. 13, pp. 210-230, 2007.
hoc connection and infrastructure. Where ad-hoc [15] J. D. Bolter and J. D. Bolter, Writing Space: The Computer,
support unordered networks and their ability to Hypertext, and the History of Writing: L. Erlbaum Associates
Hillsdale, NJ, 1991.
connect and distribute widely information over
[16] A. Bunting, “The Nation’s Health Information Network:
network. And usually ad-hoc classifies into two History of the Regional Medical Library Program, 1965-
classes MANET and VANET. Other class is 1985,” Bulletin of the Medical Library Association, Vol. 75,
infrastructure where is an Access point control the p. 1, 1987.
whole connection. [17] I. Howitt and J. A. Gutierrez, “IEEE 802.15. 4 Low Rate-
wireless Personal Area Network Coexistence Issues,” in
Wireless Communications and Networking, 2003. WCNC
References
2003. 2003 IEEE, 2003, pp. 1481-1486.
[1] A. Nederlof, “ Access Method Retrieving Internet
[18] T. M. Siep, I. C. Gifford, R. C. Braley, and R. F. Heile,
Information through Teletext / Videotex and the
“Paving the Way for Personal Area Network Standards:
Reverse,” ed: EP Patent 0,723,369, 1996.
an Overview of the IEEE P802. 15 Working Group for
[2] R. Savolainen, “The Role of the Internet in Information Wireless Personal Area Networks,” Personal
Seeking. Putting the Networked Services in Context,” Communications, IEEE, Vol. 7, pp. 37-43, 2000.
Information Processing & Management, Vol. 35, pp. 765-782,
[19] N. J. Boden, D. Cohen, R. E. Felderman, A. E. Kulawik, C.
1999.
L. Seitz, J. N. Seizovic, and W.-K. Su, “Myrinet: A Gigabit-
[3] A. J. Flanagin and M. J. Metzger, “Perceptions of Internet per-second Local Area Network,” Micro, IEEE, Vol. 15,
Information Credibility,” Journalism & Mass pp. 29-36, 1995.
Communication Quarterly, Vol. 77, pp. 515-540, 2000.
[20] B. Brown and S. A. Chowdhury, “Apparatus and Method
[4] M. Weiser, “The Computer for the 21st Century,” Scientific of Monitoring the Status of a Local Area Network,” ed:
American, Vol. 265, pp. 94-104, 1991. Google Patents, 1993.
[5] D. Johnsort, “Routing in Ad hoc Networks of Mobile [21] M. S. Pegrum, D. Jamieson, and M. Yuen, “Virtual Private
Hosts,” in Mobile Computing Systems and Applications, 1994. Networks,” ed: Google Patents, 2003.
WMCSA 1994. First Workshop on, 1994, pp. 158-163.
[22] D. H. Cho, J. H. Song, M. S. Kim, and K. J. Han,
[6] C. T. Atwong and P. S. Hugstad, “Internet Technology “Performance Analysis of the IEEE 802.16 Wireless
and the Future of Marketing Education,” Journal of Metropolitan Area Network,” in Distributed Frameworks
Marketing Education, Vol. 19, pp. 44-55, 1997. for Multimedia App lications, 2005 . DFMA’05. First
[7] A. Binsardi and F. Ekwulugo, “International Marketing International Conference on, 2005, pp. 130-136.
of British Education: Research on the Students’ Perception [23] B. Kahle and A. Medlar, “An Information System for
and the UK Market Penetration,” Marketing Intelligence & Corporate Users: Wide Area Information Servers,” Online,
Planning, Vol. 21, pp. 318-327, 2003. Vol. 15, pp. 56-60, 1991.
[8] M. Russell, “Marketing Education: A Review of Service [24] M. Ripeanu, “Peer-to-peer Architecture Case Study:
Quality Perceptions among International Students,” Gnutella Network,” in Peer-to-Peer Computing, 2001.

128 I J W C N, 5(2) December 2013


Network Overview

Proceedings. First International Conference on, 2001, pp. 99- [27] M. Jelasity and O. Babaoglu, “T-Man: Gossip-based
100. Overlay Topology Management,” Eng ineering Self-
[25] H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, Organising Systems, pp. 1-15, 2006.
and W. Willinger, “Network Topology Generators: [28] C. S. Kang, E. K. Park, and J. H. Herzog, “Hybrid-token
Degree-based vs. Structural,” in ACM SIGCOMM Ring: A Load Sharing Local Area Network,” Computer
Computer Communication Review, 2002, pp. 147-159. Communications, Vol. 14, pp. 525-533, 1991.
[26] Y. Shavitt, “Routing through Networks with Hierarchical
Topology Aggregation,” Journal of High Speed Networks,
Vol. 7, pp. 57-73, 1998.

I J W C N, 5(2) December 2013 129

View publication stats

You might also like