New Model of Network- a Future Aspect of the Computer Networks

As the number and size of the Network increases, the deficiencies persist, including network security problems. But there is no shortage of technologies offered as universal remedy - EIGRP,BGP, OSPF, VoIP, IPv6, IPTV, MPLS, WiFi, to name a few. There…

Authors: Ram Kumar Singh, T. Ramajujam

JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN: 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 100 N EW M ODEL OF N ETWORK - A F UTURE A SPECT OF THE C OMPUTER N ETWORKS Ram Kumar Singh, Prof. T .Ramajujam Abstract — As the number and size of the Network increases, the defici encies persist, including network security problems. But there is no shortage of technologies offered as un iversal remedy – EIGRP ,BGP , OSPF , VoIP , IPv6, I PTV , MPLS, WiFi, to name a few . Ther e are multiple factors for the current situation. Now a day dur ing emergent and blossoming stages of network development is no lo nger suffi- cient when the networks are mature and have become everyday tool fo r social and business interacti ons. A new model of network i s neces- sary to find solutions for today's pressing problems, especially t hose related to network securit y . In this paper out factors leading to current stagnation discusses critical assumptions behi nd current networks, how many of them are no longer valid and have become barrier s for im- plementing real solutions. The paper conc ludes by of fering new directions for fu ture needs and solving current challenges. Index T erms —Network, Netowk Securit y , T ransfor Net work Architecture (TNA), Net work Architecture,SS7,, Software Securit y , Eavesdropping, Deception, Disclos ure, Usurpation, Disruption. ——————————  —————————— 1 I NTRODUCTION HE current remorseful stat e of networking can be realized by reflecting on this scenario: Voice over internet protocols (VOIP) and Email are the most popular network (Internet) application today. But email spa m, essentially a technical issue requiring a technol ogy solution, is a plague affecting all network users. Transfer Network Arc hitecture (TNA) is a new model created by superimposing an architecture frame- work to the existing network infrastructure [7]; consisting of the Internet, Signaling System 7 (SS7) network, data circuits of the PSTN, and ot her networks [11]. The current packet-centric strategies are not helpful to meet the net- work needs of today and tomorrow. Superior network capabilities will emerge by promoting technology and protocol agnostic inter-operating networks, with each network implemented by optimizing its design require- ments derived from service needs, without extraneous considerations. The Transf er Network Architecture (TNA) is a reference model that can help such develop- ments . However, the Federal Trade Commission (FTC) [1,3]- the antitrust enforcement agency - is the organization leading the effort for resolution. The contents of the paper is arranged a follows, in sec- tion-2 the levels of network interdependencies has been discussed, in section-3 different categories of networks have been discussed, packet blur deficiencies and tech- nology developments are discussed in section 4, in sec- tion- 5 a new trend and section -6 transfor network archi- tecture(TNA) and section- 7 different levels of software security attacks have been discussed, followed by plan- n i n g o f o u r f u t u r e w o r k i n s e c t i o n - 8 , a n d a t l a s t w e s h a l l conclude the objectives of this work in section 9. 2 N ETWORK I NTERDEPENDENCIES Networks have become a tool for everyday social and business interactions, making it a part of the economy. Even though networking is technology-driven, many technical issues cannot be resolved in isolation in a modern economy. Technical issues i nvolving networks now get intertwined with business, financial, social, and even political processes and systems. Factoring technology implications in business and economic decision-making has not kept pace with increased role of technology in the modern economy. Many problems in networking today can be traced to insufficient appreciation of these system interdependencies and deficiencies. ——————————————— — • Ram Kumar Singh is with the Departmen t of Information Technology, International School of Business & Tech. Kampala , Uganda, East Africa. Post Box-28220 • Prof. T. Ramanujam is with the De partment of Electronics and Commu- nication Engineering, Krishna Engineering College, Mohan nagar Ghazia- bad, U.P- India. T JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN : 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 101 2.1 Denial of Responsibility National Association for Security and Trust Evaluation warns of an increase in serious security breaches known as Denial of Responsibility (DoR) attacks. More recent DoR attacks include the inclusion of cool features” that benefit only a few curious experimenters but open the door to serious intrusions. DoR attacks are vi ral, in the sense that they begin in a g overnmental directive or soft- ware company, but sp read rapidly to major c ustomers who wish to minimize the risks created by the software flaws. Force the application to operate in low memory, and network-availability conditions. Executing an appli- cation, the computer loads it into memory and then gives the application additional memory to store and manipu- late its internal data. Although, memory is temporary, it really be useful, an applica tion needs to store persistent data. Without sufficient memory disk space, most appli- cations will not perform their intended function. The ob- jective of this attack is to deprive the application of any of these resources so testers ca n understand how robust and secure their application is under stress. The attacks caused the availability of the applicati on as concern with the security aspects. Independent entities. Lucent, which inherited most of the original Bell Labs, became a product organization retain- ing only market-driven research activities. The entities that emerged from the divest iture no longer had monop- oly markets and were forced into organizations havin g financial objectives as their primary focus. Besides, the smaller revenue base was insufficient to maintain original level of investment in new technology innovation and scientific research. 2.2 Emergence of "Pecuniary entrepreneurship" When an economy adopts large-scale innovations – whether technological or not - the result is a wave phenomenon. Best-known economic wave theory is called Kondratieff wave. A technology adoption wave has four phases: 1. Early adoption 2. Technology acceptance and growth 3. Financial market exuberance and bubble 4. Bubble collapse The original economic wave phenomenon occurred during the "tulip Mania" in Holland in the 1630s. Unde r normal conditions, financial sy stems act as a facilitator for economic activity. During a large-sca le technology adoption phase, financial markets en ter a state of "irrational exuberance", following demonstrated practical benefits and value of new technologies. During this phase, financial markets try to drive the new technology adoption beyond the productive c apabilities possible in the economy, creating “financial bubbles” i. However, this artificial growth cannot be sustained, resulting in the inevitable collapse. The underlying dynamics can be understood from the “tulip mania”. Tulips were introduced in Holland from Turkey, and became very popular as a symb ol of wealth. The Dutch economy was already well developed and wealthy from trade. A tulip bubble takes about six months to sprout, grow, and bloom -- an unbearably long time when there is a huge demand for it. Option trading in tulips was introduced to help wider participation – option contracts could be bought and sold on tulip bulbs until they bloom. The time it takes to complete an option trade is a ti ny fraction of the six months it takes for a tulip bulb to become flower. This financial innovation enabled everyone in Holland who had interest, to participat e in the "tulip market”, trading as many times as they wished, driving up prices. The result was de-coupling of "tulip financial market" from "tulip production economy". Such a situation is unsustainable, as financial markets do not have an independent existence. Soon everybody in Amsterdam had "tulip contracts", as a result there was no new demand, and "tulip financial market" collapsed. Building networks is a tedious process, taking several decades -- too long to suit the designs of financial markets. A similar exuberance developed for the Internet in the 1990s, creating the "Int ernet bubble". Even though the "Internet Bubble" collapsed, advances in "financial engineering" are helping continuation of market exuberance and creating a new “financial capitalism” -- triumph of the speculator over the manager and of the financier over the producerii. The current “liquidity bubble” in derivatives a nd hedge funds are a mo re elaborate application of the same principles used in “tul ip markets”iii. Until financial markets reestablis h equilibrium with sustain abl e development, economic benefits from advanced networking will have to wait. 2.3 Out dated Net work Reference Model For a variety of reasons, packet switching technolog y evolved in the 1960s and the 1970s in opposition to t he prevailing Public Switched Telephone Networks (PSTN)iv. As a result, many key networking principles that were learned by trial and erro r since the first tele- phone call in 1876 were left out of packet networks. The Internet, the packet network that gained widespread adoption, also inherits many of these deficiencies. As the Internet gained popularity, it was necessary to have a reference model to help direct further develop- ment of networks. The reference model for networks that came to be accepted is shown in Fig. 1, referred hereafter as the “Packet Cloud”. The first telephones had no network but were in pri- vate use, wired together in pairs. Users who wanted to talk to different people had as many telephones as neces- sary for the purpose. A user who wished to speak, whis- JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN: 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 102 tled into the transmitter until the other party hear d. Soon, however, a bell was added for signaling, and then a switch hook and telephones took advantage of the ex- change principle already employed in telegraph net- works. Each telephone was wired to a local telephone exchange, and the exchanges were wired together with trunks. Networks were connected together in a hier archi- cal manner until they spanned cities, countries, continen ts and oceans. This was the beginning of the PSTN, though the term was unknown for many decades. Automation introduced pu lse dialing between the phone and the exchange, and then among exchanges, fol- lowed by more sophisticated address signaling includi ng multi-frequency, culminating in the SS7 network that connected most exchanges by the end of the 20th cent. 2.4 Packet-centric net work reference model There were many technical reasons for use the Packet Cloud as a reference durin g the initial growth phase of the Internet in the 1980s. When key packet Fig. 1 “Packet Cloud”, packet -centric network reference model technology developments were contemplated in the 1960s through the 1980s bandwidth was at a premium. The line speed in most early Internet links was 50 Kpbs. Under those line speeds, maximizing bandwidth utilization was of paramount importance. Packet networks offere d superior bandwidth utilization compa red to circuit switched networking, in which dedicated bandwidth allocation methods were used -- irrespective of actual us e. There were no technologies in sight that could overcome this “bandwidth bottleneck”. Soon the use of the Packet Cloud model became implicit and subconscious in the minds of network designers. The downsizing of the Bell Labs, which was occurring over the same period, reinforced this “Groupthink”v. New developments in laser and fiber optics technologies overcame the bandwidth bottleneck by the mid-1990s. However, the network industry has been unwilling to let go of the Packet Cloud dog mavi to take advantage of abundance of bandwidth and design better network systems. 3 NETWORK Networks are often classified as Local Area Network (LAN) , Wide Area Network (WAN) , Metropolitan Area Network (MAN) , Personal Area Network (PAN) , Virtual Private Network (VPN) , Campus Area Network (CAN) , Storage Area Network (SAN) , etc. depending on their scale, scope and purpose. Usage, trust levels and ac cess rights often differ between these types of network - for example, LANs tend to be designed for internal use by an organization's internal systems and employees in indi- vidual physical locations (such as a building), while WANs may connect physically separate parts of an or- ganization to each other and may includ e connections to third parties. 3.1 Local Area Net work A local Area Network (LAN) is a computer network cov- ering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. Cur- rent wired LANs are most li kely to be based on Ethernet technology, although new standards like ITU-T also pro- vide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines)[2]. For example, a library may have a wired or wireless LAN for users to interconnect local device s (e.g., printers and servers) and to connect to the internet. On a wired LAN, PCs in the library are typically connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnected devices and eventu- ally connect to the Internet. The cables to the servers are typically on Cat 5e enhanced cable, which will sup port IEEE 802.3 at 1 Gbit/s. A wireless LAN may exist using a different IEEE protocol, 802.11b, 802.11g or possibly 802.11n. The staff computers (bright green in the figure) can get to the color printer, checkout records, and the academic network and the Internet. All user co mputers can get to the Internet and the car d catalog. Each work- group can get to its local printer. Note that the printers are not accessible from ou tside their workgroup. 3.2 Campus area net work A campus area network (CAN) is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. It can be con- sidered one form of a metropolitan area ne twork, specific to an academic setting. In the case of a university campus-based campus area network, the network is likely to link a variety of camp us buildings including; academic departme nts, the univer- sity library and student residence halls. A campus area network is larger than a local area network but smaller than a wide area network (WAN) (in some cases). The main aim of a campus area network is to facilitate students accessing internet and university resources. Thi s is a network that connects two or more L ANs but that is limited to a specific and contiguous g eographical area such as a college campus, industrial c omplex, office build- ing, or a military base. A CAN may be c onsidered a type of MAN (metropolitan area network), but is generally JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN : 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 103 limited to a smaller area than a typical MAN. This term is most often used to discuss the implementation of net- works for a contiguous area. This should n ot be confused with a Controller Area Network. A LAN connects net- work devices over a relatively short d istance. A net- worked office building, school, or home usually contains a single LAN, though sometimes one building will con- tain a few small LANs (perhaps one per room), and occa- sionally a LAN will span a group of nearby buildings. 3.3 Metropolit an area network A metropolitan area network (MAN) is a network that connects two or more local area networks or campus area networks together but does not extend beyond the boundaries of the immed i ate town/city. Routers, switches and hubs are connecte d to create a metropolitan area network. 3.4 Wide area network A wide area network (WAN) is a computer network that covers a broad area (i.e. any network whose communica- tions links cross metropolitan, regiona l, or national boundaries [1]). Less formally, a WAN is a network that uses routers and public communications links. Contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolita n area networks (MANs), which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. The largest and most well- known example of a WAN is the Internet. A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to a nother and one country to another country) and that often uses transmis- sion facilities provided by co mmon carriers, such as tele- phone companies. WAN technologies generally f unction at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. 3.5 Global area network A global area networks (GAN ) specification is in devel- opment by several groups, and there is n o common defi- nition. In general, however, a GAN is a model for sup- porting mobile communications across an arbitrary num- ber of wireless LANs, sat ellite coverage areas, et c. The key challenge in mobile communications is "handing off" the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial WIRELESS local area networks (WLAN). 3.6 Virtual priv ate net work A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in so me larger net- work (e.g., the Internet) instead of by physical wi res. The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communicati ons through the public Internet , but a VPN need not have explicit security features, su ch as authentication or con- tent encryption. VPNs, for exam ple, can be used to sepa- rate the traffic of different user communities over an un- derlying network with strong security features. A VPN may have best-effort pe rforma nce, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provide r. Generally, a VPN has a topology more complex than point-to-point. A VPN allows computer users to appear to be editing from an IP address location other than the one which connects the actual computer to the Internet. 3.7 Internetwork An Internetwork is the connection of two or more distinct computer networks or network segment s via a common routing technology. The result is called an internetwork (often shortened to internet). Two or more networks or network segments connect using devices that operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. An y interconne ction among or between public, private, comm ercial, industrial, or gov- ernmental networks may also be defined as an internet- work. In modern practice, interconnected networks use the Internet Protocol. There are at least three variants of in- ternetworks, depending on who administers and who participates in them: Intranet Extranet Internet Intranets and extranets may or may not have connections to the Internet. If connected to the Internet, the intranet or extranet is normally protec ted from being accessed from the Internet without proper au thorization. The Internet is not considered to be a part of the intranet or extranet, although it may serve as a portal for access to portions of an extranet. 3. 8 Intranet An intranet is a set of networks, using the Internet Pr oto- col and IP-based tools such as we b browsers and file transfer applications, that is under the control of a single administrative entity. That ad ministrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an or- ganization. A large intranet will typically have at least one web server to provide users with organizational in- formation. 3.9 Extranet An extranet is a network or internetwork that is limited in scope to a single organization or entity a nd also has lim- ited connections to the networks of one or more other usually, but not necessarily, trusted organizations or enti- ties (e.g., a company's customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be consid- ered 'trusted' from a security standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an ex- JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN: 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 104 tranet cannot consist of a single LAN; it must h ave at least one connection with an external network. 3.10 Internet The Internet consists of a worldwide interconnection of governmental, academic, pub lic, and private networks based upon the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Re- search Projects Agency Network (AR PANET) developed by DARPA of the U.S. Depart ment of Defense. The Inter- net is also the communications backbone underlying the World Wide Web (WWW). The 'Internet' is most c om- monly spelled with a capital 'I' as a proper noun, for his- torical reasons and to distinguish it f rom other generic internetworks. Participants in the Internet use a diverse array of methods of several hundred document ed, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP Addresses) administered by the Internet Assigned Numbers Authority and address regis- tries. Service providers and large enterprises exchange information about the reach ability of their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths. 4 P ACKET BLUR D EFICIENC IES The strength of the Packet Cloud reference model is its simplicity. Use packet switching for any type of traffic: voice, data or video. There would be only “one network” to maintain and manage, if this model were adopted. Another potential benefit claimed is reuse of designs, when everything is packet-based. But the arguments in favor of Packet Cloud reference model fail to take into account its deficiencies and alternate choices available for creating better network designs. One of the glaring gaps in the Packet Cloud model is lack of out-of-band signaling. Keeping networks operating properly require “control packets”, data about status of networks and devices, as well as commands t o and from devices and systems attached to networks. One of the efficiencies in packet switching is gained by “treating all packets equally”, including control packets. But during network congestion or other problems, control packets sent to resolve problems get delayed or lost creating a vicious circle of degraded network performance and functionality. Such problems do not happen in the PSTN because of the highly relia ble Signaling System 7 (SS7). In the PSTN, control data and user data (datapath) have separate network links – they do not share the same links (“out-of-band”). Congestion in datapath networks does not degrade the SS7 network as it is designed with over capacity, redundancy and maxim um reliabi lity to function even in worst-case failures. Denial-of-Service (DoS) and Distributed-DoS (D-DoS) in the Internet are a byp roduct of lack of an out-of-band control network, similar to the S S 7 f o r t h e P S T N v i i . H o w e v e r , a d d i n g s u c h o u t - o f - b a n d signaling is inconsistent with packet network desi gn ideals. 4.1 T echnological dev elopment In common with most countries, the development of technology allowed for different networking, and the maintenance of a formal hierarchy disappeared into a distributed network. By the mid-1990s, a revised structure had appeared, reflected by the replacement of the old departmental area codes by the assignment of regional codes and a major renumbering scheme for strategic planning, privatization, and deregulation under the a us- pices of ART, the Autorité de régulation des télécommu- nications (Regulatory Authorit y for Telecommunications - since 2005, ARCEP, as responsi bility for postal services was added). After 1996, the country prepared for com- plete deregulation of the telephone network. Thus, the local exchanges (zones à autonomie d'acheminement) are connected somewhat differently by various carriers. Howeve r, the largest of these, based upon the (partially) privatized former government net- work, is a two-level long distance hierarc hy, based on 80 CTS (centre de transit secondary) and 8 CTP (centr e de transit primaries) locations. In addition, there are 12 CTI (centre de transit internationa ux) for connections to areas which are not integrated into the French telephone net- work [note that some overseas locations are considered "domestic" for telecommunications purposes]. When packet networks were developed, it was designed to carry computer data that tolerate transit delays. “Best effort routing” is a key principle of packet switching permitting delay and loss of packets while keeping the network operating for delay-tolerant traffi c. However, success of the Internet induced packe t- enthusiasts to overreach the design goals of the Internet, designing Voice-over-IP (VoIP) to counter ove rbearing telcos. Since telephone voice is real-time (propagation delay needs to be less than 200 ms for toll-grade voice), using the Internet for such tr affic is contradictory to it s design constraints. This contradiction has been re-framed as the “Quali ty of Ser vice” (QoS) pr oblem. Solutions developed for achieving desired QoS produce other side effects. The side effects of high QoS solutions degrade the original design principles of the Internet. The Internet, having become a public medium, generates public awareness of the issues -- turning technology issues in to political controversies. 5 A N EW T REND Inconsistency with existing network infrastructure is another deficiency of the Packet Cloud. Except for new all-packet segments, the Internet is an overlay over the preexisting PSTN, based on time-division-multiplexing JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN : 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 105 systems (TDM). These dedicate d, channel-allocating TDM systems do not fit the Packet Cloud model. Therefore, acceptance of the Packet Cloud model automatically obsoletes the TDM infrastructu re, which is huge, costing hundreds of billions or even trillions of dollars, based on the valuation methodology used. This premature obsolescence of useful infrastr ucture is one of the critical reasons for failure and lack of success of packet-centric implementations. New solutions and approaches for solving network problems need to accept certain constraints. One approach often suggested is “fork-lift solutions”, i.e., throwing away everything and starting overviii. Such solutions were possible in the early stages of the Internet development, when usage was confined to universities and research labs. Now, the Internet has become an everyday tool for social and business transactions. Expecting all Internet users to s w i t c h o v e r t o s o m e n e w way in a prescribed manner an d timeframe is doomed to fail. Only solutions that can reach majority usage voluntarily are likely to succ eed – solutions that offer added value and benefits to users by switching to new solutions1ix. Final steps of a full migration to a new technology generation may be implemented in a gradual manner, like the turning-off of the over-the-air TV transmission in the USx. Su ch practices are normal in other economic sectors. For ex ample, in civil engineering, roads and bridges are routinely upgrade d by building a bypass while new construction is in progress. 6 T HE T RA NSFE R N ETWORK A RCHITECTURE (TNA) Network Architecture (TNA) is a new model created by superimposing an architecture framework to the existing network infrastructure; consisting of the Internet, Signaling System 7 (SS7) network, data circuits of t he PSTN, and other networks (Fig 2). This s uper architecture is made possible with the introduction of a new network, the Access Network – to provide connectivity and transport functions between customer premise systems and backbone network systems. The key advantage of the TNA model is that it represents the current st ate of networks closel y (compared to Packet Cloud, Fig. 1), an d thus has more practical value for using in design and deployment of next generation systems. Underlying the new model is the assumption that a revolutionary approach of replacing all existing systems with new systems is not viable, due to the costs and operational constraints. The TNA model, in contrast, provides an evolutionary approach that can coexist with current systems, and provides for gradual migration to superior solutions, construct ed with best-of- breed heterogeneous systems. The TNA model permi ts the use of both packet and circuit switching technologies for designing and deploying network systems, and allows for interconnecting different networks using all possi ble combinations of network technologies. Many current and new products that a re offering local access solutions using various technologies (like VoIP, xDSL) are implemented in a manner to make Access Networks part of the Internet, and completely eliminate PSTN in the future. TNA is a reference model for designing networks wi th backward and forward JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN: 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 106 compatibility with TDM networks and products, without making it necessary to obsolete useful systems. In the TNA model, backbone networks can be designed to offer specialized capabilities for different types of traffic: voice, data, video, or special services (such as utility meters, surveillance devices, alarm monitors, appliance networks, etc.) The Access Networks transport and transfer networ k traffic between subscri ber devices and backbone networks, and implement connectivity functions. Network devices within each of these networks provide specialized capabilities optimized for the services offered by the networks they belong to. The TNA model provides a natural path for phased network evolution by providing compatibilit y with existing network infrastructure and products, while protecting current infrastr ucture, product, operation management systems, and human training investments. In addition, the TNA model allows flexible network design and deployment strategies with maximum flexibility — without mandating either a packet-centric or a circuit-centric approach. The design choices are left to be decided based on service, performance, and cost considerations. The TNA model helps in making macro-level de- cisions about network systems, and a fra mework for de- fining the functionality of network products based o n its role in a sub- network. The prima ry barrier for netwo rk evolution to meet many current future needs is the lack of viable Access Networks, with the type functional capa- bilities defined in the TNA model. 7. C LASSIFICA TION OF A TT ACKS Software security attacks are classified according to the problem when these events will be realized (Kinds of at- tack), the attack kinds are of the following kinds: 7.1. Disclosure Disclosure is the security problem caused when an at- tacker can acquire the inform ation of a system in unau- thorized way. 7.2. Deception Deception is the way through which the system accepts the false information entered by an unauthorized user to retrieve the important information. 7.3 Disruption Disruption is the security problem caused when an at- tacker can interrupt or prevent correct operation of the system. 7.4 Usurp ation Attackers cause usurpation when they can control some part of a system for misuse in unauthorized way. 8 F UTURE W ORK In this paper we tried to give the formal way to prevent New Model of Network. A formal approach of Ne w Model of Network always considered as the best sol ution to protect corporate resource s with fewer efforts. How- ever, little work has been done in this aspect, though we are trying to provide the tec hniques to alleviate the above Network attacks, which will pr ovide best ROI to organi- zations that integrate it as part of their Network devel- opment and Security attacks. 9 C ONCLUSION In this work, we have described some of the previous efforts to measure SS7, PSTN , Network, and we hav e out- lined some of the difficulties that have been encountered. We believe that a periodic, comprehensive evaluation of TNA could be valuable for network managers, informa- tion security officers and data manage rs. However, The Transfer Network Archite cture (TNA) is a reference model that can help such developments. For many rea- sons, including those discussed herein, network industry is presently unable to make technology choices based on technical merit; instead focus on turf battles and petty politics – resulting in the current stagnati on. The current packet-centric strategies are not helpful to meet the net- work needs of today and tomorrow. Superior network capabilities will emerge by promoting technology and protocol agnostic inter-operating networks, with each network implemented by optimizing its design require- ments derived from service needs, without extraneous considerations. The Transf er Network Architecture (TNA) is a reference model that can help such develop- ments . A CKNOWLEDGMENT The Success of this research work would have been uncer- tain without th e help and guidance of a dedi cated group o f people. I would like to express my true and sincere ac- knowledgements as the apprecia ti on for their cont ributio ns. I also express my sincere thanks to Dr. Ajay Sharm a, Director General, KIET , Ghaziabad, India and Prof. Ve rghese Mun- damattam , Director, Prof. B PG Raju , Principal , Prof. George Varughese, A dvisor, ISB AT, Kam pala, Uganda, East Africa, for their encouragem ent and s upport. Last but not least I hearltly thank to my family members my father Prof. D.N.Singh, wife Nirm ala Singh, Da ughter Kanc han Si ngh for their coope ration. JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN : 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 107 R EFERENCES [1] Nate Anderson, “ FCC asks for c omments on network neutr al- ity, . Ars Technica, J uly 17, 2007. [2] Ram Ku mar Singh, T. Ramanujam "I ntrusion Dete ction Syste m Using Advanced Honeypots" IJCSIS, Vol.2 June 2009, Paper 28040902. [3] “Broadband Connectivity Competition Policy” workshop, Feb. 13-14, 2007, th e Federal Trade Comm ission. [4] Margie Semilof, “Sprint ION Goes Down The Tubes” Inter- netWeek, Oct. 18, 2001. [5] Reina V. Slutske, “FCC Sets Date to En d Analog Broadcastin g”, the Signal, July 10, 2007. [6] Lynn Walsh, “World Economy: Forever Blowing Bubbles?”, Socialist Alternative, May 14, 2007 [7] George Mattathil, “Internet Could learn From the Phone Net- work”, Silicon Valley Business Ink, Nov. 08, 2002. [8] Valdes A., and Skinner K. “Pro babilistic Alert Correlation”, Recent Advances in Intrusion Detection (RAID 2001), Davis , CA, October 2001 [9] Milton Mueller, “A "clean slate" redesign of the Internet: NSF/OECD Workshop”, Internet Govern ance Project (IGP), Feb. 5, 2007, [10] Kinsella, J. (January 2005). Build a PC Honeypot. Retrieved November 5, 2005, from Wind ows IT Pros Website: http://www.windowsitpro.com/Windows/Article/ArticleID/ 44711/44711.h tml [11] Jozef Luba cz, “IP Syndr ome”, IEEE Co mmunicati ons, Feb. 2000. [12] Tsu-Wei Chem a nd Mario Gerla, “Global State Rout ing: A New Routing Scheme for Wireless Ad-Hoc Networks“ Proc. IEEE ICC’98.Martin Wolf, "The new capitalism", the Financial Times, June 19, 2007. [13] John Du nbar, “Law maker Upset b y IPhone Termi nation Fee” , Forbes, July 7, 2007 [14] “What is Groupthink?”, Psychologi sts for Social Responsibility, [15] C . E . P e r k i n s a n d E . M . R o y a r , “ A d - H o c O n D e m a n d D i s t a n c e vector Routing” Proc. 2nd IEEE. WKSP Mobile Comp. Syst em and Ap ps. [16] C-K Toh, “ A Novel Distributed Routing Protocol to Support Ad-Hoc mobile computing ”, Proc. 1996 IEEE 15th An nual Int’s Phonenix conf. Comp . and Comm. March 19996. [17] S. Murthy and J.J. Garcia-Luna- A ceves,” An efficient Routing protocol for Wireless Networks” ACM m obile networks and App. J. Special issue and routing mobile commun ication net- works [18] George Mattathil, “Conceptual Barriers for Effective Network Design”, the International Engineering Consortium, th e Annual Review of Communications, Volume 59, 2006. [19] “77th Annual Report”, B ank for Intern ational Settlement s (BIS), June 27, 2007. [20] Cliaord Stoll. Stalking the Wily Hacker. Communicationsof the ACM. pp 484- 497. 1988. [21] Computer Emergency Response Team. dtscpd Exploit Advi- sory. Ad- visory CA-2002-01 Exploitation of Vulnerability in CDE Subprocess [22] E. Balas a nd C. Viecco, “Towards a Third Ge neration Data Cap- ture Architecture of Honeypots ,” Proceedings of the 6th IEEE information Assu rance Workshop, West Point (IEEE, 2005) [23] Bruce Schnier, Decrets and Lies: Digi tal Security in a Net- worked World, Wiley Publications, 2005 [24] Thomas Ptacek, Thimoty N. News ham, Insertion, Evasion, an d Denial of Service: Eluding Network [25] Intrusi on Detection, T echnical Report, Secur e Networks Inc . 2000 [26] Haines J.A., Rossey L.M., Lipp mann R.P., and Cunningh am R. K.. Extendi ng the DARP A Off-Line Intr usion [27] Detection Evaluations in Darpa Information Survivability Con - ference and Expos ition (DISCEX) II. 2001. Anaheim, CA: IEEE Computer Society. [28] Computer emergency response team “CE RT advisory CA-96. [29] Computer emergency respons e team[CERT 97] “C ERT advisory CA-97. [30] Hal Bruch and Bill Cheswick, “Tracing anonymous packets to their approximate source” [ BC 99] [31] Digital Equipment Corporation, “Performance Tuning tips for digital Unix”, June 1996[ DEC 96] [32] Dave Dittrich, “the ‘mstr eam’ distributed de nial of service attack tool” May 2000. [33] Dave Di ttrich, “the ‘t he tribe floo d Network’ distri buted denial of service attack tool” May 2000. [34] P. Ferguson and D. Senie, “Netwo rk ingress filtering: defeating d e n i a l o f s e r v i c e a t t a c k s w h ic h employ IP source address spoofing”, RFC 2267, Jan 1998[FS 98] [35] Rangarajan, A.T. Dahbura, an d E.A. Ziegler, “A Distributed System-Level Diagnosis Algorithm for Arbi trary Network To - pologies,” IEEE Trans. C omputers, vol. 44, pp. 312-333 Ram Kumar Singh [ M.Tech.(Comp. Sci. & Engg.), B.Engg. (Elec- tronics and Communication Engg.), CCNA, Polyt Echnichnic Di- ploma in Computer Science] is S enior Lecturer and CISSP Trainer in Department of Information Tec hnology, International School of Business and Technology, Kampala,Uganda. His research area is Network Security and Information Security. Prof. T. Ramanujam is the (Founder) Dir ector of Krishna Institute of Engineering and Techology, Mohan Nagar, Ghaziabad, U.P., India. He is currently doing Ph D in areas related to computational Biolog y and Bioinformatics , M Tech (Electrical Engg with specialisation in Computer Science from IIT, Kanpur) and M Sc in Military History from Madras University, BE(Hons) in Electrical Engg, . He retired as an Air Vice Marshal of Indian Air Force after 35 years of distin- guished service and is in the field of academics for the last 8 years. He was Dean (Academics), KIET, Ghaziabad for 2 years.

Original Paper

Loading high-quality paper...

Comments & Academic Discussion

Loading comments...

Leave a Comment