Recent Developments

Recent Developments

Modernization in computer networking continues at a fast pace. Advances are being made on all fronts, including use of new applications, content distribution, Internet telephony, higher transmission speeds in LANs, and faster routers. But three developments merit special attention: a propagation of high-speed access networking (including wireless access), security, and P2P networking.

As discussed in "The Network Edge", increasing penetration of broadband residential Internet access via cable modem and DSL set the stage for a wealth of new multimedia applications, including voice and video over IP [Skype 2009], video sharing [YouTube 2009], and television over IP [PPLive 2009]. The increasing ubiquity of high-speed (11 Mbps and higher) public WiFi networks and medium-speed (hundreds of kbps) Internet access via cellular telephony networks is not only making it possible to remain constantly connected, but also enabling an exciting  new set of location-specific services. We'll cover wireless networks and mobility in "Wireless and Mobile Networks".

Following a series of denial-of-service attacks on well-known Web servers in the late 1990s and the large number of worm attacks (e.g., the Blaster worm), network security has become an immensely important topic. These attacks have resulted in the development of intrusion detection systems to provide early warning of an attack, and the use of firewalls to filter out unwanted traffic before it enters the network. We'll cover a number of important security-related topics in "Security in Computer Networks".

The last modernism of which we take special note is P2P networking. A P2P networking application exploits the resources in userís computers - storage, content, CPU cycles, and human presence - and has considerable independence from central servers. Normally, the userís computers have irregular connectivity. There have been various P2P success stories in the past few years, including P2P file sharing (Napster, Kazaa, Gnutella, eDonkey, LimeWire, and so on), file distribution (BitTorrent), Voice over IP (Skype), and IPTV (PPLive, ppStream). We'll discuss many of these P2P applications in "Application Layer".



Tags

computer networking, network security, p2p networking

Copy Right

The contents available on this website are copyrighted by TechPlus unless otherwise indicated. All rights are reserved by TechPlus, and content may not be reproduced, published, or transferred in any form or by any means, except with the prior written permission of TechPlus.