Skip to main content
Log in

Some Issues on Computer Networks: Architecture and Key Technologies

  • Network and Security
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware, wireless/mobile network, new generation network services and applications, and foundational theories on network modeling. Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Subin Shen, Guanqun Gu. Network architectures and solutions to network problems. Journal of Southeast University (Natural Science Edition), 1999, 29(5): 1–10. (in Chinese)

  2. Clark D, Wroclawski J, Sollins K et al. Tussle in cyberspace: Defining tomorrow’s Internet. In Proc. ACM SIGCOMM’02, Pittsburgh, PA, August 19–23, 2002, pp. 347–356.

  3. Blumenthal M S, Clark D D. Rethinking the design of the Internet: The end-to-end arguments vs. the brave new world. ACM Trans. Internet Technology, August 2001, 1(1): 70–109.

    Article  Google Scholar 

  4. Saltzer J H, Reed D P, Clark D D. End-to-end arguments in system design. ACM Trans. Computer Systems. 1984, 2(4): 277–288.

    Article  Google Scholar 

  5. Chuang Lin, Fengyuan Ren. Controllable, trustworthy and scalable new generation Internet. Journal of Software, December 2004, 15(12): 1815–1821. (in Chinese)

  6. Carpenter B. Internet transparency. RFC 2775, Feb. 2000.

  7. Bush R, Meyer D. Some Internet architectural guidelines and philosophy. RFC 3439, December 2002.

  8. Bocking S. Object-oriented network protocols. In Proc. IEEE INFOCOM’97, Kobe, Japan, 1997, pp. 1245–1252.

  9. Clark D, Chapin L, Cerf V et al. Towards the future Internet architecture. RFC1287, December 1991.

  10. Tennenhouse D. Layered multiplexing considered harmful. In Proc. IFIP Workshop on Protocols for High-Speed Networks, North Holland, Amsterdam, 1989, pp. 143–148.

  11. Clark D, Tennenhouse D. Architectural considerations for a new generation of protocols. ACM SIGCOMM Computer Communications Review, 1990, 20(4): 200–208.

    Article  Google Scholar 

  12. Tennenhouse D L, Smith J M, Sincoskie W D et al. A survey of active network research. IEEE Communications Magazine, 1997, 35(1): 80–86.

    Article  Google Scholar 

  13. Campbell A T, De Meer H G, Kounavis M E et al. A survey of programmable networks. ACM SIGCOMM Computer Communication Review, April 1999, 29(2): 7–23.

    Article  Google Scholar 

  14. NewArch Project: Future-Generation Internet Architecture. http://www.isi.edu/newarch/.

  15. Clark D D, Partridge C, Ramming J C et al. A knowledge plane for the Internet. In Proc. ACM SIGCOMM’03, Karlsruhe, Germany, August 25–29, 2003, pp. 3–10.

  16. PlanetLab. http://www.planet-lab.org.

  17. CNGI. http://www.ndrc.gov.cn/gjscy/xxcy2/t20050714_35576.htm.

  18. Computer Science and Telecommunications Board (CSTB), National Research Council. Realizing the Information Future: The Internet and Beyond. Washington DC: National Academy Press, 1994.

    Google Scholar 

  19. Peng Yang, Jiagao Wu. Interaction based, service oriented model of network architecture. Acta Electronica Sinica, 2005, 33(5): 804–809. (in Chinese)

  20. Studt C. An analysis of “quality of service”. University of Illinois at Chicago, USA, 2003, http://www.mythdragon.com/QoS/.

  21. Tangmunarunkit H, Govindan R, Shenker S et al. The impact of routing policy on Internet paths. In Proc. IEEE INFOCOM’01, Anchorage, AK, April 2001, pp. 736–742.

  22. Mankin F, Braden B B et al. RSVP applicability and deployment. RFC2208, September 1997.

  23. Xipeng Xiao, Lionel M Ni. Internet QoS: A big picture. IEEE Network, 1999, 13(2): 8–18.

    Article  Google Scholar 

  24. Nichols K, Blake S, Baker F et al. Definition of the differentiated services field (DS field) in the IPv4 and IPv6 headers. RFC2474, December 1998.

  25. Blake S, Black D, Carlson M et al. An architecture for differentiated services. RFC 2475, December 1998.

  26. Rosen E, Viswanathan A, Callon R. Multiprotocol label switching architecture. RFC3031, January 2001.

  27. Crawley E, Nair R, Rajagopalan B et al. A framework for QoS-based routing in the Internet. RFC2386. August 1998.

  28. Mazumdar R R, Mason L, Douligeris C. Fairness in network optimal flow control: Optimality of productforms. IEEE Trans. Communications, 1991, 39(5): 775–782.

    Article  Google Scholar 

  29. Shigang Chen, S Nahrstedt K. An overview of Quality-of-Service routing for the next generation high-speed networks: Problems and solutions. IEEE Network, 1998, 12(6): 64–79.

    Article  Google Scholar 

  30. Floyd S, Jacobson V. Random early detection gateways for congestion avoidance. IEE/ACM Trans. Networking, 1993, 1(4): 397–413.

  31. Hollot C, Misra V, Towsley D, Gong W B. On designing improved controllers for AQM routers supporting TCP flows. In Proc. IEEE INFOCOM’01, Anchorage, Alaska, 2001, pp. 1726–1734.

  32. Bailey J, McKnight L. Internet Economics. Cambridge: MIT Press, 1997.

    Google Scholar 

  33. Shenker S. Fundamental design issues for the future Internet. IEEE Journal on Selected Areas in Communications, September 1995, 13(7): 1176–1188.

    Article  Google Scholar 

  34. Yongqiang Dong, Jun Tao, Xiaojun Ma. A feedback merging algorithm based on utility distance in adaptive layered multicast. Journal of China Institute of Communications, 2004, 25(2): 16–25. (in Chinese)

  35. Yongqiang Dong, Jun Tao, Qijin Ji. Welfare-economic model of the network resource allocation. Journal of Southeast University (Natural Science Edition), 2005, 35(3): 361–365. (in Chinese)

  36. Jun Tao. Research on the key technologies of QoS-allocation based on non-cooperative game theory model [Dissertation]. Southeast University, 2005. (in Chinese)

  37. Klerer S Mark. The OSI management architecture: An overview. IEEE Network Magazine, 1988, 2(2): 20–29.

    Article  Google Scholar 

  38. Fedor M, Schoffstall M, Davin C et al. A simple network management protocol (SNMP). RFC1098, April 1989.

  39. Jun Shen, Yun Yang. RDF-based knowledge model for network management. In Proc. 8th IFIP/IEEE International Symposium on Integrated Network Management (IM2003), Colorado, USA, 2003, pp. 123–126.

  40. Hinrichs S. Integrating changes to a hierarchical policy model. In 9th IFIP/IEEE Int. Symp. Integrated Network Management (IM2005), Nice, France, May 16–19, 2005, pp. 441–454.

  41. Tripathi A, Ahmed T, Pathak S et al. Paradigms for mobile agent based active monitoring of network systems. In Proc. IEEE Network Operation and Management Symposium (NOMS 2002), Florence, Italy, 2002, pp. 65–78.

  42. Xiaoyun Wang, Hongbo Yu. How to break MD5 and other hash functions. In Proc. Eurocrypt’2005: 24th Annual Int. Conf. the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22–26, 2005, pp. 19–35.

  43. Xiaoyun Wang, Xuejia Lai, Dengguo Feng et al. Cryptanalysis of the hash functions MD4 and RIPEMD. In Proc. Eurocrypt’2005: 24th Annual Int. Conf. the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22–26, 2005, pp. 1–18.

  44. Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing. In Proc. IEEE Int. Conf. Computers, Systems and Signal Processing, Bangalore, India; New York, 1984, pp. 175–179.

  45. Bennett C H, Brassard G et al. Experimental quantum cryptography. Journal of Cryptology, 1992, 5(1): 3–28.

    Article  MATH  Google Scholar 

  46. Ekert A. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett., 1991, 67: 661–663.

    Article  MATH  MathSciNet  Google Scholar 

  47. Bennett C H. Quantum cryptography using any two nonorthogonal states. Phy. Rev. Lett, 1992, 68: 3121–3123.

    Article  MATH  Google Scholar 

  48. Szabolcs Szigeti, Péter Risztics. Will IPv6 bring better security? In Proc. 30th Euromicro Conference (Euromicro’04), Rennes, France, September 2004, pp. 532–537.

  49. Chaterine A Meadows. Formal verification of cryptographic protocols: A survey. In Proc. 4th Int. Conf. the Theory and Applications of Cryptology: Advances in Cryptology, Wollongong, Australia, November 28–December 1, 1994, pp. 135–150.

  50. Levente Buttyan. Formal methods in the design of cryptographic protocols. Technical Report SSC/1999/038, Swiss Federal Institute of Technology, Institute for Computer Communications and Applications (ICA), November 1999.

  51. Botao Li, Junzhou Luo. Modeling and analysis of non-repudiation protocols by using Petri nets. J. Computer Research and Development, 2005, 42(9): 1571–1577. (in Chinese)

  52. Catherine Meadows. Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE Journal on Selected Areas in Communications. 2003, 21(1): 44–54.

    Google Scholar 

  53. Clark D, Pasquale J et al. Strategic directions in networks and telecommunications. ACM Computing Surveys, 1996, 28(4): 679–690.

    Article  Google Scholar 

  54. Anderson J P. Computer security technology planning study. ESD-TR-73-51, Vol.II, ESD/AFSC, Hanscom Field, Bedford, MA 01730, October, 1972.

  55. Milojicic D. Middleware’s role, today and tomorrow. IEEE Concurrency, 1999, 7(2): 70–80.

    Article  Google Scholar 

  56. The Open Group. DCE 1.1: Remote procedure call. Open Group Technical Standard, Document Number C706, August 1997.

  57. Schmidt D C, Vinoski S. Comparing alternative client-side distributed programming techniques (column 3). SIGS C++ Report, May 1995, 7(4).

  58. Schmidt D C, Vinoski S. Comparing alternative server distributed programming techniques. SIGS C++ Report, October 1995, 7(8).

  59. Menasce D A. MOM vs. RPC: Communication models for distributed applications. IEEE Internet Computing, 2005, 9(2): 90–93.

    Article  Google Scholar 

  60. Junqing Xie, Yun Wang, Guanqun Gu. ORBUS: An implementation of CORBA specification. Journal of Software, 1998, 9(Supplement): 192–196.

    Google Scholar 

  61. Junqing Xie, Yun Wang, Guanqun Gu. CORBA specification, implementation and application in CIMS environment. Computer Integrated Manufacturing System, 1999, 5(2): 16–20.

    Google Scholar 

  62. Zhuowei Shen, Junqing Xie, Yun Wang. Research on end-to-end scheduling model for real-time CORBA system and its schedulability. Chinese Journal of Computers, 2003, 26(4): 397–405. (in Chinese)

  63. Zhuowei Shen, Yun Wang. Improved schedulability analysis algorithm for end-to-end real-time CORBA scheduling model. Journal of Southeast University (Natural Science Edition), 2003, 33(6): 685–688.

    Google Scholar 

  64. Yun Wang, Emmanuelle Anceaume, Francisco Brasileiro et al. Solving the group priority inversion problem in a timed asynchronous system. IEEE Trans. Computers, 2002, 51(8): 900–915.

    Article  Google Scholar 

  65. Elizabeth M R, Santa Barbara. A review of current routing protocol for ad hoc mobile wireless networks. IEEE Personal Communication, 1999, 6(2): 46–55.

    Article  Google Scholar 

  66. Hong D, Rappaport S S. Traffic model and performance analysis for cellular mobile radio telephone system with prioritized and non-prioritized handoff procedures. IEEE Trans. Vehicular Technology, 1986, 35(3): 77–92.

    Google Scholar 

  67. Xue Zhang. Survey on call admission control models in wireless mobile networks. Journal of Communications, 2005, 26(8): 99–106. (in Chinese)

    Google Scholar 

  68. Fang Y, Chlamtac I. A new mobility model and its application in the channel holding time characterization in PCS networks. In Proc. IEEE INFOCOM ’99, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, New York, USA, Mar. 1999, 1: 20–27.

  69. Levine D A, Akyildiz I F, Naghshineh M. A resource estimation and call admission algorithm for wireless multimedia networks using the shadow cluster concept. IEEE/ACM Trans. Networking, 1997, 5(1): 1–12.

    Google Scholar 

  70. Jiang J, Lai T H. Call admission control vs. bandwidth reservation: Reducing handoff call dropping rate and providing bandwidth efficiency in mobile networks. In Proc. 2000 Int. Conf. Parallel Processing, Toronto, Canada, August 2000, pp. 581–588.

  71. Kwon T, Choi Y, Bisdikian C et al. QoS provisioning in wireless/mobile multimedia networks using an adaptive framework. ACM Wireless Networks, 2003, 9(1): 51–59.

    Article  MATH  Google Scholar 

  72. Xue Zhang. Pricing based adaptive call admission control algorithm for wireless networks. Engineering Science, 2005, 8(4): 32–38. (in Chinese)

    Google Scholar 

  73. Linfeng Liu, Ye Liu. Dynamic management scheme of multilevel hierarchical mobile IPv6. Journal of Southeast University (Natural Science Edition), 2005, 35(6): 838–842. (in Chinese)

  74. Subramanian L, Stoica I, Balakrishnan H et al. OverQoS: Offering Internet QoS using overlays. ACM SIGCOMM Computer Communication Review, 2003, 33(1): 11–16.

    Article  Google Scholar 

  75. Chu Y H, Rao S G, Zhang H. A case for end system multicast. In Proc. 2000 ACM SIGMETRICS Int. Conf. Measurement and Modeling of Computer Systems, June 2000, pp. 1–12.

  76. Balakrishnan H, Snoeren A C. An end-to-end approach to host mobility. In Proc. 6th Annual Int. Conf. Mobile Computing and Networking, Boston, Massachusetts, 2000, pp. 155–166.

  77. Jiagao Wu, Xiaoguo Ye, Aiquan Jiang. A routing algorithm in heterogeneous overlay multicast networks. Journal of Software, 2005, 16(6): 1112–1120. (in Chinese)

  78. Stoica I, Morris R, Karger D et al. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proc. ACM SIGCOMM’01, San Diego, California, Aug. 2001, pp. 149–160.

  79. Rowstron A, Druschel P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. 18th IFIP/ACM Int. Conf. Distributed Systems Platforms (Middleware 2001), Heidelberg, Germany, November 2001, pp. 329–350.

  80. Ye Liu, Peng Yang. Study on mechanism of trust management to P2P networks based on the repeated game theory. Journal of Computer Research and Development, 2006, 43(4): 586–593. (in Chinese)

  81. Web Services Architecture. 2004, http://www.w3.org/TR/ws-arch/.

  82. Kun Yue, Xiaoling Wang, Aoying Zhou. Underlying techniques for Web services: A survey. Journal of Software, 2004, 15(3): 428–442. (in Chinese)

  83. Mennie D, Pagurek B. An architecture to support dynamic composition of service components. In Proc. 5th Int. Workshop on Component-Oriented Programming (WCOP 2000), Sophia Antipolis, France, 2000, pp. 1–8.

  84. Yang J, Papazoglou M P. Web Component: A substrate for Web service reuse and composition. In Proc. 14th Conf. Advanced Information Systems Eng. (CAiSE 02), Toronto, Canada, May 27–31, 2002, pp. 21–36.

  85. Jinghai Rao, Peep Kungas, Mihhail Matskin. Application of linear logic to Web service composition. In Proc. Int. Conf. Web Services (ICWS 2003), Las Vegas, NV, United States, CSREA Press, 2003, pp. 3–9.

  86. Foster I, Kesselman C. The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers, 1999.

  87. DeFanti T, Foster I, Papka M et al. Overview of the I-WAY: Wide area visual supercomputing. International Journal of Supercomputer Applications and High Performance Computing, 1996, 10(2): 123–130.

    Google Scholar 

  88. Foster I, Kesselman C. Globus: A metacomputing infrastructure toolkit. International Journal of Supercomputer Applications, 1997, 11(2): 115–128.

    Article  Google Scholar 

  89. Grimshaw A, Wulf W et al. The legion vision of a worldwide virtual computer. Communications of the ACM, 1997, 40(1): 39–45.

    Article  Google Scholar 

  90. OGSA Working Group. The open grid architecture, version 1.0. GGF Working Draft, http://forge.gridfo-rum.org/projects/ogsa-wg.

  91. Floyd S, Paxson V. Difficulties in simulating the Internet. IEEE/ACM Trans. Networking, August 2001, 9(4): 392–403.

    Google Scholar 

  92. Watts D, Strogatz S. Collective dynamics of “Small-world” networks. Nature, 1998, 393(4): 440–442.

    Article  Google Scholar 

  93. Carlson J, Doyle J. Highly Optimized Tolerance: Robustness and design in complex systems. Physics Review Letters, 2000, 84(11): 2529–2532.

    Article  Google Scholar 

  94. Barabasi A L, Albert R. Scale-free network. Science, 1999: 286: 509.

    Google Scholar 

  95. Guanrong Chen, Zhengping Fan, Xiang Li. Modeling the complex Internet topology. Complex Dynamics Communication Networks, Springer, 2005, pp. 213–234.

  96. Youping Li. Constructing broadcasting and storage networks. Computer World, September 2005. (in Chinese)

  97. Leland W, Taqqu M, Willinger W, Wilson D. On the self-similar nature of Ethernet traffic (extended version). IEEE/ACM Trans. Networking, 1994, 2(1): 1–15.

    Google Scholar 

  98. Norros I. On the use of fractional Brownian motion in the theory of connectionless networks. IEEE JSAC, 1995, 13(6): 953–962.

    Google Scholar 

  99. Feldmann A, Gilbert A, Willinger W. Data network as cascades: Investigating the multifractal nature of Internet WAN traffic. In Proc. ACM SIGCOMM’98, Sep. 1998, 28(4): 42–55.

  100. Erramilli A, Narayan O, Neidhardt A et al. Experimental queueing analysis with long-range dependent packet traffic. IEEE/ACM Trans. Networking, April 1996, 4(2): 209–223.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guan-Qun Gu.

Additional information

Survey: This research is supported in part by the National Natural Science Foundation of China under Grants No.90604003 and No.90604004, and by the National Grand Fundamental Research 973 Program of China under Grant No.2003CB314801.

Guan-Qun Gu graduated from Nanjing Institute of Technology (now renamed as Southeast University), China, in 1962. He is currently with the School of Computer Science and Engineering, Southeast University, China, as a professor and holds the president of Southeast University. He is an academician of the Chinese Academy of Engineering. He has published more than 100 papers in referred journals and 6 books on computer networking and applications. His current research interests include computer networks, computer-integrated manufacturing systems, network service platform and network applications.

Jun-Zhou Luo received his B.S. degree in applied mathematics, M.S. and Ph.D. degrees in computer science, all from Southeast University, China, in 1982, 1992 and 2000, respectively. As a principal investigator, he completed 20 national and provincial projects in the past 18 years. He published over 270 journal and conference papers on computer network. Now he is a professor and the dean of the School of Computer Science and Engineering, Southeast University. His research interests include protocol engineering, network security, network management, and grid computing.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gu, GQ., Luo, JZ. Some Issues on Computer Networks: Architecture and Key Technologies. J Comput Sci Technol 21, 708–722 (2006). https://doi.org/10.1007/s11390-006-0708-2

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-006-0708-2

Keywords

Navigation