Access Millions of academic & study documents

a study on network secur

Content type
User Generated
Type
Study Guide
Showing Page:
1/78
6
CHAPTER 1
INTRODUCTION

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/78
7
1. INTRODUCTION
The fundamental philosophy behind the Internet is expressed by the scalability argument: no
protocol, mechanism, or service should be introduced into the Internet if it does not scale well. A
key corollary to the scalability argument is the end-to-end argument: to maintain scalability,
algorithmic complexity should be pushed to the edges of the network whenever possible.
Perhaps the best example of the Internet philosophy is TCP congestion control, which is
implemented primarily through algorithms operating at end systems. Unfortunately, TCP
congestion control also illustrates some of the shortcomings the end-to-end argument. As a result
of its strict adherence to end-to-end congestion control, the current Internet suffers from main
maladies: congestion collapse from undelivered packets.
The Internet’s excellent scalability and robustness result in part from the end-to-end nature of
Internet congestion control. End-to-end congestion control algorithms alone, however, are unable
to prevent the congestion collapse and unfairness created by applications that are unresponsive to
network congestion. To address these maladies, we propose and investigate a novel congestion-
avoidance mechanism called Network Security and Maintenance (NSM).
NSM entails the exchange of feedback between routers at the borders of a network in order to
detect and restrict unresponsive traffic flows before they enter the network, thereby preventing
congestion within the network.
Modern organizations have a huge challenge on their hands, on a scale unlike anything they’ve
seen since the Y2K crisis. They must “secure” the organization in the face of increasing
complexity, uncertainty, and interconnection brought about by an unprecedented reliance on
technology to accomplish their mission. They must also stay mindful of the heavy hand of
regulation as legislators discover the importance of security. This paper explores some of the
challenges that organizations must overcome to be successful in this environment and introduces
ways in which a change in perspective might be the impetus for an emerging mission-driven
approach to security.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/78

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 78 pages?
Access Now
Unformatted Attachment Preview
 CHAPTER 1 INTRODUCTION 1. INTRODUCTION The fundamental philosophy behind the Internet is expressed by the scalability argument: no protocol, mechanism, or service should be introduced into the Internet if it does not scale well. A key corollary to the scalability argument is the end-to-end argument: to maintain scalability, algorithmic complexity should be pushed to the edges of the network whenever possible. Perhaps the best example of the Internet philosophy is TCP congestion control, which is implemented primarily through algorithms operating at end systems. Unfortunately, TCP congestion control also illustrates some of the shortcomings the end-to-end argument. As a result of its strict adherence to end-to-end congestion control, the current Internet suffers from main maladies: congestion collapse from undelivered packets. The Internet’s excellent scalability and robustness result in part from the end-to-end nature of Internet congestion control. End-to-end congestion control algorithms alone, however, are unable to prevent the congestion collapse and unfairness created by applications that are unresponsive to network congestion. To address these maladies, we propose and investigate a novel congestion-avoidance mechanism called Network Security and Maintenance (NSM). NSM entails the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network, thereby preventing con ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4