Indian Streams Research Journal



Similar documents
Golden Research Thoughts

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

GoldenResearch Thoughts

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Golden Research Thoughts

Indian Streams Research Journal

Indian Streams Research Journal

Golden Research Thoughts

Golden Research Thoughts

Golden Research Thoughts

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Golden Research Thoughts

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

GoldenResearch Thoughts

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Golden Research Thoughts

Indian Streams Research Journal

Golden Research Thoughts

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

GoldenResearch Thoughts

Indian Streams Research Journal

Indian Streams Research Journal

Indian Streams Research Journal

Golden Research Thoughts

Indian Streams Research Journal

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and


Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Research Directions. International Multidisciplinary Research Journal. Vol 3 Issue 4 Oct 2015 ISSN No: Editor-in-Chief S.P.

The Internet and Network Technologies

Computer Networking: A Survey

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Local-Area Network -LAN

NETWORKING TECHNOLOGIES

Computer Networks Vs. Distributed Systems

How To Monitor Performance On Eve

MANAGEMENT INFORMATION SYSTEMS 8/E

Chapter 9 Communications and Networks

C Information Systems for Managers Fall 1999

524 Computer Networks

Local Area Networks (LANs) Blueprint (May 2012 Release)

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

A Catechistic Method for Traffic Pattern Discovery in MANET

Performance Evaluation of Wired and Wireless Local Area Networks

Agenda What can we do now? And 5 years from now we will still be current!

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Truffle Broadband Bonding Network Appliance

Networking. Topic 5. Contents

Network Topologies. Network Topologies

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

DSL-2600U. User Manual V 1.0

POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 19, 2011

LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES. Updated September, 2013

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Network Design. Yiannos Mylonas

ADSL MODEM. User Manual V1.0

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition

Telecommunications, Networks, and Wireless Computing

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Telecom Applications:

Using High Availability Technologies Lesson 12

Introduction to computer networks and Cloud Computing

Wireless Network Standard and Guidelines

A Review of Different Comparative Studies on Mobile Operating System

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

COMMZOOM BROADBAND INTERNET SERVICE DISCLOSURES

NEWWAVE COMMUNICATIONS BROADBAND INTERNET SERVICE DISCLOSURES. Updated October 2012

How To Study Working Capital Management At R.Ly.Steel And Energy Ltd

Portable Wireless Mesh Networks: Competitive Differentiation

Network Structure or Topology

Chapter 6 Telecommunications, Networks, and Wireless. Computing

Cisco Network Performance Evaluation Using Packet Tracer

Transcription:

Vol 5 Issue 9 Oct 2015 ISSN No : 2230-7850 ORIGINAL ARTICLE International Multidisciplinary Research Journal Indian Streams Research Journal Executive Editor Ashok Yakkaldevi Editor-in-Chief H.N.Jagtap

Welcome to ISRJ RNI MAHMUL/2011/38595 ISSN No.2230-7850 Indian Streams Research Journal is a multidisciplinary research journal, published monthly in English, Hindi & Marathi Language. All research papers submitted to the journal will be double - blind peer reviewed referred by members of the editorial board.readers will include investigator in universities, research institutes government and industry with research interest in the general subjects. International Advisory Board Flávio de São Pedro Filho Federal University of Rondonia, Brazil Kamani Perera Regional Center For Strategic Studies, Sri Lanka Janaki Sinnasamy Librarian, University of Malaya Romona Mihaila Spiru Haret University, Romania Delia Serbescu Spiru Haret University, Bucharest, Romania Anurag Misra DBS College, Kanpur Titus PopPhD, Partium Christian University, Oradea,Romania Mohammad Hailat Dept. of Mathematical Sciences, University of South Carolina Aiken Abdullah Sabbagh Engineering Studies, Sydney Ecaterina Patrascu Spiru Haret University, Bucharest Loredana Bosca Spiru Haret University, Romania Fabricio Moraes de Almeida Federal University of Rondonia, Brazil George - Calin SERITAN Faculty of Philosophy and Socio-Political Sciences Al. I. Cuza University, Iasi Editorial Board Hasan Baktir English Language and Literature Department, Kayseri Ghayoor Abbas Chotana Dept of Chemistry, Lahore University of Management Sciences[PK] Anna Maria Constantinovici AL. I. Cuza University, Romania Ilie Pintea, Spiru Haret University, Romania Xiaohua Yang PhD, USA...More Pratap Vyamktrao Naikwade Iresh Swami ASP College Devrukh,Ratnagiri,MS India Ex - VC. Solapur University, Solapur R. R. Patil Head Geology Department Solapur University,Solapur Rama Bhosale Prin. and Jt. Director Higher Education, Panvel Salve R. N. Department of Sociology, Shivaji University,Kolhapur N.S. Dhaygude Ex. Prin. Dayanand College, Solapur Narendra Kadu Jt. Director Higher Education, Pune K. M. Bhandarkar Praful Patel College of Education, Gondia Sonal Singh Vikram University, Ujjain Rajendra Shendge Director, B.C.U.D. Solapur University, Solapur R. R. Yalikar Director Managment Institute, Solapur Umesh Rajderkar Head Humanities & Social Science YCMOU,Nashik S. R. Pandya Head Education Dept. Mumbai University, Mumbai Govind P. Shinde Bharati Vidyapeeth School of Distance Education Center, Navi Mumbai Chakane Sanjay Dnyaneshwar Arts, Science & Commerce College, Indapur, Pune Awadhesh Kumar Shirotriya Secretary,Play India Play,Meerut(U.P.) G. P. Patankar Alka Darshan Shrivastava S. D. M. Degree College, Honavar, Karnataka Shaskiya Snatkottar Mahavidyalaya, Dhar Maj. S. Bakhtiar Choudhary Director,Hyderabad AP India. S.Parvathi Devi Ph.D.-University of Allahabad Sonal Singh, Vikram University, Ujjain Rahul Shriram Sudke Devi Ahilya Vishwavidyalaya, Indore S.KANNAN Annamalai University,TN Satish Kumar Kalhotra Maulana Azad National Urdu University Address:-Ashok Yakkaldevi 258/34, Raviwar Peth, Solapur - 413 005 Maharashtra, India Cell : 9595 359 435, Ph No: 02172372010 Email: ayisrj@yahoo.in Website: www.isrj.org

Indian Streams Research Journal Impact Factor : 3.1560(UIF) ISSN 2230-7850 Volume - 5 Issue - 9 Oct - 2015 A STUDY OF NETWORKING AND TOPOLOGY Ujwala Gyanoji Maske Assistant Professor, Department of Management Science, V. S. S. College, Jalna, Maharashtra. ABSTRACT The large-scale networking nature of the Internet and how to account for it adequately when studying core internet issues such as topology, routing, traffic, performance, and control. One approach is to use a combination of large-scale network measurement infrastructures and largescale network simulation engines. A central problem in faithfully simulating large-scale networks is that packet-level descriptions scale poorly. KEYWORDS :Networking, Topology, The large-scale networking nature, environment. INTRODUCTION: The network is made up of hardware and software components, the hardware consist of network interface card in all the machines and the cable that tie them together. REVIEW OF LITERATURE: Amin Vahdat, Ken Yocum, Kevin Walsh, Priya Mahadevan, Dejan Kosti c, Jeff Chase, and David Becker: the present study relates with Scalability and Accuracy in a Large-Scale Network Emulator the study suggested that Ideally, an environment for evaluating large-scale distributed services should support: i) unmodified applications, ii) reproducible results, iii) experimentation under a broad range of network topologies and dynamically changing network characteristics, and iv) large-scale experiments with thousands of participating nodes and gigabits of aggregate cross traffic. In this paper, we present the design and evaluation of ModelNet, a large-scale network emulation environment designed to meet these goals. Santanu Santra1, Pinaki Pratim Acharjya2 (2013): The study relates with A Study And Analysis on Computer Network Topology For Data Communication the present study represents the performance of different kinds of topologies is considered and studied. Description of some inherent advantages and disadvantages computer network topologies to any system under study also has been described in this paper. This paper has provided some knowledge of analysis approaches for dealing with network topology related 1

problems. The techniques covered in this discussion can be adapted to related computer network applications. This research work can also be extended further. Milan Cabarkapa, Djordje Mijatovic, and Nenad Krajnovic (2011): The study related to Network Topology Availability Analysis In this paper the availabilities of some network topologies are analyzed and calculated. Software based on exact All-terminal Graph reduction Algorithm is developed and applied. Results, conclusions and solutions are presented, demonstrated and discussed. RESEARCH METHODOLOGY: The present research article is mostly depends on secondary sources of data, which is collected by the research from various books, research journals, research articles and various official websites. OBJECTIVES OF THE STUDY: Following are the objectives have been made for the current study: 1.To know the Large Scale Networking Nature 2.To Study the History of Large Scale Networking 3.To understand Mobile Networking 4.To Study the Generations of Large Scale Networking 5.To Know the Types of Mobile Social Networks and Models 6.To Study the Advantages of Network HISTORY: In business having a number of computer system dispersed in organizational units both within and outside countries depending on the business. Computer networks mean a collection of autonomous computers interconnected by a single technology. In short the two computers are interconnected each other and share the information. The numbers of computers are connected to each other through the data communication system in that computer microprocessor minicomputers medium scale computer and also the large scale computers are present. In networks can have its own processing capabilities and can also share computer hardware programs software and data files. The internet is internally connected to the persons or people. in business recognized how much money they could save and how much productivity they could gain by using networking technology. They started adding networks and expanding existing networks almost as rapidly as new network technologies and products were introduced at that time in 1980 the tremendous expansion in net workings In studies of the networks of citations between scientific papers, Derek de Solla Price showed in 1965 that the number of links to papers i.e., the number of citations they receive had a heavy-tailed distribution. He did not however use the term "scale-free network", which was not coined until some decades later. In a later paper in 1976, Price also proposed a mechanism to explain the occurrence of power laws in citation networks, which he called "cumulative advantage" but which is today more commonly known under the name preferential attachment. Recent interest in scale-free networks started in 1999 with work by Albert-László Barabási and colleagues at the University of Notre Dame who mapped the topology of a portion of the World Wide Web, finding that some nodes, which they called "hubs", had many more connections than others and 2

that the network as a whole had a power-law distribution of the number of links connecting to a node. MOBILE NETWORKING: Mobile social networking is social networking where individuals with similar interests converse and connect with one another through their mobile phone. Much like web-based social networking, mobile social networking occurs in virtual communities. A current trend for social networking websites, such as Face book is to create mobile apps to give their users instant and real-time access from their device. More and more, the line between mobile and web is being blurred as mobile apps use existing social networks to create native communities and promote discovery, and web-based social networks take advantage of mobile features and accessibility. As mobile web evolved from proprietary mobile technologies and networks, to full mobile access to the Internet, the distinction changed to the following types: 1) Web based social networks being extended for mobile access through mobile browsers and smart phone apps. 2) Native mobile social networks with dedicated focus on mobile use like mobile communication, location-based services, and augmented reality, requiring mobile devices and technology. The evolution of social networking on mobile networks started in 1999 with basic chatting and texting services. With the introduction of various technologies in mobile networks, social networking has reached to an advance level over four generations. First Generation: First generation began in 1999 or early 2000. Technologies used in this generation are application based, pre-installed on mobile handsets. Features such as text only chat via chat rooms. Second Generation: Second generation began in 2004 through 2006. Introduction of 3G and camera phones added many features such as uploading photos, mobile search for person based on profile, contact with person anonymously etc. The applications are mostly useful for dating purpose. The services of this generation mobile social networks can be used by pay as you go or subscription to service. Third Generation: The experiments for this generation mobile social networks started in 2006. It was adopted widely in 2008/2009. This generation brought tremendous changes and made mobile social networks as a part of daily life. The features include richer user experience, automatic publishing to web profile and status updates. Technologies for WAP 2.0, Java on the server, MMS, voice capture etc. Applications introduced were customized with general interests such as music, mobile specific content distribution. The services in this generation can be used by plans such as pay as you go; subscription based still popular networks gain scale to become content distribution platform. Fourth Generation: Fourth generation began in 2008 and reached in 2010.All the features in third generation are advanced in this generation of social mobile networks. The features of this generation include the features of third generation, ability to hide/ mask presence, asynchronous video conversation, multi 3

point audio chat conversation with one button, multiplayer mobile gaming etc. Technologies which made these features possible are web 2.0 widgets, Flash lite, open social, open handset alliance. The business model of previous generation continued along with virtual currency purchase and trade of virtual goods. Types of Mobile Social Networks: 1] Companies that partner with wireless phone carriers to distribute their communities via the default start pages on mobile phone browsers. 2] Companies that do not have such carrier relationship and rely on other methods to attract users. Models: Mobile social networking sites allow users to create a profile, send and receive messages through phone or computer and visit an on-line version of mobile site. There are different models which were displayed by different networking sites. Most of these sites have many features in unique feature or special function that other sites don t share, but the main function of the site is exactly the same as other services. All these sites are categorized according to the following business models. 1. Group Text: This model focuses on ability to send short, text based messages to a large group of people simultaneously. It can be by SMS. This category enables messages reach right people as quickly as possible. 2. Location-Aware: This model relies on geotaxis to provide location information about users and content. This allows users to tag particular locations with images and other information. These tags can be accessible by the users which are mapped on world map. Some of the sites in this category enable to receive alerts when the user passes by the location in which somebody was tagged in. Some location-aware applications function more like radar. They take advantage of growing interest in location-based services by keeping track of all the contacts. This allows knowing people who are nearest to the user. A lot of these sites also allow you to check if there s anyone near a particular venue or location, and some of them will actively alert you if any of your contacts comes within a certain distance. 3. Social Network: The sites using this try to use on-line social networking sites as closely as possible. Many of these sites use mobile portals of already existing and successful sites such as Facebook. They offer vast number of functions including multimedia posts, photo sharing instant messaging etc. Most of these sites offer inexpensive international calling and texting facilities. 4. Media Share: This model can be viewed as an advanced version of the Group Text category. Instead of text messages, audio and video files are transmitted among the group, or, as in the case of Instagram and its competitors, shared to the public. Most of them store media content online for easy storage and access. 4

5. Social Gaming: This model is about connecting people through both multi-player games and competitive single-player games. Mobile devices are always increasing their capacity for graphics performance and computing power, making them capable gaming devices.the leader in this category is Zynga, creators of Farmville and Words with Friends, though it has suffered a decline. Safety Issues in Mobile Social Networks: Safety issues in mobile social networks are concerned about the condition of being protected against different types of failure, damage, error, accidents, harm or any other non-desirable event, while mobile carriers contact each other in mobile environments. Network Security: 'Network security consists of the different types of authorized access and also the misuse and modification of the computer network and network resources, this Network security controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network Security Concepts: Network security starts with authenticating, commonly with a username and a password. Since this requires just one detail authenticating the user name i.e., the password this is sometimes termed one-factor authentication. In that two different authentication are present like security token and ATM card and also the fingerprint. In network some harmful content are present like worms in that worms remove through the antivirus software. Security Management: Security management for networks is different for all kinds of situations. A home or small office may only require basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming. Advantages of Network: Network having following advantages over single user computer system. 1 Multi-User Computing Environment: Sharing of resources and database to improve performance and quality of the system it provides multiuser computer environment 2. Centralized Network Distributed Network: Higher powerful computer such as mini or mainframe computers available to provide multiuser facility to this central machine various terminal are connected users used to work this central machine through these terminals such a network known as centralized network. 5

3. Price Factor: Higher computer initial investment is too large as compare to LAN.LAN are very easy to install and easy to operate compare to minicomputer. 4. Familiar Environment: Users all ready working with single user micro computers having windows. Environment can easily works with minimum training where as it required and a large control training to work with minicomputer. 5. Simultaneously Access: A nosiness computing multiple employes is using computer often need access to send data at the same time if employes keep separate copy of data on different computers updating data become very difficult. 6. Shared Peripheral Devices: It is not very cost effective for each user to have an independent peripheral device especially expensive one such as laser printer scanner. Shairing such devices on network make cost much less. 7. Personal Communication: Single user computer system exchange of information and data is very difficult data can be transferred from one machine to another by using floppy cd. 8. Easier Backup: In many business data is extremely valuable with single user computer system if any machine fail the important data of business will loss. 9. Transmission Speed: In case of minicomputer transmission speed is 9600kbps in case of LAN transmission speed is in the range of 2.6mbps. Network Topology: There are different topologies in which computers can be connected to one another over networks. The different topologies are present in the network like BUS, MESH, RING and STAR. 1. Bus Topology: In bus topology all nodes are connected using a single communication through interface units and cable tab.messages are broadband along whole cable to recognize its own address only that node receive the messages which address available along with message. Bus topology having a some advantages like a it is a short cable length and simple wiring lay out also the simple architecture and easy to expand. The different disadvantages also present in that bus topology like fault diagnosis is difficult, repeater configuration. 2. Mesh Topology: Mesh is a network topology in which devices are connected with many interconnection 6

between network node in a true mesh topology every node has a connection to every other connection in the network. In that mesh topology the full mesh topology and partial topology are present. Mesh topology connected to the different node each other and pass the data from one to other its main advantages is the arrangement of node is such that it is possible to transmit data from one node to many node. But the arrangement of each and every network node is connected to each and every other node of the network create a problem for implementation of cables and it is having a large cost for the cable it s a disadvantage of mesh topology. 3. Ring Topology: Ring topology is also known as loop topology in which each node is connected to its only two adjutant neighboring node data accepted from one node and transmitted on works to another data travels in only one direction all nodes connected forming a ring using connecting point. Its having some advantages like short cable length, suitable for optical fiber no wiring closet space required but it also disadvantages like node failure causes network failure, difficult to dingoes fault, affect the access protocol and network reconfiguration is difficult. 4. Star Topology: In that topology the hub is used the hub means the center computer or the files server are present these computer is connected to the different computer. All communication in the network has to essential to pass through the central computer with acts as the control center. This means that when messages is going to one computer to another it send to server which then transmit the messages to its destination. This topology is easy of service because of the number of connection point at the center server, also its one device per connection means that the failuare of single connection does not disturb network it can be easily remove and centralized control in that the any problem is detected and also its main advantages is simple access protocol. But in star topology the long cable length are used because each node is directly connected to center node and also the central node dependency means the fails entire network it s the disadvantages of star topology. BIBLIOGRAPHY: 1.Amin Vahdat, Ken Yocum, Kevin Walsh, Priya Mahadevan, Dejan Kosti c, Jeff Chase, and David Becker Scalability and Accuracy in a Large-Scale Network Emulator 2.Santanu Santra1, Pinaki Pratim Acharjya2 (2013): A Study And Analysis on Computer Network Topology For Data Communication International Journal of Emerging Technology and Advanced Engineering Website Volume 3, Issue 1, January 2013) 3. Milan Cabarkapa, Djordje Mijatovic, and Nenad Krajnovic (2011): Network Topology Availability Analysis, Telfor Journal, Vol. 3, No. 1, 2011. P. P. No. 23-27 4.https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&cad=rja&uact=8&ved= 0CFUQFjAFahUKEwjjvsf6l5TIAhVScI4KHf5IBtI&url=https%3A%2F%2Fcommunity.jisc.ac.uk%2Flibrary %2Fadvisory-services%2Fmobile-networking-1g-4g&usg=AFQjCNFsuRbe1YnsailxOQAbR0kWYl31xw 5. www.google.co.in 6. data Center Networking Extreme Networks 7. www.extremenetworks.com 7

8. Mobile networking: 1G to 4G Jisc community 9. Network security - Google Search 10. www.google.co.in 11. Network security - Wikipedia, the free encyclopediaen.wikipedia.org 12. Large-Scale Communication Networks: Topology, Routing, Traffic, and Control 13. www.ipam.ucla.ed 8

Publish Research Article International Level Multidisciplinary Research Journal For All Subjects Dear Sir/Mam, We invite unpublished Research Paper,Summary of Research Project,Theses,Books and Book Review for publication,you will be pleased to know that our journals are Associated and Indexed,India International Scientific Journal Consortium OPEN J-GATE Associated and Indexed,USA Google Scholar EBSCO DOAJ Index Copernicus Publication Index Academic Journal Database Contemporary Research Index Academic Paper Databse Digital Journals Database Current Index to Scholarly Journals Elite Scientific Journal Archive Directory Of Academic Resources Scholar Journal Index Recent Science Index Scientific Resources Database Directory Of Research Journal Indexing Indian Streams Research Journal 258/34 Raviwar Peth Solapur-413005,Maharashtra Contact-9595359435 E-Mail-ayisrj@yahoo.in/ayisrj2011@gmail.com Website : www.isrj.org