International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 5 | Year 2013 | Article Id. IJCTT-V4I5P43 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I5P43

Emerging Network Technologies that are Likely to Become Widely Available in the Future


Peter K. Kemei and William P.K. Korir

Citation :

Peter K. Kemei and William P.K. Korir, "Emerging Network Technologies that are Likely to Become Widely Available in the Future," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 1177-1184, 2013. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V4I5P43

Abstract

Emerging Networks technologies play an important role in the day-to-day administration of information technology in communications of different types of private and public networks. The emerging network technologies resolve the shortcoming of existing network architecture to enhance the facilitation of communication to the end user. These leads to adoption and improvement of some of the network technologies encouraging more innovation, research and development leading to emerging network technologies that are likely to become widely available in the future.

Keywords

Networks, Computing, Wireless, Internet, Technologies.

References

[1.] P Mell, T Grance, The NIST Definition of Cloud Computing, Version 15,1009 Available on: http://csrc.nist.gov/groups/SNS/cloud computing 
[2.] D Nurmi, R Wolski, C Grzegorczyk, G Obertelli, S Soman, L Youseff, D Zagorodnov, The Eucalyptus Open-sourceCloud-computing System, Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and Grid, IEEExplore, visited on 15th August 2009.
[3.] C Hutchinson, J Ward, K Castilon, Navigating the Next-Generation Application Architecture, IT Pro, IEEE Computer Society, 2009, March/April 2009, pp 18-22 
[4.] Sedayao, Implementing and Operating an Internet Scale Distributed Application using Services Oriented Architecture Principles and Cloud Computing Infrastructure, Proceedings of the iiWAS 2008, November, 2008, Linz, Austria, pp 417-421.
[5.] F Majorczyk, E Totel, L Mé, A Saïdane, Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs, IFIP International Federation for Information Processing, LNCS, Vol 278, pp 301-315, Springer Boston, 2008.
[6.] D Hervé, M Dacier, A Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol 9, April 1999, pp 805-822.
[7.] C Dimitrakakis, A Mitrokotsa, Statistical Decision Making for Authentication and Intrusion Detection,Proceedings of the 8th IEEE International Conference on Machine Learning and Applications (ICMLA 2009), IEEE Press, December 2009
[8.] M Barreno, B Nelson, R Sears, AD Joseph, JD Tyger, Can Machine Learning Be Secure?, Proceedings of the ACM Symposium on Information, Computer and Communications Security  (ASIACCS'06), 21-24 March 2006, Taipei, Taiwan
[9.] A Mitrokotsa, C Dimitrakakis, C Douligeris, Intrusion Detection Using Cost-Sensitive Classification,Proceedings of the 3rd European Conference on Computer Network Defence (EC2ND 2007), LNEE (LectureNotes in Electrical Engineering), pp 35-46, Heraklion, Crete, Greece, 4-5 October 2007, Springer-Verlag
[10.] W Fan, W Lee, S J Stolfo, M Miller, A Multiple Model Cost-Sensitive Approach for Intrusion Detection,Proceedings of the 11th European Conference on Machine Learning 2000 (ECML’00), Barcelona, Catalonia,Spain, Lecture Notes in Computer Science, Vol 1810, pp 142153
[11.] P Pietraszek, Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection, Proceedingsof Recent Advances in Intrusion Detection 7th International Symposium (RAID’04), Sophia, Antipolis, France, Lecture Notes in Computer Science 3224, Springer, pp 102-124
[12.]  E. Hossain, editor (2008). Heterogeneous Wireless Access Networks: Architectures and Protocols. Springer
[13.]  E. H. Ong and J. Y. Khan (2010). On optimal network selection in a dynamic multi- RAT environment. IEEE Communications Letters, 14(3):217-219.
[14.]  F. H. P. Fitzek and M. D. Katz, editors (2007). Cognitive Wireless Networks: Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications. Springer.
[15.] F Valeur, G Vigna, C Kruegel, A Kemmerer, A Comprehensive Approach to Intrusion Detection Alert Correlation, IEEE Transactions on Dependable and Secure Computing, Vol 1, No 3, July 2004, pp 146-169
[16.] S. Kunniyur and R. Srikant, \End-to-end congestion control: Utility functions,random losses and ecn marks," Proc. IEEE INFOCOM, vol. 3,pp. 1323{1332, Mar. 2000.
[17.] M. Conti, G. Maselli, and G. Turi, \Cross-layering in a mobile ad hocnetwork design," IEEE Comp. Soc., pp. 48{51, Feb. 2004. Commersial implementation.
[18.] A. J. Goldsmith and S. B. Wicker, \Design challenges for energycontrained ad hoc wireless networks," IEEE Wireless Communications, pp. 8{27, Aug. 2002.
[19.] http://www.wifinotes.com/how-wireless-sensor-networks-works.html  [20.] http://arni.epfl.ch/contents/courses/monoII.pdf 
[21.] http://searchnetworking.techtarget.com/definition/network-coding   
[22.] http://www.networkcomputing.com/data-networkingmanagement/229500346 
[23.] http://www.articlesbase.com/college-and-university-articles/essaysemantic-routing-4982276.html   
[24.] http://electronicdesign.com/article/communications/How-FlowProcessing-Improves-Network-Communications.aspx   
[25.] http://www.w3.org/RDF/