SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
Internet 2.0
Internet 2.0 is a global multimode internetworking system for providing interconnection and
internetworking services to remote application programs among interconnected computer
networks and internet of thing (IoT) devices. Instrumental to Internet 2.0 is a higher level network
protocol, Transmission Media Adaptation Layer (TMAL). TMAL enables remote application
programs to internetwork among a myriad of interconnected network devices worldwide. Internet
2.0 will carries huge resources of multimedia information and provides internetworking services
natively over both, global telephony systems and Internet Protocol (IP) data network systems,
discretely or concurrently.[1]
.
IP-based data network, IPv4 or IPv6, is the predominant network system utilised by higher level
network protocols, such as User Datagram Protocol (UDP) and Transmission Control Protocol
(TCP), to cast their information packets into its system[2]
. IP-based network system uses
connectionless mode of connectivity, with static or fixed addressing, to route
information packets from sender to receiver among its interconnected intelligent routers. IP-based
system lacks any security means arising from this mode of connectivity as anyone can cast their
information into any IP-based communication pipelines.
Conversely, TMAL, a higher level network protocol is the predominant system in Internet 2.0.
Based upon the type of connectivity requested by application-layer programs and the socket
component, TMAL will establishes the requested connectivity using a myriad of lower level network
protocols and systems. When an application requested for IP-based connectivity, TMAL would
cast its information packets into the appropriate IP network systems. When an application
requested for private end-to-end communication, TMAL would methodically establishes a virtual
dedicated connectivity channel for said application using the existing telephony systems. Thus
TMAL is able to support both shared-media and virtual dedicated-media internetworking
environment [3] [1]
.
Terminology
The term Internet is a paraphrase for Internetworking. Under OSI model, interconnect and
internetworking functionality resources lie from OSI Model Layer 1 till Layer 5, where the lower
level network protocols provide for interconnect functionality while the higher level network
protocols provide for internetworking functionality[4][5]
.
Interconnect or interconnection refers to connectivity services provided by lower-layer or lower
level network protocols for enabling interconnectivity among a plurality of network devices.
Internetworking refers to higher level network protocol providing internetworking connectivity
services for remote application programs to communicate and interact with each other over a
plurality of interconnected network devices.
Internet 1.0 refers to a specific global internetworking system, established using Internet
Protocol (IP) protocols suite among a plurality of interconnected network systems.
The Internet utilizes higher-layer or higher level network protocols, such as User Datagram
Protocol (UDP) and Transmission Control Protocol (TCP) for enabling remote application
programs the capability for internetworking, while IPv4 or IPv6 protocols provides for
interconnectivity among remote end-nodes or devices[2]
.
Internet 2.0 refers to a multimode global internetworking system of interconnected network devices
created by having a higher level transmission media network protocol able to subscribes to and
utilizes differing lower level transmission medium network protocols, discretely or concurrently.
Said transmission medium network systems comprising of network systems using packet
switching or virtual circuit-switching technology[1]
.
Transmission media network protocol refers to any higher-layer or higher level network protocol
able to provides internetworking services among remote application programs.
Transmission medium network protocol refers to any lower-layer or lower level network protocol
that provides interconnect services to network devices.
Packet-switching refers to a method where packetized data is transmitted over a digital network
into having a header and a payload segments. The data in the header is used by network
hardware to direct the packet to its destination where the payload data is used by the application
software. In packet-switching technology, no is no requirement to establish a connection between
the communicating end-nodes for enabling communication. Packet switching technology is the
basis for connectionless data communications among computer networks worldwide[3]
.
Virtual circuit-switching refers to the means of transporting data over packetized circuit switched
network system in such a way that it appears as though there is a dedicated physical
layer link between the source and destination end systems. Before communication can proceed,
a virtual circuit has to be established, between two or more nodes or software applications,
by configuring the relevant parts of the interconnected network devices[3]
.
Virtual Circuit Connection (VCC) refers a type of communication connections in which a dedicated
channel (or circuit) is established either physically or virtually for the duration of the communication.
Shared-Media Internet (SMI) refers to any internetworking system which uses packet-switching
network protocol having connectionless and cast mode of communication among network devices.
Virtual Dedicated-Media Internet (VDMI) refers to any internetworking system established to
provide dedicated end-to-end and connection-oriented connectivity among network devices, using
virtual circuit-switching network protocols over circuit-switched network systems[1] [3]
.
History
The origin of Internet 2.0 occurs with the realisation of the vulnerability of the Internet arising for its
core technologies utilised for data delivery.
The Internet (Internet 1.0)
The Internet was mooted during early 1960s. Its development was initially funded by DARPA. The
key objective for the Internet was to create a fault-tolerance network which would survive disruption
in data delivery in the event of a nuclear war [6]
. The reason being in the situation where data
communication utilising connection-oriented and circuit-switching technology of
the telephony systems would be prone to disruption once an exchange was destroyed[7]
.
The solution for this concern was to utilize connectionless-based packet-switching technology
piggy-backing on the existing telephony systems for data delivery. IP-based data network is one
of such packet-switching technology. With IP-based data network system, data packets are routed
among a series of independent and intelligent self-routing IP routers over the existing global
telephony systems, to deliver data among the interconnected end-devices. The breakthrough for
Internet technology was the inception of Internet protocol suite, advocated by Jonathan B. Postel.
Those key protocols are UDP, TCP, IMP, ICMP, and IP. Between 1982 and 1984 Postel co-
authored the RFCs which became the foundation of today's DNS (RFC 819, RFC 881, RFC 882
and RFC 920) which were joined in 1995 by RFC 1591 which he also co-wrote.
In addition, several Application-layer protocol software were developed to harness Internet
protocol suite, through the use of TCP and UDP packets. Some of those predominant Application-
layer protocol software were developed or ported are ftp, telnet, smtp, instant messaging, and http.
IP aggregates all TCP and UDP packets and transmits them over its allocated communication
pipeline established using existing telephony systems. This solution also creates an excellent
system for the sharing of communication pipelines as anyone can cast their information packets
into the pipeline without a need to establish a connection [8]
. The realization of global IP-based data
network system created the present Internet, Internet 1.0.
Since packet-switching technology enables the creation of
a distributed and decentralized communication and computing topology, this method of
communication would inherently and inevitably create a vulnerable internetworking system due to
its cast mode of connectivity and communication[8]
. Furthermore, intrusive exploitation and attacks
are a growing concern with the Internet due to the ease of implementing fronting, targeting, and
interception of data packets, arising from the use of static addressing.
In packet-switching, one has to cast their packets and let those computerized packet-switching
routers, with a routing table, to define the delivery path for the packets from senders to receivers,
using those static end-node addressing. However, connectionless communication enables the
ability for address cloning and fronting for intrusive injection of malicious information. With packet-
switching technology, security is always a concern due to its inability to implement reliable access
control and authentication, as well as, the inability to reliably determine and held the sender
accountable for those malicious intrusion[8]
.
Lastly, IP routers are essentially computers programmed for data delivery and routing. IP routers
can be reprogramed by hackers to serve as agents for eavesdropping, cloning, fronting or
duplicating and rerouting of data.
Characteristics
For the comprehension of the concept of packet-switching data delivery engine, let's use the
analogue of the postal delivery systems. The IP data network system utilizes lower-
layer transmission medium network systems for the delivery of information, similarly to the postal
system utilizing existing road, rail, air and ship-freight infrastructures. The IP-based data network
routers are similar to the post offices. Like the postal delivery system, when there is a disruption
in any of its delivery infrastructure, the post office would determine the rerouting path. Likewise,
IP-based routers have the intelligent and capability to reroute the information packets, should there
be any problems arising in anywhere in its delivery infrastructures.
Any mails and packages can be deposited with the postal system for delivery without the need to
validate the senders. As with packet-switching system, there is neither the mechanism to reliably
authenticate any sender nor the need to establish a private and dedicated line of delivery from
senders to receivers. Thus, the postal delivery system is also vulnerable to interception and
anonymous posting through identity theft exploitation. Due to the use of static addressing for data
delivery, those mails are potentially prone to interception anywhere along the delivery path. Hence
this means of eavesdropping vulnerability is ever presence in packet-switching due to the use of
static addressing for routing [9] [10]
.
Lastly, the ability for someone to inject malicious malware packets in a shared-media mode of
communication through the cloning of any IP addresses or through domain fronting by casting it
into the IP networks are always unavoidable and ever growing concerns. Using connectionless
and shared-media mode of communication, anyone can access to any end-nodes by posting to
the end-node IP address. Being connectionless, all packets arriving at the address will be unpack
and process. Basically Internet protocol suite does not have any security measures. To enable
security, augment technology like digital certification and encryption technology are used. The
present Virtual Private Network (VPN) systems utilises Point-to-Point Tunnelling Protocol (PPTP),
an encryption technology to ensure privacy and security. Nevertheless VPN packets can be
captured for deep packet inspection and compromise for malicious intents.
Internet 2.0
In the granted patents associated with the technology for enabling multimode internetworking
connectivity, an alternative global internetworking system was created to operate natively over the
existing telephony systems. Unique to the invention is the ability to provide for internetworking
connectivity is by using connection-based scheme of virtual circuit connection (VCC) to establish
private and dedicated-media mode of communication. This created a new internetworking platform.
Said invention also provides for backward compatibility with the present Internet, thus providing a
multimode internetworking environment either discretely or concurrently. This new global
multimode internetworking environment is coined as Internet 2.0[1] [11]
.
The crux of Internet 2.0 is the deployment of a higher-layer transmission-media network protocol
having the ability to subscribe and operate natively not only over any telephony systems but also
over any packet-switching systems. Said transmission media system can be programmed to
interface with myriad of existing connectionless routing network protocol such as IP, IPX, and the
likes, as well as, to connection-based virtual circuit-switching transmission medium systems in
order to provide for connection-based private and dedicated-media communication channels.
Transmission Media Adaptation Layer (TMAL) has such capability [1] [11]
.
When TMAL subscribes for end-to-end and connection-based connectivity over the existing
telephony system, a private and dedicated-mode of internetworking communication session will be
established to create a new internetworking environment, coined as Virtual Dedicated-Media
Internet (VDMI)[1]
.
Characteristics
For comprehension of the concept of VDMI environment, let’s use the analogue of the telephony
systems. The most ubiquitous network system is the global telephony circuit-switched systems. It
is also the transmission medium which the Internet uses to deliver data to you. Basically the
Internet piggy-back on the telephony network infrastructures.
For establishing telephony connectivity and communication, links of virtual circuit segments were
created among a plurality of interconnect relay switches to create a single line of communication
for each telephone call[1][11]
. Telephony system utilises dynamic label-swapping routing addresses
as they traverse through the relay switches. Controlling and programming those relay switches are
the controller systems of the Telco’s Center Office. The Controller systems program the routing
virtual switching table of each relay switches during call establishment and termination. Lastly,
those relay switches are simple switches specifically designed only for the routing of information
packets.
VDMI works natively with the telephony system, by utilising the telephony call establishment and
termination process. Basically for establishing connectivity among application endpoints, TMAL
will communicate with underlying telephony system using Signalling System No 7 signalling to
request for connectivity among end-node devices. It is during this call or connection establishment
procedure that VDMI platform is able to implement access control. In access control, VDMI access
control component would compare the Caller ID with its table of Approved Caller. If the Caller ID
is not in the table of Approved Caller, then the call would immediately be terminated. In addition,
during connection establishment, no data is transfer between end-points; just like when we having
ringing tone, we cannot communicate. Furthermore, without using VoIP and SigTrans, Caller ID
spoofing is more difficult to be implemented.
Lastly, if the end-node is a secure site, one would use the unapproved Caller ID number to trace
down the owner of said Caller ID. This ability to reliably trace the owner of attempt unauthorised
access will acts as a deterrent for anyone contemplating of compromising any system in VDMI
platform.
Development and Funding
The funding for Internet 2.0 was initially funded by friends and family. Future funding for both TMAL
and Telephony-based DNS will be through other crowdfunding mechanisms.
Project development and commercialisation of TMAL will be undertaken by ITranscend Network
Holdings Limited, a company registered in Isle of Man.
Project development and deployment for Telephony-based DNS will be undertaken by Incepxion
DNS Holdings Limited, a company registered in Hong Kong SAR.
Technologies
TMAL is designed also to support myriad types of lower level network protocols, such
as IPX, Token Rings, Ethernet and the likes, over the telephony system, besides using IP system,
for Shared-Media Internet (SMI). TMAL utilises associative addressing identifiers of Network
Connection Identifier and User Session Identifier for network and session connectivity, respectively.
It has at least a dual translation tables for those identifiers.
Using associative Network Connection Identifier, one is able to a create hybrid interconnect
systems among any connectionless network systems or between connection-
oriented and connectionless network systems which provides for interconnect data delivery
services. An additional benefit of using associative addressing, it’s harder to specifically target the
users even in TMAL enabled SMI environment. In addition, by using associative User Session
Identifier, one is also able to camouflage the final Source and Destination Ports values.
Virtual Dedicated-Media Internet (VDMI) environment is created when the internetworking
environment establishes an end-to-end connection-oriented connectivity among both higher level
transmission media network protocol and lower level transmission medium which utilises
connection-oriented and circuit-switched transmission means. With VDMI platform, one is able to
provide a more secure and private line of communication as the requirement for connection
establishment enables one to implements security mechanisms like access control, reliable
recording of caller identity, and for call tracing.
In addition to the differing data delivery systems, there is the need for ease of use and the
accessibility to said multimode internetworking platform and environment. While computer
identifies and associates any end-nodes with numbers, we are more accustomed to associate any
entities with names. Therefore there is also a need for human-to-machine interface for associating
network device numeric addressing to domain name in a multimode internetworking environment.
Whereas we have IP-based Domain Name System (DNS), for the mapping of domain name to
an IP address, VDMI network platform would also require similar capability. Incepxion DNS
Holdings Limited is presently undertaking the development of telephony-based DNS where a
VDMI’s domain name will be mapped to a telephone number.
Concepts
Internet 2.0 can be described in five parts:
 Higher level network protocols for internetworking services
 Lower level network protocol for interconnection services
 Transmission Media Adaptation Layer (TMAL) network protocol
 Telephony-based DNS for VDMI platform
 Virtual Dedicated-Media Internet (VDMI) platform and environment
 Shared-Media Internet (SMI) platform and environment
Comparison with Internet 1.0
The below table will provide a summarized comparison of the capabilities between Internet 1.0 and
Internet 2.0 for the differing platform and environment.
Internet 2.0 Internet 1.0
Multimode internetworking platform and
environment of:
A single-mode internetworking platform and
environment of Shared-Media
Internetworking (SMI) using IP protocol suite
only.
 Shared-Media Internetworking (SMI),
including IP data network.
 Virtual Dedicated-Media Internet (VDMI)
Able to subscribe to any lower level transmission
medium network protocol address routing
scheme of:
 Static addressing used by packet-switching
network systems
 Label-swapping addressing used by virtual
switched systems.
Utilises static addressing of IP's Source and
Destination addresses only for routing.
TMAL utilises associative addressing scheme
Utilises static addressing of Source Port and
Destination Port by higher level protocols
Able to implement over any packet-switching
and virtual-switched transmission medium
network devices
Only available and works in IP-based network
systems
Ease in implement upscaling of network device
addressing
Difficult to implements upscaling for device
addresses
Able to support multi-protocol address
translation
Incompatible addressing scheme even for
IPv4 and IPv6
Able to support SMI and VDMI platforms
discretely or concurrently:
 Connectionless mode of connectivity among
end-devices
 End-to-end connection-oriented mode of
connectivity among end-devices
 Hybrid of end-to-end connection-oriented
and connectionless mode of connectivity
among differing network end-devices.
Connectionless mode of connectivity among
end-node or devices
Mode of communication for VDMI platform
comprising of:
 Point-to-Point (P2P)
 Point-to-Multipoint (P2MP)
 Multipoint-to-Multipoint (MP2MP)
Mode of communication for SMI platform
comprising of:
 Uni-cast
 Multi-cast
 Broadcast
Mode of communication comprising of:
 Uni-cast
 Multi-cast
 Broadcast
Usage
Internet 2.0, besides being backward compatible with IP data network, create an alternative VDMI
data delivery platform. Similarly to the Internet platform, this alternative VDMI platform finds equal
usage in the fields of applications that the present Internet presently provides. As such the
applications for Internet 2.0 are in the fields of:
 Digital economy
 Cloud computing and VPN
 Internet of Things, where secure communication is paramount
 Smart Cities
 Multimedia communication
Applications
Like the Internet, Internet 2.0 will find equal usage of myriads of applications where security and
privacy are essential. Internet 2.0 will find applications in the following industries:
 e-Commerce
 Education technology
 e-Government
 Online banking and e-commerce payment system
 Digital currencies
 Internet of Things
 Cloud computing
Application software will also evolve from mainly client-server architecture to support point-to-point
(P2P), point--to-multipoint (P2MP) and multipoint-to-multipoint architectures.
Patents
On September 12, 1997, Lee Chooi Tian applied to Intellectual Property Corporation of
Malaysia (MyIPO) for a patent on a higher level network protocol for interfacing with application
programs and operating over existing lower level connectionless and connection-oriented
transmission medium network systems. He was granted a patent, MyIPO Pat. No. MY129914-A,
for the invention on May 31, 2007[12]
On July 22, 2011, Lee Chooi Tian submitted another patent application to MyIPO for the system
and methods for enabling multimode internetworking connectivity. Subsequently, he applied under
PCT application on July 16, 2012. Since then he was granted a European patent, EP 2636188 B1
on July 17, 2014. The USPTO also granted a patent to him on January 9, 2018 under US Pat No.
9,866,499 B2 [13] [14]
.
Lee Chooi Tian had two papers published in IEEE for 21st
LCN Technical Program on October 13-
16, 1996. The papers being “Designing a Virtual Access Control Configuration Protocol for
Implementation over ISDN and Shared-Media Networks” and “Principle and Techniques for
Encapsulation of User Control and Data Information in Separate Frame”. Those papers were cited
by USPTO examiners as prior arts for other granted patents. Those patents cited, which is not
exhaustive, are:
 US Pat No. 7,467,211
 US Pat No. 7,389,331
 US Pat No. 7,346,669
See also
 History of telecommunication
 Data transmission
 Virtual Circuit
 Jon Postel
 Communication protocol
References
1. MINDS. "Malaysian Invention and Design Society (MINDS), January 2016. MINDS Newsletter, page
2-3" (PDF). Retrieved 10 May 2018.
2. ARIN (7 May 2018). "American Registry for Internet Numbers (ARIN), 1997" (PDF). Retrieved 7
May 2018.
3. Chooi-Tian (Alex), Lee. & Jack, W. Harris (6 May 2018). "Chooi-Tian (Alex), Lee. & Jack, W. Harris,
1996. Principle and Technique for Encapsulation of User Control and Data Information in Separated
Frame. IEEE". Retrieved 6 May 2018.
4. Bob Smith (2 May 2018). "Microchip Technology, 2018. TCP/IP Five-Layer Model Overview".
Retrieved 2 May 2018.
5. Wyllys, R. E. and Doty, P. (5 May 2018). "Wyllys, R. E. and Doty, P., 2000. The University of Texas
at Austin, Notes on 5-layer and 7-layer Models of Interconnection." Retrieved 5 May 2018.
6. Duncan Graham Rowe. "Duncan Graham Rowe, 2008. Fifty years of DARPA: Hits, misses and ones
to watch". Retrieved 5 May 2018.
7. Richard A. Costello, Ray Horak. "Richard A. Costello, Ray Horak, 2003. Basic Concepts of
Communications: An Introduction. Technology Overview: 24 September 2003,". Retrieved 12
May 2018.
8. Moore, Roger D. (August 2006). "Moore, Roger D. (August 2006).”This is a temporary index for a
collection of papers about packet-switching in the 1970s"". Retrieved 11 May 2018.
9. Peter L Dordal. "Peter L Dordal, June 14, 2016. An Introduction to Computer Networks" (PDF).
Retrieved 10 May 2018.
10. Cisco, nd. "Cisco, nd. Cisco Networking Academy Program". Retrieved 6 May 2018.
11. Chooi-Tian (Alex), Lee. & Jack, W. Harris, (October, 1996.). "Chooi-Tian (Alex), Lee. & Jack, W.
Harris, (October, 1996). Designing A Virtual Access Control Configuration Protocol for
Implementation over ISDN and Shared-Media Networks. IEEE". Retrieved 5 May 2018.
12. Lee, CT. (1997). "Lee, CT. (1997). A Versatile Higher-layer Network Protocol for Interfacing with
Application Layer Programs and Operating over Existing Lower-layer Connectionless and
Connection- Oriented Network Protocol, MyIPO: MY-129914-A". Retrieved 2 May 2018.
13. Justia Patent, (2018). "Justia Patent, (2018). Patents by Inventor Chooi Tian Lee". Retrieved 2
May 2018.
14. WIPO (2013). "World Intellectual Property Organization (WIPO), 2013. Patent Scope, Apparatus
and Methods for Multimode Internetworking Connectivity, Patent number: 9866499". Retrieved 2
May 2018.
External links
 https://ieeexplore.ieee.org/document/558139/
 https://ieeexplore.ieee.org/document/558167/

Contenu connexe

Tendances

100 network question and answers
100 network question and answers100 network question and answers
100 network question and answersRoman Orlowski
 
Computer network
Computer networkComputer network
Computer networkMd Saylab
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1Srimatre K
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
What are data networks?
What are data networks?What are data networks?
What are data networks?James Steele
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and ManagementBry Cunal
 
Chapter 7 principles of data communication
Chapter 7   principles of data communicationChapter 7   principles of data communication
Chapter 7 principles of data communicationN. A. Sutisna
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and CiscoShoaib Iqbal
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESsuthi
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 
Telecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyTelecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyPiyushHooda
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyAmmar Rahman
 
Fast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location InformationFast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location InformationCSCJournals
 

Tendances (20)

100 network question and answers
100 network question and answers100 network question and answers
100 network question and answers
 
Computer network
Computer networkComputer network
Computer network
 
Internet of things unit-1
Internet of things unit-1Internet of things unit-1
Internet of things unit-1
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Vpn
VpnVpn
Vpn
 
What are data networks?
What are data networks?What are data networks?
What are data networks?
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Dcn introduction
Dcn introductionDcn introduction
Dcn introduction
 
Chapter 7 principles of data communication
Chapter 7   principles of data communicationChapter 7   principles of data communication
Chapter 7 principles of data communication
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and Cisco
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
F0322038042
F0322038042F0322038042
F0322038042
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
my project publication
my project publicationmy project publication
my project publication
 
Telecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyTelecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless Technology
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking Technoloy
 
Fast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location InformationFast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location Information
 

Similaire à Internet 2.0

Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetPoojaWalia6
 
IOT introduction
IOT introductionIOT introduction
IOT introductionxinoe
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOTInxee
 
Brown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdfBrown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdfWendieEscaliente
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 

Similaire à Internet 2.0 (20)

matdid018951.ppt
matdid018951.pptmatdid018951.ppt
matdid018951.ppt
 
IOT.pdf
IOT.pdfIOT.pdf
IOT.pdf
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Computer network
Computer networkComputer network
Computer network
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 
Brown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdfBrown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdf
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 

Dernier

Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 

Dernier (20)

Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 

Internet 2.0

  • 1. Internet 2.0 Internet 2.0 is a global multimode internetworking system for providing interconnection and internetworking services to remote application programs among interconnected computer networks and internet of thing (IoT) devices. Instrumental to Internet 2.0 is a higher level network protocol, Transmission Media Adaptation Layer (TMAL). TMAL enables remote application programs to internetwork among a myriad of interconnected network devices worldwide. Internet 2.0 will carries huge resources of multimedia information and provides internetworking services natively over both, global telephony systems and Internet Protocol (IP) data network systems, discretely or concurrently.[1] . IP-based data network, IPv4 or IPv6, is the predominant network system utilised by higher level network protocols, such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP), to cast their information packets into its system[2] . IP-based network system uses connectionless mode of connectivity, with static or fixed addressing, to route information packets from sender to receiver among its interconnected intelligent routers. IP-based system lacks any security means arising from this mode of connectivity as anyone can cast their information into any IP-based communication pipelines. Conversely, TMAL, a higher level network protocol is the predominant system in Internet 2.0. Based upon the type of connectivity requested by application-layer programs and the socket component, TMAL will establishes the requested connectivity using a myriad of lower level network protocols and systems. When an application requested for IP-based connectivity, TMAL would cast its information packets into the appropriate IP network systems. When an application requested for private end-to-end communication, TMAL would methodically establishes a virtual dedicated connectivity channel for said application using the existing telephony systems. Thus TMAL is able to support both shared-media and virtual dedicated-media internetworking environment [3] [1] . Terminology The term Internet is a paraphrase for Internetworking. Under OSI model, interconnect and internetworking functionality resources lie from OSI Model Layer 1 till Layer 5, where the lower level network protocols provide for interconnect functionality while the higher level network protocols provide for internetworking functionality[4][5] . Interconnect or interconnection refers to connectivity services provided by lower-layer or lower level network protocols for enabling interconnectivity among a plurality of network devices. Internetworking refers to higher level network protocol providing internetworking connectivity services for remote application programs to communicate and interact with each other over a plurality of interconnected network devices. Internet 1.0 refers to a specific global internetworking system, established using Internet Protocol (IP) protocols suite among a plurality of interconnected network systems. The Internet utilizes higher-layer or higher level network protocols, such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) for enabling remote application programs the capability for internetworking, while IPv4 or IPv6 protocols provides for interconnectivity among remote end-nodes or devices[2] . Internet 2.0 refers to a multimode global internetworking system of interconnected network devices created by having a higher level transmission media network protocol able to subscribes to and utilizes differing lower level transmission medium network protocols, discretely or concurrently. Said transmission medium network systems comprising of network systems using packet switching or virtual circuit-switching technology[1] . Transmission media network protocol refers to any higher-layer or higher level network protocol able to provides internetworking services among remote application programs.
  • 2. Transmission medium network protocol refers to any lower-layer or lower level network protocol that provides interconnect services to network devices. Packet-switching refers to a method where packetized data is transmitted over a digital network into having a header and a payload segments. The data in the header is used by network hardware to direct the packet to its destination where the payload data is used by the application software. In packet-switching technology, no is no requirement to establish a connection between the communicating end-nodes for enabling communication. Packet switching technology is the basis for connectionless data communications among computer networks worldwide[3] . Virtual circuit-switching refers to the means of transporting data over packetized circuit switched network system in such a way that it appears as though there is a dedicated physical layer link between the source and destination end systems. Before communication can proceed, a virtual circuit has to be established, between two or more nodes or software applications, by configuring the relevant parts of the interconnected network devices[3] . Virtual Circuit Connection (VCC) refers a type of communication connections in which a dedicated channel (or circuit) is established either physically or virtually for the duration of the communication. Shared-Media Internet (SMI) refers to any internetworking system which uses packet-switching network protocol having connectionless and cast mode of communication among network devices. Virtual Dedicated-Media Internet (VDMI) refers to any internetworking system established to provide dedicated end-to-end and connection-oriented connectivity among network devices, using virtual circuit-switching network protocols over circuit-switched network systems[1] [3] . History The origin of Internet 2.0 occurs with the realisation of the vulnerability of the Internet arising for its core technologies utilised for data delivery. The Internet (Internet 1.0) The Internet was mooted during early 1960s. Its development was initially funded by DARPA. The key objective for the Internet was to create a fault-tolerance network which would survive disruption in data delivery in the event of a nuclear war [6] . The reason being in the situation where data communication utilising connection-oriented and circuit-switching technology of the telephony systems would be prone to disruption once an exchange was destroyed[7] . The solution for this concern was to utilize connectionless-based packet-switching technology piggy-backing on the existing telephony systems for data delivery. IP-based data network is one of such packet-switching technology. With IP-based data network system, data packets are routed among a series of independent and intelligent self-routing IP routers over the existing global telephony systems, to deliver data among the interconnected end-devices. The breakthrough for Internet technology was the inception of Internet protocol suite, advocated by Jonathan B. Postel. Those key protocols are UDP, TCP, IMP, ICMP, and IP. Between 1982 and 1984 Postel co- authored the RFCs which became the foundation of today's DNS (RFC 819, RFC 881, RFC 882 and RFC 920) which were joined in 1995 by RFC 1591 which he also co-wrote. In addition, several Application-layer protocol software were developed to harness Internet protocol suite, through the use of TCP and UDP packets. Some of those predominant Application- layer protocol software were developed or ported are ftp, telnet, smtp, instant messaging, and http. IP aggregates all TCP and UDP packets and transmits them over its allocated communication pipeline established using existing telephony systems. This solution also creates an excellent system for the sharing of communication pipelines as anyone can cast their information packets into the pipeline without a need to establish a connection [8] . The realization of global IP-based data network system created the present Internet, Internet 1.0. Since packet-switching technology enables the creation of a distributed and decentralized communication and computing topology, this method of
  • 3. communication would inherently and inevitably create a vulnerable internetworking system due to its cast mode of connectivity and communication[8] . Furthermore, intrusive exploitation and attacks are a growing concern with the Internet due to the ease of implementing fronting, targeting, and interception of data packets, arising from the use of static addressing. In packet-switching, one has to cast their packets and let those computerized packet-switching routers, with a routing table, to define the delivery path for the packets from senders to receivers, using those static end-node addressing. However, connectionless communication enables the ability for address cloning and fronting for intrusive injection of malicious information. With packet- switching technology, security is always a concern due to its inability to implement reliable access control and authentication, as well as, the inability to reliably determine and held the sender accountable for those malicious intrusion[8] . Lastly, IP routers are essentially computers programmed for data delivery and routing. IP routers can be reprogramed by hackers to serve as agents for eavesdropping, cloning, fronting or duplicating and rerouting of data. Characteristics For the comprehension of the concept of packet-switching data delivery engine, let's use the analogue of the postal delivery systems. The IP data network system utilizes lower- layer transmission medium network systems for the delivery of information, similarly to the postal system utilizing existing road, rail, air and ship-freight infrastructures. The IP-based data network routers are similar to the post offices. Like the postal delivery system, when there is a disruption in any of its delivery infrastructure, the post office would determine the rerouting path. Likewise, IP-based routers have the intelligent and capability to reroute the information packets, should there be any problems arising in anywhere in its delivery infrastructures. Any mails and packages can be deposited with the postal system for delivery without the need to validate the senders. As with packet-switching system, there is neither the mechanism to reliably authenticate any sender nor the need to establish a private and dedicated line of delivery from senders to receivers. Thus, the postal delivery system is also vulnerable to interception and anonymous posting through identity theft exploitation. Due to the use of static addressing for data delivery, those mails are potentially prone to interception anywhere along the delivery path. Hence this means of eavesdropping vulnerability is ever presence in packet-switching due to the use of static addressing for routing [9] [10] . Lastly, the ability for someone to inject malicious malware packets in a shared-media mode of communication through the cloning of any IP addresses or through domain fronting by casting it into the IP networks are always unavoidable and ever growing concerns. Using connectionless and shared-media mode of communication, anyone can access to any end-nodes by posting to the end-node IP address. Being connectionless, all packets arriving at the address will be unpack and process. Basically Internet protocol suite does not have any security measures. To enable security, augment technology like digital certification and encryption technology are used. The present Virtual Private Network (VPN) systems utilises Point-to-Point Tunnelling Protocol (PPTP), an encryption technology to ensure privacy and security. Nevertheless VPN packets can be captured for deep packet inspection and compromise for malicious intents. Internet 2.0 In the granted patents associated with the technology for enabling multimode internetworking connectivity, an alternative global internetworking system was created to operate natively over the existing telephony systems. Unique to the invention is the ability to provide for internetworking connectivity is by using connection-based scheme of virtual circuit connection (VCC) to establish private and dedicated-media mode of communication. This created a new internetworking platform. Said invention also provides for backward compatibility with the present Internet, thus providing a multimode internetworking environment either discretely or concurrently. This new global multimode internetworking environment is coined as Internet 2.0[1] [11] .
  • 4. The crux of Internet 2.0 is the deployment of a higher-layer transmission-media network protocol having the ability to subscribe and operate natively not only over any telephony systems but also over any packet-switching systems. Said transmission media system can be programmed to interface with myriad of existing connectionless routing network protocol such as IP, IPX, and the likes, as well as, to connection-based virtual circuit-switching transmission medium systems in order to provide for connection-based private and dedicated-media communication channels. Transmission Media Adaptation Layer (TMAL) has such capability [1] [11] . When TMAL subscribes for end-to-end and connection-based connectivity over the existing telephony system, a private and dedicated-mode of internetworking communication session will be established to create a new internetworking environment, coined as Virtual Dedicated-Media Internet (VDMI)[1] . Characteristics For comprehension of the concept of VDMI environment, let’s use the analogue of the telephony systems. The most ubiquitous network system is the global telephony circuit-switched systems. It is also the transmission medium which the Internet uses to deliver data to you. Basically the Internet piggy-back on the telephony network infrastructures. For establishing telephony connectivity and communication, links of virtual circuit segments were created among a plurality of interconnect relay switches to create a single line of communication for each telephone call[1][11] . Telephony system utilises dynamic label-swapping routing addresses as they traverse through the relay switches. Controlling and programming those relay switches are the controller systems of the Telco’s Center Office. The Controller systems program the routing virtual switching table of each relay switches during call establishment and termination. Lastly, those relay switches are simple switches specifically designed only for the routing of information packets. VDMI works natively with the telephony system, by utilising the telephony call establishment and termination process. Basically for establishing connectivity among application endpoints, TMAL will communicate with underlying telephony system using Signalling System No 7 signalling to request for connectivity among end-node devices. It is during this call or connection establishment procedure that VDMI platform is able to implement access control. In access control, VDMI access control component would compare the Caller ID with its table of Approved Caller. If the Caller ID is not in the table of Approved Caller, then the call would immediately be terminated. In addition, during connection establishment, no data is transfer between end-points; just like when we having ringing tone, we cannot communicate. Furthermore, without using VoIP and SigTrans, Caller ID spoofing is more difficult to be implemented. Lastly, if the end-node is a secure site, one would use the unapproved Caller ID number to trace down the owner of said Caller ID. This ability to reliably trace the owner of attempt unauthorised access will acts as a deterrent for anyone contemplating of compromising any system in VDMI platform. Development and Funding The funding for Internet 2.0 was initially funded by friends and family. Future funding for both TMAL and Telephony-based DNS will be through other crowdfunding mechanisms. Project development and commercialisation of TMAL will be undertaken by ITranscend Network Holdings Limited, a company registered in Isle of Man. Project development and deployment for Telephony-based DNS will be undertaken by Incepxion DNS Holdings Limited, a company registered in Hong Kong SAR. Technologies
  • 5. TMAL is designed also to support myriad types of lower level network protocols, such as IPX, Token Rings, Ethernet and the likes, over the telephony system, besides using IP system, for Shared-Media Internet (SMI). TMAL utilises associative addressing identifiers of Network Connection Identifier and User Session Identifier for network and session connectivity, respectively. It has at least a dual translation tables for those identifiers. Using associative Network Connection Identifier, one is able to a create hybrid interconnect systems among any connectionless network systems or between connection- oriented and connectionless network systems which provides for interconnect data delivery services. An additional benefit of using associative addressing, it’s harder to specifically target the users even in TMAL enabled SMI environment. In addition, by using associative User Session Identifier, one is also able to camouflage the final Source and Destination Ports values. Virtual Dedicated-Media Internet (VDMI) environment is created when the internetworking environment establishes an end-to-end connection-oriented connectivity among both higher level transmission media network protocol and lower level transmission medium which utilises connection-oriented and circuit-switched transmission means. With VDMI platform, one is able to provide a more secure and private line of communication as the requirement for connection establishment enables one to implements security mechanisms like access control, reliable recording of caller identity, and for call tracing. In addition to the differing data delivery systems, there is the need for ease of use and the accessibility to said multimode internetworking platform and environment. While computer identifies and associates any end-nodes with numbers, we are more accustomed to associate any entities with names. Therefore there is also a need for human-to-machine interface for associating network device numeric addressing to domain name in a multimode internetworking environment. Whereas we have IP-based Domain Name System (DNS), for the mapping of domain name to an IP address, VDMI network platform would also require similar capability. Incepxion DNS Holdings Limited is presently undertaking the development of telephony-based DNS where a VDMI’s domain name will be mapped to a telephone number. Concepts Internet 2.0 can be described in five parts:  Higher level network protocols for internetworking services  Lower level network protocol for interconnection services  Transmission Media Adaptation Layer (TMAL) network protocol  Telephony-based DNS for VDMI platform  Virtual Dedicated-Media Internet (VDMI) platform and environment  Shared-Media Internet (SMI) platform and environment Comparison with Internet 1.0 The below table will provide a summarized comparison of the capabilities between Internet 1.0 and Internet 2.0 for the differing platform and environment. Internet 2.0 Internet 1.0 Multimode internetworking platform and environment of: A single-mode internetworking platform and environment of Shared-Media Internetworking (SMI) using IP protocol suite only.
  • 6.  Shared-Media Internetworking (SMI), including IP data network.  Virtual Dedicated-Media Internet (VDMI) Able to subscribe to any lower level transmission medium network protocol address routing scheme of:  Static addressing used by packet-switching network systems  Label-swapping addressing used by virtual switched systems. Utilises static addressing of IP's Source and Destination addresses only for routing. TMAL utilises associative addressing scheme Utilises static addressing of Source Port and Destination Port by higher level protocols Able to implement over any packet-switching and virtual-switched transmission medium network devices Only available and works in IP-based network systems Ease in implement upscaling of network device addressing Difficult to implements upscaling for device addresses Able to support multi-protocol address translation Incompatible addressing scheme even for IPv4 and IPv6 Able to support SMI and VDMI platforms discretely or concurrently:  Connectionless mode of connectivity among end-devices  End-to-end connection-oriented mode of connectivity among end-devices  Hybrid of end-to-end connection-oriented and connectionless mode of connectivity among differing network end-devices. Connectionless mode of connectivity among end-node or devices Mode of communication for VDMI platform comprising of:  Point-to-Point (P2P)  Point-to-Multipoint (P2MP)  Multipoint-to-Multipoint (MP2MP) Mode of communication for SMI platform comprising of:  Uni-cast  Multi-cast  Broadcast Mode of communication comprising of:  Uni-cast  Multi-cast  Broadcast Usage Internet 2.0, besides being backward compatible with IP data network, create an alternative VDMI data delivery platform. Similarly to the Internet platform, this alternative VDMI platform finds equal
  • 7. usage in the fields of applications that the present Internet presently provides. As such the applications for Internet 2.0 are in the fields of:  Digital economy  Cloud computing and VPN  Internet of Things, where secure communication is paramount  Smart Cities  Multimedia communication Applications Like the Internet, Internet 2.0 will find equal usage of myriads of applications where security and privacy are essential. Internet 2.0 will find applications in the following industries:  e-Commerce  Education technology  e-Government  Online banking and e-commerce payment system  Digital currencies  Internet of Things  Cloud computing Application software will also evolve from mainly client-server architecture to support point-to-point (P2P), point--to-multipoint (P2MP) and multipoint-to-multipoint architectures. Patents On September 12, 1997, Lee Chooi Tian applied to Intellectual Property Corporation of Malaysia (MyIPO) for a patent on a higher level network protocol for interfacing with application programs and operating over existing lower level connectionless and connection-oriented transmission medium network systems. He was granted a patent, MyIPO Pat. No. MY129914-A, for the invention on May 31, 2007[12] On July 22, 2011, Lee Chooi Tian submitted another patent application to MyIPO for the system and methods for enabling multimode internetworking connectivity. Subsequently, he applied under PCT application on July 16, 2012. Since then he was granted a European patent, EP 2636188 B1 on July 17, 2014. The USPTO also granted a patent to him on January 9, 2018 under US Pat No. 9,866,499 B2 [13] [14] . Lee Chooi Tian had two papers published in IEEE for 21st LCN Technical Program on October 13- 16, 1996. The papers being “Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks” and “Principle and Techniques for Encapsulation of User Control and Data Information in Separate Frame”. Those papers were cited by USPTO examiners as prior arts for other granted patents. Those patents cited, which is not exhaustive, are:  US Pat No. 7,467,211  US Pat No. 7,389,331  US Pat No. 7,346,669
  • 8. See also  History of telecommunication  Data transmission  Virtual Circuit  Jon Postel  Communication protocol References 1. MINDS. "Malaysian Invention and Design Society (MINDS), January 2016. MINDS Newsletter, page 2-3" (PDF). Retrieved 10 May 2018. 2. ARIN (7 May 2018). "American Registry for Internet Numbers (ARIN), 1997" (PDF). Retrieved 7 May 2018. 3. Chooi-Tian (Alex), Lee. & Jack, W. Harris (6 May 2018). "Chooi-Tian (Alex), Lee. & Jack, W. Harris, 1996. Principle and Technique for Encapsulation of User Control and Data Information in Separated Frame. IEEE". Retrieved 6 May 2018. 4. Bob Smith (2 May 2018). "Microchip Technology, 2018. TCP/IP Five-Layer Model Overview". Retrieved 2 May 2018. 5. Wyllys, R. E. and Doty, P. (5 May 2018). "Wyllys, R. E. and Doty, P., 2000. The University of Texas at Austin, Notes on 5-layer and 7-layer Models of Interconnection." Retrieved 5 May 2018. 6. Duncan Graham Rowe. "Duncan Graham Rowe, 2008. Fifty years of DARPA: Hits, misses and ones to watch". Retrieved 5 May 2018. 7. Richard A. Costello, Ray Horak. "Richard A. Costello, Ray Horak, 2003. Basic Concepts of Communications: An Introduction. Technology Overview: 24 September 2003,". Retrieved 12 May 2018. 8. Moore, Roger D. (August 2006). "Moore, Roger D. (August 2006).”This is a temporary index for a collection of papers about packet-switching in the 1970s"". Retrieved 11 May 2018. 9. Peter L Dordal. "Peter L Dordal, June 14, 2016. An Introduction to Computer Networks" (PDF). Retrieved 10 May 2018. 10. Cisco, nd. "Cisco, nd. Cisco Networking Academy Program". Retrieved 6 May 2018. 11. Chooi-Tian (Alex), Lee. & Jack, W. Harris, (October, 1996.). "Chooi-Tian (Alex), Lee. & Jack, W. Harris, (October, 1996). Designing A Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. IEEE". Retrieved 5 May 2018. 12. Lee, CT. (1997). "Lee, CT. (1997). A Versatile Higher-layer Network Protocol for Interfacing with Application Layer Programs and Operating over Existing Lower-layer Connectionless and Connection- Oriented Network Protocol, MyIPO: MY-129914-A". Retrieved 2 May 2018. 13. Justia Patent, (2018). "Justia Patent, (2018). Patents by Inventor Chooi Tian Lee". Retrieved 2 May 2018. 14. WIPO (2013). "World Intellectual Property Organization (WIPO), 2013. Patent Scope, Apparatus and Methods for Multimode Internetworking Connectivity, Patent number: 9866499". Retrieved 2 May 2018. External links  https://ieeexplore.ieee.org/document/558139/  https://ieeexplore.ieee.org/document/558167/