首页 | 本学科首页   官方微博 | 高级检索  
     


Internet as a multiple graph structure: The role of the transport layer
Affiliation:1. Department of Medicine, Division of Cardiology, Emory University School of Medicine, Atlanta, GA, USA;2. Department of Medicine, Division of Cardiology, University of Minnesota Medical School, Minneapolis, MN, USA;3. Department of Medicine, Division of Cardiology, Johns Hopkins University School of Medicine, Baltimore, MD, USA;4. Department of Internal Medicine, Section on Cardiology, Wake Forest School of Medicine, Winston-Salem, NC, USA;5. Epidemiological Cardiology Research Center (EPICARE), Department of Epidemiology and Prevention, Wake Forest School of Medicine, Winston-Salem, NC, USA;1. Mental Health Center and psychiatric Laboratory, the State Key Laboratory of Biotherapy, West China Hospital of Sichuan University, No. 37 Guo Xue Xiang, Chengdu 610041, China;2. Huaxi Brain Research Center, West China Hospital of Sichuan University, Chengdu, Sichuan 610041, China;3. Department of Psychiatry and Behavioral Sciences, Stanford University School of Medicine, Stanford 94305, CA, United States;4. Huaxi MR Research Center (HMRRC), Department of Radiology, West China Hospital, Sichuan University, Chengdu 610041, China
Abstract:This paper discusses how the transport layer (TCP/UDP/SCTP) divides the Internet into a vertical structure consisting of three domains: IP network domain, terminal equipment domain, and applications domain. This subdivision of the Internet has wide consequences both in the way in which business is carried out on the network and with regard to the vulnerability of society caused by the openness of the network. The Internet may also be modelled as a multiple graph structure. The domains may be viewed as independent entities allowing the different aspects of the Internet to be analysed as single graphs within each domain. Furthermore, the vulnerability of society may also be represented as a multiple graph structure where one of the components is a graph instance in the application domain of Internet representing the problem under study. Information security may then be studied at two levels: the vulnerability of the IP network itself and the vulnerability of the distributed processing taking place in the application domain.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号