SlideShare a Scribd company logo
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
DOI:10.5121/ijcsa.2013.3402 13
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN
COMPUTER NETWORKS
SAKTHI MURUGAN. R1
, P. SHANTHI BALA
2
AND DR. G. AGHILA
3
Department of Computer Science, Pondicherry University, Puducherry, India
1
sakthimuruga@gmail.com
2
shanthibala.cs@gmail.com
ABSTRACT
Ontology is applied to impart knowledge in various fields of Information Technology made it more
intelligent in the past few decades. Many Ontologies was built on various domains like biology, medicine,
physics, chemistry, and mathematics. The Ontology in computer science domain are limited and even the
Ontology is not explored in detail. The knowledge in the field of computer networks is very large, which
makes it more difficult for a human to expertise in. This paper proposes the Ontology in computer network
domain on various perspectives like scope, scale, topology, communication media, OSI model, TCP/ IP
model, protocol, security, network operating system, network hardware and performance. The Ontology is
developed in OWL format, which can be easily integrated with any other semantic based applications. The
network Ontology can be employed in Semantic Web applications to help the users to search for concepts
computer networks domain.
KEYWORDS
Computer Networks, Ontology, OWL, Semantic Web
1. INTRODUCTION
The Semantic Web is an extension of the current web in which information provides well-defined
meaning that enables system and people for better understanding and can enable to work
effectively [1]. The abundance knowledge available in web is made organized with the help of
semantic web. Ontology is called as the core of Semantic Web since it is needed to develop
semantic web applications.
Ontology is a, "formal and explicit specification of a shared conceptualization" [2]. These
Ontologies can be represented as Web Ontology Language (OWL) [15], RDFS, DAML+OIL
[24]. W3C [16] recommends OWL definition of Ontology on web than other available like OIL
[14], SHOE [25] and XOL [26]. The main advantage of Ontology is once developed it can be
integrated and reused in all the applications, it allows to share more data, uses simple tags to
provide semantic information.
The development of Ontology in various domains has proved its efficiency in various ways.
Though Ontology is the transformation of philosophy to Information Systems, little effort has
been made to develop in domain of Information Systems compared to other growing research
domains.The way computer communicates having evolved in the past few decades. This
evolution leads to the introduction of new concepts and technologies being introduced frequently
to improve the speed, efficiency, security and various aspects in domain of computer networks.
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
14
This introduction of large concepts makes it hard to expertise in its entire sub domain. We have
developed the Ontology for computer networks, which consists of 500+ concepts. These concepts
are built with W3C standard whereby integrating these Ontologies can alleviate the difficulty of
user. This paper is organized as follows: Section 2 describes the related work being carried out in
various domain Ontology. Section 3 explores the various concepts, relations and properties of
computer networks domain. Section 4 describes the implementation of Ontology and finally
Section 5 concludes the paper.
2. RELATED WORK
Many well published Ontology are publicly available like Gene Ontology (GO) [18] which
consists of gene and gene products of various species, Plant Ontology (PO) [19] which consists of
concepts about anatomy, morphology and stages of plants, Semantic Web for Earth and
Environmental Terminology (SWEET) [20] contains 6000 unique concepts and 200 distinct
Ontology in SWEET 2.2, Foundational Model of Anatomy Ontology (FMA) [21] contains
120000 terms with 75000 distinct concepts with 168 types of relationships.
Various domain Ontologies has been developed like Yip et al. [4] developed Ontology for
healthcare domain. Mei-Ying Jia et al. [5] developed Domain Ontology in Military Intelligence.
Song Jun-Feng et al. [6] worked for Network Centric Warfare on Construction and Integration of
Ontology for military domain, situation and military rule. Maojun Huang [7] developed
Geographic Ontology from the viewpoints of Philosophy Ontology, Information Ontology and
Spatial Ontology. Gang Liu et al. [8] developed Ontology for geological hazard information.
Fragiskos et al. [9] created Ontology for biosensor domain to support R&D in the science-based
sector.
Ontology developed to support reasoning for a model is more common in case of Computer
Network than those developed to provide domain knowledge. Hui Xu and Debao Xiao [10][11]
developed Information Specification Ontology to manage Computer Network based on Formal
Concept Analysis and configure IP based network based on Ontology than that of normal SNMP.
A.K.Y. Wong et al. [12] have developed Ontology to map the protocols of different networking
device providers. M.J. Taylor et al. [13] have developed knowledge for network support based on
case studies of organizational approach to troubleshoot network problems.
Ontology developed to provide domain knowledge in a broader domain like computer networks is
very limited. Ling et al. [3] developed an educational Ontology for computer networks, which
explores concepts, communication sub network, application sub network, standards and network
security with the main purpose to be used as a teaching aid. The major drawback of the existing
system is the relations between the concepts have not been analyzed properly. In general "is-a"
and "part-of" is used in common for all the relations, which makes the Ontology weak.
3. COMPUTER NETWORKS ONTOLOGY
3.1. Classification of Computer Networks
The domain of computer networks can be categorized based on scope, scale, topology,
communication media, OSI model, TCP/ IP model, protocol, security, network operating system,
network hardware and performance.The main concepts explored under scope are Intranet,
Extranet and Internet in terms of services provided and technology used. Scale is classified as
LAN, MAN and WAN and how it could be achieved. Topology is ranked out based on its types
and standards. Communication media are
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
15
analyzed based on its types of variant, the way it operates and standards. The main concepts make
out of OSI and TCP/ IP model are its layers and functionalities. Protocol is a vast area explored in
terms of Ethernet standards and technologies, Internet Protocol (IP) versions, classes, support to
upper layers. Security itself a vast sub domain which is categorized in terms of threats, attacks,
encryption techniques, malicious software's and approaches to system security. The network
operating system is classified based on its types of operating system used in router, types of
server operating system and types of operating system used for peer-to-peer communication.
Network hardware concepts are analyzed based on its types and functionalities. The factors to be
considered to improve the performance of communication are explored under performance.
Figure 1 shows the part of developed Ontology with the relation between them.
The relations are used to complete the meaning of the concepts. For example concepts 'IANA' and
'Internet Protocol' uses the relation 'allocate' which has knowledge 'IANA allocate Internet
Protocol', concepts 'Transport Layer' and 'Datagram' uses relation 'transmits' which contains
knowledge 'Transport Layer transmits Datagram'.
Figure 1. Part of Developed Ontology
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
16
2.2. Ontology Development
The Ontology development process is to first identify the key concepts and then the relation
between the concepts and finally classify the concepts based on their properties.The main
drawback of the existing system is the concepts not explored in detail, and the relation between
the concepts is not analyzed, which provides open world semantics. In our Ontology we analyzed
about 550-relationship instance with 33 types of relationship. Semantic annotations are available
for most of the concepts, which make the user get to know more details about the concepts.
The key concepts or sub concepts are represented as Classes. We found key concepts in the
domain of computer networks and analyzed all the equivalent concepts to find the relation
between the concepts. We studied the properties of each concept to categories all sub concepts
under one main concept and we found the total number of concepts grouped under one main
concept in Table 1. Table 2 and Table 3 are the sub concepts of Security and Protocol
respectively.
Table 1. Explored Concepts in Computer Networks.
Sl. No. Concepts No. of Sub Concepts
1 Scope 47
2 Scale 8
3 Topology 24
4 Communication Media 94
5 OSI Model 37
6 TCP/ IP Model 8
7 Protocol 121
8 Security 125
9 Network Operating System 24
10 Network Hardware 48
11 Performance 7
Table 2. List of Concepts Related to Security.
Sl. No. Concepts No. of Sub Concepts
1 Goals 3
2 Threads 4
3 Attacks 19
4 Cryptography 23
5 Intrusion Detection System 18
6 Virtual Private Network 13
7 Firewall 14
8 Malicious Software 26
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
17
Table 3. Protocol Related Concepts.
Sl. No. Concepts No. of Sub Concepts
1 Ethernet 19
2 Internet Protocol 68
3 SONET/ SDH 10
4 ATM 22
4. IMPLEMENTATION
There are many tools like Protégé [17], OilEd [22] and KAON [23], which are used to develop
Ontology. We used Protégé user interface in developing the Ontology for Computer Networks.
Through study about the concepts are made before categorizing it. There are some sub concepts,
which are to be categorized under different main concepts whose complex relations can be easily
retrieved through the developed Ontology.
The part of code of developed Ontology is given in Figure 2. This code is in XML format where
"www.w3.org/2002/07/owl#" has the schema definition for Ontology development. The concepts
'Internet' and 'World Wide Web' are declared as classes in the Ontology, and the relation between
them is 'uses' which is declared as object property. The actual knowledge stored in the code is
'Internet uses World Wide Web'.
Figure 2. Screenshot of part of developed Ontology
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
18
Figure 3 shows the various concepts explored with Networking Hardware in Protégé tool. The
'Thing' is the system class of the Protégé tool under which the user defined classes are created.
Figure 3. Concepts explored in Networking Hardware
Figure 4 shows the visualization of the developed Ontology. OWLViz plug-in has been used to
show the visualization. It identifies the concepts from the classes in the OWL file and creates a
default 'is a' relationship between those concepts which are related by the SubClassOf tag.
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
19
Figure 4. Visualization of Network Ontology
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
20
5. CONCLUSION
This paper report the first stage of research which focus on the development of Ontology for the
domain of computer networks with 500+ concepts, 550 relationship instance with 33 types of
relationship, which is considered as fuel to run the Semantic applications, so that the user can
seek for domain knowledge. The domain of computer networks has evolved and still growing, so
the Ontology we have developed tends to dynamically grow with new invention and advancement
in technology over time.
REFERENCES
[1] Berners-Lee, J. Hendler, and O. Lassila, "The Semantic Web", Scientific American, vol. 284, no. 5,
pp. 34-43, May 2001.
[2] M. Uschold and M. Gruninger, "Ontologies: Principles, methods and applications", Knowledge
Engineering Review, vol. ll, no.2, pp.93-155, 1996.
[3] Ling Jiang, Chengling Zhao and Haimei Wei, "The Development of Ontology-Based Course for
Computer Networks", International Conference on Computer Science and Software Engineering,
2008, 978-0-7695-3336-0/08, DOI 10.1109/CSSE.2008.185
[4] Yip Chi Kiong, Sellappan Palaniappan and Nor Adnan Yahaya, "Health Ontology System", 7th
International Conference on IT in Asia (CITA), 2011 IEEE, 978-1-61284-130-4/11.
[5] Mei-ying Jia, Bing-ru Yang, De-quan Zheng and Wei-cong Sun, "Research on Domain Ontology
Construction in Military Intelligence", Third International Symposium on Intelligent Information
Technology Application, 2009, IEEE, pp.116–119.
[6] Song Jun-feng, Zhang Wei-ming, Xiao Wei-dong and Xu Zhen-ning, "Study on Construction and
Integration of Military Domain Ontology, Situation Ontology and Military Rule Ontology for
Network Centric Warfare", The 2005 IEEE International Conference on e-Technology, e-Commerce
and e-Service.
[7] Maojun Huang, "On The Concept of Geographic Ontology—From The Viewpoints of Philosophy
Ontology, Information Ontology and Spatial Ontology", 18th International Conference on
Geoinformatics, 2010, IEEE.
[8] Gang Liu, Yanni Wang and Chonglong Wu, "Research and Application of Geological Hazard
Domain Ontology", 18th International Conference on Geoinformatics, 2010, IEEE.
[9] Fragiskos A. Batzias and Christina G. Siontorou, "Creating a specific domain Ontology for supporting
R&D in the science-based sector – The case of biosensors", Expert Systems with Applications,
Volume 39, Issue 11, 1 September 2012, Pages 9994–10015.
[10] Hui Xu and Debao Xiao, “Building Information Specification Ontology for Computer Network
Management based on Formal Concept Analysis”, International Conference on Information and
Automation, June 2009, pp. 312-317.
[11] Hui Xu and Debao Xiao, "Common Ontology-based Intelligent Configuration Management Model for
IP Network Devices", Innovative Computing, Information and Control, ICICIC '06, pp.385-388.
[12] A.K.Y. Wong, An Chi Chen, N. Paramesh, P. Rav, "Ontology Mapping for Network Management
Systems", Network Operations and Management Symposium, IEEE/IFIP, April 2004, Vol.1,pp.885-
886.
[13] M.J. Taylor, D. Gresty and R. Askwith, "Knowledge for Network Support", Information and Software
Technology, Volume 43, Issue 8, 1 July 2001, Pages 469–475.
[14] Dieter Fensel, Frank van Harmelen, Ian Horrocks, Deborah L. McGuinness and Peter F. Patel-
Schneider. "OIL: An Ontology Infrastructure for the Semantic Web", IEEE INTELLIGENT
SYSTEMS, MARCH/APRIL 2001, pp.38-45.
[15] OWL Web Ontology Language. Available: http://www.w3.org/TR/owl-features/
[16] World Wide Web Consortium (W3C). Available: http://www.w3.org/standards/semanticweb/
ontology
[17] Protégé. Available: http://protege.stanford.edu/
[18] An Introduction to the Gene Ontology. Available: http://www.geneontology.org/GO.doc.shtml
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013
21
[19] About the Plant Ontology project. Available: http://www.plantontology.org/docs/otherdocs/poc
_project.html
[20] SWEET Ontologies. Available: http://sweet.jpl.nasa.gov/
[21] Foundational Model of Anatomy ontology - About. Available: http://sig.biostr.washington.edu/
projects/fm/AboutFM.html
[22] OilEd. Available: http://oiled.semanticweb.org/index.shtml
[23] KAON - The Karlsruhe Ontology and Semantic Web Tool Suite. Available: http://kaon.
semanticweb.org/
[24] DAML+OIL. Available: http://www.w3.org/TR/daml+oil-reference
[25] SHOE: Simple HTML Ontology Extensions. Available: http://www.cs.umd.edu/projects/plus/ SHOE/
[26] XOL Ontology Exchange Language. Available: http://www.ai.sri.com/pkarp/xol/

More Related Content

What's hot

Computer Science Research Methodologies
Computer Science Research MethodologiesComputer Science Research Methodologies
Computer Science Research Methodologies
IJCSIS Research Publications
 
Novel framework using dynamic passphrase towards secure and energy-efficient ...
Novel framework using dynamic passphrase towards secure and energy-efficient ...Novel framework using dynamic passphrase towards secure and energy-efficient ...
Novel framework using dynamic passphrase towards secure and energy-efficient ...
IJECEIAES
 
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
IAEME Publication
 
Trends of machine learning in 2020 - International Journal of Artificial Inte...
Trends of machine learning in 2020 - International Journal of Artificial Inte...Trends of machine learning in 2020 - International Journal of Artificial Inte...
Trends of machine learning in 2020 - International Journal of Artificial Inte...
gerogepatton
 
An overview of internet of things
An overview of internet of thingsAn overview of internet of things
An overview of internet of things
TELKOMNIKA JOURNAL
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
IJITE
 
Artigo - Aplicações Interativas para TV Digital: Uma Proposta de Ontologia de...
Artigo - Aplicações Interativas para TV Digital: Uma Proposta de Ontologia de...Artigo - Aplicações Interativas para TV Digital: Uma Proposta de Ontologia de...
Artigo - Aplicações Interativas para TV Digital: Uma Proposta de Ontologia de...
Diego Armando
 
A crisis-communication-network-based-on-embodied-conversational-agents-system...
A crisis-communication-network-based-on-embodied-conversational-agents-system...A crisis-communication-network-based-on-embodied-conversational-agents-system...
A crisis-communication-network-based-on-embodied-conversational-agents-system...Cemal Ardil
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitaebutest
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
IJECEIAES
 
The road to internet of things :a survey
The road to internet of things :a surveyThe road to internet of things :a survey
The road to internet of things :a survey
Sana
 
Rule-based Information Extraction from Disease Outbreak Reports
Rule-based Information Extraction from Disease Outbreak ReportsRule-based Information Extraction from Disease Outbreak Reports
Rule-based Information Extraction from Disease Outbreak Reports
Waqas Tariq
 
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
IJECEIAES
 
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
IJECEIAES
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijci
IJCI JOURNAL
 
A Deep Learning Model For Crime Surveillance In Phone Calls.
A Deep Learning Model For Crime Surveillance In Phone Calls.A Deep Learning Model For Crime Surveillance In Phone Calls.
A Deep Learning Model For Crime Surveillance In Phone Calls.
vivatechijri
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
IJECEIAES
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
IJSRED
 
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
IJECEIAES
 

What's hot (20)

Computer Science Research Methodologies
Computer Science Research MethodologiesComputer Science Research Methodologies
Computer Science Research Methodologies
 
Novel framework using dynamic passphrase towards secure and energy-efficient ...
Novel framework using dynamic passphrase towards secure and energy-efficient ...Novel framework using dynamic passphrase towards secure and energy-efficient ...
Novel framework using dynamic passphrase towards secure and energy-efficient ...
 
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
 
Trends of machine learning in 2020 - International Journal of Artificial Inte...
Trends of machine learning in 2020 - International Journal of Artificial Inte...Trends of machine learning in 2020 - International Journal of Artificial Inte...
Trends of machine learning in 2020 - International Journal of Artificial Inte...
 
An overview of internet of things
An overview of internet of thingsAn overview of internet of things
An overview of internet of things
 
CV January 2011
CV January 2011CV January 2011
CV January 2011
 
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATIONNETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
NETWORK INTRUSION DATASETS USED IN NETWORK SECURITY EDUCATION
 
Artigo - Aplicações Interativas para TV Digital: Uma Proposta de Ontologia de...
Artigo - Aplicações Interativas para TV Digital: Uma Proposta de Ontologia de...Artigo - Aplicações Interativas para TV Digital: Uma Proposta de Ontologia de...
Artigo - Aplicações Interativas para TV Digital: Uma Proposta de Ontologia de...
 
A crisis-communication-network-based-on-embodied-conversational-agents-system...
A crisis-communication-network-based-on-embodied-conversational-agents-system...A crisis-communication-network-based-on-embodied-conversational-agents-system...
A crisis-communication-network-based-on-embodied-conversational-agents-system...
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
 
The road to internet of things :a survey
The road to internet of things :a surveyThe road to internet of things :a survey
The road to internet of things :a survey
 
Rule-based Information Extraction from Disease Outbreak Reports
Rule-based Information Extraction from Disease Outbreak ReportsRule-based Information Extraction from Disease Outbreak Reports
Rule-based Information Extraction from Disease Outbreak Reports
 
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
 
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijci
 
A Deep Learning Model For Crime Surveillance In Phone Calls.
A Deep Learning Model For Crime Surveillance In Phone Calls.A Deep Learning Model For Crime Surveillance In Phone Calls.
A Deep Learning Model For Crime Surveillance In Phone Calls.
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
 

Similar to AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS

Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
todd521
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
IJNSA Journal
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A Survey
IJCSES Journal
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
International Journal of Reconfigurable and Embedded Systems
 
A Short Literature Review On The Internet Of Things Research And Development...
A Short Literature Review On The Internet Of Things  Research And Development...A Short Literature Review On The Internet Of Things  Research And Development...
A Short Literature Review On The Internet Of Things Research And Development...
Nicole Heredia
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
IJNSA Journal
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 

Similar to AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS (20)

Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A Survey
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
A Short Literature Review On The Internet Of Things Research And Development...
A Short Literature Review On The Internet Of Things  Research And Development...A Short Literature Review On The Internet Of Things  Research And Development...
A Short Literature Review On The Internet Of Things Research And Development...
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
April 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsApril 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013 DOI:10.5121/ijcsa.2013.3402 13 AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS SAKTHI MURUGAN. R1 , P. SHANTHI BALA 2 AND DR. G. AGHILA 3 Department of Computer Science, Pondicherry University, Puducherry, India 1 sakthimuruga@gmail.com 2 shanthibala.cs@gmail.com ABSTRACT Ontology is applied to impart knowledge in various fields of Information Technology made it more intelligent in the past few decades. Many Ontologies was built on various domains like biology, medicine, physics, chemistry, and mathematics. The Ontology in computer science domain are limited and even the Ontology is not explored in detail. The knowledge in the field of computer networks is very large, which makes it more difficult for a human to expertise in. This paper proposes the Ontology in computer network domain on various perspectives like scope, scale, topology, communication media, OSI model, TCP/ IP model, protocol, security, network operating system, network hardware and performance. The Ontology is developed in OWL format, which can be easily integrated with any other semantic based applications. The network Ontology can be employed in Semantic Web applications to help the users to search for concepts computer networks domain. KEYWORDS Computer Networks, Ontology, OWL, Semantic Web 1. INTRODUCTION The Semantic Web is an extension of the current web in which information provides well-defined meaning that enables system and people for better understanding and can enable to work effectively [1]. The abundance knowledge available in web is made organized with the help of semantic web. Ontology is called as the core of Semantic Web since it is needed to develop semantic web applications. Ontology is a, "formal and explicit specification of a shared conceptualization" [2]. These Ontologies can be represented as Web Ontology Language (OWL) [15], RDFS, DAML+OIL [24]. W3C [16] recommends OWL definition of Ontology on web than other available like OIL [14], SHOE [25] and XOL [26]. The main advantage of Ontology is once developed it can be integrated and reused in all the applications, it allows to share more data, uses simple tags to provide semantic information. The development of Ontology in various domains has proved its efficiency in various ways. Though Ontology is the transformation of philosophy to Information Systems, little effort has been made to develop in domain of Information Systems compared to other growing research domains.The way computer communicates having evolved in the past few decades. This evolution leads to the introduction of new concepts and technologies being introduced frequently to improve the speed, efficiency, security and various aspects in domain of computer networks.
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013 14 This introduction of large concepts makes it hard to expertise in its entire sub domain. We have developed the Ontology for computer networks, which consists of 500+ concepts. These concepts are built with W3C standard whereby integrating these Ontologies can alleviate the difficulty of user. This paper is organized as follows: Section 2 describes the related work being carried out in various domain Ontology. Section 3 explores the various concepts, relations and properties of computer networks domain. Section 4 describes the implementation of Ontology and finally Section 5 concludes the paper. 2. RELATED WORK Many well published Ontology are publicly available like Gene Ontology (GO) [18] which consists of gene and gene products of various species, Plant Ontology (PO) [19] which consists of concepts about anatomy, morphology and stages of plants, Semantic Web for Earth and Environmental Terminology (SWEET) [20] contains 6000 unique concepts and 200 distinct Ontology in SWEET 2.2, Foundational Model of Anatomy Ontology (FMA) [21] contains 120000 terms with 75000 distinct concepts with 168 types of relationships. Various domain Ontologies has been developed like Yip et al. [4] developed Ontology for healthcare domain. Mei-Ying Jia et al. [5] developed Domain Ontology in Military Intelligence. Song Jun-Feng et al. [6] worked for Network Centric Warfare on Construction and Integration of Ontology for military domain, situation and military rule. Maojun Huang [7] developed Geographic Ontology from the viewpoints of Philosophy Ontology, Information Ontology and Spatial Ontology. Gang Liu et al. [8] developed Ontology for geological hazard information. Fragiskos et al. [9] created Ontology for biosensor domain to support R&D in the science-based sector. Ontology developed to support reasoning for a model is more common in case of Computer Network than those developed to provide domain knowledge. Hui Xu and Debao Xiao [10][11] developed Information Specification Ontology to manage Computer Network based on Formal Concept Analysis and configure IP based network based on Ontology than that of normal SNMP. A.K.Y. Wong et al. [12] have developed Ontology to map the protocols of different networking device providers. M.J. Taylor et al. [13] have developed knowledge for network support based on case studies of organizational approach to troubleshoot network problems. Ontology developed to provide domain knowledge in a broader domain like computer networks is very limited. Ling et al. [3] developed an educational Ontology for computer networks, which explores concepts, communication sub network, application sub network, standards and network security with the main purpose to be used as a teaching aid. The major drawback of the existing system is the relations between the concepts have not been analyzed properly. In general "is-a" and "part-of" is used in common for all the relations, which makes the Ontology weak. 3. COMPUTER NETWORKS ONTOLOGY 3.1. Classification of Computer Networks The domain of computer networks can be categorized based on scope, scale, topology, communication media, OSI model, TCP/ IP model, protocol, security, network operating system, network hardware and performance.The main concepts explored under scope are Intranet, Extranet and Internet in terms of services provided and technology used. Scale is classified as LAN, MAN and WAN and how it could be achieved. Topology is ranked out based on its types and standards. Communication media are
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013 15 analyzed based on its types of variant, the way it operates and standards. The main concepts make out of OSI and TCP/ IP model are its layers and functionalities. Protocol is a vast area explored in terms of Ethernet standards and technologies, Internet Protocol (IP) versions, classes, support to upper layers. Security itself a vast sub domain which is categorized in terms of threats, attacks, encryption techniques, malicious software's and approaches to system security. The network operating system is classified based on its types of operating system used in router, types of server operating system and types of operating system used for peer-to-peer communication. Network hardware concepts are analyzed based on its types and functionalities. The factors to be considered to improve the performance of communication are explored under performance. Figure 1 shows the part of developed Ontology with the relation between them. The relations are used to complete the meaning of the concepts. For example concepts 'IANA' and 'Internet Protocol' uses the relation 'allocate' which has knowledge 'IANA allocate Internet Protocol', concepts 'Transport Layer' and 'Datagram' uses relation 'transmits' which contains knowledge 'Transport Layer transmits Datagram'. Figure 1. Part of Developed Ontology
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013 16 2.2. Ontology Development The Ontology development process is to first identify the key concepts and then the relation between the concepts and finally classify the concepts based on their properties.The main drawback of the existing system is the concepts not explored in detail, and the relation between the concepts is not analyzed, which provides open world semantics. In our Ontology we analyzed about 550-relationship instance with 33 types of relationship. Semantic annotations are available for most of the concepts, which make the user get to know more details about the concepts. The key concepts or sub concepts are represented as Classes. We found key concepts in the domain of computer networks and analyzed all the equivalent concepts to find the relation between the concepts. We studied the properties of each concept to categories all sub concepts under one main concept and we found the total number of concepts grouped under one main concept in Table 1. Table 2 and Table 3 are the sub concepts of Security and Protocol respectively. Table 1. Explored Concepts in Computer Networks. Sl. No. Concepts No. of Sub Concepts 1 Scope 47 2 Scale 8 3 Topology 24 4 Communication Media 94 5 OSI Model 37 6 TCP/ IP Model 8 7 Protocol 121 8 Security 125 9 Network Operating System 24 10 Network Hardware 48 11 Performance 7 Table 2. List of Concepts Related to Security. Sl. No. Concepts No. of Sub Concepts 1 Goals 3 2 Threads 4 3 Attacks 19 4 Cryptography 23 5 Intrusion Detection System 18 6 Virtual Private Network 13 7 Firewall 14 8 Malicious Software 26
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013 17 Table 3. Protocol Related Concepts. Sl. No. Concepts No. of Sub Concepts 1 Ethernet 19 2 Internet Protocol 68 3 SONET/ SDH 10 4 ATM 22 4. IMPLEMENTATION There are many tools like Protégé [17], OilEd [22] and KAON [23], which are used to develop Ontology. We used Protégé user interface in developing the Ontology for Computer Networks. Through study about the concepts are made before categorizing it. There are some sub concepts, which are to be categorized under different main concepts whose complex relations can be easily retrieved through the developed Ontology. The part of code of developed Ontology is given in Figure 2. This code is in XML format where "www.w3.org/2002/07/owl#" has the schema definition for Ontology development. The concepts 'Internet' and 'World Wide Web' are declared as classes in the Ontology, and the relation between them is 'uses' which is declared as object property. The actual knowledge stored in the code is 'Internet uses World Wide Web'. Figure 2. Screenshot of part of developed Ontology
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013 18 Figure 3 shows the various concepts explored with Networking Hardware in Protégé tool. The 'Thing' is the system class of the Protégé tool under which the user defined classes are created. Figure 3. Concepts explored in Networking Hardware Figure 4 shows the visualization of the developed Ontology. OWLViz plug-in has been used to show the visualization. It identifies the concepts from the classes in the OWL file and creates a default 'is a' relationship between those concepts which are related by the SubClassOf tag.
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013 19 Figure 4. Visualization of Network Ontology
  • 8. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013 20 5. CONCLUSION This paper report the first stage of research which focus on the development of Ontology for the domain of computer networks with 500+ concepts, 550 relationship instance with 33 types of relationship, which is considered as fuel to run the Semantic applications, so that the user can seek for domain knowledge. The domain of computer networks has evolved and still growing, so the Ontology we have developed tends to dynamically grow with new invention and advancement in technology over time. REFERENCES [1] Berners-Lee, J. Hendler, and O. Lassila, "The Semantic Web", Scientific American, vol. 284, no. 5, pp. 34-43, May 2001. [2] M. Uschold and M. Gruninger, "Ontologies: Principles, methods and applications", Knowledge Engineering Review, vol. ll, no.2, pp.93-155, 1996. [3] Ling Jiang, Chengling Zhao and Haimei Wei, "The Development of Ontology-Based Course for Computer Networks", International Conference on Computer Science and Software Engineering, 2008, 978-0-7695-3336-0/08, DOI 10.1109/CSSE.2008.185 [4] Yip Chi Kiong, Sellappan Palaniappan and Nor Adnan Yahaya, "Health Ontology System", 7th International Conference on IT in Asia (CITA), 2011 IEEE, 978-1-61284-130-4/11. [5] Mei-ying Jia, Bing-ru Yang, De-quan Zheng and Wei-cong Sun, "Research on Domain Ontology Construction in Military Intelligence", Third International Symposium on Intelligent Information Technology Application, 2009, IEEE, pp.116–119. [6] Song Jun-feng, Zhang Wei-ming, Xiao Wei-dong and Xu Zhen-ning, "Study on Construction and Integration of Military Domain Ontology, Situation Ontology and Military Rule Ontology for Network Centric Warfare", The 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service. [7] Maojun Huang, "On The Concept of Geographic Ontology—From The Viewpoints of Philosophy Ontology, Information Ontology and Spatial Ontology", 18th International Conference on Geoinformatics, 2010, IEEE. [8] Gang Liu, Yanni Wang and Chonglong Wu, "Research and Application of Geological Hazard Domain Ontology", 18th International Conference on Geoinformatics, 2010, IEEE. [9] Fragiskos A. Batzias and Christina G. Siontorou, "Creating a specific domain Ontology for supporting R&D in the science-based sector – The case of biosensors", Expert Systems with Applications, Volume 39, Issue 11, 1 September 2012, Pages 9994–10015. [10] Hui Xu and Debao Xiao, “Building Information Specification Ontology for Computer Network Management based on Formal Concept Analysis”, International Conference on Information and Automation, June 2009, pp. 312-317. [11] Hui Xu and Debao Xiao, "Common Ontology-based Intelligent Configuration Management Model for IP Network Devices", Innovative Computing, Information and Control, ICICIC '06, pp.385-388. [12] A.K.Y. Wong, An Chi Chen, N. Paramesh, P. Rav, "Ontology Mapping for Network Management Systems", Network Operations and Management Symposium, IEEE/IFIP, April 2004, Vol.1,pp.885- 886. [13] M.J. Taylor, D. Gresty and R. Askwith, "Knowledge for Network Support", Information and Software Technology, Volume 43, Issue 8, 1 July 2001, Pages 469–475. [14] Dieter Fensel, Frank van Harmelen, Ian Horrocks, Deborah L. McGuinness and Peter F. Patel- Schneider. "OIL: An Ontology Infrastructure for the Semantic Web", IEEE INTELLIGENT SYSTEMS, MARCH/APRIL 2001, pp.38-45. [15] OWL Web Ontology Language. Available: http://www.w3.org/TR/owl-features/ [16] World Wide Web Consortium (W3C). Available: http://www.w3.org/standards/semanticweb/ ontology [17] Protégé. Available: http://protege.stanford.edu/ [18] An Introduction to the Gene Ontology. Available: http://www.geneontology.org/GO.doc.shtml
  • 9. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.4, August 2013 21 [19] About the Plant Ontology project. Available: http://www.plantontology.org/docs/otherdocs/poc _project.html [20] SWEET Ontologies. Available: http://sweet.jpl.nasa.gov/ [21] Foundational Model of Anatomy ontology - About. Available: http://sig.biostr.washington.edu/ projects/fm/AboutFM.html [22] OilEd. Available: http://oiled.semanticweb.org/index.shtml [23] KAON - The Karlsruhe Ontology and Semantic Web Tool Suite. Available: http://kaon. semanticweb.org/ [24] DAML+OIL. Available: http://www.w3.org/TR/daml+oil-reference [25] SHOE: Simple HTML Ontology Extensions. Available: http://www.cs.umd.edu/projects/plus/ SHOE/ [26] XOL Ontology Exchange Language. Available: http://www.ai.sri.com/pkarp/xol/