Featured Post

Corporation Rules and Regulations free essay sample

The gathering had been at risk for 70% of Australian asbestos utilization. In any case, in February 2007, ASIC had begun to force common pro...

Wednesday, May 6, 2020

Information Centric Network And Developing Channel Coding...

CE301 – Initial Report Comparing Internet Routing Protocols Benjamin Richard Bajek 1201731 Computer Networks (3Yr) First supervisor – Dr Nikolas Thomos Secord supervisor – Dr Arsenla (Ersi) Chorti Contents: Project Overview 3 Background Reading 3-5 Information-Centric Network 3- Introduction 3 Information-Centric Network Components 3-4 ICN Naming scheme 3 ICN Routing and Forwarding 3-4 ICN Caching 4 Information-Centric Network Approaches 4 Network of information (NetInf) 4 Named Data Networking (NDN) 4 Publish-Subscribe Architecture 4 Summary of Different ICN Approaches 5 Channel Coding 5 References 6 Project Goals†¦show more content†¦The current solution as TCP/IP becomes inefficient and subjects to certain problems. An example of this, to search for content, the content must be mapped to a host, and then DNS translates the host name to the location i.e. IP address. The two-step mapping incurs access overhead. Security is an issue since the security coupled to the host. The host becomes a target for security attacks. Also IP is stateless so they cannot be caching capability; the same request would be made times, this lead to unnecessary bandwidth usage. This prompted the research into move the architecture from a host-centric to information-centric. Information-Centric Network Components ICN naming scheme Information unit in ICN is called Named Data Object (NDO). This can be any type of content. This contents location- independent identifier (name), data, and possibly a metadata. NDO can be identified by multiple names. Each ICN approached the design of the NDO differently. They are two commonly used schemes are flat and hierarchical naming. Most recent ICN allow hybrid naming. Hierarchical Naming – The format is similar to URL, enhances scalability since name prefix can be aggregated the same way as the URL, and more coherent to the existing IP networks. Also name is user-friendly; therefore it is easy to remember. Security vulnerability since the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.