Wednesday, December 18, 2019
Information Centric Network And Developing Channel Coding...
CE301 ââ¬â Initial Report Comparing Internet Routing Protocols Benjamin Richard Bajek 1201731 Computer Networks (3Yr) First supervisor ââ¬â Dr Nikolas Thomos Secord supervisor ââ¬â Dr Arsenla (Ersi) Chorti Contents: Project Overview 3 Background Reading 3-5 Information-Centric Network 3- Introduction 3 Information-Centric Network Components 3-4 ICN Naming scheme 3 ICN Routing and Forwarding 3-4 ICN Caching 4 Information-Centric Network Approaches 4 Network of information (NetInf) 4 Named Data Networking (NDN) 4 Publish-Subscribe Architecture 4 Summary of Different ICN Approaches 5 Channel Coding 5 References 6 Project Goalsâ⬠¦show more contentâ⬠¦The current solution as TCP/IP becomes inefficient and subjects to certain problems. An example of this, to search for content, the content must be mapped to a host, and then DNS translates the host name to the location i.e. IP address. The two-step mapping incurs access overhead. Security is an issue since the security coupled to the host. The host becomes a target for security attacks. Also IP is stateless so they cannot be caching capability; the same request would be made times, this lead to unnecessary bandwidth usage. This prompted the research into move the architecture from a host-centric to information-centric. Information-Centric Network Components ICN naming scheme Information unit in ICN is called Named Data Object (NDO). This can be any type of content. This contents location- independent identifier (name), data, and possibly a metadata. NDO can be identified by multiple names. Each ICN approached the design of the NDO differently. They are two commonly used schemes are flat and hierarchical naming. Most recent ICN allow hybrid naming. Hierarchical Naming ââ¬â The format is similar to URL, enhances scalability since name prefix can be aggregated the same way as the URL, and more coherent to the existing IP networks. Also name is user-friendly; therefore it is easy to remember. Security vulnerability since the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment