E-Book, Englisch, 194 Seiten, eBook
Reihe: Practical Networking
Dutta / Sarma / Jadeja Information Centric Networks (ICN)
1. Auflage 2021
ISBN: 978-3-030-46736-4
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Architecture & Current Trends
E-Book, Englisch, 194 Seiten, eBook
Reihe: Practical Networking
ISBN: 978-3-030-46736-4
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
1. Introduction to information centric networks.- 1.1 Introduction.- 1.2 Internet Architecture: Strengths and Limitations.- 1.2.1 Content distribution networks.- 1.3 Content Distribution Network Architecture.- 1.4 Characteristics of ICN, Design Principles, and Assumptions.- 1.4.1 Characteristics of ICN.- 1.4.2 Design Principles.- 1.4.3 Assumptions.-1.5 Key Building Blocks of ICN and Design Challenges.- 1.5.1 Key Building Block of ICN.- 1.5.2 Design Challenges..-1.6 Benefits of using ICN.- 1.7 Historical note on ICN.- Architectures for content communication.- 2.1 Introduction.-2.2 Representative ICN Architectures.- 2.2.1 TRIAD Architecture.- 2.2.2 DONA Architecture.- 2.2.3 Content Centric Network (CCN) Architecture.- 2.2.4 PURSUIT Architecture.- 2.2.5 Network Information (NetInf) architecture.- 2.2.6 The NDN architecture.- 2.3 Comparative analysis of ICN Architectures.- 2.4 Software Defined Networking in ICN.- 2.4.1 Scope ofintegrating SDN into ICN.- 2.4.2 The SDN architecture in general..- 2.5 Summary.- 3 Naming for unique content identification.- 3.1 Introduction.- 3.2 Naming system design.- 3.3 Importance of naming.- 3.4 key design issues and choices for information/content naming for ICNs.- 3.5 Naming approaches proposed so far.- 3.5.1 CBCB (Combined broadcast and content based routing).- 3.5.2 DONA (Data oriented network architecture).- 3.5.3 NetInf (Network of information).- 3.5.4 NDN (Named data networking).- 3.5.5 PURSUIT (Publish subscribe Internet technologies).- 3.5.6 Hierarchical and flat based hybrid naming scheme in CCN IoT.- 3.5.7 Secure naming scheme for Information Centric Networks.- 3.6 Analysis of naming schemes along with their advantages and disadvantages.- 3.6.1 Flat vs. hierarchical vs. attribute value-based naming approaches.- 3.6.2 Name based routing vs. Name resolution.-3.6.3 Incremental vs. Clean slate approach.- 3.7 Need of an efficient content naming mechanism: Our perspective.- 3.8 Open research in ICN Naming.- 3.9 Summary.- 4 Routing schemes used in content delivery.- 4.1 Introduction.- 4.2 Realization of routing in ICN.- 4.3 Realization of Forwarding in ICN.- 4.4. NDN forwarding architecture with illustration.- 4.5. Stateful forwarding paradigm for NDN.- 4.6. OSPFN: An OSPF based routing for NDN.- 4.6.1 Routing in OSPFN.- 4.7 NLSR: A Secure Link State Routing protocol for NDN.- 4.7.1 Naming scheme.- 4.7.2 Format of LSAs.- 4.7.3 Dissemination of LSAs.- .7.4 Adjacency Establishment.- 4.8 Recent development in ICN Routing.- 4.9 Open Research in ICN routing.- 4.10 Summary.- Caching mechanisms for faster content retrieval. - 5.1 Introduction.- 5.1.1 General overview of network caching.- 5.2 Research challenges and issues in ICN caching.- 5.2.1 Unique naming of content and caches.- 5.2.2Popularity of data.- 5.2.3 Limited storage space in caching devices.- 5.2.4 Storage location.- .2.5 Staleness or freshness detection of content.- 5.2.6 Repeated caching of same Content.- 5.2.7 Content Mobility.- 5.2.8 New research challenges for ICN caching.- 5.3 Recent trends in Caching.- 5.3.1 In-Network caching.- 5.3.2 Edge Caching.- 5.3.3 SDN based Caching.- 5.4 Performance metrics along with objectives in terms of caching mechanisms for ICN.- 5.4.1 Cache hit ratio and server load.- 5.4.2 Content retrieval latency.- 5.4.3 Retransmission ratio for interest packets.- 5.4.4 Total cache evictions.- 5.4.5 Diversity Metric.- 5.4.6 Cache retention ratio.- 5.5 Analysis of various caching methods.- 5.6 Open research in ICN caching.- 5.7 Summary.- 6 Security in ICN.- 6.1 Introduction 6.2 Importance of Security in ICN 6.3 Key Security & privacy concerns in ICN architectures 6.4 Attacks in ICN 6.4.1 Naming related attacks.- 6.4.2 Routing related attacks. 6.4.3 Caching related attacks. 6.4.4 Content poisoning attack.- 6.4.5 Miscellaneous attacks.- 6.5 ICN attributes leading to security threats.- 6.6 Security mechanisms adopted in ICN.- 6.6.1 Countermeasures for naming attacks.- 6.6.2 Countermeasures for routing attacks.- 6.6.3 Countermeasures for caching attacks.- 6.6.4 Countermeasures for content poisoning attacks.- 6.6.5 Countermeasures for miscellaneous attacks.- 6.7 Open research in ICN security.- 6.8 Conclusion.- 7. Optimization in ICN.- 7.1 Introduction.- 7.2 The need of optimization in ICN.- 7.3 Approaches for optimization in ICN.- 7.4 Machine learning for optimization in ICN.- 7.4.1 Application of ML in Communication Networks.- 7.4.2 Application of ML in Information Centric Networks.- 7.5 Open research directions for optimization in ICN.- 7.6 Conclusion.- 8. A framework for integrating SDN in ICN.- 8.1 Introduction.- 8.2 State of the art work in SDN based ICN.- 8.3 The SDN architecture for ICN.- 8.3.1 Based on OpenFlow over CONET.- 8.4 Proposed architecture.- 8.4.1 Functional description.- 8.4.2 Routing in the proposed model.- 8.4.3 Caching in the proposed model.- 8.5 Analysis of the proposed architecture.- 8.6 Future research direction in SDN enable ICN.- 8.7 Summary.- Integrating content communication into real life applications.- 9.1 Introduction.- 9.2 Recent trends in ICN applications.- 9.3 Information centric networks in Internet of things.- 9.3.1 Adaptation of information centric networks for internet of things (IoT) : Challenges and opportunities.- 9.4 Information centric networks in smart grid.- 9.5 Information centric networks in wireless sensor networks.- 9.6 Information centric networks in mobile adhoc networks.- 9.7 Information centric networks in vehicular adhoc networks.- 9.8 Open research in the field of content centric real life applications.- 9.9 Summary.