청구기호 |
TK7885-7895 |
판사항 |
1st ed. 2021.
|
형태사항 |
VII, 194 p. 39 illus. online resource.
|
총서명 |
Practical Networking, 2662-1711
|
언어 |
English |
내용 |
1. Introduction to information centric networks -- 1.1 Introduction -- 1.2 Internet Architecture: Strengths and Limitations -- 1.2.1 Content distribution networks -- 1.3 Content Distribution Network Architecture -- 1.4 Characteristics of ICN, Design Principles, and Assumptions -- 1.4.1 Characteristics of ICN -- 1.4.2 Design Principles -- 1.4.3 Assumptions.-1.5 Key Building Blocks of ICN and Design Challenges -- 1.5.1 Key Building Block of ICN -- 1.5.2 Design Challenges..-1.6 Benefits of using ICN -- 1.7 Historical note on ICN -- Architectures for content communication -- 2.1 Introduction.-2.2 Representative ICN Architectures -- 2.2.1 TRIAD Architecture -- 2.2.2 DONA Architecture -- 2.2.3 Content Centric Network (CCN) Architecture -- 2.2.4 PURSUIT Architecture -- 2.2.5 Network Information (NetInf) architecture -- 2.2.6 The NDN architecture -- 2.3 Comparative analysis of ICN Architectures -- 2.4 Software Defined Networking in ICN -- 2.4.1 Scope of integrating SDN into ICN -- 2.4.2 The SDN architecture in general. -- 2.5 Summary -- 3 Naming for unique content identification -- 3.1 Introduction -- 3.2 Naming system design -- 3.3 Importance of naming -- 3.4 key design issues and choices for information/content naming for ICNs -- 3.5 Naming approaches proposed so far -- 3.5.1 CBCB (Combined broadcast and content based routing) -- 3.5.2 DONA (Data oriented network architecture) -- 3.5.3 NetInf (Network of information) -- 3.5.4 NDN (Named data networking) -- 3.5.5 PURSUIT (Publish subscribe Internet technologies) -- 3.5.6 Hierarchical and flat based hybrid naming scheme in CCN IoT -- 3.5.7 Secure naming scheme for Information Centric Networks -- 3.6 Analysis of naming schemes along with their advantages and disadvantages -- 3.6.1 Flat vs. hierarchical vs. attribute value-based naming approaches -- 3.6.2 Name based routing vs. Name resolution.-3.6.3 Incremental vs. Clean slate approach -- 3.7 Need of an efficient content naming mechanism: Our perspective -- 3.8 Open research in ICN Naming -- 3.9 Summary -- 4 Routing schemes used in content delivery -- 4.1 Introduction -- 4.2 Realization of routing in ICN -- 4.3 Realization of Forwarding in ICN -- 4.4. NDN forwarding architecture with illustration -- 4.5. Stateful forwarding paradigm for NDN -- 4.6. OSPFN: An OSPF based routing for NDN -- 4.6.1 Routing in OSPFN -- 4.7 NLSR: A Secure Link State Routing protocol for NDN -- 4.7.1 Naming scheme -- 4.7.2 Format of LSAs -- 4.7.3 Dissemination of LSAs -- .7.4 Adjacency Establishment -- 4.8 Recent development in ICN Routing -- 4.9 Open Research in ICN routing -- 4.10 Summary -- Caching mechanisms for faster content retrieval. - 5.1 Introduction -- 5.1.1 General overview of network caching -- 5.2 Research challenges and issues in ICN caching -- 5.2.1 Unique naming of content and caches -- 5.2.2 Popularity of data -- 5.2.3 Limited storage space in caching devices -- 5.2.4 Storage location -- .2.5 Staleness or freshness detection of content -- 5.2.6 Repeated caching of same Content -- 5.2.7 Content Mobility -- 5.2.8 New research challenges for ICN caching -- 5.3 Recent trends in Caching -- 5.3.1 In-Network caching -- 5.3.2 Edge Caching -- 5.3.3 SDN based Caching -- 5.4 Performance metrics along with objectives in terms of caching mechanisms for ICN -- 5.4.1 Cache hit ratio and server load -- 5.4.2 Content retrieval latency -- 5.4.3 Retransmission ratio for interest packets -- 5.4.4 Total cache evictions -- 5.4.5 Diversity Metric -- 5.4.6 Cache retention ratio -- 5.5 Analysis of various caching methods -- 5.6 Open research in ICN caching -- 5.7 Summary -- 6 Security in ICN -- 6.1 Introduction 6.2 Importance of Security in ICN 6.3 Key Security & privacy concerns in ICN architectures 6.4 Attacks in ICN 6.4.1 Naming related attacks -- 6.4.2 Routing related attacks. 6.4.3 Caching related attacks. 6.4.4 Content poisoning attack -- 6.4.5 Miscellaneous attacks -- 6.5 ICN attributes leading to security threats -- 6.6 Security mechanisms adopted in ICN -- 6.6.1 Countermeasures for naming attacks -- 6.6.2 Countermeasures for routing attacks -- 6.6.3 Countermeasures for caching attacks -- 6.6.4 Countermeasures for content poisoning attacks -- 6.6.5 Countermeasures for miscellaneous attacks -- 6.7 Open research in ICN security -- 6.8 Conclusion -- 7. Optimization in ICN -- 7.1 Introduction -- 7.2 The need of optimization in ICN -- 7.3 Approaches for optimization in ICN -- 7.4 Machine learning for optimization in ICN -- 7.4.1 Application of ML in Communication Networks -- 7.4.2 Application of ML in Information Centric Networks -- 7.5 Open research directions for optimization in ICN -- 7.6 Conclusion -- 8. A framework for integrating SDN in ICN -- 8.1 Introduction -- 8.2 State of the art work in SDN based ICN -- 8.3 The SDN architecture for ICN -- 8.3.1 Based on OpenFlow over CONET -- 8.4 Proposed architecture -- 8.4.1 Functional description -- 8.4.2 Routing in the proposed model -- 8.4.3 Caching in the proposed model -- 8.5 Analysis of the proposed architecture -- 8.6 Future research direction in SDN enable ICN -- 8.7 Summary -- Integrating content communication into real life applications -- 9.1 Introduction -- 9.2 Recent trends in ICN applications -- 9.3 Information centric networks in Internet of things -- 9.3.1 Adaptation of information centric networks for internet of things (IoT) : Challenges and opportunities -- 9.4 Information centric networks in smart grid -- 9.5 Information centric networks in wireless sensor networks -- 9.6 Information centric networks in mobile adhoc networks -- 9.7 Information centric networks in vehicular adhoc networks -- 9.8 Open research in the field of content centric real life applications -- 9.9 Summary. .
|
주제 |
Computer engineering.
Computer networks .
Computer networks—Security measures.
Telecommunication.
Computer Engineering and Networks.
Mobile and Network Security.
Communications Engineering, Networks.
|
보유판 및 특별호 저록 |
Springer Nature eBook
Printed edition: 9783030467357
Printed edition: 9783030467371
Printed edition: 9783030467388
|
ISBN |
9783030467364 |
기타 표준번호 |
10.1007/978-3-030-46736-4 |
QR CODE |
|