語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information Centric Networks (ICN) =...
~
Ghinea, Gheorghita.
Information Centric Networks (ICN) = Architecture & Current Trends /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information Centric Networks (ICN)/ by Nitul Dutta, Hiren Kumar Deva Sarma, Rajendrasinh Jadeja, Krishna Delvadia, Gheorghita Ghinea.
其他題名:
Architecture & Current Trends /
作者:
Dutta, Nitul.
其他作者:
Ghinea, Gheorghita.
面頁冊數:
VII, 194 p. 39 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Communications Engineering, Networks. -
電子資源:
https://doi.org/10.1007/978-3-030-46736-4
ISBN:
9783030467364
Information Centric Networks (ICN) = Architecture & Current Trends /
Dutta, Nitul.
Information Centric Networks (ICN)
Architecture & Current Trends /[electronic resource] :by Nitul Dutta, Hiren Kumar Deva Sarma, Rajendrasinh Jadeja, Krishna Delvadia, Gheorghita Ghinea. - 1st ed. 2021. - VII, 194 p. 39 illus.online resource. - Practical Networking,2662-1711. - Practical Networking,.
1. Introduction to information centric networks -- 1.1 Introduction -- 1.2 Internet Architecture: Strengths and Limitations -- 1.2.1 Content distribution networks -- 1.3 Content Distribution Network Architecture -- 1.4 Characteristics of ICN, Design Principles, and Assumptions -- 1.4.1 Characteristics of ICN -- 1.4.2 Design Principles -- 1.4.3 Assumptions.-1.5 Key Building Blocks of ICN and Design Challenges -- 1.5.1 Key Building Block of ICN -- 1.5.2 Design Challenges..-1.6 Benefits of using ICN -- 1.7 Historical note on ICN -- Architectures for content communication -- 2.1 Introduction.-2.2 Representative ICN Architectures -- 2.2.1 TRIAD Architecture -- 2.2.2 DONA Architecture -- 2.2.3 Content Centric Network (CCN) Architecture -- 2.2.4 PURSUIT Architecture -- 2.2.5 Network Information (NetInf) architecture -- 2.2.6 The NDN architecture -- 2.3 Comparative analysis of ICN Architectures -- 2.4 Software Defined Networking in ICN -- 2.4.1 Scope of integrating SDN into ICN -- 2.4.2 The SDN architecture in general. -- 2.5 Summary -- 3 Naming for unique content identification -- 3.1 Introduction -- 3.2 Naming system design -- 3.3 Importance of naming -- 3.4 key design issues and choices for information/content naming for ICNs -- 3.5 Naming approaches proposed so far -- 3.5.1 CBCB (Combined broadcast and content based routing) -- 3.5.2 DONA (Data oriented network architecture) -- 3.5.3 NetInf (Network of information) -- 3.5.4 NDN (Named data networking) -- 3.5.5 PURSUIT (Publish subscribe Internet technologies) -- 3.5.6 Hierarchical and flat based hybrid naming scheme in CCN IoT -- 3.5.7 Secure naming scheme for Information Centric Networks -- 3.6 Analysis of naming schemes along with their advantages and disadvantages -- 3.6.1 Flat vs. hierarchical vs. attribute value-based naming approaches -- 3.6.2 Name based routing vs. Name resolution.-3.6.3 Incremental vs. Clean slate approach -- 3.7 Need of an efficient content naming mechanism: Our perspective -- 3.8 Open research in ICN Naming -- 3.9 Summary -- 4 Routing schemes used in content delivery -- 4.1 Introduction -- 4.2 Realization of routing in ICN -- 4.3 Realization of Forwarding in ICN -- 4.4. NDN forwarding architecture with illustration -- 4.5. Stateful forwarding paradigm for NDN -- 4.6. OSPFN: An OSPF based routing for NDN -- 4.6.1 Routing in OSPFN -- 4.7 NLSR: A Secure Link State Routing protocol for NDN -- 4.7.1 Naming scheme -- 4.7.2 Format of LSAs -- 4.7.3 Dissemination of LSAs -- .7.4 Adjacency Establishment -- 4.8 Recent development in ICN Routing -- 4.9 Open Research in ICN routing -- 4.10 Summary -- Caching mechanisms for faster content retrieval. - 5.1 Introduction -- 5.1.1 General overview of network caching -- 5.2 Research challenges and issues in ICN caching -- 5.2.1 Unique naming of content and caches -- 5.2.2 Popularity of data -- 5.2.3 Limited storage space in caching devices -- 5.2.4 Storage location -- .2.5 Staleness or freshness detection of content -- 5.2.6 Repeated caching of same Content -- 5.2.7 Content Mobility -- 5.2.8 New research challenges for ICN caching -- 5.3 Recent trends in Caching -- 5.3.1 In-Network caching -- 5.3.2 Edge Caching -- 5.3.3 SDN based Caching -- 5.4 Performance metrics along with objectives in terms of caching mechanisms for ICN -- 5.4.1 Cache hit ratio and server load -- 5.4.2 Content retrieval latency -- 5.4.3 Retransmission ratio for interest packets -- 5.4.4 Total cache evictions -- 5.4.5 Diversity Metric -- 5.4.6 Cache retention ratio -- 5.5 Analysis of various caching methods -- 5.6 Open research in ICN caching -- 5.7 Summary -- 6 Security in ICN -- 6.1 Introduction 6.2 Importance of Security in ICN 6.3 Key Security & privacy concerns in ICN architectures 6.4 Attacks in ICN 6.4.1 Naming related attacks -- 6.4.2 Routing related attacks. 6.4.3 Caching related attacks. 6.4.4 Content poisoning attack -- 6.4.5 Miscellaneous attacks -- 6.5 ICN attributes leading to security threats -- 6.6 Security mechanisms adopted in ICN -- 6.6.1 Countermeasures for naming attacks -- 6.6.2 Countermeasures for routing attacks -- 6.6.3 Countermeasures for caching attacks -- 6.6.4 Countermeasures for content poisoning attacks -- 6.6.5 Countermeasures for miscellaneous attacks -- 6.7 Open research in ICN security -- 6.8 Conclusion -- 7. Optimization in ICN -- 7.1 Introduction -- 7.2 The need of optimization in ICN -- 7.3 Approaches for optimization in ICN -- 7.4 Machine learning for optimization in ICN -- 7.4.1 Application of ML in Communication Networks -- 7.4.2 Application of ML in Information Centric Networks -- 7.5 Open research directions for optimization in ICN -- 7.6 Conclusion -- 8. A framework for integrating SDN in ICN -- 8.1 Introduction -- 8.2 State of the art work in SDN based ICN -- 8.3 The SDN architecture for ICN -- 8.3.1 Based on OpenFlow over CONET -- 8.4 Proposed architecture -- 8.4.1 Functional description -- 8.4.2 Routing in the proposed model -- 8.4.3 Caching in the proposed model -- 8.5 Analysis of the proposed architecture -- 8.6 Future research direction in SDN enable ICN -- 8.7 Summary -- Integrating content communication into real life applications -- 9.1 Introduction -- 9.2 Recent trends in ICN applications -- 9.3 Information centric networks in Internet of things -- 9.3.1 Adaptation of information centric networks for internet of things (IoT) : Challenges and opportunities -- 9.4 Information centric networks in smart grid -- 9.5 Information centric networks in wireless sensor networks -- 9.6 Information centric networks in mobile adhoc networks -- 9.7 Information centric networks in vehicular adhoc networks -- 9.8 Open research in the field of content centric real life applications -- 9.9 Summary. .
This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.
ISBN: 9783030467364
Standard No.: 10.1007/978-3-030-46736-4doiSubjects--Topical Terms:
669809
Communications Engineering, Networks.
LC Class. No.: QA76.9.C643
Dewey Class. No.: 004.6
Information Centric Networks (ICN) = Architecture & Current Trends /
LDR
:09354nam a22004215i 4500
001
1047977
003
DE-He213
005
20210827085204.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030467364
$9
978-3-030-46736-4
024
7
$a
10.1007/978-3-030-46736-4
$2
doi
035
$a
978-3-030-46736-4
050
4
$a
QA76.9.C643
050
4
$a
TK5105.5-5105.9
072
7
$a
UT
$2
bicssc
072
7
$a
COM043000
$2
bisacsh
072
7
$a
UT
$2
thema
082
0 4
$a
004.6
$2
23
100
1
$a
Dutta, Nitul.
$e
editor.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1310785
245
1 0
$a
Information Centric Networks (ICN)
$h
[electronic resource] :
$b
Architecture & Current Trends /
$c
by Nitul Dutta, Hiren Kumar Deva Sarma, Rajendrasinh Jadeja, Krishna Delvadia, Gheorghita Ghinea.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
VII, 194 p. 39 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Practical Networking,
$x
2662-1711
505
0
$a
1. Introduction to information centric networks -- 1.1 Introduction -- 1.2 Internet Architecture: Strengths and Limitations -- 1.2.1 Content distribution networks -- 1.3 Content Distribution Network Architecture -- 1.4 Characteristics of ICN, Design Principles, and Assumptions -- 1.4.1 Characteristics of ICN -- 1.4.2 Design Principles -- 1.4.3 Assumptions.-1.5 Key Building Blocks of ICN and Design Challenges -- 1.5.1 Key Building Block of ICN -- 1.5.2 Design Challenges..-1.6 Benefits of using ICN -- 1.7 Historical note on ICN -- Architectures for content communication -- 2.1 Introduction.-2.2 Representative ICN Architectures -- 2.2.1 TRIAD Architecture -- 2.2.2 DONA Architecture -- 2.2.3 Content Centric Network (CCN) Architecture -- 2.2.4 PURSUIT Architecture -- 2.2.5 Network Information (NetInf) architecture -- 2.2.6 The NDN architecture -- 2.3 Comparative analysis of ICN Architectures -- 2.4 Software Defined Networking in ICN -- 2.4.1 Scope of integrating SDN into ICN -- 2.4.2 The SDN architecture in general. -- 2.5 Summary -- 3 Naming for unique content identification -- 3.1 Introduction -- 3.2 Naming system design -- 3.3 Importance of naming -- 3.4 key design issues and choices for information/content naming for ICNs -- 3.5 Naming approaches proposed so far -- 3.5.1 CBCB (Combined broadcast and content based routing) -- 3.5.2 DONA (Data oriented network architecture) -- 3.5.3 NetInf (Network of information) -- 3.5.4 NDN (Named data networking) -- 3.5.5 PURSUIT (Publish subscribe Internet technologies) -- 3.5.6 Hierarchical and flat based hybrid naming scheme in CCN IoT -- 3.5.7 Secure naming scheme for Information Centric Networks -- 3.6 Analysis of naming schemes along with their advantages and disadvantages -- 3.6.1 Flat vs. hierarchical vs. attribute value-based naming approaches -- 3.6.2 Name based routing vs. Name resolution.-3.6.3 Incremental vs. Clean slate approach -- 3.7 Need of an efficient content naming mechanism: Our perspective -- 3.8 Open research in ICN Naming -- 3.9 Summary -- 4 Routing schemes used in content delivery -- 4.1 Introduction -- 4.2 Realization of routing in ICN -- 4.3 Realization of Forwarding in ICN -- 4.4. NDN forwarding architecture with illustration -- 4.5. Stateful forwarding paradigm for NDN -- 4.6. OSPFN: An OSPF based routing for NDN -- 4.6.1 Routing in OSPFN -- 4.7 NLSR: A Secure Link State Routing protocol for NDN -- 4.7.1 Naming scheme -- 4.7.2 Format of LSAs -- 4.7.3 Dissemination of LSAs -- .7.4 Adjacency Establishment -- 4.8 Recent development in ICN Routing -- 4.9 Open Research in ICN routing -- 4.10 Summary -- Caching mechanisms for faster content retrieval. - 5.1 Introduction -- 5.1.1 General overview of network caching -- 5.2 Research challenges and issues in ICN caching -- 5.2.1 Unique naming of content and caches -- 5.2.2 Popularity of data -- 5.2.3 Limited storage space in caching devices -- 5.2.4 Storage location -- .2.5 Staleness or freshness detection of content -- 5.2.6 Repeated caching of same Content -- 5.2.7 Content Mobility -- 5.2.8 New research challenges for ICN caching -- 5.3 Recent trends in Caching -- 5.3.1 In-Network caching -- 5.3.2 Edge Caching -- 5.3.3 SDN based Caching -- 5.4 Performance metrics along with objectives in terms of caching mechanisms for ICN -- 5.4.1 Cache hit ratio and server load -- 5.4.2 Content retrieval latency -- 5.4.3 Retransmission ratio for interest packets -- 5.4.4 Total cache evictions -- 5.4.5 Diversity Metric -- 5.4.6 Cache retention ratio -- 5.5 Analysis of various caching methods -- 5.6 Open research in ICN caching -- 5.7 Summary -- 6 Security in ICN -- 6.1 Introduction 6.2 Importance of Security in ICN 6.3 Key Security & privacy concerns in ICN architectures 6.4 Attacks in ICN 6.4.1 Naming related attacks -- 6.4.2 Routing related attacks. 6.4.3 Caching related attacks. 6.4.4 Content poisoning attack -- 6.4.5 Miscellaneous attacks -- 6.5 ICN attributes leading to security threats -- 6.6 Security mechanisms adopted in ICN -- 6.6.1 Countermeasures for naming attacks -- 6.6.2 Countermeasures for routing attacks -- 6.6.3 Countermeasures for caching attacks -- 6.6.4 Countermeasures for content poisoning attacks -- 6.6.5 Countermeasures for miscellaneous attacks -- 6.7 Open research in ICN security -- 6.8 Conclusion -- 7. Optimization in ICN -- 7.1 Introduction -- 7.2 The need of optimization in ICN -- 7.3 Approaches for optimization in ICN -- 7.4 Machine learning for optimization in ICN -- 7.4.1 Application of ML in Communication Networks -- 7.4.2 Application of ML in Information Centric Networks -- 7.5 Open research directions for optimization in ICN -- 7.6 Conclusion -- 8. A framework for integrating SDN in ICN -- 8.1 Introduction -- 8.2 State of the art work in SDN based ICN -- 8.3 The SDN architecture for ICN -- 8.3.1 Based on OpenFlow over CONET -- 8.4 Proposed architecture -- 8.4.1 Functional description -- 8.4.2 Routing in the proposed model -- 8.4.3 Caching in the proposed model -- 8.5 Analysis of the proposed architecture -- 8.6 Future research direction in SDN enable ICN -- 8.7 Summary -- Integrating content communication into real life applications -- 9.1 Introduction -- 9.2 Recent trends in ICN applications -- 9.3 Information centric networks in Internet of things -- 9.3.1 Adaptation of information centric networks for internet of things (IoT) : Challenges and opportunities -- 9.4 Information centric networks in smart grid -- 9.5 Information centric networks in wireless sensor networks -- 9.6 Information centric networks in mobile adhoc networks -- 9.7 Information centric networks in vehicular adhoc networks -- 9.8 Open research in the field of content centric real life applications -- 9.9 Summary. .
520
$a
This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.
650
2 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
1 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
0
$a
Electrical engineering.
$3
596380
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer organization.
$3
596298
700
1
$a
Ghinea, Gheorghita.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
560332
700
1
$a
Delvadia, Krishna.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1351747
700
1
$a
Jadeja, Rajendrasinh.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1351746
700
1
$a
Sarma, Hiren Kumar Deva.
$e
editor.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1310784
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030467357
776
0 8
$i
Printed edition:
$z
9783030467371
776
0 8
$i
Printed edition:
$z
9783030467388
830
0
$a
Practical Networking,
$x
2662-1711
$3
1351748
856
4 0
$u
https://doi.org/10.1007/978-3-030-46736-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入