Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet

2013 ◽  
Vol 57 (10) ◽  
pp. 2280-2300 ◽  
Author(s):  
Pedro Martinez-Julia ◽  
Antonio F. Skarmeta
Author(s):  
Bhushana Samyuel Neelam ◽  
Benjamin A Shimray

: The ever-increasing dependency of the utilities on networking brought several cyber vulnerabilities and burdened them with dynamic networking demands like QoS, multihoming, and mobility. As the existing network was designed without security in context, it poses several limitations in mitigating the unwanted cyber threats and struggling to provide an integrated solution for the novel networking demands. These limitations resulted in the design and deployment of various add-on protocols that made the existing network architecture a patchy and complex network. The proposed work introduces one of the future internet architectures, which seem to provide abilities to mitigate the above limitations. Recursive internetworking architecture (RINA) is one of the future internets and appears to be a reliable solution with its promising design features. RINA extended inter-process communication to distributed inter-process communication and combined it with recursion. RINA offered unique inbuilt security and the ability to meet novel networking demands with its design. It has also provided integration methods to make use of the existing network infrastructure. The present work reviews the unique architecture, abilities, and adaptability of RINA based on various research works of RINA. The contribution of this article is to expose the potential of RINA in achieving efficient networking solutions among academia and industry.


Author(s):  
Maudlyn I. Victor- Ikoh ◽  
Ledisi G. Kabari

The original internet design principle was guided by the end-to-end principle in the early 1980s and formed the foundation for the existing internet architectural model. The priorities of the original internet designers do not match the needs of today actual users; rise in new players, demanding applications, erosion of trust and rights and responsibilities is pushing the internet to a new dimension. This paper presents the goals and principles behind the design of the original internet architecture, the resulting issues and limitations of the existing network architecture and the approaches that is driving the future internet architecture.


2012 ◽  
Vol 50 (7) ◽  
pp. 168-176 ◽  
Author(s):  
F. D. Cardoso ◽  
L. M. Correia ◽  
P. Mannersalo ◽  
T. Frantti ◽  
A. Serrador ◽  
...  

Author(s):  
Daphna Oyserman

Everyone can imagine their future self, even very young children, and this future self is usually positive and education-linked. To make progress toward an aspired future or away from a feared future requires people to plan and take action. Unfortunately, most people often start too late and commit minimal effort to ineffective strategies that lead their attention elsewhere. As a result, their high hopes and earnest resolutions often fall short. In Pathways to Success Through Identity-Based Motivation Daphna Oyserman focuses on situational constraints and affordances that trigger or impede taking action. Focusing on when the future-self matters and how to reduce the shortfall between the self that one aspires to become and the outcomes that one actually attains, Oyserman introduces the reader to the core theoretical framework of identity-based motivation (IBM) theory. IBM theory is the prediction that people prefer to act in identity-congruent ways but that the identity-to-behavior link is opaque for a number of reasons (the future feels far away, difficulty of working on goals is misinterpreted, and strategies for attaining goals do not feel identity-congruent). Oyserman's book goes on to also include the stakes and how the importance of education comes into play as it improves the lives of the individual, their family, and their society. The framework of IBM theory and how to achieve it is broken down into three parts: how to translate identity-based motivation into a practical intervention, an outline of the intervention, and empirical evidence that it works. In addition, the book also includes an implementation manual and fidelity measures for educators utilizing this book to intervene for the improvement of academic outcomes.


Sign in / Sign up

Export Citation Format

Share Document