scholarly journals SIMULASI NDN MENGGUNAKAN NDNSIM PADA JARINGAN INTRANET KAMPUS TEKNOLOGI INFORMASI FAKULTAS TEKNIK UNIVERSITAS UDAYANA

2019 ◽  
Vol 2 (2) ◽  
pp. 136-140
Author(s):  
I Putu Agus Eka Pratama ◽  
Mohammad Ernico Suryo Wicaksono

NDN (Named Data Networking) is one of today's internet technologies with identifier of the packet is given in the form of a content name, not a source or destination address. Such properties make NDN have a new forwarding mechanism and different from host to host (IP-based) network architecture. Utilization of this new technology is usually incomplete or there is a need for simulations for initial testing and testing. This paper will discuss about NDN simulation. The simulation will be done using ndnSIM, an open source simulator and testing was performed at Information Technology Campus, Faculty of Engineering, Udayana University’s intranet.

2019 ◽  
Vol 11 (6) ◽  
pp. 139 ◽  
Author(s):  
Meng Kuai ◽  
Xiaoyan Hong

The emerging connected and autonomous vehicles (CAVs) challenge ad hoc wireless multi-hop communications by mobility, large-scale, new data acquisition and computing patterns. The Named Data Networking (NDN) is suitable for such vehicle ad hoc networks due to its information centric networking approach. However, flooding interest packets in ad-hoc NDN can lead to broadcast storm issue. Existing solutions will either increase the number of redundant interest packets or need a global knowledge about data producers. In this paper, a Location-Based Deferred Broadcast (LBDB) scheme is introduced to improve the efficiency and performance of interest broadcast in ad-hoc NDN. The scheme takes advantage of location information to set up timers when rebroadcasting an interest. The LBDB is implemented in V-NDN network architecture using ndnSIM simulator. Comparisons with several existing protocols are conducted in simulation. The results show that LBDB improves the overhead, the average number of hops and delay while maintaining an average satisfaction ratio when compared with several other broadcast schemes. The improvement can help offer timely data acquisition for quick responses in emergent CAV application situations.


2015 ◽  
Vol 72 (5) ◽  
Author(s):  
Suhaidi Hassan ◽  
Walid Elbreiki ◽  
Mohamed Firdhous ◽  
Adib M. Monzer Habbal

Named data networking or information centric networking is the newest networking paradigm that gives foremost place to the contents in identification and dissemination. On the other hand, the end to end networking paradigm on which the Internet is currently built on places heavy emphasis on devices that make the architecture. The current Internet suffers from many shortcomings due to the misplaced emphasis. In order to overcome some of these deficiencies, researchers and developers have come up with patches and work around that have made the Internet more complex than it ought to be. Named data networking is a clean slate approach in building a network architecture overcoming all the current deficiencies and make it future safe. Several researchers have carried out comparative studies between named data networking and end to end networking. But these studies concentrate only on the features and capabilities of the networking paradigms. This is the first attempt at quantifying the performance the networking architectures experimentally. The authors in this paper present the results of the comparative study carried out experimentally in a simulated environment based on the final throughput. The results have been presented in a graphical form for easy visualization of results.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Sanguk Ryu ◽  
Inwhee Joe ◽  
WonTae Kim

Named data networking (NDN) is a future network architecture that replaces IP-oriented communication with content-oriented communication and has new features such as cache, multiple paths, and multiple sources. Services such as video streaming, to which NDN can be applied in the future, can cause congestion if data is concentrated on one of the nodes during high demand. To solve this problem, sending rate control methods such as TCP congestion control have been proposed, but they do not adequately reflect the characteristics of NDN. Therefore, we use reinforcement learning and deep learning to propose a congestion control method that takes advantage of multipath features. The intelligent forwarding strategy for congestion control using Q-learning and long short-term memory in NDN proposed in this paper is divided into two phases. The first phase uses an LSTM model to train a pending interest table (PIT) entry rate that can be used as an indicator to detect congestion by knowing the amount of data returned. In the second phase, it is forwarded to an alternative path that is not congestive via Q-learning based on the PIT entry rate predicted by the trained LSTM model. The simulation results show that the proposed method increases the data reception rate by 6.5% and 19.5% and decreases the packet drop rate by 7.3% and 17.2% compared to an adaptive SRTT-based forwarding strategy (ASF) and BestRoute.


2021 ◽  
Vol 14 (1) ◽  
pp. 103-112
Author(s):  
Ramachandira Buvanesvari ◽  
◽  
Kanagaraj Joseph ◽  

Named Data Networking (NDN) is a developing Internet design that utilizes a new network communication model dependent on the identity of Internet content. Its core component, the Pending Interest Table (PIT) serves an important role of recording Interest packet information. In managing PIT, the issue of flow PIT measuring has been very challenging because of the huge use of long Interest lifetime especially when there is no adaptable replacement strategy, subsequently affecting PIT performance. Named Data Networking (NDN) might experience some emerging threats such as Interest Flooding Attacks (IFA). In this paper, we focus on the IFA that can seriously devour the memory resource for the Pending Interest Table (PIT) of each included NDN router by flooding a huge amount of malicious Interests with spoofed names. To extricate the pressure of PIT attacked by IFA, we propose a methodology of efficient Secured PIT management and attack detection strategy by using a cuckoo search optimization algorithmDeep convolutional neural network (CSOA-DCNN) algorithm in Named Data Network. The CSO algorithm initially utilizes a learning technique and afterward considers improved search operators and deep convolutional neural network architecture (DCNN) for classification. The network simulation tool is utilized to design and calculate PIT management. The results of the study on a 20 Gbps gateway trace shows that the corresponding PIT contains 1.5 M entries, and the lookup, insert and delete frequencies are 1.4 M/s, 0.9 M/s and 0.9 M/s. The contribution of this study is significant for Interest packet management in NDN routing and forwarding systems.


2017 ◽  
Vol 4 (1) ◽  
pp. 117-126
Author(s):  
Tine Sopaheluwakan ◽  
Mohammad A. Amin Soetomo

Information Technology as a new Technology has been used in businesses from small company until multinational company in almost all industries. IT role as an enabler and differentiation factor separating success company from average company. IT need people to build, operate, maintain and support the systems, hence expect the new hire to immediately contribute from the first day they join the company. The industry define the needs for Information Technology competence and expect Education Institution as one of IT resource work hard to design their program study to fulfill the needs for Information Technology graduates, yet the industry still struggle to succeed in hiring fresh graduate to fill the IT position. Information Technology Training Institution can be an alternative to improve the education result. Also certification on Information Technology competence from third party or independent body might be used as a standard for both Industry and Education. This paper will report literature review several previous paper about all of the above.


Sign in / Sign up

Export Citation Format

Share Document