NETWORK GATEWAY FOR NAMED DATA NETWORKS

Author(s):  
М.А. БЛИННИКОВ ◽  
Р.Я. ПИРМАГОМЕДОВ

Приведен краткий обзор передачи пакетов в сетях именованных данных (Named Data Networking - NDN). Проанализирован механизм и разработана модель распространения данных в сетях NDN, основанная на зависимости вероятности присутствия данных на узле от их популярности, интенсивности передачи трафика в сети, размера Content Store и плотности рассматриваемого участка сети. Выполнен анализ особенностей будущего развития сетей именованных данных и необходимости создания шлюза между устройствами, работающими в соответствии с двумя разными сетевыми архитектурами. Предложен алгоритм работы шлюза IP/NDN, обеспечивающего совместную работоспособность элементов двух сетевых архитектур. A brief overview of packet transmission in named data networks (NDN) is given. A model of data distribution in NDN networks has been developed. Itis based on the dependence of theprobability of the presence of certain data at a node on their popularity, traffic transmission intensity in the network, the size of the Content Store, and the density of the network segment under consideration. It has been performed the analysis of the features of the future development of named data networks and the need to create a gateway between devices operating in accordance with two different network architectures. The algorithm of IP/NDN gateway operation is proposed, which ensures the joint operability of the elements of two network architectures.

Author(s):  
Linjun Yu ◽  
Huali Ai ◽  
Dong-Oun Choi

Named data networking (NDN) is a typical representation and implementation of information-centric networking and serves as a basis for the next-generation Internet. However, any network architectures will face information security threats. An attack named interest flooding attack (IFA), which is evolved, has becomes a great threat for NDN in recent years. Attackers through insert numerous forged interest packets into an NDN network, making the cache memory of NDN router(s) overrun, interest packets for the intended users. To take a comprehensive understanding of recent IFA detection and mitigation approaches, in this paper, we compared nine typical approaches to resolving IFA attacks for NDN, which are interest traceback, token bucket with per interface fairness, satisfaction-based interest acceptance, satisfaction-based push back, disabling PIT exhaustion, interest flow control method based on user reputation and content name prefixes, interest flow balancing method focused on the number of requests on named data networking, cryptographic route token, Poseidon local, and Poseidon distributed techniques. In addition, we conducted a simulation using Poseidon, a commonly used IFA resolution approach. The results showed that Poseidon could resolve IFA issues effectively.


2019 ◽  
Vol 26 (1) ◽  
pp. 36-39
Author(s):  
Zhiyi Zhang ◽  
Edward Lu ◽  
Yu Guan ◽  
Tianxiang Li ◽  
Xinyu Ma ◽  
...  

2018 ◽  
Vol 14 (2) ◽  
pp. 86-112 ◽  
Author(s):  
Maroua Meddeb ◽  
Amine Dhraief ◽  
Abdelfettah Belghith ◽  
Thierry Monteil ◽  
Khalil Drira ◽  
...  

This article describes how the named data networking (NDN) has recently received a lot of attention as a potential information-centric networking (ICN) architecture for the future Internet. The NDN paradigm has a great potential to efficiently address and solve the current seminal IP-based IoT architecture issues and requirements. NDN can be used with different sets of caching algorithms and caching replacement policies. The authors investigate the most suitable combination of these two features to be implemented in an IoT environment. For this purpose, the authors first reviewed the current research and development progress in ICN, then they conduct a qualitative comparative study of the relevant ICN proposals and discuss the suitability of the NDN as a promising architecture for IoT. Finally, they evaluate the performance of NDN in an IoT environment with different caching algorithms and replacement policies. The obtained results show that the consumer-cache caching algorithm used with the Random Replacement (RR) policy significantly improve NDN content validity in an IoT environment.


2021 ◽  
Vol 30 (1) ◽  
pp. 126-149
Author(s):  
Britt S Paris

This article engages the politics of technology as it examines how a discourse of time is framed by engineers and project principals in the course of the development of three future internet architecture projects: named data networking, eXpressive Internet Architecture, and Mobility First. This framing reveals categories of a discourse of time that include articulations of efficiency, speed, time as a technical resource, and notions of the future manifest in each project. The discursive categories fit into a time constructs model that exposes how these projects were built with regard to concepts of speed and how different notions of time are expressed as a design ideology intertwined with other ideologies. This time constructs framework represents a tool that can be used to expose the social and political values of technological development that are often hidden or are difficult to communicate in cross-disciplinary contexts.


2014 ◽  
pp. 889-915
Author(s):  
Anna Abakunkova

The article examines the state of the Holocaust historiography in Ukraine for the period of 2010 – beginning of 2014. The review analyzes activities of major research and educational organizations in Ukraine which have significant part of projects devoted to the Holocaust; main publications and discussions on the Holocaust in Ukraine, including publications of Ukrainian authors in academic European and American journals. The article illustrates contemporary tendencies and conditions of the Holocaust Studies in Ukraine, defines major problems and shows perspectives of the future development of the Holocaust historiography in Ukraine.


1997 ◽  
Vol 1 (2) ◽  
pp. 200-226 ◽  
Author(s):  
Hector L MacQueen

This paper,first presented on 21 October 1995 at ajoint seminar ofthe Scottish Law Commission and the Faculty of Law, University of Edinburgh, on the subject of breach of contract, considers the future development of the law in this area, first by considering its history and current state in comparative terms and drawing the conclusion that it is characterised by a mixture of Civilian and Common Law elements; second, by comparing Scots law with the provisions on breach contained in recently published proposals for a harmonised law of contract (the UNIDROIT Principles of International Commercial Contracts, the Principles of European Contract Law prepared by the Lando Commission, and the draft “code”for the United Kingdom prepared on behalf of the English Law Commission by Harvey McGregor in the late 1960s) and in international conventions on the sale of goods. Although Scots law emerges reasonably wellfrom this exercise, there are a number of points to be taken on board in any future reform, as well as some insights into important underlying principles.


2018 ◽  
Vol 16 (5) ◽  
pp. 83-90 ◽  
Author(s):  
Hee-Joong Hwang ◽  
Jung Wan Lee ◽  
Dong-Ho Kim ◽  
Jong-Ho Lee ◽  
Byung-Goo Kim ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document