Information-Centric Networking

Author(s):  
Mohamed Fazil Mohamed Firdhous

Information-centric networking is an emerging networking paradigm that envisages to solve the shortcomings of the host-centric internet. The usage of internet has moved away from the initial host-centric remote access one to predominantly an information serving one. In the new paradigm, information rather than the host takes the central place in serving the users. Hence, the users will search for information and download it from the nearest device holding it. In order to serve the customers better while optimizing the use of network resources, in-network caching is enabled in ICN. In ICN, the intermediate routers will serve as cache repositories in addition to acting as data forwarding devices. There are several ICN architectures proposed in the literature, each having its own merits and demerits. This chapter has taken an in-depth look at the design principles of ICN along with future open research areas that need the immediate attention of the researchers.

Author(s):  
Mohamed Fazil Mohamed Firdhous

Information centric networking is an emerging networking paradigm that envisages to solve the shortcomings of the host centric Internet. The usage of Internet has moved away from the initial host centric remote access one to predominantly an information serving one. In the new paradigm, information rather than the host takes the central place in serving the users. Hence the users will search for information and download it from the nearest device holding it. In order to serve the customers better while optimizing the use of network resources, in-network caching is enabled in ICN. In ICN, the intermediate routers will serve as cache repositories in addition to acting as data forwarding devices. There are several ICN architectures proposed in the literature each having its own merits and demerits. This chapter has taken an in depth look at the design principles of ICN along with a future open research areas that need the immediate attention of the researchers.


2021 ◽  
Vol 27 (1) ◽  
Author(s):  
Alex McKeown ◽  
Miranda Mourby ◽  
Paul Harrison ◽  
Sophie Walker ◽  
Mark Sheehan ◽  
...  

AbstractData platforms represent a new paradigm for carrying out health research. In the platform model, datasets are pooled for remote access and analysis, so novel insights for developing better stratified and/or personalised medicine approaches can be derived from their integration. If the integration of diverse datasets enables development of more accurate risk indicators, prognostic factors, or better treatments and interventions, this obviates the need for the sharing and reuse of data; and a platform-based approach is an appropriate model for facilitating this. Platform-based approaches thus require new thinking about consent. Here we defend an approach to meeting this challenge within the data platform model, grounded in: the notion of ‘reasonable expectations’ for the reuse of data; Waldron’s account of ‘integrity’ as a heuristic for managing disagreement about the ethical permissibility of the approach; and the element of the social contract that emphasises the importance of public engagement in embedding new norms of research consistent with changing technological realities. While a social contract approach may sound appealing, however, it is incoherent in the context at hand. We defend a way forward guided by that part of the social contract which requires public approval for the proposal and argue that we have moral reasons to endorse a wider presumption of data reuse. However, we show that the relationship in question is not recognisably contractual and that the social contract approach is therefore misleading in this context. We conclude stating four requirements on which the legitimacy of our proposal rests.


Author(s):  
Sobana Sikkanan ◽  
Kasthuri M.

The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.


10.29007/4b7h ◽  
2018 ◽  
Author(s):  
Maria Paola Bonacina

Reasoning and learning have been considered fundamental features of intelligence ever since the dawn of the field of artificial intelligence, leading to the development of the research areas of automated reasoning and machine learning. This short paper is a non-technical position statement that aims at prompting a discussion of the relationship between automated reasoning and machine learning, and more generally between automated reasoning and artificial intelligence. We suggest that the emergence of the new paradigm of XAI, that stands for eXplainable Artificial Intelligence, is an opportunity for rethinking these relationships, and that XAI may offer a grand challenge for future research on automated reasoning.


Author(s):  
Muhammad Zahier Nasrudin ◽  
Ruhaila Maskat ◽  
Ramli Musa

<p>Depression, anxiety and stress are not trivial conditions applicable for only the weak-hearted. They can be inflicted by anyone of all age groups, gender, race and social status. While some are courageous to acknowledge their condition, others shy away in shame or denial. In this paper, we proposed a “proactive” approach to detecting candidates of depression, anxiety and stress in an unobtrusive manner by tapping into what Malaysians tweet in Malay language. From this preliminary study, we constructed 165 Malay layman terms which describe depression, anxiety or stress as identified in M-DASS-42 scale. Since Twitter is an informal platform, construction of Malay layman terms is an essential step to the detection of candidates. Our study on 1,789 Malay tweets discovered 6 Twitter users as potential candidates, having high frequency of tweets with any of the layman terms. We can conclude that using tweets can be useful in unobtrusively detecting candidates of depression, anxiety or stress. This paper also identifies open research areas.</p>


Author(s):  
Sobana Sikkanan ◽  
Kasthuri M.

The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.


Author(s):  
Radi Petrov Romansky

Globalization is an important characteristic of the digital age which is based on the informatization of the society as a social-economical and science-technical process for changing the information environment while keeping the rights of citizens and organizations. The key features of the digital age are knowledge orientation, digital representation, virtual and innovative nature, integration and inter-network interactions, remote access to the information resources, economic and social cohesion, dynamic development, etc. The graph theory is a suitable apparatus for discrete presentation, formalization, and model investigation of the processes in the modern society because each state of a process could be presented as a node in a discrete graph with connections to other states. The chapter discusses application of the graph theory for a discrete formalization of the communication infrastructure and processes for remote access to information and network resources. An extension of the graph theory like apparatus of Petri nets is discussed and some examples for objects investigation are presented.


Author(s):  
Rupananda Misra ◽  
Barbara C. Wallace

The tremendous growth in the use of Web 2.0 technologies, interactive computer technologies, electronic records, and mobile devices for delivery of e-health necessitates attention to design. Designing e-health requires consideration of research, including best practices embodied in design principles. This chapter reviews key background information, including central definitions, concepts, and research, followed by a presentation of 9 key considerations that are recommended for guiding the design of e-health messages. An illustrative case example demonstrates how a typology that codifies design principles gave rise to a research tool that permits the evaluation of health care websites. The case example underscores the important role of findings from research evaluations in creating a feedback loop for designers, permitting research to inform refinements in design. Overall, the 9 key considerations suggest a new paradigm for design, while also giving rise to corresponding recommendations for future research to support evolution in the field of e-health.


2014 ◽  
Vol 599-601 ◽  
pp. 1868-1870
Author(s):  
Wen Jin Xu

With the rapid development of industrial automation and increasing levels of Internet, remote access for industrial field is more and more to show its importance. However, how to develop a security in the existing network resources, reliable remote sites for industrial scene have many problems to be solved. In this paper, the example of the use of an industrial site is built for an Internet-based remote control network, the overall framework is highlighted, and the databases and websites are discussed in detail. So the conclusion of how to build complex industrial website is drawn.


Sign in / Sign up

Export Citation Format

Share Document