Design Innovation and Network Architecture for the Future Internet - Advances in Web Technologies and Engineering
Latest Publications


TOTAL DOCUMENTS

14
(FIVE YEARS 14)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799876465, 9781799876472

Author(s):  
Richard Li ◽  
Uma S. Chunduri ◽  
Alexander Clemm ◽  
Lijun Dong

Industrial machine-type communications (e.g., industrial internet), emerging applications such as holographic type communications, IP mobile backhaul transport for 5G/B5G (beyond 5G) for ultra-reliable low latency communications and massive machine-type communications, emerging industry verticals such as driverless vehicles, and future networking use cases as called out by ITU-T's focus group on network 2030 all require new networking capabilities and services. This chapter introduces “New IP,” a new data communication protocol that extends packet networking with new capabilities to support future applications that go beyond the capabilities that are provided by internetworking protocol (IP) today. New IP is designed to allow the user to specify requirements, such as expectations for key performance indicators' (KPIs) service levels, and other guidance for packet processing and forwarding purposes. New IP is designed to interoperate with existing networks in a straightforward manner and thus to facilitate its incremental deployment that leverages existing investment.



Author(s):  
Eric Debeau ◽  
Veronica Quintuna-Rodriguez

The ever-increasing complexity of networks and services advocates for the introduction of automation techniques to facilitate the design, the delivery, and the operation of such networks and services. The emergence of both network function virtualization (NFV) and software-defined networks (SDN) enable network flexibility and adaptability which open the door to on-demand services requiring automation. In aim of holding the increasing number of customized services and the evolved capabilities of public networks, the open network automation platform (ONAP), which is in open source, particularly addresses automation techniques while enabling dynamic orchestration, optimal resource allocation capabilities, and end-to-end service lifecycle management. This chapter addresses the key ONAP features that can be used by industrials and operators to automatically manage and orchestrate a wide set of services ranging from elementary network functions (e.g., firewalls) to more complex services (e.g., 5G network slices).



Author(s):  
Yannick Le Louédec ◽  
Gaëlle Yven ◽  
Valéry Bastide ◽  
Yiping Chen ◽  
Gwenaëlle Delsart ◽  
...  

This chapter provides an overview on the recent advances and perspectives on content delivery networks (CDNs). After a reminder on the definition and core features of CDNs, the first section highlights their importance with quantitative illustrations. The second section identifies the various types of CDNs which have been deployed to address different markets. The growth of the CDNs has been driven primarily by video streaming. Next to media content, CDNs have evolved to deliver always more demanding social networks and applications. Security solutions are now fully integrated into CDNs and marketed as flagship products. The third, fourth, and fifth sections outline the challenges and technical evolutions of the CDNs to keep up with their customers' hunger for media content, web performance, and security. The sixth section focuses on the convergence of CDNs and clouds. The seventh section reviews the status and perspectives of different approaches for using multiple CDNs. The last section presents the current positioning and future perspectives of the CDNs in the mobile domain.



Author(s):  
Marc Lacoste ◽  
David Armand ◽  
Fanny Parzysz ◽  
Loïc Ferreira ◽  
Ghada Arfaoui ◽  
...  

This chapter explores the security challenges of the drone ecosystem. Drones raise significant security and safety concerns, both design-time and run-time (e.g., supply-chain, technical design, standardization). Two broad classes of threats are considered, on drones and using drones (e.g., to attack critical infrastructures or vehicles). They involve both professional and non-professional drones and lead to various types of attacks (e.g., IoT-type vulnerabilities, GPS spoofing, spying, kinetic attacks). Trade-offs involving hardware and software solutions to meet efficiency, resource limitations, and real-time constraints are notably hard to find. So far, protection solutions remain elementary compared to the impact of attacks. Advances in technologies, new use cases (e.g., enhancing network connectivity), and a regulatory framework to overcome existing barriers are decisive factors for sustainable drone security market growth.



Author(s):  
Samier Said Barguil ◽  
Oscar Gonzalez de Dios ◽  
Victor Lopez ◽  
Kellow Pardini ◽  
Ricard Vilalta

Internet service providers are shifting to an open, modern, software-based architecture that enables both new operating and business models. The target architecture is loosely coupled, cloud-native, data and artificial intelligence-driven, and relies on traffic engineering-related protocols to get the full potential of the network capabilities. The components need to use standard interfaces to be easily procured and deployed without the need for customization. Achieving these goals will require a significant change in how the network resources are architected, built, procured, licensed, and maintained. Some levers to drive this transformation rely on adopting open protocols such as NETCONF/RESTCONF or gNMI to operate the network and use standard data models to interact with the network more programmatically. This chapter presents such architecture, including service provider experiences.



Author(s):  
Joël Penhoat ◽  
Mikko Samuli Vaija ◽  
Dinh-Thuy Phan-Huy ◽  
Guillaume Gérard ◽  
Zakaria Ournani ◽  
...  

The Intergovernmental Panel on Climate Change claims that global warming can be avoided by “reaching net zero carbon dioxide emissions globally around 2050 and concurrent deep reductions in emissions of non-carbon dioxide forcers, particularly methane.” To protect the planet and guarantee prosperity for all, The United Nations has set up a sustainable development program made up of 17 goals. Among them, Goal 12 establishes sustainable consumption and production patterns so that a social and economic growth does not increase the pressure on Earth's resources, and Goal 13 constrains global warming. This chapter explores some actions the telecommunication companies have implemented: assessing the issues of mineral resources on network equipment, improving data centre energy consumption, reducing the average electricity intensity of the transmitting data, contributing to the energy transition.



Author(s):  
Jorge Proença ◽  
Tiago Cruz ◽  
Paulo Simões ◽  
Edmundo Monteiro

A diversity of technical advances in the field of network and systems virtualization have made it possible to consolidate and manage resources in an unprecedented scale. These advances have started to come out of the data centers, spreading towards the network service provider (NSP) and telecommunications operator infrastructure foundations, from the core to the edge networks, the access network, and the customer premises LAN (local area network). In this context, the residential gateway (RGW) constitutes an ideal candidate for virtualization, as it stands between the home LAN and the access network, imposing a considerable cost for the NSP while constituting a single point of failure for all the services offered to residential customers. This chapter presents the rationale for the virtual RGW (vRGW) concept, providing an overview of past and current implementation proposals and discussing how recent technological developments in key areas such as networking and virtualization have given a competitive edge to a RGW virtualization scenario, when compared with traditional deployments.



Author(s):  
Tirumaleswar Reddy Konda

Application-aware networking (AAN) is a framework in which applications can discover services offered by a network and explicitly signal their flow characteristics and requirements to the network. Such framework provides network nodes with knowledge of the application flow characteristics, which enables them to apply the correct flow treatment (e.g., bind the flow to a network slice, bind the flow to a service function chaining, set appropriate quality of service marking, invoke policing and shaping rules) and provide feedback to applications accordingly. This chapter describes how an application enabled collaborative networking framework contributes to solve the encountered problems. The chapter also describes recent proposals such as the PAN (path-aware networking) framework discussed within the IRTF and the APN (application-aware networking) framework that is meant to convey application identification and its network performance in-band.



Author(s):  
Rinki Sharma

Vehicular communication is going to play a significant role in the future intelligent transportation systems (ITS). Due to the highly dynamic nature of vehicular networks (VNs) and need for efficient real-time communication, the traditional networking paradigm is not suitable for VNs. Incorporating the SDN technology in VNs provides benefits in network programmability, heterogeneity, connectivity, resource utility, safety and security, routing, and traffic management. However, there are still several challenges and open research issues due to network dynamicity, scalability, heterogeneity, interference, latency, and security that need to be addressed. This chapter presents the importance of vehicular communication in future ITS, the significance of incorporating the SDN paradigm in VNs, taxonomy for the role of SDVN, the software-defined vehicular network (SDVN) architecture, and open research issues in SDVN.



Author(s):  
Mohamed Boucadair ◽  
Christian Jacquenet

Security has always been a major concern of network operators. Despite a pretty rich security toolbox that never ceased to improve over the years (filters, traffic wells, encryption techniques, and intrusion detection systems to name a few), attacks keep on increasing from both a numerical and amplitude standpoints. Such protean attacks demand an adapted security toolkit that should include techniques capable of not only detecting these attacks but also anticipating them even before they reach their target. Strengthening future networking infrastructures so that they become protective, instead of being “just” protected must thus become one of the key strategic objectives of network operators and service providers who ambition to rely upon robust, dynamic, security policy enforcement schemes to develop their business while retaining their existing customers. This chapter discusses the various security challenges that may be further exacerbated by future networking infrastructures. It also presents some of the techniques that are very likely to become cornerstones of protective networking.



Sign in / Sign up

Export Citation Format

Share Document