The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Named Data Networking (NDN), a revolution of the IP architecture, provides an information-centric routing for designing the unified Internet of Things (IoT) network protocol. However, the data forwarding scheme exploited by the current NDN generates lots of communication overhead and invalid caching hits, which is not suitable for IoT. This is because there exist large amounts of weak network devices...
Wireless devices have undergone m any enhancements and currently most devices have multitude of radio access technologies such as Wi-Fi and LTE. While this multi-interface capability provides the potential to increase capacity, coverage, reliability and efficiency of wireless communications, cross layer routing among these heterogeneous networks, ensuring appropriate quality of service is a complex...
In the efforts to study the next generation of Internet, several Information Centric Networking (ICN) architectures, such as DONA, TRIAD and NDN, which focus on named data rather than named host, are proposed to facilitate content delivery (the primary usage of today's Internet). In such networks, content may be dynamically cached in routers (i.e., in-network caching) and the same content may appear...
This paper first proposes decentralized content delivery scheme using distributed in-network caching and its performance is compared to that of centralized content delivery scheme. In addition, a persistent request-routing system (RRS) is introduced to redirect all client requests for the same content to a particular content router once the router is chosen from the first request. Therefore, such...
Prior solutions for routing to multi-instantiated destinations (e.g., Internet multicasting and any casting, and routing in information centric networks) simply adapt existing routing algorithms designed for single-instance destinations, or rely on flooding techniques. As a result, they are unnecessarily complex and incur excessive overhead. A new approach for routing to multi-instantiated destinations...
We consider routing between large collections of interconnected networks, referred to as substrate networks, which do not assume permanent connectivity to the Internet, and which support dynamic changes of connectivity due to mobility. Whereas scalable routing schemes, such as compact routing or greedy forwarding, are suitable for very large networks, they generally ignore the routing methods already...
Nowadays, due to the rapid growing popularity of Internet, the global routing system suffers from great scalability problem. Many solutions are proposed to solve the problem, including FIB aggregation, core/edge separation solutions, et al. The limitation of these existing solutions is that they all make the assumption that all addresses in the Internet must be globally visible and these routing information...
A scheme for preserving privacy in MobilityFirst (MF) clean-slate future Internet architecture is proposed in this paper. The proposed scheme, called Anonymity in MobilityFirst (AMF), utilizes the three-tiered approach to effectively exploit the inherent properties of MF Network such as Globally Unique Flat Identifier (GUID) and Global Name Resolution Service (GNRS) to provide anonymity to the users...
As a path vector protocol, Border Gateway Protocol (BGP) messages contain the entire Autonomous System (AS) path to each destination for breaking arbitrary long AS path loops. However, after observing the global routing data from RouteViews, we find that BGP AS path looping (BAPL) behavior does occur and in fact can lead to multi-AS forwarding loops in both IPv4 and IPv6. The number and ratio of BAPLs...
Information Centric Network or ICN is one of the few popular designs envisioned for the future Internet. In ICN, packets are routed by content-object names. Such names can be much more complicated as well as order of magnitude more in quantity than IP addresses, and the same content-objects might also be available for retrieval at more places in the network. As routing tables are always limited in...
Currently, the architecture of network device is closed. This is detrimental to the network inno vation. Software defined networking (SDN) [1] decouples the vertically coupled architecture, and reconstructs the Internet as a modular structure. The idea of SDN is widely accepted by both of the academic and industry researchers, and is considered as a promising way to re-architect the Internet. OpenFlow...
Connection of wireless sensor and actuator networks (WSANs) to the Internet will enable information flow to these once isolated networks. Distributed Ambient Intelligence (AmI) applications, such as remote monitoring and control services, would become possible if Internet connectivity of WSANs is achieved. However, realization of such applications remains challenging with three major obstacles. First,...
Border Gateway Protocol (BGP) is the defacto inter-domain routing protocol in the Internet. It was designed without an inherent security mechanism and hence is prone to a number of vulnerabilities which can cause large scale disruption in the Internet. Route leak is one such inter-domain routing security problem which has the potential to cause wide-scale Internet service failure. Route leaks occur...
Multi-homing is one of the primary causes for the exponential growth rate of the global routing table (GRT). This work proposes a stub multihoming solution called Multi-Addressing with Stub Tunnels (MAST). By combining IPv6 multi-addressing with backup tunnels between a stub and each of its providers, stubs can enjoy the reliability advantages of multihoming without adding to the size of the GRT....
The Internet's interdomain routing architecture has undergone only minor changes since its inception. It presents issues difficult to solve such as the difficulty in deploying new features, understanding its behavior and dynamics, identification and faults correction. Efforts have been made to address these issues but implementation of new applications onto the Internet architecture is a hard task...
Anonymous declared that it would hack North Korea, the world-wide closing country on June 25 in 2013, using internal supporters, but it is not known to have succeeded in hacking concretely. However, our previous study suggested hacking with Ninja gate, not with the existing method by connected routing. As a result of this study, we mentioned that even though it is a closing network, it will need a...
Route leaks are one of the anomalies of inter-domain routing that have the capacity to produce large Internet service disruptions. Route leaks are caused because of violation of routing policies among Autonomous Systems. Unfortunately, there are not many studies that formally and thoroughly analyze the route leak problem. There exist few conventional solutions that can be used as a first line of defense,...
Community Wireless Networks can be a way to make “Internet access for everyone” possible, by sharing a broadband Internet connection via WLAN. The underlying idea is to freely provide network access to anybody in the vicinity of the wireless access point via a Lower-than-Best-Effort (LBE) service, such that non-paying users interfere as little as possible with the “regular” Internet usage. Such a...
In this paper, we report our development experience and experimentation studies of two multicast routing schemes for the Internet, namely, PIM-SSM and GCMR. We detail their implementation over the Quagga open source routing suite, as well as their experimentation tests over a large-scale topology that reproduces the Internet characteristics.
Originally defined in the 90s, multicast is nowadays (re)gaining interest given the increasing popularity of multimedia streaming/content traffic and the explosion of cloud services. In fact, multicast yields bandwidth savings complementing cached content distribution techniques and its potential benefits have been verified by studies several times since then (see e.g. [1]). By multicast routing,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.