By Syed Hassan Ahmed, Safdar Hussain Bouk, Dongkyun Kim
This e-book introduces Content-Centric Networking (CCN), a networking paradigm that gives an easy and powerful technique to the tough calls for of destiny stressed and instant communications. It presents an summary of the new advancements within the sector of destiny web applied sciences, bringing jointly the developments which were made in Information-Centric Networking (ICN) often, with a spotlight on CCN.
It starts with an advent to the fundamentals of CCN is by means of an summary of the present web paradigm and its demanding situations. subsequent, an program point of view has been incorporated, the place the authors surround the chosen purposes for CCN with contemporary refereed learn and advancements. those purposes contain web of items (IoT), shrewdpermanent Grid, Vehicular advert hoc Networks (VANETs), and instant Sensor Networks (WSNs).
The booklet is an invaluable reference resource for working towards researchers, and will be used as assisting fabric for undergraduate and graduate point classes in machine technology and electric engineering.
Read or Download Content-Centric Networks: An Overview, Applications and Research Challenges PDF
Best internet & networking books
The wonderful thing about a house community is that it could possibly make existence really easy - what may be greater than sharing a web connection in order that every person should be on-line whilst? With domestic networking you could circulate records from one computing device to a different, proportion assets, print to a unmarried printer or a number of printers from any computing device in the home, and IM the children while they're holed up of their rooms.
Area safeguard comprises using area (in specific verbal exchange, navigation, earth commentary, and digital intelligence satellites) for army and safety reasons on the earth and in addition the upkeep of house (in specific the earth orbits) as secure and safe parts for engaging in peaceable actions.
Cloud potential administration is helping readers in figuring out what the cloud, IaaS, PaaS, SaaS are, how they relate to means making plans and administration and which stakeholders are curious about offering worth within the cloud price chain. It explains the function of potential administration for a writer, aggregator, and client of cloud companies and the way to provision for it in a 'pay as you utilize model'.
Additional resources for Content-Centric Networks: An Overview, Applications and Research Challenges
Pending interest table (PIT): This is a data structure that stores information about unsatisﬁed interests including content name, incoming face from where the interest message was received, and timer(s). The term “unsatisﬁed” means that the node has forwarded the interest message received from the downstream and forwarded it to the upstream; however, the interest forwarder is awaiting the response. The timers are used to limit the duration of PIT entry and, ultimately, the size of the PIT. The entries in PIT are organized in such a way that insert, search, delete, and modify functions can be performed easily.
The content entries may use an accession number, such as (Accession Base + Accession window), to access the content entry. There may be a case when a content or data message is received by a node that has no previous PIT information or the node did not receive the interest message requesting that content message. This type of content object is called “unsolicited data,” which may also be stored in a separate list. Accession numbers of the unsolicited content objects are separately recorded in the data structure.
In addition, the privacy of data, location, and data integrity should be considered while designing new protocols and communications frameworks. New framework integration: As far as the current Internet framework is concerned, data plane, control, and management plans are merging with one another. In today’s Internet, the control messages (for example, TCP-connection setup messages) or management messages (such as SNMP messages) follow the same links as data messages. Moreover, control signals are also piggybacked on data packets.