000 10305nam a22006255i 4500
001 978-3-030-46736-4
003 DE-He213
005 20240423125131.0
007 cr nn 008mamaa
008 210827s2021 sz | s |||| 0|eng d
020 _a9783030467364
_9978-3-030-46736-4
024 7 _a10.1007/978-3-030-46736-4
_2doi
050 4 _aTK7885-7895
050 4 _aTK5105.5-5105.9
072 7 _aUK
_2bicssc
072 7 _aCOM067000
_2bisacsh
072 7 _aUK
_2thema
082 0 4 _a621.39
_223
082 0 4 _a004.6
_223
100 1 _aDutta, Nitul.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aInformation Centric Networks (ICN)
_h[electronic resource] :
_bArchitecture & Current Trends /
_cby Nitul Dutta, Hiren Kumar Deva Sarma, Rajendrasinh Jadeja, Krishna Delvadia, Gheorghita Ghinea.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aVII, 194 p. 39 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aPractical Networking,
_x2662-1711
505 0 _a1. Introduction to information centric networks -- 1.1 Introduction -- 1.2 Internet Architecture: Strengths and Limitations -- 1.2.1 Content distribution networks -- 1.3 Content Distribution Network Architecture -- 1.4 Characteristics of ICN, Design Principles, and Assumptions -- 1.4.1 Characteristics of ICN -- 1.4.2 Design Principles -- 1.4.3 Assumptions.-1.5 Key Building Blocks of ICN and Design Challenges -- 1.5.1 Key Building Block of ICN -- 1.5.2 Design Challenges..-1.6 Benefits of using ICN -- 1.7 Historical note on ICN -- Architectures for content communication -- 2.1 Introduction.-2.2 Representative ICN Architectures -- 2.2.1 TRIAD Architecture -- 2.2.2 DONA Architecture -- 2.2.3 Content Centric Network (CCN) Architecture -- 2.2.4 PURSUIT Architecture -- 2.2.5 Network Information (NetInf) architecture -- 2.2.6 The NDN architecture -- 2.3 Comparative analysis of ICN Architectures -- 2.4 Software Defined Networking in ICN -- 2.4.1 Scope ofintegrating SDN into ICN -- 2.4.2 The SDN architecture in general. -- 2.5 Summary -- 3 Naming for unique content identification -- 3.1 Introduction -- 3.2 Naming system design -- 3.3 Importance of naming -- 3.4 key design issues and choices for information/content naming for ICNs -- 3.5 Naming approaches proposed so far -- 3.5.1 CBCB (Combined broadcast and content based routing) -- 3.5.2 DONA (Data oriented network architecture) -- 3.5.3 NetInf (Network of information) -- 3.5.4 NDN (Named data networking) -- 3.5.5 PURSUIT (Publish subscribe Internet technologies) -- 3.5.6 Hierarchical and flat based hybrid naming scheme in CCN IoT -- 3.5.7 Secure naming scheme for Information Centric Networks -- 3.6 Analysis of naming schemes along with their advantages and disadvantages -- 3.6.1 Flat vs. hierarchical vs. attribute value-based naming approaches -- 3.6.2 Name based routing vs. Name resolution.-3.6.3 Incremental vs. Clean slate approach -- 3.7 Need of an efficient content naming mechanism: Our perspective -- 3.8 Open research in ICN Naming -- 3.9 Summary -- 4 Routing schemes used in content delivery -- 4.1 Introduction -- 4.2 Realization of routing in ICN -- 4.3 Realization of Forwarding in ICN -- 4.4. NDN forwarding architecture with illustration -- 4.5. Stateful forwarding paradigm for NDN -- 4.6. OSPFN: An OSPF based routing for NDN -- 4.6.1 Routing in OSPFN -- 4.7 NLSR: A Secure Link State Routing protocol for NDN -- 4.7.1 Naming scheme -- 4.7.2 Format of LSAs -- 4.7.3 Dissemination of LSAs -- .7.4 Adjacency Establishment -- 4.8 Recent development in ICN Routing -- 4.9 Open Research in ICN routing -- 4.10 Summary -- Caching mechanisms for faster content retrieval. - 5.1 Introduction -- 5.1.1 General overview of network caching -- 5.2 Research challenges and issues in ICN caching -- 5.2.1 Unique naming of content and caches -- 5.2.2Popularity of data -- 5.2.3 Limited storage space in caching devices -- 5.2.4 Storage location -- .2.5 Staleness or freshness detection of content -- 5.2.6 Repeated caching of same Content -- 5.2.7 Content Mobility -- 5.2.8 New research challenges for ICN caching -- 5.3 Recent trends in Caching -- 5.3.1 In-Network caching -- 5.3.2 Edge Caching -- 5.3.3 SDN based Caching -- 5.4 Performance metrics along with objectives in terms of caching mechanisms for ICN -- 5.4.1 Cache hit ratio and server load -- 5.4.2 Content retrieval latency -- 5.4.3 Retransmission ratio for interest packets -- 5.4.4 Total cache evictions -- 5.4.5 Diversity Metric -- 5.4.6 Cache retention ratio -- 5.5 Analysis of various caching methods -- 5.6 Open research in ICN caching -- 5.7 Summary -- 6 Security in ICN -- 6.1 Introduction 6.2 Importance of Security in ICN 6.3 Key Security & privacy concerns in ICN architectures 6.4 Attacks in ICN 6.4.1 Naming related attacks -- 6.4.2 Routing related attacks. 6.4.3 Caching related attacks. 6.4.4 Content poisoning attack -- 6.4.5 Miscellaneous attacks -- 6.5 ICN attributes leading to security threats -- 6.6 Security mechanisms adopted in ICN -- 6.6.1 Countermeasures for naming attacks -- 6.6.2 Countermeasures for routing attacks -- 6.6.3 Countermeasures for caching attacks -- 6.6.4 Countermeasures for content poisoning attacks -- 6.6.5 Countermeasures for miscellaneous attacks -- 6.7 Open research in ICN security -- 6.8 Conclusion -- 7. Optimization in ICN -- 7.1 Introduction -- 7.2 The need of optimization in ICN -- 7.3 Approaches for optimization in ICN -- 7.4 Machine learning for optimization in ICN -- 7.4.1 Application of ML in Communication Networks -- 7.4.2 Application of ML in Information Centric Networks -- 7.5 Open research directions for optimization in ICN -- 7.6 Conclusion -- 8. A framework for integrating SDN in ICN -- 8.1 Introduction -- 8.2 State of the art work in SDN based ICN -- 8.3 The SDN architecture for ICN -- 8.3.1 Based on OpenFlow over CONET -- 8.4 Proposed architecture -- 8.4.1 Functional description -- 8.4.2 Routing in the proposed model -- 8.4.3 Caching in the proposed model -- 8.5 Analysis of the proposed architecture -- 8.6 Future research direction in SDN enable ICN -- 8.7 Summary -- Integrating content communication into real life applications -- 9.1 Introduction -- 9.2 Recent trends in ICN applications -- 9.3 Information centric networks in Internet of things -- 9.3.1 Adaptation of information centric networks for internet of things (IoT) : Challenges and opportunities -- 9.4 Information centric networks in smart grid -- 9.5 Information centric networks in wireless sensor networks -- 9.6 Information centric networks in mobile adhoc networks -- 9.7 Information centric networks in vehicular adhoc networks -- 9.8 Open research in the field of content centric real life applications -- 9.9 Summary. .
520 _aThis book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 0 _aComputer networks
_xSecurity measures.
650 0 _aTelecommunication.
650 1 4 _aComputer Engineering and Networks.
650 2 4 _aMobile and Network Security.
650 2 4 _aCommunications Engineering, Networks.
700 1 _aSarma, Hiren Kumar Deva.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aJadeja, Rajendrasinh.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aDelvadia, Krishna.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aGhinea, Gheorghita.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030467357
776 0 8 _iPrinted edition:
_z9783030467371
776 0 8 _iPrinted edition:
_z9783030467388
830 0 _aPractical Networking,
_x2662-1711
856 4 0 _uhttps://doi.org/10.1007/978-3-030-46736-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c174614
_d174614