495 research outputs found
CoAP over ICN
The Constrained Application Protocol (CoAP) is a specialized Web transfer
protocol for resource-oriented applications intended to run on constrained
devices, typically part of the Internet of Things. In this paper we leverage
Information-Centric Networking (ICN), deployed within the domain of a network
provider that interconnects, in addition to other terminals, CoAP endpoints in
order to provide enhanced CoAP services. We present various CoAP-specific
communication scenarios and discuss how ICN can provide benefits to both
network providers and CoAP applications, even though the latter are not aware
of the existence of ICN. In particular, the use of ICN results in smaller state
management complexity at CoAP endpoints, simpler implementation at CoAP
endpoints, and less communication overhead in the network.Comment: Proc. of the 8th IFIP International Conference on New Technologies,
Mobility and Security (NTMS), Larnaca, Cyprus, November, 201
Internames: a name-to-name principle for the future Internet
We propose Internames, an architectural framework in which names are used to
identify all entities involved in communication: contents, users, devices,
logical as well as physical points involved in the communication, and services.
By not having a static binding between the name of a communication entity and
its current location, we allow entities to be mobile, enable them to be reached
by any of a number of basic communication primitives, enable communication to
span networks with different technologies and allow for disconnected operation.
Furthermore, with the ability to communicate between names, the communication
path can be dynamically bound to any of a number of end-points, and the
end-points themselves could change as needed. A key benefit of our architecture
is its ability to accommodate gradual migration from the current IP
infrastructure to a future that may be a ubiquitous Information Centric
Network. Basic building blocks of Internames are: i) a name-based Application
Programming Interface; ii) a separation of identifiers (names) and locators;
iii) a powerful Name Resolution Service (NRS) that dynamically maps names to
locators, as a function of time/location/context/service; iv) a built-in
capacity of evolution, allowing a transparent migration from current networks
and the ability to include as particular cases current specific architectures.
To achieve this vision, shared by many other researchers, we exploit and expand
on Information Centric Networking principles, extending ICN functionality
beyond content retrieval, easing send-to-name and push services, and allowing
to use names also to route data in the return path. A key role in this
architecture is played by the NRS, which allows for the co-existence of
multiple network "realms", including current IP and non-IP networks, glued
together by a name-to-name overarching communication primitive.Comment: 6 page
Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking
Information-centric networking proposals attract much attention in the
ongoing search for a future communication paradigm of the Internet. Replacing
the host-to-host connectivity by a data-oriented publish/subscribe service
eases content distribution and authentication by concept, while eliminating
threats from unwanted traffic at an end host as are common in today's Internet.
However, current approaches to content routing heavily rely on data-driven
protocol events and thereby introduce a strong coupling of the control to the
data plane in the underlying routing infrastructure. In this paper, threats to
the stability and security of the content distribution system are analyzed in
theory and practical experiments. We derive relations between state resources
and the performance of routers and demonstrate how this coupling can be misused
in practice. We discuss new attack vectors present in its current state of
development, as well as possibilities and limitations to mitigate them.Comment: 15 page
Quality-constrained routing in publish/subscribe systems
Routing in publish/subscribe (pub/sub) features a communication model where messages are not given explicit destination addresses, but destinations are determined by matching the subscription declared by subscribers. For a dynamic computing environment with applications that have quality demands, this is not sufficient. Routing decision should, in such environments, not only depend on the subscription predicate, but should also take the quality-constraints of applications and characteristics of network paths into account. We identified three abstraction levels of these quality constraints: functional, middleware and network. The main contribution of the paper is the concept of the integration of these constraints into the pub/sub routing. This is done by extending the syntax of pub/sub system and applying four generic, proposed by us, guidelines. The added values of quality-constrained routing concept are: message delivery satisfying quality demands of applications, improvement of system scalability and more optimise use of the network resources. We discuss the use case that shows the practical value of our concept
Towards Disruption Tolerant ICN
Information-Centric Networking (ICN) is a promi- nent topic in current
networking research. ICN design signifi- cantly considers the increased demand
of scalable and efficient content distribution for Future Internet. However,
intermittently connected mobile environments or disruptive networks present a
significant challenge to ICN deployment. In this context, delay tolerant
networking (DTN) architecture is an initiative that effec- tively deals with
network disruptions. Among all ICN proposals, Content Centric Networking (CCN)
is gaining more and more interest for its architectural design, but still has
the limitation in highly disruptive environment. In this paper, we design a
protocol stack referred as CCNDTN which integrates DTN architecture in the
native CCN to deal with network disruption. We also present the implementation
details of the proposed CCNDTN. We extend CCN routing strategies by integrating
Bundle protocol of DTN architecture. The integration of CCN and DTN enriches
the connectivity options of CCN architecture in fragmented networks.
Furthermore, CCNDTN can be beneficial through the simultaneous use of all
available connectivities and opportunistic networking of DTN for the
dissemination of larger data items. This paper also highlights the potential
use cases of CCNDTN architecture and crucial questions about integrating CCN
and DTNComment: ISCC 201
- …