34,638 research outputs found
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions
In recent years, the current Internet has experienced an unexpected paradigm
shift in the usage model, which has pushed researchers towards the design of
the Information-Centric Networking (ICN) paradigm as a possible replacement of
the existing architecture. Even though both Academia and Industry have
investigated the feasibility and effectiveness of ICN, achieving the complete
replacement of the Internet Protocol (IP) is a challenging task.
Some research groups have already addressed the coexistence by designing
their own architectures, but none of those is the final solution to move
towards the future Internet considering the unaltered state of the networking.
To design such architecture, the research community needs now a comprehensive
overview of the existing solutions that have so far addressed the coexistence.
The purpose of this paper is to reach this goal by providing the first
comprehensive survey and classification of the coexistence architectures
according to their features (i.e., deployment approach, deployment scenarios,
addressed coexistence requirements and architecture or technology used) and
evaluation parameters (i.e., challenges emerging during the deployment and the
runtime behaviour of an architecture). We believe that this paper will finally
fill the gap required for moving towards the design of the final coexistence
architecture.Comment: 23 pages, 16 figures, 3 table
Content Delivery Latency of Caching Strategies for Information-Centric IoT
In-network caching is a central aspect of Information-Centric Networking
(ICN). It enables the rapid distribution of content across the network,
alleviating strain on content producers and reducing content delivery
latencies. ICN has emerged as a promising candidate for use in the Internet of
Things (IoT). However, IoT devices operate under severe constraints, most
notably limited memory. This means that nodes cannot indiscriminately cache all
content; instead, there is a need for a caching strategy that decides what
content to cache. Furthermore, many applications in the IoT space are
timesensitive; therefore, finding a caching strategy that minimises the latency
between content request and delivery is desirable. In this paper, we evaluate a
number of ICN caching strategies in regards to latency and hop count reduction
using IoT devices in a physical testbed. We find that the topology of the
network, and thus the routing algorithm used to generate forwarding
information, has a significant impact on the performance of a given caching
strategy. To the best of our knowledge, this is the first study that focuses on
latency effects in ICN-IoT caching while using real IoT hardware, and the first
to explicitly discuss the link between routing algorithm, network topology, and
caching effects.Comment: 10 pages, 9 figures, journal pape
Hyper Converged Infrastructures: Beyond virtualization
Hyper Convergence has brought virtualization and IT strategies to a new
level. Datacenters are undergoing a deep paradigm shift from a hardware-centric
to an application-centric approach which leverages on software defined
architectures, while IT is more and more being delivered as services rather
than assets or products. Throughout different evolving phases since the initial
attempts to convergence, the concept has been refined down to a level
where,ultimately, a whole datacenter could be fully managed from a centralized
single point, abstracting the whole hardware layer and exposing it to the
administrators as a transparent pool of resources. This paper analyzes the
evolution of infrastructures and tries to dig into the reality and convenience
of Hyper Convergence
Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking
Information-centric networking proposals attract much attention in the
ongoing search for a future communication paradigm of the Internet. Replacing
the host-to-host connectivity by a data-oriented publish/subscribe service
eases content distribution and authentication by concept, while eliminating
threats from unwanted traffic at an end host as are common in today's Internet.
However, current approaches to content routing heavily rely on data-driven
protocol events and thereby introduce a strong coupling of the control to the
data plane in the underlying routing infrastructure. In this paper, threats to
the stability and security of the content distribution system are analyzed in
theory and practical experiments. We derive relations between state resources
and the performance of routers and demonstrate how this coupling can be misused
in practice. We discuss new attack vectors present in its current state of
development, as well as possibilities and limitations to mitigate them.Comment: 15 page
A topology-oblivious routing protocol for NDN-VANETs
Vehicular Ad Hoc Networks (VANETs) are characterized by intermittent
connectivity, which leads to failures of end-to-end paths between nodes. Named
Data Networking (NDN) is a network paradigm that deals with such problems,
since information is forwarded based on content and not on the location of the
hosts. In this work, we propose an enhanced routing protocol of our previous
topology-oblivious Multihop, Multipath, and Multichannel NDN for VANETs
(MMM-VNDN) routing strategy that exploits several paths to achieve more
efficient content retrieval. Our new enhanced protocol, i mproved MMM-VNDN
(iMMM-VNDN), creates paths between a requester node and a provider by
broadcasting Interest messages. When a provider responds with a Data message to
a broadcast Interest message, we create unicast routes between nodes, by using
the MAC address(es) as the distinct address(es) of each node. iMMM-VNDN
extracts and thus creates routes based on the MAC addresses from the strategy
layer of an NDN node. Simulation results show that our routing strategy
performs better than other state of the art strategies in terms of Interest
Satisfaction Rate, while keeping the latency and jitter of messages low
HoPP: Robust and Resilient Publish-Subscribe for an Information-Centric Internet of Things
This paper revisits NDN deployment in the IoT with a special focus on the
interaction of sensors and actuators. Such scenarios require high
responsiveness and limited control state at the constrained nodes. We argue
that the NDN request-response pattern which prevents data push is vital for IoT
networks. We contribute HoP-and-Pull (HoPP), a robust publish-subscribe scheme
for typical IoT scenarios that targets IoT networks consisting of hundreds of
resource constrained devices at intermittent connectivity. Our approach limits
the FIB tables to a minimum and naturally supports mobility, temporary network
partitioning, data aggregation and near real-time reactivity. We experimentally
evaluate the protocol in a real-world deployment using the IoT-Lab testbed with
varying numbers of constrained devices, each wirelessly interconnected via IEEE
802.15.4 LowPANs. Implementations are built on CCN-lite with RIOT and support
experiments using various single- and multi-hop scenarios
- …