Abstract
In this chapter, we focus on the principle and operating mechanisms of the Pervasive Service Layer, which is responsible for providing service management, service acquisition and adaptive connection management.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
MD5. http://en.wikipedia.org/wiki/MD5. Accessed 7 June 2015
SHA-1. http://en.wikipedia.org/wiki/SHA-1. Accessed 7 June 2015
TCP. http://en.wikipedia.org/wiki/TCP. Accessed 7 June 2015
UDP. http://en.wikipedia.org/wiki/UDP. Accessed 7 June 2015
Domain Name System. http://en.wikipedia.org/wiki/Domain_Name_System. Accessed 7 June 2015
Berkeley sockets. http://en.wikipedia.org/wiki/Berkeley_sockets. Accessed 7 June 2015
The size of the World Wide Web. http://www.worldwidewebsize.com. Accessed 7 June 2015
WEBHOSTING.INFO. http://www.webhosting.info/domains/globalstats/totaldomains/. Accessed by 7 June 2015
Karagiannis T, Broido A, Brownlee N et al (2004) Is p2p dying or just hiding? IEEE globecom telecommunications conference
Karagiannis T, Broido A, Faloutsos M et al (2004) Transport layer identification of P2P traffic. The 4th ACM SIGCOMM conference on Internet measurement
Karagiannis T, Papagiannaki K, Faloutsos M (2005) BLINC: multilevel traffic classification in the dark. ACM SIGCOMM Comput Commun Rev 35(4):229–240
Koponen T, Chawla M, Chun B et al (2007) A data-oriented (and beyond) network architecture. ACM SIGCOMM Comput Commun Rev 37(4):181–192
Ahlgren B, D’Ambrosio M, Dannewitz C et al (2008) Design considerations for a network of information. The 2008 ACM CoNEXT conference
Jokela P, Zahemszky A, Arianfar S et al (2009) Lipsin: line speed publish/subscribe inter-networking. ACM SIGCOMM Comput Commun Rev 39(4):195–206
Jacobson V, Smetters D, Thornton J et al (2009) Networking named content. The 5th ACM international conference on emerging networking experiments and technologies
Denial-of-service_attack. http://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_attack
Hoffman P (2005) The telnet URI scheme, RFC 4248. http://www.ietf.org/rfc/rfc4248.txt. Accessed 7 June 2015
Hoffman P (2005) The gopher URI scheme, RFC 4266. http://www.ietf.org/rfc/rfc4266.txt. Accessed 7 June 2015
Uniform resource name. http://en.wikipedia.org/wiki/Uniform_resource_name. Accessed 7 June 2015
Moskowitz R, Nikander P, Jokela P et al (2006) Host identity protocol (HIP) architecture, RFC 4423. http://www.ietf.org/rfc/rfc4423.txt. Accessed 7 June 2015
Moskowitz R, Nikander P, Jokela P et al (2008) Host identity protocol, RFC 5201. http://www.ietf.org/rfc/rfc5201.txt. Accessed 7 June 2015
Walfish M, Balakrishnan H, Shenker S (2004) Untangling the Web from DNS. The 1st conference on symposium on networked systems design and implementation
Vixie P, Thomson S, Rekhter Y et al (1997) Dynamic updates in the domain name system, RFC 2136. http://www.ietf.org/rfc/rfc2136.txt
Adejie-Winoto W, Schwartz E, Balakrisshnan H et al (1999) The design and implementation of an intentional naming system. ACM SIGOPS Oper Syst Rev 34(2):22
Stoica I, Adkins D, Zhuang S et al (2004) Internet indirection infrastructure. IEEE/ACM Trans Netw 20(2):205–218
Cheriton D, Gritter M (2000) TRIAD: a new next-generation Internet architecture. www.cs.umd.edu/class/spring2007/cmsc711/papers/triad.ps. Accessed 7 June 2015
Ramakrishna PF (2001) IPNL: a NAT-extended internet architecture. ACM SIGCOMM Comput Commun Rev 31(4):69–80
NDN: Named Data Networking. http://named-data.org/index.html. Accessed 7 June 2015
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Zhang, H., Su, W., Quan, W. (2016). Principle of the Pervasive Service Layer. In: Smart Collaborative Identifier Network. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49143-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-662-49143-0_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-49141-6
Online ISBN: 978-3-662-49143-0
eBook Packages: Computer ScienceComputer Science (R0)