Skip to main content

Principle of the Pervasive Service Layer

  • Chapter
  • First Online:
Smart Collaborative Identifier Network
  • 354 Accesses

Abstract

In this chapter, we focus on the principle and operating mechanisms of the Pervasive Service Layer, which is responsible for providing service management, service acquisition and adaptive connection management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. MD5. http://en.wikipedia.org/wiki/MD5. Accessed 7 June 2015

  2. SHA-1. http://en.wikipedia.org/wiki/SHA-1. Accessed 7 June 2015

  3. TCP. http://en.wikipedia.org/wiki/TCP. Accessed 7 June 2015

  4. UDP. http://en.wikipedia.org/wiki/UDP. Accessed 7 June 2015

  5. Domain Name System. http://en.wikipedia.org/wiki/Domain_Name_System. Accessed 7 June 2015

  6. Berkeley sockets. http://en.wikipedia.org/wiki/Berkeley_sockets. Accessed 7 June 2015

  7. The size of the World Wide Web. http://www.worldwidewebsize.com. Accessed 7 June 2015

  8. WEBHOSTING.INFO. http://www.webhosting.info/domains/globalstats/totaldomains/. Accessed by 7 June 2015

  9. Karagiannis T, Broido A, Brownlee N et al (2004) Is p2p dying or just hiding? IEEE globecom telecommunications conference

    Google Scholar 

  10. Karagiannis T, Broido A, Faloutsos M et al (2004) Transport layer identification of P2P traffic. The 4th ACM SIGCOMM conference on Internet measurement

    Google Scholar 

  11. Karagiannis T, Papagiannaki K, Faloutsos M (2005) BLINC: multilevel traffic classification in the dark. ACM SIGCOMM Comput Commun Rev 35(4):229–240

    Article  Google Scholar 

  12. Koponen T, Chawla M, Chun B et al (2007) A data-oriented (and beyond) network architecture. ACM SIGCOMM Comput Commun Rev 37(4):181–192

    Article  Google Scholar 

  13. Ahlgren B, D’Ambrosio M, Dannewitz C et al (2008) Design considerations for a network of information. The 2008 ACM CoNEXT conference

    Google Scholar 

  14. Jokela P, Zahemszky A, Arianfar S et al (2009) Lipsin: line speed publish/subscribe inter-networking. ACM SIGCOMM Comput Commun Rev 39(4):195–206

    Article  Google Scholar 

  15. Jacobson V, Smetters D, Thornton J et al (2009) Networking named content. The 5th ACM international conference on emerging networking experiments and technologies

    Google Scholar 

  16. Denial-of-service_attack. http://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_attack

  17. Hoffman P (2005) The telnet URI scheme, RFC 4248. http://www.ietf.org/rfc/rfc4248.txt. Accessed 7 June 2015

  18. Hoffman P (2005) The gopher URI scheme, RFC 4266. http://www.ietf.org/rfc/rfc4266.txt. Accessed 7 June 2015

  19. Uniform resource name. http://en.wikipedia.org/wiki/Uniform_resource_name. Accessed 7 June 2015

  20. Moskowitz R, Nikander P, Jokela P et al (2006) Host identity protocol (HIP) architecture, RFC 4423. http://www.ietf.org/rfc/rfc4423.txt. Accessed 7 June 2015

  21. Moskowitz R, Nikander P, Jokela P et al (2008) Host identity protocol, RFC 5201. http://www.ietf.org/rfc/rfc5201.txt. Accessed 7 June 2015

  22. Walfish M, Balakrishnan H, Shenker S (2004) Untangling the Web from DNS. The 1st conference on symposium on networked systems design and implementation

    Google Scholar 

  23. Vixie P, Thomson S, Rekhter Y et al (1997) Dynamic updates in the domain name system, RFC 2136. http://www.ietf.org/rfc/rfc2136.txt

  24. Adejie-Winoto W, Schwartz E, Balakrisshnan H et al (1999) The design and implementation of an intentional naming system. ACM SIGOPS Oper Syst Rev 34(2):22

    Article  Google Scholar 

  25. Stoica I, Adkins D, Zhuang S et al (2004) Internet indirection infrastructure. IEEE/ACM Trans Netw 20(2):205–218

    Article  MATH  Google Scholar 

  26. Cheriton D, Gritter M (2000) TRIAD: a new next-generation Internet architecture. www.cs.umd.edu/class/spring2007/cmsc711/papers/triad.ps. Accessed 7 June 2015

  27. Ramakrishna PF (2001) IPNL: a NAT-extended internet architecture. ACM SIGCOMM Comput Commun Rev 31(4):69–80

    Article  Google Scholar 

  28. NDN: Named Data Networking. http://named-data.org/index.html. Accessed 7 June 2015

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongke Zhang .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Zhang, H., Su, W., Quan, W. (2016). Principle of the Pervasive Service Layer. In: Smart Collaborative Identifier Network. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49143-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49143-0_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49141-6

  • Online ISBN: 978-3-662-49143-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics