Abstract
During the past decades, serious efforts have been made to propose various architectures for the future Internet. Each of those architectures has one thing in common, i.e., to focus on content delivery rather than on host-centric approaches. However, only few of them gained popularity due to their possible applications being investigated. In this chapter, we describe the overview of various future Internet architectures such as data-oriented networking architecture, content-centric networking, named-data networking, publish/subscribe, and network of information. The main objective of this chapter is to allow our readers to become familiar with the transformation of these architectures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cheriton D, Gritter (2000) Triad: a new next-generation internet architecture
Koponen T, Chawla M, Chun B-G, Ermolinskiy A, Kim KH, Shenker S, Stoica I (2007) A data-oriented (and beyond) network architecture. SIGCOMM Comput Commun Rev 37(4):181–192
FP7 PURSUIT project (Online). Available: http://www.fp7-pursuit.eu/PursuitWeb/
FP7 PSIRP project (Online). Available: http://www.psirp.org/
Dannewitz C, Kutscher D, Ohlman B, Farrell S, Ahlgren B, Karl H (2013) Network of information (netinf)–an information-centric networking architecture. Comput Commun 36(7):721–735
FP7 4WARD project (Online). Available: http://www.4ward-project.eu/
FP7 SAIL project. [Online]. Available: http://www.sail-project.eu/
Jacobson V, Smetters DK, Thornton JD, Plass MF, Briggs NH, Braynard RL (2009) Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT ‘09, pp 1–12, New York, NY, USA, ACM
Zhang L, Afanasyev A, Burke J, Jacobson V, Claffy K, Crowley P, Papadopoulos C, Wang L, Zhang B (2014) Named data networking. SIGCOMM Comput Commun Rev 44(3):66–73
Jacobson V (2006) A new way to look at networking, Google Tech Talk, Aug 2006
Fayazbakhsh SK, Lin Y, Tootoonchian A, Ghodsi A, Koponen T, Maggs B, Ng K, Sekar V, Shenker S (2013). Less pain, most of the gain: incrementally deployable ICN. SIGCOMM Comput Commun Rev 43(4)
Mazi`eres D, Kaminsky M, Kaashoek M.F, Witchel E (1999) Separating key management from file system security. In: Proceedings of SOSP ’99, pp 124–139, Charleston, SC, USA, Dec 1999
Moskowitz R, Nikander P (2006) Host Identity protocol architecture. RFC 4423, IETF, May 2006
Xylomenos G, Ververidis CN, Siris VA, Fotiou N, Tsilopoulos C, Vasilakos X, Katsaros KV, Polyzos GC (2014) A survey of information-centric networking research. Commun Surv Tutorials IEEE 16(2):1024–1049 (Second Quarter 2014)
Ghodsi A et al (2011) Naming in content-oriented architectures, In: Proceedings of ACM SIGCOMM workshop information-centric networking, Toronto, Canada, Aug 2011
Dannewitz C et al (2010) Secure naming for a network of information. In: Proceedings of 13th IEEE global internet symposium ‘10, San Diego, CA, Mar 2010
Eriksson A, Ohlman B (2007) Dynamic internetworking based on late locator construction. In: 10th IEEE global internet symposium, 2007
D’Ambrosio M, Dannewitz C, Karl H, Vercellone V (2011) MDHT: a hierarchical name resolution service for information-centric networks. In: Proceedings of ACM SIGCOMM workshop on information-centric networking, ACM, New York, NY, USA, 2011, pp. 7–12
Dannewitz C, D’Ambrosio M, Karl H, Vercellone V (2013) Hierarchical DHT-based name resolution for information-centric networks, Elsevier computer communications, special issue on information-centric networking, 2013
Eriksson A, Ohlman B (2007) Dynamic internetworking based on late locator construction. In: 10th IEEE global internet symposium, 2007
Kutscher D, Ahlgren B, D’Ambrosio M, Davies E, Eriksson AE, Farrell S, Grönvall B, Imbrenda C, Kauffmann B, Kunzmann G, Lindgren A, Marsh I, Muscariello L, Ohlman B, Persson K-A, Pöyhönen P, Shehada M, Staehle D, Strandberg O, Tuononen J, Vercellone V (2012) (D.3.2) Content delivery and operations, deliverable, SAIL 7th FP EU-funded project, May 2012
Ain M et al (2009) D2.3–Architecture definition, component descriptions, and requirements, deliverable, PSIRP 7th FP EU-funded project, Feb 2009
Bloom BH (1970) Space/time Trade-offs in hash coding with allowable errors. ACM Commun 13(7):422–426
Miller VS (1985) Use of elliptic curves in cryptography. In: Proceedings of CRYPTO ’85: the advances in cryptology. Aug 1985
Lagutin D (2008) Redesigning internet-the packet level authentication architecture, Licentiate’s thesis, Helsinki University of Technology, Finland
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 The Author(s)
About this chapter
Cite this chapter
Yaqub, M.A., Ahmed, S.H., Bouk, S.H., Kim, D. (2016). Information-Centric Networks (ICN). In: Content-Centric Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-10-0066-9_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-0066-9_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0064-5
Online ISBN: 978-981-10-0066-9
eBook Packages: EngineeringEngineering (R0)