CE301 – Initial Report Comparing Internet Routing Protocols Benjamin Richard Bajek 1201731 Computer Networks (3Yr) First supervisor – Dr Nikolas Thomos Secord supervisor – Dr Arsenla (Ersi) Chorti Contents: Project Overview 3 Background Reading 3-5 Information-Centric Network 3- Introduction 3 Information-Centric Network Components 3-4 ICN Naming scheme 3 ICN Routing and Forwarding 3-4 ICN Caching 4 Information-Centric Network Approaches 4 Network of information (NetInf) 4 Named Data Networking (NDN) 4 Publish-Subscribe Architecture 4 Summary of Different ICN Approaches 5 Channel Coding 5 References 6 Project Goals …show more content…
The current solution as TCP/IP becomes inefficient and subjects to certain problems. An example of this, to search for content, the content must be mapped to a host, and then DNS translates the host name to the location i.e. IP address. The two-step mapping incurs access overhead. Security is an issue since the security coupled to the host. The host becomes a target for security attacks. Also IP is stateless so they cannot be caching capability; the same request would be made times, this lead to unnecessary bandwidth usage. This prompted the research into move the architecture from a host-centric to information-centric. Information-Centric Network Components ICN naming scheme Information unit in ICN is called Named Data Object (NDO). This can be any type of content. This contents location- independent identifier (name), data, and possibly a metadata. NDO can be identified by multiple names. Each ICN approached the design of the NDO differently. They are two commonly used schemes are flat and hierarchical naming. Most recent ICN allow hybrid naming. Hierarchical Naming – The format is similar to URL, enhances scalability since name prefix can be aggregated the same way as the URL, and more coherent to the existing IP networks. Also name is user-friendly; therefore it is easy to remember. Security vulnerability since the
But how does it work? The internet, based on the concept of “packet switching”, involves the travelling of small packets of data over one or more networks (Frenzel, 2013). This can be compared to “electronic postcards”, meaning that “a computer generates a piece of data and flings it into the net, just like the postal system, except 100 million times faster” (Cerf, 2013). This concept allows one computer to speak to many different computers around the network by sending out these “electronic postcards”. However, before these networks can work seamlessly together, they must use a common protocol, or set of rules for transmitting and receiving these packets of data. There are several protocols currently in use, including the OSI Model, the TCP/IP Model, UDP, HTTP, and FDP (Mitchell, 2014), but the most commonly used is Transmission Control Protocol/Internet Protocol (TCP/IP) (Gilmer, 2011). Even as early as 1977, TCP/IP was being used by other networks to link to ARPANET (Kozierok,
In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in
DNS (Domain Name System) : used to translate the internet protocol services. Stand-alone daemon run by script named.
Short domain names are more adaptable for branding. Problems can occur with longer names, especially if there are space constraints. The shorter names allow creative branding if you wish to proceed in that direction. For instance, if you launch you site in the United States, and subsequently wish to share it with other countries, you will have room in your URL to include relevant country codes such as .eu or .asia. Having a short domain name leaves room for additions such as these.
Primary function of IP protocol = identify individual hosts and groups of hosts using the address
host name- A name made up of alphabetic, numeric, and some special characters, used to identify a specific IP host. Host names that follow the convention for domain names in the DNS system use a hierarchical design, with periods separating parts of the name.
The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in people's homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie in a collection of computers that were linked together in the 1970s to form the US Department of Defense's communications systems. Fearing the consequences of nuclear attack, there was no central computer holding vast amounts of data, rather the information was dispersed across thousands of machines. A set of rules, of protocols, known as TCP/IP was
The TCP/IP protocols are the heart and soul of the Internet, and they describe the fundamental rules that govern all communications in the network. The original address system of the Internet is Internet Protocol version 4 (IPv4). The Internet Engineering Task Force (IETF) developed IPv6 to deal with the long-anticipated problem of IPv4 address exhaustion. However, IPv6 is not foreseen to supplant IPv4 instantaneously.
The domain naming server plays a vital role in the internet as it is needed and is involved in every internet application. DNS now works well and it is also sometimes mentioned that any new changes added to the present DNS may contribute to interruption to its functionality and can also contribute towards additional complexity which is undesirable. Current networks and the future networks relay essentially on DNS and it is important that the DNS should be a secured one. The DNS can be easily attacked and such an attack can cause dire consequences so it specifies the importance to use a secured version of DNS to avoid such consequences. To employ such a version involves more cost.
Further, with the evolution of Internet and enterprise data centers, the nature of data circulating on the Internet has also undergone a tremendous change. Data transfer in the form of video and audio is increasing at a tremendous pace[2]. Moreover, different sources of data (e.g.- mobile, tablet PCs) have placed considerable pressure on modern networks. The current capacities of network switches do not support the transfer of these mass amounts of data. Moreover, with advent of social media, amount of data generated on websites such as Facebook and LinkedIn has reached humungous levels.
P1: The first method in network addressing is, Fully Qualified Domain Name which is known as FQDN for short. FQDN is used as the domain name for a specific host or computer name on the internet. FQDN consists of two main parts, the domain name and the hostname. For example, Belfast Met is the hostname, but the domain name is belfastmet.ac.uk.
Over the next 10 years, we will see a change in technology, and the Internet. Things will continue to progress, and fundamental changes will easily be defined. Technologies have revolutionized how people spread and consume information; these changes will redefine who we are as consumers, merchants, and individuals. With the expansion of computers and the Internet connectivity, people are able to share more of their lives with family and friends. Technology has offered the world so many different services, which include emailing, instant messaging, search engines, blogs, and Wikipedia. These services have changed the way we communicate with others, our knowledge, and the way we conduct business. With the increasing usage of the Internet, developers continue to find ways to improve technology and the way we utilize the Internet. Technology has a wide range of different aspects and concepts, which includes protocols. There has to be rules, and objectives in any and everything we do, and protocols governs communications, errors, detections, messages, and speed. There are three technology concepts behind the Internet, and they are packet switching, Transmission Control Protocol/Internet Protocol (TCP/IP) communications
The two TCP/IP transport layer protocols (TCP and UDP), are very crucial for the smooth operation of network services for both the computer applications and application layer protocols such as HTTP, FTP, SMTP and Telnet. These two transport layer protocols TCP and UDP execute these services via the employment of IP. They use IP in the efficient routing of packets to their respective destination networks (Steinke,2001).The TCP is further noted by Steinke (2001) to be responsible for the provision of a reliable and yet connection-oriented byte-stream packet delivery while its counterpart UDP is noted to be responsible for the provision of a connectionless but rather unreliable packet delivery. In this paper we explain the work of the two TCP/IP transport layer protocols (TCP and UDP). In addition, describe how TCP and UDP manage key functions such as reliability, port addressing, and segmentation.
The ability to send and receive data efficiently is the most important objective of networking computers.
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail.