001439289 000__ 09904cam\a2200541\a\4500 001439289 001__ 1439289 001439289 003__ OCoLC 001439289 005__ 20230309004421.0 001439289 006__ m\\\\\o\\d\\\\\\\\ 001439289 007__ cr\un\nnnunnun 001439289 008__ 210901s2021\\\\sz\\\\\\o\\\\\000\0\eng\d 001439289 020__ $$a9783030467364$$q(electronic bk.) 001439289 020__ $$a3030467368$$q(electronic bk.) 001439289 020__ $$z303046735X 001439289 020__ $$z9783030467357 001439289 0247_ $$a10.1007/978-3-030-46736-4$$2doi 001439289 035__ $$aSP(OCoLC)1266254272 001439289 040__ $$aYDX$$beng$$epn$$cYDX$$dGW5XE$$dOCLCO$$dEBLCP$$dOCLCF$$dUKAHL$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001439289 049__ $$aISEA 001439289 050_4 $$aTK5105.5 001439289 08204 $$a004.6$$223 001439289 1001_ $$aDutta, Nitul,$$eauthor. 001439289 24510 $$aInformation centric networks (ICN) :$$barchitecture & current trends /$$cNitul Dutta, Hiren Kumar Deva Sarma, Rajendrasinh Jadeja, Krishna Delvadia, Gheorghita Ghinea. 001439289 260__ $$aCham, Switzerland :$$bSpringer,$$c2021. 001439289 300__ $$a1 online resource 001439289 336__ $$atext$$btxt$$2rdacontent 001439289 337__ $$acomputer$$bc$$2rdamedia 001439289 338__ $$aonline resource$$bcr$$2rdacarrier 001439289 4901_ $$aPractical networking,$$x2662-1711 001439289 5050_ $$a1. Introduction to information centric networks -- 1.1 Introduction -- 1.2 Internet Architecture: Strengths and Limitations -- 1.2.1 Content distribution networks -- 1.3 Content Distribution Network Architecture -- 1.4 Characteristics of ICN, Design Principles, and Assumptions -- 1.4.1 Characteristics of ICN -- 1.4.2 Design Principles -- 1.4.3 Assumptions.-1.5 Key Building Blocks of ICN and Design Challenges -- 1.5.1 Key Building Block of ICN -- 1.5.2 Design Challenges.-1.6 Benefits of using ICN -- 1.7 Historical note on ICN -- Architectures for content communication -- 2.1 Introduction.-2.2 Representative ICN Architectures -- 2.2.1 TRIAD Architecture -- 2.2.2 DONA Architecture -- 2.2.3 Content Centric Network (CCN) Architecture -- 2.2.4 PURSUIT Architecture -- 2.2.5 Network Information (NetInf) architecture -- 2.2.6 The NDN architecture -- 2.3 Comparative analysis of ICN Architectures -- 2.4 Software Defined Networking in ICN -- 2.4.1 Scope of integrating SDN into ICN -- 2.4.2 The SDN architecture in general. -- 2.5 Summary -- 3 Naming for unique content identification -- 3.1 Introduction -- 3.2 Naming system design -- 3.3 Importance of naming -- 3.4 key design issues and choices for information/content naming for ICNs -- 3.5 Naming approaches proposed so far -- 3.5.1 CBCB (Combined broadcast and content based routing) -- 3.5.2 DONA (Data oriented network architecture) -- 3.5.3 NetInf (Network of information) -- 3.5.4 NDN (Named data networking) -- 3.5.5 PURSUIT (Publish subscribe Internet technologies) -- 3.5.6 Hierarchical and flat based hybrid naming scheme in CCN IoT -- 3.5.7 Secure naming scheme for Information Centric Networks -- 3.6 Analysis of naming schemes along with their advantages and disadvantages -- 3.6.1 Flat vs. hierarchical vs. attribute value-based naming approaches -- 3.6.2 Name based routing vs. Name resolution.-3.6.3 Incremental vs. Clean slate approach -- 3.7 Need of an efficient content naming mechanism: Our perspective -- 3.8 Open research in ICN Naming -- 3.9 Summary -- 4 Routing schemes used in content delivery -- 4.1 Introduction -- 4.2 Realization of routing in ICN -- 4.3 Realization of Forwarding in ICN -- 4.4. NDN forwarding architecture with illustration -- 4.5. Stateful forwarding paradigm for NDN -- 4.6. OSPFN: An OSPF based routing for NDN -- 4.6.1 Routing in OSPFN -- 4.7 NLSR: A Secure Link State Routing protocol for NDN -- 4.7.1 Naming scheme -- 4.7.2 Format of LSAs -- 4.7.3 Dissemination of LSAs -- 7.4 Adjacency Establishment -- 4.8 Recent development in ICN Routing -- 4.9 Open Research in ICN routing -- 4.10 Summary -- Caching mechanisms for faster content retrieval. -- 5.1 Introduction -- 5.1.1 General overview of network caching -- 5.2 Research challenges and issues in ICN caching -- 5.2.1 Unique naming of content and caches -- 5.2.2 Popularity of data -- 5.2.3 Limited storage space in caching devices -- 5.2.4 Storage location -- 2.5 Staleness or freshness detection of content -- 5.2.6 Repeated caching of same Content -- 5.2.7 Content Mobility -- 5.2.8 New research challenges for ICN caching -- 5.3 Recent trends in Caching -- 5.3.1 In-Network caching -- 5.3.2 Edge Caching -- 5.3.3 SDN based Caching -- 5.4 Performance metrics along with objectives in terms of caching mechanisms for ICN -- 5.4.1 Cache hit ratio and server load -- 5.4.2 Content retrieval latency -- 5.4.3 Retransmission ratio for interest packets -- 5.4.4 Total cache evictions -- 5.4.5 Diversity Metric -- 5.4.6 Cache retention ratio -- 5.5 Analysis of various caching methods -- 5.6 Open research in ICN caching -- 5.7 Summary -- 6 Security in ICN -- 6.1 Introduction 6.2 Importance of Security in ICN 6.3 Key Security & privacy concerns in ICN architectures 6.4 Attacks in ICN 6.4.1 Naming related attacks -- 6.4.2 Routing related attacks. 6.4.3 Caching related attacks. 6.4.4 Content poisoning attack -- 6.4.5 Miscellaneous attacks -- 6.5 ICN attributes leading to security threats -- 6.6 Security mechanisms adopted in ICN -- 6.6.1 Countermeasures for naming attacks -- 6.6.2 Countermeasures for routing attacks -- 6.6.3 Countermeasures for caching attacks -- 6.6.4 Countermeasures for content poisoning attacks -- 6.6.5 Countermeasures for miscellaneous attacks -- 6.7 Open research in ICN security -- 6.8 Conclusion -- 7. Optimization in ICN -- 7.1 Introduction -- 7.2 The need of optimization in ICN -- 7.3 Approaches for optimization in ICN -- 7.4 Machine learning for optimization in ICN -- 7.4.1 Application of ML in Communication Networks -- 7.4.2 Application of ML in Information Centric Networks -- 7.5 Open research directions for optimization in ICN -- 7.6 Conclusion -- 8. A framework for integrating SDN in ICN -- 8.1 Introduction -- 8.2 State of the art work in SDN based ICN -- 8.3 The SDN architecture for ICN -- 8.3.1 Based on OpenFlow over CONET -- 8.4 Proposed architecture -- 8.4.1 Functional description -- 8.4.2 Routing in the proposed model -- 8.4.3 Caching in the proposed model -- 8.5 Analysis of the proposed architecture -- 8.6 Future research direction in SDN enable ICN -- 8.7 Summary -- Integrating content communication into real life applications -- 9.1 Introduction -- 9.2 Recent trends in ICN applications -- 9.3 Information centric networks in Internet of things -- 9.3.1 Adaptation of information centric networks for internet of things (IoT) : Challenges and opportunities -- 9.4 Information centric networks in smart grid -- 9.5 Information centric networks in wireless sensor networks -- 9.6 Information centric networks in mobile adhoc networks -- 9.7 Information centric networks in vehicular adhoc networks -- 9.8 Open research in the field of content centric real life applications -- 9.9 Summary. 001439289 506__ $$aAccess limited to authorized users. 001439289 520__ $$aThis book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering. 001439289 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 2, 2021). 001439289 650_0 $$aComputer networks. 001439289 650_6 $$aRéseaux d'ordinateurs. 001439289 655_0 $$aElectronic books. 001439289 7001_ $$aSarma, Hiren Kumar Deva,$$eauthor. 001439289 7001_ $$aJadeja, Rajendrasinh,$$eauthor. 001439289 7001_ $$aDelvadia, Krishna,$$eauthor. 001439289 7001_ $$aGhinea, Gheorghita,$$eauthor. 001439289 77608 $$iPrint version:$$aDutta, Nitul.$$tInformation centric networks (ICN).$$dCham, Switzerland : Springer, 2021$$z303046735X$$z9783030467357$$w(OCoLC)1147276693 001439289 830_0 $$aPractical Networking,$$x2662-1711 001439289 852__ $$bebk 001439289 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-46736-4$$zOnline Access$$91397441.1 001439289 909CO $$ooai:library.usi.edu:1439289$$pGLOBAL_SET 001439289 980__ $$aBIB 001439289 980__ $$aEBOOK 001439289 982__ $$aEbook 001439289 983__ $$aOnline 001439289 994__ $$a92$$bISE