Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Towards a Practical Architecture for the Next Generation Internet of Things  [PDF]
Prasant Misra,Yogesh Simmhan,Jay Warrior
Computer Science , 2015,
Abstract: The Internet of Things, or the IoT is a vision for a ubiquitous society wherein people and "Things" are connected in an immersively networked computing environment, with the connected "Things" providing utility to people/enterprises and their digital shadows, through intelligent social and commercial services. Translating this idea to a conceivable reality is a work in progress for more than a decade. Current IoT architectures are predicated on optimistic assumptions on the evolution and deployment of IoT technologies. We believe many of these assumptions will not be met, consequently impeding the practical and sustainable deployment of IoT. In this article, we explore use-cases across diff?erent applications domains that can potentially benefi?t from an IoT infrastructure, and analyze them in the context of an alternative world-view that is more grounded in reality. Despite this more conservative approach, we argue that adopting certain design paradigms when architecting an IoT ecosystem can achieve much of the promised benefi?ts in a practical and sustainable manner.
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things  [PDF]
Tapalina Bhattasali,Rituparna Chaki,Nabendu Chaki
Computer Science , 2014,
Abstract: Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. Current security solutions fail as new threats appear to de-struct the reliability of information. The network has to be transformed to IPv6 enabled network to address huge number of smart objects. Thus new addressing schemes come up with new attacks. Real time analysis of information from the heterogeneous smart objects needs use of cloud services. This can fall prey to cloud specific security threats. Therefore need arises for a review of security threats for a new area having huge demand. Here a study of security issues in this domain is briefly presented.
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture  [PDF]
Oliver Hanka,Michael Eichhorn,Martin Pfannenstein,J?rg Ebersp?cher,Eckehard Steinbach
Future Internet , 2011, DOI: 10.3390/fi3010014
Abstract: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme. The security approach is based on Threshold Cryptography which enables a sharing of keys among the mapping servers. Hence, a more trustworthy and fair approach for a Next Generation Internet Architecture as compared to the state of the art approach is fostered. Additionally, we give an evaluation based on IETF AAA recommendations for security-related systems.
Research on Next-Generation Internet Architecture
Jian-Ping Wu,Ke Xu,

计算机科学技术学报 , 2006,
Abstract: The primary problem during the evolvement of next-generation Internet is the contradiction between growing requirements for Internet and the insufficient development of network theory and technology. As the fundamental principles to guide the developing direction of Internet, the study of Internet architecture is always a focus in the research community. To address the core issue of network scalability, we propose multi-dimension scalable architecture of next-generation Internet, the main idea of which is to extend the single-dimension scalability of traditional Internet on interconnection to multi-dimension scalability of next-generation Internet. The multi-dimension scalability is composed of scale-scalability, performance-scalability, security-scalability, function-scalability, and service-scalability. We suggest five elements, namely, IPv6, authentic IPv6 addressing, scalable processing capacity of routers, end-to-end connectionless Quality-of-Service control, and 4over6 mechanism to realize the multi-dimension scalability. The current research results show that the multi-dimension scalable architecture composed of these five elements will bring great influence on next-generation Internet.
Network Service Description and Discovery for the Next Generation Internet  [cached]
Enyue Lu,Qiang Duan
International Journal of Computer Networks , 2009,
Abstract: The next generation Internet will face new challenges due to the coexisting heterogeneous networks and highly diverse networking applications. Therefore how to coordinate heterogeneous networking systems to support a wide spectrum of application requirements becomes a significant research problem. A key to solving this problem lies in effective and flexible collaborations among heterogeneous networking systems and interactions between applications and the underlying networks. Network virtualization plays a crucial role in enabling such collaborations and interactions, and the Service-Oriented Architecture (SOA) provides a promising approach to supporting network virtualization. Network service description and discovery are key technologies for applying SOA in networking, and the current service description and discovery technologies must be evolved to meet the special requirements of future Internet. In this paper, we study the problem of network service description and discovery to support network virtualization in the next generation Internet. The main contributions of this paper include a general approach to describing service capabilities of various heterogeneous networking systems, a technology to discover and select the network services that guarantee the QoS requirements of different networking applications, a general profile for specifying networking demands of various applications, a scheme of network resource allocation for QoS provisioning, and a system structure for realizing the network description, discovery, and resource allocation technologies. We also propose information update mechanisms for improving performance of the network service description and discovery system. The approach and technology developed in this paper are general and independent of network architectures and implementations; thus are applicable to the heterogeneous networking systems in the next generation Internet.
Towards Next Generation Internet Management: CNGI-CERNET2 Experiences
Jia-Hai Yang,Hui Zhang,Jin-Xiang Zhang,Chang-Qing An,

计算机科学技术学报 , 2009,
Abstract: Manageability is an important feature of next generation Internet; management and monitoring of IPv6-based networks are proving a big challenge. While leveraging current IPv4-based SNMP management scheme to IPv6 networks’ management need is necessary, it is more urgent to coin a new network management architecture to accommodate the scalability and extensibility requirements of next generation Internet management. The paper proposes a novel network management architecture, IMN (Internet Management Network), which creates an overlay network of management nodes. While each management node can perform management tasks autonomously and independently, it can finish more sophisticated management tasks by collaboratively invoking management operations or sharing information provided by other management nodes. P2P-based communication services are introduced in IMN to enable such collaboration. The paper presents a prototyping implementation based on the Web service related technology, as well as some of the key technologies, especially solutions to those issues arising from the management practice of CERNET2. Experiences of deployment of CERNET2 operation and lessons learned from the management practice are discussed. Electronic supplementary material The online version of this article (doi: ) contains supplementary material, which is available to authorized users. This work is supported by the National High-Tech Research and Development 863 Program of China under Grant Nos. 2007AA01Z2A2, 2008AA01A303, 2009AA01Z205, the National Basic Research 973 Program of China under Grant No. 2003CB314806, the National Science and Technology Supporting Plan of China under Grant No. 2008BAH37B05.
Mobile Ad-hoc Network Internetworking with Next generation Internet  [PDF]
A. Velmurugan,R. Rajaram
Information Technology Journal , 2005,
Abstract: Mobile ad-hoc networks (MANETs) are infrastructure-less dynamic networks allowing mobile nodes to communicate beyond transmission range by supporting multihop communication through IP routing. A MANET connected to the Next generation internet (IPv6) is more useful in enriching the application range of ad-hoc networks. This interconnection is achieved by using an internet router called as gateway, which act as bridges between a MANET and the internet. The concept of Gateway Discovery is introduced into an existing reactive ad-hoc routing protocol AODV with enhancement called as EAODV. In this approach, a source finds a route to the destination either through another mobile node or fixed wired node in internet. Here the intermediate nodes in the MANET just pass the message request to find the default route to the gateway. The packet formats for EAODV are changed and newly added for this scenario. Three methods for gateway discovery are available. The first is a proactive scheme, which allows periodical gateway advertisements to all nodes in the ad-hoc network from the gateway. The second is a reactive scheme, which utilises solicitation and advertisement signaling between a wireless node and the gateway. The third is a hybrid scheme, which allows mobile nodes within a certain range around gateway use proactive, while mobile nodes residing outside this range use reactive gateway discovery to obtain information about the gateway. Simulation results show that with EAODV routing protocol with different gateway discovery approaches display comparable results for packet delivery ratio, Normalized overhead and normalized packet drop. The simulation is performed to test node mobility and movement characteristics in communication between not only mobile nodes in an ad-hoc network, but also between a mobile node in an ad-hoc network and a fixed node in internet.
Dovetail: Stronger Anonymity in Next-Generation Internet Routing  [PDF]
Jody Sankey,Matthew Wright
Computer Science , 2014,
Abstract: Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than obfuscating network identity through higher level protocols, we propose a more direct solution: a routing protocol that allows communication without exposing network identity, providing a strong foundation for Internet privacy, while allowing identity to be defined in those higher level protocols where it adds value. Given current research initiatives advocating "clean slate" Internet designs, an opportunity exists to design an internetwork layer routing protocol that decouples identity from network location and thereby simplifies the anonymity problem. Recently, Hsiao et al. proposed such a protocol (LAP), but it does not protect the user against a local eavesdropper or an untrusted ISP, which will not be acceptable for many users. Thus, we propose Dovetail, a next-generation Internet routing protocol that provides anonymity against an active attacker located at any single point within the network, including the user's ISP. A major design challenge is to provide this protection without including an application-layer proxy in data transmission. We address this challenge in path construction by using a matchmaker node (an end host) to overlap two path segments at a dovetail node (a router). The dovetail then trims away part of the path so that data transmission bypasses the matchmaker. Additional design features include the choice of many different paths through the network and the joining of path segments without requiring a trusted third party. We develop a systematic mechanism to measure the topological anonymity of our designs, and we demonstrate the privacy and efficiency of our proposal by simulation, using a model of the complete Internet at the AS-level.
Small-world or Scale-Free Phenomena in Internet: What Implications for the Next-generation Networks?  [cached]
Zouhaier M’ Chirgui
Review of European Studies , 2012, DOI: 10.5539/res.v4n1p85
Abstract: The paper examines the large-scale topological structure of the Internet in order to see whether the structure exhibits some features that lead Internet Services Providers to go aside further collaboration for the deployment of next-generation networks. The results indicate the existence of positive signs or early stages of possible move towards more cooperative relationships, mainly among backbones. These findings have implications for the next-generation networks policy and strategy, particularly the move towards strategic alliances after the recent phase of mergers and acquisitions.
Service Management Research Based On Next Generation Internet

YUAN Man AI Guang-Ping LUO Jun KAN Zhi-Gang HU Jian-Ping MA Jian,

计算机科学 , 2003,
Abstract: Internet is best effort network, on the whole,it doesn't provide any quality of service assurance for services. Especially. all kinds of stream media need more network performance and quality of service. Currently, because of existing many heterogeneous networks, such as telecommunication network, IP data network,mobile network and so on,in order to break off this heterogeneous network isolated complexion,research and development next generation network must be carried out,only by this way,can these isolated heterogeneous network be merged into an all IP network. This network will provide enormous services for service users,how to manage these services effectively is a topic proposed by next generation internet. 1] gave research status for service management and advance, this paper researches service management requirement for next generation Internet and workflow etc. and based on these technique,a service management architecture model is proposed. It consists of service access layer, service deployment layer, service providing layer, service mapping layer, policy control layer and network element managing layer. These layers coordinate to implement service management.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.