22nd International Conference on Data Engineering Workshops (ICDEW'06) 2006
DOI: 10.1109/icdew.2006.41
|View full text |Cite
|
Sign up to set email alerts
|

Content and Context Aware Networking Using Semantic Tagging

Abstract: Today's model of networking primarily concentrates intelligence at the end hosts with the network itself offering a simple"best-effort","data agnostic" communication medium. However, this paradigm has proven to be insufficient to meet todays needs considering the diversity of applications and devices that are networked. To offer value added services to these end users and applications, more and more intelligence needs to be migrated away from the edges and into the network in a controlled and tractable manner.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 27 publications
(26 reference statements)
0
9
0
Order By: Relevance
“…In prior work from our group [9], we proposed the CoCoNET architecture for content based networking in which packets are semantically tagged using an operator specified ontology. The meta data could be used to specify a variety of properties such as type of data, security credentials etc.…”
Section: Related Workmentioning
confidence: 99%
“…In prior work from our group [9], we proposed the CoCoNET architecture for content based networking in which packets are semantically tagged using an operator specified ontology. The meta data could be used to specify a variety of properties such as type of data, security credentials etc.…”
Section: Related Workmentioning
confidence: 99%
“…Using semantic tags and associated rules, the reasoner is smart enough to differentiate between a network surveillance video (admin traffic) and a regular movie clip which traditional techniques such as packet header inspection cannot because both will appear as standard MPEG flows. In addition, the reasoner can also specify intraflow packet prioritization driven by policies [8]. V. RELATED WORK Policy based networks and approaches have been the focus of extensive research in recent years.…”
Section: Simulation Toolkitmentioning
confidence: 99%
“…Network nodes such as switches and routers execute the code embedded in the packet to support customized treatment of data packets [9,10]. This architecture mainly aims to enhance networks facilitates with computation abilities permitting the deployment of new services into the network in an ondemand manner.…”
Section: Related Workmentioning
confidence: 99%