Abstract:In the immediate aftermath of a natural disaster, network infrastructure is likely to have suffered severe damages that challenge normal communications. In addition to that, traffic substantially increases as a result of people attempting to get in touch with friends, relatives or the rescue teams. To address such requirements of a challenged network, we propose a communication framework based on messages that exploits namebased replication of content and enables ad-hoc communications with spatial and temporal… Show more
“…As we showed in [11] for instance, time and space scoping can provide significant performance benefits. Name-based routing in case of infrastructureless environments takes the form of name-based replication, where messages are forwarded based on the information included in the message name.…”
Section: B Mobile Opportunistic Networkmentioning
confidence: 86%
“…For instance, host centric, IP-based communication, has been repeatedly shown to be a poor fit for mobile environments, while a content-centric, request-response model seems to be meeting the requirements of client mobility [10] and network fragmentation [11]. Examples of other networking environments include machine-to-machine, smart grid applications [12], the Internet of Things (IoT) [13], vehicular [14] or home networking [15].…”
Section: Motivation Background and Requirementsmentioning
confidence: 99%
“…In such cases, although some connectivity might still exist, networks often become fragmented. Local communication with neighbouring nodes (e.g., [20]) when networks get fragmented cannot be supported by the current host-centric communication model [11].…”
Section: B Mobile Opportunistic Networkmentioning
confidence: 99%
“…However, as discussed in Section III, scoping information could also be included. Spatial scopes can be represented in several different ways such as a radius around a set of coordinates <type=circle; pos=x,y;radius=r>, or global hierarchical map format, e.g.,<country/state/city/postal-code> [11]. Temporal scoping is usually expressed through some time-tolive (TTL) value.…”
Section: Handling Caching Propertiesmentioning
confidence: 99%
“…In this approach baseline name-based forwarding can be performed at line speed, as the size of the name can remain fixed, regardless the networking environment. At the same time, devices of limited capacity can simply ignore the attributes of the data, letting more intelligent forwarding and/or caching decisions to be made by more powerful devices, or simply devices that have the required resources (e.g., memory) at the time of forwarding (i.e., this may vary in time) [11]. However, due to the variable size of the attributes list, advanced forwarding and caching decisions cannot be supported at line speed.…”
Abstract-The proposed shift from host-centric to information-centric networking (ICN) has triggered extensive research in the area of content naming. Efforts have so far focused on the scalability and security properties that can make content objects routable and self-certifying. In this paper, we argue that the information that is exposed through explicitly naming content objects has been overlooked, although several operational and performance issues depend on the information that a name holds. We therefore revisit content naming design decisions taking into account information exposure and deployability of the ICN paradigm.
“…As we showed in [11] for instance, time and space scoping can provide significant performance benefits. Name-based routing in case of infrastructureless environments takes the form of name-based replication, where messages are forwarded based on the information included in the message name.…”
Section: B Mobile Opportunistic Networkmentioning
confidence: 86%
“…For instance, host centric, IP-based communication, has been repeatedly shown to be a poor fit for mobile environments, while a content-centric, request-response model seems to be meeting the requirements of client mobility [10] and network fragmentation [11]. Examples of other networking environments include machine-to-machine, smart grid applications [12], the Internet of Things (IoT) [13], vehicular [14] or home networking [15].…”
Section: Motivation Background and Requirementsmentioning
confidence: 99%
“…In such cases, although some connectivity might still exist, networks often become fragmented. Local communication with neighbouring nodes (e.g., [20]) when networks get fragmented cannot be supported by the current host-centric communication model [11].…”
Section: B Mobile Opportunistic Networkmentioning
confidence: 99%
“…However, as discussed in Section III, scoping information could also be included. Spatial scopes can be represented in several different ways such as a radius around a set of coordinates <type=circle; pos=x,y;radius=r>, or global hierarchical map format, e.g.,<country/state/city/postal-code> [11]. Temporal scoping is usually expressed through some time-tolive (TTL) value.…”
Section: Handling Caching Propertiesmentioning
confidence: 99%
“…In this approach baseline name-based forwarding can be performed at line speed, as the size of the name can remain fixed, regardless the networking environment. At the same time, devices of limited capacity can simply ignore the attributes of the data, letting more intelligent forwarding and/or caching decisions to be made by more powerful devices, or simply devices that have the required resources (e.g., memory) at the time of forwarding (i.e., this may vary in time) [11]. However, due to the variable size of the attributes list, advanced forwarding and caching decisions cannot be supported at line speed.…”
Abstract-The proposed shift from host-centric to information-centric networking (ICN) has triggered extensive research in the area of content naming. Efforts have so far focused on the scalability and security properties that can make content objects routable and self-certifying. In this paper, we argue that the information that is exposed through explicitly naming content objects has been overlooked, although several operational and performance issues depend on the information that a name holds. We therefore revisit content naming design decisions taking into account information exposure and deployability of the ICN paradigm.
In recent years large attention is being devoted to a new networking trend focused on data centricity. The major motivation has been the development of a framework able to mitigate the mismatch between the current Internet architecture -host based -and the way most users use the network -agnostic of content location. The first proposals were focus on fix infrastructures in an attempt to devise a data-centric solution for the global Internet. On the other hand, the number of available wireless Internet access points and wireless mobile devices is growing significantly. Hence, it is very important to have in mind scenarios where networked pervasive systems need to communicate independently of the networking conditions. In such pervasive networks, it is important to support the development of communication services aware of users' context: the goal would be to increase data usefulness and delivery probability, as well as to reduce cost and latency. This article presents an information and context oriented networking framework (ICON) able to support the deployment of pervasive networks by combining two networking paradigms that are highly correlated to the efficiency of data sharing: data-centric networking and opportunistic networking.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.