StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Named data networking - Term Paper Example

Cite this document
Summary
Named data networking is a new architecture that has been developed to revolutionize the current internet architecture. There is no doubt the network engineers have made significant development in the current network design…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Named data networking
Read Text Preview

Extract of sample "Named data networking"

? d Data networking Introduction d data networking is a new architecture that has been developed to revolutionize the current internet architecture. There is no doubt the network engineers have made significant development in the current network design. Indeed, current networks have many innovations that have transformed how data are shared between various computers connected to the internet. Despite these, the same network is characterized by many challenges that have hindered the transfer of data between different endpoints. However, the named data networking is a paradigm that is poised to overcome the many challenges facing current implementation of networks. The introduction of named data networking will give more emphasis on data, liberate content from providers and provide a myriad of benefits to computer users, despite having some limitations. How named data network works The development of the named data networking is based on a number of concepts that work to improve how data is shared across the internet. These concepts shape the function of any named data network based on the principle of named data networking. In a named data networking, each piece of data has a name, which uniquely identifies the data anywhere in the network configuration. In addition, all pieces of data provide more information on what they contain rather than what they are. The change from who to what is a significant shift that defines how named data networks function (Chen, Goes, & Marsden 154). The most significant information about the named data network is the way in which data is shared among different host. When a host require data from a content provider, the host will send an interest data that will evaluated by the host and a response generated. The response will provide the host with data packet that will contain the data, as well as the requested named attached to it. This approach defines the operation of named data networks with data being at the center of networks. Apart from how data are requested and served to network host, named data networks provide elaborate security. During the exchange of data, servers and other content stores must authenticate data. In a named data network, authentication is performed using data signing. This is a process where data are signed with unique signature name that also secure the metadata. The specific signatures are public keys with binding enforced between names and data. Because of this, a named data network does not need a name lookup process. Named data networks also have encryption mechanism that secures packets during transit from one location to another. Naming principles are a core function that influences the functioning of named data network. In a named data network, variable length identifiers are used to name data thus categorizing them into hierarchies. Content versions and segments are used to characterize information at the lower levels of a named data network (Serpanos and Wolf 23). When in use, the named data network works by specifying how information can traverse the network. The selection process is done when a host sends an interest group. The transport strategy in named data networks entails sending of single data packets in response to each interest packet received. In some instances, network hosts can send many interest packets to ensure that flow of data is controlled in some applications. With the difficulty of flow control, network nodes learn the best strategy to send their packets to support an end-to-end communication. Content segments are also used to replace TCP sequence numbers in use. Named data networks have different routing mechanism. A named data network makes use of a mechanism that provides link advertisement between various nodes. This advertisement provides includes a named prefix. Similarly, OSPF protocols can be used to achieve intra-domain routing that includes type-label values that indicated in the protocol segment. The use of names removes the challenge of using IP architecture for routing information. In this network, a named data network router will broadcast name prefixes that will define the path the information will traverse. The transfer of packets from one router to another is made possible using signing of data that prevent data from being spoofed. Advantage of naming data networks Named data networking excels on how it handles many problems that are currently facing the internet architecture such as routing issues. Named data networks use an elegant approach that offers interoperability with the current IP structure. For instance, the naming system used by named data network offers a robust way of communication across various networks. The design of named data networks allows the sharing of content from various stores without problems of streaming. Because of this, the named data network support the use of Voice over Internet protocol and other real time voice and video applications. Certainly, this network architecture ensures that contents are distributed effectively. An advantage of naming data network is its ability to integrate into existing networks thus saving cost on hardware and software tools. Moreover, named data networks support many of the current protocols that are used in IP networks. Named data networks provide a robust security that ensures that data are secured during transit. Unlike other network, implementation of named network data ensures that all packets are signed and verified during the routing process. The signing of data is thus a security measure that provides robust security at the data level (Snasel 127). Cons of named data networking There are significant numbers of concerns that have been raised on the scalability of the interest packets. The effectiveness of the scalability option is believed to present issues given that named data networks are likely to generate countless number of interest packets. The use of unbounded address space is also another challenge that makes named data network difficult to implement. In the current hardware, the use of unbound address is likely to cause problems as current hardware may not offer support. Comparison with current technology The need for named data networking stems from a number of shortcoming experienced in the current internet architecture. Whereas the current internet architecture has stood various challenges such as increased used of internet resources, there are other critical shortcomings that cannot be ignored. The development of the TCP/IP protocol was a significant move for the current internet configuration allowing data to be transported from one end to another. Nevertheless, recent development in the internet has made the problem change. Today, the proliferation of services such as YouTube, Facebook, iTunes, Twitter and other social application has changed focus from where the location of data to the attributes of data itself. This is a major challenge given that the current internet paradigm makes use of specific servers to store data. Device portability is another challenge to modern network configurations. In the past, many of the network devices were static, and their movement was not a problem. However, the introduction of devices such as smartphones, tablets have changed the way in which devices appear in a network topology. This is because change of location often triggers a change of address, which results to change of identity. This is thus one area that named data is focused on solving. Whereas named data networks allow devices to roam a network, other networks pose challenges when it comes to movement of devices within a network topology. Multicast is another challenges that create a hurdle in the current internet configurations. This is complicated by the fact that many applications have to contend with point to multipoint traffic such as many host accessing a particular video clip from a website. Applications such as video streaming are at the center of interest when it comes to evaluating the areas where named data networking will address, therefore, reducing problems experienced posed by multicast traffic. Named data networks have better multicast functions. Security of data in current internet architecture is also another reason why named data networking is being developed. Under the current security, data containers are secured and not the data itself. This implies that many communication links between servers and host are secured, but the data are left without any sort of security. With the risks of data theft, named data networking is envisioned to eradicate these challenges and introduce security at the data level. In named data networks, there is more security as compared to other networks. Conclusion Named data networks provide a novel way to address issues of data transfer between different nodes located on the internet. Through the use, of interest and data packets, named data networks transform how networks work. The named data network architecture allows routing of data based on name prefixes and not on IP information. There are several advantages that are associated with this network such as efficiency of naming convention, sharing of data among users, and provision of robust security of data packets. However, named data networks are also regarded to have challenges on scalability of interest packets, as well as its implementation in the current network architecture. Despite these challenges, named data network provides a robust approach data transfer that is different from existing network implements. These differences stem from routing mechanisms, security protocols and device portability. Works Cited Chen, Andrew N. K., Goes, Paulo B. & James R. Marsden. A Query-Driven Approach to the Design and Management of Flexible Database Systems. Journal of Management Information Systems, 19.3.(2003):121-154 Clark, Martin P. Data networks, IP, and the Internet: protocols, design, and operation. New Jersey: John Wiley and Sons. 2003. Print. Denko, M. K., Tianruo, Laurence & Yan Zhang, Yang. Autonomic Computing and Networking. New York: Springer. 2009. Print. Serpanos, Dimitrios & Wolf, Tilman. Architecture of Network Systems. New York: Elsevier. 2011. Print. Snasel, Vaclav. Digital Information Processing and Communications. New York: Springer. 2011. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Named data networking Term Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Named data networking Term Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1436754-named-data-networking
(Named Data Networking Term Paper Example | Topics and Well Written Essays - 1250 Words)
Named Data Networking Term Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1436754-named-data-networking.
“Named Data Networking Term Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1436754-named-data-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Named data networking

The History of Networking Technologies

The History of networking Technologies Computer networking is a discipline dealing with the different technologies that are involved in network application and establishment of a computer network, or a set of computers connected to facilitate exchange of information (Cassel and Austing, 2000, p.... hellip; The history and development of the networking technologies is important in understanding the different stages and applications available today and in projecting of technologies that will be available in the future....
8 Pages (2000 words) Essay

Data Communication & Networking: Hotwire Pty Ltd

This case study "Data Communication & networking: Hotwire Pty Ltd" presents the company that requires a bandwidth that can support its network for more than five years to come.... The Web Development Company (WDC) will require server systems with the capacity for data storage and high-speed processor for the purpose of high performance....
10 Pages (2500 words) Case Study

Internetworking Data Communication between Various Systems

Three types of networking exist.... he lowest layer is the Host-to-Network Layer and this layer has direct contact with the networking hardware.... "Internetworking data Communication between Various Systems" paper describes the major purpose of Internetworking that is sharing data and resources.... In the internetworking data communication between various systems is done based on certain protocols.... A data in a computer is going to the network from the Application Layer to the Host-to-Network Layer through the intermediate layers....
7 Pages (1750 words) Coursework

Data Communication and Networking

The author concludes that networking may continue to expand to the extent where you may actually be able to use the webcam placed in your refrigerator to check whether you need any milk while coming home from the office.... Such will be the power and importance of networking in the years to come.... In addition, networking also helps in reducing the cost of saving work in different soft copies and hard copies since it allows the sharing of work....
8 Pages (2000 words) Term Paper

Berkeley Internet Name Domain Spoofing Attack

In this assignment, the writer will focus on securing BIND from the spoofing attack and the configuration needed to log that specific data transfer.... nbsp;The attacker could affect the name server, which would allow recursive queries from any source to look up and cash the data.... This can result in the victim name server starting to cash and serve bogus data.... A non-recursive name server is secure from cash poisoning and also DoS attack because a non-recursive name server will just respond to the queries that send to it directly and will not send queries so it does not cash any information or data....
9 Pages (2250 words) Assignment

Assessment of a social networking company

The growth trends of social networking industry are remarkable.... Earning Revenue from Advertising:The boom in social networking has blossomed opportunities for advertisers to start using these networks as a vehicle to reach their target market.... in Italy, Maserati is using social networking websites to reach out to its customers.... owever, if we analyze the situation, we can reach a conclusion that those advertisers who want to advertise on social networking sites have to overcome a few challenges....
11 Pages (2750 words) Essay

Open Shortest Path First and Routing Information Protocol

Routing is the process of selecting a path through which to send data in network traffic.... Routing can be applied in various ways such as internet protocols, for sending packet data or even in telephones.... The Each of the algorithms is discussed in this paper, in an attempt to bring out their operations and effectiveness in terms of transmission of the packet data, in an electronic data transfer (Sendra, Fernández, Quilez, & Lloret, 2011) This is the most widely used protocol due to its dynamism in the transfer of electronic data that is in the internet protocol networks....
5 Pages (1250 words) Research Paper

Networking Essentials

… The paper "networking Essentials" is a wonderful example of a case study on logic and programming.... The writer then proceeds to the main body where he introduces networking, and the reason for the choice of such a network.... The paper "networking Essentials" is a wonderful example of a case study on logic and programming.... The writer then proceeds to the main body where he introduces networking, the type of network used, and the reason for the choice of such a network....
9 Pages (2250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us