Future Internet Architecture
Information Centric Networking
Named Data Networking
MetadataShow full item record
PublisherThe University of Arizona.
RightsCopyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author.
AbstractThe Named Data Networking (NDN) is a new Internet architecture that changes the network semantic from packet delivery to content retrieval and promises benefits in areas such as content distribution, security, mobility support, and application development. While the basic NDN architecture applies to any network environment, local area networks (LANs) are of particular interest because of their prevalence on the Internet and the relatively low barrier to deployment. In this dissertation, I design NDN protocols and implement NDN software, to make NDN communication in LAN robust and efficient. My contributions include: (a) a forwarding behavior specification required on every NDN node; (b) a secure and efficient self-learning strategy for switched Ethernet, which discovers available contents via occasional flooding, so that the network can operate without manual configuration, and does not require a routing protocol or a centralized controller; (c) NDN-NIC, a network interface card that performs name-based packet filtering, to reduce CPU overhead and power consumption of the main system during broadcast communication on shared media; (d) the NDN Link Protocol (NDNLP), which allows the forwarding plane to add hop-by-hop headers, and provides a fragmentation-reassembly feature so that large NDN packets can be sent directly over Ethernet with limited MTU.
Degree ProgramGraduate College
Degree GrantorUniversity of Arizona
Showing items related by title, author, creator and subject.
The Implications for Network Switch Design in a Networked FTI Data Acquisition SystemCranley, Nikki; ACRA Control (International Foundation for Telemetering, 2011-10)Switches are a critical component in any networked FTI data acquisition system in order to allow the forwarding of data from the DAU to the target destination devices such as the network recorder, PCM gateways, or ground station. Commercial off the shelf switches cannot meet the harsh operating conditions of FTI. This paper describes a hardware implementation of a crossbar switching architecture that meets the reliability and performance requirements of FTI equipment. Moreover, by combining the crossbar architecture with filtering techniques, the switch can be configured to achieve sophisticated forwarding operations. By way of illustration, a Gigabit network tap application is used to demonstrate the fundamental concepts of switching, forwarding, crossbar architecture, and filtering.
Design and performance evaluation of a proposed backbone network for PC-Networks interconnectionMartinez, Ralph; Fang, Jun-Wai, 1960- (The University of Arizona., 1989)This thesis is concerned with the design of a high-speed backbone network which provides a high bandwidth interconnection for various Personal Computer Networks (PC-Networks) with an integrated service of voice and data. With the advanced technology of optical fiber as the transmission medium, several different existing topologies and protocols are discussed for the backbone network design. The token ring protocol is simulated and evaluated to find out a suitable buffer size and the length of voice and data packet for backbone network. The Network II.5 simulation tool is applied to simulate the token ring simulation model with different parameters. The Network Interface Unit (NIU) is designed from the simulation results with a cost-effective consideration.
RISK ASSESSMENT IN TELEMETRY NETWORKS: ACADEMIC NETWORK ENVIRONMENT CASE STUDYOdejobi, Moses; Zegeye, Wondimu; King, Ronald; Moazzami, Farzad; Dean, Richard; Oladiputo, Adebisi; Morgan State University, Department of Electrical and Computer Engineering (International Foundation for Telemetering, 2018-11)This paper develops and utilizes a method for analyzing, modeling and simulating cyber risks in a networked environment as part of a risk management model by incorporating an approach that will be used for the development of attacks, detection, controls from real data or assumptions. The risk assessment considers Morgan State University’s network as a case study, which can be migrated to a networked telemetry system. Recent attacks on more than 300 U.S. universities targeting university professors, students, and faculty to collect credentials of the victims’ university library accounts have been identified by the PhishLabs. This research work develops a model for cyber-attack risk assessment and countermeasures for the security of distributed and decentralized Servers resource in academic and other environments.