The road to dynamic Future Internet via content characterization

2017-04-01
Al-Turjman, Fadi
GÜNAY, MELİH
Kucukoglu, Irem
The Internet evolved from a network with a few terminals to an intractable network of millions of nodes. Recent interest in information-centric networks (ICNs) is gaining significant momentum as a Future Internet paradigm. The key question is, hence, how to model the massive amount of connected nodes with their content requests in dynamic paradigm. In this paper, we present a novel method to characterize data requests based on content demand ellipse (CDE), focusing on efficient content access and distribution as opposed to mere communication between data consumers and publishers. We employ an approach of a promising eminence, where requests are characterized by type and popularity. Significant case studies are used to demonstrate that critical properties of ellipses may be used to characterize the content request irregularity during peak times. Depending on the degree of irregularity, the curve we plot becomes elliptic with a positive eccentricity less than one and an orientation centered with a bias. Real traffic data have been used to demonstrate how various data demand/request types affect eccentricity, orientation, and bias. Through simulations, we propose a dynamic resource allocation framework for Virtual Data Repeaters (VDRs) by correlating the resource allocation schema with the factors that affect the CDE in ICN.
ANNALS OF TELECOMMUNICATIONS

Suggestions

An intrusion detection based approach for the scalable detection of P2P traffic in the national academic network backbone
Schmidt, Şenan Ece (2006-06-18)
The share of peer-to-peer (P2P) protocol in the total network traffic grows day-by-day in the Turkish Academic Network (UlakNet) similar to the other networks in the world. This growth is mostly because of the popularity of the shared content and the great enhancement in the P2P protocol since it first came out with Napster. The shared files are generally both large and copyrighted. Motivated by the problems of UlakNet with the P2P traffic, we propose a novel method for P2P traffic detection in the network ...
Improving performance of network intrusion detection systems through concurrent mechanisms
Atakan, Mustafa; Şener, Cevat; Department of Computer Engineering (2003)
As the bandwidth of present networks gets larger than the past, the demand of Network Intrusion Detection Systems (NIDS) that function in real time becomes the major requirement for high-speed networks. If these systems are not fast enough to process all network traffic passing, some malicious security violations may take role using this drawback. In order to make that kind of applications schedulable, some concurrency mechanism is introduced to the general flowchart of their algorithm. The principal aim is...
Developing a zigbee wireless network and controlling it through the internet
Kaynar, Kerem; Özgit, Attila; Department of Computer Engineering (2009)
The aim of this thesis is to develop a network, whose nodes communicate with the ZigBee wireless network protocol, and control this network with a PC through the Internet. One of the nodes of this network is designed to be master node. The other nodes are slave nodes. The master node can be connected to an Ethernet connected to the Internet. A PC can communicate with the master node via a specific web application over the Internet. The communication between a web server, in which the specific web applicatio...
A Novel Hybrid Grey Wolf Optimization Methodology for Resource Constrained Networks Kaynak Kisitli Aǧlar için Yeni Bir Hibrit Gri Kurt Eniyileme Metodolojisi
Sert, Seyyit Alper (2022-01-01)
Resource Constrained Networks (RCNs) are networks that mostly have constraints (limitation) on one or more of the basic element properties that make up the network. These networks, especially in the Internet of Things (IoT) or Wireless Sensor Network (WSN) examples, consist of nodes with poor performance in various aspects, and resource constraints become crucial for the nodes that have wireless connection to the network. A resource constraint could be in the form of bandwidth, which is one of the main feat...
Reroute sequence planning in multiprotocol label switching networks
Özbilgin, İzzet Gökhan; Bazlamaçcı, Cüneyt Fehmi; Department of Electrical and Electronics Engineering (2004)
The growth of the Internet has caused the development of new protocols that enable IP networks to be engineered efficiently. One such protocol, Multiprotocol Label Switching (MPLS) enables IP datagrams in backbone networks to be forwarded based on the label switching forwarding paradigm. In MPLS networks, rerouting of Label Switching Paths (LSPs) can be needed in order to attain a better resource utilization in the network. In this case, a sequence of LSPs has to be found for their one by one reconfiguratio...
Citation Formats
F. Al-Turjman, M. GÜNAY, and I. Kucukoglu, “The road to dynamic Future Internet via content characterization,” ANNALS OF TELECOMMUNICATIONS, pp. 209–219, 2017, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/67057.