77范文网 - 专业文章范例文档资料分享平台

Content and context aware networking using semantic tagging(2)

来源:网络收集 时间:2021-04-05 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

Today’s model of networking primarily concentrates intelligence at the end hosts with the network itself offering a simple“best-effort”,“data agnostic ” communication medium. However, this paradigm has proven to be insufficient to meet todays needs co

timediastream(ie.generalize)orapartofaPFrame(ie.specialize)dependinguponthegranularityofthedescrip-tionprovidedandtheknowledgebaseoftherouter.

ItcanbearguedthatoneofthemostimportantreasonswhythecurrentInternetissowidelyacceptedanddeployedisprimarilyduetoitslayeredarchitecture.Thenetworkstackisimplementedasdifferentlayers,whereeachlayeroffersawellde nedfunctionality,iswellencapsulatedandcanbedevelopedindependentoftheothers.Wellde nedSer-viceAccessPoints(SAPs)arespeci edtoclearlyde nethedataandprimitivesexchangedbetweenadjacentlayersinthestack.Whilethisisthecurrentlyacceptedmodelofanetworkstack,recentyearshaveseenincreasedinterestintheareaofcrosslayeroptimizations.Theideahereistotrytoprovidealayerinthenetworkingstackwithadditionalcontextualinformationsothatamoreinformeddecisioncanbemadeonthedatahandledbythatlayer.Proponentsofthismodelarguethatwithsuchinteractions,bandwidthus-ageoptimization,moreef cientrouting,betterQoSguar-antees,betterpowerutilizationetc.canbeachieved.Ourframeworkprovidesthemeanstoexploitsuchcrosslayertechniquestoallow“hints”providedbyhigherlayerstobeusedlowerdowninthestackandlikewise,applicationsrun-ningontopoftheframeworkcanalsoregistertobenoti edofchangesinthenetworkconditionsthataremeaningfultothem.Alocalpolicyenforcementenginecontrolsthein-teractionsthatarepermissible.Throughthis,systemwidepoliciescanbedistributedthroughoutthenetworkthatareenforcedlocallyandacrossthenetworktocoordinatetheinteractionsanddatatransport.

Therestofthispaperisorganizedasfollows.Section2presentssomeoftherelevantbackground.Section3presentsourproposedapproach.Section4presentsresultsofoursimulationstudieshighlightingbene tsofcontentawarenessinthenetworkfollowedbyourconclusion.

atedassemblylanguagecalledSpannertoencodeacom-pleteprogramintoasingleIPv4orIPv6datagram.TheSwitchWareproject[4]takesasimilarapproachutilizingaspecializedlanguagecalledPLANwhosecapabilitiesarerestrictedtoonlyperforming“safe”operationsonanynode.ANTS[34]utilizesacombinationofmobilecode,demandloadingandcaching.Similartotheothermodels,anANTSnetworkconsistsofnodesrunninganANTSplatform,pack-etsarereplacedwithsmartcapsulescapableofexpressingmainlyforwardingroutinesandmechanismsarebuiltintothemodelforon-demandcodedissemination.Othersim-ilarapproaches[19]havefocusedonensuringquickjust-in-timecompilationofdownloadedcodetooptimizetheirperformancealongwithstaticlanguageveri cation.TheActiveSignalingProtocol(ASP)[13]takesadifferentap-proachtoactivenetworksbygoingawayfromthecapsulemodelandhavingdatapacketscarryareferencetosomeportablecodewhichcanbedownloadedonthe yandrunonanASPExecutionEnvironmentasnecessarytoenableanewactiveapplication.ActiveServices[5]takesanal-ternatemodeltointroductionofintelligenceintothenet-workbyrestrictingtheintelligencemainlytotheapplica-tionlayertherebypreservingtheroutingandforwardingse-manticsoftheInternetarchitecture.Asimilarapplicationlevelprocessingofuser-dataisconsideredin[10]tohandlecongestioncontrolinthenetwork.Thearchitectureallowsforapplicationstospecifyintra-networkprocessingbyus-ingActiveProcessingFunctionIdenti ers(APFI)sothatbandwidthallocatedcanbeintelligentlyreducedinaman-nertailoredtotheapplicationratherthangenerically.Whileactivenetworksareaverypowerfulparadigm,thereareseveraldrawbacksthathavehinderedtheiracceptanceandwidespreaddeployment.Theprimaryconcerniswithsecurityandprotectionagainstactiveroutersrunningmali-ciouscodehiddeninactivepackets.Approachesthatlimittheallowableoperationstoasafesubsetlimitthepowerofspecializedhandlingthatispossible.Anequallyimportantissueisthatnetworkoperatorsprefertohavecompletecon-trolovertheirnetworkandallowinguserde nedcodetobedownloadedandexecutedthatcouldpotentiallymakerout-ingdecisionsfordatastreamsisnotveryamenableforac-ceptance.Manyapproachesutilizedcustomizedplatformsandlanguagesraisinginteroperabilityconcerns.Also,thestateofthetechnologyinnetworkprocessorsatthattimepresentedchallengesforthetruerealizationofthisap-proach.Withourframework,weareworkingtowardsthesamegoalofmakingnetworkssmarterbutdoingsowithacompletelydifferentapproachthanactivenetworks.Ourframeworkallowsforthespeci cationof“whattypeofdata”is owingthroughthenetworkratherthanspecifying“howthatdatashouldbehandled”.Essentially,ourframe-workprovidesthehintstothenetworkfabricthroughcon-tentmetadatabuttheactualdecisionofhowbesttohandle2

2RelatedWork

2.1ActiveNetworks

ActiveNetworksisoneoftherevolutionaryapproachestoinjectintelligenceintothenetwork.Atanextremecase,thiscanbeviewedasanefforttoaugmentdatapacketswithcodefragmentscontainingspecializedprocessinglogicforhandlingthatpacket.“Active”routersexecutethecodecar-riedinthepacketallowinghighlycustomizedhandlingof owsorpackets.Thisarchitecturepermitsmassiveincreaseinthecomputationperformedwithinanetworkallowingforthedeploymentofnewservicesintothenetworkinatotallyseemlessandon-demandmanner.Severalprojectshavetakenthisapproachtoimpartingintelligenceintothenet-work.TheSmartPackets[29]approachutilizesaspecial-izedprogramminglanguagecalledSprocketandanassoci-

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说教育文库Content and context aware networking using semantic tagging(2)在线全文阅读。

Content and context aware networking using semantic tagging(2).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/jiaoyu/1204107.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: