scispace - formally typeset
Proceedings ArticleDOI

Invariants: a new design methodology for network architectures

Reads0
Chats0
TLDR
This paper proposes a complementary methodology, motivated by the view that evolution and interworking flexibility are determined not so much by the principles applied during initial design, but by the choice of fundamental components or "design invariants" in terms of which the design is expressed.
Abstract
The first age of Internet architectural thinking concentrated on defining the correct principles for designing a packet-switched network and its application protocol suites. Although these same principles remain valid today, they do not address the question of how to reason about the evolution of the Internet or its interworking with other networks of very different heritages. This paper proposes a complementary methodology, motivated by the view that evolution and interworking flexibility are determined not so much by the principles applied during initial design, but by the choice of fundamental components or "design invariants" in terms of which the design is expressed. The paper discusses the characteristics of such invariants, including examples from the Internet and other networks, and considers what attributes of invariants best support architectural flexibility.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Survey of research towards robust peer-to-peer networks: search methods

TL;DR: In this article, the authors present a survey of peer-to-peer (P2P) search methods, including simple key lookup, keyword lookup, information retrieval and data management, and early efforts to optimize range, multiattribute, join and aggregation queries over P2P indexes.
Proceedings ArticleDOI

The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet

TL;DR: This position paper takes a holistic view of network design, allowing applications to work synergistically with the network architecture and physical layers to select the most appropriate functional blocks and tune their behavior so as to meet the application's needs within resource availability constraints.
Proceedings ArticleDOI

A Node Identity Internetworking Architecture

TL;DR: This paper outlines a node-identity-based internetworking architecture that allows heterogeneous networks to work together without loss of functionality and some of techniques employed in this architecture include reliance on cryptographic node identifiers, identity routers and localized addressing realms.
Proceedings ArticleDOI

The way 4WARD to the creation of a future internet

TL;DR: This paper describes how 4WARD directs research on network virtualisation, novel InNetworkManagement, a generic path concept, and an information centric approach, into a single framework for a diversified, but interoperable, network of the future.
Journal ArticleDOI

Network Virtualization: A Viable Path Towards the Future Internet

TL;DR: This paper proposes to use network virtualization, embedded in an architectural framework, to achieve the co-existence of diverse network designs and paradigms, to remain open to innovation and meet the challenges of the future.
References
More filters

Security Architecture for the Internet Protocol

R. Atkinson
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).

Stream Control Transmission Protocol

TL;DR: This document describes the Stream Control Transmission Protocol (SCTP), which is designed to transport PSTN signaling messages over IP networks, but is capable of broader applications.
Journal ArticleDOI

A security architecture for the Internet protocol

TL;DR: The design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer, which includes a modular key management protocol, called MKMP, is presented.
Book

The science of programming

David Gries
TL;DR: Describes basic programming principles and their step-by- step applications and shows how to apply them to real-world problems.

Datagram Congestion Control Protocol (DCCP)

TL;DR: The Datagram Congestion Control Protocol is a transport protocol that provides bidirectional unicast connections of congestion-controlled unreliable datagrams that is suitable for applications that transfer fairly large amounts of data.