User-Centric and Information-Centric Networking and Services


Book Description

User-Centric Networks (UCN) and Information-Centric Networks (ICN) are new communication paradigms to increase the efficiency of content delivery and also content availability. In this new concept, the network infrastructure actively contributes to content caching and distribution. This book presents the basic concepts of UCN and ICN, describes the main architecture proposals for these networks, and discusses the main challenges to their development. The book also looks at the current challenges for this concept, including naming, routing and caching on the network-core elements, several aspects of content security, user privacy, and practical issues in implementing UCN and ICN.




Information Centric Networks (ICN)


Book Description

This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.




Information Centric Networks (ICN)


Book Description

This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.




Foundations of User-Centric Cell-Free Massive MIMO


Book Description

Modern day cellular mobile networks use Massive MIMO technology to extend range and service multiple devices within a cell. This has brought tremendous improvements in the high peak data rates that can be handled. Nevertheless, one of the characteristics of this technology is large variations in the quality of service dependent on where the end user is located in any given cell. This becomes increasingly problematic when we are creating a society where wireless access is supposed to be ubiquitous. When payments, navigation, entertainment, and control of autonomous vehicles are all relying on wireless connectivity the primary goal for future mobile networks should not be to increase the peak rates, but the rates that can be guaranteed to the vast majority of the locations in the geographical coverage area. The cellular network architecture was not designed for high-rate data services but for low-rate voice services, thus it is time to look beyond the cellular paradigm and make a clean-slate network design that can reach the performance requirements of the future. This monograph considers the cell-free network architecture that is designed to reach the aforementioned goal of uniformly high data rates everywhere. The authors introduce the concept of a cell-free network before laying out the foundations of what is required to design and build such a network. They cover the foundations of channel estimation, signal processing, pilot assignment, dynamic cooperation cluster formation, power optimization, fronthaul signaling, and spectral efficiency evaluation in uplink and downlink under different degrees of cooperation among the access points and arbitrary linear combining and precoding. This monograph provides the reader with all the fundamental information required to design and build the next generation mobile networks without being hindered by the inherent restrictions of modern cellular-based technology.




Architecting User-Centric Privacy-as-a-Set-of-Services


Book Description

How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author’s vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis.




Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics


Book Description

From cloud computing to data analytics, society stores vast supplies of information through wireless networks and mobile computing. As organizations are becoming increasingly more wireless, ensuring the security and seamless function of electronic gadgets while creating a strong network is imperative. Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics highlights the challenges associated with creating a strong network architecture in a perpetually online society. Readers will learn various methods in building a seamless mobile computing option and the most effective means of analyzing big data. This book is an important resource for information technology professionals, software developers, data analysts, graduate-level students, researchers, computer engineers, and IT specialists seeking modern information on emerging methods in data mining, information technology, and wireless networks.




Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2020


Book Description

This book presents the proceedings of the 6th International Conference on Advanced Intelligent Systems and Informatics 2020 (AISI2020), which took place in Cairo, Egypt, from October 19 to 21, 2020. This international and interdisciplinary conference, which highlighted essential research and developments in the fields of informatics and intelligent systems, was organized by the Scientific Research Group in Egypt (SRGE). The book is divided into several sections, covering the following topics: Intelligent Systems, Deep Learning Technology, Document and Sentiment Analysis, Blockchain and Cyber Physical System, Health Informatics and AI against COVID-19, Data Mining, Power and Control Systems, Business Intelligence, Social Media and Digital Transformation, Robotic, Control Design, and Smart Systems.




Challenges in the IoT and Smart Environments


Book Description

This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients’ lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics. Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master’s degree students as well as undergraduates at their final years of studies in the stated fields.




Towards the Future Internet


Book Description

Emerging Trends from European Research. BThe way the book is structured and enhanced makes it an ideal reference book for managers, academics, researchers and system designers in the communications field./B BRBRI- Harry Skianis, Computing Reviews about the 2009 edition of Towards




NETWORKING 2012


Book Description

The two-volume set LNCS 7289 and 7290 constitutes the refereed proceedings of the 11th International IFIP TC 6 Networking Conference held in Prague, Czech Republic, in May 2012. The 64 revised full papers presented were carefully reviewed and selected from a total of 225 submissions. The papers feature innovative research in the areas of network architecture, applications and services, next generation Internet, wireless and sensor networks, and network science. The first volume includes 32 papers and is organized in topical sections on content-centric networking, social networks, reliability and resilience, virtualization and cloud services, IP routing, network measurement, network mapping, and LISP and multi-domain routing.