4Caching, Security, and Mobility in Content-centric Networking
Osman Khalid1, Imran Ali Khan1, Rao Naveed Bin Rais2, and Assad Abbas1
1Department of Computer Sciences, COMSATS University Islamabad, Abbottabad Campus, Pakistan, 22010
2College of Engineering and Information Technology, Ajman University, Ajman, UAE
4.1 Introduction
Over the years, our world has seen significant growth in the number of mobile devices, such as personal laptops, smart phones, and tablets with sensing capabilities and multiple wireless technologies. With the evolution of 4G/5G technologies, previously resource-constrained devices like sensors and smart objects can easily connect to the outer world on a large scale. Generally, a large number of devices involved in wireless networking are mobile in nature, which tends to modify network topology with the passage of time. Traditional end-to-end Internet communication protocols have limitations in coping with such mobility and dynamic network conditions. A user requesting an item needs to have the IP address of the information provider to reach the content. This makes the traditional Internet protocols host centric, i.e. they need to reach the content host. However, the end user is usually not interested in knowing the location of a content item; rather, the user is interested only in the content, no matter from where the content is retrieved for the user. Therefore, there is a need for a communication mechanism that is more oriented to be data centric, ...
Get Fog Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.