Internet Industry Search Engine

Named data networking: names the data instead of data locations


Feb 7, 2019 2:31 PM 1+ week ago

Today, connectivity to the Internet is easy; you simply get an Ethernet driver and hook up the TCP/IP protocol stack. Then dissimilar network types in remote locations can communicate with each other. However, before the introduction of the TCP/IP model, networks were manually connected but with the TCP/IP stack, the networks can connect themselves up, nice and easy. This eventually caused the Internet to explode, followed by the World Wide Web.So far, TCP/IP has been a great success. It?s good at moving data and is both robust and scalable. It enables any node to talk to any other node by using a point-to-point communication channel with IP addresses as identifiers for the source and destination. Ideally, a network ships the data bits. You can either name the locations to ship the bits to or name the bits themselves. Today?s TCP/IP protocol architecture picked the first option. Let?s discuss the section option later in the article.To read this article in full, please click here...Read more.

Search Builder

(Click to add to search box)
Search Suggestions Level 1
data networking  National Science Foundation  Network World communities  Ethernet driver  DHCP Discover message  host configuration protocol  configured DNS server  coworking space cboxworking  IP networking  encrypted NDN data  IDG Contributor Network  content delivery networks  data network video  security perimeter model  data security perimeter  transport layer security  data locations  NDN network layer  application data layer  Data Networking  World Wide Web  data bits  network ships  networking layer  IP architecture  network layer  DNS server  TLS security  application layer  data schema  Lixia Zhang  communication model  phone numbers  everything talks  NDN routes  security IP  TCP connection  demarcation points  network level  data visibility  root node  DDoS attacks  security perimeter  content model  IP routers  data packet  data producers  crypto signature  data level  security right  networking protocols  New applications  need something  communications pattern  comfort zone  need today  communication endpoints  DNS request  Networking today  Van Jacobson  card decks  research projects  communication technologies  home laptop  networks today  research direction  landscape Objectively  DNS services  
Search Suggestions Level 2
IDG Contributor Network  data networking  Data lakes  data governance  visualizing relationships  
Search Suggestions Level 3
IDG Contributor Network  database processing speed  store capability  data processing APIs  drive resource management  scalable application development  Continuous resource planning  Network World communities  resource management  cloud spending  capacity planning  account activity  risk assessments  legacy system  mainstream developers  deployment strategies  technologies need  Nikita Ivanov  scalable applications  market quotes  investor positions  data layer  analytics engine  rearchitected applications  database capabilities  transaction volume  nonvolatile RAM  standalone database  cloud environment  server nodes  event processing  data layers  investment book  Mature solutions  planning tools  repeatable manner  cloud deployment  devops processes  Slashdot effect  breaks approach  setup causes  resource constraints  traffic drivers  software engineers  application development  increase agility  employee collaboration  service provider  measurement tools  internet conditions  increase capacity  cloud providers  control costs  application metrics  traffic spikes  organization gain  

**Content contained on this site is provided on an “as is” basis. 4Internet, LLC makes no commitments regarding the content and does not review it, so don't assume that it's been reviewed. What you see here may not be accurate and should not be relied upon. The content does not necessarily represent the views and opinions of 4Internet, LLC. You use this service and everything you see here at your own risk. Content displayed may be subject to copyright. Content is removed on a case by case basis. To request that content be removed, contact us using the following form: Contact Us.