Internet Industry Search Engine

Named data networking: names the data instead of data locations

https://www.networkworld.com/article/3336515/lan-wan/named-data-networking-names-the-data-instead-of-data-locations.html
See More From: networkworld.com

Feb 7, 2019 2:31 PM 2+ mon ago

IDG Contributor Network: Named data networking: names the data instead of data locations

big data / data center / server racks / storage / binary code / analytics monsitj / Getty Images

Today, connectivity to the Internet is easy; you simply get an Ethernet driver and hook up the TCP/IP protocol stack. Then dissimilar network types in remote locations can communicate with each other. However, before the introduction of the TCP/IP model, networks were manually connected but with the TCP/IP stack, the networks can connect themselves up, nice and easy. This eventually caused the Internet to explode, followed by the World Wide Web.

So far, TCP/IP has been a great success. It's good at moving data and is both robust and scalable. It enables any node to talk to any other node by using a point-to-point communication channel with IP addresses as identifiers for the source and destination. Ideally, a network ships the data bits. ...

Read More

IDG Contributor Network: Introducing Named Data Networking

networkworld.com     6+ mon ago

While computing, storage and programming have dramatically changed and become simpler and cheaper over the last 20 years, however, IP networking has not. IP networking is still stuck in the era of mid...

IDG Contributor Network: Named data networking: Stateful forwarding plane for datagram delivery

IDG Contributor Network: Named data networking: Stateful forwarding plane for datagram delivery

networkworld.com     1+ mon ago

Current Job Listings The Internet was designed to connect things easily, but a lot has changed since its inception. Users now expect the internet ...

IDG Contributor Network: The 5 pillars of cloud data management

networkworld.com     9+ mon ago

...

IDG Contributor Network: When data becomes a service

infoworld.com     7+ mon ago

...

IDG Contributor Network: Networking anomalies

networkworld.com     9+ mon ago

...

IDG Contributor Network: Data-driven resource management and the future of cloud

networkworld.com     7+ mon ago

Cloud adoption is undoubtedly the cornerstone of digital transformation, and for many, it is the foundation for rapid, scalable application development and delivery. Companies of all s...


IDG Contributor Network: Introducing Named Data Networking

networkworld.com     6+ mon ago

While computing, storage and programming have dramatically changed and become simpler and cheaper over the last 20 years, however, IP networking has not. IP networking is still stuck in the era of mid...

IDG Contributor Network: Named data networking: Stateful forwarding plane for datagram delivery

IDG Contributor Network: Named data networking: Stateful forwarding plane for datagram delivery

networkworld.com     1+ mon ago

Current Job Listings The Internet was designed to connect things easily, but a lot has changed since its inception. Users now expect the internet ...

IDG Contributor Network: The 5 pillars of cloud data management

networkworld.com     9+ mon ago

...

IDG Contributor Network: When data becomes a service

infoworld.com     7+ mon ago

...

IDG Contributor Network: Networking anomalies

networkworld.com     9+ mon ago

...

IDG Contributor Network: Data-driven resource management and the future of cloud

networkworld.com     7+ mon ago

Cloud adoption is undoubtedly the cornerstone of digital transformation, and for many, it is the foundation for rapid, scalable application development and delivery. Companies of all s...

IDG Contributor Network: Why data science teams should operate like startups

infoworld.com     7+ mon ago

With the increased use of data in business, organizations are scrambling to mount data science teams. Because these teams are relatively new, there is no precedence on how companies sh...

IDG Contributor Network: In-memory data grids vs. in-memory databases

infoworld.com     7+ mon ago

The adoption of in-memory computing continues to accelerate. Mature solutions enable organizations to obtain the database processing speed and scale they require for their digital tran...

IDG Contributor Network: Beware the networking industrial complex

networkworld.com     7+ mon ago

There is a status quo in the networking industry that is the enemy of innovation. The major hardware equipment makers collectively benefit by propagating the many layers of equipment a...

IDG Contributor Network: Zero-trust: microsegmentation networking

IDG Contributor Network: Zero-trust: microsegmentation networking

networkworld.com     2+ week ago

Microsegmentation gives administrators the control to set granular policies in order to protect the application environment. The transformation to the digital age has introduced s...

IDG Contributor Network: The role of open source in networking

IDG Contributor Network: The role of open source in networking

networkworld.com     2+ mon ago

SD-WAN vendors use open source as the foundation of their solutions and then add additional functionality over the baseline. Technology is always evolving. However, in recent time...

IDG Contributor Network: 3 IoT challenges that keep data scientists up at night

networkworld.com     7+ mon ago

It s imperative to avoid manual data entry where possible. Application integration tools are one way to automate data entry and reduce the proliferation of typographical errors, alte...

IDG Contributor Network: Summer reading: where data has driven us thus far in 2018

infoworld.com     7+ mon ago

It s not unlikely that future generations will look back at the first half of 2018 as the time the world woke up to data. In this short period, two developments, vastly different in ...

IDG Contributor Network: The state of the network is murky

networkworld.com     7+ mon ago

Hybrid IT networking has come a long way in the past decade, as enterprises have gradually come to embrace and trust cloud computing. Yet, despite the growing popularity of both privat...

IDG Contributor Network: The future of cloud interconnects

networkworld.com     5+ mon ago

There are three types of applications; applications that manage the business, applications that run the business and miscellaneous apps. A security breach or performanc...

IDG Contributor Network: Leveraging the engineering hierarchy of needs

infoworld.com     6+ mon ago

Abraham Maslow introduced his now-famous hierarchy of needs in 1943, proposing that people had to achieve a sequential set of conditions to attain complete fulfilment. The five levels of the hierarchy...

Search Builder

(Click to add to search box)
National Science Foundation  Data Networking  DHCP Discover message  host configuration protocol  configured DNS server  IP networking  encrypted NDN data  greenfield service provider  content delivery networks  data network video  security perimeter model  data security perimeter  transport layer security  NDN network layer  application data layer  World Wide Web  IP architecture  DNS server  networking layer  network layer  crypto signature  data producers  data schema  data level  security right  network ships  data bits  data packet  application layer  data locations  TLS security  Ethernet driver  government organizations  matt Conran  everything talks  Lixia Zhang  TCP connection  security perimeter  IP routers  content model  DDoS attacks  root node  demarcation points  network level  data visibility  card decks  DNS services  coworking space  communication model  need today  need something  comfort zone  communications pattern  New applications  communication technologies  research projects  networks today  NDN routes  networking protocols  phone numbers  communication endpoints  Networking today  Van Jacobson  research direction  DNS request  
**Content contained on this site is provided on an “as is” basis. 4Internet, LLC makes no commitments regarding the content and does not review it, so don't assume that it's been reviewed. What you see here may not be accurate and should not be relied upon. The content does not necessarily represent the views and opinions of 4Internet, LLC. You use this service and everything you see here at your own risk. Content displayed may be subject to copyright. Content is removed on a case by case basis. To request that content be removed, contact us using the following form: Contact Us.