Show simple item record

dc.contributor.authorKhoury, Joud
dc.date.accessioned2010-02-09T23:24:10Z
dc.date.available2010-02-09T23:24:10Z
dc.date.issued2010-02-09T23:24:10Z
dc.date.submittedDecember 2009
dc.identifier.urihttp://hdl.handle.net/1928/10386
dc.description.abstractIn less than three decades, the Internet was transformed from a research network available to the academic community into an international communication infrastructure. Despite its tremendous success, there is a growing consensus in the research community that the Internet has architectural limitations that need to be addressed in a effort to design a future Internet. Among the main technical limitations are the lack of mobility support, and the lack of security and trust. The Internet, and particularly TCP/IP, identifies endpoints using a location/routing identifier, the IP address. Coupling the endpoint identifier to the location identifier hinders mobility and poorly identifies the actual endpoint. On the other hand, the lack of security has been attributed to limitations in both the network and the endpoint. Authentication for example is one of the main concerns in the architecture and is hard to implement partly due to lack of identity support. The general problem that this dissertation is concerned with is that of designing a future Internet. Towards this end, we focus on two specific sub-problems. The first problem is the lack of a framework for thinking about architectures and their design implications. It was obvious after surveying the literature that the majority of the architectural work remains idiosyncratic and descriptions of network architectures are mostly idiomatic. This has led to the overloading of architectural terms, and to the emergence of a large body of network architecture proposals with no clear understanding of their cross similarities, compatibility points, their unique properties, and architectural performance and soundness. On the other hand, the second problem concerns the limitations of traditional naming and discovery schemes in terms of service differentiation and economic incentives. One of the recurring themes in the community is the need to separate an entity's identifier from its locator to enhance mobility and security. Separation of identifier and locator is a widely accepted design principle for a future Internet. Separation however requires a process to translate from the identifier to the locator when discovering a network path to some identified entity. We refer to this process as identifier-based discovery, or simply discovery, and we recognize two limitations that are inherent in the design of traditional discovery schemes. The first limitation is the homogeneity of the service where all entities are assumed to have the same discovery performance requirements. The second limitation is the inherent incentive mismatch as it relates to sharing the cost of discovery. This dissertation addresses both subproblems, the architectural framework as well as the naming and discovery limitations.en_US
dc.language.isoen_USen_US
dc.subjectInternet Architectureen_US
dc.subjectInternet Economicsen_US
dc.subjectNamingen_US
dc.subjectDiscoveryen_US
dc.subjectGame theoryen_US
dc.subjectTaxonomy of network architectureen_US
dc.subject.lcshComputer network architectures.
dc.subject.lcshInternet--Technological innovations.
dc.subject.lcshData mining.
dc.subject.lcshInternet--Security measures.
dc.subject.lcshWireless Internet.
dc.subject.lcshInternet--Economic aspects.
dc.titleNaming and discovery in networks : architecture and economicsen_US
dc.typeDissertationen_US
dc.description.degreeCompuer Engineeringen_US
dc.description.levelDoctoralen_US
dc.description.departmentUniversity of New Mexico. Dept. of Electrical and Computer Engineeringen_US
dc.description.advisorAbdallah, Chaouki
dc.description.committee-memberHeileman, Gregory
dc.description.committee-memberShu, Wei
dc.description.committee-memberKrause, Kate


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record