2012 International Conference on Computer and Communication Engineering (ICCCE) 2012
DOI: 10.1109/iccce.2012.6271351
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of blind routing algorithms over content centric networking architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…ICN prefers to keep a watchful eye on what is being exchanged rather than which network entities are exchanging information, and it aims to address some limitations of the current Internet, such as mobility, security, scalability, caching. Haque et al 21 presented different blind routing algorithms (eg, flooding, expanding ring, and random walk) as an optimum fall back scheme if no match in Forwarding Information Base (FIB), to address the frequent FIB misses, which resulted from the inability of FIB to store all content names. 8 In particular, the routing has recently experienced 2 | RELATED WORK In this section, we summarize some related work on ICN routing, as follows.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…ICN prefers to keep a watchful eye on what is being exchanged rather than which network entities are exchanging information, and it aims to address some limitations of the current Internet, such as mobility, security, scalability, caching. Haque et al 21 presented different blind routing algorithms (eg, flooding, expanding ring, and random walk) as an optimum fall back scheme if no match in Forwarding Information Base (FIB), to address the frequent FIB misses, which resulted from the inability of FIB to store all content names. 8 In particular, the routing has recently experienced 2 | RELATED WORK In this section, we summarize some related work on ICN routing, as follows.…”
Section: Introductionmentioning
confidence: 99%
“…Wang et al 20 proposed open shortest path first for the named data to improve the name-based routing capability, ie, to fully support multipath forwarding capability by calculating multiple routes to the same name prefix. Haque et al 21 presented different blind routing algorithms (eg, flooding, expanding ring, and random walk) as an optimum fall back scheme if no match in Forwarding Information Base (FIB), to address the frequent FIB misses, which resulted from the inability of FIB to store all content names. Truong et al 22 designed a routing scheme based on metric space, which integrated content search into network path when resolving content names.…”
Section: Introductionmentioning
confidence: 99%
“…More comprehensive discussion on routing, security and flow control features of CCN is available in [133]. Researchers are also making efforts to explore new CCN dimensions by evaluating routing algorithms, data modeling, memory management and developing monitoring tools [134][135][136][137][138].…”
Section: Ddos Protection In Ccnmentioning
confidence: 99%