Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system of CCN trusted addressing based on DNS and extension protocol thereof

A technology for extending protocols and addressing methods, applied in the network field, can solve the problems of no proposed data management model, lack of boundary management of CCN, huge overhead, etc., to ensure scalability, alleviate huge overhead and delay, and ensure efficiency Effect

Active Publication Date: 2014-09-24
CHINA INTERNET NETWORK INFORMATION CENTER
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] As mentioned above, although Content-Centric Networking (CCN) can solve the problems of routing scalability and data distribution efficiency to a certain extent, it does not propose a data management model that can support future massive services, especially It is to consider how to effectively support dynamic content management when CCN is deployed in the mobile Internet in the future; in addition, CCN lacks effective border management, which may cause huge overhead in the content addressing process, and the addressing process of CCN is not very effective. Well combined with the existing Internet infrastructure, it cannot well support its smooth evolution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system of CCN trusted addressing based on DNS and extension protocol thereof
  • Method and system of CCN trusted addressing based on DNS and extension protocol thereof
  • Method and system of CCN trusted addressing based on DNS and extension protocol thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below through specific embodiments and accompanying drawings.

[0049] The region-based content management of the present invention can ensure the scalability of massive data management in the future. Each region deploys a content management anchor (Content Management Anchor, CMA), which is responsible for the location information of the source content in the region and the related information of the roaming source node. for maintenance. figure 1 It is a schematic diagram of the network architecture of the content management model in this embodiment. As shown in the figure, a content management anchor (CMA) is deployed in each content prefix area of ​​the content-centric network, as a management node of a content area, for maintaining Information about the content and its corresponding source node location; the DNS server follows the hierarchical connection relationship of DNS in the current Internet, and is used to mainta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system of CCN (Content-Centric Networking) trusted addressing based on a DNS (Domain Name System) and an extension protocol thereof. The method comprises the steps of deploying content management anchor points in every regions of the content-centric networking (CCN) and registering the content management anchor points in the DNS based on the content prefixes of all the regions, next, carrying out addressing in a hop-by-hop addressing manner and a centralized DNS addressing manner in the content-centric networking, establishing a complete trust chain by virtue of a DNSSEC (Domain Name System Security Extensions) protocol to provide security guarantee in the name resolution process, providing public key information verification by virtue of a DANE (DNA-Based Authentication of Named Entities) protocol and then realizing trusted verification on contents and finally obtaining the desired contents. The method and the system have the advantages that the existing base facilities of the current internet are well combined and a data management model capable of supporting future mass services is provided, and especially for the deployment of the future CCN in the mobile internet, the dynamic content management can be effectively supported and the flexible and efficient mass content addressing process can be realized.

Description

technical field [0001] The invention belongs to the field of network technology, and relates to a content-centric network (Content-Centric Networking, CCN) trusted addressing method based on DNS and its extended protocol, and a system using the method. Background technique [0002] With the rapid development of information technology, new Internet applications emerge in an endless stream, causing traditional IP technology to face many challenges. In particular, the rapid development of mobile communication technology and the emergence of emerging data applications such as the Internet of Things and cloud computing are gradually changing the traditional mode of Internet users' access to service resources, making the Internet gradually develop from the basic functions of interconnection to supporting massive data interaction. , and pose new challenges to network security and efficient mobility. [0003] In recent years, researchers have used many methods and means to improve ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12H04L29/06H04L9/32
Inventor 延志伟李晓东
Owner CHINA INTERNET NETWORK INFORMATION CENTER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products