Learn More
For existing probabilistic marking technologies for IP traceback, such as Probabilistic Packet Marking (PPM), TTL-based Packet Marking (TPM) and Dynamic Probabilistic Packet Marking (DPPM), it is difficult to reconstruct attack path(s) fast and defend against spoofed marks. In this paper, we present Adaptive Probabilistic Marking scheme (APM), where the TTL(More)
Currently, new protocols or architectures related to core network layer or network forwarding equipment are hard to deploy. And the core network evolves slowly. To solve this problem, various programmable Internet architectures and approaches are proposed. Programmable networks allow network researchers (not only the equipment vendors like Cisco and(More)
In this paper, we proposal an content provider mobility solution of Named Data Networking (NDN) [1]. Here content provider means the host of NDN network which provide content originally. We add a Locator are to the Interest packet [2]. Mapping System also introduced into the network, which maps identifier to locator. The original name is used as identifier.(More)
Content Delivery Network (CDN) improves large scale data delivery with widely distributed data replicas; But the fundamental goal of IP is to connect two hosts. As a consequence, request routing, which selects the best server to serve the requested data, is introduced to meet the mismatch between CDN and IP. In contrast to IP, Named Data Networking (NDN)(More)
Content Centric Network (CCN) is an emerging information centric network design. There are a lot of studies focusing on caching, applications and so on to make CCN getting perfect, while the scalability of Pending Interest Table (PIT) is still one of the primary concerns of high-speed forwarding. In this paper, we make an attempt to compress PIT with bloom(More)
Our subject focuses on IPv6 network, which develops for more than 10 years. How IPv6 evolve in those years? Is IPv6 network mature enough to undertake the load produced by users? Can we find some principles to guide IPv6 deployment, which make the whole network more robust and efficiency? This paper tries to answer these questions with in-depth statistics.(More)