Zum Inhalt

Open Access 2025 | Open Access | Buch

Principle of Architecture, Protocol, and Algorithms for CoG-MIN

A Sustainably Ecological & Evolutionary Solution for Packet Network System

verfasst von: Hui Li, He Bai

Verlag: Springer Nature Singapore

insite
SUCHEN

Über dieses Buch

Das Internet ist die wichtigste globale Infrastruktur im Zeitalter der digitalen Wirtschaft. Seine Rolle hat sich von einem einfachen Informationsaustausch auf die Unterstützung aller Arten neuartiger Szenarien und Anwendungen verlagert. Angesichts der vielfältigen Kommunikationsanforderungen sollte der Entwicklungstrend des zukünftigen Netzwerks verschiedene Adressierungsmethoden unterstützen, wie IP-Adresse, Identität, Service, Inhalt, geografische Lage und andere potenzielle Kommunikationsmodi. Daher ist eine mitregierte, sichere und entwicklungsfähige neuartige Netzwerkarchitektur unverzichtbar. Dieses Open Access-Buch konzentriert sich auf Co-Governed Multi-Identifier Network (CoG-MIN), eine vielversprechende zukünftige Netzwerkarchitektur, die eine ökologische Lösung für die nachhaltige Entwicklung von Paketnetzen bietet. Die Konzeption von CoG-MIN folgt drei Hauptprinzipien: Blockchain-basierte globale Co-Governance zwischen Top-Level-Domänen, endogene Netzwerksicherheit und nachhaltige Evolution. CoG-MIN zielt darauf ab, eine friedliche, geordnete, sichere und nachhaltige Entwicklung des globalen Computernetzwerks zu fördern. Es wird den Stillstand beenden, in dem die Netzwerksysteme aufgrund der exponentiellen Ausweitung der Adressierung und des Routing auf der aktuellen Netzwerkschicht kontinuierlich modernisiert werden müssen. Mit anderen Worten: CoG-MIN ermöglicht es einer Vielzahl von Netzwerken, auf natürliche Weise nebeneinander zu existieren und sich zu verändern. Dies spart unzählige Gründungskosten und nutzt vorhandene Netzwerkgeräte und -geräte. Dieses Buch bietet wichtige Referenzmaterialien zu diesem Thema für die Erforschung von Computernetzwerken, Netzwerksicherheit, Netzwerkkommunikation und anderen Disziplinen.

Inhaltsverzeichnis

Frontmatter

Open Access

Chapter 1. Introduction
Abstract
In the twenty-first century, the Internet has become a paramount communication infrastructure, profoundly influencing both production patterns and lifestyles. This chapter offers a systematic exposition on the history of the Internet, with a
Hui Li, He Bai

Open Access

Chapter 2. Overview of Co-Governed Multi-Identifier Network
Abstract
The Internet architecture, established in the 1960s and 1970s, addressed the challenge of resource sharing among hosts during an era limited by hardware constraints. With subsequent advances in integrated circuits, network equipment evolved to offer enhanced computing power at a lower cost. This progress fueled the rapid expansion of computer networks, leading to the proliferation of applications like e-commerce, digital media, social networking, and content distribution in the last decade. Today’s Internet users care more about the content itself than how and where to get it. Consequently, the current architecture doesn’t seamlessly align with modern user needs, prompting researchers to explore new designs for future networks.
Hui Li, He Bai

Open Access

Chapter 3. Identifier and Identifier Semantics
Abstract
The evolvability of a network architecture refers to its ability to be designed and implemented in a flexible and scalable manner, allowing it to adapt to changing needs and technological advancements. In MIN networks [1], network evolution can be realized through the extension of network identifiers. Specifically, various types of identifiers are employed to support different network protocols, and routers execute distinct operations on network packets based on the carried identifiers. This realizes the coexistence of various network protocols at the network layer. This chapter introduces the basic network identifier, identifier forms, identifier characteristics, identifier semantics, and identifier space in MIN networks.
Hui Li, He Bai

Open Access

Chapter 4. Co-Governed Multi-Identifier Management Technology
Abstract
The existing domain name system (DNS) is non-autonomous and relatively controlled by some countries and institutions. Traditional DNS faces numerous challenges including low efficiency, vulnerability to information tampering, uneven service distribution, and weak resistance against distributed denial of service (DDoS) attacks. These issues pose a potential threat to national information security. Extensive research has demonstrated that the current DNS, along with its alternative approaches, cannot effectively address the problem of DNS centralization or fulfill the Internet’s fundamental requirements for equality and openness.
Hui Li, He Bai

Open Access

Chapter 5. Addressing and Routing
Abstract
At present, the design and implementation of CoG-MIN [1] are undergoing continuous evolution. In comparison to IP networks and NDN networks, the addressing and routing mechanisms in CoG-MIN require adaptation to its unique characteristics in order to ensure optimal performance [2]. This chapter provides an introduction to the addressing and routing mechanisms within CoG-MIN, covering existing research studies, advanced hyperbolic routing algorithms, and the dynamic routing protocol in CoG-MIN.
Hui Li, He Bai

Open Access

Chapter 6. Multi-identifier Router
Abstract
In MIN networks, the multi-identifier router (MIR) plays a crucial role as the forwarder responsible for processing and forwarding incoming network packets. This chapter provides a comprehensive introduction of the design and implementation of the MIR.
Hui Li, He Bai

Open Access

Chapter 7. Data Synchronization
Abstract
Distributed applications involve data synchronization between one and multiple objects. This chapter introduces the design patterns, advantages and disadvantages of the existing data synchronization protocols, as well as the specific design of the two data synchronization protocols in MIN networks.
Hui Li, He Bai

Open Access

Chapter 8. Cache Management and Access Control
Abstract
In MIN networks, the in-network caching plays a pivotal role in mitigating overall network traffic. This chapter introduces the cache management and access control schemes deployed on MIRs. The caching scheme includes a cache placement algorithm, a dual-layer caching model, and a cache space reallocation algorithm. Furthermore, the access control policy further achieves fine-grained access control and content privacy protection.
Hui Li, He Bai

Open Access

Chapter 9. Transport Protocol
Abstract
With rapid advancements in communication technology, network traffic has experienced exponential growth, potentially surpassing the processing capacity of current network devices. When network traffic exceeds the link capacity, network congestion will occur. This may result in degraded transmission performance, such as increased network latency and packet loss. Transport protocols have consistently remained at the forefront of network research.
Hui Li, He Bai

Open Access

Chapter 10. Network Control Message Protocol
Abstract
The network control message protocol enables network administrators to accurately obtain the latest network status, in order to repair network failures in time and ensure the quality of data transmission in dynamically changing network environments. There are many applications based on the network control message protocol for detecting and diagnosing network problems on the Internet, such as the path trace tool, i.e., Trace. Path trace tools send control messages through special mechanisms and receive replies to obtain link information and transmission delays between two points. This information is valuable for analyzing network performance, troubleshooting, and optimizing route selection.
Hui Li, He Bai

Open Access

Chapter 11. Network Security
Abstract
In cyberspace, everything is interconnected, sharing a common destiny. The functioning of society, government operations, and daily necessities like clothing, food, housing, and transportation all rely on software, data, and networks.
Hui Li, He Bai

Open Access

Chapter 12. Network Evolvable Scheme
Abstract
As the core component of modern information technology, computer network technology is closely related to social production and daily life. This chapter analyzes the key challenges in network evolution and introduces the identifier extension mechanism based on identifier fallback. Furthermore, it discusses the theoretical foundation of complex networks and the role of artificial intelligence technology in network evolution at a macro level.
Hui Li, He Bai

Open Access

Chapter 13. Secure Private Network Based on CoG-MIN
Abstract
A private network, commonly known as an enterprise or dedicated network, is a customized network infrastructure designed for organizations. The services and resources within a private network are inaccessible to external networks, with access granted only to authorized personnel within the organization. Due to the high importance of the services and resources within a private network, ensuring network security is of utmost importance.
Hui Li, He Bai

Open Access

Chapter 14. MIN-Web
Abstract
Web technology has become one of the primary methods for accessing information and facilitating communication in today’s digital age [1–3]. With the continuous advancement of the Internet, web technology provides users with convenient, efficient, and secure online experiences. It allows individuals and businesses to create and publish content, interact with others through various platforms and applications, and access a vast array of resources and services seamlessly.
Hui Li, He Bai

Open Access

Chapter 15. Application Scenarios of CoG-MIN
Abstract
This chapter introduces the application scenarios based on CoG-MIN, including industrial internet of things (IIoT), internet of vehicles (IoV), space-terrestrial integrated networks (STIN), digital asset management and trading, and a community with a shared future in cyberspace.
Hui Li, He Bai
Metadaten
Titel
Principle of Architecture, Protocol, and Algorithms for CoG-MIN
verfasst von
Hui Li
He Bai
Copyright-Jahr
2025
Verlag
Springer Nature Singapore
Electronic ISBN
978-981-9635-96-2
Print ISBN
978-981-9635-95-5
DOI
https://doi.org/10.1007/978-981-96-3596-2