Network layer protocol and ndn fetches named

Assignment Help Computer Networking
Reference no: EM133314222

Problem. As a network layer protocol, NDN fetches named, secured data pieces. One might argue that DNS with DNSSEC also fetches named, secured data pieces, making a DNS query remotely analogous to an NDN Interest packet for fetching named data, and a DNS reply an NDN data packet. One obvious difference is that DNS does the job at the application layer, while NDN's Interest-Data packet exchange works at network layer.

1. DNS' query/reply exchange runs over UDP/IP. Can NDN's Interest/Data packet exchange also run over UDP/IP? If yes: wouldn't this mess up protocol layering? If not, what makes doing so impossible? Please explain your answer.

2. Both DNS and NDN cache retrieved data, however the locations of their caches differ. Please explain where DNS and NDN can cache fetched data, and why they are different.

3. Given each DNS domain has its full power to assign names under its own namespace, the owner of a DNS domain, say example.com, believes that she could take on the NDN's idea and make example.com as its own trust anchor. That is, example.com could build a self-signed certificate, and make the verifications of all the DNS names under example.com terminate at this trust anchor, instead of terminating at the root domain's key. Would this idea work? Please explain why you think it would, or would not, work.

4. The DNSSEC deployment requires that each DNS reply carry the RRSIG for the returned DSN data RRset, and NDN also mandates that all data packets must be signed. Both DNS and NDN can retrieve the signing keys in the same way as they retrieving their data. However NDN uses "trust schema" to define trust policies (trust schema is described in the reading for lecture-17 "An Overview of Security Support in Named Data Networking"), but DNSSEC has no such concept. Why doesn't DNSSEC need something like trust schema?

Reference no: EM133314222

Questions Cloud

Enough reasons to terminate the accountant : Tom believes that the mechanic is not good at his job and wants to terminate him. Is this grounds for termination
Describe their political models and economic system : Identify two or three countries other than the United States, and describe their political models and economic systems.
State the specific offering you recommend lucky charms : Provide a brief overview of the company, Lucky Charms, and its product offering of cereal. State the specific offering you recommend Lucky Charms introduce
How did you know that these were assumptions : How did you know that these were assumptions (that they were taken for granted)? Were these assumptions true, or were they questionable?
Network layer protocol and ndn fetches named : As a network layer protocol, NDN fetches named, secured data pieces. explain where DNS and NDN can cache fetched data, and why they are different.
What do you believe is one thing probation is doing right : What do you believe is one thing probation is doing right and what is one thing they could improve upon? Answer the same question for parole
How this case impacted domestic violence responses by police : In your opinion, how has this case impacted domestic violence responses by police and the law? What did the case do?
What is the significance of in re marriage of johnson : What is the significance of In re marriage of Johnson, 237 Ill.App.381, 604 N.E.2d 378 (1992)? Download In re marriage of Johnson, 237 Ill.App.381, 604 N.E.2d
Explain how cmc could use this strategy to sell : The parties eventually agreed that a force of police would live at the mine, but that their services would be paid for at specified rate

Reviews

Write a Review

Computer Networking Questions & Answers

  Compute both unadjusted and adjusted function-point count

Compute both the unadjusted and adjusted function-point count for this system, stating carefully any assumptions you are making.

  Convert decimal numbers to binary

Converting Decimal Numbers to Binary Time Required: 15 minutes Objective: Convert decimal numbers to binary.

  Multiplexing techniques in terms of mechanics, technology

1.What is a network? What are the six main elements and their functions of a typical network? Explain each one. What devices are used in layers 1-3? What is a message called in layer 2? Layer 3?

  Identify at least one disadvantage of using each topology

In this paper, (a) define each topology, (b) provide a scenario for using each topology, and (c) identify at least one disadvantage of using each topology.

  Write down changes does ftp make to ascii file

Write down changes does FTP make to ASCII file when you download it in ASCII mode to Windows machine from Linux server.

  Create and apply an addressing scheme to a network

ICTNWK404 Assignment - Install, operate and troubleshoot a small enterprise branch network. Create and apply an addressing scheme to a network

  Mpls over ip solution or form of long-haul ethernet

What occurs if office in Baton Rouge, Louisiana, also should be connected to both Memphis and Laramie at a rate of 512 kbps? Which solution is cheaper now?

  Explain how you are learning subnetting

Talk about your efforts in the learning this important concept, and offer advice to your classmates on how you are learning subnetting.

  Designing and installing wlan with multiple aps in ess

Why is Wi-Fi channel selection important when designing and installing a WLAN with multiple APs in an ESS? Explain.

  Kind of networking equipment organization need to buy

Let's figure out what kind of networking equipment an organization would need to buy. You can make assumptions on size and budget. What do we need to purchase?

  Performing the formal discovery upon request

Execute expert testimony in defense of your computer forensics or incident response report. Performing the formal discovery upon request

  Effect of cell phone use

Can cell phone use while driving be compared with drunk driving? Why or why not? What other variables (such as age) can affect driving while using a cell phone?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd