Page 41 - 5G Basics - Core Network Aspects
P. 41

Core network aspects                                            1


            For example,  an  external  third  party  authority  such  as  hierarchical  public  key  infrastructure  (PKI)
            [b-IETF RFC 5280] can be cooperated with DAN to distribute public keys, or the publisher which received a
            user request provides its public key with the requested data object. This is known as self-certifying, which
            the user can verify whether the data object actually comes from the publisher simply by hashing the received
            public key and comparing it with acquainted hashed public key value.
            In principle, the data object itself is encrypted so that DAN may allow anonymous users to access it or restrict
            the access by imposing authentication. The access control to the data object can be decided on the basis of
            the network operator's or content provider's policy.

            9.5     Mobility

            DAN is recommended to allow the end hosts to communicate without establishing or managing an end-to-
            end connection, thus simplifying the mobility aspects of the end terminals.

            Rationale: DAN communicates using data name, which eliminates the need for end terminals to use the
            address of the data object or the address of the host where the data object is located. This realizes simple
            mobility management for the end hosts, especially when the location of the data object is unclear to the end
            hosts, or when the data object or the host holding the data object is relocated during the communication
            and a handover is required. Moreover, DAN allows the data object to be stored in intermediate nodes and
            be retransmitted by the intermediate node on behalf of the end hosts to adapt to varying network conditions,
            including fluctuation in data throughput and temporal disconnection during the handover.

            9.6     Application programming interface
            DAN is recommended to support two types of application programming interfaces (APIs) for data object
            distribution and retrieval: put/get and publish/subscribe based APIs. Moreover, DAN is recommended to
            support APIs that enable applications to retrieve the meta information, e.g., attributes of data object, to
            enable the applications to respond to the request accordingly.

            Rationale: Most fundamental APIs of DAN define how data objects are distributed to and retrieved from the
            network. The put/get APIs allow applications to request and pull a data object from its serving network
            element, and the publish/subscribe APIs allow applications to specify what data object is wanted by them,
            and then the data object is delivered to the users as soon as it is published.

            9.7     Transport
            DAN is recommended to support two types of transport mechanisms, receiver and sender driven transports
            of data objects.

            Rationale: In the receiver driven transport, the receiver sends the requests for specific pieces of a data object
            to the sender so that the senders respond to the request accordingly. In this case, the receiver is responsible
            for maintaining reliable data transmission by resending requests for any missing piece of the data object. In
            the sender driven transport, the sender controls sending rate of the pieces of a data object while performing
            loss detection and congestion control.


            10      Environmental considerations
            DAN  is  able  to  provide  several  mechanisms  for  operators  to  reduce  the  network  resources  and  energy
            consumptions. First, network elements of DAN are able to respond to user requests directly rather than
            routing them to other end points so that other network elements can save their network resources and
            energy. Second, adaptive caching function of DAN localizes bursty traffic caused by unpredictable mobile
            users. For this reason, operators do not need to over-provision the network to handle the unpredictable
            bursty traffic. Therefore, the installation of unnecessary network resources can be minimized, which also
            reduces overall energy consumption level.
            A possible drawback is that individual network elements of DAN require additional resources (e.g., cache or
            storage) which increase installation cost initially. Also, processing user requests may consume more energy.



                                                                                                           31
   36   37   38   39   40   41   42   43   44   45   46