All Images
News Release 14-065
Moving towards a more robust, secure and agile Internet
NSF announces $15 million in awards to develop, deploy and test future Internet architectures
This material is available primarily for archival purposes. Telephone numbers or other contact information may be out of date; please see current contact information at media contacts.
Major design features of the MobilityFirst architecture.
Credit: WINLAB, Rutgers University
Download the high-resolution JPG version of the image. (220.4 KB)
Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.
NDN keeps the hourglass-shape of the protocol architecture but changes the narrow waist from naming host/locations to naming data chunks that applications need.
Credit: Jeff Burke, UCLA
Download the high-resolution JPG version of the image. (50.1 KB)
Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.
MobilityFirst deployment on GENI testbed for April 2013 demonstration.
Credit: WINLAB, Rutgers University
Download the high-resolution JPG version of the image. (151.3 KB)
Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.
Validating the NDN architecture design by addressing real application challenges, from live video distribution to vehicular networking to building automation/Internet-of-Things.
Credit: Jeff Burke, UCLA
Download the high-resolution JPG version of the image. (202.3 KB)
Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.
XIA supports direct communication with different types of destination, e.g., hosts (red), replicated services (green) and content that can be cached "anywhere" (blue). The set of destination types can evolve over time through the use of fallback addressing: destination addressess can list multiple ways of reaching a destination, including identifiers for new (e.g., content--CID) and well-established (e.g., host--HID) destination types. The use of cryptographic identifiers allows nodes to verify easily that they are communicating with the intended destination. The figure also illustrates the two network deployments planned for XIA: a vehicular network and large scale video streaming. Research on control protocols supporting secure network operations are another focus area for the next phase of XIA.
Credit: Peter Steenkiste, XIA
Download the high-resolution JPG version of the image. (65.1 KB)
Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.