Towards evolvable Internet architecture-design constraints and models analysis

Ke Xu*, Min Zhu, Guang Wu Hu, Liang Zhu, Yi Feng Zhong, Ying Liu, Jian Ping Wu, Ning Wang

*Corresponding author for this work

Research output: Contribution to journalArticle (Academic Journal)peer-review

11 Citations (Scopus)

Abstract

There is a general consensus about the success of Internet architecture in academia and industry. However, with the development of diversified application, the existing Internet architecture is facing more and more challenges in scalability, security, mobility and performance. A novel evolvable Internet architecture framework is proposed in this paper to meet the continuous changing application requirements. The basic idea of evolvability is relaxing the constraints that limit the development of the architecture while adhering to the core design principles of the Internet. Three important design constraints used to ensure the construction of the evolvable architecture, including the evolvability constraint, the economic adaptability constraint and the manageability constraint, are comprehensively described. We consider that the evolvable architecture can be developed from the network layer under these design constraints. What’s more, we believe that the address system is the foundation of the Internet. Therefore, we propose a general address platform which provides a more open and efficient network environment for the research and development of the evolvable architecture.

Original languageEnglish
Pages (from-to)1-24
Number of pages24
JournalScience China Information Sciences
Volume57
Issue number11
DOIs
Publication statusPublished - 8 Oct 2014

Bibliographical note

Publisher Copyright:
© 2014, Science China Press and Springer-Verlag Berlin Heidelberg.

Keywords

  • design constraints
  • economic adaptability
  • evolvability evaluation model
  • evolvable architecture
  • general address platform

Fingerprint

Dive into the research topics of 'Towards evolvable Internet architecture-design constraints and models analysis'. Together they form a unique fingerprint.

Cite this