Skip to main content

Currently Skimming:

3 Core Network Technologies
Pages 16-23

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 16...
... The Emerging Network Technologies program develops metrology, test, and measurement techniques to support new disruptive network technologies, including 5G/6G core networks, quantum networking, and information-centric networks. The Trustworthy Networks Research program concentrates on technologies necessary to increase the security, resilience, and performance of the protocols underpinning the Internet.
From page 17...
... /IP as the global protocol stack of the Internet. Area-Wide Challenges and Opportunities The Quantum Networking program spans a number of groups across NIST, while the quantum channel, quantum transducer, and quantum networking projects were made part of CTL when CTL was reorganized.
From page 18...
... As a result, the researchers have developed a new distributed architecture and algorithm that can enable access nodes and core networks to autonomously "cooperate" with each other to dynamically negotiate their local quality of service budgets and to collectively meet end-to-end quality of service goals by sharing only their estimates of the global constraint functions, without disclosing their local decision variables. They demonstrate that this new distributed algorithm converges to an optimal solution with high probability, and present numerical results to demonstrate that the convergence occurs quickly, even with measurement noise.
From page 19...
... The zero trust networks group has had notable accomplishments in the publication of the Zero Trust Architecture in SP 800-207 and in orchestrating a wide variety and a large number of industry partners to come together to bring coherence to a rapidly evolving arena with a mix of technologies and strong competitive pressures. Likewise, notable accomplishments in the area of IP Security are the clear ability to declare success for the longstanding work on DNSSEC and playing a key role in the deployment of BGP origin authentication through the Resource Public Key Infrastructure.
From page 20...
... This core network would support radio access networks and applications across NIST and various government agencies. This would hopefully be used to establish internationally federated testbeds to support global research collaboration and explore new federated networking capabilities.
From page 21...
... For Zero Trust Networks, keeping up with this rapidly evolving arena will require resources of multiple types, including architecture, tools development, and some novel metrology to both assess effectiveness and to perform forensics when failures of the various protocols, algorithms, and code are discovered. There is also some danger that the current enthusiasm goes through a "trough of disillusionment" when the inevitable limitations of the approach become more generally recognized.
From page 22...
... Advanced Distributed Denial of Service Attack Mitigation Techniques CTL was actively looking into the distributed denial of service attack mitigation techniques before its re-organization. The security of the 5G/next-generation networks needs to be measured and assessed for deployment in national laboratories and public safety research centers more than ever before, because the commoditization of 5G core allows for amplification attacks from a single Radio Access Network to infiltrate multi-vendor core networks, thereby increasing security risks.
From page 23...
... For the disruptive networking, and especially the ICN work, this needs to be expanded with more staff to increase progress on the forwarder work and to undertake additional metrology projects, such as the creation of synthetic traces and the tools to measure ICN networks. Core networks is a wide area to investigate and there are numerous opportunities; one of the main challenges is to identify where to invest very limited resources.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.