Zhaogeng Li, Jun Bi, Sen Wang, and Xiaoke Jiang Asia FI Workshop in Kyoto, 2012 Sho Harada Park Lab Nov 29 th, 2012.

Slides:



Advertisements
Similar presentations
Zhongxing Ming Dan Li Chumei Xia Mingwei Xu Tsinghua University.
Advertisements

Panel: ICN Architecture Overview Cedric Westphal Huawei Innovations
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Li Fan, Pei Cao and Jussara Almeida University of Wisconsin-Madison Andrei Broder Compaq/DEC.
Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
Multimedia and Mobile communications Laboratory CCN 1 DK Han Junghwan Song Computer Networks Practice.
Mitigate DDoS Attacks in NDN by Interest Traceback Huichen Dai, Yi Wang, Jindou Fan, Bin Liu Tsinghua University, China 1.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Cooperative Caching of Dynamic Content on a Distributed Web Server Vegard Holmedahl, Ben Smith, Tao Yang Speaker: SeungLak Choi, DB Lab., CS Dept.
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
CS335 Principles of Multimedia Systems Multimedia Over IP Networks -- I Hao Jiang Computer Science Department Boston College Nov. 6, 2007.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
Introduction. Overview of Pushback. Architecture of router. Pushback mechanism. Conclusion. Pushback: Remedy for DDoS attack.
NFD forwarding pipelines Junxiao Shi,
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Princeton University Joint work with Jennifer.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
DECADE Usage in PPSP draft-le-ppsp-decade-interoperation-00 Guan Le, Lichun Li, Ke Xu, Meina Song, Jun Wang
Secure Content Delivery in Information- Centric Networks: Design, Implementation, and Analysis Satysjayant Misra, Reza Tourani, Nahid Ebrahimi Majd Presenter.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
Proxy-assisted Content Sharing Using Content Centric Networking (CCN) for Resource-limited Mobile Consumer Devices Jihoon Lee, Dae Youb Kim IEEE Transactions.
Adaptive flow control via Interest Aggregation in CCN by Dojun Byun, Byoung-joon, Myeong-Wuk Jang Samsung Electronics, Advanced Institute of Technology.
Dead Nonce List Junxiao Shi Bug 1953: persistent loop with short InterestLifetime A B C Interest Nonce=204 lifetime=150 delay=100 delay=20.
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
Quasar A Probabilistic Publish-Subscribe System for Social Networks over P2P Kademlia network David Arinzon Supervisor: Gil Einziger April
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
NFD forwarding pipelines Junxiao Shi,
Aadil Zia Khan and Shahab Baqai LUMS School of Science and Engineering QoS Aware Path Selection in Content Centric Networks Fahad R. Dogar Carnegie Mellon.
ComNets Tutorial: Future Internet with Information Centric Networks Asanga Udugama (1), Carmelita Goerg (1) and Andreas Timm-Giel (2) (1) Communications.
2012.**.** Supporting reliability using reverse path in Publish/Subscribe Internet Takashima Daiki ParkLab, Waseda University, Japan 1/11.
Martin-1 CSE 5810 CSE 5810 Individual Research Project: Integration of Named Data Networking for Improved Healthcare Data Handling Robert Martin Computer.
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
Interest NACK Junxiao Shi, Introduction Interest NACK, aka "negative acknowledgement", is sent from upstream to downstream to inform that.
NFD forwarding pipelines Junxiao Shi,
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Authors: Haowei Yuan, Tian Song, and Patrick Crowley Publisher: ICCCN 2012 Presenter: Chai-Yi Chu Date: 2013/05/22 1.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
IEEE Communications Magazine July 2012 Bertrand Mathieu Patrick Truong
Page  1 Content Centric Network: Caching WANG Yu KATTO Lab. Dec
Othman Othman M.M., Koji Okamura Kyushu University 1.
Routing Policies in Named Data Networking Steve DiBenedetto Christos Papadopoulos Dan Massey.
《 Hierarchical Caching Management for Software Defined Content Network based on Node Value 》 Reporter : Jing Liu , China Affiliation : University of Science.
Authors: Matteo Varvello, Diego Perino, and Leonardo Linguaglossa Publisher: NOMEN 2013 (The 2nd IEEE International Workshop on Emerging Design Choices.
Codes, Peers and Mates Media processing meets future networks EU Workshop on thematic priorities in Networked Media Brussels January 19 th 2010 Ebroul.
Multimedia & Mobile Communications Lab.
Packet-Marking Scheme for DDoS Attack Prevention
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
Deadline-based Resource Management for Information- Centric Networks Somaya Arianfar, Pasi Sarolahti, Jörg Ott Aalto University, Department of Communications.
Hint-based Acceleration of Web Proxy Cache Daniela Rosu Arun Iyengar Daniel Dias IBM T.J.Watson Research Center Unversity of Yuan Ze,Syslab Mike Tien
Routing Metrics and Protocols for Wireless Mesh Networks Speaker : 吳靖緯 MA0G0101.
Networking Components Assignment 3 Corbin Watkins.
Advanced Science and Technology Letters Vol.54 (Networking and Communication 2014), pp Efficient Duplicate.
Future Internet with Information Centric Networks
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Auction-based in-network caching in Information-centric networks Workshop ACROSS, 16th of September 2016 | Lucia D’Acunto.
MAC Address Tables on Connected Switches
Content Centric Networking
Networking Devices.
NDN (Named Data Networking)
NFD forwarding pipelines
Hardware accelerator to speed up packet processing in NDN router
Implementation of GPU based CCN Router
Introduction to Networking
Department of Computer Science
Statistical Optimal Hash-based Longest Prefix Match
Name-based Packet Forwarding
Privacy in Content-Oriented Networking: Threats and Countermeasures
ITIS 6010/8010 Wireless Network Security
IN-network state management of long running computations
Presentation transcript:

Zhaogeng Li, Jun Bi, Sen Wang, and Xiaoke Jiang Asia FI Workshop in Kyoto, 2012 Sho Harada Park Lab Nov 29 th, 2012

1. Introduction 2. CCN (Content Centric Networking) 3. Bloom Filter 4. Architecture 5. Problem 6. United Bloom Filter 7. Error Handling 8. Experiments 9. Conclusion 10. Reference 2

 CCN was developed to solve many network problems that is being occurred from increasing traffic.  It is one of the most promising architectures as a Future Internet architecture.  CCN router uses three tables that store data.  This proposal enables us to compress the size of the table. 3

 Packet  Interest Packet : Used to request a content.  Data Packet : Used to send the content.  CCN router  CS (Content Store) : Cache contents.  PIT (Pending Interest Table) : Record name and face to define where to forward Data Packet.  FIB (Forwarding Information Base) : Record face to decide where to forward Interest Packet. 4

5

6

7

8

9

10

 Bloom Filter is introduced in PIT.  Content Name is converted by hash function and added to Bloom Filter of the appropriate face. 11

Bloom FilterFace NameFace Youtube/Video.mp PIT FIB 12

Bloom FilterFace NameFace Youtube/Video.mp PIT FIB Interest “Youtube/Video.mp4” 13

Bloom FilterFace NameFace Youtube/Video.mp PIT FIB Interest “Youtube/Video.mp4” H( “Youtube/Video.mp4” ) = “ ” 14

Bloom FilterFace NameFace Youtube/Video.mp PIT FIB Data “Youtube/Video.mp4” H( “Youtube/Video.mp4” ) = “ ” 15

Bloom FilterFace NameFace Youtube/Video.mp PIT FIB Data “Youtube/Video.mp4” H( “Youtube/Video.mp4” ) = “ ” H( “Youtube/Video2.mp4” ) = “ ” 16

Bloom FilterFace NameFace Youtube/Video.mp PIT FIB Data “Youtube/Video.mp4” H( “Youtube/Video.mp4” ) = “ ” H( “Youtube/Video2.mp4” ) = “ ” Data “Youtube/Video.mp4” 17

Bloom FilterFace NameFace Youtube/Video.mp PIT FIB Interest “Youtube/Video.mp4” H( “Youtube/Video.mp4” ) = “ ” 18

 Use two Bloom Filters in one face.  Filter shifts active and inactive.  When a Bloom Filter stops, it will be initialized. 19

Time Filter 1 Filter 2 Filter 1 = “ ” (Active) Filter 2 = “ ” 20

Time Filter 1 Filter 2 Filter 1 = “ ” (Active) Filter 2 = “ ” (Record) 21

Time Filter 1 Filter 2 Filter 1 = “ ” Filter 2 = “ ” (Active) 22

 The result of experiment shows that the probability of false positive was less than 0.1 %.  If an Interest Packet was dropped, the requester sends Interest Packet again.  Data may be forwarded by false positive. But the Data Packet will be dropped by the next node. 23

24 BF : 1MB Interest Data Interest Data

 Compression of PIT : 40% reduced  Probability of False Positive : 0.027% 25

 Introducing Bloom Filter, the compression of PIT is realized.  When we use Bloom Filter, we need to think of False Positive. ⇒ Experiment shows the probability of False Positive was only %. Therefore, it will not make a big problem. We have only to deal with False Positive when it happens. 26

 Zhaogeng Li, Jun Bi, Sen Wang, and Xiaoke Jiang, “The Compression of PIT with Bloom Filter in CCN”, Asia FI Workshop in Kyoto,

28