4WARD Networking of Information 4WARD WP6. © 4WARD Consortium Confidential Networking of Information Telephony Interconnecting wires 4WARD Future Internet.

Slides:



Advertisements
Similar presentations
Contextualized Information-Centric Home Networking (draft-ravindran-cibus-01.txt) IRTF/ICN-RG (IETF-89) Ravi Ravindran, Asit Chakraborti, G.Q.Wang.
Advertisements

OSI Model OSI LAYER / MODEL.
Group #1: Protocols for Wireless Mobile Environments.
International Standards Organization Open Systems Interconnect (OSI) Reference Model Advanced Computer Networks.
Jang, Donghyun 2011/4/4 1/21.
TCP/IP summary Skills: none IT concepts: review This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License.
Chapter 1 Read (again) chapter 1.
EE 4272Spring, 2003 EE4272: Computer Networks Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. Spring, 2003.
An Overlay Multicast Infrastructure for Live/Stored Video Streaming Visual Communication Laboratory Department of Computer Science National Tsing Hua University.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
1 TCP/IP architecture A set of protocols allowing communication across diverse networks Out of ARPANET Emphasize on robustness regarding to failure Emphasize.
Sensor Coordination using Role- based Programming Steven Cheung NSF NeTS NOSS Informational Meeting October 18, 2005.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
1 MultimEDia transport for mobIlE Video AppLications 9 th Concertation Meeting Brussels, 13 th February 2012 MEDIEVAL Consortium.
PPSP Tracker Protocol draft-gu-ppsp-tracker-protocol PPSP WG IETF 82 Taipei Rui Cruz (presenter) Mário Nunes, Yingjie Gu, Jinwei Xia, David Bryan, João.
Throughput: Internet scenario
Lecture 1 The OSI Model Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Presentation on Osi & TCP/IP MODEL
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Chapter 1. Introduction. By Sanghyun Ahn, Deot. Of Computer Science and Statistics, University of Seoul A Brief Networking History §Internet – started.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
FI-CORE Data Context Media Management Chapter Release 4.1 & Sprint Review.
Information Grid Services in the Polish Optical Internet PIONIER Cezary Mazurek, Maciej Stroiński, Jan Węglarz.
Spring 2006Computer Networks1 Chapter 2 Network Models.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
Ocean Observatories Initiative Data Management (DM) Subsystem Overview Michael Meisinger September 29, 2009.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
BASIC INTERNET PROTOCOLS: http, ftp, telnet. Mirela Walczak.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
William Stallings Data and Computer Communications
1 Pre-Introduction What is computer network?. 2 Pre-Introduction Suppose you want to build a computer network The question is: –What available technologies.
Experience Sharing in Mobile Peer Communities EPI Planete, INRIA International Consortium Meeting (Oulou) 10 June, 2009.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
MPEG-4: Multimedia Coding Standard Supporting Mobile Multimedia System Lian Mo, Alan Jiang, Junhua Ding April, 2001.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Communication Chapter 2.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Multicast in Information-Centric Networking March 2012.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
INTERNET PROTOCOL TELEVISION (IP-TV)
OSI model vs. TCP/IP MODEL
Part I. Overview of Data Communications and Networking
© 2003, Cisco Systems, Inc. All rights reserved.
Content Aware Overlay Networks
Layered Architectures
Understanding the OSI Reference Model
Data Networking Fundamentals
Lec 5 Layers Computer Networks Al-Mustansiryah University
INTERNET PROTOCOL TELEVISION (IP-TV)
Computer Networks CMSC417 Prof. Ashok K . Agrawala
Presentation transcript:

4WARD Networking of Information 4WARD WP6

© 4WARD Consortium Confidential Networking of Information Telephony Interconnecting wires 4WARD Future Internet Interconnecting information Internet Interconnecting nodes Future Internet Folding Point Termin al Forwa rder Termin al Evolution Virtualization of network resources

© 4WARD Consortium Confidential PM/Slide 3 Main objective  The objective is to investigate architectural models for networks were the focus is moved from nodes to information objects.

© 4WARD Consortium Confidential PM/Slide 4 Benefits  Efficient large-scale content distribution for any application –Caching can be built-in from the beginning –No need for special configuration or interception of requests as in today's networks  Performance and reliability are improved –Information can be retrieved from the closest available source –Gives more flexibility in delivering information compared to the end-to- end reliable byte-stream Especially important in heterogeneous wireless environments with frequent disruptions in communication Better opportunity to utilise high-bandwidth access when available Also applicable for non-dissemination applications

© 4WARD Consortium Confidential Comparing today’s overlay networking  Common dissemination infrastructure for all applications, including network support  Network awareness of application needs H P2P H H H H H H H Network P2P Overlay H P2P DNN H H H H H H H H H Dissemination Network API

© 4WARD Consortium Confidential PM/Slide 6 Scenarios  1. Content distribution –VoD, Live TV, personalised content  2. Augmented Internet – Real-world objects –Linking real world objects in the virtual information world  3. Serverless web –Handling the slashdot effect, serving content in the local vicinity, creating content collaboratively  4. Content delivery in a mobile scenario –Retrieving information when connectivity is intermittent, efficiently utilising high-bitrate access when available  5. Network & Call control and management –Network monitoring in NetInf; Call control for services with real-time constraints

© 4WARD Consortium Confidential PM/Slide 7 Functionality needed by the scenarios  Information object model –including object meta-data, multiple representations at the bit-level, versioning, support for live streaming and support for physical objects  Information object integrity –Object identification and verification of authenticity independent of its location  Object search –Google for objects  Object lookup/resolution –Mechanisms for finding the “best” copy of the object, given a name or identifier for the object, private scope as well as public/global scope  Object distribution –Mechanisms for information object routing and caching, including replication and synchronisation, and optimisation of delivery  Object storage –Management of storage for objects

© 4WARD Consortium Confidential PM/Slide 8 NetInf architecture overview NetInf User A NetInf User B NetInf User C Google for NetInf objects Operate on object by ID Locate Information Object Locate Bit-level Object NetInf machinery Transport Bit-level objects Locate Real World Object Real World Object tracker NetInf Object operations Create ID Publish ID Remove ID Store/update object Get object Locate object Delete object Store Bit-level objects Move Bit-level object to/from location Real World User Real World Objects Real World Objects updates

© 4WARD Consortium Confidential Information modelling  What are the basic objects of our NetInf architecture? –Do we, with networking of information mean the objects storing the information (syntax) or the semantics of the information, e.g. the difference between the message contained in a text vs. the media it is stored on (e.g. tape, book,... )

© 4WARD Consortium Confidential PM/Slide 10 Terminology: Objects  Distinguish between objects at two abstraction levels:  Information object –Piece of information with some meaning (semantics)‏ a book, a movie, a picture, an , etc –Can have metadata –Represented by zero or more bit-level objects –Can have hierarchy Movie has frames, book has pages, etc  Bit-level object –Sequence of unique bits –Can be represented by its hash (SHA-1, MD-5, etc)‏ –Can have hierarchy Corresponding to Information object hierarchy

© 4WARD Consortium Confidential New abstractions  A new communication abstraction (API) supporting communication of application data objects. Possibilities include publish/subscribe, storage system,... This could be one or multiple abstractions.  A lower abstraction (interface) to the "bit piping" infrastructure. Something to replace today’s "packet over links between nodes" abstraction. This could be something like a "light path" (optical WDM) or a broadcast abstraction.

© 4WARD Consortium Confidential PM/Slide 12 NetInf service API  API that provides NetInf service to applications  Operates on Information objects by ID and context –“ID” is the ID of the object –“context” specifies a set of contexts where the object is explicitly or implicitly published Can directly be a locator where a copy can be found Can be a directory service keeping track of that object  Operations –create/publish/remove ID –store/update object –get/locate object –delete object

© 4WARD Consortium Confidential PM/Slide 13 NetInf lower interface  Service for transporting/moving a bit-level object to/from location –GET/PUT operations, or “move from A to B”  Interfaces to –Transport of bit-level objects all kinds of things, including http, TCP/IP, IP multicast and of course Generic Paths! –Storage of bit-level objects

© 4WARD Consortium Confidential PM/Slide 14 Object model – indirection layers info-obj obj container locator1locator2 Bit-level Objects Higher-level semantics Copies or chunks available at certain (recursive) containers, e.g. node Mobility/ multi-homing

© 4WARD Consortium Confidential PM/Slide 15 Object model – physical entities Info-obj VirtualEntity A1A1 A3A3 A2A2 ID 123 Info-obj Real world Internet Object in the real world PhysicalEntity Related information objects Virtual repre- sentation on the Internet incl. physical attributes and unique ID

© 4WARD Consortium Confidential PM/Slide 16 Summary and status of work  We are design a new network architecture from an information-centric approach –Rather than from a device-centric approach  The information is in focus –Not from where we get it  Brings several benefits –Better large-scale distribution efficiency –Better performance an reliability (also for non-dissemination applications)‏  Ongoing work on information modelling, object naming and the architectural framework  Performance simulation and prototyping just started