HUAWEI TECHNOLOGIES Co., Ltd. PID: A Generic Naming Schema for Information-centric Network Xinwen Zhang, Ravi Ravindran Haiyong Xie, Guoqiang Wang Huawei.

Slides:



Advertisements
Similar presentations
© Antônio M. Alberti 2011 Host Identification and Location Decoupling: A Comparison of Approaches Bruno Magalhães Martins Antônio Marcos Alberti.
Advertisements

Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Hierarchical Routing Architecture Introduction draft-xu-rrg-hra-00.txt Routing Research Group Xiaohu XU
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
ICN Packet Format Design Requirements presented by Alex Afanasyev Alex Afanasyev (UCLA), Ravi Ravindran (Huawei), GQ Wang (Huawei), Lan Wang (University.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Object Naming & Content based Object Search 2/3/2003.
Naming And Directory Services Geetika Sharma 09/22/200 8 CSC8320.
Host Identity Protocol
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing in an Enterprise Network Introducing Routing and Switching in the.
The Network of Information: Architecture and Applications SAIL – Scalable and Adaptable Internet Solutions Bengt Ahlgren et. al Presented by wshin.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing in an Enterprise Network Introducing Routing and Switching in the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Information-Centric Networks06b-1 Week 6 / Paper 2 A layered naming architecture for the Internet –Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia.
How to use DNS during the evolution of ICN? Zhiwei Yan.
Routing Architecture for the Next-Generation Internet (RANGI) draft-xu-rangi-01.txt Xiaohu Xu IETF76 Hiroshima.
ICN Packet Format Design Requirements presented by Alex Afanasyev Alex Afanasyev (UCLA), Ravi Ravindran (Huawei), GQ Wang (Huawei), Lan Wang (University.
1 Chapter 2 Database Environment Pearson Education © 2009.
Naming in Content-Oriented Architectures 1. select produce Data publishing RWINameKey Data own certify 2.
The Web Web Design. 3.2 The Web Focus on Reading Main Ideas A URL is an address that identifies a specific Web page. Web browsers have varying capabilities.
Databases and Database User ch1 Define Database? A database is a collection of related data.1 By data, we mean known facts that can be recorded and that.
Database Management.
Network Fundamentals – Chapter 5
Introduction to the database systems (1)
Client/Server Databases and the Oracle 10g Relational Database
Alternatives to Mobile Agents
Domain Name System (DNS)
Information Security message M one-way hash fingerprint f = H(M)
Chapter 9 Database Systems
Draft-forwarding-label-ccn-02.txt Ravi Ravindran, Asit Chakraborti, Aytac Azgin Huawei (IETF/ICNRG-95, Buenos Aires)
Goals of soBGP Verify the origin of advertisements
Peer-to-peer networking
Configuring and Testing Your Network
Network Fundamentals – Chapter 5
Information Security message M one-way hash fingerprint f = H(M)
9/22/2018.
Design IV Chapter 18 11/14/2018 Crowley OS Chap. 18.
Chapter 2 Database Environment Pearson Education © 2009.
Data Base System Lecture : Database Environment
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
IS4680 Security Auditing for Compliance
Information Security message M one-way hash fingerprint f = H(M)
Network Fundamentals – Chapter 5
T Research Seminar on Datacommunications Software
An Update on Multihoming in IPv6 Report on IETF Activity
Distributed Systems CS
Distributed Systems CS
Distributed Systems CS
V. Arun College of Information and Computer Sciences
Planning the Addressing Structure
Network Fundamentals – Chapter 5
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
PKI (Public Key Infrastructure)
Network Fundamentals – Chapter 5
Chapter 2 Database Environment Pearson Education © 2009.
Instructor Materials Chapter 5: Ensuring Integrity
Views Base Relation View
Network Fundamentals – Chapter 5
Presentation transcript:

HUAWEI TECHNOLOGIES Co., Ltd. PID: A Generic Naming Schema for Information-centric Network Xinwen Zhang, Ravi Ravindran Haiyong Xie, Guoqiang Wang Huawei Technologies

HUAWEI TECHNOLOGIES Co., Ltd. Background Naming a content object is fundamental for ICN Affect all other design options There are multiple roles for a name, for example: R1 (relatively unique) -- identifying R2 (always locatable) - routing R3 (readable/semantic) – meaning (to app) R4 (bindable ) – security verifier R5 (trustable) – trust verifier Previously, community try to achieve many roles with single-entity name Flat name Hierarchical readable name Hierarchical flat name We propose a different way A name consists of multiple entities Each for different purposes Page 2

HUAWEI TECHNOLOGIES Co., Ltd. P:I:D naming schema Page 3 I is the identifier of the object can be something chosen by publisher can be hierarchical or flat, user-readable or non-readable, and location-independent. D is the domain that provides resolution from identifier to the real location of the object by routers. The locator of the target object if the locator is persistent; The resolution service name which maps the content identifier to its real location, if the resolution service name is persistent; A resolution service name that maps the content identifier to another resolution service name or location, that is, a meta- domain; Any combination of above. P is the principal to bind the object with complete name for security purpose for different relationships, e.g., ownership, administration, and social relations. usually constructed by hashing the public key of the principal, or the hashing the content object itself if it is static.

HUAWEI TECHNOLOGIES Co., Ltd. Generalized naming scheme Page 4

HUAWEI TECHNOLOGIES Co., Ltd. P:I:D naming resolution protocol Page 5 I_PDU (P:I:D) Name resolution Application A content name (P:I:D) 1.Check CS with (P:I) 2.If yes return PDU 3.Else, routing I_PDU with D 4.Obtain content location 5.Augment I_PDU with location 6.Retrieve content with I_PDU D (A name resolution service) Content publisher/owner PDUs before movement PDU after movement D’ Resolution update

HUAWEI TECHNOLOGIES Co., Ltd. Features Multi-home of content with multiple domains in one name Which supports multiple NRS at the same time Mobility support Late-binding of address to PDU Flexibility Support names in legacy and ICN proposals Strong binding Enable efficient check if a content is correctly named in network Enable trust verification at end side With help of external trust management mechanisms (e.g., PKI) Page 6

HUAWEI TECHNOLOGIES Co., Ltd. Example Page 7

HUAWEI TECHNOLOGIES Co., Ltd. Thank You