Content Centric Networking

Slides:



Advertisements
Similar presentations
Panel: ICN Architecture Overview Cedric Westphal Huawei Innovations
Advertisements

COPYRIGHT © 2011 ALCATEL-LUCENT. ALL RIGHTS RESERVED. INFORM: a dynamic INterest FORwarding Mechanism for Information Centric Networking Raffaele Chiocchetti,
NDN in Local Area Networks Junxiao Shi The University of Arizona
Multimedia and Mobile communications Laboratory CCN 1 DK Han Junghwan Song Computer Networks Practice.
Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California,
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
Ubiquitous Shift With Information Centric Network Caching Using Fog Computing This research is contained in Computational Intelligence in Information Systems.
Proxy-assisted Content Sharing Using Content Centric Networking (CCN) for Resource-limited Mobile Consumer Devices Jihoon Lee, Dae Youb Kim IEEE Transactions.
Adaptive flow control via Interest Aggregation in CCN by Dojun Byun, Byoung-joon, Myeong-Wuk Jang Samsung Electronics, Advanced Institute of Technology.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
ComNets Tutorial: Future Internet with Information Centric Networks Asanga Udugama (1), Carmelita Goerg (1) and Andreas Timm-Giel (2) (1) Communications.
Martin-1 CSE 5810 CSE 5810 Individual Research Project: Integration of Named Data Networking for Improved Healthcare Data Handling Robert Martin Computer.
Computer Networks with Internet Technology William Stallings
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Running large scale experimentation on Content-Centric Networking via the Grid’5000 platform Massimo GALLO (Bell Labs, Alcatel - Lucent) Joint work with:
Multimedia & Mobile Communications Lab.
Outline Introduction Existing solutions for ad hoc
Privacy in ICN Nikos Fotiou and George Xylomenos Mobile Multimedia Laboratory Department of Informatics AUEB, Greece PURSUIT: Publish Subscribe Internet.
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
Applicability and Tradeoffs of ICN for Efficient IoT draft-lindgren-icnrg-efficientiot-01 presented by Adeel Malik IRTF ICNRG Interim ICNRG meeting, Paris.
Ασύρματες και Κινητές Επικοινωνίες
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
Future Internet with Information Centric Networks
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Muhammad Waseem Iqbal Lecture # 20 Data Communication.
Information Centric Networking (ICN) in IMT-2020
Instructor Materials Chapter 4: Introduction to Switched Networks
Network Layer: IP Addressing
Notes Onur Ascigil, Vasilis Sourlas, Ioannis Psaras, and George Pavlou
CS4470 Computer Networking Protocols
NDN (Named Data Networking)
Packet Switching Datagram Approach Virtual Circuit Approach
IP Forwarding Covers the principles of end-to-end datagram delivery in IP networks.
Project CS ~1min 11 students Project CS course
Troubleshooting IP Communications
Chapter 6: Network Layer
Instructor Materials Chapter 4: Introduction to Switched Networks
Connecting Networks Repeater: physical layer Bridge: data link layer
Chapter 4: Switched Networks
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
CCN application-domains: brainstorming from GreenICN project
IP Forwarding Relates to Lab 3.
CS 31006: Computer Networks – The Routers
Chapter 4: Switched Networks
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
IP Forwarding Relates to Lab 3.
Privacy in Content-Oriented Networking: Threats and Countermeasures
PRESENTATION COMPUTER NETWORKS
Switching Techniques.
Chapter 4: Network Layer
Chapter 4: Network Layer
Indirect Communication Paradigms (or Messaging Methods)
Chapter 3 Part 3 Switching and Bridging
COMP/ELEC 429/556 Introduction to Computer Networks
Indirect Communication Paradigms (or Messaging Methods)
IP Forwarding Relates to Lab 3.
How Our Customers Communicate With Us
CS 31006: Computer Networks – Moving From End-to-End To Per Hop
EE 122: Lecture 22 (Overlay Networks)
IP Forwarding Relates to Lab 3.
WJEC GCSE Computer Science
CCE1030 Computer Networking
WJEC GCSE Computer Science
Network Layer: Internet Inter-Domain Routing
Internet Protocol version 6 (IPv6)
Multiprocessors and Multi-computers
Switching.
Presentation transcript:

Content Centric Networking Fred Baker

Agenda and comments I am commenting on networking research Paradigm: identifying and retrieving content, as opposed to talking with computers Multiple related projects: Van Jacobson (PARC) Content Centric Networking (CCN) Lixia Zhang (UCLA) Named Data Networking (NDN) European projects generally called Information-Centric Networking (ICN) Giovanna Carofiglio’s work at Alcatel-Lucent, Bell Labs, and Cisco gcarofig@cisco.com Numerous others… The big questions at Tical will be: Why? What? How to experiment with it?

CCN in a nutshell Today’s Internet Content Centric Networking (CCN) CCN advantages Ever-growing amount of digital info From point-to-point to (multi)point-to-multipoint info dissemination Connectivity diversity: multiple devices, heterogeneous networks Waste of resources in content replication! Simplified network management Traffic reduction and localization Seamless, ubiquitous connectivity Congestion reduction Effective Security Names not addresses Packet self-identification Packet self-certification Receiver-based transport Enhanced router storage Before… …After 3 3

Content names and packets Content items are identified by a unique name and are split into self-identified chunks (packets) CCN names are hierarchically structured to allow aggregation of routing and forwarding table entries. E.g. /BellLabs/ICN/talks/reality.avi/chunk0 CCN packets are of two types: Hierarchical naming scheme, content published in repositories, repositories annouce prefixes they can serve. Data is divided in chunks. A user expresses interest for every packet of the content.

CCN Communication Model /BellLabs/ICN/talks/reality.avi A B Interest H /BellLabs/ICN/talks/reality.avi/chunk0 Users generate Interest messages to request content chunk- by-chunk One Interest retrieves one specific content chunk (Data packet) Interests are routed towards permanent copies of the content Data is transmitted only in response to an Interest and follows reverse Interest path Intermediate nodes transparently cache in-transit Data packets

Name-based Routing Routing can be done in a similar fashion to today’s IP routing: Routers announce “name prefixes” covering data they are willing to serve Announcements are propagated through the network via a routing protocol Every router builds its Forwarding Information Base (FIB) Component-wise longest prefix match forwarding based on FIB information

CCN vs IP Forwarding CCN IP CCN FIB (Forwarding Information Base) is used to forward Interest packets toward potential sources. Almost identical to IP FIB. Content Store enhances buffer memory in an IP router and has a caching function: in-transit Data are stored in order to serve future requests and replaced only when the cache is full. PIT (Pending Interest table) keeps track of forwarded Interests. Only one entry per “similar” requests is kept. This entry is used to forward Data packets toward interested consumers.

CCN node operations Interest packet Data packet Lookup Content Store Lookup+Update(Add/Change entry) Pending Interest Table (PIT) Lookup Forwarding Information Base (FIB) Forwarding Data packet Lookup+Update(Remove entry) Pending Interest Table (PIT) Store in Content Store Forwarding Additional operations may be required to verify packets

CCN Transport imdb.com www.imdb.com/title/tt12242 www.imdb.com/title/tt12242 So the end-user emits a content request by requesting the first chunk with a named interest packet. The interest is forwarded upstream until tehe first hitting cache or the repo and each intermediate node keeps track of the pending interest in a structure called PIT. Once the data chunk is found it is sent back to the user following the reverse path of the interests. PIT entries play the role of the breadcrumbs allowing to build the reverse path. The data packet is then cached at each node before the user in order to serve subsequent requests for the same content. Interests are forwarded along named-based routes (RIB/FIB) Data are retrieved from the first hitting cache (Content Store) Chunks of a given content may be retrieved from multiple locations Interest aggregation on a pending interest (PIT)

CCN transport principles receiver based Receiver controls Interest rate for a content retrieval based on Data rate (window-based controller), performs loss and congestion control. natively multipath Interest may be forwarded along different routes according to different forwarding strategies. Chunks of the same content may be retrieved from different locations. coupled with in-path caching The sender endpoint is not known. On a path between user and a permanent copy of the content every intermediate node can send the content in response to an Interest.

Using CCN/NBN/ICN

Threads IoT Model Origin: Google Nest Enclave communicating with upstream service https://docs.mbed.com/docs/arm-ipv66lowpan-stack/en/latest/thread_overview/ Defined gateway (UDP/IPv6 <-> 6LowPAN) Security managed by architecture 6LowPAN within 802.15.4 network

Message Queue Telemetry Transport (MQTT): Similar model, but publish/subscribe Devices communicate with MQTT Gateway MQTT Gateway is intermediate or temporary data repository Powered devices: TLS/TCP Low power devices: DTLS/UDP, sleeping nodes Data is identified by message identifier Command to “the light bulbs on the second floor” Telemetry from “motion sensors on the second floor” Upstream application unaware of individual sensors or actuators Publish Subscribe Enclave communicating with upstream service

ICN: named data pull not push, and no sessions Sending commands for light bulbs on second floor, interested in telemetry from second floor motion sensors Enclave communicating with upstream service Devices communicate with content router advertising a class of names Router is intermediate or temporary data repository Data is identified by content name “Command for the light bulbs on the second floor” “Telemetry from motion sensors on the second floor” Upstream application may or may not be aware of individual sensors or actuators Any system may issue named messages Systems wanting to receive them send “interest” messages Interested in commands for light bulbs on second floor, sending telemetry from second floor motion sensors

Example application In a hospital, tracking patients Traditional model: Sensors in rooms Nursing station or other system monitoring sensors IP address, if used, is for a device in the room But is the room what is important? Probably not: probably the patient and data type are important The patient might move! Privacy – who should have access to patient data? Different types of sensors – who needs to know their data? So – name the data for the patient and the type of information And apply security policies around patient confidentiality

Sounds good, but what are the weaknesses? Predicting names! Scalabiliy of Inter-Domain Routing Traditional IP sends data when someone wants to send it And might send spam or malware ICN sends data that someone wants when they want to receive it If they can’t predict its existence or its name, that can be difficult Data that is predictably generated or in a repository works well Voice and video are current research topics

Discussion…