Multimedia and Mobile communications Laboratory CCN 1 DK Han Junghwan Song 2012-3-7 Computer Networks Practice.

Slides:



Advertisements
Similar presentations
Zhongxing Ming Dan Li Chumei Xia Mingwei Xu Tsinghua University.
Advertisements

Panel: ICN Architecture Overview Cedric Westphal Huawei Innovations
Information-centric networking: Concepts for a future Internet David D. Clark, Karen Sollins MIT CFP November, 2012.
Internetworking II: MPLS, Security, and Traffic Engineering
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
Suphakit Awiphan, Takeshi Muto, Yu Wang, Zhou Su, Jiro Katto
Session 4f, 16 th June 2010 Future Network & MobileSummit 2010 Copyright 2010 Mobile Multimedia Laboratory Socket Emulation over a Publish/Subscribe Network.
NAT (Network Address Translator) Atif Karamat In the name of God the most merciful and the most compassionate.
CSEE W4140 Networking Laboratory Lecture 3: IP Forwarding and ICMP Jong Yul Kim
Jang, Donghyun 2011/4/4 1/21.
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Application Layer PART VI.
Spring EE4272 Switch vs. Router Switch:  Def. 1: A network node that forwards packets from inputs to outputs based on header information in each.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Router Architectures An overview of router architectures.
Router Architectures An overview of router architectures.
Mapping Internet Addresses to Physical Addresses (ARP)
Proxy-assisted Content Sharing Using Content Centric Networking (CCN) for Resource-limited Mobile Consumer Devices Jihoon Lee, Dae Youb Kim IEEE Transactions.
Networked File System CS Introduction to Operating Systems.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Common Devices Used In Computer Networks
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 18 Omar Meqdadi Department of Computer Science and Software Engineering University.
Virtual Circuit Network. Network Layer 2 Network layer r transport segment from sending to receiving host r network layer protocols in every host, router.
Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD School of Computer & Communication Engineering.
ComNets Tutorial: Future Internet with Information Centric Networks Asanga Udugama (1), Carmelita Goerg (1) and Andreas Timm-Giel (2) (1) Communications.
Martin-1 CSE 5810 CSE 5810 Individual Research Project: Integration of Named Data Networking for Improved Healthcare Data Handling Robert Martin Computer.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Authors: Haowei Yuan, Tian Song, and Patrick Crowley Publisher: ICCCN 2012 Presenter: Chai-Yi Chu Date: 2013/05/22 1.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
EECB 473 DATA NETWORK ARCHITECTURE AND ELECTRONICS PREPARED BY JEHANA ERMY JAMALUDDIN Basic Packet Processing: Algorithms and Data Structures.
《 Hierarchical Caching Management for Software Defined Content Network based on Node Value 》 Reporter : Jing Liu , China Affiliation : University of Science.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Multimedia & Mobile Communications Lab.
Outline Introduction Existing solutions for ad hoc
Database as a networked server DB at the centre of the network Network Access Map for DB environment Tracking of tools and apps Remove unnecessary network.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
CS 4396 Computer Networks Lab Router Architectures.
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
Socket Programming Introduction. Socket Definition A network socket is one endpoint in a two-way communication flow between two programs running over.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Enabling Genomic BIG DATA with Content Centric Networking J.J. Garcia-Luna-Aceves UC Santa Cruz
1 Network Address Translation. 2 Network Address Translation (NAT) Extension of original addressing scheme Motivated by exhaustion of IP address space.
Multimedia Retrieval Architecture Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia Retrieval Architecture.
Zhaogeng Li, Jun Bi, Sen Wang, and Xiaoke Jiang Asia FI Workshop in Kyoto, 2012 Sho Harada Park Lab Nov 29 th, 2012.
Computer Networks 0110-IP Gergely Windisch
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
Future Internet with Information Centric Networks
1 K. Salah Application Layer Module K. Salah Network layer duties.
Content-centric routing in Wi-Fi direct multi-group networks Claudio Casetti, Carla Fabiana Chiasserini, Luciano Curto Pelle, Carolina Del Valle, Yufeng.
Lecture 14 Mobile IP. Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
ROUTING.
Auction-based in-network caching in Information-centric networks Workshop ACROSS, 16th of September 2016 | Lucia D’Acunto.
Boots Cassel Villanova University
Content Centric Networking
Chapter 4 Introduction to Network Layer
NDN (Named Data Networking)
Implementation of GPU based CCN Router
Project CS ~1min 11 students Project CS course
CCN application-domains: brainstorming from GreenICN project
ICN, IoT and the Fog Enabling computation at the edge Marcel Enguehard
Privacy in Content-Oriented Networking: Threats and Countermeasures
Cloud-Enabling Technology
COMPUTER NETWORKS CS610 Lecture-29 Hammad Khalid Khan.
Requirements of Computing in Network
Chapter 15 - IP: Software To Create A Virtual Network
Presentation transcript:

Multimedia and Mobile communications Laboratory CCN 1 DK Han Junghwan Song Computer Networks Practice

Introduction Aim of old days (‘60s-‘70s) network  Resource(card readers, tape drives) sharing  Host-to-host model  Conversation between exactly two machines Now  People value the Internet for what content it contains, but communication architecture is still focused on host-to-host  ‘what’ is more important than ‘where’ 2/22

Need for new networks Storage cost is getting cheaper sharply  Compared to networking cost IP datagram can only point endpoints Users/applications care “ WHAT TO RECEIVE ”  They don’t care “ FROM WHERE or FROM WHOM ”  So, host-based comm. model is outdated 3/22 Contents Centric Network is proposed

CCN(Content-Centric Networking) Communication architecture built on named data Packet ‘address’ names content, not location  Users are interested in what content, not where it is 4/22

IP networking vs. content networking Network prefix Content name 5/22

CCN protocol stacks Content chuncks  Data are fragmented into chunks Strategy layer  Best exploit multiple connectivity under changing condition Security layer  Secure content itself, avoiding host-based vulnerabilities 6/22

How CCN works? Client requests a content  Without specifying ‘from where’ Nodes provides the content or forward requests to find one Nodes on the path caches contents  So that future demands can be served A A B B C C D D E E G G F F H H I I J J K K Client 1 Client 2 Client 3 A A B B D D H H G G 7/22

CCN packet types Two types of CCN packets  Interest packets  Data packets 8/22

Node components Content Store (buffer memory)  Caches Data packets Pending Interest Table (PIT)  Keeps track of Interest forwarded upstream (bread scrumbs) Forwarding Information Base (FIB)  Forwarding table  Allows a list of outgoing interfaces 9/22

Basic operation Data simply follows the chain of PIT entries back to demander 10/22

Basic operation - Example 11/22 Interest MMLAB.kr/member/tjchung/ profile/v/s0 MMLAB.kr/member/tjchung/profile/v/s0 /MMLAB.kr DATA:/ MMLAB.kr/member/tjchung/ profile/v/s0 MMLAB.kr/member/tjchung/profile/v/s0 1 0 No Cache!

In a nutshell, 12/22

Next time, We will see how to build up CCN environment. 13/22