2012.**.** Supporting reliability using reverse path in Publish/Subscribe Internet Takashima Daiki ParkLab, Waseda University, Japan 1/11.

Slides:



Advertisements
Similar presentations
Interconnection Networks: Flow Control and Microarchitecture.
Advertisements

Switching Technology presented by Hussain Ahmad BA-Abdullah. Fawaz abdullah AL-Amri. prof : Adel Ali.
1 Introduction to Mobile IPv6 IIS5711: Mobile Computing Mobile Computing and Broadband Networking Laboratory CIS, NCTU.
1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
Mobility in a Publish Subscribe Internetwork Dr. Dmitrij Lagutin Helsinki Institute for Information Technology (HIIT) (based on slides by Prof. George.
PSIRP Architectural Components Part 1 Mikko Särelä Slides by Walter Wong.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Access Control Enforcement Delegation for Information-Centric Networking Architectures N. Fotiou, G.F. Marias, G.C Polyzos.
Content-based Routing for Information Centric Networks D. Reininger ECE 544 Spring 2014.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Multicasting in Mobile Ad-Hoc Networks (MANET)
Session 4f, 16 th June 2010 Future Network & MobileSummit 2010 Copyright 2010 Mobile Multimedia Laboratory Socket Emulation over a Publish/Subscribe Network.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Illustrating a Publish-Subscribe Internet Architecture Nikolaos Fotiou 1 George C. Polyzos 1 Dirk Trossen 2 Presenter: Konstantinos Katsaros 1 1 Athens.
A Survey of Wireless Sensor Network Data Collection Schemes by Brett Wilson.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Wolfgang EffelsbergUniversity of Mannheim1 Multicast IP Wolfgang Effelsberg University of Mannheim September 2001.
Ad hoc Network 江崎研究室 修士1年 中島 亮. What is Ad hoc Network?  Meaning of Ad hoc Network Ad hoc =その場限りの Node to node → ノード間で一時的に形成されるネットワーク.
Hermes: A Distributed Event- Based Middleware Architecture Peter Pietzuch and Jean Bacon 1st DEBS Workshop, Vienna,
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Application Layer Multicast for Earthquake Early Warning Systems Valentina Bonsi - April 22, 2008.
A Study of MPLS Department of Computing Science & Engineering DE MONTFORT UNIVERSITY, LEICESTER, U.K. By PARMINDER SINGH KANG
PURSUIT Summer School, August Mobility in a Publish Subscribe Internetwork George Xylomenos Mobile Multimedia Laboratory Dept. of Informatics Athens.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
Mobile Routing protocols MANET
ECE 544 Project3 Team member. Assumptions and Address Scheme Assumptions End hosts can only connect to routers Same content available at multiple end.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Blackadder ICN Prototype T Jimmy Kjällman Ericsson Research, NomadicLab.
Sato Lab G lobal I nformation and T elecommunication S tudies Waseda University 2014/06/19 ICN Based Disaster Information Sharing Service(DISS) Zheng Wen,
Circuit & Packet Switching. ► Two ways of achieving the same goal. ► The transfer of data across networks. ► Both methods have advantages and disadvantages.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
IEEE Communications Magazine July 2012 Bertrand Mathieu Patrick Truong
Towards Exploiting User- Centric Information for Proactive Caching in Mobile Networks ‡ , WWRF28, Athens Xenofon Vasilakos Xenofon Vasilakos,
Othman Othman M.M., Koji Okamura Kyushu University 1.
1 HAWAII- Handoff-Aware Wireless Access Internet Infrastructure Reporter : Jing-Shiuan Hua Date : 2005/4/26.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
IPv6 Routing Milo Liu SW2 R&D ZyXEL Communications, Inc.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Privacy in ICN Nikos Fotiou and George Xylomenos Mobile Multimedia Laboratory Department of Informatics AUEB, Greece PURSUIT: Publish Subscribe Internet.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
SocialVoD: a Social Feature-based P2P System Wei Chang, and Jie Wu Presenter: En Wang Temple University, PA, USA IEEE ICPP, September, Beijing, China1.
Content Routing Protocol Design Karthikeyan Ganesan Shruti Venkatesh Rafay Zamir.
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Scatternet Formation of Bluetooth Ad Hoc Networks Bin Zhen, Jonghun Park, Yongsuk Kim HICSS 2003.
Information-Centric Networks Section # 10.2: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
Information-Centric Networks Section # 10.3: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Peter R Pietzuch and Jean Bacon Peer-to-Peer Overlay Networks in an Event-Based Middleware DEBS’03, San Diego, CA, USA,
Ασύρματες και Κινητές Επικοινωνίες
PSIRP Architectural Components Part 2 Walter Wong NomadicLab & HIIT
David Clark, Robert Braden, Aaron Falk, Venkata Pingali ACM SIGCOMM 2003 Workshops August 25&27, Jongsoo Lee
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
Future Internet with Information Centric Networks
Auction-based in-network caching in Information-centric networks Workshop ACROSS, 16th of September 2016 | Lucia D’Acunto.
Mobility in a Publish Subscribe Internetwork
ECE 544 Project3 Team member.
Name-based Packet Forwarding
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
ECE 544 Project3 Team member.
IP Multicast COSC /5/2019.
ECE 544 Project3 Dheeraj Medikonda Ravi Chandra Godavarthi 1.
Presentation transcript:

2012.**.** Supporting reliability using reverse path in Publish/Subscribe Internet Takashima Daiki ParkLab, Waseda University, Japan 1/11

Outline 2/11 1.What is Information-Centric Networking? 2. Introduction of PURSUIT -Forwarding 3. Background 4. Proposal 5. Conclusion 6. References

What is Information-Centric Networking ? 3/11 Information-Centric Networking (ICN) is one of the significant directions of current networking research. When retrieving content, ICN uses content information itself instead of location information. In the Internet the only way to retrieve content is to establish an end-to-end connection. While the user’s demand has been changed to content-oriented one: YouTube, twitter, facebook ・・・ etc.

Introduction of PURSUIT PURSUIT is one of the ICN architecture which uses publish subscribe model. 4/11 Rendezvous Point Publisher Subscriber Subscription message Publication message Send Fid Matching!! Forward data Get Fid Rendezvous identifier ( Rid ): denotes individual content itself Scope identifier ( Sid ): makes group of Rid, access rights of data sources, categories of data Forwarding identifier ( Fid ): denotes forwarding path from publisher to subscriber Sid (waseda) Rid1 Rid2 Rid3 Sid (music) Rid4 Rid5 Rid6 Topology Management

5/11 Introduction of PURSUIT ~ Forwarding~ Fid consists of Bloom Filter and strict routing is realized. Subscriber Publisher DATA Fid: Data packet IF P-1 InterfaceLink ID IF IF IF Node 1 Node 2 Node 3 InterfaceLink ID IF P IF 1-1 IF 1-2 Match and forward IF 1-3 InterfaceLink ID IF IF IF 3-1 IF 3-2 InterfaceLink ID IF IF IF S-1 IF 2-2 IF 2-1 Match and forward 忘却防止のためヒ ントとなるキーワ ードを入れる

Background How to support reliability is one of the main problems in PURSUIT. We propose reliability communication by making reverse path. 6/11 AdvantagesDisadvantages Not need to know source or destination No way for a subscriber to contact a publisher Easy to realize multicast False positive Table1. Advantages and Disadvantages of Fid (Bloom Filter)

Subscriber Publisher 7 Proposal ~ making reverse path ~ DATA Fid: Data packet IF P-1 InterfaceLink ID IF IF IF Node 1 Node 2 Node 3 InterfaceLink ID IF P IF 1-1 IF 1-2 Match and forward IF 1-3 InterfaceLink ID IF IF IF 3-1 IF 3-2 InterfaceLink ID IF IF IF S-1 IF 2-2 IF 2-1 Match and forward Reverse path can be made by aggregating incoming Link ID in each node. Reverse Fid: /11 InterfaceLink ID IF S

Supporting reliability using reverse path Reverse path realizes ・ sending ACK message, ・ requesting missed data to the publisher or near cache Reliability connection like TCP comes true without knowing who or where the publisher is. 8/11 Rendezvous Point Publisher Subscriber When forwarding data Topology management Each node aggregates incoming Link ID ACK or Request for missed data ( Reverse path’s Fid )

Subscription message for RP Returning specified data directly Reverse path also realizes returning specified cached data directly when subscription message is sent to RP and the data is found at a node on the path. In this case, cache node can decrease the burden of Rendezvous Point. 9/11 Rendezvous Point Publisher Subscriber Matching Forward data Topology management Cache hit!!!

10/11 Reverse path is useful to supporting: ・ sending ACK message ・ requesting missed data to the publisher or near cache ・ returning specified cached data directly when subscription message is sent to Rendezvous Point and the data is found at a node on the path. Conclusion

[1] G Xylomenos, et al., Caching and Mobility Support in a Publish- Subscribe Internet Architecture, IEEE Comm Magazine, July [2] Nikolaos Fotiou, George C.Polyzos,DirkTrossen,”Illustrating a Publish-Subscribe Internet Architecture,” 11/11 Reference

Thank you !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

False positive : ~data is sent undesirable way~ If Link ID of IF 1-2 is Packet will be sent to undesirable way (: Node 3 where no subscriber is) How to set a bit string is a significant problem. Subscriber Publisher DATA Fid: Data packet IF P-1 InterfaceLink ID IF IF IF Node 1 Node 2 Node 3 InterfaceLink ID IF P IF 1-1 IF 1-2 Match and forward IF 1-3 InterfaceLink ID IF IF IF 3-1 IF 3-2 InterfaceLink ID IF IF IF S-1 IF 2-2 IF 2-1 Match and forward

Existing method for subscriber’s mobility 10/13 Rendezvous Point Publisher Subscriber Subscription message Cache node Send Fid Data forwarding [1] G Xylomenos, et al., Caching and Mobility Support in a Publish-Subscribe Internet Architecture, IEEE Comm Magazine, July Problem A moved subscriber always has to resend subscription message to RP. This increases RP’s burden and latency. Traditional support for subscriber’s mobility

Cache node can send data to a moved node according to reverse path’s Fid. 11/13 Rendezvous Point Publisher Subscriber Subscription message Data forwarding Supporting subscriber’s mobility Cache node Using reverse path can support subscriber’s mobility efficiently.