Multimedia & Mobile Communications Lab.

Slides:



Advertisements
Similar presentations
Panel: ICN Architecture Overview Cedric Westphal Huawei Innovations
Advertisements

Information-centric networking: Concepts for a future Internet David D. Clark, Karen Sollins MIT CFP November, 2012.
Internetworking II: MPLS, Security, and Traffic Engineering
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
CSCI 4550/8556 Computer Networks Comer, Chapter 22: The Future IP (IPv6)
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
Chapter 18 Introduction to Network Layer 18.# 1
Multimedia and Mobile communications Laboratory CCN 1 DK Han Junghwan Song Computer Networks Practice.
Authors: Alexander Afanasyev, Priya Mahadevany, Ilya Moiseenko, Ersin Uzuny, Lixia Zhang Publisher: IFIP Networking, 2013 (International Federation for.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Robust Packet Delivery in Named Data Networking
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
SDN and Openflow.
Firewall Configuration Strategies
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
1 Internet Networking Spring 2004 Tutorial 13 LSNAT - Load Sharing NAT (RFC 2391)
Internet Indirection Infrastructure Ion Stoica and many others… UC Berkeley.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
CS 268: Lecture 5 (Project Suggestions) Ion Stoica February 6, 2002.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
© MMII JW RyderCS 428 Computer Networks1 Mapping Internet to Physical Addresses  2 machines on a physical network can only communicate if they know each.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #12 LSNAT - Load Sharing NAT (RFC 2391)
Lecture Slide Rizwan Rehman, CCS. Classless and Subnet Address Extensions (CIDR) Topics: –There are problems with the IP addressing scheme we’ve studied.
Network Address Translation (NAT) CS-480b Dick Steflik.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Proxy-assisted Content Sharing Using Content Centric Networking (CCN) for Resource-limited Mobile Consumer Devices Jihoon Lee, Dae Youb Kim IEEE Transactions.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Common Devices Used In Computer Networks
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 18 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
CCNA 1 Module 10 Routing Fundamentals and Subnets.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD School of Computer & Communication Engineering.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
ComNets Tutorial: Future Internet with Information Centric Networks Asanga Udugama (1), Carmelita Goerg (1) and Andreas Timm-Giel (2) (1) Communications.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
Authors: Haowei Yuan, Tian Song, and Patrick Crowley Publisher: ICCCN 2012 Presenter: Chai-Yi Chu Date: 2013/05/22 1.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Mobile IP 순천향대학교 전산학과 문종식
1 Kyung Hee University Chapter 11 User Datagram Protocol.
K. Salah1 Security Protocols in the Internet IPSec.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
CIS 700-5: The Design and Implementation of Cloud Networks
Mobile IP.
Content Centric Networking
NDN (Named Data Networking)
Network Address Translation
Forwarding and Routing IP Packets
* Essential Network Security Book Slides.
Classless and Subnet Address Extensions (CIDR)
Computer Networks Protocols
Internet Protocol version 6 (IPv6)
Presentation transcript:

Multimedia & Mobile Communications Lab. Named Data Networking Multimedia & Mobile Communications Lab. Taejoong Chung 2010-03-21 tjchung@mmlab.snu.ac.kr

Contents Introduction Architecture Conclusion Vision Principle & Operation Architecture Details Name Security Routing and Forwarding Caching, PIT Transport Conclusion

The Advent of Network Networking was invented for sharing resources not for data A user connects to server to use resources in machines The fundamental communication model is point-to-point (host-to-host) conversation Basically ‘Who/Where’ Model A user connect to server to uses resources in machine

Evolution of Network However, overwhelming use of today’s network is for a machine to acquire chunk (data) Acquire named chunks of data is not a conversation It’s dissemination Most of us need ‘WHAT’ data are, don’t care ‘WHERE’ it comes from Middleware does it for us, the location of data is stored

Need for New Network Data communication today is about moving content Internet was moving dozens of exabytes/month. IP datagram can only name communication endpoints Current network-architecture is not appropriate for current usage Propose an new internet architecture by removing this restriction: NDN

Architecture Principle Hourglass architecture ‘thin waist’ has been a key enabler for internet’s explosive growth Security is built into the architecture By signing all named data cf) current network supports secure container Traffic must be self-regulated Flow-control is moved into network Routing and forwarding plane separation Similar to current one

NDN Architecture Component Messages FIB (Forwarding Information Base) Interest Data FIB (Forwarding Information Base) Similar to routing table PIT (Pending Interest Table) Store interests for data Content Store Space for cached data

MMLAB.kr/member/tjchung/ MMLAB.kr/member/tjchung/ NDN Basic Operation MMLAB.kr/member/tjchung/profile/v/s0 Interest MMLAB.kr/member/tjchung/ profile/v/s0 DATA:/ MMLAB.kr/member/tjchung/ profile/v/s0 MMLAB.kr/member/tjchung/profile/v/s0 Mmlab/member/tjchung.profile/v/s0 /MMLAB.kr 1

NDN Supports Automatically support various functionality without extra infrastructure Content Distribution Many users requesting the same data at different time Multicast Many users requesting the same data at same time Mobility User request data at different location Delay-Tolerant Networking Data is cached close to user

Architecture 1) Name Names are opaque network Router doesn’t know the meaning of the name Allows each application to choose the name scheme that fits its need Hierarchically structured name Do not need to be globally unique To retrieve dynamically generated data, it needs Deterministic algorithm between consumer and producer Partial name supports mmlab/profile/tjchung -> mmlab/profile/tjchung/v0/1

Architecture 2) Security Function of HOW rather than WHERE Security is can not ‘opt-out’ but mandatory Every data carries a signature Data publisher information enables provenance Current internet security cares about container (e.g. IPSEC)

Architecture 3) Routing and Forwarding Routes and forward packets on name, which eliminates 1) Address space exhaustion Unbound namespaces 2) NAT traversal Host doesn’t expose its address 3) Mobility No longer breaks communication since data name remain same 4) Scalable address management Address assignment & management is no longer required in local network

Architecture 3) Routing and Forwarding (contd.) Routing can operates in same way as before Instead of IP prefix, using ‘Named’ prefix Longest prefix match Benefits No open-loop problem Random number added method for interest, reverse path for data Enable to send interest to multiple interface without worries Load balancing Security Signing all data prevents them from being spoofed mitigates prefix hijacking Difficult to send malicious packets to particular target

Architecture 4) Caching Both IP & NDN router buffers data packet But NDN router reuse data Benefits Both of static and dynamic data could be got benefits In case of dynamic data, retransmission cost is eased Alleviation of privacy problem concerns In today’s network, one can figure out WHAT data is, WHO wants data from by inspecting header NDN router doesn’t know who originates the request

Architecture 5) PIT (Pending Interest Table) Waiting list for requiring data Supports PIT can setup timer (application takes charge of retransmission) Natural support for multicast Repetitive interest can be served using one data Rate & Congestion control for incoming data By controlling PIT size Congestion control has been moved from transport layer Mitigates DDoS attack Number of PIT entries is an explicit indication of router loads

Architecture 6) Transport NDN doesn’t have separate transport layer Supports Multiplexing and demultiplexing Directly done using names Data integrity and reliability checked Signature Management of traffic loads by setting PIT size Eliminates end-host’s congestion control Retransmission is aided by cache congested data clients server

On-Going Projects originated from limits Routing table management Unbounded address rises scalability issues for routing table Security issues about key Key management and dissemination Cache capacity Lots of cached space needed

Conclusion Current usage of network needs changed paradigm from host centric to data centric network We need data, not host information NDN (Named Data Networking) supports many functionalities that is hardly or can not be done in current network Addressing problem Security problem Etc..