Applicability and Tradeoffs of ICN for Efficient IoT draft-lindgren-icnrg-efficientiot-01 presented by Adeel Malik IRTF ICNRG Interim ICNRG meeting, Paris.

Slides:



Advertisements
Similar presentations
ICN RG Proposed Charter IETF–81 July 2011 Börje Ohlman & Dirk Kutscher.
Advertisements

Panel: ICN Architecture Overview Cedric Westphal Huawei Innovations
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California,
Cooperative Overlay Networking for Streaming Media Content Feng Wang 1, Jiangchuan Liu 1, Kui Wu 2 1 School of Computing Science, Simon Fraser University.
A Server-less Architecture for Building Scalable, Reliable, and Cost-Effective Video-on-demand Systems Jack Lee Yiu-bun, Raymond Leung Wai Tak Department.
ICN Packet Format Design Requirements presented by Alex Afanasyev Alex Afanasyev (UCLA), Ravi Ravindran (Huawei), GQ Wang (Huawei), Lan Wang (University.
Anders Lindgren Applicability and Tradeoffs of ICN for Efficient IoT draft-lindgren-icnrg-efficientiot-02.
1 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015 Where are the opportunities for ICN in Sensor Networks?
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Internet Traffic Patterns Learning outcomes –Be aware of how information is transmitted on the Internet –Understand the concept of Internet traffic –Identify.
Interactions Between Delayed Acks and Nagle’s Algorithm in HTTP and HTTPS: Problems and Solutions Arthur Goldberg Robert Buff New York University March.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
CS541 Advanced Networking 1 Vehicular Ad Hoc Networks (VANETs) Neil Tang 2/4/2009.
Wide-area cooperative storage with CFS
Ubiquitous Shift With Information Centric Network Caching Using Fog Computing This research is contained in Computational Intelligence in Information Systems.
ICN based Architecture for IoT (draft-zhang-iot-icn-architecture-00.txt) ICNRG/IETF 90, 2014 Ravi Ravindran (Huawei, USA)
Web Cache. Introduction what is web cache?  Introducing proxy servers at certain points in the network that serve in caching Web documents for faster.
Gursharan Singh Tatla Transport Layer 16-May
Sensor Coordination using Role- based Programming Steven Cheung NSF NeTS NOSS Informational Meeting October 18, 2005.
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
XMPP – Extensible Messaging and Presence Protocol Vidya Satyanarayanan.
03/09/2003Helsinki University of Technology1 Overview of Thesis Topic Presented By: Zhao Xuetao.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Towards the scalability of a Service-oriented PCE architecture for IoT scenarios Vitor Barbosa C. Souza Xavi Masip Bruin Eva Marin Tordera CRAAX - Technical.
Draft-li-mpls-global-label-framework-02IETF 90 MPLS WG1 A Framework of MPLS Global Label draft-li-mpls-global-label-framework-02 Zhenbin Li, Quintin Zhao,
The Network of Information: Architecture and Applications SAIL – Scalable and Adaptable Internet Solutions Bengt Ahlgren et. al Presented by wshin.
Distributed File Systems Overview  A file system is an abstract data type – an abstraction of a storage device.  A distributed file system is available.
한국기술교육대학교 컴퓨터 공학 김홍연 Habitat Monitoring with Sensor Networks DKE.
Computer Networks with Internet Technology William Stallings
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
Economic Incentives in Information- Centric Networking: Implications for Protocol Design and Public Policy Group Members: Muhammad Kamran Siddique Adel.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
INTERNET AND ADHOC SERVICE DISCOVERY BY: NEHA CHAUDHARY.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
1 Distributed Databases BUAD/American University Distributed Databases.
Applicability and Tradeoffs of ICN for Efficient IoT draft-lindgren-icnrg-efficientiot-00 presented by Olov Schelén IRTF ICNRG IETF 90, Toronto.
Privacy in ICN Nikos Fotiou and George Xylomenos Mobile Multimedia Laboratory Department of Informatics AUEB, Greece PURSUIT: Publish Subscribe Internet.
ICN Packet Format Design Requirements presented by Alex Afanasyev Alex Afanasyev (UCLA), Ravi Ravindran (Huawei), GQ Wang (Huawei), Lan Wang (University.
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
PPSP BAR BOF meeting 74th IETF – San Francisco, CA, USA March, 2009 P2P Streaming Protocol (PPSP) Requirements Ning Zong,Huawei Technologies Yunfei Zhang,China.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
Ασύρματες και Κινητές Επικοινωνίες
1 The Features of the IoT and Some Extension Considerations China Communications Standards Association Subin Shen 21th meeting CJK.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Carles Gomez Universitat Politècnica de Catalunya (UPC)/Fundació i2cat
Content Centric Networking
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Principles of Network Applications
Communication Topics Jason Hill –
Data Dissemination and Management - Topics
draft-zhang-icnrg-icniot-requirements-00
Börje Ohlman Dave Oran Dirk Kutscher IETF-98 /
Carlos J. Bernardos, Alain Mourad, Akbar Rahman
Lecture 2: Overview of TCP/IP protocol
Consideration on applying ICN to Edge Computing
EE 122: Lecture 22 (Overlay Networks)
Presentation transcript:

Applicability and Tradeoffs of ICN for Efficient IoT draft-lindgren-icnrg-efficientiot-01 presented by Adeel Malik IRTF ICNRG Interim ICNRG meeting, Paris September 27 th, 2014

Motivation and Objectives How to support efficient and scalable IoT over existing ICN proposals with small changes to the ICN concepts – IoT shares several characteristics with typical ICN applications – However, heterogeneity of IoT networks introduces challenges In this draft we cover:- – Advantages of ICN for IoT – Challenges with ICN for IoT – Design choices and associated trade-offs to allow for effective, efficient, scalable and secure handling of IoT data in an ICN network Objective – Avoid introducing IoT-specific architectural changes in ICN

ICN for IoT Advantages (A) and Challenges (C) Naming of data and services – A: in IoT, data acquisition and services is often the goal – C: to control/manage devices, to keep names short, to make names known or deducible Distributed caching – A: less transmissions to retrieve or send IoT data, saves power and bandwidth, and reduces delay for retrieval – C: to handle infrequently requested data and dynamic data Decoupling between sender and receiver – A: IoT devices may have intermittent network connectivity – C: to provide security and real-time data

Design choices for IoT where NO changes to ICN are needed ICN in concert with existing internet protocols – Facilitating actuation and control of specific IoT devices One-phase direct naming of objects – Addressable atomic data units with known/deducible names, no advanced “lookup” needed by ICN Immutable atomic data units – Eliminating cache inconsistencies, a trade-off is that dynamic data must be modeled as a stream of immutable data units – Name of “latest” value must be deducible Capability / data property advertisements – Explains how data is structured and addressed (e.g. valid points in time) – Advertisements can be disseminated with ICN

Design choices for IoT where NO changes to ICN are needed Handling actuators – State of actuator represented as a named data object Role of constrained IoT devices as ICN nodes – IoT devices should not act as intermediate ICN nodes – IoT devices can potentially store their own content i.e. act as ICN sources Object security – Handled above the ICN layer, no need to modify typical ICN standards

Design choices for IoT where additions to ICN concepts would improve efficiency The importance of time – extensions to ICN to represent time (clever use of metadata, namespace etc.) Pull and push – push is efficient for real-time information, triggered information, alarms, etc – Both push & pull should be supported, base model  pull, push trigger conditions defined by responder Optional meta data – For efficiency reasons delivering metadata (to/from resource constrained nodes) should be optional

Discussion Feedback Next steps