© 2007, it - instituto de telecomunicações. Todos os direitos reservados. Beyond 2020 Content Centric Networking 50 PhD Graduates Celebration Event Aalborg,

Slides:



Advertisements
Similar presentations
1 Mata Architecture for the Future Network APAN2008 January Myung-Ki SHIN, ETRI
Advertisements

Delay Tolerance in a Network of Information Dirk Kutscher – NEC Labs SAIL Project Consortium DTNRG IETF
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
© 2005, it - instituto de telecomunicações. Todos os direitos reservados. Anonymity in Wireless Networks Under Traffic Analysis Attacks Hugo Moreira de.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Group #1: Protocols for Wireless Mobile Environments.
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
Bundubox ITU IOT IOT APPLICATION CHALLENGE. Proposal ▫Main idea ▫Local Communication Issues, Involved Solution ▫Bundubox: Local off the grid ip communication.
Suphakit Awiphan, Takeshi Muto, Yu Wang, Zhou Su, Jiro Katto
Universität Rostock1 A P2P network traffic and access control protocol Herwig Unger Albert – Einstein-Str. 23, Rostock, Germany Phone:
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Reliable Internetworking using the Pub/Sub Paradigm Nikos Fotiou Advisor: Prof. George C. Polyzos Mobile Multimedia Laboratory, Department of Informatics.
Jang, Donghyun 2011/4/4 1/21.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Chapter 1 Read (again) chapter 1.
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
High Performance Cooperative Data Distribution [J. Rick Ramstetter, Stephen Jenks] [A scalable, parallel file distribution model conceptually based on.
Web Caching Schemes For The Internet – cont. By Jia Wang.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
Internet Technologies Networking / Internet Protocols (TCP/IP) Server/Client Software Communication via Ports Web Page Technology Recipe of Web Page Development.
Dr. Philip Cannata 1 Principles of Network Applications.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Data Communications and Networking
P2P Architecture Case Study: Gnutella Network
CMPTR Chapter 5.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
1 Vehicular Networks - Content distribution and data retrieval Slides are integrated from researchers at UCLA.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
School of Engineering and Computer Science Victoria University of Wellington Copyright: Peter Andreae, VUW Networking COMP # 21.
1 High-Level Carrier Requirements for Cross Layer Optimization Dave McDysan Verizon.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Meta Architecture : A New Narrow Waist for Future Internet Hourglass
Switching Techniques Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
Week 12 (2012) Dr. Ghada Drahem. INTENDED LEARNING OUTCOMES This lecture covers: Networking concepts and terminology Common networking and communications.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Computer Networks with Internet Technology William Stallings
Othman Othman M.M., Koji Okamura Kyushu University 1.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Network Security, CS6262 Richard G. Personal Information Masquerading, Profiling, Snooping.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
William Stallings Data and Computer Communications
Multimedia & Mobile Communications Lab.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
Web Services. 2 Internet Collection of physically interconnected computers. Messages decomposed into packets. Packets transmitted from source to destination.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Networks, Part 2 March 7, Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.
WREC Working Group IETF 49, San Diego Co-Chairs: Mark Nottingham Ian Cooper WREC Working Group.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
4WARD Networking of Information 4WARD WP6. © 4WARD Consortium Confidential Networking of Information Telephony Interconnecting wires 4WARD Future Internet.
For more course tutorials visit NTC 406 Entire Course NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper NTC 406.
Multicast in Information-Centric Networking March 2012.
EDI ( ELECTRONIC DATA INTERCHANGE). Strategic Impact of EDI Business processes can become more efficient Customer-supplier relationships may change more.
Graciela Perera Introduction Graciela Perera
Slides taken from: Computer Networking by Kurose and Ross
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Computer Science 457 Networking and the Internet
Jirawat Thaenthong, PhD
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

© 2007, it - instituto de telecomunicações. Todos os direitos reservados. Beyond 2020 Content Centric Networking 50 PhD Graduates Celebration Event Aalborg, April 11, 2008 Martijn Kuipers

2 Beyond 2020 Content Centric Networking | Aalborg, April 11, 2008 Conversation & Dissemination Today's networks exist (circuit switched and TCP/IP) to allow two entities to have a conversation. More than 99% of today’s networks is for an entity to acquire or distribute named chunks of data (like web pages or messages). Acquiring or distributing named chunks of data is not conversation, it’s a dissemination.

3 Beyond 2020 Content Centric Networking | Aalborg, April 11, 2008 Data matters ! In a dissemination (e.g., getting a web page) the data matters but not who gives it to you. It’s possible to disseminate via conversation and accomplish the user’s goal as a side effect but: It’s inefficient (hotspots, poor reliability, poor utilization). Users have to do the translation between their goal & its realization.

4 Beyond 2020 Content Centric Networking | Aalborg, April 11, 2008 Data matters ! Data is requested, by name, using any and all means available. Anything that hears the request and has a valid copy of the data can respond. The returned data is signed, and optionally secured, so its integrity & association with the name can be validated.

5 Beyond 2020 Content Centric Networking | Aalborg, April 11, 2008 Trust the content, not the connection Trust & data integrity are foundation of the design, not an add-on. Trust is associated with user level objects, not abstractions like an SSL connection. Network transacts in content, not conversations, so popular content won’t generate congestion.

6 Beyond 2020 Content Centric Networking | Aalborg, April 11, 2008 Advantages of dissemination Since nodes don’t need names, wireless & sensor nets can use simpler, local protocols (e.g., proximity, diffusion). Data can be cached by any node so intermittent operation doesn’t preclude communication. Delay is not only tolerated, it’s irrelevant. Can use opportunistic transport (e.g., planes overhead, car-roadway-car, fellow travellers).

7 Beyond 2020 Content Centric Networking | Aalborg, April 11, 2008 Conclusion With IP the need to switch the “wires” is gone, but we still need to switch the data ! Dissemination would fix this. Dissemination is already here in the form of overlays (BitTorrent p2p, Sonos mesh, Apple Rendezvous). There clearly is a need. We need to look beyond the current way of doing things and start concentrating more on the data instead of the network.

8 Beyond 2020 Content Centric Networking | Aalborg, April 11, 2008 References IST-4WARD Project, project.eu Van Jacobsen, “If a Clean Slate is the solution what was the problem?”, Stanford ‘Clean Slate’ Seminar, February 27, 2006