SlideShare une entreprise Scribd logo
1  sur  28
Information Centric Networking
and Content Addressability
Junxiao Shi, 2013-09-12
Copyright 2013, yoursunny.com, licensed under CreativeCommons BY-NC 3.0
Why ICN?
The existing Internet
 Core ideas developed in 1960s-1970s
 Modeled after telephony:
point-to-point conversation between two entities
IP is ‘conversational’
 IP datagrams can only name communication endpoints.
The world has changed
 Almost anything is available online.
 An ever increasing range of content can be distributed
digitally.
 Anyone can create, discover and consume content.
Exabytes of new content are produced yearly.
 Everything is connected to the Internet.
Internet is used for content distribution
IP is a poor match to its primary use
today
 Just as the telephone system would be a poor vehicle for
the broadcast content distribution done by TV and radio.
What is ICN?
Information Centric Networking
 Let the network focus on the content
itself, rather than the location of the
content.
Benefits of ICN
 If network understands what it’s carrying,
 Universal caching
 Adaptive multipath routing
 Better handling of mobility, address exhaustion, etc
 Secure the content rather than the pipe
Named Data Networking
 NDN is one of Information Centric Networking schemes.
 CCN (Content Centric Networking) is the project name at
PARC.
NDN (Named Data Networking) is the project name
sponsored by NSF.
How NDN works?
Key idea
 Give each packet a unique name.
 Packets are routed and forwarded based on names.
 Essentially changing the waist of the hourglass
architecture from address-based IP to content-name
based NDN.
From IP to NDN
How it works?
 Applications name its data.
 Consumers send Interest packets, producers respond with
Data packets (ContentObjects).
 Interests are routed based on their names.
 Routers remember outstanding Interests in Pending
Interest Table (PIT).
 Data trace back along PIT entries.
 Every data packet carries a signature.
Naming
 Applications give names to packets.
 NDN uses hierarchical names to facilitate aggregation,
management, discovery.
Receiver-driven data retrieval
 All communication is initiated by consumers, ie start with
an Interest packet.
 Routers forward the Interest towards the producer, and
remembers the incoming interface of the Interest.
 The producer sends the data back. The data takes the
exact reverse path of the Interest to reach the consumer.
 One Interest retrieves one data.
consumer router producer
1. Interest 2. Interest
3. ContentObject4. ContentObject
Caching
 Routers can now cache the data since they’re named.
consumer1
consumer2
router producer
cache
1.Interest
2. Interest
5. Interest
4. ContentObject
3. ContentObject
6. ContentObject
Security and Privacy
 Secure the content/data, not the pipe or the perimeter.
 Each data packet has to carry a signature
 because data can come from any router or source.
NDN and Content Addressability
Naming
 NDN: hierarchical names defined by applications
 Names are usually not hashes.
 Other ICN architectures may use hash as data name.
Fast name lookup
 NDN router looks up a Name in Forwarding Information Base (FIB)
to decide where to forward it.
 Name could have any number of components, and a component
could be arbitrarily long.
 Fast name lookup could be achieved in nested hash tables.
 A hash is computed over the first component, and the result
is a pointer to the next hash table, which is keyed with the
hash of the second component, and so on.
 If a name consists of k components, then in the absence of
collisions, k hash lookups would be required in the worst case
to identify the longest matching prefix.
Fast name lookup – nested hash tables
comp faces
ndn
ccnx
component faces
broadcast 12,11,10,9,8,7
keys 12,11,10,9,8,7
arizona.edu 473,7
ucla.edu
memphis.edu 10,12,11
parc.com 8,12,10
uci.edu 8,12,10
comp faces
irl 8,12,10
apps 8,12,10
comp faces
ping 262310
Aggregated signing
 Every ContentObject must be signed.
 Generating signature (RSA) for every individual block is
computationally expensive.
 Merkle hash trees amortize the signing cost over multiple
ContentObjects.
Aggregated signing – Merkle hash trees
H0=H(block0) H1=H(block1) H2=H(block2) H3=H(block3)
H4=H(H0H1) H5=H(H2H3)
H6=H(H4H5)
Aggregated signing
 Sign the root hash (H6) only.
 Include Merkle Path with the signature
 node index (eg. node 1)
 hash of sibling node, hash of parent’s sibling node, and so
on (eg. H0, H5 for node 1)
 To verify the signature for block1, one can compute
H1=H(block1), H4=H(H0H1), H6=H(H4H5), and see whether
the signature is valid for H6.
H0 H1 H2 H3
H4 H5
H6
References
References
 Van Jacobson et al, Networking Named Data
 NDN Technical Report NDN-0001, Named Data Networking (NDN) Project
 Beichuan Zhang, CSC630 Spring 2012
 CCNx technical documentation, CCNx Signature Generation and Verification

Contenu connexe

Tendances

Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...Benjamin Rainer
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryShi Junxiao
 
Information Centric Networking
Information Centric NetworkingInformation Centric Networking
Information Centric NetworkingShahneel Siddiqui
 
Content-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile NetworksContent-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile NetworksTorsten Braun, Universität Bern
 
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Editor IJCATR
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distanceIJCNCJournal
 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya pptMaurya Shah
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET Journal
 
Packet%20marking%20report
Packet%20marking%20reportPacket%20marking%20report
Packet%20marking%20reportAnmol Tikoo
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
 

Tendances (18)

Named data networking. Basic Principle
Named data networking. Basic PrincipleNamed data networking. Basic Principle
Named data networking. Basic Principle
 
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
Using In-Network Adaptation to Tackle Inefficiencies Caused by DASH in Inf...
 
Information-Centric Networking in Mobile Networks
Information-Centric Networking in Mobile NetworksInformation-Centric Networking in Mobile Networks
Information-Centric Networking in Mobile Networks
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN Repository
 
Information Centric Networking
Information Centric NetworkingInformation Centric Networking
Information Centric Networking
 
Content-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile NetworksContent-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile Networks
 
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distance
 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya ppt
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 
Packet%20marking%20report
Packet%20marking%20reportPacket%20marking%20report
Packet%20marking%20report
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
 
Guaranteed Greedy Routing in Overlay Networks
Guaranteed Greedy Routing in Overlay NetworksGuaranteed Greedy Routing in Overlay Networks
Guaranteed Greedy Routing in Overlay Networks
 
WLAN IP and Frame
WLAN IP and FrameWLAN IP and Frame
WLAN IP and Frame
 

En vedette

Content-Centric Networking: Security
Content-Centric Networking: SecurityContent-Centric Networking: Security
Content-Centric Networking: SecurityPARC, a Xerox company
 
Smart Congestion Control for Delay- and Disruption Tolerant Networks
Smart Congestion Control for Delay- and Disruption Tolerant NetworksSmart Congestion Control for Delay- and Disruption Tolerant Networks
Smart Congestion Control for Delay- and Disruption Tolerant NetworksAloizio Silva
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networksrapatil
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 

En vedette (7)

Content-Centric Networking: Security
Content-Centric Networking: SecurityContent-Centric Networking: Security
Content-Centric Networking: Security
 
Addressability
AddressabilityAddressability
Addressability
 
Smart Congestion Control for Delay- and Disruption Tolerant Networks
Smart Congestion Control for Delay- and Disruption Tolerant NetworksSmart Congestion Control for Delay- and Disruption Tolerant Networks
Smart Congestion Control for Delay- and Disruption Tolerant Networks
 
Kbrookbanks addressability v1
Kbrookbanks addressability v1Kbrookbanks addressability v1
Kbrookbanks addressability v1
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
 
Named data networking
Named data networkingNamed data networking
Named data networking
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 

Similaire à Information Centric Networking and Content Addressability

A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGIJCNCJournal
 
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...AIRCC Publishing Corporation
 
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...ijcsit
 
MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKING
MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKINGMEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKING
MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKINGIJCNCJournal
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) ijwmn
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet ProtocolMiles Priar
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Renee Jones
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Gaurav Mehndiratta
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Ishant Tiwari
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Sharon Roberts
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networkingIJCNCJournal
 
The Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksThe Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksJessica Deakin
 

Similaire à Information Centric Networking and Content Addressability (20)

IJCA
IJCAIJCA
IJCA
 
Case Study Layar
Case Study LayarCase Study Layar
Case Study Layar
 
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
 
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
 
Computer network solution
Computer network solutionComputer network solution
Computer network solution
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
 
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 
MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKING
MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKINGMEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKING
MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKING
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet Protocol
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
Mat 540 Quiz 3
Mat 540 Quiz 3Mat 540 Quiz 3
Mat 540 Quiz 3
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networking
 
The Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksThe Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer Networks
 

Plus de Shi Junxiao

Making Inter-domain Routing Power-Aware?
Making Inter-domain Routing Power-Aware?Making Inter-domain Routing Power-Aware?
Making Inter-domain Routing Power-Aware?Shi Junxiao
 
PowerTrade SurgeGuard
PowerTrade SurgeGuardPowerTrade SurgeGuard
PowerTrade SurgeGuardShi Junxiao
 
NFD InterestDigest
NFD InterestDigestNFD InterestDigest
NFD InterestDigestShi Junxiao
 
ICN Publish/Subscribe Networking
ICN Publish/Subscribe NetworkingICN Publish/Subscribe Networking
ICN Publish/Subscribe NetworkingShi Junxiao
 
Age-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksAge-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksShi Junxiao
 
ISA meeting 20131031
ISA meeting 20131031ISA meeting 20131031
ISA meeting 20131031Shi Junxiao
 
Network Redundancy Elimination
Network Redundancy EliminationNetwork Redundancy Elimination
Network Redundancy EliminationShi Junxiao
 
Content Addressable NDN Repository - checkpoint
Content Addressable NDN Repository - checkpointContent Addressable NDN Repository - checkpoint
Content Addressable NDN Repository - checkpointShi Junxiao
 
ISA meeting 20131004
ISA meeting 20131004ISA meeting 20131004
ISA meeting 20131004Shi Junxiao
 
Content Addressable NDN Repository - proposal
Content Addressable NDN Repository - proposalContent Addressable NDN Repository - proposal
Content Addressable NDN Repository - proposalShi Junxiao
 
VIỆT NAM, The hidden charm
VIỆT NAM, The hidden charmVIỆT NAM, The hidden charm
VIỆT NAM, The hidden charmShi Junxiao
 
Japanese Culture: Matsuri Festival and Religion
Japanese Culture: Matsuri Festival and ReligionJapanese Culture: Matsuri Festival and Religion
Japanese Culture: Matsuri Festival and ReligionShi Junxiao
 

Plus de Shi Junxiao (20)

NFD LuCI
NFD LuCINFD LuCI
NFD LuCI
 
Ride On Today
Ride On TodayRide On Today
Ride On Today
 
Making Inter-domain Routing Power-Aware?
Making Inter-domain Routing Power-Aware?Making Inter-domain Routing Power-Aware?
Making Inter-domain Routing Power-Aware?
 
PowerTrade SurgeGuard
PowerTrade SurgeGuardPowerTrade SurgeGuard
PowerTrade SurgeGuard
 
NFD InterestDigest
NFD InterestDigestNFD InterestDigest
NFD InterestDigest
 
ICN Publish/Subscribe Networking
ICN Publish/Subscribe NetworkingICN Publish/Subscribe Networking
ICN Publish/Subscribe Networking
 
Age-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksAge-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric Networks
 
Shaanxi Henan
Shaanxi HenanShaanxi Henan
Shaanxi Henan
 
Xinjiang
XinjiangXinjiang
Xinjiang
 
pcap-map
pcap-mappcap-map
pcap-map
 
Yuanxiao
YuanxiaoYuanxiao
Yuanxiao
 
ISA meeting 20131031
ISA meeting 20131031ISA meeting 20131031
ISA meeting 20131031
 
Network Redundancy Elimination
Network Redundancy EliminationNetwork Redundancy Elimination
Network Redundancy Elimination
 
Content Addressable NDN Repository - checkpoint
Content Addressable NDN Repository - checkpointContent Addressable NDN Repository - checkpoint
Content Addressable NDN Repository - checkpoint
 
ISA meeting 20131004
ISA meeting 20131004ISA meeting 20131004
ISA meeting 20131004
 
Content Addressable NDN Repository - proposal
Content Addressable NDN Repository - proposalContent Addressable NDN Repository - proposal
Content Addressable NDN Repository - proposal
 
VIỆT NAM, The hidden charm
VIỆT NAM, The hidden charmVIỆT NAM, The hidden charm
VIỆT NAM, The hidden charm
 
Mexico
MexicoMexico
Mexico
 
Hawaii
HawaiiHawaii
Hawaii
 
Japanese Culture: Matsuri Festival and Religion
Japanese Culture: Matsuri Festival and ReligionJapanese Culture: Matsuri Festival and Religion
Japanese Culture: Matsuri Festival and Religion
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Information Centric Networking and Content Addressability

  • 1. Information Centric Networking and Content Addressability Junxiao Shi, 2013-09-12 Copyright 2013, yoursunny.com, licensed under CreativeCommons BY-NC 3.0
  • 3. The existing Internet  Core ideas developed in 1960s-1970s  Modeled after telephony: point-to-point conversation between two entities
  • 4. IP is ‘conversational’  IP datagrams can only name communication endpoints.
  • 5. The world has changed  Almost anything is available online.  An ever increasing range of content can be distributed digitally.  Anyone can create, discover and consume content. Exabytes of new content are produced yearly.  Everything is connected to the Internet.
  • 6. Internet is used for content distribution
  • 7. IP is a poor match to its primary use today  Just as the telephone system would be a poor vehicle for the broadcast content distribution done by TV and radio.
  • 9. Information Centric Networking  Let the network focus on the content itself, rather than the location of the content.
  • 10. Benefits of ICN  If network understands what it’s carrying,  Universal caching  Adaptive multipath routing  Better handling of mobility, address exhaustion, etc  Secure the content rather than the pipe
  • 11. Named Data Networking  NDN is one of Information Centric Networking schemes.  CCN (Content Centric Networking) is the project name at PARC. NDN (Named Data Networking) is the project name sponsored by NSF.
  • 13. Key idea  Give each packet a unique name.  Packets are routed and forwarded based on names.  Essentially changing the waist of the hourglass architecture from address-based IP to content-name based NDN.
  • 14. From IP to NDN
  • 15. How it works?  Applications name its data.  Consumers send Interest packets, producers respond with Data packets (ContentObjects).  Interests are routed based on their names.  Routers remember outstanding Interests in Pending Interest Table (PIT).  Data trace back along PIT entries.  Every data packet carries a signature.
  • 16. Naming  Applications give names to packets.  NDN uses hierarchical names to facilitate aggregation, management, discovery.
  • 17. Receiver-driven data retrieval  All communication is initiated by consumers, ie start with an Interest packet.  Routers forward the Interest towards the producer, and remembers the incoming interface of the Interest.  The producer sends the data back. The data takes the exact reverse path of the Interest to reach the consumer.  One Interest retrieves one data. consumer router producer 1. Interest 2. Interest 3. ContentObject4. ContentObject
  • 18. Caching  Routers can now cache the data since they’re named. consumer1 consumer2 router producer cache 1.Interest 2. Interest 5. Interest 4. ContentObject 3. ContentObject 6. ContentObject
  • 19. Security and Privacy  Secure the content/data, not the pipe or the perimeter.  Each data packet has to carry a signature  because data can come from any router or source.
  • 20. NDN and Content Addressability
  • 21. Naming  NDN: hierarchical names defined by applications  Names are usually not hashes.  Other ICN architectures may use hash as data name.
  • 22. Fast name lookup  NDN router looks up a Name in Forwarding Information Base (FIB) to decide where to forward it.  Name could have any number of components, and a component could be arbitrarily long.  Fast name lookup could be achieved in nested hash tables.  A hash is computed over the first component, and the result is a pointer to the next hash table, which is keyed with the hash of the second component, and so on.  If a name consists of k components, then in the absence of collisions, k hash lookups would be required in the worst case to identify the longest matching prefix.
  • 23. Fast name lookup – nested hash tables comp faces ndn ccnx component faces broadcast 12,11,10,9,8,7 keys 12,11,10,9,8,7 arizona.edu 473,7 ucla.edu memphis.edu 10,12,11 parc.com 8,12,10 uci.edu 8,12,10 comp faces irl 8,12,10 apps 8,12,10 comp faces ping 262310
  • 24. Aggregated signing  Every ContentObject must be signed.  Generating signature (RSA) for every individual block is computationally expensive.  Merkle hash trees amortize the signing cost over multiple ContentObjects.
  • 25. Aggregated signing – Merkle hash trees H0=H(block0) H1=H(block1) H2=H(block2) H3=H(block3) H4=H(H0H1) H5=H(H2H3) H6=H(H4H5)
  • 26. Aggregated signing  Sign the root hash (H6) only.  Include Merkle Path with the signature  node index (eg. node 1)  hash of sibling node, hash of parent’s sibling node, and so on (eg. H0, H5 for node 1)  To verify the signature for block1, one can compute H1=H(block1), H4=H(H0H1), H6=H(H4H5), and see whether the signature is valid for H6. H0 H1 H2 H3 H4 H5 H6
  • 28. References  Van Jacobson et al, Networking Named Data  NDN Technical Report NDN-0001, Named Data Networking (NDN) Project  Beichuan Zhang, CSC630 Spring 2012  CCNx technical documentation, CCNx Signature Generation and Verification