SlideShare una empresa de Scribd logo
1 de 63
Descargar para leer sin conexión
CS540: NETWORK ARCHITECTURE PROF: YOUNGHEE LEE
NAMED DATA
NETWORKING
PRESENTED BY MESHINGO JACK
Papers
1. Jacobson, V et al (2009). Networking Named Content
2. Grassi, G et al (2014). VANET via Named Data Networking
CCN
INTRODUCTION
CCN NODE MODEL
TRANSPORT
ROUTING
CONTENT BASED SECURITY
PERFORMANCE EVALUATION
INTRODUCTION
Background
● Traditional TCP/IP Architecture
○ Built to solve resource sharing issues
● Use of IP address
○ IP packets contain two identifiers
■ IP address for the source
■ IP address for the destination
Issues
● People value the internet for WHAT content it contains
HOWEVER
● Communication is still in terms of WHERE
Source:Cisco VNI: Forecast and Methodology, 2015–2020
Current Challenges
● Availability
● Security
● Location-dependence
REPLACEMENT OF “WHERE” WITH “WHAT”
Introduction
● Content-Centric Networking (CCN) : networking paradigm centered
around content distribution rather than host-to-host connectivity.
● This change from host-centric to content-centric has several attractive
advantages, such as:
● network load reduction
● low dissemination latency, and
● energy efficiency.
Benefits of CCN
● Content caching: reduce congestion and improve delivery speed,
● Simplicity: in configuration of network devices, and
● Security : building security into the network at the data level.
Source: http://networking.khu.ac.kr/gallery/layouts/net/research/res11.htm
CCN Concept
TCP/IP CCN Protocol Stack
CCN Protocol Stack
● Strategy Layer:
○ Dynamic optimization choices required to best exploit multiple
connectivities under changing conditions
● Security Layer:
○ CCN secures the content itself
○ Avoids host based vulnerabilities
Similarities & Differences between CCN & IP
Similarities Differences
• Both architectures share the same hourglass
shape, with the IP/NDN layer as the narrow waist.
• Both send datagrams.
• Both follow end-to-end principle.
• Both use their own namespace for data delivery
(i.e. IP uses IP addresses to deliver datagrams
between IP nodes; NDN uses the application
name space to deliver datagrams between NDN
nodes)
• CCN secures the content while IP secures the
connections
• They use a different namespace: IP address v.s. Name.
• NDN includes a security primitive directly at the narrow
waist (every Data packet is signed).
• IP sends packets to destination addresses; NDN uses
Interest packets to fetch Data packets.
• IP (by definition) has a stateless data plane. NDN has a
stateful data plane. Together with the forwarding strategy,
this stateful data plane offers NDN networks a variety of
desired functions
CCN NODE MODEL
CCN NODE MODEL
BROADCAST INTEREST OVER
AVAILABLE CONNECTIONS RESPONSE
Packet Types:
● Interest
● Packet
● CCN communication is consumer driven
CCN NODE MODEL
● Broadcasting through various interfaces
● Data is transmitted only in response to an Interest and consumes that
Interest
● Data satisfies an Interest if ContentName in the Interest is a prefix of that
in the Data
● When a packet arrives on a face a longest-match lookup is made
● Allows dynamic content generation through the use of active names
BASIC OPERATION OF CCN
1. A packet arrives on a face [interface]
2. Longest-match look-up is performed on its name
3. An action performed based on the result of the lookup
CCN FORWARDING ENGINE MODEL
1. FIB:
a. forwards interest packets
towards potential sources of
matching data
b. Allows multiple sources for
data
c. Multiple output faces
2. Content Store:
a. caching functionality;
b. each packet can be used by
other consumers
3. PIT
a. Keeps track of Interests
forwarded upstream
towards content sources
TRANSPORT
TRANSPORT
● Operates on top of unreliable packet delivery services
● Loss/ damage of data in transit
○ Mobility
○ Ubiquitous computing
● Provision of reliable & resilient delivery
○ Senders are stateless
○ Consumer retransmits unsatisfied Interest
● Reliability & flow control
○ Flow balance: Retrieval of one packet per Interest
○ CCN flow balance maintained at each hop unlike TCP
○ Use of LRU memory ( cache)
TRANSPORT
● Sequencing
○ Uses a hierarchical naming structure
○ Names are made of various components
● Rich connectivity, mobility & strategy
○ Takes advantages of multiple interfaces on machines
○ Rapidly changing connectivity
○ Multiple connectivity through per FIB- entry face list
● Simultaneous connectivity
ROUTING
ROUTING
● Works with existing routing protocols
○ Intra domain routing [IS-IS & OSPF]
○ Inter-domain routing
● Automates routing infrastructure protection
SECURITY
CONTENT BASED SECURITY
● Protection and trust level embedded within the content rather than
connections in IP networking
● Authentication of content with digital signatures
○ content, routing, policy information
● Private content is encrypted
● Provides end to end security between content publisher and content
consumer
○ No one size fits all for trust model
● CCN security model: SDSI/SPKI
○ Model keys are mapped to identities via controlled namespaces
● Implementation of Policy Based Routing
EVALUATION
EVALUATION
BULK TRANSFER PERFORMANCE
DATA TRANSFER
EFFICIENCY
● CCN performance
comparable to TCP
● However it is lower due
to its larger header
overhead
● TCP throughput: 90%
● CCN throughput: 68%
EVALUATION
CONTENT DISTRIBUTION EFFICIENCY
● To measure sharing performance
○ Compare the total time taken
to simultaneously retrieve
multiple copies of a large data
file (6MB) over a network
bottleneck using TCP and
CCN.
● With a single sink, TCP's better
header efficiency allows it to
complete faster than CCN.
● But as the number of sinks
increases, TCP's completion time
increases linearly while the CCN
performance stays constant.
CONCLUSION
● Content is the focus as opposed to host to host connectivity
● CCN follows IP design principles but uses named content
● Simple and scalable architecture
● Enhanced security, delivery efficiency & fault tolerance
● CCN is useful for both content distribution & point to point protocols
V-NDN
INTRODUCTION
V-NDN: DESIGN & PRINCIPLES
DEMONSTRATIONS
V2V COMMUNICATION AT SCALE
CONCLUSION
INTRODUCTION
INTRODUCTION
● Wide range of wireless interfaces available in
modern cars
● Cars should be able to choose the best available
interface or use multiple in parallel
Power Line Communication
ISSUE
● Cars mostly connected to the internet via Cellular Networks only
● Two ways of connecting vehicles:
○ Vehicle to Infrastructure communication (V2I)
○ Vehicle to Vehicle Communication (V2V)
■ Usage is limited to one hop communication for collision
prevention only
● Limitation of TCP/IP in enabling the use of various applications for
V2V communication
PROPOSED SOLUTION
● Use of Named Data Networking (NDN) to address VANET
challenges
● Benefits of naming data:
○ Decouples communication from specific interfaces and
endpoints
○ Enable vehicles to use any available interfaces and fetch data
from any other node when there is physical connectivity
● In this paper a prototype of Vehicular NDN (V-NDN) was designed
and implemented
V-NDN DESIGN & PRINCIPLES
NDN
● NDN Data Structures:
○ Content Store (CS)
○ Pending Interest Table (PIT)
○ Forwarding Information Base (FIB)
V-NDN NETWORK
DATA CONSUMER
DATA PRODUCER
DATA FORWARDER
DATA MULE
V-NDN
● Great enabler for vehicle networking, HOWEVER,
● Modifications to NDN operations are required for VANET
environment
○ PIT: should be able to cache all received data regardless of
whether it has a matching PIT entry or whether it needs data
for itself
○ Caching strategy enables rapid dissemination of data in
highly dynamic environments
○ The data can be carried by the car even if there is no
connectivity
IMPLEMENTATION ● NDN Daemon:
○ core capabilities through maintaining data
structures
○ Name prefix matching
○ Packet forwarding
● NDN Local Faces
○ Support application registration, Interest request by
consumers and content delivery.
○ Use of IEEE 802.11 in ad hoc mode for V2V &
provide interface with LAL to support Wi-Fi
broadcast
● NDN Network Faces:
○ Provides adaptation functionality based on
technology used
● Link Adaptation Layer
○ Layer 2.5, takes advantage of layer 2 mechanisms
● Location Service
ENHANCING WI-FI BROADCAST FOR V2V
● L2 WiFi broadcast used for all the V2V communications:
● Challenge with IEEE 802.11
○ No collision prevention/ detection/recovery mechanism for
broadcast transmission
● Solution: Wi-Fi broadcast support for VANET
○ Packet forwarding algorithm
■ Assumption: each vehicle is equipped with GPS and Digital
Map
■ Forwarding strategy by spreading NDN Interest packets in all
direction implemented in Link Adaptation Layer
ENHANCING WI-FI BROADCAST FOR V2V
● LAL uses:
○ Forwarding timer
○ Computation of timer
1
D(sender,receiver)
where D distance computed using the location service; and a small
random component used to randomize the transmission line
timer=
DEMONSTRATIONS
EXPERIMENTS
● 10 cars
● Two applications over NDN:
○ Info-traffic:
■ emulates traffic request for a specific location
■ Area encoded in the Interest carried in Interest Packets
■ Name intersections and streets stemming used instead of
numbers
■ i.e./traffic/westwood-at-strathmore/
■ Car from this location can effectively respond to the Interest
○ Road Photo:
■ Represents photo requests from a location
■ Any vehicle that has been to this location can respond
EXPERIMENTS
● Vehicular Application Domains
○ V2V
○ I2V (fig 2(b)
○ V2I (fig 2 (c) - 2 (a))
○ Network disruption due to rapidly changing topology and short link duration
○ In-network storage: caching
EXPERIMENTS
● Still, platooning, moving around
campus
● Fig. 4(a) shows the CDF for the
number of retransmissions for the
InfoTraffic application in all the 3
types of mobility.
● static case: 75% of the packets need
no more than one retransmission.
● Mobility: this number goes down to
about 65%, however the type of
mobility (either on the P8 roof or on
the roads) has a negligible impact on
the number of retransmissions.
● 95% of the packets are acknowledged
within 5 retransmissions or less (the
max-retransmission was set to 7),
EXPERIMENTS: CACHING
ANALYSIS CACHE/FORWARD
STATISTICS
● For consumers & mules
● Caching is more effective
during mobility
● Limited mobility
● Mules observation: 66% of
the Interests were found
using the local cache
NDN Operation in multihomed environment
● Two cars (consumer, producer)
● We ran the Road-Photo application: the
consumer requested a photo to be taken by
the producer. Interest and Data packets
were transmitted via all available interfaces.
● Photos were taken in real-time upon
receiving an Interest, their sizes were
between 68KB and 100KB. Each photo was
split into several Data packets of 1300 bytes
each.
● Fig. 5 shows on which interfaces the
consumer received a chunk of content. The
consumer was able to seamlessly receive
consecutive chunks of the same picture
from different interfaces via different
communication channels.
V2V COMMUNICATION AT SCALE
V-NDN AT SCALE
● Fig 6a & 6c shows that when
the # of cars interested in the
same information increases ,
system performance improves
substantially as measured by
the satisfaction time &
overhead matrix
○ caching and data mules
○ Faster response
● Fig 6b: 35% of Interests are
already acknowledged even
before being transmitted once
○ caching
CONCLUSION
DISCUSSIONS
● V-NDN removes the isolation between applications and network
transport, allowing forwarding nodes to handle data based on application
needs.
● The communication can start spontaneously due to caching
● Furthermore, locally produced data and data with local meaning, such as
traffic information, no longer need to be transferred to remote servers
before being available to neighbor nodes;
● Data that is produced and consumed in loco can remain in loco and be
delivered to the consumers along the shortest physical path.
CHALLENGES
Challenges & Future Work
● Study of a V-NDN forwarding strategy to make the best use out of node
multihoming.
● Data naming: shows that encoding geolocation into names can help direct
Interest forwarding for applications using location-based data; however
other types of applications, e.g. fetching today’s news, are unable to make
use of geolocation.
● security and privacy concerns
PAPER DISCUSSIONS
● For scalability purpose, broadcasting in a huge network (e.g. the Internet) is
not a good approach. How can CCN handle this problems? Any mechanism
similar to DNS or Content Broker that could be used in CCN? [Pham, Nhat]
● Content naming issues in CCN [Pham, Nhat] [Taesik Gong] [Sungjoon Park]
○ Same name for data
○ Same data but different name
● Ease of updating Naming and routing. Use of SDN for NDN? [Hyunwoo
Choi]
● Caching data packets & interest packets on CCN & its impact on the E2E
principle [Shah]
● Co-existence of CCN with IP networks [Sungjoon Park]
CCN: DESIGN & PERFORMANCE
● Could the breadcrumbs systems cause mobility problems? [Eric]
● Is CCN scalable like IPv6 [ Romain Olivier]
CCN: MOBILITY & SCALABILITY
1. CCN uses content-based security ( digital signatures and encryption) but it still is vulnerable
to DoS attacks. [Hailu Belay] [ Romain Olivier]
○ Hiding legitimate content
○ Flooding Interest packets
2. Drawbacks of using Digital signatures? Any other ways of enforcing security? [ Romain
Olivier]
3. Fake tags on the network [Soowon Kang]
CCN: SECURITY
● Stakeholders willingness to adopt CCN [Hailu Belay]
● Modification of existing systems e.g. search engines for CCN [ Romain Olivier]
CCN: ADOPTION & COMMERCIALIZATION
● Caching content in NDN and propagating stale information [Romain Olivier]
● How to avoid redundant content in the network [Romain Olivier]
● How does V-NDN used forwarding when hosts have multihoming [Shah]
● Normalization problem for content naming [Wonseok]
V-NDN: DESIGN & PERFORMANCE
● Privacy and trust [Hailu Belay]
● Development and integration of high performance cryptographic algorithms [Hailu Belay]
● Security not addressed [several students]
V-NDN: SECURITY
● Killer application[Hailu Belay]
● Data Retention policy and content regulation [Hailu Belay]
● Willingness to cooperate and share content between vehicles [Hyunwoo Choi]
V-NDN: ADOPTION & COMMERCIALIZATION
References
1. Jacobson, V. .et al (2009). Networking Named Content
2. Grassi, G (2014). VANET via Named Data Networking
3. https://named-data.net/project/faq/
4.
ROUTING
Figure 2 shows a basic routing scheme in CCN.
1. The client 1 requests content to CCN router H. When CCN router H
receives client 1’s interest packet, it checks its content cache table to
find whether the requested content is in the table or not. If
requested content is found within the cache table, CCN router H
sends the requested content to client 1. However if the content is not
in the cache table, CCN Router H sends an interest packet to other
CCN routers. In this way, each interest packet is sent to the CCN
Router A which has the requested content.
2. CCN router A receives an interest packet from CCN router B and
checks its cache table. Then CCN router A sends the requested
content using reverse path to router H and when each CCN router
receives the contents, it stores the contents into content cache.
Finally, client 1 receives the requested content from CCN router H.
3. The client 2 requests same content which is requested by client 1.
CCN router I receives an interest packet. However CCN router I
doesn’t have the requested content in its cache table. In this case,
client 2’s request message is sent to node D.
4. When node D receives the interest packet, it sends a data packet
including requested content to client 2.

Más contenido relacionado

La actualidad más candente

Parallel computing
Parallel computingParallel computing
Parallel computingVinay Gupta
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layertmavroidis
 
An Overview of Apache Cassandra
An Overview of Apache CassandraAn Overview of Apache Cassandra
An Overview of Apache CassandraDataStax
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer NumericalsManisha Keim
 
Hadoop approach
Hadoop approach Hadoop approach
Hadoop approach Sumit Kumar
 
Big Data Processing with Spark and Scala
Big Data Processing with Spark and Scala Big Data Processing with Spark and Scala
Big Data Processing with Spark and Scala Edureka!
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CASoumen Santra
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake Alok Tripathi
 
Frame relay
Frame relay Frame relay
Frame relay balub4
 
Information Centric Networking
Information Centric NetworkingInformation Centric Networking
Information Centric NetworkingShahneel Siddiqui
 
Centralized shared memory architectures
Centralized shared memory architecturesCentralized shared memory architectures
Centralized shared memory architecturesGokuldhev mony
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Edge computing offloading: status & perspectives
Edge computing offloading: status & perspectivesEdge computing offloading: status & perspectives
Edge computing offloading: status & perspectivesIIT CNR
 
CapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet InspectionCapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet InspectionChris Harrington
 
ML at the Edge: Building Your Production Pipeline with Apache Spark and Tens...
 ML at the Edge: Building Your Production Pipeline with Apache Spark and Tens... ML at the Edge: Building Your Production Pipeline with Apache Spark and Tens...
ML at the Edge: Building Your Production Pipeline with Apache Spark and Tens...Databricks
 

La actualidad más candente (20)

Parallel computing
Parallel computingParallel computing
Parallel computing
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
An Overview of Apache Cassandra
An Overview of Apache CassandraAn Overview of Apache Cassandra
An Overview of Apache Cassandra
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 
Hadoop approach
Hadoop approach Hadoop approach
Hadoop approach
 
Big Data Processing with Spark and Scala
Big Data Processing with Spark and Scala Big Data Processing with Spark and Scala
Big Data Processing with Spark and Scala
 
Mime
MimeMime
Mime
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CA
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Arp
ArpArp
Arp
 
Python network programming
Python   network programmingPython   network programming
Python network programming
 
Frame relay
Frame relay Frame relay
Frame relay
 
Information Centric Networking
Information Centric NetworkingInformation Centric Networking
Information Centric Networking
 
Centralized shared memory architectures
Centralized shared memory architecturesCentralized shared memory architectures
Centralized shared memory architectures
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Edge computing offloading: status & perspectives
Edge computing offloading: status & perspectivesEdge computing offloading: status & perspectives
Edge computing offloading: status & perspectives
 
CapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet InspectionCapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet Inspection
 
ML at the Edge: Building Your Production Pipeline with Apache Spark and Tens...
 ML at the Edge: Building Your Production Pipeline with Apache Spark and Tens... ML at the Edge: Building Your Production Pipeline with Apache Spark and Tens...
ML at the Edge: Building Your Production Pipeline with Apache Spark and Tens...
 
Data Center
Data CenterData Center
Data Center
 

Similar a Content centric networks

Migration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stackMigration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stackpraveenReddy268
 
Multicloud as the Next Generation of Cloud Infrastructure
Multicloud as the Next Generation of Cloud Infrastructure Multicloud as the Next Generation of Cloud Infrastructure
Multicloud as the Next Generation of Cloud Infrastructure Brad Eckert
 
Transport SDN Overview and Standards Update: Industry Perspectives
Transport SDN Overview and Standards Update: Industry PerspectivesTransport SDN Overview and Standards Update: Industry Perspectives
Transport SDN Overview and Standards Update: Industry PerspectivesInfinera
 
Ngn presentation
Ngn presentationNgn presentation
Ngn presentationFrikha Nour
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksMyNOG
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX WebinarKatie Hyman
 
Using ICN to simplify data delivery, mobility management and secure transmission
Using ICN to simplify data delivery, mobility management and secure transmissionUsing ICN to simplify data delivery, mobility management and secure transmission
Using ICN to simplify data delivery, mobility management and secure transmissionITU
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityMikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityGLC Networks
 
Colt’s Carrier SDN & NFV: Experience, Learnings & Future Plans
Colt’s Carrier SDN & NFV: Experience, Learnings & Future PlansColt’s Carrier SDN & NFV: Experience, Learnings & Future Plans
Colt’s Carrier SDN & NFV: Experience, Learnings & Future PlansOpen Networking Summit
 
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Canada
 
Why sdn
Why sdnWhy sdn
Why sdnlz1dsb
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsChaitanya Krishna
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1Roman Brovko
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with MikrotikGLC Networks
 
Software Defined Networking in GÉANT
Software Defined Networking in GÉANTSoftware Defined Networking in GÉANT
Software Defined Networking in GÉANTGÉANT
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsFab Fusaro
 
Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)Jatin Singh
 

Similar a Content centric networks (20)

Migration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stackMigration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stack
 
Multicloud as the Next Generation of Cloud Infrastructure
Multicloud as the Next Generation of Cloud Infrastructure Multicloud as the Next Generation of Cloud Infrastructure
Multicloud as the Next Generation of Cloud Infrastructure
 
Transport SDN Overview and Standards Update: Industry Perspectives
Transport SDN Overview and Standards Update: Industry PerspectivesTransport SDN Overview and Standards Update: Industry Perspectives
Transport SDN Overview and Standards Update: Industry Perspectives
 
Ngn presentation
Ngn presentationNgn presentation
Ngn presentation
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX Webinar
 
BSNL Report.ppt
BSNL Report.pptBSNL Report.ppt
BSNL Report.ppt
 
Using ICN to simplify data delivery, mobility management and secure transmission
Using ICN to simplify data delivery, mobility management and secure transmissionUsing ICN to simplify data delivery, mobility management and secure transmission
Using ICN to simplify data delivery, mobility management and secure transmission
 
Mikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and SecurityMikrotik IP Settings For Performance and Security
Mikrotik IP Settings For Performance and Security
 
Colt’s Carrier SDN & NFV: Experience, Learnings & Future Plans
Colt’s Carrier SDN & NFV: Experience, Learnings & Future PlansColt’s Carrier SDN & NFV: Experience, Learnings & Future Plans
Colt’s Carrier SDN & NFV: Experience, Learnings & Future Plans
 
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
 
Why sdn
Why sdnWhy sdn
Why sdn
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless Systems
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with Mikrotik
 
Named data networking
Named data networkingNamed data networking
Named data networking
 
Network on Chip
Network on ChipNetwork on Chip
Network on Chip
 
Software Defined Networking in GÉANT
Software Defined Networking in GÉANTSoftware Defined Networking in GÉANT
Software Defined Networking in GÉANT
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
 
Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)
 

Último

SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...sonatiwari757
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Último (20)

SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 

Content centric networks

  • 1. CS540: NETWORK ARCHITECTURE PROF: YOUNGHEE LEE NAMED DATA NETWORKING PRESENTED BY MESHINGO JACK
  • 2. Papers 1. Jacobson, V et al (2009). Networking Named Content 2. Grassi, G et al (2014). VANET via Named Data Networking
  • 3. CCN INTRODUCTION CCN NODE MODEL TRANSPORT ROUTING CONTENT BASED SECURITY PERFORMANCE EVALUATION
  • 5. Background ● Traditional TCP/IP Architecture ○ Built to solve resource sharing issues ● Use of IP address ○ IP packets contain two identifiers ■ IP address for the source ■ IP address for the destination
  • 6. Issues ● People value the internet for WHAT content it contains HOWEVER ● Communication is still in terms of WHERE Source:Cisco VNI: Forecast and Methodology, 2015–2020
  • 7. Current Challenges ● Availability ● Security ● Location-dependence
  • 8. REPLACEMENT OF “WHERE” WITH “WHAT”
  • 9. Introduction ● Content-Centric Networking (CCN) : networking paradigm centered around content distribution rather than host-to-host connectivity. ● This change from host-centric to content-centric has several attractive advantages, such as: ● network load reduction ● low dissemination latency, and ● energy efficiency.
  • 10. Benefits of CCN ● Content caching: reduce congestion and improve delivery speed, ● Simplicity: in configuration of network devices, and ● Security : building security into the network at the data level. Source: http://networking.khu.ac.kr/gallery/layouts/net/research/res11.htm
  • 11. CCN Concept TCP/IP CCN Protocol Stack
  • 12. CCN Protocol Stack ● Strategy Layer: ○ Dynamic optimization choices required to best exploit multiple connectivities under changing conditions ● Security Layer: ○ CCN secures the content itself ○ Avoids host based vulnerabilities
  • 13. Similarities & Differences between CCN & IP Similarities Differences • Both architectures share the same hourglass shape, with the IP/NDN layer as the narrow waist. • Both send datagrams. • Both follow end-to-end principle. • Both use their own namespace for data delivery (i.e. IP uses IP addresses to deliver datagrams between IP nodes; NDN uses the application name space to deliver datagrams between NDN nodes) • CCN secures the content while IP secures the connections • They use a different namespace: IP address v.s. Name. • NDN includes a security primitive directly at the narrow waist (every Data packet is signed). • IP sends packets to destination addresses; NDN uses Interest packets to fetch Data packets. • IP (by definition) has a stateless data plane. NDN has a stateful data plane. Together with the forwarding strategy, this stateful data plane offers NDN networks a variety of desired functions
  • 15. CCN NODE MODEL BROADCAST INTEREST OVER AVAILABLE CONNECTIONS RESPONSE Packet Types: ● Interest ● Packet ● CCN communication is consumer driven
  • 16. CCN NODE MODEL ● Broadcasting through various interfaces ● Data is transmitted only in response to an Interest and consumes that Interest ● Data satisfies an Interest if ContentName in the Interest is a prefix of that in the Data ● When a packet arrives on a face a longest-match lookup is made ● Allows dynamic content generation through the use of active names
  • 17. BASIC OPERATION OF CCN 1. A packet arrives on a face [interface] 2. Longest-match look-up is performed on its name 3. An action performed based on the result of the lookup
  • 18. CCN FORWARDING ENGINE MODEL 1. FIB: a. forwards interest packets towards potential sources of matching data b. Allows multiple sources for data c. Multiple output faces 2. Content Store: a. caching functionality; b. each packet can be used by other consumers 3. PIT a. Keeps track of Interests forwarded upstream towards content sources
  • 20. TRANSPORT ● Operates on top of unreliable packet delivery services ● Loss/ damage of data in transit ○ Mobility ○ Ubiquitous computing ● Provision of reliable & resilient delivery ○ Senders are stateless ○ Consumer retransmits unsatisfied Interest ● Reliability & flow control ○ Flow balance: Retrieval of one packet per Interest ○ CCN flow balance maintained at each hop unlike TCP ○ Use of LRU memory ( cache)
  • 21. TRANSPORT ● Sequencing ○ Uses a hierarchical naming structure ○ Names are made of various components ● Rich connectivity, mobility & strategy ○ Takes advantages of multiple interfaces on machines ○ Rapidly changing connectivity ○ Multiple connectivity through per FIB- entry face list ● Simultaneous connectivity
  • 23. ROUTING ● Works with existing routing protocols ○ Intra domain routing [IS-IS & OSPF] ○ Inter-domain routing ● Automates routing infrastructure protection
  • 25. CONTENT BASED SECURITY ● Protection and trust level embedded within the content rather than connections in IP networking ● Authentication of content with digital signatures ○ content, routing, policy information ● Private content is encrypted ● Provides end to end security between content publisher and content consumer ○ No one size fits all for trust model ● CCN security model: SDSI/SPKI ○ Model keys are mapped to identities via controlled namespaces ● Implementation of Policy Based Routing
  • 27. EVALUATION BULK TRANSFER PERFORMANCE DATA TRANSFER EFFICIENCY ● CCN performance comparable to TCP ● However it is lower due to its larger header overhead ● TCP throughput: 90% ● CCN throughput: 68%
  • 28. EVALUATION CONTENT DISTRIBUTION EFFICIENCY ● To measure sharing performance ○ Compare the total time taken to simultaneously retrieve multiple copies of a large data file (6MB) over a network bottleneck using TCP and CCN. ● With a single sink, TCP's better header efficiency allows it to complete faster than CCN. ● But as the number of sinks increases, TCP's completion time increases linearly while the CCN performance stays constant.
  • 29. CONCLUSION ● Content is the focus as opposed to host to host connectivity ● CCN follows IP design principles but uses named content ● Simple and scalable architecture ● Enhanced security, delivery efficiency & fault tolerance ● CCN is useful for both content distribution & point to point protocols
  • 30. V-NDN INTRODUCTION V-NDN: DESIGN & PRINCIPLES DEMONSTRATIONS V2V COMMUNICATION AT SCALE CONCLUSION
  • 32. INTRODUCTION ● Wide range of wireless interfaces available in modern cars ● Cars should be able to choose the best available interface or use multiple in parallel Power Line Communication
  • 33. ISSUE ● Cars mostly connected to the internet via Cellular Networks only ● Two ways of connecting vehicles: ○ Vehicle to Infrastructure communication (V2I) ○ Vehicle to Vehicle Communication (V2V) ■ Usage is limited to one hop communication for collision prevention only ● Limitation of TCP/IP in enabling the use of various applications for V2V communication
  • 34. PROPOSED SOLUTION ● Use of Named Data Networking (NDN) to address VANET challenges ● Benefits of naming data: ○ Decouples communication from specific interfaces and endpoints ○ Enable vehicles to use any available interfaces and fetch data from any other node when there is physical connectivity ● In this paper a prototype of Vehicular NDN (V-NDN) was designed and implemented
  • 35. V-NDN DESIGN & PRINCIPLES
  • 36. NDN ● NDN Data Structures: ○ Content Store (CS) ○ Pending Interest Table (PIT) ○ Forwarding Information Base (FIB)
  • 37. V-NDN NETWORK DATA CONSUMER DATA PRODUCER DATA FORWARDER DATA MULE
  • 38. V-NDN ● Great enabler for vehicle networking, HOWEVER, ● Modifications to NDN operations are required for VANET environment ○ PIT: should be able to cache all received data regardless of whether it has a matching PIT entry or whether it needs data for itself ○ Caching strategy enables rapid dissemination of data in highly dynamic environments ○ The data can be carried by the car even if there is no connectivity
  • 39. IMPLEMENTATION ● NDN Daemon: ○ core capabilities through maintaining data structures ○ Name prefix matching ○ Packet forwarding ● NDN Local Faces ○ Support application registration, Interest request by consumers and content delivery. ○ Use of IEEE 802.11 in ad hoc mode for V2V & provide interface with LAL to support Wi-Fi broadcast ● NDN Network Faces: ○ Provides adaptation functionality based on technology used ● Link Adaptation Layer ○ Layer 2.5, takes advantage of layer 2 mechanisms ● Location Service
  • 40. ENHANCING WI-FI BROADCAST FOR V2V ● L2 WiFi broadcast used for all the V2V communications: ● Challenge with IEEE 802.11 ○ No collision prevention/ detection/recovery mechanism for broadcast transmission ● Solution: Wi-Fi broadcast support for VANET ○ Packet forwarding algorithm ■ Assumption: each vehicle is equipped with GPS and Digital Map ■ Forwarding strategy by spreading NDN Interest packets in all direction implemented in Link Adaptation Layer
  • 41. ENHANCING WI-FI BROADCAST FOR V2V ● LAL uses: ○ Forwarding timer ○ Computation of timer 1 D(sender,receiver) where D distance computed using the location service; and a small random component used to randomize the transmission line timer=
  • 43. EXPERIMENTS ● 10 cars ● Two applications over NDN: ○ Info-traffic: ■ emulates traffic request for a specific location ■ Area encoded in the Interest carried in Interest Packets ■ Name intersections and streets stemming used instead of numbers ■ i.e./traffic/westwood-at-strathmore/ ■ Car from this location can effectively respond to the Interest ○ Road Photo: ■ Represents photo requests from a location ■ Any vehicle that has been to this location can respond
  • 44. EXPERIMENTS ● Vehicular Application Domains ○ V2V ○ I2V (fig 2(b) ○ V2I (fig 2 (c) - 2 (a)) ○ Network disruption due to rapidly changing topology and short link duration ○ In-network storage: caching
  • 45. EXPERIMENTS ● Still, platooning, moving around campus ● Fig. 4(a) shows the CDF for the number of retransmissions for the InfoTraffic application in all the 3 types of mobility. ● static case: 75% of the packets need no more than one retransmission. ● Mobility: this number goes down to about 65%, however the type of mobility (either on the P8 roof or on the roads) has a negligible impact on the number of retransmissions. ● 95% of the packets are acknowledged within 5 retransmissions or less (the max-retransmission was set to 7),
  • 46. EXPERIMENTS: CACHING ANALYSIS CACHE/FORWARD STATISTICS ● For consumers & mules ● Caching is more effective during mobility ● Limited mobility ● Mules observation: 66% of the Interests were found using the local cache
  • 47. NDN Operation in multihomed environment ● Two cars (consumer, producer) ● We ran the Road-Photo application: the consumer requested a photo to be taken by the producer. Interest and Data packets were transmitted via all available interfaces. ● Photos were taken in real-time upon receiving an Interest, their sizes were between 68KB and 100KB. Each photo was split into several Data packets of 1300 bytes each. ● Fig. 5 shows on which interfaces the consumer received a chunk of content. The consumer was able to seamlessly receive consecutive chunks of the same picture from different interfaces via different communication channels.
  • 49. V-NDN AT SCALE ● Fig 6a & 6c shows that when the # of cars interested in the same information increases , system performance improves substantially as measured by the satisfaction time & overhead matrix ○ caching and data mules ○ Faster response ● Fig 6b: 35% of Interests are already acknowledged even before being transmitted once ○ caching
  • 51. DISCUSSIONS ● V-NDN removes the isolation between applications and network transport, allowing forwarding nodes to handle data based on application needs. ● The communication can start spontaneously due to caching ● Furthermore, locally produced data and data with local meaning, such as traffic information, no longer need to be transferred to remote servers before being available to neighbor nodes; ● Data that is produced and consumed in loco can remain in loco and be delivered to the consumers along the shortest physical path.
  • 53. Challenges & Future Work ● Study of a V-NDN forwarding strategy to make the best use out of node multihoming. ● Data naming: shows that encoding geolocation into names can help direct Interest forwarding for applications using location-based data; however other types of applications, e.g. fetching today’s news, are unable to make use of geolocation. ● security and privacy concerns
  • 55. ● For scalability purpose, broadcasting in a huge network (e.g. the Internet) is not a good approach. How can CCN handle this problems? Any mechanism similar to DNS or Content Broker that could be used in CCN? [Pham, Nhat] ● Content naming issues in CCN [Pham, Nhat] [Taesik Gong] [Sungjoon Park] ○ Same name for data ○ Same data but different name ● Ease of updating Naming and routing. Use of SDN for NDN? [Hyunwoo Choi] ● Caching data packets & interest packets on CCN & its impact on the E2E principle [Shah] ● Co-existence of CCN with IP networks [Sungjoon Park] CCN: DESIGN & PERFORMANCE
  • 56. ● Could the breadcrumbs systems cause mobility problems? [Eric] ● Is CCN scalable like IPv6 [ Romain Olivier] CCN: MOBILITY & SCALABILITY
  • 57. 1. CCN uses content-based security ( digital signatures and encryption) but it still is vulnerable to DoS attacks. [Hailu Belay] [ Romain Olivier] ○ Hiding legitimate content ○ Flooding Interest packets 2. Drawbacks of using Digital signatures? Any other ways of enforcing security? [ Romain Olivier] 3. Fake tags on the network [Soowon Kang] CCN: SECURITY
  • 58. ● Stakeholders willingness to adopt CCN [Hailu Belay] ● Modification of existing systems e.g. search engines for CCN [ Romain Olivier] CCN: ADOPTION & COMMERCIALIZATION
  • 59. ● Caching content in NDN and propagating stale information [Romain Olivier] ● How to avoid redundant content in the network [Romain Olivier] ● How does V-NDN used forwarding when hosts have multihoming [Shah] ● Normalization problem for content naming [Wonseok] V-NDN: DESIGN & PERFORMANCE
  • 60. ● Privacy and trust [Hailu Belay] ● Development and integration of high performance cryptographic algorithms [Hailu Belay] ● Security not addressed [several students] V-NDN: SECURITY
  • 61. ● Killer application[Hailu Belay] ● Data Retention policy and content regulation [Hailu Belay] ● Willingness to cooperate and share content between vehicles [Hyunwoo Choi] V-NDN: ADOPTION & COMMERCIALIZATION
  • 62. References 1. Jacobson, V. .et al (2009). Networking Named Content 2. Grassi, G (2014). VANET via Named Data Networking 3. https://named-data.net/project/faq/ 4.
  • 63. ROUTING Figure 2 shows a basic routing scheme in CCN. 1. The client 1 requests content to CCN router H. When CCN router H receives client 1’s interest packet, it checks its content cache table to find whether the requested content is in the table or not. If requested content is found within the cache table, CCN router H sends the requested content to client 1. However if the content is not in the cache table, CCN Router H sends an interest packet to other CCN routers. In this way, each interest packet is sent to the CCN Router A which has the requested content. 2. CCN router A receives an interest packet from CCN router B and checks its cache table. Then CCN router A sends the requested content using reverse path to router H and when each CCN router receives the contents, it stores the contents into content cache. Finally, client 1 receives the requested content from CCN router H. 3. The client 2 requests same content which is requested by client 1. CCN router I receives an interest packet. However CCN router I doesn’t have the requested content in its cache table. In this case, client 2’s request message is sent to node D. 4. When node D receives the interest packet, it sends a data packet including requested content to client 2.