SlideShare a Scribd company logo
1 of 26
Download to read offline
01'2"1*&,3)&4,01'5"6%78,1*,!!$,
                 $%&9"7:' ,

    (')*+),-./+)#)"#$%!&'()'!*+,(-"#$%!.,/'0!*,1'"#$%!2,0345'6,!
              7840-"#$!,(9!:(904,/!;'33<7'45"=$   !
!
"#$!>('?40/'6)!8@!A0434(%!A0434(%!7403,()!

"=$!B,3CD0-!>('?40/'6)!8@!;4E+(858-)%!B,3CD0-%!7403,()!




                                                        !"#$%&'!
FD65'(4
!  G08C543!H6,6434(6!                           !  G40@803,(E4!R?,5D,J8(!
   !  H6,64<8@<:06!                                !  R?,5D,J8(!HE4(,0'8/!
   !  ID5JK,6+!'(!22L!!                            !  G40@803,(E4!I460'E/!
   !  28(/'940,J8(/!@80!ID5JK,6+!M460'4?,5!
      H60,64-'4/!!
                                                !  28(E5D/'8(!
                                                   !  28(E5D/'8(!
!  H85DJ8(!G08K8/,5/!
                                                !  :KK4(9'S!
   !    G,6+!N'/E8?40)!
                                                   !  M4@404(E4/!
   !    N'/O8'(6!G,6+!N'/E8?40)!H60,64-'4/!
   !    P//D4/!8@!N'/E8?40'(-!N'/O8'(6!G,6+/!
   !    G,6+!>J5'Q,J8(!,(9!I,'(64(,(E4!
   !




                                                                             !"#$%&'!
H4EJ8(!#

37";<%#,=&)&%#%*&




                    !"#$%&'!
H6,64<8@<:06
                                                                             server
!  N4@,D56!22L!@80T,09'(-!34E+,('/3!!
   !  H4(9!,(!'(6404/6!8(!,55!!"#$%&$'()$*$+,-!@,E4/!
      6+4(%!'@!6+404!'/!(8!04/K8(/4%!68!60)!,55!6+4!86+40!
      @,E4/!'(!/4UD4(E4V#W!
       <  RXE'4(6!T+4(!/4,0E+'(-!6+4!(4'-+C80+889!68!Y(9!
          6+4!94/'049!E8(64(6!!
       <  B'-+!045',C'5'6)!
       <  2,D/4!D((4E4//,0)!60,XE!!
!  ZA4/6![,E4!@80T,09'(-!34E+,('/3V#W!
       <  M49DE4!6+4!60,XE!68!0460'4?4!8(4!E8(64(6!E+D(1 !



       <  ://D34!,!E8(64(6!K08?'940!E,(!K08?'94!E8(/4EDJ?4!
          E8(64(6!E+D(1/!!
       <  I'-+6!E,D/4!@04UD4(6!'(6404/6!04/4(9/!
       <  28(/'940,J8(!8@!54,/6!945,)!E,(!54,9!68!D(C,5,(E49!                 client
          60,@YE!9'/60'CDJ8(!                                   Distributed caching allow client to
                                                                retrieve the Content from the nearest
                                                                cache



                                                                         4             !"#$%&'!
ID5JK,6+!'(!22L!
!  ID5JK,6+!'3K08?4/!(46T801'(-!K40@803,(E4!                                 server

   !  ]8,9!C,5,(E'(-%!,--04-,J8(!8@!C,(9T'96+!
   !  [,D56!68540,(E4^'(E04,/49!045',C'5'6)!
   !  ]4//!K,6+!9'/E8?40'4/!
!  22L!'(+404(65)!/DKK806/!3D5JK,6+!
   !  ]88K<@044!E8(64(6!945'?40)!34E+,('/3!
       <  P(6404/6!E,(!C4!/4(6!8D6!?',!3D5JK54!'(640@,E4/!T'6+8D6!
          T800)'(-!,C8D6!588K/!
   !  N'/60'CD649!'(<(46T801!E,E+'(-!'(!22L!
       <  P3K08?4!6+4!945,)^6+08D-+KD6!K40@803,(E4!C)!K5,E'(-!
          6+4!28(64(6!5<"'%7,&",&4%,/'%7',
       <  M49DE4!6+4!'(E83'(-!60,XE!@083!(4'-+C80'(-!PHG/!!
       <  L,6D0,55)!@,?80/!3D5J<K8'(6!68!3D5J<K8'(6!E833D('E,J8(!
            !  Multiple nodes can provide the same content

!  ID5JK,6+!E8(64(6!945'?40)!,9,K6/!68!6+4!+'-+<                              client
  9)(,3'E!ZE,E+4!68K858-)!
                                                                         Multipath in CCN



                                                                     5            !"#$%&'!
28(/'940,J8(/!@80!ID5JK,6+!M460'4?,5!H60,64-'4/!
!  22L!'/!,!+8/6!",9904//$!D(,T,04!(46T801'(-!,0E+'64E6D04!!
   !  GD04!/8D0E4!08DJ(-!,/!'(!PG!'/!'(@4,/'C54!'(!22L!
!  22L!+,/!(8!'94,!8@!6+4!K,6+/!CD6!8(5)!@,E4/!
   !  2,((86!3,14!-58C,5!94E'/'8(/!
   !  2,(!8(5)!946403'(4!T+'E+!@,E4!68!945'?40!,(!P(6404/6!
!  :9+404(E4!68!@80T,09'(-!K0'(E'K54/!8@!22L!!
   !  _44K!6+4!C,5,(E4!8@!60,XE!"8(4<68<8(4!E8004/K8(94(E4$!
   !  :?8'9!08DJ(-!588K/!!




                                                               6   !"#$%&'!
H4EJ8(!=

="</>"*,37"?"')<'




                    !"#$%&'!
G,6+!N'/E8?40)!
!  B8T!3,()!K,6+/!,04!(44949`!!
   !  ;2G^PGa!!6T8!80!6+044!K,6+/!,04!
      4(8D-+!VbWV=W!
       <  I8/6!8@!6+4!K40@803,(E4!!
          '3K08?434(6/!E,(!C4!!,E+'4?49!T'6+!,!
          @4T!K,6+/!VbW!
       <  I804!K,6+/!04UD'04/!3804!8?40+4,9!68!
          E8(6085!V=W!
       <  P(E04,/4/!6+4!E83K54S'6)!8@!60,XE!
          9'/60'CDJ8(!/E+434V=W!!
   !  22La!/J55!,(!8K4(!'//D4!
   !  F(5)!E8(/'940!6T8!K,6+/!@80!
      /'3K5'E'6)!
                                                  Impact of shared links on the end-to-end video quality:
!  B8T!68!/454E6!6+4/4!K,6+/`!!                   Multiple Descriptions (MD, using two paths) distortion vs.
                                                  Single Description (SD, using single path) distortion as
   !  N45,)!                                      the number of joint links between two paths varies. [12]
   !  N'?40/'6)!
       <  M4/8D0E4!,--04-,J8(!
       <  B'-+40!@,D56<68540,(E4!

                                                                                  8          !"#$%&'!
G,6+!N'/E8?40)
!  I46+89/!a!!
   !  #c!L894<9'/O8'(6!K,6+/!
       <  Fd40!6+4!38/6!04/8D0E4!,--04-,J8(!                               Content
       <  Fd40!6+4!+'-+4/6!94-044!8@!@,D56<68540,(E4!
       <  ]4,/6!E8338(!
   !  =c!]'(1<9'/O8'(6!K,6+/!
       <  ]8T40!04/8D0E4!,--04-,J8(!6+,(!L894<
          9'/O8'(6!K,6+/!
       <  ]8T40!94-044!8@!@,D56<68540,(E4!
       <  :!-889!E83K083'/4!C46T44(!L894<9'/O8'(6!                           Client
          ,(9!L8(<9'/O8'(6!K,6+/!
   !  bc!L8(<9'/O8'(6!K,6+/!
                                                         Four types of node-or link-Disjoint Paths between a
       <  ]8T4/6!04/8D0E4!,--04-,J8(!                    client-Content pair
       <  ]8T4/6!94-044!8@!@,D56<68540,(E4!
            !  A single link or node failure can cause
               multiple paths to fail
       <  2,(!C4!4,/'5)!9'/E8?4049!




                                                                                 9         !"#$%&'!
N'/E8?40!L894<9'/O8'(6!G,6+/
!  ;+4!@D(9,34(6,5!22L!@80T,09'(-!/60,64-'4/!-D,0,(644!6+,6!)&,#"'&,
   "*%,5"?8,"@,)*8,?1%5%,"@,.)&),+"%',"6%7,)*8,<1*:,

                                                      or

   Fundamental CCN forwarding strategy aggregates duplicate Interests and suppresses duplicate Contents




!  P@!E5'4(6!/4(9/!8D6!,(!P(6404/6!8?40!,55!@,E4/%!6+4!046D0('(-!28(64(6!
   6+,6!Y(,55)!,00'?4/!,6!6+4!E5'4(6!E,(!8(5)!6,14!K,6+/!,/!@8558T/a!
           !



               (a)                            (b)                      (c)                    (d)
  There are four kinds of multiple paths taken by the returning Content in response to path-discovery Interests




                                                                                                10          !"#$%&'!
N'/E8?40!L894<9'/O8'(6!G,6+/
!  P(6404/6!K,E146/!E8(6,'(!,!0,(983!(8(E4!?,5D4!/8!6+,6!9DK5'E,64/!
  04E4'?49!8?40!9'd404(6!K,6+/!3,)!C4!9'/E,0949!V#W!
   !  P(!38/6!E,/4/%!!6+4!/'6D,J8(!'(!E,/4!"9$!E8D59!C4!,?8'949!/'(E4!6+4!9DK5'E,64!
        '(6404/6!T'55!C4!9'/E,0949!,6!6+4!!(894!8@!'(640/4EJ8(!!
   !  RSE4KJ8(a!!P@!6+404!,504,9)!4S'/6!GP;!4(60'4/!!'(!6+4!'(640349',64!(894/%!6+4!
        046D0('(-!E8(64(6!3,)!6,14!(8(<9'/O8'(6!K,6+/!!!
   !  H85DJ8(a!!R?40)!J34!6+4!E8(64(6!K08?'940!/4(9/!8D6!,!E8(64(6!E+D(1!6+08D-+!,!!
   !!!!!,(!'(640@,E4%!,e,E+!,!(8(E4!8(!6+4!E8(64(6c!

                                                                             PIT entry

                                                                 PIT entry


                                                     Once an Interest meets an existing PIT
                                                     entry, the returning Contents may take
                                                     overlapped routes




                                                                      11          !"#$%&'!
N'/E8?40!L894<9'/O8'(6!G,6+/
!  P(!K,6+!9'/E8?40)!/6,-4%!@80E4!                                            Nonce

   6+4!E5'4(6!68!,EE4K6!K,6+/!6,14(!C)!                                       0056                 Nonce

                                                                                                   0024

   28(64(6!E,00)'(-!D('UD4!(8(E4!
   ?,5D4/!                                                 PIT entry
   !  28(64(6!K08?'940!!
       <  R,E+!E8(64(6!K08?'940!3,01/!,(!8D6-8'(-!
          E8(64(6!T'6+!,!0,(983!(8(E4!?,5D4!
   !  25'4(6!                                        PIT entry
       <  :5T,)/!6,14!6+4!Y0/6!04E4'?49!E8(64(6!!                                          Nonce

       <  283K,04!6+4!(8(E4!?,5D4!8@!6+4!5,640!                       Nonce                0024

          ,00'?'(-!E8(64(6!T'6+!6+,6!8@!6+4!Y0/6!                     0056

          E8(64(6!04E4'K6!                                                              Client 1
                                                                                 Nonce
   !  :(!'(640349',64!(894!T'55!/46!6+4!                                         0056
      9'/E8?4049!8D6-8'(-!@,E4!,/!6+4!ZA4/6!
                                                           Client 2
      [,E4!,(9!D/4!'6!68!945'?40!6+4!
      @8558T'(-!P(6404/6/!                                       Discover node-disjoint Paths




                                                                              12            !"#$%&'!
N'/E8?40!]'(1<9'/O8'(6!G,6+/
!  P(!6+4!K,6+!9'/E8?40)!/6,-4%!,!346+89!'/!04UD'049!68!-D,0,(644!6+,6!!
   !  :()!'(640349',64!(894!9'/60'CD64/!6+4!046D0('(-!28(64(6/!68!9'd404(6!@,E4/!
   !  R,E+!28(64(6!'/!945'?4049!68!,6!38/6!8(4!8D6-8'(-!@,E4!


               pending




               The principles of the route discovery method for link-disjoint paths discovery




                                                                                          13    !"#$%&'!
N'/E8?40!]'(1<9'/O8'(6!G,6+/
!  P(!K,6+!9'/E8?40)!/6,-4%!
    !  :e,E+!,!0,(983!(8(E4!,(9!,!f,-!68!6+4!'(6404/6!                                           I
                                                                              H
       4?40)!J34!6+4!E5'4(6!/4(9!'6!8D6!6+08D-+!,(!
       '(640@,E4!
    !  g+4(!6+4!'(640349',64!(894!04E4'?4/!,(!P(6404/6!
       T'6+!,!f,-%!'6!T'55!
                                                                         E              F                   G
        <  P@!6+4!P(6404/6!T,/!(4?40!/44(!C4@804!h!E04,64!GP;!
           4(60)!
        <  P@!6+4!P(6404/6!E,00'4/!,!9'd404(6!(8(E4!,(9!E834/!
           @083!,!9'd404(6!@,E4!T'6+!6+4!'(6404/6/!K4(9'(-!
           6+404!<<!57%)&%,),'%?)7)&%,3AB,%*&78,@"7,&4%,A*&%7%'&,,   A        B                 C               D
        <  F6+40T'/4!<<!.1'5)7.,&4%,A*&%7%'&,
    !  R,E+!046D0('(-!28(64(6!E+D(1!E8(/D34/!8(5)!8(4!
       GP;!4(60),CD7'&,57%)&%.,%*&78,1',5"*'/#%.,D7'&E!
        <  ;+4!/4E8(9!04E4'?49!28(64(6!E,(!E8(/D34!6+4!
           /4E8(9!GP;!4(60)!                                                         client
    !  :(!P(640349',64!(894!T'55!/46!6+4!9'/E8?4049!                         Discover link-disjoint Paths
       6T8!8D6-8'(-!@,E4/!,/!Z7889![,E4/!,(9!D/4!
       6+43!68!945'?40!6+4!/DC/4UD4(6!P(6404/6/!


                                                                                     14          !"#$%&'!
P//D4/!8@!N'/E8?40'(-!N'/O8'(6!G,6+/!'(!22L
!  ;+4!,5-80'6+3/!E,((86!-D,0,(644!6+,6!6+4!
  9'/E8?4049!K,6+/!,04!#iij!9'/O8'(6!!
   !  :!E8(64(6!0460'4?49!C)!8(4!'(6404/6!3'-+6!C4!E,E+49!
      ,58(-!6+4!K,6+%!,(9!6+4(!C4!0460'4?49!,-,'(!C)!6+4!                                    A
      /,34!P(6404/6!@083!6+4!/,34!E5'4(6!!
       <  ;+4!E5'4(6!984/(k6!6,14!,!K,6+!T+'E+!+,/!5,0-4!945,)!
                                                                  The algorithms cannot guarantee that the
!  28(/60,'('(-!6+4!/DC/4UD4(6!60,XE!8@!8(4!                      discovered paths are 100% disjoint

  E5'4(6!68!6+4!9'/E8?4049!K,6+/!3,)C4!
  E+,554(-'(-!
   !  ND0'(-!6+4!60,(/3'//'8(%!6+4!ZN'/E8?4049![,E4/!8@!
      ,(!'(640349',64!(894!E,(!E+,(-4!9D4!68!6+4!58E,5!
      /60,64-)!5,)40!C4'(-!'(fD4(E49!C)!86+40!E5'4(6/!                             Discovered Face




                                                                  It is challenging to constraint the
                                                                  subsequent traffic of one client to the
                                                                  discovered paths




                                                                              15            !"#$%&'!
G,6+!>J5'Q,J8(!,(9!I,'(64(,(E4
!  HE+49D5'(-!/E+434!
   !  M8D(9!M8C'(!
   !  :PIN!C,/49!0,J8!,9OD/634(6!!
!  G,6+!M4<9'/E8?40)!!
   !  25'4(6!
       <  g+4(!,!GP;!4(60)!4SK'04/%!0438?4!6+4!E8004/K8(9'(-!P(6404/6!945'?40)!@,E4!@083!6+4!P(6404/6!
          945'?40)!/E+49D540c!H4(9!6+4!/DC/4UD4(6!P(6404/6/!68!6+4!86+40!@,E4c!P@!C86+!@,E4/!@,'5%!
          049'/E8?40!6+4!,?,'5,C54!@,E4/c!
   !  P(640349',64!L894!
       <  ZA4/6![,E4!,5-80'6+3a!!g+4(!,!GP;!4(60)!4SK'04/%!0438?4!6+4!E8004/K8(9'(-!ZA4/6!@,E4!,(9!
          049'/E8?40!6+4!,?,'5,C54!@,E4/c!
       <  Z7889![,E4/!,5-80'6+3a!g+4(!,!GP;!4(60)!4SK'04/%!0438?4!6+4!E8004/K8(9'(-!Z7889!@,E4c!
          H4(9!6+4!/DC/4UD4(6!P(6404/6/!68!6+4!86+40!@,E4c!P@!C86+!@,E4/!@,'5%!049'/E8?40!6+4!,?,'5,C54!
          @,E4/c!




                                                                                 16         !"#$%&'!
H4EJ8(!b

3%7@"7#)*5%,F6)</)>"*




                        !"#$%&'!
R?,5D,J8(!HE4(,0'8/
!  R?,5D,J8(!;885/a!FGLR;!/'3D5,680!
!  2+D(1!/'Q4a!#i_A!VlW!
!  ['54!/'Q4a!,?40,-49!#il!E+D(1/!"#iIA$!VmW!
!  2,E+4!/'Q4a!#i7A!VlW!
!  2,6,58-!/'Q4a!,!.8D;DC4<5'14!E,6,58-!
   E8(/'/J(-!8@!#in!8CO4E6/!">K!68!#GA$!VoW!
!  28(64(6!K8KD5,0'6)!38945a!!*'K@!5,T!VmWVpW!               OPNET-CCN node model

    !  ;+4!#in!Y54/!,04!4UD,55)!K,0JJ8(49!'(!#im!
       E5,//4/!8@!K8KD5,0'6)%!28(64(6!'643/!8@!E5,//!1!"!1
       !!!V#!%!#imW!$!,04!04UD4/649!T'6+!K08C,C'5'6)!qU1r
       1s#%=ccccc%#i %!T+'E+!'/!
              m!




                              !

                                                             OPNET-CCN process model



!                                                                         18        !"#$%&'!
!
R?,5D,J8(!HE4(,0'8/
   !  P(!8(4!K8KD5,0'6)!E5,//%!4,E+!28(64(6!'/!D('@8035)!E+8/4(!,38(-!#iii!28(64(6/%!
      /8!6+4!K08C,C'5'6)!@80!,!Y54!68!C4!04UD4/649!qK1%3r!1s#%=ccccc%#i %!3s#%=tt%#iii!!'/!a!
                                                                     m!




!  L,3'(-!
   !  ;+4!E5'4(6!-4(40,64/!,(!P(6404/6!T+'E+!@8558T/!6+4!*'K@<5,T!
   !  [803,6!
                       uni-bremen/!!!!/!!!dummy.avi
                                      0000     000
       Generate a random 4-digit                        Generate a random 3-digit
       number according to Zipf-law   0001     001      number uniformly
                                      !!       !!
                                      9999     999



!  2,E+4!94E'/'8(!K85'E)!
   !  :]g:.Ha!(4T!28(64(6!'/!,5T,)/!E,E+49!
   !  [P&"G$a!E,E+'(-!94E'/'8(/!,04!6,14(!T'6+!,!YS49!K08C,C'5'6)!.!VicpmuicvW!VnW!


                                                                                19   !"#$%&'!
R?,5D,J8(!HE4(,0'8/
!  2,E+4!04K5,E434(6!K85'E)!
   !  ]M>a!6+4!54,/6!04E4(65)!D/49!E+DE1!'/!04K5,E49!
   !  [P[Fa!6+4!8594/6!'(/40649!E+D(1!'/!04K5,E49!
   !  >LP[a!,!E+D(1!/454E649!D('@8035)!,6!0,(983!'/!04K5,E49VnW!
!  ;8K858-'4/!
   !  F(4^/4?40,5!E5'4(6/!
   !  PHG!C,E1C8(4!(46T801!68K858-'4/Vv%!#i%!##W!,(9!38C'54!(46T801/!
!  [80T,09'(-!H60,64-)!
   !    L894<9'/O8'(6!
   !    ]'(1<9'/O8'(6!
   !    ZA4/6![,E4!/60,64-)!V#W!
   !    N4@,D56!22L!@80T,09'(-!/60,64-)!V#W!
         <  H4(9!,(!P(6404/6!8(!,55!!"#$%&$'()$*$+,-!@,E4/%!'@!6+404!'/!(8!04/K8(/4%!60)!,55!6+4!86+40!@,E4/!
            '(!/4UD4(E4!




                                                                                      20        !"#$%&'!
G40@803,(E4!I460'E/
!  :?40,-4!N8T(58,9!;'34!
!  P(6404/6^28(64(6!N45'?40)!M,J8!!
   !  M,J8!8@!/4(6<68<04E4'?49!
!  G,6+!N'/E8?40)!RXE'4(E)!
   !  HDEE4//<68<@,'5D04!0,J8!8@!9'/E8?40'(-!K,6+/!
!  B8K!N'/6,(E4/!
   !  ]8(-40!K,6+/!/D/E4KJC54!68!K,6+!C04,1/!V#bW!
!  GP;!RSK'0,J8(!M,J8!
   !  RSK'049<68<E8(/D349!0,J8!




                                                      21   !"#$%&'!
H4EJ8(!l

!"*5</'1"*




             !"#$%&'!
28(E5D/'8(
!  I8J?,J8(!
   !  ;+4!94@,D56!22L!@80T,09'(-!/E+434!V#W!E,D/4/!688!3DE+!D((4E4//,0)!60,XE!
   !  ZA4/6![,E4!,5-80'6+3!V#W!3,)!54,9!68!D(C,5,(E49!60,@YE!9'/60'CDJ8(!,(9!3,)!
      049'/E8?40!K,6+/!3804!8w4(!'(!6+4!K04/4(E4!8@!@04UD4(6!68K858-'E,5!E+,(-4/!
!  G,6+!/454EJ8(!/E+434/!E8(/'94049!
   !  L894!9'/O8'(6!
   !  ]'(1!9'/O8'(6!
!  N4/'-(49!,!/E4(,0'8!,(9!3460'E/!@80!K40@803,(E4!4?,5D,J8(!!
   !  H'3D5,64!04,5!(46T801!4(?'08(34(6/!
   !  H4?40,5!K40@803,(E4!34,/D0434(6!3460'E/!




                                                                   23      !"#$%&'!
H4EJ8(!m

(??%*.1G




           !"#$%&'!
M4@404(E4/
!    V#W!x,E8C/8(%!yc%!H34e40/%!Nc_c%!;+80(68(%!xcNc%!G5,//%!Ic%!A0'--/%!Lc%!A0,)(,09%!Mc%!!L46T801'(-!L,349!28(64(6%!P(!28L4S6%!
     =iiv!
!    V=W!L45,1D9'J%!Hc!,(9!*+,(-%!*c]c%!F(!/454EJ8(!8@!K,6+/!@80!3D5JK,6+!08DJ(-%!'(!zD,5'6)!8@!H40?'E4{Pgz8H%!=ii#%!KKc!
     #pi<<#nl!
!    VbW!!I,8%!Hc%!AD/+3'6E+%!Nc%!L,0,),(,(%!Hc!,(9!G,(T,0%!HcHc%!!IM;Ga!:!3D5J<f8T!04,5<
     J34!60,(/K806!K0868E85!@80!,9!+8E!(46T801/%!'(!G08E449'(-/!8@!mn6+!PRRR!y4+'ED5,0!;4E+(858-)!28(@404(E4%!?85c!l%!FE68C40!
     =iib%!KKc!=o=v<=oblc!
!    VlW!M8//'%!Nc%!M8//'('%!7c%!!2,E+'(-!K40@803,(E4!8@!28(64(6!E4(60'E!(46T801/!D(940!3D5J<K,6+!08DJ(-!",(9!3804$!c!;4E+('E,5!
     04K806%!;454E83!G,0'/;4E+%!=i##c!
!    VmW!7'55%!Gc%!:05'e%!]'%!Ic%!*c%!,(9!I,+,(J%!:c%!.8D;DC4!60,XE!E+,0,E640'Q,J8(a!,!?'4T!@083!6+4!49-4%!'(!:2I!PI2%!=iip%!KKc!
     #mh=n!
!    VoW!2+,%!Ic%!_T,1%!Bc%!M890'-D4Q%!Gc%!:+(%!.c%!,(9!I88(%!Hc%!ZP!6DC4%!)8D!6DC4%!4?40)C89)!6DC4/a!,(,5)Q'(-!6+4!T8059k/!5,0-4/6!
     D/40!-4(40,649!E8(64(6!?'948!/)/643%!'(!:2I!PI2%!=iip%!KKc!#h#lc!
!    VpW!2,08Y-5'8%!7c%!7,558%!Ic%!,(9!ID/E,0'4558%!]c%!ZA,(9T'96+!,(9!H680,-4!H+,0'(-!G40@803,(E4!'(!P(@803,J8(!24(60'E!
     L46T801'(-%!'(!:2I!HP72FII%!P2L!g801/+8K%!=i##%!KKc!#hoc!
!    VnW!:0',(@,0%!Hc!,(9!L'1,(940%!Gc%!ZG,E146<54?45!2,E+'(-!@80!P(@803,J8(<E4(60'E!L46T801'(-%!'(!:2I!HP72FII%!M4:0E+!
     g801/+8K%!=i#ic!
!    VvW!:C'54(4!L46T801%!+eKa^^TTTc'(640(46=c49D^KDC/^=iimi=<PH<:LcK9@!
!    V#iW!7R:L;!6+4!K,(<RD08K4,(!04/4,0E+!,(9!49DE,J8(!(46T801%!+eKa^^TTTc-4,(6c(46^I49',|24(604^I49',|]'C0,0)^
     GDC5'/+'(-P3,-4/^#inlj=i7R:L;j=i;8K858-)j=iI:Mj=i#=cK9@!
!    V##W!HK0'(-%!Lc%!I,+,O,(%!Mc%!,(9!g46+40,55%!Nc%!ZI4,/D0'(-!PHG!68K858-'4/!T'6+!M8E14}D45%!'(!:2I!HP72FII%!=ii=!
!    V#=W!I,8%!Hc!46!,5c%!ZID5JK,6+!y'948!;0,(/K806!8?40!:9!B8E!L46T801/%!g'0454//!2833D('E,J8(/%!PRRR%!?85c!#=%!(8c!l%!=iim%!
     KKc!l=hlvc!
!    V#bW!]44%!Hcxc!,(9!7405,%!Ic%~HK5'6!3D5JK,6+!08DJ(-!T'6+!3,S'3,55)!9'/O8'(6!K,6+/!'(!,9!+8E!(46T801/%~!P22!=ii#%!KKc
     b=i#<b=imc


                                                                                                        25          !"#$%&'!
Thank you!
Questions?

             26   !"#$%&'!

More Related Content

What's hot

Law & Policy on Irregular Migration in Cyprus
Law & Policy on Irregular Migration in CyprusLaw & Policy on Irregular Migration in Cyprus
Law & Policy on Irregular Migration in CyprusIrini Anastassiou
 
RUSSIA’S ARCTIC Olga Boubnova
RUSSIA’S ARCTIC Olga BoubnovaRUSSIA’S ARCTIC Olga Boubnova
RUSSIA’S ARCTIC Olga BoubnovaOlga Boubnova
 
Ihecrim psychocrimologie expertise mentale des agresseurs
Ihecrim psychocrimologie expertise mentale des agresseursIhecrim psychocrimologie expertise mentale des agresseurs
Ihecrim psychocrimologie expertise mentale des agresseursLaurentMontet
 
CSB Eece Presentation
CSB Eece PresentationCSB Eece Presentation
CSB Eece Presentation391445
 
1st Round Athletics Deck (1)
1st Round Athletics Deck (1)1st Round Athletics Deck (1)
1st Round Athletics Deck (1)Sterling Brewster
 
20101003 budget+draft+2011
20101003 budget+draft+201120101003 budget+draft+2011
20101003 budget+draft+2011aristos arestos
 
Jack oughton ‘virtuous writing checklist' v1.0
Jack oughton   ‘virtuous writing checklist' v1.0Jack oughton   ‘virtuous writing checklist' v1.0
Jack oughton ‘virtuous writing checklist' v1.0Jack Oughton
 
DSP KSSR BAHASA TAMIL TAHUN 3
DSP KSSR BAHASA TAMIL TAHUN 3DSP KSSR BAHASA TAMIL TAHUN 3
DSP KSSR BAHASA TAMIL TAHUN 3gengkapak84
 
Taller Social Media aplicado a gestión RRHH
Taller Social Media aplicado a gestión RRHHTaller Social Media aplicado a gestión RRHH
Taller Social Media aplicado a gestión RRHHXupera
 
বৃহদারাণ্যক উপনিষদ্‌, চতুর্থ অধ্যায়, প্রথম ব্রাহ্মণ,মূল মন্ত্র, অনুবাদ ও নিরু...
বৃহদারাণ্যক উপনিষদ্‌, চতুর্থ অধ্যায়, প্রথম ব্রাহ্মণ,মূল মন্ত্র, অনুবাদ ও নিরু...বৃহদারাণ্যক উপনিষদ্‌, চতুর্থ অধ্যায়, প্রথম ব্রাহ্মণ,মূল মন্ত্র, অনুবাদ ও নিরু...
বৃহদারাণ্যক উপনিষদ্‌, চতুর্থ অধ্যায়, প্রথম ব্রাহ্মণ,মূল মন্ত্র, অনুবাদ ও নিরু...debkumar_lahiri
 
Llibres pel curs 12-13
Llibres pel curs 12-13Llibres pel curs 12-13
Llibres pel curs 12-13toniarroyo9
 

What's hot (18)

Law & Policy on Irregular Migration in Cyprus
Law & Policy on Irregular Migration in CyprusLaw & Policy on Irregular Migration in Cyprus
Law & Policy on Irregular Migration in Cyprus
 
Ppt fiep x_iglesias_2012
Ppt fiep x_iglesias_2012Ppt fiep x_iglesias_2012
Ppt fiep x_iglesias_2012
 
RUSSIA’S ARCTIC Olga Boubnova
RUSSIA’S ARCTIC Olga BoubnovaRUSSIA’S ARCTIC Olga Boubnova
RUSSIA’S ARCTIC Olga Boubnova
 
Open Solaris 2009.06
Open Solaris 2009.06Open Solaris 2009.06
Open Solaris 2009.06
 
Csi Process Workshop February 2010
Csi Process Workshop   February 2010Csi Process Workshop   February 2010
Csi Process Workshop February 2010
 
Ihecrim psychocrimologie expertise mentale des agresseurs
Ihecrim psychocrimologie expertise mentale des agresseursIhecrim psychocrimologie expertise mentale des agresseurs
Ihecrim psychocrimologie expertise mentale des agresseurs
 
Thomafluid (русский)
Thomafluid (русский)Thomafluid (русский)
Thomafluid (русский)
 
CSB Eece Presentation
CSB Eece PresentationCSB Eece Presentation
CSB Eece Presentation
 
Max Factor
Max FactorMax Factor
Max Factor
 
1st Round Athletics Deck (1)
1st Round Athletics Deck (1)1st Round Athletics Deck (1)
1st Round Athletics Deck (1)
 
20101003 budget+draft+2011
20101003 budget+draft+201120101003 budget+draft+2011
20101003 budget+draft+2011
 
Jack oughton ‘virtuous writing checklist' v1.0
Jack oughton   ‘virtuous writing checklist' v1.0Jack oughton   ‘virtuous writing checklist' v1.0
Jack oughton ‘virtuous writing checklist' v1.0
 
Thesis
ThesisThesis
Thesis
 
DSP KSSR BAHASA TAMIL TAHUN 3
DSP KSSR BAHASA TAMIL TAHUN 3DSP KSSR BAHASA TAMIL TAHUN 3
DSP KSSR BAHASA TAMIL TAHUN 3
 
Taller Social Media aplicado a gestión RRHH
Taller Social Media aplicado a gestión RRHHTaller Social Media aplicado a gestión RRHH
Taller Social Media aplicado a gestión RRHH
 
বৃহদারাণ্যক উপনিষদ্‌, চতুর্থ অধ্যায়, প্রথম ব্রাহ্মণ,মূল মন্ত্র, অনুবাদ ও নিরু...
বৃহদারাণ্যক উপনিষদ্‌, চতুর্থ অধ্যায়, প্রথম ব্রাহ্মণ,মূল মন্ত্র, অনুবাদ ও নিরু...বৃহদারাণ্যক উপনিষদ্‌, চতুর্থ অধ্যায়, প্রথম ব্রাহ্মণ,মূল মন্ত্র, অনুবাদ ও নিরু...
বৃহদারাণ্যক উপনিষদ্‌, চতুর্থ অধ্যায়, প্রথম ব্রাহ্মণ,মূল মন্ত্র, অনুবাদ ও নিরু...
 
Llibres pel curs 12-13
Llibres pel curs 12-13Llibres pel curs 12-13
Llibres pel curs 12-13
 
N16
N16N16
N16
 

Viewers also liked

CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
CCNxCon2012: Session 3: Juxtaposition of CCN and PepysCCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
CCNxCon2012: Session 3: Juxtaposition of CCN and PepysPARC, a Xerox company
 
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesCCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesPARC, a Xerox company
 
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
CCNxCon2012: Session 4: Caesar:  a Content Router for High Speed ForwardingCCNxCon2012: Session 4: Caesar:  a Content Router for High Speed Forwarding
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed ForwardingPARC, a Xerox company
 
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R NetworksCCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R NetworksPARC, a Xerox company
 
CCNxCon2012: Session 5: Object Sizes in Named Data Networking
CCNxCon2012: Session 5: Object Sizes in Named Data NetworkingCCNxCon2012: Session 5: Object Sizes in Named Data Networking
CCNxCon2012: Session 5: Object Sizes in Named Data NetworkingPARC, a Xerox company
 
CCNxCon2012: Session 5: Steaming up CCN against TCP
CCNxCon2012: Session 5: Steaming up CCN against TCPCCNxCon2012: Session 5: Steaming up CCN against TCP
CCNxCon2012: Session 5: Steaming up CCN against TCPPARC, a Xerox company
 

Viewers also liked (6)

CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
CCNxCon2012: Session 3: Juxtaposition of CCN and PepysCCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
 
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesCCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
 
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
CCNxCon2012: Session 4: Caesar:  a Content Router for High Speed ForwardingCCNxCon2012: Session 4: Caesar:  a Content Router for High Speed Forwarding
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
 
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R NetworksCCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
 
CCNxCon2012: Session 5: Object Sizes in Named Data Networking
CCNxCon2012: Session 5: Object Sizes in Named Data NetworkingCCNxCon2012: Session 5: Object Sizes in Named Data Networking
CCNxCon2012: Session 5: Object Sizes in Named Data Networking
 
CCNxCon2012: Session 5: Steaming up CCN against TCP
CCNxCon2012: Session 5: Steaming up CCN against TCPCCNxCon2012: Session 5: Steaming up CCN against TCP
CCNxCon2012: Session 5: Steaming up CCN against TCP
 

Similar to CCNxCon2012: Session 4: Disjoint Path Discovery in CCN Networks

Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...
Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...
Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...Community Food Security Coalition
 
Alcatel lucent-michael cooper
Alcatel lucent-michael cooperAlcatel lucent-michael cooper
Alcatel lucent-michael cooperCarl Ford
 
Protocolos TCP/IP
Protocolos TCP/IPProtocolos TCP/IP
Protocolos TCP/IPffreddyhc
 
Daily Deals White Paper
Daily Deals White PaperDaily Deals White Paper
Daily Deals White Papereeliason
 
A Little Bit Of Insight 2011
A Little Bit Of Insight 2011A Little Bit Of Insight 2011
A Little Bit Of Insight 2011Marrianne Garbutt
 
What internal consistency can do for you
What internal consistency can do for youWhat internal consistency can do for you
What internal consistency can do for youInternal Consistency
 
Preparing for the Rising Tide: Executive Summary
Preparing for the Rising Tide: Executive SummaryPreparing for the Rising Tide: Executive Summary
Preparing for the Rising Tide: Executive Summaryclimate central
 
Vulnerability Management as a Service
Vulnerability Management as a ServiceVulnerability Management as a Service
Vulnerability Management as a ServiceChunJia Sio
 
The Nielsen Company Mo Mo Intro June8th Buenos Aires
The Nielsen Company Mo Mo Intro   June8th Buenos AiresThe Nielsen Company Mo Mo Intro   June8th Buenos Aires
The Nielsen Company Mo Mo Intro June8th Buenos AiresMOMO BUENOSAIRES
 
Central California Writing Project Invitational Summer Institute: June 19-Jul...
Central California Writing Project Invitational Summer Institute: June 19-Jul...Central California Writing Project Invitational Summer Institute: June 19-Jul...
Central California Writing Project Invitational Summer Institute: June 19-Jul...Fred Mindlin
 
Al ajrumiyyah matan
Al ajrumiyyah matanAl ajrumiyyah matan
Al ajrumiyyah matanZayyin YinLa
 
Gandhi essayrubric20112012
Gandhi essayrubric20112012Gandhi essayrubric20112012
Gandhi essayrubric20112012Hank Maine
 
Your worldwide business, our daily matter
Your worldwide business, our daily matterYour worldwide business, our daily matter
Your worldwide business, our daily matteriliade-partners
 
Ramcloud deview2013
Ramcloud deview2013Ramcloud deview2013
Ramcloud deview2013NAVER D2
 
Understanding the mobile payment phenomenon
Understanding the mobile payment phenomenonUnderstanding the mobile payment phenomenon
Understanding the mobile payment phenomenonMobileMonday Switzerland
 

Similar to CCNxCon2012: Session 4: Disjoint Path Discovery in CCN Networks (20)

Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...
Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...
Accessing and Using Food Data to Support Collaborative Policy Decisions - Pow...
 
Alcatel lucent-michael cooper
Alcatel lucent-michael cooperAlcatel lucent-michael cooper
Alcatel lucent-michael cooper
 
Protocolos TCP/IP
Protocolos TCP/IPProtocolos TCP/IP
Protocolos TCP/IP
 
Daily Deals White Paper
Daily Deals White PaperDaily Deals White Paper
Daily Deals White Paper
 
A Little Bit Of Insight 2011
A Little Bit Of Insight 2011A Little Bit Of Insight 2011
A Little Bit Of Insight 2011
 
ER&L 2010 Program
ER&L 2010 ProgramER&L 2010 Program
ER&L 2010 Program
 
What internal consistency can do for you
What internal consistency can do for youWhat internal consistency can do for you
What internal consistency can do for you
 
RabatBangla.pdf
RabatBangla.pdfRabatBangla.pdf
RabatBangla.pdf
 
Preparing for the Rising Tide: Executive Summary
Preparing for the Rising Tide: Executive SummaryPreparing for the Rising Tide: Executive Summary
Preparing for the Rising Tide: Executive Summary
 
Vulnerability Management as a Service
Vulnerability Management as a ServiceVulnerability Management as a Service
Vulnerability Management as a Service
 
The Nielsen Company Mo Mo Intro June8th Buenos Aires
The Nielsen Company Mo Mo Intro   June8th Buenos AiresThe Nielsen Company Mo Mo Intro   June8th Buenos Aires
The Nielsen Company Mo Mo Intro June8th Buenos Aires
 
Central California Writing Project Invitational Summer Institute: June 19-Jul...
Central California Writing Project Invitational Summer Institute: June 19-Jul...Central California Writing Project Invitational Summer Institute: June 19-Jul...
Central California Writing Project Invitational Summer Institute: June 19-Jul...
 
Al ajrumiyyah matan
Al ajrumiyyah matanAl ajrumiyyah matan
Al ajrumiyyah matan
 
Gandhi essayrubric20112012
Gandhi essayrubric20112012Gandhi essayrubric20112012
Gandhi essayrubric20112012
 
Anolei Camel Milk Cooperative
Anolei Camel Milk CooperativeAnolei Camel Milk Cooperative
Anolei Camel Milk Cooperative
 
Your worldwide business, our daily matter
Your worldwide business, our daily matterYour worldwide business, our daily matter
Your worldwide business, our daily matter
 
Tervetuloa - MobileMonday - Jari Tammisto
Tervetuloa - MobileMonday - Jari TammistoTervetuloa - MobileMonday - Jari Tammisto
Tervetuloa - MobileMonday - Jari Tammisto
 
Ramcloud deview2013
Ramcloud deview2013Ramcloud deview2013
Ramcloud deview2013
 
Understanding the mobile payment phenomenon
Understanding the mobile payment phenomenonUnderstanding the mobile payment phenomenon
Understanding the mobile payment phenomenon
 
Rio+20
Rio+20Rio+20
Rio+20
 

More from PARC, a Xerox company

Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...PARC, a Xerox company
 
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
CCNxCon2012: Welcome: Event Kickoff & Opening RemarksCCNxCon2012: Welcome: Event Kickoff & Opening Remarks
CCNxCon2012: Welcome: Event Kickoff & Opening RemarksPARC, a Xerox company
 
CCNxCon2012: Session 1: CCN Updates & Roadmap
CCNxCon2012: Session 1: CCN Updates &  RoadmapCCNxCon2012: Session 1: CCN Updates &  Roadmap
CCNxCon2012: Session 1: CCN Updates & RoadmapPARC, a Xerox company
 
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...PARC, a Xerox company
 
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
CCNxCon2012: Session 2: DASH over CCN:  A CCN Use-Case for a SocialMedia Base...CCNxCon2012: Session 2: DASH over CCN:  A CCN Use-Case for a SocialMedia Base...
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...PARC, a Xerox company
 
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...PARC, a Xerox company
 
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCNCCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCNPARC, a Xerox company
 
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...PARC, a Xerox company
 
CCNxCon2012: Poster Session: FIB Optimizations in CCN
CCNxCon2012: Poster Session: FIB Optimizations in CCNCCNxCon2012: Poster Session: FIB Optimizations in CCN
CCNxCon2012: Poster Session: FIB Optimizations in CCNPARC, a Xerox company
 
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
CCNxCon2012: Poster Session: Cache Coordination in a HierarchicalCCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
CCNxCon2012: Poster Session: Cache Coordination in a HierarchicalPARC, a Xerox company
 
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
CCNxCon2012: Poster Session: Live Streaming with Content Centric NetworkingCCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
CCNxCon2012: Poster Session: Live Streaming with Content Centric NetworkingPARC, a Xerox company
 
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...PARC, a Xerox company
 
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...PARC, a Xerox company
 
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...PARC, a Xerox company
 
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...PARC, a Xerox company
 
CCNxCon2012: Session 5: Interest Rate Control for Content-Centric Networking
CCNxCon2012: Session 5: Interest Rate Control for Content-Centric NetworkingCCNxCon2012: Session 5: Interest Rate Control for Content-Centric Networking
CCNxCon2012: Session 5: Interest Rate Control for Content-Centric NetworkingPARC, a Xerox company
 
CCNxCon2012: Session 5: A Distributed PIT Table
CCNxCon2012: Session 5: A Distributed PIT TableCCNxCon2012: Session 5: A Distributed PIT Table
CCNxCon2012: Session 5: A Distributed PIT TablePARC, a Xerox company
 
CCNxCon2012: Session 5: Denial of Service Attacks Evaluation
CCNxCon2012: Session 5: Denial of Service Attacks EvaluationCCNxCon2012: Session 5: Denial of Service Attacks Evaluation
CCNxCon2012: Session 5: Denial of Service Attacks EvaluationPARC, a Xerox company
 
CCNxCon2012: Session 5: CCN Location Sharing System
CCNxCon2012: Session 5: CCN Location Sharing SystemCCNxCon2012: Session 5: CCN Location Sharing System
CCNxCon2012: Session 5: CCN Location Sharing SystemPARC, a Xerox company
 

More from PARC, a Xerox company (20)

Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
 
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
CCNxCon2012: Welcome: Event Kickoff & Opening RemarksCCNxCon2012: Welcome: Event Kickoff & Opening Remarks
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
 
CCNxCon2012: Session 1: CCN Updates & Roadmap
CCNxCon2012: Session 1: CCN Updates &  RoadmapCCNxCon2012: Session 1: CCN Updates &  Roadmap
CCNxCon2012: Session 1: CCN Updates & Roadmap
 
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
 
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
CCNxCon2012: Session 2: DASH over CCN:  A CCN Use-Case for a SocialMedia Base...CCNxCon2012: Session 2: DASH over CCN:  A CCN Use-Case for a SocialMedia Base...
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
 
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
 
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCNCCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
 
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
 
CCNxCon2012: Poster Session: FIB Optimizations in CCN
CCNxCon2012: Poster Session: FIB Optimizations in CCNCCNxCon2012: Poster Session: FIB Optimizations in CCN
CCNxCon2012: Poster Session: FIB Optimizations in CCN
 
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
CCNxCon2012: Poster Session: Cache Coordination in a HierarchicalCCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
 
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
CCNxCon2012: Poster Session: Live Streaming with Content Centric NetworkingCCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
 
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
 
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
 
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
 
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
 
CCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFNCCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFN
 
CCNxCon2012: Session 5: Interest Rate Control for Content-Centric Networking
CCNxCon2012: Session 5: Interest Rate Control for Content-Centric NetworkingCCNxCon2012: Session 5: Interest Rate Control for Content-Centric Networking
CCNxCon2012: Session 5: Interest Rate Control for Content-Centric Networking
 
CCNxCon2012: Session 5: A Distributed PIT Table
CCNxCon2012: Session 5: A Distributed PIT TableCCNxCon2012: Session 5: A Distributed PIT Table
CCNxCon2012: Session 5: A Distributed PIT Table
 
CCNxCon2012: Session 5: Denial of Service Attacks Evaluation
CCNxCon2012: Session 5: Denial of Service Attacks EvaluationCCNxCon2012: Session 5: Denial of Service Attacks Evaluation
CCNxCon2012: Session 5: Denial of Service Attacks Evaluation
 
CCNxCon2012: Session 5: CCN Location Sharing System
CCNxCon2012: Session 5: CCN Location Sharing SystemCCNxCon2012: Session 5: CCN Location Sharing System
CCNxCon2012: Session 5: CCN Location Sharing System
 

CCNxCon2012: Session 4: Disjoint Path Discovery in CCN Networks

  • 1. 01'2"1*&,3)&4,01'5"6%78,1*,!!$, $%&9"7:' , (')*+),-./+)#)"#$%!&'()'!*+,(-"#$%!.,/'0!*,1'"#$%!2,0345'6,! 7840-"#$!,(9!:(904,/!;'33<7'45"=$ ! ! "#$!>('?40/'6)!8@!A0434(%!A0434(%!7403,()! "=$!B,3CD0-!>('?40/'6)!8@!;4E+(858-)%!B,3CD0-%!7403,()! !"#$%&'!
  • 2. FD65'(4 !  G08C543!H6,6434(6! !  G40@803,(E4!R?,5D,J8(! !  H6,64<8@<:06! !  R?,5D,J8(!HE4(,0'8/! !  ID5JK,6+!'(!22L!! !  G40@803,(E4!I460'E/! !  28(/'940,J8(/!@80!ID5JK,6+!M460'4?,5! H60,64-'4/!! !  28(E5D/'8(! !  28(E5D/'8(! !  H85DJ8(!G08K8/,5/! !  :KK4(9'S! !  G,6+!N'/E8?40)! !  M4@404(E4/! !  N'/O8'(6!G,6+!N'/E8?40)!H60,64-'4/! !  P//D4/!8@!N'/E8?40'(-!N'/O8'(6!G,6+/! !  G,6+!>J5'Q,J8(!,(9!I,'(64(,(E4! ! !"#$%&'!
  • 4. H6,64<8@<:06 server !  N4@,D56!22L!@80T,09'(-!34E+,('/3!! !  H4(9!,(!'(6404/6!8(!,55!!"#$%&$'()$*$+,-!@,E4/! 6+4(%!'@!6+404!'/!(8!04/K8(/4%!68!60)!,55!6+4!86+40! @,E4/!'(!/4UD4(E4V#W! <  RXE'4(6!T+4(!/4,0E+'(-!6+4!(4'-+C80+889!68!Y(9! 6+4!94/'049!E8(64(6!! <  B'-+!045',C'5'6)! <  2,D/4!D((4E4//,0)!60,XE!! !  ZA4/6![,E4!@80T,09'(-!34E+,('/3V#W! <  M49DE4!6+4!60,XE!68!0460'4?4!8(4!E8(64(6!E+D(1 ! <  ://D34!,!E8(64(6!K08?'940!E,(!K08?'94!E8(/4EDJ?4! E8(64(6!E+D(1/!! <  I'-+6!E,D/4!@04UD4(6!'(6404/6!04/4(9/! <  28(/'940,J8(!8@!54,/6!945,)!E,(!54,9!68!D(C,5,(E49! client 60,@YE!9'/60'CDJ8(! Distributed caching allow client to retrieve the Content from the nearest cache 4 !"#$%&'!
  • 5. ID5JK,6+!'(!22L! !  ID5JK,6+!'3K08?4/!(46T801'(-!K40@803,(E4! server !  ]8,9!C,5,(E'(-%!,--04-,J8(!8@!C,(9T'96+! !  [,D56!68540,(E4^'(E04,/49!045',C'5'6)! !  ]4//!K,6+!9'/E8?40'4/! !  22L!'(+404(65)!/DKK806/!3D5JK,6+! !  ]88K<@044!E8(64(6!945'?40)!34E+,('/3! <  P(6404/6!E,(!C4!/4(6!8D6!?',!3D5JK54!'(640@,E4/!T'6+8D6! T800)'(-!,C8D6!588K/! !  N'/60'CD649!'(<(46T801!E,E+'(-!'(!22L! <  P3K08?4!6+4!945,)^6+08D-+KD6!K40@803,(E4!C)!K5,E'(-! 6+4!28(64(6!5<"'%7,&",&4%,/'%7', <  M49DE4!6+4!'(E83'(-!60,XE!@083!(4'-+C80'(-!PHG/!! <  L,6D0,55)!@,?80/!3D5J<K8'(6!68!3D5J<K8'(6!E833D('E,J8(! !  Multiple nodes can provide the same content !  ID5JK,6+!E8(64(6!945'?40)!,9,K6/!68!6+4!+'-+< client 9)(,3'E!ZE,E+4!68K858-)! Multipath in CCN 5 !"#$%&'!
  • 6. 28(/'940,J8(/!@80!ID5JK,6+!M460'4?,5!H60,64-'4/! !  22L!'/!,!+8/6!",9904//$!D(,T,04!(46T801'(-!,0E+'64E6D04!! !  GD04!/8D0E4!08DJ(-!,/!'(!PG!'/!'(@4,/'C54!'(!22L! !  22L!+,/!(8!'94,!8@!6+4!K,6+/!CD6!8(5)!@,E4/! !  2,((86!3,14!-58C,5!94E'/'8(/! !  2,(!8(5)!946403'(4!T+'E+!@,E4!68!945'?40!,(!P(6404/6! !  :9+404(E4!68!@80T,09'(-!K0'(E'K54/!8@!22L!! !  _44K!6+4!C,5,(E4!8@!60,XE!"8(4<68<8(4!E8004/K8(94(E4$! !  :?8'9!08DJ(-!588K/!! 6 !"#$%&'!
  • 8. G,6+!N'/E8?40)! !  B8T!3,()!K,6+/!,04!(44949`!! !  ;2G^PGa!!6T8!80!6+044!K,6+/!,04! 4(8D-+!VbWV=W! <  I8/6!8@!6+4!K40@803,(E4!! '3K08?434(6/!E,(!C4!!,E+'4?49!T'6+!,! @4T!K,6+/!VbW! <  I804!K,6+/!04UD'04/!3804!8?40+4,9!68! E8(6085!V=W! <  P(E04,/4/!6+4!E83K54S'6)!8@!60,XE! 9'/60'CDJ8(!/E+434V=W!! !  22La!/J55!,(!8K4(!'//D4! !  F(5)!E8(/'940!6T8!K,6+/!@80! /'3K5'E'6)! Impact of shared links on the end-to-end video quality: !  B8T!68!/454E6!6+4/4!K,6+/`!! Multiple Descriptions (MD, using two paths) distortion vs. Single Description (SD, using single path) distortion as !  N45,)! the number of joint links between two paths varies. [12] !  N'?40/'6)! <  M4/8D0E4!,--04-,J8(! <  B'-+40!@,D56<68540,(E4! 8 !"#$%&'!
  • 9. G,6+!N'/E8?40) !  I46+89/!a!! !  #c!L894<9'/O8'(6!K,6+/! <  Fd40!6+4!38/6!04/8D0E4!,--04-,J8(! Content <  Fd40!6+4!+'-+4/6!94-044!8@!@,D56<68540,(E4! <  ]4,/6!E8338(! !  =c!]'(1<9'/O8'(6!K,6+/! <  ]8T40!04/8D0E4!,--04-,J8(!6+,(!L894< 9'/O8'(6!K,6+/! <  ]8T40!94-044!8@!@,D56<68540,(E4! <  :!-889!E83K083'/4!C46T44(!L894<9'/O8'(6! Client ,(9!L8(<9'/O8'(6!K,6+/! !  bc!L8(<9'/O8'(6!K,6+/! Four types of node-or link-Disjoint Paths between a <  ]8T4/6!04/8D0E4!,--04-,J8(! client-Content pair <  ]8T4/6!94-044!8@!@,D56<68540,(E4! !  A single link or node failure can cause multiple paths to fail <  2,(!C4!4,/'5)!9'/E8?4049! 9 !"#$%&'!
  • 10. N'/E8?40!L894<9'/O8'(6!G,6+/ !  ;+4!@D(9,34(6,5!22L!@80T,09'(-!/60,64-'4/!-D,0,(644!6+,6!)&,#"'&, "*%,5"?8,"@,)*8,?1%5%,"@,.)&),+"%',"6%7,)*8,<1*:, or Fundamental CCN forwarding strategy aggregates duplicate Interests and suppresses duplicate Contents !  P@!E5'4(6!/4(9/!8D6!,(!P(6404/6!8?40!,55!@,E4/%!6+4!046D0('(-!28(64(6! 6+,6!Y(,55)!,00'?4/!,6!6+4!E5'4(6!E,(!8(5)!6,14!K,6+/!,/!@8558T/a! ! (a) (b) (c) (d) There are four kinds of multiple paths taken by the returning Content in response to path-discovery Interests 10 !"#$%&'!
  • 11. N'/E8?40!L894<9'/O8'(6!G,6+/ !  P(6404/6!K,E146/!E8(6,'(!,!0,(983!(8(E4!?,5D4!/8!6+,6!9DK5'E,64/! 04E4'?49!8?40!9'd404(6!K,6+/!3,)!C4!9'/E,0949!V#W! !  P(!38/6!E,/4/%!!6+4!/'6D,J8(!'(!E,/4!"9$!E8D59!C4!,?8'949!/'(E4!6+4!9DK5'E,64! '(6404/6!T'55!C4!9'/E,0949!,6!6+4!!(894!8@!'(640/4EJ8(!! !  RSE4KJ8(a!!P@!6+404!,504,9)!4S'/6!GP;!4(60'4/!!'(!6+4!'(640349',64!(894/%!6+4! 046D0('(-!E8(64(6!3,)!6,14!(8(<9'/O8'(6!K,6+/!!! !  H85DJ8(a!!R?40)!J34!6+4!E8(64(6!K08?'940!/4(9/!8D6!,!E8(64(6!E+D(1!6+08D-+!,!! !!!!!,(!'(640@,E4%!,e,E+!,!(8(E4!8(!6+4!E8(64(6c! PIT entry PIT entry Once an Interest meets an existing PIT entry, the returning Contents may take overlapped routes 11 !"#$%&'!
  • 12. N'/E8?40!L894<9'/O8'(6!G,6+/ !  P(!K,6+!9'/E8?40)!/6,-4%!@80E4! Nonce 6+4!E5'4(6!68!,EE4K6!K,6+/!6,14(!C)! 0056 Nonce 0024 28(64(6!E,00)'(-!D('UD4!(8(E4! ?,5D4/! PIT entry !  28(64(6!K08?'940!! <  R,E+!E8(64(6!K08?'940!3,01/!,(!8D6-8'(-! E8(64(6!T'6+!,!0,(983!(8(E4!?,5D4! !  25'4(6! PIT entry <  :5T,)/!6,14!6+4!Y0/6!04E4'?49!E8(64(6!! Nonce <  283K,04!6+4!(8(E4!?,5D4!8@!6+4!5,640! Nonce 0024 ,00'?'(-!E8(64(6!T'6+!6+,6!8@!6+4!Y0/6! 0056 E8(64(6!04E4'K6! Client 1 Nonce !  :(!'(640349',64!(894!T'55!/46!6+4! 0056 9'/E8?4049!8D6-8'(-!@,E4!,/!6+4!ZA4/6! Client 2 [,E4!,(9!D/4!'6!68!945'?40!6+4! @8558T'(-!P(6404/6/! Discover node-disjoint Paths 12 !"#$%&'!
  • 13. N'/E8?40!]'(1<9'/O8'(6!G,6+/ !  P(!6+4!K,6+!9'/E8?40)!/6,-4%!,!346+89!'/!04UD'049!68!-D,0,(644!6+,6!! !  :()!'(640349',64!(894!9'/60'CD64/!6+4!046D0('(-!28(64(6/!68!9'd404(6!@,E4/! !  R,E+!28(64(6!'/!945'?4049!68!,6!38/6!8(4!8D6-8'(-!@,E4! pending The principles of the route discovery method for link-disjoint paths discovery 13 !"#$%&'!
  • 14. N'/E8?40!]'(1<9'/O8'(6!G,6+/ !  P(!K,6+!9'/E8?40)!/6,-4%! !  :e,E+!,!0,(983!(8(E4!,(9!,!f,-!68!6+4!'(6404/6! I H 4?40)!J34!6+4!E5'4(6!/4(9!'6!8D6!6+08D-+!,(! '(640@,E4! !  g+4(!6+4!'(640349',64!(894!04E4'?4/!,(!P(6404/6! T'6+!,!f,-%!'6!T'55! E F G <  P@!6+4!P(6404/6!T,/!(4?40!/44(!C4@804!h!E04,64!GP;! 4(60)! <  P@!6+4!P(6404/6!E,00'4/!,!9'd404(6!(8(E4!,(9!E834/! @083!,!9'd404(6!@,E4!T'6+!6+4!'(6404/6/!K4(9'(-! 6+404!<<!57%)&%,),'%?)7)&%,3AB,%*&78,@"7,&4%,A*&%7%'&,, A B C D <  F6+40T'/4!<<!.1'5)7.,&4%,A*&%7%'&, !  R,E+!046D0('(-!28(64(6!E+D(1!E8(/D34/!8(5)!8(4! GP;!4(60),CD7'&,57%)&%.,%*&78,1',5"*'/#%.,D7'&E! <  ;+4!/4E8(9!04E4'?49!28(64(6!E,(!E8(/D34!6+4! /4E8(9!GP;!4(60)! client !  :(!P(640349',64!(894!T'55!/46!6+4!9'/E8?4049! Discover link-disjoint Paths 6T8!8D6-8'(-!@,E4/!,/!Z7889![,E4/!,(9!D/4! 6+43!68!945'?40!6+4!/DC/4UD4(6!P(6404/6/! 14 !"#$%&'!
  • 15. P//D4/!8@!N'/E8?40'(-!N'/O8'(6!G,6+/!'(!22L !  ;+4!,5-80'6+3/!E,((86!-D,0,(644!6+,6!6+4! 9'/E8?4049!K,6+/!,04!#iij!9'/O8'(6!! !  :!E8(64(6!0460'4?49!C)!8(4!'(6404/6!3'-+6!C4!E,E+49! ,58(-!6+4!K,6+%!,(9!6+4(!C4!0460'4?49!,-,'(!C)!6+4! A /,34!P(6404/6!@083!6+4!/,34!E5'4(6!! <  ;+4!E5'4(6!984/(k6!6,14!,!K,6+!T+'E+!+,/!5,0-4!945,)! The algorithms cannot guarantee that the !  28(/60,'('(-!6+4!/DC/4UD4(6!60,XE!8@!8(4! discovered paths are 100% disjoint E5'4(6!68!6+4!9'/E8?4049!K,6+/!3,)C4! E+,554(-'(-! !  ND0'(-!6+4!60,(/3'//'8(%!6+4!ZN'/E8?4049![,E4/!8@! ,(!'(640349',64!(894!E,(!E+,(-4!9D4!68!6+4!58E,5! /60,64-)!5,)40!C4'(-!'(fD4(E49!C)!86+40!E5'4(6/! Discovered Face It is challenging to constraint the subsequent traffic of one client to the discovered paths 15 !"#$%&'!
  • 16. G,6+!>J5'Q,J8(!,(9!I,'(64(,(E4 !  HE+49D5'(-!/E+434! !  M8D(9!M8C'(! !  :PIN!C,/49!0,J8!,9OD/634(6!! !  G,6+!M4<9'/E8?40)!! !  25'4(6! <  g+4(!,!GP;!4(60)!4SK'04/%!0438?4!6+4!E8004/K8(9'(-!P(6404/6!945'?40)!@,E4!@083!6+4!P(6404/6! 945'?40)!/E+49D540c!H4(9!6+4!/DC/4UD4(6!P(6404/6/!68!6+4!86+40!@,E4c!P@!C86+!@,E4/!@,'5%! 049'/E8?40!6+4!,?,'5,C54!@,E4/c! !  P(640349',64!L894! <  ZA4/6![,E4!,5-80'6+3a!!g+4(!,!GP;!4(60)!4SK'04/%!0438?4!6+4!E8004/K8(9'(-!ZA4/6!@,E4!,(9! 049'/E8?40!6+4!,?,'5,C54!@,E4/c! <  Z7889![,E4/!,5-80'6+3a!g+4(!,!GP;!4(60)!4SK'04/%!0438?4!6+4!E8004/K8(9'(-!Z7889!@,E4c! H4(9!6+4!/DC/4UD4(6!P(6404/6/!68!6+4!86+40!@,E4c!P@!C86+!@,E4/!@,'5%!049'/E8?40!6+4!,?,'5,C54! @,E4/c! 16 !"#$%&'!
  • 18. R?,5D,J8(!HE4(,0'8/ !  R?,5D,J8(!;885/a!FGLR;!/'3D5,680! !  2+D(1!/'Q4a!#i_A!VlW! !  ['54!/'Q4a!,?40,-49!#il!E+D(1/!"#iIA$!VmW! !  2,E+4!/'Q4a!#i7A!VlW! !  2,6,58-!/'Q4a!,!.8D;DC4<5'14!E,6,58-! E8(/'/J(-!8@!#in!8CO4E6/!">K!68!#GA$!VoW! !  28(64(6!K8KD5,0'6)!38945a!!*'K@!5,T!VmWVpW! OPNET-CCN node model !  ;+4!#in!Y54/!,04!4UD,55)!K,0JJ8(49!'(!#im! E5,//4/!8@!K8KD5,0'6)%!28(64(6!'643/!8@!E5,//!1!"!1 !!!V#!%!#imW!$!,04!04UD4/649!T'6+!K08C,C'5'6)!qU1r 1s#%=ccccc%#i %!T+'E+!'/! m! ! OPNET-CCN process model ! 18 !"#$%&'! !
  • 19. R?,5D,J8(!HE4(,0'8/ !  P(!8(4!K8KD5,0'6)!E5,//%!4,E+!28(64(6!'/!D('@8035)!E+8/4(!,38(-!#iii!28(64(6/%! /8!6+4!K08C,C'5'6)!@80!,!Y54!68!C4!04UD4/649!qK1%3r!1s#%=ccccc%#i %!3s#%=tt%#iii!!'/!a! m! !  L,3'(-! !  ;+4!E5'4(6!-4(40,64/!,(!P(6404/6!T+'E+!@8558T/!6+4!*'K@<5,T! !  [803,6! uni-bremen/!!!!/!!!dummy.avi 0000 000 Generate a random 4-digit Generate a random 3-digit number according to Zipf-law 0001 001 number uniformly !! !! 9999 999 !  2,E+4!94E'/'8(!K85'E)! !  :]g:.Ha!(4T!28(64(6!'/!,5T,)/!E,E+49! !  [P&"G$a!E,E+'(-!94E'/'8(/!,04!6,14(!T'6+!,!YS49!K08C,C'5'6)!.!VicpmuicvW!VnW! 19 !"#$%&'!
  • 20. R?,5D,J8(!HE4(,0'8/ !  2,E+4!04K5,E434(6!K85'E)! !  ]M>a!6+4!54,/6!04E4(65)!D/49!E+DE1!'/!04K5,E49! !  [P[Fa!6+4!8594/6!'(/40649!E+D(1!'/!04K5,E49! !  >LP[a!,!E+D(1!/454E649!D('@8035)!,6!0,(983!'/!04K5,E49VnW! !  ;8K858-'4/! !  F(4^/4?40,5!E5'4(6/! !  PHG!C,E1C8(4!(46T801!68K858-'4/Vv%!#i%!##W!,(9!38C'54!(46T801/! !  [80T,09'(-!H60,64-)! !  L894<9'/O8'(6! !  ]'(1<9'/O8'(6! !  ZA4/6![,E4!/60,64-)!V#W! !  N4@,D56!22L!@80T,09'(-!/60,64-)!V#W! <  H4(9!,(!P(6404/6!8(!,55!!"#$%&$'()$*$+,-!@,E4/%!'@!6+404!'/!(8!04/K8(/4%!60)!,55!6+4!86+40!@,E4/! '(!/4UD4(E4! 20 !"#$%&'!
  • 21. G40@803,(E4!I460'E/ !  :?40,-4!N8T(58,9!;'34! !  P(6404/6^28(64(6!N45'?40)!M,J8!! !  M,J8!8@!/4(6<68<04E4'?49! !  G,6+!N'/E8?40)!RXE'4(E)! !  HDEE4//<68<@,'5D04!0,J8!8@!9'/E8?40'(-!K,6+/! !  B8K!N'/6,(E4/! !  ]8(-40!K,6+/!/D/E4KJC54!68!K,6+!C04,1/!V#bW! !  GP;!RSK'0,J8(!M,J8! !  RSK'049<68<E8(/D349!0,J8! 21 !"#$%&'!
  • 23. 28(E5D/'8( !  I8J?,J8(! !  ;+4!94@,D56!22L!@80T,09'(-!/E+434!V#W!E,D/4/!688!3DE+!D((4E4//,0)!60,XE! !  ZA4/6![,E4!,5-80'6+3!V#W!3,)!54,9!68!D(C,5,(E49!60,@YE!9'/60'CDJ8(!,(9!3,)! 049'/E8?40!K,6+/!3804!8w4(!'(!6+4!K04/4(E4!8@!@04UD4(6!68K858-'E,5!E+,(-4/! !  G,6+!/454EJ8(!/E+434/!E8(/'94049! !  L894!9'/O8'(6! !  ]'(1!9'/O8'(6! !  N4/'-(49!,!/E4(,0'8!,(9!3460'E/!@80!K40@803,(E4!4?,5D,J8(!! !  H'3D5,64!04,5!(46T801!4(?'08(34(6/! !  H4?40,5!K40@803,(E4!34,/D0434(6!3460'E/! 23 !"#$%&'!
  • 24. H4EJ8(!m (??%*.1G !"#$%&'!
  • 25. M4@404(E4/ !  V#W!x,E8C/8(%!yc%!H34e40/%!Nc_c%!;+80(68(%!xcNc%!G5,//%!Ic%!A0'--/%!Lc%!A0,)(,09%!Mc%!!L46T801'(-!L,349!28(64(6%!P(!28L4S6%! =iiv! !  V=W!L45,1D9'J%!Hc!,(9!*+,(-%!*c]c%!F(!/454EJ8(!8@!K,6+/!@80!3D5JK,6+!08DJ(-%!'(!zD,5'6)!8@!H40?'E4{Pgz8H%!=ii#%!KKc! #pi<<#nl! !  VbW!!I,8%!Hc%!AD/+3'6E+%!Nc%!L,0,),(,(%!Hc!,(9!G,(T,0%!HcHc%!!IM;Ga!:!3D5J<f8T!04,5< J34!60,(/K806!K0868E85!@80!,9!+8E!(46T801/%!'(!G08E449'(-/!8@!mn6+!PRRR!y4+'ED5,0!;4E+(858-)!28(@404(E4%!?85c!l%!FE68C40! =iib%!KKc!=o=v<=oblc! !  VlW!M8//'%!Nc%!M8//'('%!7c%!!2,E+'(-!K40@803,(E4!8@!28(64(6!E4(60'E!(46T801/!D(940!3D5J<K,6+!08DJ(-!",(9!3804$!c!;4E+('E,5! 04K806%!;454E83!G,0'/;4E+%!=i##c! !  VmW!7'55%!Gc%!:05'e%!]'%!Ic%!*c%!,(9!I,+,(J%!:c%!.8D;DC4!60,XE!E+,0,E640'Q,J8(a!,!?'4T!@083!6+4!49-4%!'(!:2I!PI2%!=iip%!KKc! #mh=n! !  VoW!2+,%!Ic%!_T,1%!Bc%!M890'-D4Q%!Gc%!:+(%!.c%!,(9!I88(%!Hc%!ZP!6DC4%!)8D!6DC4%!4?40)C89)!6DC4/a!,(,5)Q'(-!6+4!T8059k/!5,0-4/6! D/40!-4(40,649!E8(64(6!?'948!/)/643%!'(!:2I!PI2%!=iip%!KKc!#h#lc! !  VpW!2,08Y-5'8%!7c%!7,558%!Ic%!,(9!ID/E,0'4558%!]c%!ZA,(9T'96+!,(9!H680,-4!H+,0'(-!G40@803,(E4!'(!P(@803,J8(!24(60'E! L46T801'(-%!'(!:2I!HP72FII%!P2L!g801/+8K%!=i##%!KKc!#hoc! !  VnW!:0',(@,0%!Hc!,(9!L'1,(940%!Gc%!ZG,E146<54?45!2,E+'(-!@80!P(@803,J8(<E4(60'E!L46T801'(-%!'(!:2I!HP72FII%!M4:0E+! g801/+8K%!=i#ic! !  VvW!:C'54(4!L46T801%!+eKa^^TTTc'(640(46=c49D^KDC/^=iimi=<PH<:LcK9@! !  V#iW!7R:L;!6+4!K,(<RD08K4,(!04/4,0E+!,(9!49DE,J8(!(46T801%!+eKa^^TTTc-4,(6c(46^I49',|24(604^I49',|]'C0,0)^ GDC5'/+'(-P3,-4/^#inlj=i7R:L;j=i;8K858-)j=iI:Mj=i#=cK9@! !  V##W!HK0'(-%!Lc%!I,+,O,(%!Mc%!,(9!g46+40,55%!Nc%!ZI4,/D0'(-!PHG!68K858-'4/!T'6+!M8E14}D45%!'(!:2I!HP72FII%!=ii=! !  V#=W!I,8%!Hc!46!,5c%!ZID5JK,6+!y'948!;0,(/K806!8?40!:9!B8E!L46T801/%!g'0454//!2833D('E,J8(/%!PRRR%!?85c!#=%!(8c!l%!=iim%! KKc!l=hlvc! !  V#bW!]44%!Hcxc!,(9!7405,%!Ic%~HK5'6!3D5JK,6+!08DJ(-!T'6+!3,S'3,55)!9'/O8'(6!K,6+/!'(!,9!+8E!(46T801/%~!P22!=ii#%!KKc b=i#<b=imc 25 !"#$%&'!
  • 26. Thank you! Questions? 26 !"#$%&'!