SlideShare a Scribd company logo
1 of 24
Download to read offline
Presenter: Mostafa Rezazad
Supervisor: Profesor Y. C. Tay




           The third talk of CSTalk series
Please ask as many
questions as you can




              24 pages   2/14/2011   2
   Motivation
   Current Projects
   Introducing NDN
   Packet types and node structure
   Name Structure
   Routing
   Conclusion




                                 24 pages   2/14/2011   3
   Despite internets success, it is far from ideal.
   Why?

   Now services and data are not the first class
    internet objects (the first class is the place)
   Difficulties with mobility and multi homing
   Redundancy
   Security
   Middle Boxes problem (NATs, firewalls)


                                     24 pages   2/14/2011   4
   Resource sharing was the primary problem
    that networking aimed to solve during 60 and
    70s.
   The communication model is a conversation
    between exactly two machines.
   Almost all the traffic on the Internet consists
    of TCP conversations between pairs of hosts
   But what is the main goal of using network
    (Internet) todays? Accessing data or accessing
    machines!

                                   24 pages   2/14/2011   5
   Networks and consequently Internet were
    designed to accommodate communication
    between machines not applications and data.
    ◦ DNS and IP two global namespaces are very rigid
   When an application request a service or data
    it only cares about the content. However DNS
    based names for services force application to
    resolve service and data names down to IP
    address.



                                       24 pages   2/14/2011   6
   The increasing user demand for seamless
    communication on the move brings about
    new challenges that stress the current
    Internet, originally designed to support
    communications between fixed end-points.




                                24 pages   2/14/2011   7
   Increase performance via Redundancy
    elimination
    ◦ Mostly on application layer like web proxy caches
      Reduces the bandwidth usage of static content
    ◦ Attempt to eliminate redundancy bellow the APP
      layer
      They are not tied to a single application
      More redundant information can be removed




                                         24 pages   2/14/2011   8
   In order to have a secure communication we
    need to secure every part of the network,
    hosts, links, content and even clients.
   Many threats comes to picture when the
    container is the subject of security.




                                 24 pages   2/14/2011   9
   They are designed to remedy the situation
    but they increase the complication
   They are not generally part of the TCP/IP
    stack




                                  24 pages   2/14/2011   10
   There are four major funded projects each
    one worth up to $8 million over three years
    started from August 2010 (NSF site):
    ◦ Named Data Networking
      Principal Investigator: Lixia Zhang, UCLA
    ◦ Collaborating Institutions: Colorado State
      University, PARC, University of Arizona, University
      of Illinois/Urbana-Champaign, UC Irvine, University
      of Memphis, UC San Diego, Washington University,
      and Yale University




                                        24 pages   2/14/2011   11
   MobilityFirst
    Principal Investigator: Dipankar Raychaudhuri,
    Rutgers University/New Brunswick
    Collaborating Institutions: Duke University,
    Massachusetts Institute of Technology, University of
    Massachusetts/Amherst, University of
    Massachusetts/Lowell, University of Michigan,
    University of Nebraska/Lincoln, University of North
    Carolina/Chapel Hill

   The project focuses on the tradeoffs between
    mobility and scalability and on opportunistic use of
    network resources to achieve effective
    communications among mobile endpoints.



                                        24 pages   2/14/2011   12
   NEBULA
    Principal Investigator: Jonathan Smith, University of
    Pennsylvania
    Collaborating Institutions: Cornell University,
    Massachusetts Institute of Technology, Princeton
    University, Purdue University, Stanford University, Stevens
    Institute of Technology, University of California/Berkley,
    University of Delaware, University of Illinois/Urbana-
    Champaign, University of Texas, University of Washington

   The project focuses on developing new trustworthy data,
    control and core networking approaches to support the
    emerging cloud computing model of always-available
    network services. This project addresses the technical
    challenges in creating a cloud-computing-centric
    architecture.


                                            24 pages   2/14/2011   13
   eXpressive Internet Architecture
    Principal Investigator: Peter Steenkiste,
    Carnegie Mellon University
    Collaborating Institutions: Boston University,
    University of Wisconsin/Madison

   XIA enables flexible context-dependent
    mechanisms for establishing trust between
    the communicating principals, bridging the
    gap between human and intrinsically secure
    identifiers.


                                   24 pages   2/14/2011   14
   They claim that the unified way to solve these
    problems is to replace where (or who) with
    What.
   CCN or NDN has no notion of host at its
    lower level. A packet address names, not
    location.
   NDN protocol stack is quite similar as the
    TCP/IP except Network layer and some
    refinement on layer 2.
   One advantage of NDN is that it can be
    layered over anything, including IP itself.


                                   24 pages   2/14/2011   15
   Data satisfies an interest if the content name in the interest is a
    prefix of the content name in the data packet
                                         DATA

              Interest      Interest    DATA
                                        Interest
                                                         Interest




                 Interest                          DATA
                                                   Interest

                                           DATA
                                           Interest Interest



                                   DATA
                                   Interest        DATA
                                                   Interest

                                                      24 pages   2/14/2011   16
   A node has three data structure:
    ◦ FIB: Forwarding Information Base
      It has a list of out going faces. It forwards interest
       packets toward potential source(s)
    ◦ Content Store: buffer memory
      Something like caches
    ◦ PIT: Pending Interest Table
      Keeps track of upstream sending requests. Can be
       used to down stream data




                                             24 pages   2/14/2011   17
   When an Interest packets appears on some
    interface, a longest match lookup is done on
    its content name.
    ◦ first the content will be searched from content store
    ◦ then over PIT table
    ◦ And finally through the FIB table




                                         24 pages   2/14/2011   18
Interest1       Interest1      Interest1
                               DATA
                                                Interest1




 Interest1                             Interest1
                                       DATA

             PIT                 Interest1 (2)
        Interest1   1
                    1,2
                                   DATA



                          Interest1
                           DATA            DATA
                                           Interest1 (2)




                                             24 pages   2/14/2011   19
Interest1                                   Interest1
/NUS/mostafa    DATA
                                                                          /NUS/mostafa     DATA




                       FIB       Interest1               Interest1      FIB
        /NUS/mostafa         1                                /NUS/mostafa        2

                                             3   4
                                                              FIB
                                 Interest1           /NUS/mostafa        3,4




                                             Interest1



                                                                    24 pages   2/14/2011          20
   CCN name identify an information collection
    (not an information container)
   Name hierarchy indicates membership
   The same information can have many names
    (web like links)
   The hierarchical structure is used to do
    longest match lookups (similar to IP prefix
    lookups) which helps guarantee log(n) state
    scaling for globally accessible data.



                                 24 pages   2/14/2011   21
24 pages   2/14/2011   22
   Existing link-state routing protocols can be
    used, unmodified, to construct a CCN FIB




                                   24 pages   2/14/2011   23
   Redundancy elimination
   No mobility restriction
   More secure
   Directly accessing the services without
    knowing the place




                                   24 pages   2/14/2011   24

More Related Content

Viewers also liked

Viewers also liked (6)

Cardiac rehabitalization ppt
Cardiac rehabitalization pptCardiac rehabitalization ppt
Cardiac rehabitalization ppt
 
Cardiac rehabilitation past and present
Cardiac rehabilitation past and presentCardiac rehabilitation past and present
Cardiac rehabilitation past and present
 
Explore Android Internals
Explore Android InternalsExplore Android Internals
Explore Android Internals
 
Understanding the Dalvik Virtual Machine
Understanding the Dalvik Virtual MachineUnderstanding the Dalvik Virtual Machine
Understanding the Dalvik Virtual Machine
 
JVM Mechanics: When Does the JVM JIT & Deoptimize?
JVM Mechanics: When Does the JVM JIT & Deoptimize?JVM Mechanics: When Does the JVM JIT & Deoptimize?
JVM Mechanics: When Does the JVM JIT & Deoptimize?
 
ROAD SAFETY CRISIS IN AFRICA, SOUTH OF THE SAHARA
ROAD SAFETY CRISIS IN AFRICA, SOUTH OF THE SAHARAROAD SAFETY CRISIS IN AFRICA, SOUTH OF THE SAHARA
ROAD SAFETY CRISIS IN AFRICA, SOUTH OF THE SAHARA
 

Similar to CSTalks - Named Data Networks - 9 Feb

PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...AIRCC Publishing Corporation
 
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...ijcsit
 
Soren Auer - LOD2 - creating knowledge out of Interlinked Data
Soren Auer - LOD2 - creating knowledge out of Interlinked DataSoren Auer - LOD2 - creating knowledge out of Interlinked Data
Soren Auer - LOD2 - creating knowledge out of Interlinked DataOpen City Foundation
 
Open Data Conference - Sören Auer - Linked Open Data
Open Data Conference - Sören Auer - Linked Open DataOpen Data Conference - Sören Auer - Linked Open Data
Open Data Conference - Sören Auer - Linked Open DataOpening-up.eu
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
Information-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksInformation-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksTorsten Braun, Universität Bern
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks Nicola Cerami
 
Trans border data flow
Trans border data flowTrans border data flow
Trans border data flowSudeshnaDatta6
 
Sustainable operability: Keeping complex linguistic resources alive.
Sustainable operability: Keeping complex linguistic resources alive.Sustainable operability: Keeping complex linguistic resources alive.
Sustainable operability: Keeping complex linguistic resources alive.Menzo Windhouwer
 
The evolution of_internet_services
The evolution of_internet_servicesThe evolution of_internet_services
The evolution of_internet_servicesDigiblog16786
 
Publishing linked data from relational databases
Publishing linked data from relational databasesPublishing linked data from relational databases
Publishing linked data from relational databasesIván Ruiz-Rube
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networkingIJCNCJournal
 
The Data Platform Administration Handling the 100 PB.pdf
The Data Platform Administration Handling the 100 PB.pdfThe Data Platform Administration Handling the 100 PB.pdf
The Data Platform Administration Handling the 100 PB.pdfRakuten Group, Inc.
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) ijwmn
 
Linked Data Generation for the University Data From Legacy Database
Linked Data Generation for the University Data From Legacy Database  Linked Data Generation for the University Data From Legacy Database
Linked Data Generation for the University Data From Legacy Database dannyijwest
 

Similar to CSTalks - Named Data Networks - 9 Feb (20)

PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
 
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
 
IJCA
IJCAIJCA
IJCA
 
LOD2 - Creating Knowledge out of Interlinked Data - General Presentation
LOD2 - Creating Knowledge out of Interlinked Data - General PresentationLOD2 - Creating Knowledge out of Interlinked Data - General Presentation
LOD2 - Creating Knowledge out of Interlinked Data - General Presentation
 
Soren Auer - LOD2 - creating knowledge out of Interlinked Data
Soren Auer - LOD2 - creating knowledge out of Interlinked DataSoren Auer - LOD2 - creating knowledge out of Interlinked Data
Soren Auer - LOD2 - creating knowledge out of Interlinked Data
 
LOD2: State of Play WP1: Requirements, Design & LOD2 Stack Prototype
LOD2: State of Play WP1: Requirements, Design & LOD2 Stack PrototypeLOD2: State of Play WP1: Requirements, Design & LOD2 Stack Prototype
LOD2: State of Play WP1: Requirements, Design & LOD2 Stack Prototype
 
Open Data Conference - Sören Auer - Linked Open Data
Open Data Conference - Sören Auer - Linked Open DataOpen Data Conference - Sören Auer - Linked Open Data
Open Data Conference - Sören Auer - Linked Open Data
 
LOD2 General Presentation 2012
LOD2 General Presentation 2012LOD2 General Presentation 2012
LOD2 General Presentation 2012
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
Information-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksInformation-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile Networks
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Trans border data flow
Trans border data flowTrans border data flow
Trans border data flow
 
Sustainable operability: Keeping complex linguistic resources alive.
Sustainable operability: Keeping complex linguistic resources alive.Sustainable operability: Keeping complex linguistic resources alive.
Sustainable operability: Keeping complex linguistic resources alive.
 
The evolution of_internet_services
The evolution of_internet_servicesThe evolution of_internet_services
The evolution of_internet_services
 
Publishing linked data from relational databases
Publishing linked data from relational databasesPublishing linked data from relational databases
Publishing linked data from relational databases
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networking
 
The Data Platform Administration Handling the 100 PB.pdf
The Data Platform Administration Handling the 100 PB.pdfThe Data Platform Administration Handling the 100 PB.pdf
The Data Platform Administration Handling the 100 PB.pdf
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
Linked Data Generation for the University Data From Legacy Database
Linked Data Generation for the University Data From Legacy Database  Linked Data Generation for the University Data From Legacy Database
Linked Data Generation for the University Data From Legacy Database
 

More from cstalks

CSTalks-Natural Language Processing-2 Nov
CSTalks-Natural Language Processing-2 NovCSTalks-Natural Language Processing-2 Nov
CSTalks-Natural Language Processing-2 Novcstalks
 
CSTalks-Natural Language Processing-17Aug
CSTalks-Natural Language Processing-17AugCSTalks-Natural Language Processing-17Aug
CSTalks-Natural Language Processing-17Augcstalks
 
CSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
CSTalks-Sensor-Rich Mobile Video Indexing and Search-17AugCSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
CSTalks-Sensor-Rich Mobile Video Indexing and Search-17Augcstalks
 
CSTalks-Visualizing Software Behavior-14Sep
CSTalks-Visualizing Software Behavior-14SepCSTalks-Visualizing Software Behavior-14Sep
CSTalks-Visualizing Software Behavior-14Sepcstalks
 
CSTalks-Polymorphic heterogeneous multicore systems-17Aug
CSTalks-Polymorphic heterogeneous multicore systems-17AugCSTalks-Polymorphic heterogeneous multicore systems-17Aug
CSTalks-Polymorphic heterogeneous multicore systems-17Augcstalks
 
CSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 AugCSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 Augcstalks
 
CSTalks - Object detection and tracking - 25th May
CSTalks - Object detection and tracking - 25th MayCSTalks - Object detection and tracking - 25th May
CSTalks - Object detection and tracking - 25th Maycstalks
 
CSTalks - The Multicore Midlife Crisis - 30 Mar
CSTalks - The Multicore Midlife Crisis - 30 MarCSTalks - The Multicore Midlife Crisis - 30 Mar
CSTalks - The Multicore Midlife Crisis - 30 Marcstalks
 
CSTalks - On machine learning - 2 Mar
CSTalks - On machine learning - 2 MarCSTalks - On machine learning - 2 Mar
CSTalks - On machine learning - 2 Marcstalks
 
CSTalks - Real movie recommendation - 9 Mar
CSTalks - Real movie recommendation - 9 MarCSTalks - Real movie recommendation - 9 Mar
CSTalks - Real movie recommendation - 9 Marcstalks
 
CSTalks-LifeBeyondPhD-16Mar
CSTalks-LifeBeyondPhD-16MarCSTalks-LifeBeyondPhD-16Mar
CSTalks-LifeBeyondPhD-16Marcstalks
 
CSTalks - Music Information Retrieval - 23 Feb
CSTalks - Music Information Retrieval - 23 FebCSTalks - Music Information Retrieval - 23 Feb
CSTalks - Music Information Retrieval - 23 Febcstalks
 
CSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 FebCSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 Febcstalks
 
CSTalks - Model Checking - 26 Jan
CSTalks - Model Checking - 26 JanCSTalks - Model Checking - 26 Jan
CSTalks - Model Checking - 26 Jancstalks
 
CSTalks - GPGPU - 19 Jan
CSTalks  -  GPGPU - 19 JanCSTalks  -  GPGPU - 19 Jan
CSTalks - GPGPU - 19 Jancstalks
 

More from cstalks (15)

CSTalks-Natural Language Processing-2 Nov
CSTalks-Natural Language Processing-2 NovCSTalks-Natural Language Processing-2 Nov
CSTalks-Natural Language Processing-2 Nov
 
CSTalks-Natural Language Processing-17Aug
CSTalks-Natural Language Processing-17AugCSTalks-Natural Language Processing-17Aug
CSTalks-Natural Language Processing-17Aug
 
CSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
CSTalks-Sensor-Rich Mobile Video Indexing and Search-17AugCSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
CSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
 
CSTalks-Visualizing Software Behavior-14Sep
CSTalks-Visualizing Software Behavior-14SepCSTalks-Visualizing Software Behavior-14Sep
CSTalks-Visualizing Software Behavior-14Sep
 
CSTalks-Polymorphic heterogeneous multicore systems-17Aug
CSTalks-Polymorphic heterogeneous multicore systems-17AugCSTalks-Polymorphic heterogeneous multicore systems-17Aug
CSTalks-Polymorphic heterogeneous multicore systems-17Aug
 
CSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 AugCSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 Aug
 
CSTalks - Object detection and tracking - 25th May
CSTalks - Object detection and tracking - 25th MayCSTalks - Object detection and tracking - 25th May
CSTalks - Object detection and tracking - 25th May
 
CSTalks - The Multicore Midlife Crisis - 30 Mar
CSTalks - The Multicore Midlife Crisis - 30 MarCSTalks - The Multicore Midlife Crisis - 30 Mar
CSTalks - The Multicore Midlife Crisis - 30 Mar
 
CSTalks - On machine learning - 2 Mar
CSTalks - On machine learning - 2 MarCSTalks - On machine learning - 2 Mar
CSTalks - On machine learning - 2 Mar
 
CSTalks - Real movie recommendation - 9 Mar
CSTalks - Real movie recommendation - 9 MarCSTalks - Real movie recommendation - 9 Mar
CSTalks - Real movie recommendation - 9 Mar
 
CSTalks-LifeBeyondPhD-16Mar
CSTalks-LifeBeyondPhD-16MarCSTalks-LifeBeyondPhD-16Mar
CSTalks-LifeBeyondPhD-16Mar
 
CSTalks - Music Information Retrieval - 23 Feb
CSTalks - Music Information Retrieval - 23 FebCSTalks - Music Information Retrieval - 23 Feb
CSTalks - Music Information Retrieval - 23 Feb
 
CSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 FebCSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 Feb
 
CSTalks - Model Checking - 26 Jan
CSTalks - Model Checking - 26 JanCSTalks - Model Checking - 26 Jan
CSTalks - Model Checking - 26 Jan
 
CSTalks - GPGPU - 19 Jan
CSTalks  -  GPGPU - 19 JanCSTalks  -  GPGPU - 19 Jan
CSTalks - GPGPU - 19 Jan
 

CSTalks - Named Data Networks - 9 Feb

  • 1. Presenter: Mostafa Rezazad Supervisor: Profesor Y. C. Tay The third talk of CSTalk series
  • 2. Please ask as many questions as you can 24 pages 2/14/2011 2
  • 3. Motivation  Current Projects  Introducing NDN  Packet types and node structure  Name Structure  Routing  Conclusion 24 pages 2/14/2011 3
  • 4. Despite internets success, it is far from ideal.  Why?  Now services and data are not the first class internet objects (the first class is the place)  Difficulties with mobility and multi homing  Redundancy  Security  Middle Boxes problem (NATs, firewalls) 24 pages 2/14/2011 4
  • 5. Resource sharing was the primary problem that networking aimed to solve during 60 and 70s.  The communication model is a conversation between exactly two machines.  Almost all the traffic on the Internet consists of TCP conversations between pairs of hosts  But what is the main goal of using network (Internet) todays? Accessing data or accessing machines! 24 pages 2/14/2011 5
  • 6. Networks and consequently Internet were designed to accommodate communication between machines not applications and data. ◦ DNS and IP two global namespaces are very rigid  When an application request a service or data it only cares about the content. However DNS based names for services force application to resolve service and data names down to IP address. 24 pages 2/14/2011 6
  • 7. The increasing user demand for seamless communication on the move brings about new challenges that stress the current Internet, originally designed to support communications between fixed end-points. 24 pages 2/14/2011 7
  • 8. Increase performance via Redundancy elimination ◦ Mostly on application layer like web proxy caches  Reduces the bandwidth usage of static content ◦ Attempt to eliminate redundancy bellow the APP layer  They are not tied to a single application  More redundant information can be removed 24 pages 2/14/2011 8
  • 9. In order to have a secure communication we need to secure every part of the network, hosts, links, content and even clients.  Many threats comes to picture when the container is the subject of security. 24 pages 2/14/2011 9
  • 10. They are designed to remedy the situation but they increase the complication  They are not generally part of the TCP/IP stack 24 pages 2/14/2011 10
  • 11. There are four major funded projects each one worth up to $8 million over three years started from August 2010 (NSF site): ◦ Named Data Networking Principal Investigator: Lixia Zhang, UCLA ◦ Collaborating Institutions: Colorado State University, PARC, University of Arizona, University of Illinois/Urbana-Champaign, UC Irvine, University of Memphis, UC San Diego, Washington University, and Yale University 24 pages 2/14/2011 11
  • 12. MobilityFirst Principal Investigator: Dipankar Raychaudhuri, Rutgers University/New Brunswick Collaborating Institutions: Duke University, Massachusetts Institute of Technology, University of Massachusetts/Amherst, University of Massachusetts/Lowell, University of Michigan, University of Nebraska/Lincoln, University of North Carolina/Chapel Hill  The project focuses on the tradeoffs between mobility and scalability and on opportunistic use of network resources to achieve effective communications among mobile endpoints. 24 pages 2/14/2011 12
  • 13. NEBULA Principal Investigator: Jonathan Smith, University of Pennsylvania Collaborating Institutions: Cornell University, Massachusetts Institute of Technology, Princeton University, Purdue University, Stanford University, Stevens Institute of Technology, University of California/Berkley, University of Delaware, University of Illinois/Urbana- Champaign, University of Texas, University of Washington  The project focuses on developing new trustworthy data, control and core networking approaches to support the emerging cloud computing model of always-available network services. This project addresses the technical challenges in creating a cloud-computing-centric architecture. 24 pages 2/14/2011 13
  • 14. eXpressive Internet Architecture Principal Investigator: Peter Steenkiste, Carnegie Mellon University Collaborating Institutions: Boston University, University of Wisconsin/Madison  XIA enables flexible context-dependent mechanisms for establishing trust between the communicating principals, bridging the gap between human and intrinsically secure identifiers. 24 pages 2/14/2011 14
  • 15. They claim that the unified way to solve these problems is to replace where (or who) with What.  CCN or NDN has no notion of host at its lower level. A packet address names, not location.  NDN protocol stack is quite similar as the TCP/IP except Network layer and some refinement on layer 2.  One advantage of NDN is that it can be layered over anything, including IP itself. 24 pages 2/14/2011 15
  • 16. Data satisfies an interest if the content name in the interest is a prefix of the content name in the data packet DATA Interest Interest DATA Interest Interest Interest DATA Interest DATA Interest Interest DATA Interest DATA Interest 24 pages 2/14/2011 16
  • 17. A node has three data structure: ◦ FIB: Forwarding Information Base  It has a list of out going faces. It forwards interest packets toward potential source(s) ◦ Content Store: buffer memory  Something like caches ◦ PIT: Pending Interest Table  Keeps track of upstream sending requests. Can be used to down stream data 24 pages 2/14/2011 17
  • 18. When an Interest packets appears on some interface, a longest match lookup is done on its content name. ◦ first the content will be searched from content store ◦ then over PIT table ◦ And finally through the FIB table 24 pages 2/14/2011 18
  • 19. Interest1 Interest1 Interest1 DATA Interest1 Interest1 Interest1 DATA PIT Interest1 (2) Interest1 1 1,2 DATA Interest1 DATA DATA Interest1 (2) 24 pages 2/14/2011 19
  • 20. Interest1 Interest1 /NUS/mostafa DATA /NUS/mostafa DATA FIB Interest1 Interest1 FIB /NUS/mostafa 1 /NUS/mostafa 2 3 4 FIB Interest1 /NUS/mostafa 3,4 Interest1 24 pages 2/14/2011 20
  • 21. CCN name identify an information collection (not an information container)  Name hierarchy indicates membership  The same information can have many names (web like links)  The hierarchical structure is used to do longest match lookups (similar to IP prefix lookups) which helps guarantee log(n) state scaling for globally accessible data. 24 pages 2/14/2011 21
  • 22. 24 pages 2/14/2011 22
  • 23. Existing link-state routing protocols can be used, unmodified, to construct a CCN FIB 24 pages 2/14/2011 23
  • 24. Redundancy elimination  No mobility restriction  More secure  Directly accessing the services without knowing the place 24 pages 2/14/2011 24