Future Internet with Information Centric Networks
Future Internet with Information Centric
Networks
Arsitektur Jaringan Terkini
Motivation
Motivation Current Network
Motivation
- Networking was introduced for resource sharing – Named hosts
The Problem
ISP
ISP Communication Vs Distribution
Communication Distribution Naming Endpoints Content Security Secure Process Secure Content
Motivation
- Movement of content – Predicted global IP trafc in 2014: 64 exabytes/month (4 fold from 2009) (1) – Current solutions: P2P and CDNs – Global mobile trafc will double every year (mostly streaming content) – 180 exabytes of content created in 2006
(2) (2)
- Location orientation of content – Content associated with named hosts
- Sender orientation – Sender can send anywhere
- Securing content – TLS and SSL secures endpoints – Point-to-point model
Motivation
- Mobility and multi-homing – Device mobility is the norm
- – Mobility currently based on routing or indirection – Multiple attachments >Adaptation to disruptions – Challenged networks – sparse connectivity, high-speed mobility, disruptions
- Problems with network based caching – Security – DRM issues
- Architectures – Data Oriented Networking Architecture (DONA) – Sienna (Publish/Subscribe) – Content Centric Networking (CCN) – Network of Information (NetInf) – Publish Subscribe Internet Routing Paradigm (PSIRP)
- Operation Diferentiation – Security – Naming – Content existence knowledge – Caching – Routing
- – Producer-consumer meeting
- Packets say ‘what’ not ‘where’ (no src or dst)
- Forwarding decision is local ? a /b/c /e
- Use of 2 messages: Interest and Data Object (1) Van Jacobson, et al, Networking Named Content, CoNEXT 2009
- Each CCN entity has 3 main data structures – Content Store, Pending Interest Table, Forwarding Information Base • Uses multicast/broadcast
- Uses “longest prefx matching” lookup for content names Content Store Pending Interest Table (PIT) Forwarding Information Base (FIB) CCN Forwarding Engine Face 1 Wireless Wired Application Face 2 Face 3 CCN Forwarding Logic
- Purpose of messages – Interests request for content – Data serves these requests
- No fxed length felds and uses an XML encoding format ContentName Selector Nonce ContentName Signature Signature Information Interest Packet Data Data Packet
- Core of CCN uses content names for forwarding
- Applications can interpret names the way they want /uni-bremen.de/comnets/lecture/Kommunikationsnetze-I.pdf/v1/s0 User/Application Name Versioning & Segmentation
- Uses “longest prefx matching” • Implements policies such as LRU or LFU for content replacement
• Content do not necessarily have to be persistent (only cached)
... ... Name /uni-bremen.de/comnets/lecture/Kommunikationsnetze-I.pdf/v1/s0 ... ... ... Data Content Store - Uses “longest prefx matching”
- An entry may point to multiple faces
- Must time out and not held
- Uses “longest prefx matching”
- Similar to IP FIB
- Destination may have number of faces
- Three general approaches
- – Name Resolution Routing (NRR)
- – Content-based Routing (CBR)
- – Name-based routing (NBR)
- Two phases
- – Routing of NDO requests
- – Routing of NDO back to the requester
• Client asks for a data object sending interest packets
which are routed toward the publisher of the name
forwarding information base (FIB) of each node. prefx using longest-prefx matching in the- The FIB is built using routing protocols of the Internet.
• When a note receives multiple requests for the same
NDO, only the frst is forwarded to the source.- When a copy of the data object is encountered on the path, a data packet containing the requested and all nodes along the path cache a copy.
object is sent on the reverse path back to the client
• FI is encoded in a probabilistic data structure called a Bloom
the path of interest between the producer and consumers forward an NDO. flter that routers use for selecting interfaces on which to – Bloom flters encode source route-style forwarding information into – Routers do not need to keep forwarding state. Forwarding end addressing. packet headers, enabling forwarding without depending on end-to- • The use of Bloom flters result in a certain number of false allowing faster, smaller, and more energy-efcient switches. decisions are simple and forwarding tables are small, potentially interfaces where there are no receivers. positives; in this case this means forwarding on some Pub/Sub Routing using Link ID and FI zFilter: FI Bloom Filter- • Use a Name Resolution Service (NRS) that stores the Name Resolution Routing pointing to corresponding storage locations in the network.
- Three conceptual routing phases: – Routing the request message to the responsible NRS node where the object name is translated into one or multiple source – Routing the data from the source(s) to the requester. – Routing the request message to the source address(es)
- Name-content mapping verifcation via per- data packet signature
- – Data packet is authenticated with digital signature content namespaces w/ public keys
- Consumer ‘broadcasts’ an ‘interest’ over
any & all available communications media:
get ‘/rutgers/ECE544/Lecture06-14.pdf’ - Interest identifes a collection of data - all
• Anything that hears the interest and has an
element of the collection can respond with
that data: HereIs ‘/rutgers/ECE544/presentation.pdf/p1’ <data>- Data that matches an interest ‘consumes’ it.
- Interest must be re-expressed to get new data. (Controlling the re- expression allows for trafc management and environmental adaptation.)
- Multiple (distinct) interests in same collection may be expressed (similar
- Storage for caching NDOs is an integral part of the ICN service.
- All nodes potentially have caches;
requests for NDOs can be satisfed by
any node holding a copy in the cache.
- ICN combines caching at the network edge as in P2P and other overlay networks with in-network caching (e.g., transparent web caches)
- A Survey of Information-Centric Networking, B. Ahlgren, et. al. IEEE
Communications Magazine, July 2012
• Named Data Networking. IEEE CCW.
- Bloom Filters •
Known Architectures
Today
X dst src
Path determined by global routing, not local choice
Structural asymmetry precludes market mechanisms and
Producer Consumer ? a /b/c
NDN(Named Data Networking)
related to CCN approachProducer Consumer a/b/c/d Data a/b/c/d ? a /b/c
NDN(Named Data Networking)
related to CCN approach
NDN(Named Data Networking)
related to CCN approach
Producer Consumer a/b
We envision replacing this:
ISP
ISP
ISP
ISP With THIS: Content Centric Networks – Operation Data Interest Interests Table Check Pending Interests Table Check Pending Store Check Content Information Base Check Forwarding
Content Centric Networks – Stack
• Change of network abstraction from “named hosts” to
(1) • Security built-in: secures content and not the hosts “named content” • Can handle static as well as dynamic content • Mobility is present by designContent Centric Networks – Architecture
Content Centric Networks – Messages
Content Centric Networks – Names
Content Centric Networks - CS
Content Centric Networks – PIT Prefix ... Pending Faces ...
/uni-bremen.de/comnets/lecture/Kommunikationsnetze-I.pdf/v1/s1 ... ... 2 PIT
Content Centric Networks – FIB Prefix Forwarding Faces /uni-bremen.de/comnets ... 1, 2 ...
... ...
FIB
Content Centric Networks – Interest
Content Centric Networks – Data
Routing
Name-Based Routing
Content Centric Network (CCN)
Chart notes describe numbered steps
CCN packets
There are two CCN packet types:
interest (similar to http “get”) and data
(similar to http response). Both are encoded in an efcient binary XML.CCN node model
WidgetA.mpg/v3/s2 /parc.com/videos/ Get Publish-Subscribe Internet Routing Paradigm (PSIRP) Chart notes describe numbered steps
Content-based Publish-Subscribe Routing
Content-based Pub/Sub Routing Content-based Pub-Sub Routing
Forwarding on Bloomed link • The FI encodes the network links (rather than the nodes) on idsNetwork of Information
bindings from object names to topology-based locators
addresses
• All phases can potentially use diferent routing algorithms. – The second and third phases might use a topology-based routing – A name-based routing method might be used for the frst phase. – There are multiple alternatives to loosely or tightly integrate the phases in an ICN architecture. like IP. Summary of characteristics of the
ICN approaches Content-Based Security
ICN trust establishment by associating Basic ICN forwarding
data items whose name has the interest as a prefx.
Basic ICN transport
Caching
References
Oct 10, 2011. based on Van Jacobson