SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Networking Named Content
Paper by: V. Jacobson et al.
Presented by : Haroon Rashid
1
Content Centric Networking
 No NAT traversal.
 Address space exhaustion.
 Average latency and total bandwidth is minimized.
 Networking in mobile scenarios is easy.
Content Centric Networking (CCN) removes the concept of
host identities (machine address) required for communication
and considers only named data packets. Some of its benefits:
2
Different Paradigms
IP Networking CCN Networking
Source: Lecture Notes on Internet 3
IP vs. CCN Network stack
IP Network Stack CCN Network Stack
4
CCN Packet Types
5
Forwarding Engine
6
Naming/Hierarchical Addressing
Query Traversal
Address Structure
7
Routing
 CCN Uses name prefixes instead of IP prefixes.
 Name prefixes are broadcasted via routing protocols.
 Conventional routing protocols like IS-IS and OSPF are
used in CCN by utilizing a general TLV(type label value)
scheme.
 Each node builds its FIB on receiving prefix.
8
Routing
Steps
1. Local map gets build up by
hello packets – adjacency
matrix.
2. Information of data
availability at a node gets
disseminated via Prefix
announcements (IGP-LSA).
 Prefix based longest
match lookups.
9
• CCN supports multicasting when more than one
announcer of data is found at a particular node while
as IP supports only uni-casting in such a case.
• For inter domain routing, BGP supports equivalent
of IGP TLV mechanism.
10
Security
• Security is build within data itself rather than
securing data channel.
• Digital signatures are used for authentication.
• Cryptographic encryption is used for private data
protection.
• Signature in each data packet is over the packet
name, the content, and on signed-info.
• Decryption keys are distributed along content as a
CCN data blocks – no need of trusted servers.
11
Network Security
• No tampering is possible due to digital signatures.
• Impossible to send the malicious content to a particular
machine as host identities are not revealed.
• Data-based distributed denial of service attacks not possible
as filtering of each data packet takes place at each
aggregation point towards content customer.
• For Interest flooding attack, attacker should be expert in
providing the different combinations of name components
of a prefix served by the target.
12
• CCN’s semantically selective control also
mitigates different attacks:
• Data packets follow same path as Interest – helps
intermediary routers to have fine grained control of Interests
forwarded under a certain prefix.
• Attacked domain can ask downstream routers to throttle
number of Interest packets for a certain prefix.
• Provides tools to organizations to control their
content travel.
• Policy based routing – requiring content name and signer.
• Interests can be digitally signed to enable the policy routing
by how often and into what namespaces a particular
consumer may query.
13
Evaluation
• More time to reach to
throughput asymptote in
CCN due to store and
forward stages.
• Un-optimized task level in
CCN vs. optimized kernel
level implementation in
TCP.
• CCN’s lower throughput due
to its encapsulation in
IP/UDP and its own headers.
• But remember CCN’s
implicit data security.
BULK DATA TRANSFER
14
Performance in secure & insecure
scenarios
• CCN over Jumbo-UDP is twice as efficient as HTTP and
three times more efficient than HTTPS in both overhead
and packets (sent).
15
Performance in data sharing scen.
• The performance penalty of using CCN vs. TCP is around
20% while the performance gain from sharing is integer
multiples, there is a net performance win from using CCN
even when sharing ratios / hit rates are low.
16
Architecture Difference
DONA
• Name given to packet is a
cryptographic hash of
publisher’s key and label.
• DNS type table required for
resolution of user familiar
name to digest based.
• Flat Namespace.
• Content must be first
registered with RHs.
CCN
• Name given is not a
cryptographic digest of
anything.
• User friendly, structured,
location independent
names.
• Hierarchical Namespace.
• Content generated
dynamically in response to
queries.
17
Concerns
• Names based on digest vs. user friendly,
structured names.
• Hierarchical namespace vs. flat namespace.
• Inter-domain routing feasibility.
• Caching level & replacement policy at the
intermediary routers.
• Does it depends on the ISP?
• Can we improve forward strategy?
18

Weitere ähnliche Inhalte

Was ist angesagt?

Content centric networks
Content centric networksContent centric networks
Content centric networksMeshingo Jack
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CSThanveen
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlowJoel W. King
 
Hadoop Security Today and Tomorrow
Hadoop Security Today and TomorrowHadoop Security Today and Tomorrow
Hadoop Security Today and TomorrowDataWorks Summit
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough? Zscaler
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual Vivek Kumar Sinha
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Ieee 802.11 standard
Ieee 802.11 standardIeee 802.11 standard
Ieee 802.11 standardtanvuth
 
Polyglot Processing - An Introduction 1.0
Polyglot Processing - An Introduction 1.0 Polyglot Processing - An Introduction 1.0
Polyglot Processing - An Introduction 1.0 Dr. Mohan K. Bavirisetty
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
What Is Hadoop | Hadoop Tutorial For Beginners | Edureka
What Is Hadoop | Hadoop Tutorial For Beginners | EdurekaWhat Is Hadoop | Hadoop Tutorial For Beginners | Edureka
What Is Hadoop | Hadoop Tutorial For Beginners | EdurekaEdureka!
 
Network Attack Counter
Network Attack CounterNetwork Attack Counter
Network Attack CounterKHNOG
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisAnton Chuvakin
 
Introduction to Data Modeling with Apache Cassandra
Introduction to Data Modeling with Apache CassandraIntroduction to Data Modeling with Apache Cassandra
Introduction to Data Modeling with Apache CassandraDataStax Academy
 

Was ist angesagt? (20)

Content centric networks
Content centric networksContent centric networks
Content centric networks
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Hadoop Security Today and Tomorrow
Hadoop Security Today and TomorrowHadoop Security Today and Tomorrow
Hadoop Security Today and Tomorrow
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Ieee 802.11 standard
Ieee 802.11 standardIeee 802.11 standard
Ieee 802.11 standard
 
Hadoop HDFS Concepts
Hadoop HDFS ConceptsHadoop HDFS Concepts
Hadoop HDFS Concepts
 
Polyglot Processing - An Introduction 1.0
Polyglot Processing - An Introduction 1.0 Polyglot Processing - An Introduction 1.0
Polyglot Processing - An Introduction 1.0
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Dask: Scaling Python
Dask: Scaling PythonDask: Scaling Python
Dask: Scaling Python
 
Ns2
Ns2Ns2
Ns2
 
What Is Hadoop | Hadoop Tutorial For Beginners | Edureka
What Is Hadoop | Hadoop Tutorial For Beginners | EdurekaWhat Is Hadoop | Hadoop Tutorial For Beginners | Edureka
What Is Hadoop | Hadoop Tutorial For Beginners | Edureka
 
Network Attack Counter
Network Attack CounterNetwork Attack Counter
Network Attack Counter
 
Intro to Pinot (2016-01-04)
Intro to Pinot (2016-01-04)Intro to Pinot (2016-01-04)
Intro to Pinot (2016-01-04)
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log Analysis
 
Introduction to Data Modeling with Apache Cassandra
Introduction to Data Modeling with Apache CassandraIntroduction to Data Modeling with Apache Cassandra
Introduction to Data Modeling with Apache Cassandra
 

Andere mochten auch

What is Content centric networking
What is Content centric networkingWhat is Content centric networking
What is Content centric networkingpraison
 
Content-Centric Networking: Security
Content-Centric Networking: SecurityContent-Centric Networking: Security
Content-Centric Networking: SecurityPARC, a Xerox company
 
Information Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityInformation Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityShi Junxiao
 
Content centric networking
Content centric networkingContent centric networking
Content centric networkingPhearin Sok
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryShi Junxiao
 
Smart Congestion Control for Delay- and Disruption Tolerant Networks
Smart Congestion Control for Delay- and Disruption Tolerant NetworksSmart Congestion Control for Delay- and Disruption Tolerant Networks
Smart Congestion Control for Delay- and Disruption Tolerant NetworksAloizio Silva
 
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...Gwendal Simon
 
Naming in content_oriented_architectures [repaired]
Naming in content_oriented_architectures [repaired]Naming in content_oriented_architectures [repaired]
Naming in content_oriented_architectures [repaired]haroonrashidlone
 
Linked data representation
Linked data representationLinked data representation
Linked data representationharoonrashidlone
 
Information-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issuesInformation-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issuesSAIL
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networksrapatil
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation HadoopVarun Narang
 

Andere mochten auch (18)

Named data networking
Named data networkingNamed data networking
Named data networking
 
What is Content centric networking
What is Content centric networkingWhat is Content centric networking
What is Content centric networking
 
Content-Centric Networking: Security
Content-Centric Networking: SecurityContent-Centric Networking: Security
Content-Centric Networking: Security
 
Information Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityInformation Centric Networking and Content Addressability
Information Centric Networking and Content Addressability
 
Content centric networking
Content centric networkingContent centric networking
Content centric networking
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN Repository
 
Smart Congestion Control for Delay- and Disruption Tolerant Networks
Smart Congestion Control for Delay- and Disruption Tolerant NetworksSmart Congestion Control for Delay- and Disruption Tolerant Networks
Smart Congestion Control for Delay- and Disruption Tolerant Networks
 
CCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFNCCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFN
 
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
 
Naming in content_oriented_architectures [repaired]
Naming in content_oriented_architectures [repaired]Naming in content_oriented_architectures [repaired]
Naming in content_oriented_architectures [repaired]
 
Routing papers in ccn
Routing papers in ccnRouting papers in ccn
Routing papers in ccn
 
Linked data representation
Linked data representationLinked data representation
Linked data representation
 
Information-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issuesInformation-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issues
 
Binary decision diagrams
Binary decision diagramsBinary decision diagrams
Binary decision diagrams
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
 
Time series Forecasting
Time series ForecastingTime series Forecasting
Time series Forecasting
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
 

Ähnlich wie Named data networking

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Security issues in content centric networks-review2
Security issues in content centric networks-review2Security issues in content centric networks-review2
Security issues in content centric networks-review2anushreerocks
 
Content centric networks
Content centric networksContent centric networks
Content centric networksMeshingo Jack
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Praveen Joshi
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptxkarthikvcyber
 
SDN and Named Data Networking Security
SDN and Named Data Networking SecuritySDN and Named Data Networking Security
SDN and Named Data Networking Securitywolverinetyagi
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Mumbai Academisc
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - PresentationLaili Aidi
 
Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxRahulBhole12
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Securityphanleson
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 

Ähnlich wie Named data networking (20)

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Security issues in content centric networks-review2
Security issues in content centric networks-review2Security issues in content centric networks-review2
Security issues in content centric networks-review2
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Content centric networks
Content centric networksContent centric networks
Content centric networks
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
SDN and Named Data Networking Security
SDN and Named Data Networking SecuritySDN and Named Data Networking Security
SDN and Named Data Networking Security
 
Transport layer
Transport layer Transport layer
Transport layer
 
lecture-2-tcp-ip.ppt
lecture-2-tcp-ip.pptlecture-2-tcp-ip.ppt
lecture-2-tcp-ip.ppt
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Network cost services
Network cost servicesNetwork cost services
Network cost services
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptx
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 

Kürzlich hochgeladen

Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentBharaniDharan195623
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 

Kürzlich hochgeladen (20)

Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 

Named data networking

  • 1. Networking Named Content Paper by: V. Jacobson et al. Presented by : Haroon Rashid 1
  • 2. Content Centric Networking  No NAT traversal.  Address space exhaustion.  Average latency and total bandwidth is minimized.  Networking in mobile scenarios is easy. Content Centric Networking (CCN) removes the concept of host identities (machine address) required for communication and considers only named data packets. Some of its benefits: 2
  • 3. Different Paradigms IP Networking CCN Networking Source: Lecture Notes on Internet 3
  • 4. IP vs. CCN Network stack IP Network Stack CCN Network Stack 4
  • 8. Routing  CCN Uses name prefixes instead of IP prefixes.  Name prefixes are broadcasted via routing protocols.  Conventional routing protocols like IS-IS and OSPF are used in CCN by utilizing a general TLV(type label value) scheme.  Each node builds its FIB on receiving prefix. 8
  • 9. Routing Steps 1. Local map gets build up by hello packets – adjacency matrix. 2. Information of data availability at a node gets disseminated via Prefix announcements (IGP-LSA).  Prefix based longest match lookups. 9
  • 10. • CCN supports multicasting when more than one announcer of data is found at a particular node while as IP supports only uni-casting in such a case. • For inter domain routing, BGP supports equivalent of IGP TLV mechanism. 10
  • 11. Security • Security is build within data itself rather than securing data channel. • Digital signatures are used for authentication. • Cryptographic encryption is used for private data protection. • Signature in each data packet is over the packet name, the content, and on signed-info. • Decryption keys are distributed along content as a CCN data blocks – no need of trusted servers. 11
  • 12. Network Security • No tampering is possible due to digital signatures. • Impossible to send the malicious content to a particular machine as host identities are not revealed. • Data-based distributed denial of service attacks not possible as filtering of each data packet takes place at each aggregation point towards content customer. • For Interest flooding attack, attacker should be expert in providing the different combinations of name components of a prefix served by the target. 12
  • 13. • CCN’s semantically selective control also mitigates different attacks: • Data packets follow same path as Interest – helps intermediary routers to have fine grained control of Interests forwarded under a certain prefix. • Attacked domain can ask downstream routers to throttle number of Interest packets for a certain prefix. • Provides tools to organizations to control their content travel. • Policy based routing – requiring content name and signer. • Interests can be digitally signed to enable the policy routing by how often and into what namespaces a particular consumer may query. 13
  • 14. Evaluation • More time to reach to throughput asymptote in CCN due to store and forward stages. • Un-optimized task level in CCN vs. optimized kernel level implementation in TCP. • CCN’s lower throughput due to its encapsulation in IP/UDP and its own headers. • But remember CCN’s implicit data security. BULK DATA TRANSFER 14
  • 15. Performance in secure & insecure scenarios • CCN over Jumbo-UDP is twice as efficient as HTTP and three times more efficient than HTTPS in both overhead and packets (sent). 15
  • 16. Performance in data sharing scen. • The performance penalty of using CCN vs. TCP is around 20% while the performance gain from sharing is integer multiples, there is a net performance win from using CCN even when sharing ratios / hit rates are low. 16
  • 17. Architecture Difference DONA • Name given to packet is a cryptographic hash of publisher’s key and label. • DNS type table required for resolution of user familiar name to digest based. • Flat Namespace. • Content must be first registered with RHs. CCN • Name given is not a cryptographic digest of anything. • User friendly, structured, location independent names. • Hierarchical Namespace. • Content generated dynamically in response to queries. 17
  • 18. Concerns • Names based on digest vs. user friendly, structured names. • Hierarchical namespace vs. flat namespace. • Inter-domain routing feasibility. • Caching level & replacement policy at the intermediary routers. • Does it depends on the ISP? • Can we improve forward strategy? 18