Content Centric Networking
|
|
- Emery Stephen Gilbert
- 6 years ago
- Views:
Transcription
1 Content Centric Networking Van Jacobson Palo Alto Research Center (PARC) IETF77 ISOC Internet Researchers meeting Anaheim, CA 24 March 2010
2 This talk describes ongoing PARC work on CCN (Content-centric Networking) by: Jim Thornton Diana Smetters Nick Briggs Michael Plass Rebecca Braynard Tim Diebert Elaine Shi Simon Barber Ignacio Solis Mark Mosko Philippe Golle and me
3 CCN offers... (provably) optimal content distribution painless mobility, wireless, virtualization,... same scalability & efficiency as TCP/IP simple, secure, robust configuration an easy, incremental, evolutionary path much better security
4 For 150 years communication has meant a conversation over a wire connecting two devices.
5 For 150 years communication has meant a conversation over a wire connecting two devices. For consumers, the Web forever changed that.
6 Circuit model requires a spanning tree Introduces global dependencies that remove local choice. Acts as a lens to magnify attacks. Makes load near source scale with popularity. 6
7 Today, wires and memories solve complimentary aspects of the same problem: wires move information in space memories move information in time We need a communications architecture that unifies both aspects.
8 What has to change? For sharing, packets must describe what you want, not the process of getting it. An address has to name data, not conversation endpoints. For asynchrony (time-shifting, intermittent connectivity, mobility,...) memory has to be explicit in the communication model. Have to stop pretending container-based security can work and start securing data. 8
9 the IP model FIB DST SRC src dst
10 FIB DST SRC src dst Intermediate nodes are invisible Intermediate nodes can t choose. Intermediate nodes can t measure success
11 Content store FIB Prefix Name Data Packets say what not who (no src or dst) communication is local entire net runs in flow balance memory damps large scale dynamics
12 Content store FIB Prefix Name Data topology is an optimization node gets fine-grained choice of upstream(s) upstream performance is measurable
13 Example: Content Distribution nytimes A B C D E F G H I J K client1 client2 client3
14 Example: Content Distribution nytimes A B C D E F G H I J K client1 client2 client3
15 Example: Content Distribution nytimes A B C D E F G H I J K client1 client2 client3
16 Example: Content Distribution nytimes A B C D E F G H I J K client1 client2 client3
17 Example: Content Distribution nytimes A B C D E F G H I J K client1 client2 client3
18 Example: Content Distribution nytimes A B C D E F G H I J K client1 client2 client3
19 Example: Content Distribution nytimes A B C D E F G H I J K client1 client2 client3
20 Example: Content Distribution nytimes A B C D E F G H I J K client1 client2 client3
21 Content goes only where there s interest. B nytimes A C It takes at most one trip across any link. D E F G Average latency is minimized. H I J K client1 client2 client3 Total bandwidth is minimized. There s no routing or control traffic associated with the replicas.
22 Name tree solves discovery problem nytimes.com web frontpage v v Newest nytimes: nytimes.com/web/frontpage <rightmost child> Newest that s more recent than mine: nytimes.com/web/frontpage/v <rightmost sibling> s0 s1 s2 Conventions: name tree child nodes are lexically ordered <next> assumed if no relationship specified
23 Name tree solves discovery problem nytimes.com web frontpage v v Newest nytimes: nytimes.com/web/frontpage <rightmost child> Newest that s more recent than mine: nytimes.com/web/frontpage/v <rightmost sibling> s0 s1 s2 Conventions: name tree child nodes are lexically ordered <next> assumed if no relationship specified
24 Internet security sucks This is our problem: Communication Information + Trust
25 Files, hosts and network connections are containers for information A secured perimeter is the only way to secure containers. For today s network use, any realistic perimeter encloses the planet.
26 Forget containers secure the content Do it as the final production step to minimize attack surface. Ron Rivest s SDSI has shown this can be done if any consumer can assess solely from the data: Integrity (is data intact and complete?) Relevance (what question does this answer?) Provenance (who asserts this is an answer?)
27 CCN data /nytimes.com/web/frontpage/v /s0/0x3fdc96a4... signature 0x1b key nytimes.com/web/george/desktop public key Signed by nytimes.com/web/george Signed by nytimes.com/web Signed by nytimes.com Note: Content networking has no key distribution problem since keys are content.
28 Evidentiary Trust Rich web of trustable, interconnected information arises from signed content: Content Content Content Key Key Key Key Content Content Content Content Key Key Key Key Key Key Attacks have to be consistent with information and links get exponentially harder as information base grows.
29 New Layering WWW phone... SMTP HTTP RTP... TCP UDP IP browser, chat,... File, Stream,... Security Content Chunks ethernet PPP Strategy CSMA async sonet... copper fiber radio... TCP, P2P, Brdcast... copper fiber radio... 24
30 Information on CCN is available at including a GPL d open-source release of our current research prototype.
31
32 Naming 27
33 Names and meaning Like IP, CCN imposes no semantics on names. Meaning comes from application, institution and global conventions reflected in prefix forwarding rules. For example, /parc.com/people/van/presentations/fiss09 might be the name of a presentation s data and /thisroom/projector the name of the projector it should display on. The former is a globally meaningful name leveraging the DNS global naming structure. The latter is local and context sensitive it refers to different objects depending on the room you re in. 28
34 Scaling 29
35 Names Route Interests FIB lookups are longest match (like IP prefix lookups) which helps guarantee log(n) state scaling for globally accessible data. Although CCN names are longer than IP identifiers, their explicit structure allows lookups as efficient as IP s. Since nothing can loop, state can be approximate (e.g., bloom filters). 30
36 But... this doesn t handle conversations or realtime. Yes it does - see ReArch VoCCN paper. this is just Google. This is IP-for-content. We don t search for data, we route to it. this will never scale. Hierarchically structured names give same log(n) scaling as IP but CCN tables can be much smaller since multi-source model allows inexact state (e.g., Bloom filter).
37 Strategy 32
38 Strategy layer (mobility management) If you don t care who you re talking to, you don t care if they change. If you ask for a few pieces at a time, it s ok if one gets delivered where you used to be. If you can use all your links simultaneously it s easy for the stack learn what s best. If all communication is flow balanced, you know exactly what s working and how well.
39 Performance-based interest re-expression IPC Alice IPC Bob
40 Performance-based interest re-expression IPC Alice IPC Bob
41 Basics 35
42 CCN packets interest Interest packet Content Name Selector (order preference, publisher filter, scope,...) Nonce data Data packet Content Name Signature (digest algorithm, witness,...) Signed Info (publisher ID, key locator, stale time,...) Data There are two CCN packet types: interest (a question) and data (an answer). Both are encoded in an efficient binary XML.
43 Internally, CCN names are opaque, structured byte strings /parc.com/van/cal/417.vcf/v3/s0/0x3fdc96a4... is represented as a component count then, for each component, a byte count followed by that many bytes: 7 8: parc.com 3: van 3: cal... 32: 3FDC96... The only assumption CCN makes about names is hierarchical structure. E.g., names or components can be encrypted or contain arbitrary binary data.
44 Basic CCN forwarding Consumer broadcasts an interest over any available communications media: want /parc.com/van/presentation.pdf Interest identifies a collection of data - all data items whose name has the interest as a prefix. Anything that hears the interest and has an element of the collection can respond with it: HereIs /parc.com/van/presentation.pdf/p1 <data> 38
45 Basic CCN transport Data that matches an interest consumes it. (network always operates in flow balance.) Interest must be re-expressed to get new data. (Controlling the re-expression allows for traffic management and environmental adaptation.) Multiple (distinct) interests in same collection may be expessed (similar to TCP window).
46 Node Model 40
47 CCN node model Name Content Store Data Face 0 /parc.com/videos/widgeta.mpg/v3/s0... Pending Interest Table (PIT) Prefix Requesting Face(s) Index ptr type C Face 1 /parc.com/videos/widgeta.mpg/v3/s1 0 P F FIB Prefix Face list C = Content store P = PIT F = FIB Face 2 Application /parc.com 0, 1
48 Comparison Transport FIB lookup Check & decr. TTL N Y Dst is me? Interface 0 Prefix FIB Interface Interface 1 Name Content Store Data Face 0 /parc.com/videos/widgeta.mpg/v3/s * 2 Interface 2 Pending Interest Table (PIT) Prefix Requesting Face(s) Index ptr type C Face 1 /parc.com/videos/widgeta.mpg/v3/s1 0 P F FIB Prefix Face list C = Content store P = PIT F = FIB Face 2 Application /parc.com 0, 1
49 IP node model Transport FIB lookup Check & decr. TTL N Y Dst is me? Interface 0 Prefix FIB Interface Interface 1 10.* 2 Interface 2
50 CCN node model Name Content Store /parc.com/videos/widgeta.mpg/v3/s0 Data Pending Interest Table (PIT) Prefix Face 0... get /parc.com/videos/ WidgetA.mpg/v3/s2 Requesting Face(s) Index ptr type C Face 1 /parc.com/videos/widgeta.mpg/v3/s1 0 /parc.com/videos/widgeta.mpg/v3/s2 0 P P F FIB Prefix Face list C = Content store P = PIT F = FIB Face 2 Application /parc.com 0, 1
Networking Named Content
Networking Named Content Van Jacobson Diana K. Smetters James D. Thorton Machael F. Plass Nicholas H. Briggs Rebecca L. Braynard Presented by: Vladislav Perelman Advanced Networking Seminar Jacobs University
More informationInformation Centric Networks and Named Data Networking
Information Centric Networks and Named Data Networking Dan Massey Colorado State University 1 NDN Project Team Van Jacobson: NDN Architect 2 The Evolution Toward Information Centric Networks 3 Evolution
More informationIntroduction to Internetworking
Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any
More informationNetworking Named Content: Content-Centric Networking. John Rula
Networking Named Content: Content-Centric Networking John Rula Overview Replacing traditional host based routing with named content routing Consumers request a data s name instead of a host (ip address)
More informationIntroduction to Information Centric Networking
Introduction to Information Centric Networking... with a Dash of Security Claudio Marxer Computer Networks Group University of Basel Switzerland Open Source IoT & Blockchain
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol
More informationLive Streaming with Content Centric Networking
2012 Third International Conference on Networking and Distributed Computing Live Streaming with Content Centric Networking Hongfeng Xu 2,3, Zhen Chen 1,3, Rui Chen 2,3, Junwei Cao 1,3 1 Research Institute
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationOn the Internet, nobody knows you re a dog.
On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing
More informationNetworking Named Content
Networking Named Content Paper 178 (12 pages) Van Jacobson D. K. Smetters James D. Thornton Michael Plass Nick Briggs Rebecca L. Braynard Palo Alto Research Center (PARC) {van,smetters,jthornton,plass,briggs,rbraynar}@parc.com
More informationSwitching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1
EE 586 Communication and Switching Networks (Fall 2010) Lecture 2 August 27, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 First homework is due 9/3 In Blackboard
More informationCS 43: Computer Networks The Network Layer. Kevin Webb Swarthmore College November 2, 2017
CS 43: Computer Networks The Network Layer Kevin Webb Swarthmore College November 2, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationNamed Data Networking (NDN) CLASS WEB SITE: NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing
CLASS WEB SITE: http://upmcsms.weebly.com/ Updated with Lecture Notes Named Data Networking (NDN) Introduction to NDN Named Data Networking (NDN) IP NDN Host-centric addressing Data-centric addressing
More informationNamed Data Networking
Named Data Networking Ronald van der Pol Outline! Goal of this project! Shortcomings of current internet! NDN basics! NDN forwarding! Naming example! Security! Personal opinion Goal of this
More informationINF3190 A critical look at the Internet / alternative network architectures. Michael Welzl
INF390 A critical look at the Internet / alternative network architectures Michael Welzl What s the problem? The Internet works! I work, too! Could be faster Could be safer Could be more reliable (Internet):
More informationECE 158A: Lecture 7. Fall 2015
ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers
More informationPart 1: Introduction. Goal: Review of how the Internet works Overview
Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example
More informationEfficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism
Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate
More informationInternet Architecture and Experimentation
Internet Architecture and Experimentation Today l Internet architecture l Principles l Experimentation A packet switched network Modern comm. networks are packet switched Data broken into packets, packet
More informationCS 678 Spring 2013 Network Architecture and Principles
CS 678 Spring 2013 Network Architecture and Principles The Design Philosophy of the DARPA Internet Protocols, Dave Clarke, 1988 Ihsan Ayyub Qazi Computer Science Department LUMS SBASSE Slides use info
More informationNetwork Architecture. TOC Architecture
Network Architecture Introduction Layering Example Internet Layers First Look Layering Step by Step Downside of Layering Interconnecting Networks The Internet TOC Architecture Introduction Issues: Inter-operability
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationLecture 1: Introduction
Int ernet w orking Lecture 1: Introduction The Internet, underlying link layer, and IP addressing Literature: Forouzan: TCP/IP Protocol Suite: Ch 1-5 The Internet today 250 million hosts 580 million users
More informationCS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.
CS 268: Internet Architecture & E2E Arguments Scott Shenker and Ion Stoica (Fall, 2010) 1 Today s Agenda Design goals Layering (review) End-to-end arguments (review) 2 1 Internet Design Goals Goals 0 Connect
More informationNAMED DATA NETWORKING EMPIRICAL SURVEY. Department of Computer Science and Engineering, Pondicherry University,Puducherry , India
Volume 115 No. 6 2017, 351-357 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu NAMED DATA NETWORKING EMPIRICAL SURVEY 1 Jinesh. P, 2 Lakshmipriya.K,
More informationExamination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS
Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered
More informationVideo Conferencing with Content Centric Networking
Video Conferencing with Content Centric Networking Kai Zhao 1,2, Xueqing Yang 1, Xinming Ma 2 1. Information Engineering College, North China University of Water Rescources and Electric Power,Zhengzhou,china
More informationCCN. CCNx 1.0 Changes from 0.x. Computer Science Laboratory Networking & Distributed Systems IETF 90 - July 2014
CCN CCNx 1.0 Changes from 0.x Computer Science Laboratory Networking & Distributed Systems Ignacio.Solis@parc.com IETF 90 - July 2014 CCNx 1.0 - changes from 0.x Static header, optional header, message
More informationNetworking Background
Networking Background CMSC 414 October 30, 2017 General Overview We are going to take a quick look at What a network protocol is The abstract design of the network The 7-Layer network stack Protocols We
More informationIntroduction to Networks
Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early
More informationNetwork Architecture
Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,
More informationCS November 2017
Distributed Systems 21. Delivery Networks () Paul Krzyzanowski Rutgers University Fall 2017 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash
More informationAnnouncements Computer Networking. What is the Objective of the Internet? Today s Lecture
Announcements 15-441 15-441 Computer ing 15-641 Lecture 2 Protocol Stacks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Sign up for piazza: https://piazza.com/cmu/fall2016/15441641 P1 will
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More informationComputer Networking. Introduction. Quintin jean-noël Grenoble university
Computer Networking Introduction Quintin jean-noël Jean-noel.quintin@imag.fr Grenoble university Based on the presentation of Duda http://duda.imag.fr 1 Course organization Introduction Network and architecture
More informationInternet Services & Protocols. An Introduction to the Internet
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols An Introduction to the Internet Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationData Communication & Computer Networks MCQ S
Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay
More informationIntroduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁
I Sören Schwertfeger 师泽仁 Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network
More informationDistributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018
Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance
More informationCS November 2018
Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance
More informationWord Found Meaning Innovation
AP CSP Quarter 1 Study Guide Vocabulary from Unit 1 & 3 Word Found Meaning Innovation A novel or improved idea, device, product, etc, or the development 1.1 thereof Binary 1.2 A way of representing information
More informationNetworks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009
Networks Distributed Systems Philipp Kupferschmied Universität Karlsruhe, System Architecture Group May 6th, 2009 Philipp Kupferschmied Networks 1/ 41 1 Communication Basics Introduction Layered Communication
More informationNetworking and Internetworking 1
Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements
More informationLecture 16: Network Layer Overview, Internet Protocol
Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationCS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018
CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing
More informationPerformance Study of CCNx
Performance Study of CCNx Haowei Yuan Networking Research Seminar 3/18/2013 My Topic for Today Industry participation in content centric networking Emerging networks consortium Our performance study of
More informationComputer Networks Principles
Computer Networks Principles Introduction Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Contents Introduction protocols and layered architecture encapsulation interconnection structures performance
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationIn practice that means at least 200,000,000 computers on the net! How many people use the Internet? As of November 2000:
Core World Wide Web Technologies: Ethernet, TCP/IP, DNS&Bind, HTTP Henry S. Thompson HCRC Language Technology Group Division of Informatics University of Edinburgh First, some terminology The Web is not
More informationPeer entities. Protocol Layering. Protocols. Example
Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationCOMP211 Chapter 4 Network Layer: The Data Plane
COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross
More informationMaster s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日
Graduate School of Fundamental Science and Engineering Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE Student ID 学籍番号 5114FG21-6 Name 氏名 THEINT THEINT MYO Supervisor 指導教員 Hidenori NAKAZATO 印
More informationQuestion Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100
NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning
More informationPEARL. Programmable Virtual Router Platform Enabling Future Internet Innovation
PEARL Programmable Virtual Router Platform Enabling Future Internet Innovation Hongtao Guan Ph.D., Assistant Professor Network Technology Research Center Institute of Computing Technology, Chinese Academy
More informationLecture (02) Network Protocols and Standards
Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components
More informationInternet Architecture. CPS 214 (Nick Feamster) January 14, 2008
Internet Architecture CPS 214 (Nick Feamster) January 14, 2008 Today s Reading Design Philosophy of the DARPA Internet Protocols. Dave Clark, 1988. Conceptual Lessons Design principles/priorities were
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene
More informationProtocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017
CSC 401 Data and Computer Communications Networks Protocol Layers, Security Sec:1.5-1.6 Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017 Outline Computer Networks and the Internet (Ch 1) 1.1
More informationEECS 122: Introduction to Communication Networks Final Exam Solutions
EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead
More informationE&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang
E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge
More informationOperating Systems CS 571
Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5
More informationVoCCN: Voice Over Content-Centric Networks
VoCCN: Voice Over Content-Centric Networks Van Jacobson D. K. Smetters Nick Briggs Michael Plass Paul Stewart James D. Thornton and Rebecca Braynard PARC 3333 Coyote Hill Road Palo Alto, CA, USA, 94304
More informationCS4700/CS5700 Fundaments of Computer Networks
CS4700/CS5700 Fundaments of Computer Networks Lecture 5: Internet architecture Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu
More informationICN Content Security Using Encrypted Manifest and Encrypted Content Chunks
ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks Dante Pacella dante@verizon.com Ashish Sardesai ashish.sardesai@verizon.com Mani Tadayon mani.tadayon@verizon.com Venkat Josyula
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationDistributed Systems. Why use distributed systems? What is a distributed system? Intro to Distributed Systems and Networks.
Intro to Distributed Systems and Networks Hank Levy Distributed Systems Nearly all systems today are distributed in some way, e.g.: they use email they access files over a network they access printers
More informationCourse on Computer Communication and Networks. Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420 Based on the book Computer Networking: A Top Down Approach,
More information19: Networking. Networking Hardware. Mark Handley
19: Networking Mark Handley Networking Hardware Lots of different hardware: Modem byte at a time, FDDI, SONET packet at a time ATM (including some DSL) 53-byte cell at a time Reality is that most networking
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationEC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane
EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:
More informationMedium Access Control
Medium Access Control Mark Handley UCL Computer Science CS 3035/GZ01 Context: OSI Layer 2, S&K Link Layer email WWW phone...! SMTP HTTP RTP...! TCP UDP!! IP!! ethernet PPP! CSMA async sonet...! copper
More informationTCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far
TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far the most common of them. TCP/IP can be compared to the
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile
More informationQuick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003
CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last
More informationNetwork Protocols and Architectures
Network Protocols and Architectures Introduction 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas
More information416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018
416 Distributed Systems Networks review; Day 1 of 2 Jan 5 + 8, 2018 1 Distributed Systems vs. Networks Low level (c/go) Run forever Support others Adversarial environment Distributed & concurrent Resources
More information1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks
Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.
More informationLocal Area Networks; Ethernet
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More information5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A
5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationCS 43: Computer Networks The Link Layer. Kevin Webb Swarthmore College November 28, 2017
CS 43: Computer Networks The Link Layer Kevin Webb Swarthmore College November 28, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network Layer
More informationInternet Routing. Review of Networking Principles. What s the Internet: nuts and bolts view. Communication links
Internet Routing Review of Networking Principles 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters
More informationInternet Routing. Review of Networking Principles
Internet Routing Review of Networking Principles 1 What s the Internet: nuts and bolts view Millions of connected computing devices: hosts, end-systems PC s workstations, servers PDA s, phones, toasters
More informationCS1302 / Computer Networks
CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?
More informationStateless ICN Forwarding with P4 towards Netronome NFP-based Implementation
Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Aytac Azgin, Ravishankar Ravindran, Guo-Qiang Wang aytac.azgin, ravi.ravindran, gq.wang@huawei.com Huawei Research Center, Santa
More informationCSE 123 Midterm Exam
CSE 23 Midterm Exam Fall 2 Name: Student ID: Be sure to read questions carefully and answer all parts. Use complete sentences and explain your answers. You should be able to answer the questions in a few
More informationFINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material
FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding
More informationThe Internet software layers
1 2 The Internet software layers SMTP, Telnet, FTP, POP3, IMAP TCP, UDP IP: RIP, BGP, OSPF Ethernet, Wireless LAN, Token Ring Twisted pair, coaxial, microwave, optical fiber 3 4 Ethernet 1973 Xerox s researcher
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to
More informationQuick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the
More informationSDN-based Network Obfuscation. Roland Meier PhD Student ETH Zürich
SDN-based Network Obfuscation Roland Meier PhD Student ETH Zürich This Talk This thesis vs. existing solutions Alice Bob source: Alice destination: Bob Hi Bob, Hi Bob, Payload encryption ǾǼōĦ
More information