Introduction to Information Centric Networking

Size: px
Start display at page:

Download "Introduction to Information Centric Networking"

Transcription

1 Introduction to Information Centric Networking... with a Dash of Security Claudio Marxer <claudio.marxer@unibas.ch> Computer Networks Group University of Basel Switzerland Open Source IoT & Blockchain Hackathon, Berlin January 18,

2 Historic Perspective Past: Circuit-Centric Path s: You say how to contact... Present: Host-Centric Host/Location s: You say who to contact... Future: Information-Centric (?) Information/Content s: /the/content/name You say what you want to receive... 2

3 Outline ICN & Friends - Jungle of Abrevs (ICN, CCN, CICN, CCNx, NDN,... ) - Content Centric Networking Naming Scheme Packet Types Node Model Data Security in a Location-Agnostic World - Mindset: Content-Based Security - Some Mechanisms Access Control / Confidentiality Authenticity & Integrity 3

4 Through the Jungle of Abrevs Research Field & Architecture Paradigm: Information Centric Networking Network Service: lookup( <content-id> ) ICN Recent ICN Flavour: Content Centric Networking Naming Scheme, Packet Types, Node Model,... CCN CCN Derivates: Wire Formats, Running Code, NDN CICN CCNx 4

5 CCN Naming Scheme /this/name/has/five/components com / org this Hierarchical space Human-Readable... people ietf rfc wikipedia... name has Publisher owns a Domain (i.e. Prefix) - /org/ietf - /org/ietf/rfc 7945 five components 5

6 CCN Packet Types Content Object Interest Type: Content Object /org/ietf/rfc/7945 Payload 0x00 0x01 0x02 0x03 0x04... Type: Interest /org/ietf/rfc/7945 Meta-Info, Security... Meta-Info, Security... - Unique and unchangeable binding of a name and content - Container for a chunk of content - Location-independent and self-containing - Semantics: Sender expresses interest in receiving the named content object - Interface to the network: lookup(/some/content) 6

7 CCN Packet Types (2) 1 Type: Interest /org/ietf/rfc/7945 CCN Type: Content Object /org/ietf/rfc/7945 Payload 0x00 0x01 0x Communication pattern: pull-based, consumer-driven, flow-balanced. 7

8 CCN {Information, Data,,...} Centric World First-Class Citizens: -Payload-Signature Bundles Following: Internal Rules of this World 8

9 CCN Node Model (1) (or how the network satisfies an interest) A CCN relay maintains... Faces: Links to adacent nodes (e.g. via UDP, wifi, ethernet, bluetooth) Content Store (CS) Content object cache Forwarding Information Base (FIB) -prefix-based forwarding rules Pending Interest Table (PIT) Tracking interests from adjacent nodes Content Store Forwd Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/7945 9

10 CCN Node Model (2) (or how the network satisfies an interest) Incoming Interest Pipeline Forward Interest Interest Content Store Match? Matching PIT Entry? Matching Forwarding Rule? Content Object PIT Aggreg. Drop (NACK) Add to PIT Incoming FaceID 10

11 Example 1: Content Store Hit Type: Interest Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/

12 Example 1: Content Store Hit Type: Interest Internal State Incomming Interest Pipeline Content Store Match? Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/

13 Example 1: Content Store Hit Type: Interest Internal State Incomming Interest Pipeline Content Store Match? Satisfy interest from CS Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/

14 Example 1: Content Store Hit Type: Interest Internal State Incomming Interest Pipeline Content Store Match? Satisfy interest from CS Type: Content Object Payload 0x21 0xf6 0x93.. Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/

15 Example 2: PIT Aggregation Type: Interest /doc/blue Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/

16 Example 2: PIT Aggregation Type: Interest /doc/blue Incomming Interest Pipeline Content Store Match? Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/

17 Example 2: PIT Aggregation Type: Interest /doc/blue Incomming Interest Pipeline Content Store Match? Matching PIT Entry? Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/

18 Example 2: PIT Aggregation Type: Interest /doc/blue Incomming Interest Pipeline Content Store Match? Matching PIT Entry? PIT Aggregation Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/

19 Example 2: PIT Aggregation Type: Interest /doc/blue Incomming Interest Pipeline Content Store Match? Matching PIT Entry? PIT Aggregation Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/

20 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/

21 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Incomming Interest Pipeline Content Store Match? Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/

22 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Incomming Interest Pipeline Content Store Match? Matching PIT Entry? Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/

23 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Incomming Interest Pipeline Content Store Match? Matching PIT Entry? Matching Forwarding Rule? Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/

24 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Incomming Interest Pipeline Content Store Match? Matching PIT Entry? Matching Forwarding Rule? Foward Type: Interest /doc/purple Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 13

25 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Incomming Interest Pipeline Content Store Match? Matching PIT Entry? Matching Forwarding Rule? Foward Add PIT Entry Type: Interest /doc/purple Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 13

26 CCN Node Model (3) (or how the network satisfies an interest) Incoming Content Pipeline Content Object PIT Entry? Backward (+ erase PIT entry) Content Object Add to Content Store Drop drop 14

27 Example 4: Content Backwarding Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 15

28 Example 4: Content Backwarding Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Incomming Content Pipeline Existing PIT Entry? Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 15

29 Example 4: Content Backwarding Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Incomming Content Pipeline Existing PIT Entry? Add to Content Store Internal State Content Store /doc/purple Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 15

30 Example 4: Content Backwarding Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Incomming Content Pipeline Existing PIT Entry? Add to Content Store Backward according to PIT Internal State Content Store /doc/purple Forwarding Info Base /doc /org/ietf Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 15

31 Example 4: Content Backwarding Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Incomming Content Pipeline Existing PIT Entry? Add to Content Store Backward according to PIT Erase PIT Entry Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Internal State Content Store /doc/purple Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 15

32 CCN in Action.. 1 A bob 2 3 repository /doc/blue B alice charly repository 16

33 CCN in Action.. bob FIB /doc 1 FIB /doc 2 FIB /doc /doc/blue f4 3 A repository B alice charly repository 16

34 CCN in Action.. bob 1 PIT PIT,f4 f4 3 A repository 2 B alice charly repository 16

35 CCN in Action.. bob PIT 1 PIT 2 PIT Aggregation PIT,f4 f4 3 A repository B alice charly repository 16

36 CCN in Action.. bob PIT 1 PIT 2 PIT,f4 f4 3 A repository B alice charly repository 16

37 CCN in Action.. bob 1 2 f4 3 A repository B alice charly repository 16

38 CCN in Action.. bob 1 f4 3 A repository 2 B alice charly repository 16

39 CCN in Action.. bob 1 f4 3 A repository 2 Cache Hit B alice charly repository 16

40 CCN in Action.. bob /doc/blue 1 /doc/blue Longest-Prefix Forwarding FIB /doc /doc/blue f4 3 /doc/blue A repository 2 B alice charly repository 16

41 CCN in Action.. bob /doc/blue 1 /doc/blue f4 3 /doc/blue A repository 2 B alice charly repository 16

42 Wrap Your Mind: Security in a Channel-Less World Protection and trust [should] travel with the content itself rather than being a property of the connections over which it travels. (Smetters & Jacobson, 2009) Host-Centric World: Unsecured data travels through secured connections. Transport Layer Security (TLS) Information-Centric World: Secured data is delivered by an untrusted network. Content-Based Security 17

43 Content-Based Access-Control / Confidentiality CCN /the/content/name 1 Two-step approach: 2 Symmentrically Encrypted Content is symmetrically encrypted (Data Encryption Key, DEK) Authorized clients: DEKs are provided separately - Identification: Public Key 4 /the/key/<pubkey> Asymmetrically Encrypted DEK 3 5 Access DEK 6 Access Content 18

44 Authenticity/Integrity of Location-Independent Content Approach: Publisher attaches a digital signature to each content object. Signing-authority policy framework: Publisher can own domains in the namespace Owner exclusively holds signing authority in his domain Ownership of sub-domains can be granted Challenge: Assessing authority of signing keys. Type: Content Object /org/ietf/rfc/7945 Payload 0x00 0x01 0x02 0x03 0x04... Digital Signature 0xA1 0xB2 0xC3 0xD4 0xE5... Signing Key /org/ietf/rfc/signingkey 19

45 Authenticity/Integrity of Location-Independent Content Approach: Publisher attaches a digital signature to each content object. Signing-authority policy framework: / Publisher can own domains in the namespace Owner exclusively holds signing authority in his domain Ownership of sub-domains can be granted com... ietf org wikipedia this name Challenge: Assessing authority of signing keys. people rfc has components 19

46 Authenticity/Integrity: Signing Key Chain /org/signingkey Payload <public key> pre-shared /org/ietf/signingkey Payload <public key> Digital Signature 0xF2 0x43 0x4C 0x0B Signing Key /org/signingkey /org/ietf/rfc/signingkey Payload <public key> Digital Signature 0x1C 0x2B 0xFF 0x9D Signing Key /org/ietf/signingkey sign /org/ietf/rfc/7945.txt Payload 0x13 0xFC 0x79 0x45... Digital Signature 0xA1 0xB2 0xC3 0xD4 refer Signing Key /org/ietf/rfc/signingkey 20

47 Wrap-Up Information-Centric Networking (Paradigm): Data as the pivotal entity Content-Centric Networking (Architecture): - Network Service to Consumer: Pull-Based Content Retrieval (interest-based) - Network Service to Publisher: Scalable Content Distribution: Multicasting due to PIT Aggregation & Caching - Network State & Mechanics: CS (in-network caching), FIB (name-based forwarding), PIT (forwarding state); Interest & Content Object Pipelines Content-Based Security: Secure Content, not Connections. 21

48 Q & A

49 Further Reading Information-Centric Networking IRTF Research Group: ACM ICN Conference: Content-Centric Networking V. Jacobson et al., Networking d Content in International Conference on Emerging Networking Experiments and Technologies, d Data Networking Project: Community ICN (CICN) Project: CCN-Lite (Relay): PiCN (Toolbox): 23

Running IoT Applications over ICN: A Guided Journey to NDN, RIOT, CCN-lite and NFN

Running IoT Applications over ICN: A Guided Journey to NDN, RIOT, CCN-lite and NFN ACM ICN-2017 Tutorial 1 Running IoT Applications over ICN: A Guided Journey to NDN, RIOT, CCN-lite and NFN at the Freie Universität Berlin, Sep 26, 2017 Welcome and a gentle introduction to ICN Alex Afanasyev,

More information

Expires: February 21, Huawei & USTC G. Wang. Huawei Technologies. August 20, 2013

Expires: February 21, Huawei & USTC G. Wang. Huawei Technologies. August 20, 2013 ICN Research Group Internet-Draft Intended status: Informational Expires: February 21, 2014 X. Zhang R. Ravindran Huawei Technologies H. Xie Huawei & USTC G. Wang Huawei Technologies August 20, 2013 Abstract

More information

Access-Controlled In-Network Processing of Named Data

Access-Controlled In-Network Processing of Named Data Access-Controlled In-Network Processing of Named Data Claudio Marxer Christopher Scherb Christian Tschudin Computer

More information

Networking Named Content: Content-Centric Networking. John Rula

Networking Named Content: Content-Centric Networking. John Rula Networking Named Content: Content-Centric Networking John Rula Overview Replacing traditional host based routing with named content routing Consumers request a data s name instead of a host (ip address)

More information

Named Data Networking (NDN) CLASS WEB SITE: NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing

Named Data Networking (NDN) CLASS WEB SITE:   NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing CLASS WEB SITE: http://upmcsms.weebly.com/ Updated with Lecture Notes Named Data Networking (NDN) Introduction to NDN Named Data Networking (NDN) IP NDN Host-centric addressing Data-centric addressing

More information

Improved Content Addressability Through Relational Data Modeling and In-Network Processing Elements

Improved Content Addressability Through Relational Data Modeling and In-Network Processing Elements Improved Content Addressability Through Relational Data Modeling and In-Network Processing Elements Claudio Marxer Christian Tschudin Computer

More information

Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation

Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Aytac Azgin, Ravishankar Ravindran, Guo-Qiang Wang aytac.azgin, ravi.ravindran, gq.wang@huawei.com Huawei Research Center, Santa

More information

Named Data Networking

Named Data Networking Named Data Networking Ronald van der Pol Outline! Goal of this project! Shortcomings of current internet! NDN basics! NDN forwarding! Naming example! Security! Personal opinion Goal of this

More information

Network Names in Content-Centric Networking. CCN Names

Network Names in Content-Centric Networking. CCN Names Network Names in Content-Centric Networking ACM ICN 2016 1 CCN Names Expressed as URIs /a/b/foo /us/edu/uci/cs/tsudik/papers/acm-icn16.pdf Encoded as TLVs 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9

More information

ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks

ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks Dante Pacella dante@verizon.com Ashish Sardesai ashish.sardesai@verizon.com Mani Tadayon mani.tadayon@verizon.com Venkat Josyula

More information

Content Centric Networking

Content Centric Networking Content Centric Networking Van Jacobson Palo Alto Research Center (PARC) IETF77 ISOC Internet Researchers meeting Anaheim, CA 24 March 2010 This talk describes ongoing PARC work on CCN (Content-centric

More information

Support for Notifications in CCN ( draft-ravi-ccn-notification-00.txt ) IETF/ICN-RG -93, Prague

Support for Notifications in CCN ( draft-ravi-ccn-notification-00.txt ) IETF/ICN-RG -93, Prague Support for Notifications in CCN ( draft-ravi-ccn-notification-00.txt ) IETF/ICN-RG -93, Prague Ravi Ravindran (ravi.ravindran@huawei.com) Asit Chakraborti(asit.chakraborti@huawei.com) Marc Mosko(marc.mosko@parc.com)

More information

Application aware access and distribution of digital objects using Named Data Networking (NDN)

Application aware access and distribution of digital objects using Named Data Networking (NDN) Application aware access and distribution of digital objects using Named Data Networking (NDN) July 4, 2017 Rahaf Mousa Supervisor: dr.zhiming Zhao University of Amsterdam System and Network Engineering

More information

CCN. CCNx 1.0 Changes from 0.x. Computer Science Laboratory Networking & Distributed Systems IETF 90 - July 2014

CCN. CCNx 1.0 Changes from 0.x. Computer Science Laboratory Networking & Distributed Systems IETF 90 - July 2014 CCN CCNx 1.0 Changes from 0.x Computer Science Laboratory Networking & Distributed Systems Ignacio.Solis@parc.com IETF 90 - July 2014 CCNx 1.0 - changes from 0.x Static header, optional header, message

More information

Performance Study of CCNx

Performance Study of CCNx Performance Study of CCNx Haowei Yuan Networking Research Seminar 3/18/2013 My Topic for Today Industry participation in content centric networking Emerging networks consortium Our performance study of

More information

CCN & Network Coding. Cedric Westphal Huawei and UCSC

CCN & Network Coding. Cedric Westphal Huawei and UCSC CCN & Network Coding Cedric Westphal Huawei and UCSC ICN & Network Coding - RFC7933 9.5. Network Coding for Video Distribution in ICN An interesting research area for combining heterogeneous sources is

More information

Publish Subscribe Deployment Option for NDN in the Constrained IoT

Publish Subscribe Deployment Option for NDN in the Constrained IoT Publish Subscribe Deployment Option for NDN in the Constrained IoT draft-gundogan-icnrg-pub-iot-02 Cenk Gündoğan 1 Thomas Schmidt 1 Matthias Wählisch 2 1 HAW Hamburg 2 Freie Universität Berlin March 18,

More information

A consumer-driven access control approach to censorship circumvention in content-centric networking

A consumer-driven access control approach to censorship circumvention in content-centric networking A consumer-driven access control approach to censorship circumvention in content-centric networking Jun Kurihara, Kenji Yokota and Atsushi Tagami KDDI R&D Laboratories, Inc. ACM ICN 2016 Kyoto, Japan,

More information

OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN

OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN Alberto Compagno 1,3, Mauro Conti 2 and Ralph Droms 3 1 Sapienza University of Rome 2 University of Padua 3 Cisco Systems 3rd ACM Conference

More information

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016)

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) ICN IDENTIFIER / LOCATOR Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) 1 A brief review of ID/Locators in IETF It s long, and we ll skim over it Then we discuss the CCNx & NDN

More information

Video Conferencing with Content Centric Networking

Video Conferencing with Content Centric Networking Video Conferencing with Content Centric Networking Kai Zhao 1,2, Xueqing Yang 1, Xinming Ma 2 1. Information Engineering College, North China University of Water Rescources and Electric Power,Zhengzhou,china

More information

Publisher Mobility Support in Content Centric Networks

Publisher Mobility Support in Content Centric Networks ICOIN 2014@Phuket Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi (mylee@mmlab.snu.ac.kr) Seoul National University 2014.02.11

More information

Networking Named Content

Networking Named Content Networking Named Content Van Jacobson Diana K. Smetters James D. Thorton Machael F. Plass Nicholas H. Briggs Rebecca L. Braynard Presented by: Vladislav Perelman Advanced Networking Seminar Jacobs University

More information

Named Data Networking for 5G Wireless

Named Data Networking for 5G Wireless Named Data Networking for 5G Wireless Edmund Yeh Electrical and Computer Engineering Northeastern University New York University January 27, 2017 Overview NDN: a major information-centric networking architecture

More information

Session Support for SCN

Session Support for SCN Session Support for SCN Mikael Gasparyan, Guillaume Corsini, Torsten Braun, Eryk Schiller, Jonnahtan Saltarin Institute of Computer Science University of Bern Bern, Switzerland {gasparyan,braun,schiller,saltarin}@inf.unibe.ch,

More information

Hybrid Information-Centric Networking

Hybrid Information-Centric Networking Hybrid Information-Centric Networking ICN inside the Internet Protocol Luca Muscariello, Principal Engineer Giovanna Carofiglio, Distinguished Engineer Jordan Augé, Michele Papalini, Mauro Sardara, Alberto

More information

In-Network Live Stream Processing with Named Functions

In-Network Live Stream Processing with Named Functions In-Network Live Stream Processing with Named Functions Christopher Scherb christopher.scherb@unibas.ch Urs Schnurrenberger urs.schnurrenberger@unibas.ch Claudio Marxer claudio.marxer@unibas.ch Christian

More information

Follow Me Cloud and Virtualization of (Multimedia) Services and Applications: Challenges and Possible Solutions

Follow Me Cloud and Virtualization of (Multimedia) Services and Applications: Challenges and Possible Solutions Follow Me Cloud and Virtualization of (Multimedia) Services and Applications: Challenges and Possible Solutions André Gomes (1), Torsten Braun (1), Georgios Karagiannis (2), Morteza Karimzadeh (2), Marco

More information

A Light-Weight Forwarding Plane for Content-Centric Networks

A Light-Weight Forwarding Plane for Content-Centric Networks A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,

More information

(h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages

(h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages (h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages Mauro Sardara, Luca Muscariello, Alberto Compagno Software Engineer ICNRG Interim Meeting, London, 18 th of March

More information

Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日

Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日 Graduate School of Fundamental Science and Engineering Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE Student ID 学籍番号 5114FG21-6 Name 氏名 THEINT THEINT MYO Supervisor 指導教員 Hidenori NAKAZATO 印

More information

IoT Information Centric Networking

IoT Information Centric Networking IoT Information Centric Networking Cédric Adjih, Inria Saclay, France. Workshop IoT Tnisia 2018 - Tnis, Tnisia, 26 Apr. 2018 Otline What is Information Centric Networking (ICN)? General, View of NDN semantics

More information

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate

More information

Enabling Network Identifier (NI) in Information Centric Networks to Support Optimized Forwarding

Enabling Network Identifier (NI) in Information Centric Networks to Support Optimized Forwarding Enabling Network Identifier (NI) in Information Centric Networks to Support Optimized Forwarding IETF/IRTF/ICNRG, 97 (draft-azgin-icnrg-ni-00.txt) Authors: Aytac Azgin, Ravi Ravindran (aytac.azgin@huawei.com,

More information

Naming in Content-Oriented Architectures

Naming in Content-Oriented Architectures Naming in Content-Oriented Architectures 1 Data publishing RWI select produce own Data Name certify Key 2 Basic bindings The ICN paper argued that RWI, Name, and Key should be bound together RWI If not,

More information

Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network

Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network J. J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 1 1 Computer Engineering Department, University of California,

More information

SMART CONNECTION TO SMART HOME VENTO

SMART CONNECTION TO SMART HOME VENTO SMART CONNECTION TO SMART HOME VENTO Expert A50- W VENTO Expert Duo A30- W EN OPERATION MANUAL VENTO Expert www.blaubergventilatoren.de CONTENTS Purpose...2 Network parameters...3 Control commands...3

More information

A Cluster-based Scalable Router for Information Centric Networks

A Cluster-based Scalable Router for Information Centric Networks A Cluster-based Scalable Router for Information Centric Networks Andrea Detti, Lorenzo Bracciale, Pierpaolo Loreti, Giulio Rossi, Nicola Blefari Melazzi Electronic Engineering Dept. University of Rome

More information

arxiv: v1 [cs.ni] 20 Apr 2017

arxiv: v1 [cs.ni] 20 Apr 2017 ADN: An Information-Centric Networking Architecture for the Internet of Things University of California at Santa Cruz Computer Engineering Department Santa Cruz, CA 95064 jj@soe.ucsc.edu arxiv:1704.06346v1

More information

A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms

A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms Ngo Quang Minh, Ryo Yamamoto, Satoshi Ohzahata, and Toshihiko Kato University of Electro-Communications

More information

Decoupling Information and Connectivity via Information-Centric Transport

Decoupling Information and Connectivity via Information-Centric Transport Washington University in St. Louis Washington University Open Scholarship Computer Science and Engineering Publications and Presentations School of Engineering Publications and Presentations 8-31-2018

More information

A Fault-Tolerant Forwarding Strategy for Interest-based Information Centric Networks

A Fault-Tolerant Forwarding Strategy for Interest-based Information Centric Networks A Fault-Tolerant Forwarding Strategy for Interest-based Information Centric Networks J.J. Garcia-Luna-Aceves Palo Alto Research Center, Palo Alto, CA 94304 Department of Computer Engineering, University

More information

Lecture 12 Page 1. Lecture 12 Page 3

Lecture 12 Page 1. Lecture 12 Page 3 IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

CSE 461 Midterm Winter 2018

CSE 461 Midterm Winter 2018 CSE 461 Midterm Winter 2018 Your Name: UW Net ID: General Information This is a closed book/laptop examination. You have 50 minutes to answer as many questions as possible. The number in parentheses at

More information

Fall 2010/Lecture 32 1

Fall 2010/Lecture 32 1 CS 426 (Fall 2010) Key Distribution & Agreement Fall 2010/Lecture 32 1 Outline Key agreement without t using public keys Distribution of public keys, with public key certificates Diffie-Hellman Protocol

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Fast Forwarding for NDN

Fast Forwarding for NDN Fast Forwarding for NDN Won So Ashok Narayanan Mark Stapp mjs@cisco.com Cisco Systems IETF ICNRG, 31/7/2013, Berlin CCN/NDN in Two Slides (1) Network forwards and caches named data 'objects'; no host addresses

More information

OpenFlow-based control plane for Information-Centric Networking

OpenFlow-based control plane for Information-Centric Networking OF-ICN: OpenFlow-based control plane for Information-Centric Networking by Rajendran Jeeva, B E Dissertation Presented to the University of Dublin, Trinity College in fulfillment of the requirements for

More information

Information Centric Networks and Named Data Networking

Information Centric Networks and Named Data Networking Information Centric Networks and Named Data Networking Dan Massey Colorado State University 1 NDN Project Team Van Jacobson: NDN Architect 2 The Evolution Toward Information Centric Networks 3 Evolution

More information

CCNinfo: Discovering Content and Netw ork Information in Content-Centric Netwo rks

CCNinfo: Discovering Content and Netw ork Information in Content-Centric Netwo rks CCNinfo: Discovering Content and Netw ork Information in Content-Centric Netwo rks draft-irtf-icnrg-ccninfo-00 Hitoshi Asaeda (NICT) Xun Shao (KIT) 1 History Initial proposal: Contrace Contrace: Traceroute

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

Secure Off-Path Replication in Content-Centric Networks

Secure Off-Path Replication in Content-Centric Networks Secure Off-Path tion in Content-Centric Networks Marc Mosko and Christopher A. Wood Computer Science Laboratory, Palo Alto Research Center Email: mmosko@parc.com, woodc1@uci.edu Abstract We present SCR,

More information

A Brief History of a Future Internet: the Named Data Networking Architecture

A Brief History of a Future Internet: the Named Data Networking Architecture A Brief History of a Future Internet: the Named Data Networking Architecture kc claffy (w slides borrowed from NDN team) www.caida.org Center for Applied Internet Data Analysis University of California,

More information

Modeling multipath forwarding strategies in Information Centric Networks

Modeling multipath forwarding strategies in Information Centric Networks Modeling multipath forwarding strategies in Information Centric Networks Andrea Detti, Claudio Pisa, Nicola Blefari Melazzi CNIT, University of Rome Tor Vergata, Italy. andrea.detti@uniroma2.it, claudio.pisa@uniroma2.it,

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00)

A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00) A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00) IETF 93 / July 2015 Paul E. Jones Nermeen Ismail David Benham Cisco Agenda Security

More information

Oi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0)

Oi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0) Oi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0) Technical Report COPE-SITI-TR-18-03 January 31 st, 2018 Editor Omar Aponte (COPELABS/ULHT) Authors Omar Aponte (COPELABS/ULHT)

More information

draft-moiseenko-icnrg-flowclass

draft-moiseenko-icnrg-flowclass draft-moiseenko-icnrg-flowclass Dave Oran daveoran@orandom.net Ilya Moiseenko ilmoisee@cisco.com Note: Cisco IPR on this draft Differentiated Services for ICN Problem statement: How do we support multiple

More information

Information Centric Networking to Support Disaster Management

Information Centric Networking to Support Disaster Management Information Centric Networking to Support Disaster Management K. K. Ramakrishnan WinLab, Rutgers University, NJ (thanks to all the partners of the GreenICN EU-Japan project) Content Centric Networks Use

More information

TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks

TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks Jaebeom Kim, Daewook Shin, and Young-Bae Ko Department of Computer Engineering, Graduate School of Ajou University Suwon, Republic

More information

Live Streaming with Content Centric Networking

Live Streaming with Content Centric Networking 2012 Third International Conference on Networking and Distributed Computing Live Streaming with Content Centric Networking Hongfeng Xu 2,3, Zhen Chen 1,3, Rui Chen 2,3, Junwei Cao 1,3 1 Research Institute

More information

Chapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees

Chapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees Chapter 4 roadmap 4. Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What s Inside a Router 4.4 The Internet (IP) Protocol 4.5 Routing Algorithms 4.6 Routing in the Internet 4.7

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

Performance Evaluation of CCN

Performance Evaluation of CCN Performance Evaluation of CCN September 13, 2012 Donghyun Jang, Munyoung Lee, Eunsang Cho, Ted Taekyoung Kwon (Seoul National University), Byoung-Joon Lee, Myeong-Wuk Jang, Sang-Jun Moon (Samsung Electronics),

More information

Controlling Strategy Retransmissions in Named Data Networking

Controlling Strategy Retransmissions in Named Data Networking 2017 ACM/IEEE Symposium on Architectures for Networking and Communications Controlling Strategy Retransmissions in Named Data Networking Hila Ben Abraham & Patrick Crowley Washington University in Saint

More information

Hop-count Based Forwarding for Seamless Producer Mobility in NDN

Hop-count Based Forwarding for Seamless Producer Mobility in NDN Hop-count Based Forwarding for Seamless Producer Mobility in NDN Vignesh Sivaraman and Biplab Sikdar Department of Electrical and Computer Engineering National University of Singapore, Singapore Abstract

More information

Server-based Certificate Validation Protocol

Server-based Certificate Validation Protocol Server-based Certificate Validation Protocol Digital Certificate and PKI a public-key certificate is a digital certificate that binds a system entity's identity to a public key value, and possibly to additional

More information

Named Data Networking Enabled WiFi in Challenged Communication Environments

Named Data Networking Enabled WiFi in Challenged Communication Environments Named Data Networking Enabled WiFi in Challenged Communication Environments 1 Anthony Guardado, 1 Zilong Ye, 1 Huiping Guo 2 Lei Liu, 2 Liguang Xie, 2 Akira Ito 1 California State University, Los Angeles

More information

CS 43: Computer Networks The Network Layer. Kevin Webb Swarthmore College November 2, 2017

CS 43: Computer Networks The Network Layer. Kevin Webb Swarthmore College November 2, 2017 CS 43: Computer Networks The Network Layer Kevin Webb Swarthmore College November 2, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network

More information

Sharing mhealth Data via Named Data Networking

Sharing mhealth Data via Named Data Networking Sharing mhealth Data via Named Data Networking Haitao Zhang zhtaoxiang@gmail.com Claudio Marxer University of Basel claudio.marxer@unibas.ch Zhehao Wang zhehao@remap.ucla.edu Jeff Burke jburke@remap.ucla.edu

More information

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved.  Worldwide Education Services Junos Security Chapter 8: IPsec VPNs 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will

More information

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017 Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware

More information

ICAN: Information-Centric Context-Aware Ad-Hoc Network

ICAN: Information-Centric Context-Aware Ad-Hoc Network ICAN: Information-Centric Context-Aware Ad-Hoc Network Yu-Ting Yu, Chris Tandiono, Xiao Li, You Lu, M.Y. Sanadidi, and Mario Gerla University of California Los Angeles, CA 90095, USA {yutingyu, cbtandiono,

More information

Internet Research Task Force (IRTF) Request for Comments: 7927 Category: Informational

Internet Research Task Force (IRTF) Request for Comments: 7927 Category: Informational Internet Research Task Force (IRTF) Request for Comments: 7927 Category: Informational ISSN: 2070-1721 D. Kutscher, Ed. NEC S. Eum Osaka University K. Pentikousis Travelping I. Psaras UCL D. Corujo Universidade

More information

Creating A Secure, Integrated Home Network of Things with Named Data Networking

Creating A Secure, Integrated Home Network of Things with Named Data Networking NDN, Technical Report NDN-0035, 2015. http://named-data.net/techreports.html Revision 1: November 19, 2015 Creating A Secure, Integrated Home Network of Things with Named Data Networking Adeola Bannis

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet

More information

Design and Implementation of a Conversion Service for Content Centric Networking

Design and Implementation of a Conversion Service for Content Centric Networking Design and Implementation of a Conversion Service for Content Centric Networking Master Thesis by Elham Cheriki under the guidance of Prof. T. Braun and Prof. L. Mueller Department of Electrical Engineering

More information

CS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following:

CS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following: CS 470 Spring 2017 Mike Lam, Professor Distributed Web and File Systems Content taken from the following: "Distributed Systems: Principles and Paradigms" by Andrew S. Tanenbaum and Maarten Van Steen (Chapters

More information

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science The Tor Network Cryptography 2, Part 2, Lecture 6 Ruben Niederhagen June 16th, 2014 Tor Network Introduction 2/33 Classic goals of cryptography: confidentiality, data integrity, authentication, and non-repudiation.

More information

Internet 3.0: The Next Generation Internet

Internet 3.0: The Next Generation Internet Internet 3.0: The Next Generation Internet Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Boeing Brown Bag Seminar, January 22, 2009 These slides and Audio/Video recordings

More information

ECE331 Homework 4. Due Monday, August 13, 2018 (via Moodle)

ECE331 Homework 4. Due Monday, August 13, 2018 (via Moodle) ECE331 Homework 4 Due Monday, August 13, 2018 (via Moodle) 1. Below is a list of 32-bit memory address references, given as hexadecimal byte addresses. The memory accesses are all reads and they occur

More information

CCN and NDN TLV encodings in packets

CCN and NDN TLV encodings in packets CCN and NDN TLV encodings in 802.15.4 packets Marc Mosko Palo Alto Research Center marc.mosko@parc.com ChrisDan Tschudin University of Basel chrisdan.tschudin@unibas.ch IRTF ICNRG interim meedng, Boston,

More information

A Survey of Information-Centric Networking

A Survey of Information-Centric Networking INFORMATION-CENTRIC NETWORKING A Survey of Information-Centric Networking Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Börje Ohlman, ABSTRACT The information-centric networking

More information

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a

More information

NAMED DATA NETWORKING IN LOCAL AREA NETWORKS

NAMED DATA NETWORKING IN LOCAL AREA NETWORKS NAMED DATA NETWORKING IN LOCAL AREA NETWORKS by Junxiao Shi Copyright Junxiao Shi 2017 A Dissertation Submitted to the Faculty of the DEPARTMENT OF COMPUTER SCIENCE In Partial Fulfillment of the Requirements

More information

CS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following:

CS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following: CS 470 Spring 2018 Mike Lam, Professor Distributed Web and File Systems Content taken from the following: "Distributed Systems: Principles and Paradigms" by Andrew S. Tanenbaum and Maarten Van Steen (Chapters

More information

Version. Table of Contents

Version. Table of Contents NAP Protocol 1.0 Version Version Date By Comment v1.0 24.01.2011 JP Release version of NAP documentation. Table of Contents 1 Basic concepts...3 1.1 Usage info...3 1.2 Length byte...3 1.3 Literal characters...4

More information

CCN/NDN implementation by network softwarization. September 21 st, 2015 Toshitaka Tsuda Waseda University

CCN/NDN implementation by network softwarization. September 21 st, 2015 Toshitaka Tsuda Waseda University CCN/NDN implementation by network softwarization September 21 st, 2015 Toshitaka Tsuda Waseda University Background consideration of our approach The 5G core network will be the foundation of the future

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

NFD Development Progress. Beichuan Zhang The University Of Arizona

NFD Development Progress. Beichuan Zhang The University Of Arizona NFD Development Progress Beichuan Zhang The University Of Arizona NFD: NDN Forwarding Daemon A year ago, we made the first public release Open source (GPL3+) New flexible packet format based on TLV Modular

More information

Rule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs

Rule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Rule based Forwarding (RBF): improving the Internet s flexibility and security Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Motivation Improve network s flexibility Middlebox support,

More information

Higher layer protocols

Higher layer protocols ETSF05/ETSF10 Internet Protocols Higher layer protocols DHCP DNS Real time applications RTP The hen or the egg? DHCP IP addr. IP DNS TCP UDP ETSF05/ETSF10 - Internet Protocols 2 What to configure IP address

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 05 MULTIPROTOCOL LABEL SWITCHING (MPLS) AND LABEL DISTRIBUTION PROTOCOL (LDP) 1 by Xantaro IP Routing In IP networks, each router makes an independent

More information

Firmware Updates for Internet of Things Devices

Firmware Updates for Internet of Things Devices Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware

More information

NAMED DATA NETWORKING EMPIRICAL SURVEY. Department of Computer Science and Engineering, Pondicherry University,Puducherry , India

NAMED DATA NETWORKING EMPIRICAL SURVEY. Department of Computer Science and Engineering, Pondicherry University,Puducherry , India Volume 115 No. 6 2017, 351-357 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu NAMED DATA NETWORKING EMPIRICAL SURVEY 1 Jinesh. P, 2 Lakshmipriya.K,

More information

Supporting QoS Aware Data Delivery in Information Centric Networks

Supporting QoS Aware Data Delivery in Information Centric Networks Supporting QoS Aware Data Delivery in Information Centric Networks IETF-102 @ Montreal, Canada. Sunday, July 15, 2018 Anil Jangam, Prakash Suthar, Milan Stolic (Cisco Systems) draft-anilj-icnrg-icn-qos-00.txt

More information

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to

More information

CSE398: Network Systems Design

CSE398: Network Systems Design CSE398: Network Systems Design Instructor: Dr. Liang Cheng Department of Computer Science and Engineering P.C. Rossin College of Engineering & Applied Science Lehigh University February 21, 2005 Outline

More information