Introduction to Information Centric Networking
|
|
- Tyler Rogers
- 6 years ago
- Views:
Transcription
1 Introduction to Information Centric Networking... with a Dash of Security Claudio Marxer <claudio.marxer@unibas.ch> Computer Networks Group University of Basel Switzerland Open Source IoT & Blockchain Hackathon, Berlin January 18,
2 Historic Perspective Past: Circuit-Centric Path s: You say how to contact... Present: Host-Centric Host/Location s: You say who to contact... Future: Information-Centric (?) Information/Content s: /the/content/name You say what you want to receive... 2
3 Outline ICN & Friends - Jungle of Abrevs (ICN, CCN, CICN, CCNx, NDN,... ) - Content Centric Networking Naming Scheme Packet Types Node Model Data Security in a Location-Agnostic World - Mindset: Content-Based Security - Some Mechanisms Access Control / Confidentiality Authenticity & Integrity 3
4 Through the Jungle of Abrevs Research Field & Architecture Paradigm: Information Centric Networking Network Service: lookup( <content-id> ) ICN Recent ICN Flavour: Content Centric Networking Naming Scheme, Packet Types, Node Model,... CCN CCN Derivates: Wire Formats, Running Code, NDN CICN CCNx 4
5 CCN Naming Scheme /this/name/has/five/components com / org this Hierarchical space Human-Readable... people ietf rfc wikipedia... name has Publisher owns a Domain (i.e. Prefix) - /org/ietf - /org/ietf/rfc 7945 five components 5
6 CCN Packet Types Content Object Interest Type: Content Object /org/ietf/rfc/7945 Payload 0x00 0x01 0x02 0x03 0x04... Type: Interest /org/ietf/rfc/7945 Meta-Info, Security... Meta-Info, Security... - Unique and unchangeable binding of a name and content - Container for a chunk of content - Location-independent and self-containing - Semantics: Sender expresses interest in receiving the named content object - Interface to the network: lookup(/some/content) 6
7 CCN Packet Types (2) 1 Type: Interest /org/ietf/rfc/7945 CCN Type: Content Object /org/ietf/rfc/7945 Payload 0x00 0x01 0x Communication pattern: pull-based, consumer-driven, flow-balanced. 7
8 CCN {Information, Data,,...} Centric World First-Class Citizens: -Payload-Signature Bundles Following: Internal Rules of this World 8
9 CCN Node Model (1) (or how the network satisfies an interest) A CCN relay maintains... Faces: Links to adacent nodes (e.g. via UDP, wifi, ethernet, bluetooth) Content Store (CS) Content object cache Forwarding Information Base (FIB) -prefix-based forwarding rules Pending Interest Table (PIT) Tracking interests from adjacent nodes Content Store Forwd Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/7945 9
10 CCN Node Model (2) (or how the network satisfies an interest) Incoming Interest Pipeline Forward Interest Interest Content Store Match? Matching PIT Entry? Matching Forwarding Rule? Content Object PIT Aggreg. Drop (NACK) Add to PIT Incoming FaceID 10
11 Example 1: Content Store Hit Type: Interest Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/
12 Example 1: Content Store Hit Type: Interest Internal State Incomming Interest Pipeline Content Store Match? Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/
13 Example 1: Content Store Hit Type: Interest Internal State Incomming Interest Pipeline Content Store Match? Satisfy interest from CS Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/
14 Example 1: Content Store Hit Type: Interest Internal State Incomming Interest Pipeline Content Store Match? Satisfy interest from CS Type: Content Object Payload 0x21 0xf6 0x93.. Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/
15 Example 2: PIT Aggregation Type: Interest /doc/blue Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/
16 Example 2: PIT Aggregation Type: Interest /doc/blue Incomming Interest Pipeline Content Store Match? Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/
17 Example 2: PIT Aggregation Type: Interest /doc/blue Incomming Interest Pipeline Content Store Match? Matching PIT Entry? Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue /org/ietf/
18 Example 2: PIT Aggregation Type: Interest /doc/blue Incomming Interest Pipeline Content Store Match? Matching PIT Entry? PIT Aggregation Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/
19 Example 2: PIT Aggregation Type: Interest /doc/blue Incomming Interest Pipeline Content Store Match? Matching PIT Entry? PIT Aggregation Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/
20 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/
21 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Incomming Interest Pipeline Content Store Match? Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/
22 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Incomming Interest Pipeline Content Store Match? Matching PIT Entry? Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/
23 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Incomming Interest Pipeline Content Store Match? Matching PIT Entry? Matching Forwarding Rule? Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/
24 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Incomming Interest Pipeline Content Store Match? Matching PIT Entry? Matching Forwarding Rule? Foward Type: Interest /doc/purple Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 13
25 Example 3: Interest Forwarding Type: Interest /doc/purple Internal State Incomming Interest Pipeline Content Store Match? Matching PIT Entry? Matching Forwarding Rule? Foward Add PIT Entry Type: Interest /doc/purple Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 13
26 CCN Node Model (3) (or how the network satisfies an interest) Incoming Content Pipeline Content Object PIT Entry? Backward (+ erase PIT entry) Content Object Add to Content Store Drop drop 14
27 Example 4: Content Backwarding Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 15
28 Example 4: Content Backwarding Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Incomming Content Pipeline Existing PIT Entry? Internal State Content Store Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 15
29 Example 4: Content Backwarding Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Incomming Content Pipeline Existing PIT Entry? Add to Content Store Internal State Content Store /doc/purple Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 15
30 Example 4: Content Backwarding Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Incomming Content Pipeline Existing PIT Entry? Add to Content Store Backward according to PIT Internal State Content Store /doc/purple Forwarding Info Base /doc /org/ietf Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 15
31 Example 4: Content Backwarding Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Incomming Content Pipeline Existing PIT Entry? Add to Content Store Backward according to PIT Erase PIT Entry Type: Content Object /doc/purple Payload 0x99 0xd4 0x9f.. Internal State Content Store /doc/purple Forwarding Info Base /doc /org/ietf Pending Interest Table /doc/blue, /org/ietf/7945 /doc/purple 15
32 CCN in Action.. 1 A bob 2 3 repository /doc/blue B alice charly repository 16
33 CCN in Action.. bob FIB /doc 1 FIB /doc 2 FIB /doc /doc/blue f4 3 A repository B alice charly repository 16
34 CCN in Action.. bob 1 PIT PIT,f4 f4 3 A repository 2 B alice charly repository 16
35 CCN in Action.. bob PIT 1 PIT 2 PIT Aggregation PIT,f4 f4 3 A repository B alice charly repository 16
36 CCN in Action.. bob PIT 1 PIT 2 PIT,f4 f4 3 A repository B alice charly repository 16
37 CCN in Action.. bob 1 2 f4 3 A repository B alice charly repository 16
38 CCN in Action.. bob 1 f4 3 A repository 2 B alice charly repository 16
39 CCN in Action.. bob 1 f4 3 A repository 2 Cache Hit B alice charly repository 16
40 CCN in Action.. bob /doc/blue 1 /doc/blue Longest-Prefix Forwarding FIB /doc /doc/blue f4 3 /doc/blue A repository 2 B alice charly repository 16
41 CCN in Action.. bob /doc/blue 1 /doc/blue f4 3 /doc/blue A repository 2 B alice charly repository 16
42 Wrap Your Mind: Security in a Channel-Less World Protection and trust [should] travel with the content itself rather than being a property of the connections over which it travels. (Smetters & Jacobson, 2009) Host-Centric World: Unsecured data travels through secured connections. Transport Layer Security (TLS) Information-Centric World: Secured data is delivered by an untrusted network. Content-Based Security 17
43 Content-Based Access-Control / Confidentiality CCN /the/content/name 1 Two-step approach: 2 Symmentrically Encrypted Content is symmetrically encrypted (Data Encryption Key, DEK) Authorized clients: DEKs are provided separately - Identification: Public Key 4 /the/key/<pubkey> Asymmetrically Encrypted DEK 3 5 Access DEK 6 Access Content 18
44 Authenticity/Integrity of Location-Independent Content Approach: Publisher attaches a digital signature to each content object. Signing-authority policy framework: Publisher can own domains in the namespace Owner exclusively holds signing authority in his domain Ownership of sub-domains can be granted Challenge: Assessing authority of signing keys. Type: Content Object /org/ietf/rfc/7945 Payload 0x00 0x01 0x02 0x03 0x04... Digital Signature 0xA1 0xB2 0xC3 0xD4 0xE5... Signing Key /org/ietf/rfc/signingkey 19
45 Authenticity/Integrity of Location-Independent Content Approach: Publisher attaches a digital signature to each content object. Signing-authority policy framework: / Publisher can own domains in the namespace Owner exclusively holds signing authority in his domain Ownership of sub-domains can be granted com... ietf org wikipedia this name Challenge: Assessing authority of signing keys. people rfc has components 19
46 Authenticity/Integrity: Signing Key Chain /org/signingkey Payload <public key> pre-shared /org/ietf/signingkey Payload <public key> Digital Signature 0xF2 0x43 0x4C 0x0B Signing Key /org/signingkey /org/ietf/rfc/signingkey Payload <public key> Digital Signature 0x1C 0x2B 0xFF 0x9D Signing Key /org/ietf/signingkey sign /org/ietf/rfc/7945.txt Payload 0x13 0xFC 0x79 0x45... Digital Signature 0xA1 0xB2 0xC3 0xD4 refer Signing Key /org/ietf/rfc/signingkey 20
47 Wrap-Up Information-Centric Networking (Paradigm): Data as the pivotal entity Content-Centric Networking (Architecture): - Network Service to Consumer: Pull-Based Content Retrieval (interest-based) - Network Service to Publisher: Scalable Content Distribution: Multicasting due to PIT Aggregation & Caching - Network State & Mechanics: CS (in-network caching), FIB (name-based forwarding), PIT (forwarding state); Interest & Content Object Pipelines Content-Based Security: Secure Content, not Connections. 21
48 Q & A
49 Further Reading Information-Centric Networking IRTF Research Group: ACM ICN Conference: Content-Centric Networking V. Jacobson et al., Networking d Content in International Conference on Emerging Networking Experiments and Technologies, d Data Networking Project: Community ICN (CICN) Project: CCN-Lite (Relay): PiCN (Toolbox): 23
Running IoT Applications over ICN: A Guided Journey to NDN, RIOT, CCN-lite and NFN
ACM ICN-2017 Tutorial 1 Running IoT Applications over ICN: A Guided Journey to NDN, RIOT, CCN-lite and NFN at the Freie Universität Berlin, Sep 26, 2017 Welcome and a gentle introduction to ICN Alex Afanasyev,
More informationExpires: February 21, Huawei & USTC G. Wang. Huawei Technologies. August 20, 2013
ICN Research Group Internet-Draft Intended status: Informational Expires: February 21, 2014 X. Zhang R. Ravindran Huawei Technologies H. Xie Huawei & USTC G. Wang Huawei Technologies August 20, 2013 Abstract
More informationAccess-Controlled In-Network Processing of Named Data
Access-Controlled In-Network Processing of Named Data Claudio Marxer Christopher Scherb Christian Tschudin Computer
More informationNetworking Named Content: Content-Centric Networking. John Rula
Networking Named Content: Content-Centric Networking John Rula Overview Replacing traditional host based routing with named content routing Consumers request a data s name instead of a host (ip address)
More informationNamed Data Networking (NDN) CLASS WEB SITE: NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing
CLASS WEB SITE: http://upmcsms.weebly.com/ Updated with Lecture Notes Named Data Networking (NDN) Introduction to NDN Named Data Networking (NDN) IP NDN Host-centric addressing Data-centric addressing
More informationImproved Content Addressability Through Relational Data Modeling and In-Network Processing Elements
Improved Content Addressability Through Relational Data Modeling and In-Network Processing Elements Claudio Marxer Christian Tschudin Computer
More informationStateless ICN Forwarding with P4 towards Netronome NFP-based Implementation
Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Aytac Azgin, Ravishankar Ravindran, Guo-Qiang Wang aytac.azgin, ravi.ravindran, gq.wang@huawei.com Huawei Research Center, Santa
More informationNamed Data Networking
Named Data Networking Ronald van der Pol Outline! Goal of this project! Shortcomings of current internet! NDN basics! NDN forwarding! Naming example! Security! Personal opinion Goal of this
More informationNetwork Names in Content-Centric Networking. CCN Names
Network Names in Content-Centric Networking ACM ICN 2016 1 CCN Names Expressed as URIs /a/b/foo /us/edu/uci/cs/tsudik/papers/acm-icn16.pdf Encoded as TLVs 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
More informationICN Content Security Using Encrypted Manifest and Encrypted Content Chunks
ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks Dante Pacella dante@verizon.com Ashish Sardesai ashish.sardesai@verizon.com Mani Tadayon mani.tadayon@verizon.com Venkat Josyula
More informationContent Centric Networking
Content Centric Networking Van Jacobson Palo Alto Research Center (PARC) IETF77 ISOC Internet Researchers meeting Anaheim, CA 24 March 2010 This talk describes ongoing PARC work on CCN (Content-centric
More informationSupport for Notifications in CCN ( draft-ravi-ccn-notification-00.txt ) IETF/ICN-RG -93, Prague
Support for Notifications in CCN ( draft-ravi-ccn-notification-00.txt ) IETF/ICN-RG -93, Prague Ravi Ravindran (ravi.ravindran@huawei.com) Asit Chakraborti(asit.chakraborti@huawei.com) Marc Mosko(marc.mosko@parc.com)
More informationApplication aware access and distribution of digital objects using Named Data Networking (NDN)
Application aware access and distribution of digital objects using Named Data Networking (NDN) July 4, 2017 Rahaf Mousa Supervisor: dr.zhiming Zhao University of Amsterdam System and Network Engineering
More informationCCN. CCNx 1.0 Changes from 0.x. Computer Science Laboratory Networking & Distributed Systems IETF 90 - July 2014
CCN CCNx 1.0 Changes from 0.x Computer Science Laboratory Networking & Distributed Systems Ignacio.Solis@parc.com IETF 90 - July 2014 CCNx 1.0 - changes from 0.x Static header, optional header, message
More informationPerformance Study of CCNx
Performance Study of CCNx Haowei Yuan Networking Research Seminar 3/18/2013 My Topic for Today Industry participation in content centric networking Emerging networks consortium Our performance study of
More informationCCN & Network Coding. Cedric Westphal Huawei and UCSC
CCN & Network Coding Cedric Westphal Huawei and UCSC ICN & Network Coding - RFC7933 9.5. Network Coding for Video Distribution in ICN An interesting research area for combining heterogeneous sources is
More informationPublish Subscribe Deployment Option for NDN in the Constrained IoT
Publish Subscribe Deployment Option for NDN in the Constrained IoT draft-gundogan-icnrg-pub-iot-02 Cenk Gündoğan 1 Thomas Schmidt 1 Matthias Wählisch 2 1 HAW Hamburg 2 Freie Universität Berlin March 18,
More informationA consumer-driven access control approach to censorship circumvention in content-centric networking
A consumer-driven access control approach to censorship circumvention in content-centric networking Jun Kurihara, Kenji Yokota and Atsushi Tagami KDDI R&D Laboratories, Inc. ACM ICN 2016 Kyoto, Japan,
More informationOnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN
OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN Alberto Compagno 1,3, Mauro Conti 2 and Ralph Droms 3 1 Sapienza University of Rome 2 University of Padua 3 Cisco Systems 3rd ACM Conference
More informationICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016)
ICN IDENTIFIER / LOCATOR Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) 1 A brief review of ID/Locators in IETF It s long, and we ll skim over it Then we discuss the CCNx & NDN
More informationVideo Conferencing with Content Centric Networking
Video Conferencing with Content Centric Networking Kai Zhao 1,2, Xueqing Yang 1, Xinming Ma 2 1. Information Engineering College, North China University of Water Rescources and Electric Power,Zhengzhou,china
More informationPublisher Mobility Support in Content Centric Networks
ICOIN 2014@Phuket Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi (mylee@mmlab.snu.ac.kr) Seoul National University 2014.02.11
More informationNetworking Named Content
Networking Named Content Van Jacobson Diana K. Smetters James D. Thorton Machael F. Plass Nicholas H. Briggs Rebecca L. Braynard Presented by: Vladislav Perelman Advanced Networking Seminar Jacobs University
More informationNamed Data Networking for 5G Wireless
Named Data Networking for 5G Wireless Edmund Yeh Electrical and Computer Engineering Northeastern University New York University January 27, 2017 Overview NDN: a major information-centric networking architecture
More informationSession Support for SCN
Session Support for SCN Mikael Gasparyan, Guillaume Corsini, Torsten Braun, Eryk Schiller, Jonnahtan Saltarin Institute of Computer Science University of Bern Bern, Switzerland {gasparyan,braun,schiller,saltarin}@inf.unibe.ch,
More informationHybrid Information-Centric Networking
Hybrid Information-Centric Networking ICN inside the Internet Protocol Luca Muscariello, Principal Engineer Giovanna Carofiglio, Distinguished Engineer Jordan Augé, Michele Papalini, Mauro Sardara, Alberto
More informationIn-Network Live Stream Processing with Named Functions
In-Network Live Stream Processing with Named Functions Christopher Scherb christopher.scherb@unibas.ch Urs Schnurrenberger urs.schnurrenberger@unibas.ch Claudio Marxer claudio.marxer@unibas.ch Christian
More informationFollow Me Cloud and Virtualization of (Multimedia) Services and Applications: Challenges and Possible Solutions
Follow Me Cloud and Virtualization of (Multimedia) Services and Applications: Challenges and Possible Solutions André Gomes (1), Torsten Braun (1), Georgios Karagiannis (2), Morteza Karimzadeh (2), Marco
More informationA Light-Weight Forwarding Plane for Content-Centric Networks
A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,
More information(h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages
(h)icn Socket Library for HTTP Leveraging (h)icn socket library for carrying HTTP messages Mauro Sardara, Luca Muscariello, Alberto Compagno Software Engineer ICNRG Interim Meeting, London, 18 th of March
More informationMaster s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日
Graduate School of Fundamental Science and Engineering Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE Student ID 学籍番号 5114FG21-6 Name 氏名 THEINT THEINT MYO Supervisor 指導教員 Hidenori NAKAZATO 印
More informationIoT Information Centric Networking
IoT Information Centric Networking Cédric Adjih, Inria Saclay, France. Workshop IoT Tnisia 2018 - Tnis, Tnisia, 26 Apr. 2018 Otline What is Information Centric Networking (ICN)? General, View of NDN semantics
More informationEfficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism
Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate
More informationEnabling Network Identifier (NI) in Information Centric Networks to Support Optimized Forwarding
Enabling Network Identifier (NI) in Information Centric Networks to Support Optimized Forwarding IETF/IRTF/ICNRG, 97 (draft-azgin-icnrg-ni-00.txt) Authors: Aytac Azgin, Ravi Ravindran (aytac.azgin@huawei.com,
More informationNaming in Content-Oriented Architectures
Naming in Content-Oriented Architectures 1 Data publishing RWI select produce own Data Name certify Key 2 Basic bindings The ICN paper argued that RWI, Name, and Key should be bound together RWI If not,
More informationEnabling Correct Interest Forwarding and Retransmissions in a Content Centric Network
Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network J. J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 1 1 Computer Engineering Department, University of California,
More informationSMART CONNECTION TO SMART HOME VENTO
SMART CONNECTION TO SMART HOME VENTO Expert A50- W VENTO Expert Duo A30- W EN OPERATION MANUAL VENTO Expert www.blaubergventilatoren.de CONTENTS Purpose...2 Network parameters...3 Control commands...3
More informationA Cluster-based Scalable Router for Information Centric Networks
A Cluster-based Scalable Router for Information Centric Networks Andrea Detti, Lorenzo Bracciale, Pierpaolo Loreti, Giulio Rossi, Nicola Blefari Melazzi Electronic Engineering Dept. University of Rome
More informationarxiv: v1 [cs.ni] 20 Apr 2017
ADN: An Information-Centric Networking Architecture for the Internet of Things University of California at Santa Cruz Computer Engineering Department Santa Cruz, CA 95064 jj@soe.ucsc.edu arxiv:1704.06346v1
More informationA Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms
A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms Ngo Quang Minh, Ryo Yamamoto, Satoshi Ohzahata, and Toshihiko Kato University of Electro-Communications
More informationDecoupling Information and Connectivity via Information-Centric Transport
Washington University in St. Louis Washington University Open Scholarship Computer Science and Engineering Publications and Presentations School of Engineering Publications and Presentations 8-31-2018
More informationA Fault-Tolerant Forwarding Strategy for Interest-based Information Centric Networks
A Fault-Tolerant Forwarding Strategy for Interest-based Information Centric Networks J.J. Garcia-Luna-Aceves Palo Alto Research Center, Palo Alto, CA 94304 Department of Computer Engineering, University
More informationLecture 12 Page 1. Lecture 12 Page 3
IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationCSE 461 Midterm Winter 2018
CSE 461 Midterm Winter 2018 Your Name: UW Net ID: General Information This is a closed book/laptop examination. You have 50 minutes to answer as many questions as possible. The number in parentheses at
More informationFall 2010/Lecture 32 1
CS 426 (Fall 2010) Key Distribution & Agreement Fall 2010/Lecture 32 1 Outline Key agreement without t using public keys Distribution of public keys, with public key certificates Diffie-Hellman Protocol
More informationLecture 13 Page 1. Lecture 13 Page 3
IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided
More informationFast Forwarding for NDN
Fast Forwarding for NDN Won So Ashok Narayanan Mark Stapp mjs@cisco.com Cisco Systems IETF ICNRG, 31/7/2013, Berlin CCN/NDN in Two Slides (1) Network forwards and caches named data 'objects'; no host addresses
More informationOpenFlow-based control plane for Information-Centric Networking
OF-ICN: OpenFlow-based control plane for Information-Centric Networking by Rajendran Jeeva, B E Dissertation Presented to the University of Dublin, Trinity College in fulfillment of the requirements for
More informationInformation Centric Networks and Named Data Networking
Information Centric Networks and Named Data Networking Dan Massey Colorado State University 1 NDN Project Team Van Jacobson: NDN Architect 2 The Evolution Toward Information Centric Networks 3 Evolution
More informationCCNinfo: Discovering Content and Netw ork Information in Content-Centric Netwo rks
CCNinfo: Discovering Content and Netw ork Information in Content-Centric Netwo rks draft-irtf-icnrg-ccninfo-00 Hitoshi Asaeda (NICT) Xun Shao (KIT) 1 History Initial proposal: Contrace Contrace: Traceroute
More information0x1A Great Papers in Computer Security
CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,
More informationSecure Off-Path Replication in Content-Centric Networks
Secure Off-Path tion in Content-Centric Networks Marc Mosko and Christopher A. Wood Computer Science Laboratory, Palo Alto Research Center Email: mmosko@parc.com, woodc1@uci.edu Abstract We present SCR,
More informationA Brief History of a Future Internet: the Named Data Networking Architecture
A Brief History of a Future Internet: the Named Data Networking Architecture kc claffy (w slides borrowed from NDN team) www.caida.org Center for Applied Internet Data Analysis University of California,
More informationModeling multipath forwarding strategies in Information Centric Networks
Modeling multipath forwarding strategies in Information Centric Networks Andrea Detti, Claudio Pisa, Nicola Blefari Melazzi CNIT, University of Rome Tor Vergata, Italy. andrea.detti@uniroma2.it, claudio.pisa@uniroma2.it,
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationA Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00)
A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00) IETF 93 / July 2015 Paul E. Jones Nermeen Ismail David Benham Cisco Agenda Security
More informationOi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0)
Oi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0) Technical Report COPE-SITI-TR-18-03 January 31 st, 2018 Editor Omar Aponte (COPELABS/ULHT) Authors Omar Aponte (COPELABS/ULHT)
More informationdraft-moiseenko-icnrg-flowclass
draft-moiseenko-icnrg-flowclass Dave Oran daveoran@orandom.net Ilya Moiseenko ilmoisee@cisco.com Note: Cisco IPR on this draft Differentiated Services for ICN Problem statement: How do we support multiple
More informationInformation Centric Networking to Support Disaster Management
Information Centric Networking to Support Disaster Management K. K. Ramakrishnan WinLab, Rutgers University, NJ (thanks to all the partners of the GreenICN EU-Japan project) Content Centric Networks Use
More informationTOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks
TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks Jaebeom Kim, Daewook Shin, and Young-Bae Ko Department of Computer Engineering, Graduate School of Ajou University Suwon, Republic
More informationLive Streaming with Content Centric Networking
2012 Third International Conference on Networking and Distributed Computing Live Streaming with Content Centric Networking Hongfeng Xu 2,3, Zhen Chen 1,3, Rui Chen 2,3, Junwei Cao 1,3 1 Research Institute
More informationChapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees
Chapter 4 roadmap 4. Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What s Inside a Router 4.4 The Internet (IP) Protocol 4.5 Routing Algorithms 4.6 Routing in the Internet 4.7
More informationUNIT - IV Cryptographic Hash Function 31.1
UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service
More informationPerformance Evaluation of CCN
Performance Evaluation of CCN September 13, 2012 Donghyun Jang, Munyoung Lee, Eunsang Cho, Ted Taekyoung Kwon (Seoul National University), Byoung-Joon Lee, Myeong-Wuk Jang, Sang-Jun Moon (Samsung Electronics),
More informationControlling Strategy Retransmissions in Named Data Networking
2017 ACM/IEEE Symposium on Architectures for Networking and Communications Controlling Strategy Retransmissions in Named Data Networking Hila Ben Abraham & Patrick Crowley Washington University in Saint
More informationHop-count Based Forwarding for Seamless Producer Mobility in NDN
Hop-count Based Forwarding for Seamless Producer Mobility in NDN Vignesh Sivaraman and Biplab Sikdar Department of Electrical and Computer Engineering National University of Singapore, Singapore Abstract
More informationServer-based Certificate Validation Protocol
Server-based Certificate Validation Protocol Digital Certificate and PKI a public-key certificate is a digital certificate that binds a system entity's identity to a public key value, and possibly to additional
More informationNamed Data Networking Enabled WiFi in Challenged Communication Environments
Named Data Networking Enabled WiFi in Challenged Communication Environments 1 Anthony Guardado, 1 Zilong Ye, 1 Huiping Guo 2 Lei Liu, 2 Liguang Xie, 2 Akira Ito 1 California State University, Los Angeles
More informationCS 43: Computer Networks The Network Layer. Kevin Webb Swarthmore College November 2, 2017
CS 43: Computer Networks The Network Layer Kevin Webb Swarthmore College November 2, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network
More informationSharing mhealth Data via Named Data Networking
Sharing mhealth Data via Named Data Networking Haitao Zhang zhtaoxiang@gmail.com Claudio Marxer University of Basel claudio.marxer@unibas.ch Zhehao Wang zhehao@remap.ucla.edu Jeff Burke jburke@remap.ucla.edu
More informationJunos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services
Junos Security Chapter 8: IPsec VPNs 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will
More informationInnovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017
Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware
More informationICAN: Information-Centric Context-Aware Ad-Hoc Network
ICAN: Information-Centric Context-Aware Ad-Hoc Network Yu-Ting Yu, Chris Tandiono, Xiao Li, You Lu, M.Y. Sanadidi, and Mario Gerla University of California Los Angeles, CA 90095, USA {yutingyu, cbtandiono,
More informationInternet Research Task Force (IRTF) Request for Comments: 7927 Category: Informational
Internet Research Task Force (IRTF) Request for Comments: 7927 Category: Informational ISSN: 2070-1721 D. Kutscher, Ed. NEC S. Eum Osaka University K. Pentikousis Travelping I. Psaras UCL D. Corujo Universidade
More informationCreating A Secure, Integrated Home Network of Things with Named Data Networking
NDN, Technical Report NDN-0035, 2015. http://named-data.net/techreports.html Revision 1: November 19, 2015 Creating A Secure, Integrated Home Network of Things with Named Data Networking Adeola Bannis
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationLast time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling
Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet
More informationDesign and Implementation of a Conversion Service for Content Centric Networking
Design and Implementation of a Conversion Service for Content Centric Networking Master Thesis by Elham Cheriki under the guidance of Prof. T. Braun and Prof. L. Mueller Department of Electrical Engineering
More informationCS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following:
CS 470 Spring 2017 Mike Lam, Professor Distributed Web and File Systems Content taken from the following: "Distributed Systems: Principles and Paradigms" by Andrew S. Tanenbaum and Maarten Van Steen (Chapters
More informationThe Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science
The Tor Network Cryptography 2, Part 2, Lecture 6 Ruben Niederhagen June 16th, 2014 Tor Network Introduction 2/33 Classic goals of cryptography: confidentiality, data integrity, authentication, and non-repudiation.
More informationInternet 3.0: The Next Generation Internet
Internet 3.0: The Next Generation Internet Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Boeing Brown Bag Seminar, January 22, 2009 These slides and Audio/Video recordings
More informationECE331 Homework 4. Due Monday, August 13, 2018 (via Moodle)
ECE331 Homework 4 Due Monday, August 13, 2018 (via Moodle) 1. Below is a list of 32-bit memory address references, given as hexadecimal byte addresses. The memory accesses are all reads and they occur
More informationCCN and NDN TLV encodings in packets
CCN and NDN TLV encodings in 802.15.4 packets Marc Mosko Palo Alto Research Center marc.mosko@parc.com ChrisDan Tschudin University of Basel chrisdan.tschudin@unibas.ch IRTF ICNRG interim meedng, Boston,
More informationA Survey of Information-Centric Networking
INFORMATION-CENTRIC NETWORKING A Survey of Information-Centric Networking Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Börje Ohlman, ABSTRACT The information-centric networking
More informationISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :
ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a
More informationNAMED DATA NETWORKING IN LOCAL AREA NETWORKS
NAMED DATA NETWORKING IN LOCAL AREA NETWORKS by Junxiao Shi Copyright Junxiao Shi 2017 A Dissertation Submitted to the Faculty of the DEPARTMENT OF COMPUTER SCIENCE In Partial Fulfillment of the Requirements
More informationCS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following:
CS 470 Spring 2018 Mike Lam, Professor Distributed Web and File Systems Content taken from the following: "Distributed Systems: Principles and Paradigms" by Andrew S. Tanenbaum and Maarten Van Steen (Chapters
More informationVersion. Table of Contents
NAP Protocol 1.0 Version Version Date By Comment v1.0 24.01.2011 JP Release version of NAP documentation. Table of Contents 1 Basic concepts...3 1.1 Usage info...3 1.2 Length byte...3 1.3 Literal characters...4
More informationCCN/NDN implementation by network softwarization. September 21 st, 2015 Toshitaka Tsuda Waseda University
CCN/NDN implementation by network softwarization September 21 st, 2015 Toshitaka Tsuda Waseda University Background consideration of our approach The 5G core network will be the foundation of the future
More informationInformation Security CS 526
Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric
More informationNFD Development Progress. Beichuan Zhang The University Of Arizona
NFD Development Progress Beichuan Zhang The University Of Arizona NFD: NDN Forwarding Daemon A year ago, we made the first public release Open source (GPL3+) New flexible packet format based on TLV Modular
More informationRule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs
Rule based Forwarding (RBF): improving the Internet s flexibility and security Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Motivation Improve network s flexibility Middlebox support,
More informationHigher layer protocols
ETSF05/ETSF10 Internet Protocols Higher layer protocols DHCP DNS Real time applications RTP The hen or the egg? DHCP IP addr. IP DNS TCP UDP ETSF05/ETSF10 - Internet Protocols 2 What to configure IP address
More informationLARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF
LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 05 MULTIPROTOCOL LABEL SWITCHING (MPLS) AND LABEL DISTRIBUTION PROTOCOL (LDP) 1 by Xantaro IP Routing In IP networks, each router makes an independent
More informationFirmware Updates for Internet of Things Devices
Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware
More informationNAMED DATA NETWORKING EMPIRICAL SURVEY. Department of Computer Science and Engineering, Pondicherry University,Puducherry , India
Volume 115 No. 6 2017, 351-357 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu NAMED DATA NETWORKING EMPIRICAL SURVEY 1 Jinesh. P, 2 Lakshmipriya.K,
More informationSupporting QoS Aware Data Delivery in Information Centric Networks
Supporting QoS Aware Data Delivery in Information Centric Networks IETF-102 @ Montreal, Canada. Sunday, July 15, 2018 Anil Jangam, Prakash Suthar, Milan Stolic (Cisco Systems) draft-anilj-icnrg-icn-qos-00.txt
More informationDistributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018
Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to
More informationCSE398: Network Systems Design
CSE398: Network Systems Design Instructor: Dr. Liang Cheng Department of Computer Science and Engineering P.C. Rossin College of Engineering & Applied Science Lehigh University February 21, 2005 Outline
More information