Demonstration of features and abilities of ICN to deliver on IMT-2020 goals
Author : Phil Brown, Fujitsu Laboratories of America, Inc.
Presented at ITU-T Focus Group IMT-2020 Workshop and Demo Day, 7 December 2016.
More details on the event : http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201612/Pages/Programme.aspx
5. 5
Whole-chain security
Content
stack
Signature
stack
/video_compression/… /video_combination/.. /video_clips/....
Content 3 (compressed video)
Content 2 (hash of combined video & header)
Content 1 (multiple hashes of raw video clips & header )
Signature 3 /video/compression/key/3
Signature 2 /video/combiner/key/2
Signature 1 (including multiple signatures and keys)
/user/Alex/key/1 /user/Bob/key/1 /user/Charlie/key/1
6. 6
Path Search-Similar users
optimal vs edge caching
limited link capacity 𝑐 𝑖
𝜆𝐵
=.8,
𝑐 𝑠
𝜆𝐵𝑅
=.6
For small α more storage at core is
optimum, so the cost reduction
improvement comparing to only edge
caching is bigger (20-30%)
8. 8
NFN processing procedure
NFN uses a 3-phase strategy, i.e., upstream fetch, separate code and data
fetch, and computation push, to process a functional chaining request
9. 9
NFN
NDN Router NDN Router
NDN Router NDN Router
NFN-capable
Router
Interest (|data|h|g) Interest (|data|h|g) Interest (data)
Interest(g)
Assume we have a chain of function applications f(g(h(data))): NFN encodes it
as |data|h|g|f
Phase 2 of NFN (separate code and data fetch): An Interest is firstly forwarded
to an NFN-capable router, which can divide the Interest to fetch multiple data
and functions (codes). After that, data can be processed at the NFN-capable
router and returned back to the consumer.
Data
Function h
Function g
Data (data)
Data(g)
Data (|data|h|g)Data (|data|h|g)