SlideShare a Scribd company logo
1 of 18
Content Centric Networking
SOK Phearin
MBC Laboratory,
Konkuk University, Seoul
Content
   Overview of CCN

   CCN Architecture

   CCN Operation

   References
Content Centric Networking
   A new approach to networking that

       enables networks to self-organize and push relevant
        content where needed at anywhere, anytime, and
        with any devices

       makes the name and attributes of content the
        principle objects upon which the network acts

       Focus on dissemination of information, not on the
        maintenance of network connections
Content Centric Networking
   Confidentiality, Availability, and Integrity (CIA)
    of data

   CCN stores mappings between names and
    data items

   Data replication and movement throughout the
    CCN to increase efficiency and provide
    resiliency to network failures and attacks
CCN Architecture: Packets
         Interest                            Data
        Content Name                      Content Name
                                             Signature
             Selector
                                  (digest algorithm, witness, ...)
               (order
     preference, publisher                  Signed Info
        filter, scope, ...)    (publisher ID, key locator, stale time,
                                                ...)
            Nonce                               Data



   There are just two CCN packet types - interest (similar to
    http “get”) and data (similar to http response).
   Both are encoded in an efficient binary XML.
CCN Architecture: Node Model
                                                        Face 1




               Content Store
                                                                  Wireless



                                                        Face 2




             Pending Interest
               Table (PIT)
                                     CCN Forwarding                Wired
                                         Logic
                                                        Face 3




           Forwarding Information                                Application
                Base (FIB)



                                CCN Forwarding Engine


Each CCN entity has 3 main data structures
  Content Store, Pending Interest Table, Forwarding Information Base
Uses multicast/broadcast
Uses “longest prefix matching” lookup for content names
CCN Architecture: Interest Processing

         Start

   Receive an Interest


        Exist in
        Content                Send data through the arrival face
                         yes
        Store?
       No
         Exist in               Update PIT if request came from
          PIT?           yes            different Face
       No

         Exist in              Send interest over the Faces in FIB
          FIB?                   entry except the arrived Face
                         yes

        No                                Insert to PIT


         Stop
CCN Architecture: Interest Processing
CCN Operation
CCN Operation
CCN Operation
CCN Operation
CCN Operation
CCN Operation
CCN Operation
CCN Operation

             Content goes only where there’s
              interest.

             It takes at most one trip across
              any link.


             Average latency is minimized.

             Total bandwidth is minimized.

             There’s no routing or control traffic
              associated with the replicas.
Reference
   http://www.ccnx.org

   http://www.named-data.net
Thank You!

More Related Content

What's hot

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 

What's hot (20)

Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Named data networking. Basic Principle
Named data networking. Basic PrincipleNamed data networking. Basic Principle
Named data networking. Basic Principle
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT V
 
Distributed information system
Distributed information systemDistributed information system
Distributed information system
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsn
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
 
Cloud computing notes
Cloud computing notesCloud computing notes
Cloud computing notes
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Data fusion
Data fusionData fusion
Data fusion
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Advance computer architecture
Advance computer architecture Advance computer architecture
Advance computer architecture
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architecture
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)
 

Similar to Content centric networking

Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Kevin Mao
 
Study and analysis of mobility, security, and caching issues in CCN
Study and analysis of mobility, security,  and caching issues in CCN Study and analysis of mobility, security,  and caching issues in CCN
Study and analysis of mobility, security, and caching issues in CCN
IJECEIAES
 
Information Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityInformation Centric Networking and Content Addressability
Information Centric Networking and Content Addressability
Shi Junxiao
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
Tara Smith
 
I scsi ov_whitepaper
I scsi ov_whitepaperI scsi ov_whitepaper
I scsi ov_whitepaper
reachmekumar
 
Xldb2011 tue 1005_linked_in
Xldb2011 tue 1005_linked_inXldb2011 tue 1005_linked_in
Xldb2011 tue 1005_linked_in
liqiang xu
 

Similar to Content centric networking (20)

MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKING
MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKINGMEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKING
MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKING
 
Named data networking
Named data networkingNamed data networking
Named data networking
 
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
 
Study and analysis of mobility, security, and caching issues in CCN
Study and analysis of mobility, security,  and caching issues in CCN Study and analysis of mobility, security,  and caching issues in CCN
Study and analysis of mobility, security, and caching issues in CCN
 
Information Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityInformation Centric Networking and Content Addressability
Information Centric Networking and Content Addressability
 
IJCA
IJCAIJCA
IJCA
 
How Content Centric Networking CCN works
How Content Centric Networking CCN worksHow Content Centric Networking CCN works
How Content Centric Networking CCN works
 
Pit Overload Analysis in Content Centric Networks
Pit Overload Analysis in Content Centric NetworksPit Overload Analysis in Content Centric Networks
Pit Overload Analysis in Content Centric Networks
 
Stream Processing with Flink and Stream Sharing
Stream Processing with Flink and Stream SharingStream Processing with Flink and Stream Sharing
Stream Processing with Flink and Stream Sharing
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
 
Blockchain ecosystem and evolution
Blockchain ecosystem and evolutionBlockchain ecosystem and evolution
Blockchain ecosystem and evolution
 
High Performance Cloud Computing
High Performance Cloud ComputingHigh Performance Cloud Computing
High Performance Cloud Computing
 
I scsi ov_whitepaper
I scsi ov_whitepaperI scsi ov_whitepaper
I scsi ov_whitepaper
 
Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
NetBrain CE 5.0
NetBrain CE 5.0NetBrain CE 5.0
NetBrain CE 5.0
 
Evolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in MotionEvolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in Motion
 
Xldb2011 tue 1005_linked_in
Xldb2011 tue 1005_linked_inXldb2011 tue 1005_linked_in
Xldb2011 tue 1005_linked_in
 

More from Phearin Sok

Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
Phearin Sok
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation Planning
Phearin Sok
 

More from Phearin Sok (10)

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and Continuity
 
N Screen
N ScreenN Screen
N Screen
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique ID
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS Architecture
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
UNICEF
UNICEFUNICEF
UNICEF
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation Planning
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 

Recently uploaded

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Content centric networking

  • 1. Content Centric Networking SOK Phearin MBC Laboratory, Konkuk University, Seoul
  • 2. Content  Overview of CCN  CCN Architecture  CCN Operation  References
  • 3. Content Centric Networking  A new approach to networking that  enables networks to self-organize and push relevant content where needed at anywhere, anytime, and with any devices  makes the name and attributes of content the principle objects upon which the network acts  Focus on dissemination of information, not on the maintenance of network connections
  • 4. Content Centric Networking  Confidentiality, Availability, and Integrity (CIA) of data  CCN stores mappings between names and data items  Data replication and movement throughout the CCN to increase efficiency and provide resiliency to network failures and attacks
  • 5. CCN Architecture: Packets Interest Data Content Name Content Name Signature Selector (digest algorithm, witness, ...) (order preference, publisher Signed Info filter, scope, ...) (publisher ID, key locator, stale time, ...) Nonce Data  There are just two CCN packet types - interest (similar to http “get”) and data (similar to http response).  Both are encoded in an efficient binary XML.
  • 6. CCN Architecture: Node Model Face 1 Content Store Wireless Face 2 Pending Interest Table (PIT) CCN Forwarding Wired Logic Face 3 Forwarding Information Application Base (FIB) CCN Forwarding Engine Each CCN entity has 3 main data structures Content Store, Pending Interest Table, Forwarding Information Base Uses multicast/broadcast Uses “longest prefix matching” lookup for content names
  • 7. CCN Architecture: Interest Processing Start Receive an Interest Exist in Content Send data through the arrival face yes Store? No Exist in Update PIT if request came from PIT? yes different Face No Exist in Send interest over the Faces in FIB FIB? entry except the arrived Face yes No Insert to PIT Stop
  • 16. CCN Operation  Content goes only where there’s interest.  It takes at most one trip across any link.  Average latency is minimized.  Total bandwidth is minimized.  There’s no routing or control traffic associated with the replicas.
  • 17. Reference  http://www.ccnx.org  http://www.named-data.net

Editor's Notes

  1. Self-organize: *Self-configuration - 'plug-and-play' paradigm - new base stations shall automatically be configured and integrated into the network - both connectivity establishment, and download of configuration parameters and software. *Self-optimization – BS parameters can be regularly adjusted, based on both base station and mobile station observations. - establishes neighbor relations (ANR) automatically*Self-healing - When some nodes becomes inoperative, self-healing mechanisms aims at reducing the impacts from the failure - by adjusting parameters and algorithms in adjacent cells so that other nodes can support the users that were supported by the failing node