Content-Centric Networking (CCN)

Research Scientist at Data61, CSIRO
Aug. 18, 2018
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
1 of 16

More Related Content

What's hot

What is Content centric networkingWhat is Content centric networking
What is Content centric networkingpraison
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6saurav kumar mourya
Content centric networksContent centric networks
Content centric networksMeshingo Jack
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSKathirvel Ayyaswamy
Chapter 4 - Computer Networking a top-down Approach 7thChapter 4 - Computer Networking a top-down Approach 7th
Chapter 4 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz

Similar to Content-Centric Networking (CCN)

Mpls vpn1Mpls vpn1
Mpls vpn1rel comm
Real Time Java DDSReal Time Java DDS
Real Time Java DDSkerush
Open splice dds securityOpen splice dds security
Open splice dds securityRamzi Karoui
Large-Scale System Integration with DDS for SCADA, C2, and FinanceLarge-Scale System Integration with DDS for SCADA, C2, and Finance
Large-Scale System Integration with DDS for SCADA, C2, and FinanceRick Warren
Voice over MPLSVoice over MPLS
Voice over MPLSTooba Shaikh
Signpost at FOCI 2013Signpost at FOCI 2013
Signpost at FOCI 2013Amir Chaudhry

More from Dilum Bandara

Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Ag...Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Ag...
Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Ag...Dilum Bandara
A Decision Model for Choosing Patterns in Blockchain-based ApplicationsA Decision Model for Choosing Patterns in Blockchain-based Applications
A Decision Model for Choosing Patterns in Blockchain-based ApplicationsDilum Bandara
Smart Contract TestingSmart Contract Testing
Smart Contract TestingDilum Bandara
Smart Contract Security TestingSmart Contract Security Testing
Smart Contract Security TestingDilum Bandara
What's not a cloudWhat's not a cloud
What's not a cloudDilum Bandara
Blockchain - A Catalyst for Solving Age-old Distributed Systems ProblemsBlockchain - A Catalyst for Solving Age-old Distributed Systems Problems
Blockchain - A Catalyst for Solving Age-old Distributed Systems ProblemsDilum Bandara

Recently uploaded

Collection and transport of Solid Waste-SWM.pptxCollection and transport of Solid Waste-SWM.pptx
Collection and transport of Solid Waste-SWM.pptxvinodnejkar1
Power extraction from wind energy..pptxPower extraction from wind energy..pptx
Power extraction from wind energy..pptxHajee Mohammad Danesh Science and Technology University (HSTU)
Airbus A320 Flight Crew Operating Manual.Part 1.pdfAirbus A320 Flight Crew Operating Manual.Part 1.pdf
Airbus A320 Flight Crew Operating Manual.Part 1.pdfTahirSadikovi
A review of IoT-based smart waste level monitoring system for smart citiesA review of IoT-based smart waste level monitoring system for smart cities
A review of IoT-based smart waste level monitoring system for smart citiesnooriasukmaningtyas
North American YAT-28 Turbo Trojan.pdfNorth American YAT-28 Turbo Trojan.pdf
North American YAT-28 Turbo Trojan.pdfTahirSadikovi
Instruction Set : Computer ArchitectureInstruction Set : Computer Architecture
Instruction Set : Computer ArchitectureRitwik Mishra

Content-Centric Networking (CCN)

Editor's Notes

  1. NSP – Network access point
  2. Motes without IP support IP routes are not symetric
  3. Strategy layer define – forwarding preferences, which face to select based on performance, retransmission after loss, window size
  4. Local names are also possible
  5. PIT – suppress duplicate packets
  6. A1 – less skewed A2 – More skewed
  7. 1 circle – IP routers 2 circles – IP + CCN routers