SlideShare a Scribd company logo
INFORMATION CENTRIC NETWORKING
(ICN)
Agenda
▪ Problems In Current Internet Architecture
▪ How Internet is Evolving
▪ Host Centric Networking
▪ Information Centric Networking
▪ Key functionalities of ICN Networks
▪ Approaches to ICN
▪ Data Oriented Network Architecture (DONA)
▪ Architecture of DONA
▪ Advantages & Applications of ICN
2
Problems in Current Internet Architecture
▪ The current internet was designed to address the communication needs of limited
computers including communication between mainframe computers.
▪ The basic requirement from the Internet at that time was merely that of forwarding
packets of data among a limited number of stationary machines
▪ The tremendous growth of the Internet and the introduction of new applications to
fulfill emerging needs, has given rise to new requirements from the current
architecture.
▪ Many current and emerging requirements still cannot be addressed adequately by
the current Internet. This has raised the question of whether we can continue
“patching over patches,” or whether a new clean-slate architectural approach for
the Internet is actually needed.
3
Networking Evolution
▪ Traditional networking
▪ Host-centric communications addressing end-points
▪ Information-centric networking
▪ Data-centric communications addressing information (e.g., data in context).
▪ Decoupling in space – neither sender nor receiver need to know their partner.
▪ Decoupling in time – “answer” not necessarily directly triggered by “question”,
asynchronous communication.
4
Host Centric Networking
5
Information Centric Networking
6
Information Centric Networking
7
Information Centric Networking
8
Information Centric Networking
9
Key functionalities of ICN Network
▪ Naming
▪ Name Resolution & Data Routing
▪ Caching
▪ Mobility
▪ Security
10
Naming
▪ Structure of a Name assigned to a piece of Information to be communicated
▪ In all ICN architectures, names are location dependent
▪ Depending upon the approach, names may range from being flat to hierarchical
▪ Names may or may not be human readable
11
Naming
▪ Example of Naming the data
▪ Flat, not human readable identifiers
▪ 1DB76EB8DFD6B0b92A293AADC8421830BDE73CB6
▪ Hierarchical, meaningful structured names
▪ /nytimes/sport/baseball/mets/game022414/
12
Name Resolution & Data routing
▪ Name resolution involves matching an information name to a provider or source
that can supply that information
▪ Data routing involves constructing a path for transferring the information from that
provider to the requesting host
▪ Name Resolution & Data Routing can be coupled(or integrated) or decoupled(or
independent)
▪ In the coupled approach, the information request is routed to an information provider,
which subsequently sends the information to the requesting host by following the reverse
path over which the request was forwarded.
▪ In the decoupled approach, the name resolution function does not determine or restrict the path
that the data will use from the provider to the subscriber. For example, an independent data
routing module may send to the provider a source route to the requesting host.
13
Caching
▪ Caching is further divided into on-path and off-path caching.
▪ In on-path caching, the information is cached along the path taken by a name
resolution request
▪ In off-path caching the network exploits information cached outside that path
▪ In ICN architectures with decoupled name resolution and data routing, off-path
caching must be supported by the name resolution system, which handles caches
as regular information publishers.
▪ If name resolution and data transfer are coupled, off-path caching must be
supported by the routing system used to forward the requests for information.
14
Mobility
▪ Subscriber mobility is intrinsically supported in ICN architectures
▪ Mobile subscribers can just send new subscriptions for information after a
handoff.
▪ Publisher mobility is more difficult to support, since the name resolution system
(in the coupled approach) or the routing tables (in the decoupled approach) need
to be updated.
15
Security
▪ This aspect is tightly related to the naming structure
Human Readable Names Flat Names
Require a trusted agent or a trust
relationship with the
name resolution system to verify that
the returned information
corresponds to the requested name
flat names can support self-
certification
not-human readable, thus requiring
another trusted
system to map human-readable
names to flat names.
16
DONA (Data Oriented Network Architecture)
▪ Created by UC Berkeley
▪ Changes naming by replacing the hierarchical URLs with flat names
▪ Names in DONA allow users to verify that the received information matches a
requested name via cryptographic techniques
17
Naming
▪ DONA names are organized around principals
▪ Each principal is associated with public-private key pairs
▪ Names are of the form P:L
▪ P is the cryptographic hash of the principal’s public key and L is a label chosen by
the principal, who ensures that these names are unique.
▪ Naming granularity is left to the principals, who are considered to be the owners
of the corresponding information. For instance, principals may name either an
entire web site or each individual web page within it.
▪ Names are flat, application-independent, location-independent and globally
unique
18
Name Resolution & Data Routing
▪ Name resolution in DONA is provided by specialized servers called Resolution
Handlers (RHs).
▪ There is at least one logical RH at each AS.
▪ RHs are interconnected, forming a hierarchical name resolution service
19
DONA Architecture
20
Caching
▪ DONA supports on-path caching via the RH infrastructure.
▪ A RH that decides to cache a requested data object can replace the source IP
address of an incoming FIND request with its own IP address, before forwarding
the message to the next RH. As a result, any response will surely traverse the
current RH, thus the data returned will be cached there.
▪ If a subsequent FIND message requesting the same object reaches a caching
RH, the RH can directly return the data to the subscriber.
21
Mobility
▪ Mobile subscribers can simply issue new FIND messages from their current
location, relying on the RH infrastructure to provide them with the closest copy of
the information.
▪ Mobile publishers can also unregister and re-register their information when
changing their network location
22
Security
▪ Names in DONA are self-certifying
▪ They allow the subscriber to verify that the data received matches the name
requested.
▪ The design of DONA can either prevent or mitigate a series of attacks to the RH
infrastructure
▪ A RH will only accept information registrations by authenticated principals.
23
Examples of other Approaches to ICN
▪ NDN
▪ PURSUIT
▪ SAIL
▪ COMET
▪ CONVERGENCE
▪ Mobility First
24
Advantages of the ICN approach
▪ Scalable and cost-efficient content distribution
▪ IP traffic to quadruple from 2010 – 2015
▪ Mobile data traffic increased 26x
▪ Mostly attributed to media traffic that continues to be 90% of global consumer
traffic by 2015
25
Applications of ICN
▪ ICN has various applications in the field of
▪ Smart Grids
▪ Self Driving Autonomous Vehicles
▪ Internet of Things
▪ Content Distribution
▪ Real-Time Audio & Video Communications
26
This was all about Information Centric Networking
Thankyou !
27

More Related Content

What's hot

Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websitesm srikanth
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Ali Habeeb
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer ProtocolPeter R. Egli
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolUjjayanta Bhaumik
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)ymghorpade
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
Domain name system
Domain name systemDomain name system
Domain name systemDiwaker Pant
 

What's hot (20)

Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
VPN
VPNVPN
VPN
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Computer network
Computer networkComputer network
Computer network
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Domain name system
Domain name systemDomain name system
Domain name system
 

Similar to Information Centric Networking

5 mngmt idd130115jd
5 mngmt idd130115jd5 mngmt idd130115jd
5 mngmt idd130115jdARCFIRE ICT
 
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Network
Virtual Backbone Based Content Routing in Wireless Ad-Hoc NetworkVirtual Backbone Based Content Routing in Wireless Ad-Hoc Network
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Networkijwmn
 
A Note on Advancing Scalable Routing in Named Data Networking,
A Note on Advancing Scalable Routing in Named Data Networking,A Note on Advancing Scalable Routing in Named Data Networking,
A Note on Advancing Scalable Routing in Named Data Networking,IRJET Journal
 
Deploying Linked Open Data: Methodologies and Software Tools
Deploying Linked Open Data: Methodologies and Software ToolsDeploying Linked Open Data: Methodologies and Software Tools
Deploying Linked Open Data: Methodologies and Software ToolsNikolaos Konstantinou
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingRyan Furlough, BSCPE CPAS
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDJournal For Research
 
Database 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvanDatabase 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvanIftikhar Ahmad
 
The Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksThe Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksJessica Deakin
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksLeMeniz Infotech
 
Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?sriramr
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
Nebula - The Future Internet Architecture
Nebula - The Future Internet ArchitectureNebula - The Future Internet Architecture
Nebula - The Future Internet ArchitectureRanjan Dhar
 
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Denodo
 
Architecture and Evaluation on Cooperative Caching In Wireless P2P
Architecture and Evaluation on Cooperative Caching In Wireless  P2PArchitecture and Evaluation on Cooperative Caching In Wireless  P2P
Architecture and Evaluation on Cooperative Caching In Wireless P2PIOSR Journals
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksPapitha Velumani
 

Similar to Information Centric Networking (20)

5 mngmt idd130115jd
5 mngmt idd130115jd5 mngmt idd130115jd
5 mngmt idd130115jd
 
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Network
Virtual Backbone Based Content Routing in Wireless Ad-Hoc NetworkVirtual Backbone Based Content Routing in Wireless Ad-Hoc Network
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Network
 
Named data networking
Named data networkingNamed data networking
Named data networking
 
A Note on Advancing Scalable Routing in Named Data Networking,
A Note on Advancing Scalable Routing in Named Data Networking,A Note on Advancing Scalable Routing in Named Data Networking,
A Note on Advancing Scalable Routing in Named Data Networking,
 
Deploying Linked Open Data: Methodologies and Software Tools
Deploying Linked Open Data: Methodologies and Software ToolsDeploying Linked Open Data: Methodologies and Software Tools
Deploying Linked Open Data: Methodologies and Software Tools
 
Coolie @ call
Coolie @ callCoolie @ call
Coolie @ call
 
Learning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical ImagingLearning series fundamentals of Networking and Medical Imaging
Learning series fundamentals of Networking and Medical Imaging
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
 
Vpn
VpnVpn
Vpn
 
Database 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvanDatabase 2 ddbms,homogeneous & heterognus adv & disadvan
Database 2 ddbms,homogeneous & heterognus adv & disadvan
 
The Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksThe Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer Networks
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networks
 
nnnn.pptx
nnnn.pptxnnnn.pptx
nnnn.pptx
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Nebula - The Future Internet Architecture
Nebula - The Future Internet ArchitectureNebula - The Future Internet Architecture
Nebula - The Future Internet Architecture
 
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
 
Architecture and Evaluation on Cooperative Caching In Wireless P2P
Architecture and Evaluation on Cooperative Caching In Wireless  P2PArchitecture and Evaluation on Cooperative Caching In Wireless  P2P
Architecture and Evaluation on Cooperative Caching In Wireless P2P
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networks
 

More from Shahneel Siddiqui

More from Shahneel Siddiqui (10)

Comparison of Wifi, Lifi and Gifi
Comparison of Wifi, Lifi and GifiComparison of Wifi, Lifi and Gifi
Comparison of Wifi, Lifi and Gifi
 
Development of DNS
Development of DNSDevelopment of DNS
Development of DNS
 
Congestion Control in NDN
Congestion Control in NDNCongestion Control in NDN
Congestion Control in NDN
 
The accounting cycle
The accounting cycleThe accounting cycle
The accounting cycle
 
SCR protections
SCR protectionsSCR protections
SCR protections
 
Rewirable Fuses
Rewirable FusesRewirable Fuses
Rewirable Fuses
 
Quine Mc Cluskey Method
Quine Mc Cluskey MethodQuine Mc Cluskey Method
Quine Mc Cluskey Method
 
Multiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsMultiple input & Multiple Output Systems
Multiple input & Multiple Output Systems
 
Laser diodes
Laser diodesLaser diodes
Laser diodes
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Recently uploaded

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdfKamal Acharya
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdfKamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationRobbie Edward Sayers
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdfAhmedHussein950959
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientistgettygaming1
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringC Sai Kiran
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfKamal Acharya
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageRCC Institute of Information Technology
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf884710SadaqatAli
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdfKamal Acharya
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdfKamal Acharya
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopEmre Günaydın
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdfKamal Acharya
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edgePaco Orozco
 

Recently uploaded (20)

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 

Information Centric Networking

  • 2. Agenda ▪ Problems In Current Internet Architecture ▪ How Internet is Evolving ▪ Host Centric Networking ▪ Information Centric Networking ▪ Key functionalities of ICN Networks ▪ Approaches to ICN ▪ Data Oriented Network Architecture (DONA) ▪ Architecture of DONA ▪ Advantages & Applications of ICN 2
  • 3. Problems in Current Internet Architecture ▪ The current internet was designed to address the communication needs of limited computers including communication between mainframe computers. ▪ The basic requirement from the Internet at that time was merely that of forwarding packets of data among a limited number of stationary machines ▪ The tremendous growth of the Internet and the introduction of new applications to fulfill emerging needs, has given rise to new requirements from the current architecture. ▪ Many current and emerging requirements still cannot be addressed adequately by the current Internet. This has raised the question of whether we can continue “patching over patches,” or whether a new clean-slate architectural approach for the Internet is actually needed. 3
  • 4. Networking Evolution ▪ Traditional networking ▪ Host-centric communications addressing end-points ▪ Information-centric networking ▪ Data-centric communications addressing information (e.g., data in context). ▪ Decoupling in space – neither sender nor receiver need to know their partner. ▪ Decoupling in time – “answer” not necessarily directly triggered by “question”, asynchronous communication. 4
  • 10. Key functionalities of ICN Network ▪ Naming ▪ Name Resolution & Data Routing ▪ Caching ▪ Mobility ▪ Security 10
  • 11. Naming ▪ Structure of a Name assigned to a piece of Information to be communicated ▪ In all ICN architectures, names are location dependent ▪ Depending upon the approach, names may range from being flat to hierarchical ▪ Names may or may not be human readable 11
  • 12. Naming ▪ Example of Naming the data ▪ Flat, not human readable identifiers ▪ 1DB76EB8DFD6B0b92A293AADC8421830BDE73CB6 ▪ Hierarchical, meaningful structured names ▪ /nytimes/sport/baseball/mets/game022414/ 12
  • 13. Name Resolution & Data routing ▪ Name resolution involves matching an information name to a provider or source that can supply that information ▪ Data routing involves constructing a path for transferring the information from that provider to the requesting host ▪ Name Resolution & Data Routing can be coupled(or integrated) or decoupled(or independent) ▪ In the coupled approach, the information request is routed to an information provider, which subsequently sends the information to the requesting host by following the reverse path over which the request was forwarded. ▪ In the decoupled approach, the name resolution function does not determine or restrict the path that the data will use from the provider to the subscriber. For example, an independent data routing module may send to the provider a source route to the requesting host. 13
  • 14. Caching ▪ Caching is further divided into on-path and off-path caching. ▪ In on-path caching, the information is cached along the path taken by a name resolution request ▪ In off-path caching the network exploits information cached outside that path ▪ In ICN architectures with decoupled name resolution and data routing, off-path caching must be supported by the name resolution system, which handles caches as regular information publishers. ▪ If name resolution and data transfer are coupled, off-path caching must be supported by the routing system used to forward the requests for information. 14
  • 15. Mobility ▪ Subscriber mobility is intrinsically supported in ICN architectures ▪ Mobile subscribers can just send new subscriptions for information after a handoff. ▪ Publisher mobility is more difficult to support, since the name resolution system (in the coupled approach) or the routing tables (in the decoupled approach) need to be updated. 15
  • 16. Security ▪ This aspect is tightly related to the naming structure Human Readable Names Flat Names Require a trusted agent or a trust relationship with the name resolution system to verify that the returned information corresponds to the requested name flat names can support self- certification not-human readable, thus requiring another trusted system to map human-readable names to flat names. 16
  • 17. DONA (Data Oriented Network Architecture) ▪ Created by UC Berkeley ▪ Changes naming by replacing the hierarchical URLs with flat names ▪ Names in DONA allow users to verify that the received information matches a requested name via cryptographic techniques 17
  • 18. Naming ▪ DONA names are organized around principals ▪ Each principal is associated with public-private key pairs ▪ Names are of the form P:L ▪ P is the cryptographic hash of the principal’s public key and L is a label chosen by the principal, who ensures that these names are unique. ▪ Naming granularity is left to the principals, who are considered to be the owners of the corresponding information. For instance, principals may name either an entire web site or each individual web page within it. ▪ Names are flat, application-independent, location-independent and globally unique 18
  • 19. Name Resolution & Data Routing ▪ Name resolution in DONA is provided by specialized servers called Resolution Handlers (RHs). ▪ There is at least one logical RH at each AS. ▪ RHs are interconnected, forming a hierarchical name resolution service 19
  • 21. Caching ▪ DONA supports on-path caching via the RH infrastructure. ▪ A RH that decides to cache a requested data object can replace the source IP address of an incoming FIND request with its own IP address, before forwarding the message to the next RH. As a result, any response will surely traverse the current RH, thus the data returned will be cached there. ▪ If a subsequent FIND message requesting the same object reaches a caching RH, the RH can directly return the data to the subscriber. 21
  • 22. Mobility ▪ Mobile subscribers can simply issue new FIND messages from their current location, relying on the RH infrastructure to provide them with the closest copy of the information. ▪ Mobile publishers can also unregister and re-register their information when changing their network location 22
  • 23. Security ▪ Names in DONA are self-certifying ▪ They allow the subscriber to verify that the data received matches the name requested. ▪ The design of DONA can either prevent or mitigate a series of attacks to the RH infrastructure ▪ A RH will only accept information registrations by authenticated principals. 23
  • 24. Examples of other Approaches to ICN ▪ NDN ▪ PURSUIT ▪ SAIL ▪ COMET ▪ CONVERGENCE ▪ Mobility First 24
  • 25. Advantages of the ICN approach ▪ Scalable and cost-efficient content distribution ▪ IP traffic to quadruple from 2010 – 2015 ▪ Mobile data traffic increased 26x ▪ Mostly attributed to media traffic that continues to be 90% of global consumer traffic by 2015 25
  • 26. Applications of ICN ▪ ICN has various applications in the field of ▪ Smart Grids ▪ Self Driving Autonomous Vehicles ▪ Internet of Things ▪ Content Distribution ▪ Real-Time Audio & Video Communications 26
  • 27. This was all about Information Centric Networking Thankyou ! 27