SlideShare a Scribd company logo
Named Data Networking 
Lixia Zhang 
UCLA Computer Science Department 
August 12, 2014
NDN Team 
2 
Jeff 
Burke 
Van 
Jacobson 
(architect) 
Lixia 
Zhang 
Beichuan 
Zhang 
Lan 
Wang 
Tarek 
Abdelzaher 
Kim 
Claffy 
Alex 
Halderman 
Patrick 
Crowley 
Christos 
Papadopoulos
Marching Order 
“We would like to become smarter about 
NDN/CCN and other new approaches to 
networking: 
♢ What is it? 
♢ How does it work? 
♢ How will NDN change things? 
♢ What is the current status? 
♢ What are the research needs?” 
3
Multiple new approaches to networking 
♢ Software Defined Networking 
♢ Mobility First 
eXtensible Internet Arch. (XIA) 
NDN: fixing the root cause – the TCP/IP architecture itself 
4
NDN: What Is It? 
5 
TCP/IP NDN 
ApplicaKons 
can 
be 
built 
directly 
on 
top 
of 
NDN 
data 
delivery, 
use 
names 
to 
communicate 
Any 
communicaKon 
media 
that 
can 
provide 
best 
effort 
datagram 
delivery
How does NDN work? 
Best explained by comparison with IP 
Today’s TCP/IP Internet Architecture 
6 
♢ Best effort IP packet delivery to 
destination IP addresses 
The anchor of the architecture: 
IP address space
IP Packet Format 
7 
0 4 8 16 19 31 
Version HLen TOS Length 
Ident Flags Offset 
TTL Protocol Checksum 
Source 
Address 
DesKnaKon 
Address 
source SourceAddr 
address 
destination DestinationAddr 
address 
Options (variable) Pad 
(variable) 
Data
IP’ Node Model 
8 
Accept 
RouKng 
protocol 
IP Packets Self? FIB 
Forward 
✗ 
✗ 
✓ 
✓ 
IP 
prefix 
Next 
hop 
Drop 
One-way traffic, stateless, no storage
How well IP serves applications 
Example 1: content delivery 
♢ Applications request data by names; network 
name packets by IP addresses 
9 
ISP1 ISP2 
ISP3 
Allen 
Beth 
Carl 
Dawn
10 
h[p://abc7.com 
h[p://abc7.com/news/ 
h[p://abc7.com/traffic/ 
h[p://abc7.com/video/ 
h[p://abc7.com/weather/ 
h[p://abc7.com/news/1-­‐killed-­‐in-­‐60-­‐freeway-­‐crash-­‐in-­‐city-­‐of-­‐industry/
How well IP serves applications 
Example 1: content delivery 
♢ Applications request data by names; network 
name packets by IP addresses 
♢ IP delivers data between two end points 
¡ Multiple users may request the same data, 
don’t care where they come from 
11 
ISP1 ISP2 
ISP3 
Allen 
Beth 
Carl 
Server 
farms 
Dawn 
Load 
balancers 
CDN 
boxes
How well IP serves applications 
12 
Example 2: emerging network applications 
“ROOM5 
temperature?” 
ROOM5 
“traffic 
condi6on 
on 
HW405?@LAX” 
“Turn 
on 
air 
condi6oner”
TCP/IP-based IoT architecture 
!%'
#!$$ '# 
!'
)%
'%'#* 
 

(#%
#(%) 
	 
 
 
 	 
13 
IoT applications  management
How does NDN work? 
ApplicaKons 
can 
be 
built 
directly 
on 
top 
of 
NDN 
data 
delivery, 
use 
names 
to 
communicate 
Any 
communicaKon 
media 
that 
can 
provide 
best 
effort 
datagram 
delivery 
14 
INTEREST 
DATA
NDN Packet Formats 
Interest Packet Data Packet 
Name Name 
Selectors MetaInfo 
(order preference, publisher filter, 
exclude filter, …) 
Nonce 
Guiders 
(scope, Interest lifetime) 
(content type, 
freshness period, …) 
Content 
Signature 
signature 
(signature type, key locator, 
signature bits, …) 
15 
Content 
Name 
Content 
Name 
Data 
consumers 
send 
Interest 
packets 
Whoever 
has 
the 
matching 
Data 
packet 
can 
reply
Content Naming 
♢ Names are generated by applications, 
opaque to the network 
¡ Packet granularity 
¡ Hierarchical 
▷ identify content relationship  facilitate aggregation 
¡ Every data packet carries a signature, binding 
the name to the content 
16 
User/applicaKon 
supplied 
name 
/named-­‐data.net/videos/content-­‐centric-­‐networking/version#/segment# 
Globally 
routed 
name 
applicaKon 
ApplicaKon 
instance 
Naming 
convenKon/ 
automaKc
NDN’s node model 
17 
FIB 
Content 
Store 
Pending 
Interest 
Table 
(PIT) 
Downstream 
Upstream
NDN’s node model 
2-way packet flow, fetch, stateful, with storage 
18 
Content 
Store 
Pending 
Interest 
Interest 
Table 
(PIT) 
FIB 
✗ 
✗ 
✓ 
forward 
✓ 
Data 
✓ 
Add 
Incoming 
Face 
✗ 
Drop 
or 
NACK 
Downstream 
Upstream 
Content 
Store 
Pending 
Interest 
Table 
(PIT) 
✗ 
Data 
forward 
✓ 
Discard 
cache
NDN’s stateful forwarding plane enables 
♢ Multicast delivery 
♢ Scalable content distribution 
♢ Multipath forwarding 
♢ Closed Feedback loop 
¡ Built in performance measurement at every 
router 
¡ Congestion control 
19
20 
Forwarding Strategy 
A new component at 
every forwarder 
Takes input from 
♢ FIB: each entry can have a 
rank-ordered list of output 
interfaces 
♢ Forwarding policies 
♢ Measured delay and 
throughput 
forwarding 
strategy 
Airport 
paid 
WiFi 
Cellular 
service
21 
Forwarding Strategy 
Make decisions on 
♢ Which nexthop(s) to use? 
♢ How fast to forward Interests 
to each neighbor node? 
♢ If must drop/NACK due to 
congestion: which Interest? 
♢ What to do when receiving a 
NACK, or an Interest timing 
out? 
♢ etc. 
forwarding 
strategy
How well NDN can serve applications 
Example 1: content delivery 
♢ Network uses app. data names for delivery 
♢ Multiple users request the same data: net 
can retrieve from nearby copy 
¡ Name+data-sig. enables in-network storage 
22 
ISP1 ISP2 
ISP3 
Allen 
Beth 
Carl 
Dawn 
h[p://abc7.com/news/ 
h[p://abc7.com/video/ 
h[p://abc7.com/weather/ 
h[p://abc7.com/news/1-­‐killed-­‐in-­‐60-­‐freeway-­‐crash-­‐in-­‐city-­‐of-­‐industry/
How well NDN can serve applications 
23 
Example 2: emerging network applications 
“ROOM5 
temperature?” 
DATA 
(name|data|signature) 
ROOM5 
traffic 
condi6on 
on 
HW405@LAX? 
INTEREST(/ucla/bldg#/room5/temp) 
“Turn 
on 
air 
condi6oner” 
ROOM5 
INTEREST(/ucla/bldg#/room5/AC-on/sig) 
DATA 
(name|ACK|signature) 
INTEREST(/traffic/LA/HW405/location) 
DATA 
(name|data|signature)
How well NDN can serve applications 
Ex3: enterprise Building Automation  Management (E-BAM) 
Addressing currently spread across 
many layers in the network: 
VLAN 4 
IP 128.97.152.23 
Port 4722 
Universe 2 
Channel 1 
Descriptive name or URI 
NDN namespace design: 
Name 
hierarchy 
follows 
building 
systems, 
e.g., 
building 
= 
room 
 
panel 
= 
sensor 
example: 
/building/room/region/wall_west/downlight 
Crypto keys for signing (or HMAC) follow the same 
hierarchical name space 
24
Security: built into the narrow waist 
♢ Name hierarchy provides context for trust 
♢ Fine-granularity in key/trust management 
♢ Every data packet is signed 
¡ encrypted whenever needed 
¡ Data always secured, whether in motion or at rest 
♢ Keys retrieved in the same way as any other 
content objects 
How to verify a key: trust management 
25 
INTEREST 
DATA
Outline 
♢ What is it? 
♢ How does it work? 
♢ How will NDN change things? 
♢ What is the current status? 
♢ What are the research needs? 
26
How will NDN change things? 
Address the fundamental challenges facing 
Internet today 
♢ Scalability 
♢ Enabling new applications 
♢ Empower edge users 
♢ Security 
27
Enabling scalable applications 
A case study by WashU: broadcast a 
laptop’s video feed to a global audience 
♢ May’13 CAFOE demo: broadcast to 1K 
clients around the world over an NDN net 
♢ Software required 
¡ NDN daemon running on gateways  clients 
¡ ndnvideo application on clients  server 
♢ Management required 
¡ The clients connect to NDN testbed 
¡ The clients know the video name 
28
For comparative study: built a comparable 
broadcast-capable video streaming system 
¡ Distribute video to 100 clients, using HTTP-based 
clients  proxies 
♢ Software required 
¡ VLC used as clients and server 
¡ Proxies run varnish, an HTTP video proxy/cache 
▷ Commercial-grade sw used by vimeo, BBC, and others 
▷ Version 3.0, Nov 2011, first support of video streaming 
♢ Management required 
¡ Proxies must be configured to speak up stream 
¡ VLC clients know video name 
¡ VLC clients must know which proxy to connect to 
29
30
Video Streaming Case Study Summary 
♢ NDN was easier to setup 
¡ HTTP proxies and clients need topology-specific 
configuration 
¡ Using DNS/transparent proxies to avoid this 
would likely be just as complex 
♢ NDN required no tweaking 
¡ HTTP proxies needed to be tweaked to support 
changing loads 
Remember NDN is general-purpose 
31 
Form 
more 
details: 
h[p://named-­‐data.net/publicaKons/fia-­‐2013-­‐ndn-­‐perf-­‐11-­‐15-­‐2013/
How will NDN change things? 
♢ Enable a new generation of applications 
that are difficult to support with today’s 
TCP/IP 
¡ IP enabled a revolution because packet 
switching is fundamentally more general than 
circuit 
¡ NDN as a distribution network: fundamentally 
more general than IP’s point-to-point comm. 
Model 
32
ChronoShare (aka NDN-Dropbox) 
♢ Today: distributed 
file sharing is 
achieved via 
centralized servers 
♢ ChronoShare 
¡ Use direct link to 
reach immediate 
neighbor nodes 
¡ Connect via IP tunnel 
for remote parties 
33
Vehicle Networking Demo @UCLA 
34 
♢ Implemented a Linux-based NDN 
daemon, with enhancement to 
WiFi broadcast support 
♢ Enhanced laptops with WiFi/WiMAX/Cellular 
interfaces 
Car A: Publisher (Owner of dataA) 
Car B: Mule 
Car C: Mule 
Car D: Consumer 
Interest packet 
Data Packet 
Three NDN entities 
• Publisher: A car generating data 
• Consumer: A car requesting data 
• Mule: A car caching and forwarding data 
A car can have more than one role at a time. 
NDN A NDN#backbone# 
NDN B 
Mobile'NDN'with' 
infrastructure' 
support'(over'IP)' 
Mobile'NDN'without' 
infrastructure' 
support'(non:IP)' 
Not 
supported 
by 
NDN 
project
Supporting Climate Applications over NDN 
♢ The climate community recognized the 
importance of structured data naming 
¡ Mostly targeted to file and dataset naming 
¡ Provide naming consistency across distributed 
archives 
♢ The naming can 
be used directly to 
data retrieving over 
NDN 
35 
Supported 
by 
NSF 
Campus Cyberinfrastructure. Form 
more 
details: 
h[p://meeKngs.internet2.edu/media/medialibrary/2014/07/21/20140716-­‐papadopoulos-­‐ndn.pdf
Outline 
♢ What is it? 
♢ How does it work? 
♢ How will NDN change things? 
♢ What is the current status? 
♢ What are the research needs? 
36
The Current Status: NDN team (I) 
♢ Application-driven architecture 
development 
“Solving real problems forces architectural details to 
be filled in and, most importantly, verifies and shapes 
the architectural direction.” 
♢ What we have produced: 
¡ NDN protocol specification 
http://named-data.net/doc/ndn-tlv/ 
¡ NDN platform and libraries with multiple 
language supports (C++, Python, Javascript) 
https://github.com/named-data 
¡ A widely used NDN simulator 
http://ndnsim.net 
37
What NDN team has produced (II) 
♢ A running testbed 
¡ NDN routing prootocols 
¡ NDN testbed grows continuously, across three 
continents 
http://named-data.net/ndn-testbed/ 
38
What NDN team has produced (III) 
♢ A growing set of applications 
¡ Fully distributed apps: NDN-chat, NDN-dropbox 
¡ Vehicular networking 
¡ Scalable streaming 
¡ Enterprise building automation  mgmt. (E-BAM) 
¡ IoT broadly defined 
¡ Open mHealth 
39
40
The current status: broader community 
♢ The 1st NDN Community meeting 
September 4-5 at UCLA 
♢ Program Committee 
Co-Chair: Kim Claffy (UC San Diego) 
Co-Chair: Jeff Burke (UCLA REMAP) 
Giovanna Carofiglio (Alcatel-Lucent) 
Allison Mankin (VeriSign Labs) 
Dave Oran (Cisco) 
Christos Papadopoulos (Colorado State University) 
Eve Schooler (Intel) 
Beichuan Zhang (U. Arizona) 
Lixia Zhang (UCLA) 
41
The current status: broader community 
♢ Academic activities in the ICN area 
(broadly called Information Centric Networking) 
¡ 3 SIGCOMM ICN workshops (2011-2013) 
¡ 2 INFOCOM NOMEN workshops (2012-2013) 
¡ 1st ACM ICN Conference (September 2014) 
NDN team is playing a leadership role (though 
majority of the ongoing efforts seems outside US) 
42
What are the research needs? 
♢ Engaging broader US research community 
to invest into NDN 
♢ Applying NDN to solve real networking 
problems 
¡ The Internet is already information-centric 
▷ youtube, netflix, amazon, facebook 
▷ new generations of applications 
¡ Solving info distribution problems via IP point-to- 
point communication, as we do today, is 
complex  error-prone 
43
Analogy: consider TCP/IP in early 80’s 
♢ Promising new technology 
♢ Largely unknown outside its small community 
♢ Federal funding led TCP/IP to its success 
¡ BSD development, NSFnet 
¡ Various research projects over Internet 
♢ A number of problems exposed and resolved 
through larger scale experimentation 
¡ DNS development 
¡ Congestion control 
¡ Evolution of the routing system 
¡ and a set of others 
44

More Related Content

What's hot

Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
Smriti Tikoo
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
NetProtocol Xpert
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
Zee Haak
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol
SIDDARAMAIAHMC
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
Understanding TCP/IP
Understanding TCP/IPUnderstanding TCP/IP
Understanding TCP/IP
matthew_jenkins
 
Named Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-caseNamed Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-case
Rute C. Sofia
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
Rutwik Jadhav
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
Kushal Sheth
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
Meenakshi Paul
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udprahul kundu
 
Rk 4 signaling system
Rk 4 signaling systemRk 4 signaling system
Rk 4 signaling systemVishal Pandey
 
Sigtran protocol
Sigtran protocolSigtran protocol
Sigtran protocol
Isybel Harto
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniquesGupta6Bindu
 

What's hot (20)

Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Understanding TCP/IP
Understanding TCP/IPUnderstanding TCP/IP
Understanding TCP/IP
 
Named Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-caseNamed Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-case
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Rk 4 signaling system
Rk 4 signaling systemRk 4 signaling system
Rk 4 signaling system
 
Tcp
TcpTcp
Tcp
 
Sigtran protocol
Sigtran protocolSigtran protocol
Sigtran protocol
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 

Viewers also liked

Named data networking
Named data networkingNamed data networking
Named data networking
namedatanetworking
 
Content-Centric Networking: Security
Content-Centric Networking: SecurityContent-Centric Networking: Security
Content-Centric Networking: Security
PARC, a Xerox company
 
Information Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityInformation Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityShi Junxiao
 
What is Content centric networking
What is Content centric networkingWhat is Content centric networking
What is Content centric networking
praison
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryShi Junxiao
 
CCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFNCCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFN
PARC, a Xerox company
 
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Gwendal Simon
 
Information-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issuesInformation-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issuesSAIL
 
Tutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slidesTutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slides
Vinayagam D
 
Big Data Analytics & IoT Challenges
Big Data Analytics & IoT ChallengesBig Data Analytics & IoT Challenges
Big Data Analytics & IoT Challenges
Big Data for You
 
Transport SDN & OpenDaylight Use Cases in Korea
Transport SDN & OpenDaylight Use Cases in KoreaTransport SDN & OpenDaylight Use Cases in Korea
Transport SDN & OpenDaylight Use Cases in Korea
Justin Park
 

Viewers also liked (11)

Named data networking
Named data networkingNamed data networking
Named data networking
 
Content-Centric Networking: Security
Content-Centric Networking: SecurityContent-Centric Networking: Security
Content-Centric Networking: Security
 
Information Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityInformation Centric Networking and Content Addressability
Information Centric Networking and Content Addressability
 
What is Content centric networking
What is Content centric networkingWhat is Content centric networking
What is Content centric networking
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN Repository
 
CCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFNCCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFN
 
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
 
Information-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issuesInformation-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issues
 
Tutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slidesTutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slides
 
Big Data Analytics & IoT Challenges
Big Data Analytics & IoT ChallengesBig Data Analytics & IoT Challenges
Big Data Analytics & IoT Challenges
 
Transport SDN & OpenDaylight Use Cases in Korea
Transport SDN & OpenDaylight Use Cases in KoreaTransport SDN & OpenDaylight Use Cases in Korea
Transport SDN & OpenDaylight Use Cases in Korea
 

Similar to Named data networking. Basic Principle

Prof. Danny Raz, Director, Bell Labs Israel, Nokia
 Prof. Danny Raz, Director, Bell Labs Israel, Nokia  Prof. Danny Raz, Director, Bell Labs Israel, Nokia
Prof. Danny Raz, Director, Bell Labs Israel, Nokia
chiportal
 
Content centric networks
Content centric networksContent centric networks
Content centric networks
Meshingo Jack
 
Delivering High Performance Websites with NGINX
Delivering High Performance Websites with NGINXDelivering High Performance Websites with NGINX
Delivering High Performance Websites with NGINX
NGINX, Inc.
 
Netsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network PlanesNetsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network Planes
Christian Esteve Rothenberg
 
Traffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield SystemsTraffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield Systems
MyNOG
 
Internet Fundamentals for LEAs presentation by Jamie Gillespie for Cyber Pasi...
Internet Fundamentals for LEAs presentation by Jamie Gillespie for Cyber Pasi...Internet Fundamentals for LEAs presentation by Jamie Gillespie for Cyber Pasi...
Internet Fundamentals for LEAs presentation by Jamie Gillespie for Cyber Pasi...
APNIC
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
Fab Fusaro
 
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day ConferenceWhere are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
APNIC
 
Computer Network - Introduction to Networks
Computer Network - Introduction to NetworksComputer Network - Introduction to Networks
Computer Network - Introduction to Networks
Swapnil Agrawal
 
Open vSwitch Implementation Options
Open vSwitch Implementation Options Open vSwitch Implementation Options
Open vSwitch Implementation Options
Netronome
 
NGINX Kubernetes Ingress Controller: Getting Started – EMEA
NGINX Kubernetes Ingress Controller: Getting Started – EMEANGINX Kubernetes Ingress Controller: Getting Started – EMEA
NGINX Kubernetes Ingress Controller: Getting Started – EMEA
Aine Long
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
Cohesive Networks
 
Chapter_3_v8.1.pdf
Chapter_3_v8.1.pdfChapter_3_v8.1.pdf
Chapter_3_v8.1.pdf
LNhi89
 
Network Convergence of Mobile, Broadband and Wi-Fi
Network Convergence of Mobile, Broadband and Wi-FiNetwork Convergence of Mobile, Broadband and Wi-Fi
Network Convergence of Mobile, Broadband and Wi-Fi
3G4G
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
Cohesive Networks
 
WINS: Peering and IXPs
WINS: Peering and IXPsWINS: Peering and IXPs
WINS: Peering and IXPs
APNIC
 

Similar to Named data networking. Basic Principle (20)

Prof. Danny Raz, Director, Bell Labs Israel, Nokia
 Prof. Danny Raz, Director, Bell Labs Israel, Nokia  Prof. Danny Raz, Director, Bell Labs Israel, Nokia
Prof. Danny Raz, Director, Bell Labs Israel, Nokia
 
Content centric networks
Content centric networksContent centric networks
Content centric networks
 
Delivering High Performance Websites with NGINX
Delivering High Performance Websites with NGINXDelivering High Performance Websites with NGINX
Delivering High Performance Websites with NGINX
 
Netsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network PlanesNetsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network Planes
 
Traffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield SystemsTraffic Insight Using Netflow and Deepfield Systems
Traffic Insight Using Netflow and Deepfield Systems
 
Internet Fundamentals for LEAs presentation by Jamie Gillespie for Cyber Pasi...
Internet Fundamentals for LEAs presentation by Jamie Gillespie for Cyber Pasi...Internet Fundamentals for LEAs presentation by Jamie Gillespie for Cyber Pasi...
Internet Fundamentals for LEAs presentation by Jamie Gillespie for Cyber Pasi...
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
 
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day ConferenceWhere are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
Where are we now: IPv6 deployment update - Brunei National IPv6 Day Conference
 
IJCA
IJCAIJCA
IJCA
 
Computer Network - Introduction to Networks
Computer Network - Introduction to NetworksComputer Network - Introduction to Networks
Computer Network - Introduction to Networks
 
Open vSwitch Implementation Options
Open vSwitch Implementation Options Open vSwitch Implementation Options
Open vSwitch Implementation Options
 
NGINX Kubernetes Ingress Controller: Getting Started – EMEA
NGINX Kubernetes Ingress Controller: Getting Started – EMEANGINX Kubernetes Ingress Controller: Getting Started – EMEA
NGINX Kubernetes Ingress Controller: Getting Started – EMEA
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Chapter3 transport
Chapter3 transportChapter3 transport
Chapter3 transport
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
Chapter_3_v8.1.pdf
Chapter_3_v8.1.pdfChapter_3_v8.1.pdf
Chapter_3_v8.1.pdf
 
Network Convergence of Mobile, Broadband and Wi-Fi
Network Convergence of Mobile, Broadband and Wi-FiNetwork Convergence of Mobile, Broadband and Wi-Fi
Network Convergence of Mobile, Broadband and Wi-Fi
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 
WINS: Peering and IXPs
WINS: Peering and IXPsWINS: Peering and IXPs
WINS: Peering and IXPs
 

More from Михаил Климарёв

Шесть способов развалить Стартатп
Шесть способов развалить СтартатпШесть способов развалить Стартатп
Шесть способов развалить Стартатп
Михаил Климарёв
 
Пакет Яровой
Пакет ЯровойПакет Яровой
Пакет Яровой
Михаил Климарёв
 
Платформа для публичного Wi-Fi
Платформа для публичного Wi-FiПлатформа для публичного Wi-Fi
Платформа для публичного Wi-Fi
Михаил Климарёв
 
Обзор технопарков России 2015
Обзор технопарков России 2015Обзор технопарков России 2015
Обзор технопарков России 2015
Михаил Климарёв
 
Отчет об использовании AdBlock в мире 2015
Отчет об использовании AdBlock в мире 2015Отчет об использовании AdBlock в мире 2015
Отчет об использовании AdBlock в мире 2015
Михаил Климарёв
 
Freee Wi-Fi
Freee Wi-FiFreee Wi-Fi
Отчет "Глобальные риски-2015" Всемирный экономический форум (eng)
Отчет "Глобальные риски-2015" Всемирный экономический форум (eng)Отчет "Глобальные риски-2015" Всемирный экономический форум (eng)
Отчет "Глобальные риски-2015" Всемирный экономический форум (eng)
Михаил Климарёв
 
Motorola history timeline
Motorola history timelineMotorola history timeline
Motorola history timeline
Михаил Климарёв
 
Спроси клиента. Немного методов и технологий
Спроси клиента. Немного методов и технологийСпроси клиента. Немного методов и технологий
Спроси клиента. Немного методов и технологий
Михаил Климарёв
 
Презентация лекции по методике дистанционного образования
Презентация лекции по методике дистанционного образованияПрезентация лекции по методике дистанционного образования
Презентация лекции по методике дистанционного образования
Михаил Климарёв
 
Бесплатный Wi-Fi /как заработать на бесплатном сервисе/
Бесплатный Wi-Fi /как заработать на бесплатном сервисе/Бесплатный Wi-Fi /как заработать на бесплатном сервисе/
Бесплатный Wi-Fi /как заработать на бесплатном сервисе/
Михаил Климарёв
 
Global Digital Statistics 2014
Global Digital Statistics 2014Global Digital Statistics 2014
Global Digital Statistics 2014
Михаил Климарёв
 
Отчет (Демо-Версия) "Исследование общественного мнения о качестве услуг инте...
Отчет (Демо-Версия) "Исследование общественного мнения о качестве  услуг инте...Отчет (Демо-Версия) "Исследование общественного мнения о качестве  услуг инте...
Отчет (Демо-Версия) "Исследование общественного мнения о качестве услуг инте...
Михаил Климарёв
 
Стратегия развития ИТ в России на 2014-2020 годы
Стратегия развития ИТ в России на 2014-2020 годыСтратегия развития ИТ в России на 2014-2020 годы
Стратегия развития ИТ в России на 2014-2020 годы
Михаил Климарёв
 
INDEX NAG 2013 spring v1.0 demo
INDEX NAG 2013 spring v1.0 demoINDEX NAG 2013 spring v1.0 demo
INDEX NAG 2013 spring v1.0 demo
Михаил Климарёв
 
кузнецова аудитория тематического тв Tns_07.06
кузнецова аудитория тематического тв Tns_07.06кузнецова аудитория тематического тв Tns_07.06
кузнецова аудитория тематического тв Tns_07.06
Михаил Климарёв
 
Предварительные итоги исследования общественного мнения об услугах интернет-п...
Предварительные итоги исследования общественного мнения об услугах интернет-п...Предварительные итоги исследования общественного мнения об услугах интернет-п...
Предварительные итоги исследования общественного мнения об услугах интернет-п...
Михаил Климарёв
 
Цифровое будущее
Цифровое будущееЦифровое будущее
Цифровое будущее
Михаил Климарёв
 
It strategy
It strategyIt strategy
Опрос "Мобильная связь" 2011
Опрос "Мобильная связь" 2011Опрос "Мобильная связь" 2011
Опрос "Мобильная связь" 2011
Михаил Климарёв
 

More from Михаил Климарёв (20)

Шесть способов развалить Стартатп
Шесть способов развалить СтартатпШесть способов развалить Стартатп
Шесть способов развалить Стартатп
 
Пакет Яровой
Пакет ЯровойПакет Яровой
Пакет Яровой
 
Платформа для публичного Wi-Fi
Платформа для публичного Wi-FiПлатформа для публичного Wi-Fi
Платформа для публичного Wi-Fi
 
Обзор технопарков России 2015
Обзор технопарков России 2015Обзор технопарков России 2015
Обзор технопарков России 2015
 
Отчет об использовании AdBlock в мире 2015
Отчет об использовании AdBlock в мире 2015Отчет об использовании AdBlock в мире 2015
Отчет об использовании AdBlock в мире 2015
 
Freee Wi-Fi
Freee Wi-FiFreee Wi-Fi
Freee Wi-Fi
 
Отчет "Глобальные риски-2015" Всемирный экономический форум (eng)
Отчет "Глобальные риски-2015" Всемирный экономический форум (eng)Отчет "Глобальные риски-2015" Всемирный экономический форум (eng)
Отчет "Глобальные риски-2015" Всемирный экономический форум (eng)
 
Motorola history timeline
Motorola history timelineMotorola history timeline
Motorola history timeline
 
Спроси клиента. Немного методов и технологий
Спроси клиента. Немного методов и технологийСпроси клиента. Немного методов и технологий
Спроси клиента. Немного методов и технологий
 
Презентация лекции по методике дистанционного образования
Презентация лекции по методике дистанционного образованияПрезентация лекции по методике дистанционного образования
Презентация лекции по методике дистанционного образования
 
Бесплатный Wi-Fi /как заработать на бесплатном сервисе/
Бесплатный Wi-Fi /как заработать на бесплатном сервисе/Бесплатный Wi-Fi /как заработать на бесплатном сервисе/
Бесплатный Wi-Fi /как заработать на бесплатном сервисе/
 
Global Digital Statistics 2014
Global Digital Statistics 2014Global Digital Statistics 2014
Global Digital Statistics 2014
 
Отчет (Демо-Версия) "Исследование общественного мнения о качестве услуг инте...
Отчет (Демо-Версия) "Исследование общественного мнения о качестве  услуг инте...Отчет (Демо-Версия) "Исследование общественного мнения о качестве  услуг инте...
Отчет (Демо-Версия) "Исследование общественного мнения о качестве услуг инте...
 
Стратегия развития ИТ в России на 2014-2020 годы
Стратегия развития ИТ в России на 2014-2020 годыСтратегия развития ИТ в России на 2014-2020 годы
Стратегия развития ИТ в России на 2014-2020 годы
 
INDEX NAG 2013 spring v1.0 demo
INDEX NAG 2013 spring v1.0 demoINDEX NAG 2013 spring v1.0 demo
INDEX NAG 2013 spring v1.0 demo
 
кузнецова аудитория тематического тв Tns_07.06
кузнецова аудитория тематического тв Tns_07.06кузнецова аудитория тематического тв Tns_07.06
кузнецова аудитория тематического тв Tns_07.06
 
Предварительные итоги исследования общественного мнения об услугах интернет-п...
Предварительные итоги исследования общественного мнения об услугах интернет-п...Предварительные итоги исследования общественного мнения об услугах интернет-п...
Предварительные итоги исследования общественного мнения об услугах интернет-п...
 
Цифровое будущее
Цифровое будущееЦифровое будущее
Цифровое будущее
 
It strategy
It strategyIt strategy
It strategy
 
Опрос "Мобильная связь" 2011
Опрос "Мобильная связь" 2011Опрос "Мобильная связь" 2011
Опрос "Мобильная связь" 2011
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Named data networking. Basic Principle

  • 1. Named Data Networking Lixia Zhang UCLA Computer Science Department August 12, 2014
  • 2. NDN Team 2 Jeff Burke Van Jacobson (architect) Lixia Zhang Beichuan Zhang Lan Wang Tarek Abdelzaher Kim Claffy Alex Halderman Patrick Crowley Christos Papadopoulos
  • 3. Marching Order “We would like to become smarter about NDN/CCN and other new approaches to networking: ♢ What is it? ♢ How does it work? ♢ How will NDN change things? ♢ What is the current status? ♢ What are the research needs?” 3
  • 4. Multiple new approaches to networking ♢ Software Defined Networking ♢ Mobility First eXtensible Internet Arch. (XIA) NDN: fixing the root cause – the TCP/IP architecture itself 4
  • 5. NDN: What Is It? 5 TCP/IP NDN ApplicaKons can be built directly on top of NDN data delivery, use names to communicate Any communicaKon media that can provide best effort datagram delivery
  • 6. How does NDN work? Best explained by comparison with IP Today’s TCP/IP Internet Architecture 6 ♢ Best effort IP packet delivery to destination IP addresses The anchor of the architecture: IP address space
  • 7. IP Packet Format 7 0 4 8 16 19 31 Version HLen TOS Length Ident Flags Offset TTL Protocol Checksum Source Address DesKnaKon Address source SourceAddr address destination DestinationAddr address Options (variable) Pad (variable) Data
  • 8. IP’ Node Model 8 Accept RouKng protocol IP Packets Self? FIB Forward ✗ ✗ ✓ ✓ IP prefix Next hop Drop One-way traffic, stateless, no storage
  • 9. How well IP serves applications Example 1: content delivery ♢ Applications request data by names; network name packets by IP addresses 9 ISP1 ISP2 ISP3 Allen Beth Carl Dawn
  • 10. 10 h[p://abc7.com h[p://abc7.com/news/ h[p://abc7.com/traffic/ h[p://abc7.com/video/ h[p://abc7.com/weather/ h[p://abc7.com/news/1-­‐killed-­‐in-­‐60-­‐freeway-­‐crash-­‐in-­‐city-­‐of-­‐industry/
  • 11. How well IP serves applications Example 1: content delivery ♢ Applications request data by names; network name packets by IP addresses ♢ IP delivers data between two end points ¡ Multiple users may request the same data, don’t care where they come from 11 ISP1 ISP2 ISP3 Allen Beth Carl Server farms Dawn Load balancers CDN boxes
  • 12. How well IP serves applications 12 Example 2: emerging network applications “ROOM5 temperature?” ROOM5 “traffic condi6on on HW405?@LAX” “Turn on air condi6oner”
  • 16. #(%) 13 IoT applications management
  • 17. How does NDN work? ApplicaKons can be built directly on top of NDN data delivery, use names to communicate Any communicaKon media that can provide best effort datagram delivery 14 INTEREST DATA
  • 18. NDN Packet Formats Interest Packet Data Packet Name Name Selectors MetaInfo (order preference, publisher filter, exclude filter, …) Nonce Guiders (scope, Interest lifetime) (content type, freshness period, …) Content Signature signature (signature type, key locator, signature bits, …) 15 Content Name Content Name Data consumers send Interest packets Whoever has the matching Data packet can reply
  • 19. Content Naming ♢ Names are generated by applications, opaque to the network ¡ Packet granularity ¡ Hierarchical ▷ identify content relationship facilitate aggregation ¡ Every data packet carries a signature, binding the name to the content 16 User/applicaKon supplied name /named-­‐data.net/videos/content-­‐centric-­‐networking/version#/segment# Globally routed name applicaKon ApplicaKon instance Naming convenKon/ automaKc
  • 20. NDN’s node model 17 FIB Content Store Pending Interest Table (PIT) Downstream Upstream
  • 21. NDN’s node model 2-way packet flow, fetch, stateful, with storage 18 Content Store Pending Interest Interest Table (PIT) FIB ✗ ✗ ✓ forward ✓ Data ✓ Add Incoming Face ✗ Drop or NACK Downstream Upstream Content Store Pending Interest Table (PIT) ✗ Data forward ✓ Discard cache
  • 22. NDN’s stateful forwarding plane enables ♢ Multicast delivery ♢ Scalable content distribution ♢ Multipath forwarding ♢ Closed Feedback loop ¡ Built in performance measurement at every router ¡ Congestion control 19
  • 23. 20 Forwarding Strategy A new component at every forwarder Takes input from ♢ FIB: each entry can have a rank-ordered list of output interfaces ♢ Forwarding policies ♢ Measured delay and throughput forwarding strategy Airport paid WiFi Cellular service
  • 24. 21 Forwarding Strategy Make decisions on ♢ Which nexthop(s) to use? ♢ How fast to forward Interests to each neighbor node? ♢ If must drop/NACK due to congestion: which Interest? ♢ What to do when receiving a NACK, or an Interest timing out? ♢ etc. forwarding strategy
  • 25. How well NDN can serve applications Example 1: content delivery ♢ Network uses app. data names for delivery ♢ Multiple users request the same data: net can retrieve from nearby copy ¡ Name+data-sig. enables in-network storage 22 ISP1 ISP2 ISP3 Allen Beth Carl Dawn h[p://abc7.com/news/ h[p://abc7.com/video/ h[p://abc7.com/weather/ h[p://abc7.com/news/1-­‐killed-­‐in-­‐60-­‐freeway-­‐crash-­‐in-­‐city-­‐of-­‐industry/
  • 26. How well NDN can serve applications 23 Example 2: emerging network applications “ROOM5 temperature?” DATA (name|data|signature) ROOM5 traffic condi6on on HW405@LAX? INTEREST(/ucla/bldg#/room5/temp) “Turn on air condi6oner” ROOM5 INTEREST(/ucla/bldg#/room5/AC-on/sig) DATA (name|ACK|signature) INTEREST(/traffic/LA/HW405/location) DATA (name|data|signature)
  • 27. How well NDN can serve applications Ex3: enterprise Building Automation Management (E-BAM) Addressing currently spread across many layers in the network: VLAN 4 IP 128.97.152.23 Port 4722 Universe 2 Channel 1 Descriptive name or URI NDN namespace design: Name hierarchy follows building systems, e.g., building = room panel = sensor example: /building/room/region/wall_west/downlight Crypto keys for signing (or HMAC) follow the same hierarchical name space 24
  • 28. Security: built into the narrow waist ♢ Name hierarchy provides context for trust ♢ Fine-granularity in key/trust management ♢ Every data packet is signed ¡ encrypted whenever needed ¡ Data always secured, whether in motion or at rest ♢ Keys retrieved in the same way as any other content objects How to verify a key: trust management 25 INTEREST DATA
  • 29. Outline ♢ What is it? ♢ How does it work? ♢ How will NDN change things? ♢ What is the current status? ♢ What are the research needs? 26
  • 30. How will NDN change things? Address the fundamental challenges facing Internet today ♢ Scalability ♢ Enabling new applications ♢ Empower edge users ♢ Security 27
  • 31. Enabling scalable applications A case study by WashU: broadcast a laptop’s video feed to a global audience ♢ May’13 CAFOE demo: broadcast to 1K clients around the world over an NDN net ♢ Software required ¡ NDN daemon running on gateways clients ¡ ndnvideo application on clients server ♢ Management required ¡ The clients connect to NDN testbed ¡ The clients know the video name 28
  • 32. For comparative study: built a comparable broadcast-capable video streaming system ¡ Distribute video to 100 clients, using HTTP-based clients proxies ♢ Software required ¡ VLC used as clients and server ¡ Proxies run varnish, an HTTP video proxy/cache ▷ Commercial-grade sw used by vimeo, BBC, and others ▷ Version 3.0, Nov 2011, first support of video streaming ♢ Management required ¡ Proxies must be configured to speak up stream ¡ VLC clients know video name ¡ VLC clients must know which proxy to connect to 29
  • 33. 30
  • 34. Video Streaming Case Study Summary ♢ NDN was easier to setup ¡ HTTP proxies and clients need topology-specific configuration ¡ Using DNS/transparent proxies to avoid this would likely be just as complex ♢ NDN required no tweaking ¡ HTTP proxies needed to be tweaked to support changing loads Remember NDN is general-purpose 31 Form more details: h[p://named-­‐data.net/publicaKons/fia-­‐2013-­‐ndn-­‐perf-­‐11-­‐15-­‐2013/
  • 35. How will NDN change things? ♢ Enable a new generation of applications that are difficult to support with today’s TCP/IP ¡ IP enabled a revolution because packet switching is fundamentally more general than circuit ¡ NDN as a distribution network: fundamentally more general than IP’s point-to-point comm. Model 32
  • 36. ChronoShare (aka NDN-Dropbox) ♢ Today: distributed file sharing is achieved via centralized servers ♢ ChronoShare ¡ Use direct link to reach immediate neighbor nodes ¡ Connect via IP tunnel for remote parties 33
  • 37. Vehicle Networking Demo @UCLA 34 ♢ Implemented a Linux-based NDN daemon, with enhancement to WiFi broadcast support ♢ Enhanced laptops with WiFi/WiMAX/Cellular interfaces Car A: Publisher (Owner of dataA) Car B: Mule Car C: Mule Car D: Consumer Interest packet Data Packet Three NDN entities • Publisher: A car generating data • Consumer: A car requesting data • Mule: A car caching and forwarding data A car can have more than one role at a time. NDN A NDN#backbone# NDN B Mobile'NDN'with' infrastructure' support'(over'IP)' Mobile'NDN'without' infrastructure' support'(non:IP)' Not supported by NDN project
  • 38. Supporting Climate Applications over NDN ♢ The climate community recognized the importance of structured data naming ¡ Mostly targeted to file and dataset naming ¡ Provide naming consistency across distributed archives ♢ The naming can be used directly to data retrieving over NDN 35 Supported by NSF Campus Cyberinfrastructure. Form more details: h[p://meeKngs.internet2.edu/media/medialibrary/2014/07/21/20140716-­‐papadopoulos-­‐ndn.pdf
  • 39. Outline ♢ What is it? ♢ How does it work? ♢ How will NDN change things? ♢ What is the current status? ♢ What are the research needs? 36
  • 40. The Current Status: NDN team (I) ♢ Application-driven architecture development “Solving real problems forces architectural details to be filled in and, most importantly, verifies and shapes the architectural direction.” ♢ What we have produced: ¡ NDN protocol specification http://named-data.net/doc/ndn-tlv/ ¡ NDN platform and libraries with multiple language supports (C++, Python, Javascript) https://github.com/named-data ¡ A widely used NDN simulator http://ndnsim.net 37
  • 41. What NDN team has produced (II) ♢ A running testbed ¡ NDN routing prootocols ¡ NDN testbed grows continuously, across three continents http://named-data.net/ndn-testbed/ 38
  • 42. What NDN team has produced (III) ♢ A growing set of applications ¡ Fully distributed apps: NDN-chat, NDN-dropbox ¡ Vehicular networking ¡ Scalable streaming ¡ Enterprise building automation mgmt. (E-BAM) ¡ IoT broadly defined ¡ Open mHealth 39
  • 43. 40
  • 44. The current status: broader community ♢ The 1st NDN Community meeting September 4-5 at UCLA ♢ Program Committee Co-Chair: Kim Claffy (UC San Diego) Co-Chair: Jeff Burke (UCLA REMAP) Giovanna Carofiglio (Alcatel-Lucent) Allison Mankin (VeriSign Labs) Dave Oran (Cisco) Christos Papadopoulos (Colorado State University) Eve Schooler (Intel) Beichuan Zhang (U. Arizona) Lixia Zhang (UCLA) 41
  • 45. The current status: broader community ♢ Academic activities in the ICN area (broadly called Information Centric Networking) ¡ 3 SIGCOMM ICN workshops (2011-2013) ¡ 2 INFOCOM NOMEN workshops (2012-2013) ¡ 1st ACM ICN Conference (September 2014) NDN team is playing a leadership role (though majority of the ongoing efforts seems outside US) 42
  • 46. What are the research needs? ♢ Engaging broader US research community to invest into NDN ♢ Applying NDN to solve real networking problems ¡ The Internet is already information-centric ▷ youtube, netflix, amazon, facebook ▷ new generations of applications ¡ Solving info distribution problems via IP point-to- point communication, as we do today, is complex error-prone 43
  • 47. Analogy: consider TCP/IP in early 80’s ♢ Promising new technology ♢ Largely unknown outside its small community ♢ Federal funding led TCP/IP to its success ¡ BSD development, NSFnet ¡ Various research projects over Internet ♢ A number of problems exposed and resolved through larger scale experimentation ¡ DNS development ¡ Congestion control ¡ Evolution of the routing system ¡ and a set of others 44
  • 48. The road to a new architecture ♢ Application-driven development ¡ Running code, useful apps, testbed with real traffic ¡ tackling emerging environments and applications where no good IP-based solutions ♢ Incremental Deployment ¡ NDN runs on everything, and everything runs on NDN ¡ Start as an overlay, the same way as IP did 45
  • 49. What to take home ♢ Future of networking lies in recognizing the right communication abstraction ♢ IP conceptualizes communication as between nodes ♢ NDN directly focuses on the outcome: retrieving data 46 Interest data 1.2.3.4 5.6.7.8
  • 50. For More Information NDN project website http://www.named-data.net/ 47