he Named Data Networking (NDN) project proposed an evolution of the IP architecture that generalizes the role of this thin waist, such that packets can name objects other than communication endpoints. More specifically, NDN changes the semantics of network service from delivering the packet to a given destination address to fetching data identified by a given name. The name in an NDN packet can name anything – an endpoint, a data chunk in a movie or a book, a command to turn on some lights, etc. The hope is that this conceptually simple change allows NDN networks to apply almost all of the Internet’s well-tested engineering properties to broader range of problems beyond end-to-end communications.
Named Data Networking, for Computer Communications course presentation
pictures are cropped from that slides:
http://www.slideshare.net/wanderer_from/named-date?qid=1abab327-219a-4b69-a114-46e7f1634d42&v=qf1
http://www.slideshare.net/haroonrashidlone/named-data-networking?qid=bb7c7b7b-ee1b-4c2f-8df5-c4194282e8e2&v=qf1
http://named-data.net/content-centric-networking-video/
https://hal.inria.fr/file/index/docid/785298/filename/AIMS12_tutorial_CCN.pdf
Overview of RARP, BOOTP, DHCP and PXE protocols for dynamic IP address assignment.
Dynamic IP address assignment to a host (or interface) is a common problem in TCP/IP based networks.
Manual and static assignment of IP addresses does not scale well and becomes a labor intensive task with a growing number of hosts.
An early approach for dynamic IP address assignment was RARP (Reverse ARP) which ran directly on the Ethernet protocol layer.
The many problems of RARP such as the inability to be routed between subnets were solved with BOOTP (Bootstrap Protocol).
BOOTP, however, ended to have its own set of limitations like lack of a lease time for IP addresses.
DHCP (Dynamic Host Configuration Protocol) was therefore defined as an extension to BOOTP.
DHCP is backward compatible with BOOTP thus allowing some degree of interoperability between the 2 protocols.
The state-of-the-art protocol for dynamic IP address assignment is, however, is DHCP.
DHCPv6 is an adaption of DHCP for IPv6 based networks.
Named Data Networking, for Computer Communications course presentation
pictures are cropped from that slides:
http://www.slideshare.net/wanderer_from/named-date?qid=1abab327-219a-4b69-a114-46e7f1634d42&v=qf1
http://www.slideshare.net/haroonrashidlone/named-data-networking?qid=bb7c7b7b-ee1b-4c2f-8df5-c4194282e8e2&v=qf1
http://named-data.net/content-centric-networking-video/
https://hal.inria.fr/file/index/docid/785298/filename/AIMS12_tutorial_CCN.pdf
Overview of RARP, BOOTP, DHCP and PXE protocols for dynamic IP address assignment.
Dynamic IP address assignment to a host (or interface) is a common problem in TCP/IP based networks.
Manual and static assignment of IP addresses does not scale well and becomes a labor intensive task with a growing number of hosts.
An early approach for dynamic IP address assignment was RARP (Reverse ARP) which ran directly on the Ethernet protocol layer.
The many problems of RARP such as the inability to be routed between subnets were solved with BOOTP (Bootstrap Protocol).
BOOTP, however, ended to have its own set of limitations like lack of a lease time for IP addresses.
DHCP (Dynamic Host Configuration Protocol) was therefore defined as an extension to BOOTP.
DHCP is backward compatible with BOOTP thus allowing some degree of interoperability between the 2 protocols.
The state-of-the-art protocol for dynamic IP address assignment is, however, is DHCP.
DHCPv6 is an adaption of DHCP for IPv6 based networks.
Data Link Layer
The main goal of this layer is providing reliability to the layers above it.
3.1 DLL Design Issues
What are the services provided by DLL?
3.2 Error Detection and Correction
Adding redundancy in order to find and correct errors.
3.3 DLL Protocols
xxx
3.4 Sliding Window Protocols
xxx
3.5 Protocol Specification and Verification
xxx.
3.6 Examples
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Presented for TTI Vanguard "Shift Happens" conference (http://bit.ly/TTIVshifthappens) visit to PARC, this is a basic overview of just the security aspects of our content-centric networking program.
Data Link Layer
The main goal of this layer is providing reliability to the layers above it.
3.1 DLL Design Issues
What are the services provided by DLL?
3.2 Error Detection and Correction
Adding redundancy in order to find and correct errors.
3.3 DLL Protocols
xxx
3.4 Sliding Window Protocols
xxx
3.5 Protocol Specification and Verification
xxx.
3.6 Examples
INTERNET PROTOCOL (IP)
, Datagram Format
, Fragmentation
, Options
, Security of IPv4 Datagrams
,ICMPv4
, MESSAGES
, Debugging Tools
, ICMP Checksum
, MOBILE IP
, Addressing
, Agents
, Three Phases
, Inefficiency in Mobile IP
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Presented for TTI Vanguard "Shift Happens" conference (http://bit.ly/TTIVshifthappens) visit to PARC, this is a basic overview of just the security aspects of our content-centric networking program.
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...Gwendal Simon
Recent works on Content Centric Networking (CCN) enable the exploitation of the caching resources of the new generation of routers (Content Routers or CR). So far, only a basic Least Recently Used (LRU) strategy implemented on every CRs has been proposed. We introduce here a cooperative caching strategy that has been designed for the treatment of large video streams with on-demand access. This caching strategy addresses the need of Internet Service Provider by halving the cross-domain traffic.
Talks by Carmelo Floridia, Senior Engineer (Data Processing) at BaxEnergy, at the Big Data for You event "Recommendation Systems: Talks & Workshop" (Catania, Feb. 25th, 2017).
Carmelo offers a panorama view of BaxEnergy activities, in particular about Solar power plants, on how they analyse power curves and on how they can provide a real-time monitoring service and forecasting.
Carmelo also describes the primary characteristics of Big Data and Machine Learning, and mention the Microsoft Azure Technology as the one currently used at Bax Energy.
Although one can't see this from the slides, Carmelo gave us a live demonstration of Human model learning (based on kinect)!
Transport SDN & OpenDaylight Use Cases in KoreaJustin Park
In Korea, wired telecommunications carriers have been using assorted transport technologies with diverse network appliances. In order to reduce CAPEX and to avoid vendor lock-in, these transport networks are often comprised of multi-vendor and multi-domain equipment, which leads to high complexity and incompatibility. To overcome this obstacle, research organizations and local telecommunications carriers have been investigating and analyzing the feasibility of transport SDN technology. This talk dishes on the latest trend in Korea telecommunications carriers and the status of their transport SDN technology.
Delivering High Performance Websites with NGINXNGINX, Inc.
NGINX Plus is an easy-to-install, proven software solution to deliver your sites and applications through state-of-the-art intelligent load balancing and high performance acceleration. Improve your servers’ performance, scalability, and reliability with application delivery from NGINX Plus.
NGINX Plus significantly increases application performance during periods of high load with its caching, HTTP connection processing, and efficient offloading of traffic from slow networks. NGINX Plus offers enterprise application load balancing, sophisticated health checks, and more, to balance workloads and avoid user-visible errors.
Check out this webinar to:
* Learn why web performance matters more than ever, in the face of growing application complexity and traffic volumes
* Get the lowdown on the performance challenges of HTTP, and why the real world is so different to a development environment
* Understand why NGINX and NGINX Plus are such popular solutions for mitigating these problems and restoring peak performance
* Look at some real-world deployment examples of accelerating traffic in complex scenarios
Fluid Network Planes – An overview of Network Refactoring and Offloading Trends. Keynote at IEEE Netsoft'19, Paris, 2019.
Keynote Description
10 years have passed since the term SDN was coined in 2009. Since then, the three letter acronym has kept evolving through broadening definitions until our state of affairs where SDN means little unless adequately technically elaborated.
Among the key aspects of SDN is the refactoring of the network control plane. At the crossroads, NFV introduces new ways to refactor network functions, be them control or data plane related.
Despite the softwarization flag of SDN and NFV, the hardware/software continuum is as relevant as ever, offering new offloading opportunities at node and network-wide scales.
In this talk, we will review evolving transformations behind network softwarization with a special focus on network refactoring and offloading trends leading to “fluid network planes”, where the location and HW/SW embodiments of network functions becomes blurry, from the edge to core, from one administrative provider to another, from programmable silicon to portable lightweight virtualized containers.
Netronome's Nick Tausanovitch, VP of Solutions Architecture and Silicon Product Management, Linley Data Center Conference in Santa Clara, CA on February 9, 2016.
NGINX Kubernetes Ingress Controller: Getting Started – EMEAAine Long
This webinar gets you started using the Kubernetes Ingress controllers for NGINX & NGINX Plus to load balance, route, and secure Kubernetes applications
Join this webinar to learn:
- The benefits of using Kubernetes and why it's become the de facto container scheduler
- About the Kubernetes Ingress resource and Ingress controllers
- How to use NGINX and NGINX Plus Ingress controllers to load balance, route traffic to, and secure applications on Kubernetes
- How to monitor the NGINX Plus Ingress controller with Prometheus
Slides for protocol layering and network applicationsjajinekkanti
why and how Protocol layering is done in TCP/IP protocol suite, how multiplexing and demultiplexing can be done in different protocol layers in TCP\IP.
Module 3: Transport layer
Transport layer services, Multiplexing and demultiplexing, User datagram protocol, Transmission control protocol: connection, features, segment, Round-Trip Time estimation and timeout, Flow control, Congestion control, SCTP
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteCohesive Networks
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
About the talk:
Customers don’t care where their cloud networks and infrastructure are, they just want apps to work. This session explains how overlay networks can help to do more networking at the IaaS level and how developers can build on top of overlay networking to extend traditional networks to the cloud.
Network Convergence of Mobile, Broadband and Wi-Fi3G4G
A presentation and video by Ben Toner, Founder & Director, Numerous Networks exploring the convergence of Mobile, Broadband and Wi-Fi
*** SHARED WITH PERMISSION ***
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...Cohesive Networks
The presentation "How overlay networks can make public clouds your global WAN" presented by Ryan Koop on Oct 24, 2013 at LASCON in Austin, TX.
Enterprises, organizations and governments are realizing the benefits of cloud flexibility, cost savings, scalability and connectivity. Yet the traditional approach focuses too much on the underlying infrastructure, instead of the applications.
So who is making solutions for the people who work at the application layer? Are software-defined things secure?
With a focus on application-layer integration, governance and security, overlay networks let developers, and the enterprise apps they work with, use the public clouds as a global WAN network, not just extra storage.
Developers can build on top of overlay networking to extend traditional networks to the cloud with added security such as encryption, IPsec connections, VLANs and VPNs into the public cloud networks.
Prime examples are the previously cost-prohibitive projects can now use public clouds as global points of presence to create cloud WAN to partners and customers.
APNIC Training Delivery Manager for SEA and SA, Shane Hermoso, presents on the importance of peering and IXPs at the Women in Networking series on 17 November 2021
Similar to Named data networking. Basic Principle (20)
In the third annual ad blocking report, PageFair, with the help of Adobe, provides updated data on the scale and growth of ad blocking so"ware usage and highlights the global and regional economic impact associated with it. Additionally, this report explores the early indications surrounding the impact of ad blocking within the mobile advertising space and how mobile will change the ad blocking landscape.
Презентация лекции по методике дистанционного образованияМихаил Климарёв
Название отражает только заданную тему. Презентация - всего лишь слайды, которые требуют камментов автора. Выложена для собственно автора с целью распространения вопросов, но не ответов.
Отчет (Демо-Версия) "Исследование общественного мнения о качестве услуг инте...Михаил Климарёв
Отчет по исследованию общественного мнения потребителей о качестве услуг интернет сервис-провайдеров был создан в результате масштабного опроса пользователей сети Интернет. Всего в исследовании приняло участие 2059 респондентов, проживающих на всей территории Российской Федерации.
Целью исследования было выявление наиболее значимых критериев выбора поставщика услуг интернет сервис-провайдеров (ISP) методом сравнительного анализа результатов опроса.
В исследовании выявлены различия в оценках основных параметров оказания услуг интернет сервис-провайдеров в зависимости от географии проживания респондентов и других социально-демографических условий.
Выявлены наиболее важные факторы, влияющие на выбор потребителями поставщика услуг интернет-доступа.
Определены закономерности и взаимосвязь между различными характеристиками оказания услуг интернет-доступа, такими как: цена, скорость доступа, качество оказания услуг, дополнительные услуги, известность поставщика на рынка (узнаваемость бренда).
Отчет содержит:
· Страниц 151
· Диаграмм 112
· Таблиц 16
Приложения:
1. Наиболее информативные высказывания респондентов по вопросу «Каким провайдером вы не станете пользоваться? Почему?» на 47 страницах (736 высказываний);
2. Наиболее информативные высказывания респондентов по вопросу «Каким должен быть, на ваш взгляд идеальный оператор?» на 106 страницах (1158 высказываний).
(все ответы также оформлены в виде электронной таблицы Excel)
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
2. NDN Team
2
Jeff
Burke
Van
Jacobson
(architect)
Lixia
Zhang
Beichuan
Zhang
Lan
Wang
Tarek
Abdelzaher
Kim
Claffy
Alex
Halderman
Patrick
Crowley
Christos
Papadopoulos
3. Marching Order
“We would like to become smarter about
NDN/CCN and other new approaches to
networking:
♢ What is it?
♢ How does it work?
♢ How will NDN change things?
♢ What is the current status?
♢ What are the research needs?”
3
4. Multiple new approaches to networking
♢ Software Defined Networking
♢ Mobility First
eXtensible Internet Arch. (XIA)
NDN: fixing the root cause – the TCP/IP architecture itself
4
5. NDN: What Is It?
5
TCP/IP NDN
ApplicaKons
can
be
built
directly
on
top
of
NDN
data
delivery,
use
names
to
communicate
Any
communicaKon
media
that
can
provide
best
effort
datagram
delivery
6. How does NDN work?
Best explained by comparison with IP
Today’s TCP/IP Internet Architecture
6
♢ Best effort IP packet delivery to
destination IP addresses
The anchor of the architecture:
IP address space
7. IP Packet Format
7
0 4 8 16 19 31
Version HLen TOS Length
Ident Flags Offset
TTL Protocol Checksum
Source
Address
DesKnaKon
Address
source SourceAddr
address
destination DestinationAddr
address
Options (variable) Pad
(variable)
Data
8. IP’ Node Model
8
Accept
RouKng
protocol
IP Packets Self? FIB
Forward
✗
✗
✓
✓
IP
prefix
Next
hop
Drop
One-way traffic, stateless, no storage
9. How well IP serves applications
Example 1: content delivery
♢ Applications request data by names; network
name packets by IP addresses
9
ISP1 ISP2
ISP3
Allen
Beth
Carl
Dawn
11. How well IP serves applications
Example 1: content delivery
♢ Applications request data by names; network
name packets by IP addresses
♢ IP delivers data between two end points
¡ Multiple users may request the same data,
don’t care where they come from
11
ISP1 ISP2
ISP3
Allen
Beth
Carl
Server
farms
Dawn
Load
balancers
CDN
boxes
12. How well IP serves applications
12
Example 2: emerging network applications
“ROOM5
temperature?”
ROOM5
“traffic
condi6on
on
HW405?@LAX”
“Turn
on
air
condi6oner”
17. How does NDN work?
ApplicaKons
can
be
built
directly
on
top
of
NDN
data
delivery,
use
names
to
communicate
Any
communicaKon
media
that
can
provide
best
effort
datagram
delivery
14
INTEREST
DATA
18. NDN Packet Formats
Interest Packet Data Packet
Name Name
Selectors MetaInfo
(order preference, publisher filter,
exclude filter, …)
Nonce
Guiders
(scope, Interest lifetime)
(content type,
freshness period, …)
Content
Signature
signature
(signature type, key locator,
signature bits, …)
15
Content
Name
Content
Name
Data
consumers
send
Interest
packets
Whoever
has
the
matching
Data
packet
can
reply
19. Content Naming
♢ Names are generated by applications,
opaque to the network
¡ Packet granularity
¡ Hierarchical
▷ identify content relationship facilitate aggregation
¡ Every data packet carries a signature, binding
the name to the content
16
User/applicaKon
supplied
name
/named-‐data.net/videos/content-‐centric-‐networking/version#/segment#
Globally
routed
name
applicaKon
ApplicaKon
instance
Naming
convenKon/
automaKc
20. NDN’s node model
17
FIB
Content
Store
Pending
Interest
Table
(PIT)
Downstream
Upstream
21. NDN’s node model
2-way packet flow, fetch, stateful, with storage
18
Content
Store
Pending
Interest
Interest
Table
(PIT)
FIB
✗
✗
✓
forward
✓
Data
✓
Add
Incoming
Face
✗
Drop
or
NACK
Downstream
Upstream
Content
Store
Pending
Interest
Table
(PIT)
✗
Data
forward
✓
Discard
cache
22. NDN’s stateful forwarding plane enables
♢ Multicast delivery
♢ Scalable content distribution
♢ Multipath forwarding
♢ Closed Feedback loop
¡ Built in performance measurement at every
router
¡ Congestion control
19
23. 20
Forwarding Strategy
A new component at
every forwarder
Takes input from
♢ FIB: each entry can have a
rank-ordered list of output
interfaces
♢ Forwarding policies
♢ Measured delay and
throughput
forwarding
strategy
Airport
paid
WiFi
Cellular
service
24. 21
Forwarding Strategy
Make decisions on
♢ Which nexthop(s) to use?
♢ How fast to forward Interests
to each neighbor node?
♢ If must drop/NACK due to
congestion: which Interest?
♢ What to do when receiving a
NACK, or an Interest timing
out?
♢ etc.
forwarding
strategy
25. How well NDN can serve applications
Example 1: content delivery
♢ Network uses app. data names for delivery
♢ Multiple users request the same data: net
can retrieve from nearby copy
¡ Name+data-sig. enables in-network storage
22
ISP1 ISP2
ISP3
Allen
Beth
Carl
Dawn
h[p://abc7.com/news/
h[p://abc7.com/video/
h[p://abc7.com/weather/
h[p://abc7.com/news/1-‐killed-‐in-‐60-‐freeway-‐crash-‐in-‐city-‐of-‐industry/
26. How well NDN can serve applications
23
Example 2: emerging network applications
“ROOM5
temperature?”
DATA
(name|data|signature)
ROOM5
traffic
condi6on
on
HW405@LAX?
INTEREST(/ucla/bldg#/room5/temp)
“Turn
on
air
condi6oner”
ROOM5
INTEREST(/ucla/bldg#/room5/AC-on/sig)
DATA
(name|ACK|signature)
INTEREST(/traffic/LA/HW405/location)
DATA
(name|data|signature)
27. How well NDN can serve applications
Ex3: enterprise Building Automation Management (E-BAM)
Addressing currently spread across
many layers in the network:
VLAN 4
IP 128.97.152.23
Port 4722
Universe 2
Channel 1
Descriptive name or URI
NDN namespace design:
Name
hierarchy
follows
building
systems,
e.g.,
building
=
room
panel
=
sensor
example:
/building/room/region/wall_west/downlight
Crypto keys for signing (or HMAC) follow the same
hierarchical name space
24
28. Security: built into the narrow waist
♢ Name hierarchy provides context for trust
♢ Fine-granularity in key/trust management
♢ Every data packet is signed
¡ encrypted whenever needed
¡ Data always secured, whether in motion or at rest
♢ Keys retrieved in the same way as any other
content objects
How to verify a key: trust management
25
INTEREST
DATA
29. Outline
♢ What is it?
♢ How does it work?
♢ How will NDN change things?
♢ What is the current status?
♢ What are the research needs?
26
30. How will NDN change things?
Address the fundamental challenges facing
Internet today
♢ Scalability
♢ Enabling new applications
♢ Empower edge users
♢ Security
27
31. Enabling scalable applications
A case study by WashU: broadcast a
laptop’s video feed to a global audience
♢ May’13 CAFOE demo: broadcast to 1K
clients around the world over an NDN net
♢ Software required
¡ NDN daemon running on gateways clients
¡ ndnvideo application on clients server
♢ Management required
¡ The clients connect to NDN testbed
¡ The clients know the video name
28
32. For comparative study: built a comparable
broadcast-capable video streaming system
¡ Distribute video to 100 clients, using HTTP-based
clients proxies
♢ Software required
¡ VLC used as clients and server
¡ Proxies run varnish, an HTTP video proxy/cache
▷ Commercial-grade sw used by vimeo, BBC, and others
▷ Version 3.0, Nov 2011, first support of video streaming
♢ Management required
¡ Proxies must be configured to speak up stream
¡ VLC clients know video name
¡ VLC clients must know which proxy to connect to
29
34. Video Streaming Case Study Summary
♢ NDN was easier to setup
¡ HTTP proxies and clients need topology-specific
configuration
¡ Using DNS/transparent proxies to avoid this
would likely be just as complex
♢ NDN required no tweaking
¡ HTTP proxies needed to be tweaked to support
changing loads
Remember NDN is general-purpose
31
Form
more
details:
h[p://named-‐data.net/publicaKons/fia-‐2013-‐ndn-‐perf-‐11-‐15-‐2013/
35. How will NDN change things?
♢ Enable a new generation of applications
that are difficult to support with today’s
TCP/IP
¡ IP enabled a revolution because packet
switching is fundamentally more general than
circuit
¡ NDN as a distribution network: fundamentally
more general than IP’s point-to-point comm.
Model
32
36. ChronoShare (aka NDN-Dropbox)
♢ Today: distributed
file sharing is
achieved via
centralized servers
♢ ChronoShare
¡ Use direct link to
reach immediate
neighbor nodes
¡ Connect via IP tunnel
for remote parties
33
37. Vehicle Networking Demo @UCLA
34
♢ Implemented a Linux-based NDN
daemon, with enhancement to
WiFi broadcast support
♢ Enhanced laptops with WiFi/WiMAX/Cellular
interfaces
Car A: Publisher (Owner of dataA)
Car B: Mule
Car C: Mule
Car D: Consumer
Interest packet
Data Packet
Three NDN entities
• Publisher: A car generating data
• Consumer: A car requesting data
• Mule: A car caching and forwarding data
A car can have more than one role at a time.
NDN A NDN#backbone#
NDN B
Mobile'NDN'with'
infrastructure'
support'(over'IP)'
Mobile'NDN'without'
infrastructure'
support'(non:IP)'
Not
supported
by
NDN
project
38. Supporting Climate Applications over NDN
♢ The climate community recognized the
importance of structured data naming
¡ Mostly targeted to file and dataset naming
¡ Provide naming consistency across distributed
archives
♢ The naming can
be used directly to
data retrieving over
NDN
35
Supported
by
NSF
Campus Cyberinfrastructure. Form
more
details:
h[p://meeKngs.internet2.edu/media/medialibrary/2014/07/21/20140716-‐papadopoulos-‐ndn.pdf
39. Outline
♢ What is it?
♢ How does it work?
♢ How will NDN change things?
♢ What is the current status?
♢ What are the research needs?
36
40. The Current Status: NDN team (I)
♢ Application-driven architecture
development
“Solving real problems forces architectural details to
be filled in and, most importantly, verifies and shapes
the architectural direction.”
♢ What we have produced:
¡ NDN protocol specification
http://named-data.net/doc/ndn-tlv/
¡ NDN platform and libraries with multiple
language supports (C++, Python, Javascript)
https://github.com/named-data
¡ A widely used NDN simulator
http://ndnsim.net
37
41. What NDN team has produced (II)
♢ A running testbed
¡ NDN routing prootocols
¡ NDN testbed grows continuously, across three
continents
http://named-data.net/ndn-testbed/
38
42. What NDN team has produced (III)
♢ A growing set of applications
¡ Fully distributed apps: NDN-chat, NDN-dropbox
¡ Vehicular networking
¡ Scalable streaming
¡ Enterprise building automation mgmt. (E-BAM)
¡ IoT broadly defined
¡ Open mHealth
39
44. The current status: broader community
♢ The 1st NDN Community meeting
September 4-5 at UCLA
♢ Program Committee
Co-Chair: Kim Claffy (UC San Diego)
Co-Chair: Jeff Burke (UCLA REMAP)
Giovanna Carofiglio (Alcatel-Lucent)
Allison Mankin (VeriSign Labs)
Dave Oran (Cisco)
Christos Papadopoulos (Colorado State University)
Eve Schooler (Intel)
Beichuan Zhang (U. Arizona)
Lixia Zhang (UCLA)
41
45. The current status: broader community
♢ Academic activities in the ICN area
(broadly called Information Centric Networking)
¡ 3 SIGCOMM ICN workshops (2011-2013)
¡ 2 INFOCOM NOMEN workshops (2012-2013)
¡ 1st ACM ICN Conference (September 2014)
NDN team is playing a leadership role (though
majority of the ongoing efforts seems outside US)
42
46. What are the research needs?
♢ Engaging broader US research community
to invest into NDN
♢ Applying NDN to solve real networking
problems
¡ The Internet is already information-centric
▷ youtube, netflix, amazon, facebook
▷ new generations of applications
¡ Solving info distribution problems via IP point-to-
point communication, as we do today, is
complex error-prone
43
47. Analogy: consider TCP/IP in early 80’s
♢ Promising new technology
♢ Largely unknown outside its small community
♢ Federal funding led TCP/IP to its success
¡ BSD development, NSFnet
¡ Various research projects over Internet
♢ A number of problems exposed and resolved
through larger scale experimentation
¡ DNS development
¡ Congestion control
¡ Evolution of the routing system
¡ and a set of others
44
48. The road to a new architecture
♢ Application-driven development
¡ Running code, useful apps, testbed with real
traffic
¡ tackling emerging environments and
applications where no good IP-based solutions
♢ Incremental Deployment
¡ NDN runs on everything, and everything runs
on NDN
¡ Start as an overlay, the same way as IP did
45
49. What to take home
♢ Future of networking lies in recognizing the
right communication abstraction
♢ IP conceptualizes
communication as
between nodes
♢ NDN directly focuses on
the outcome: retrieving
data
46
Interest
data
1.2.3.4
5.6.7.8