SlideShare a Scribd company logo
Information-centric networking
– and relation to some legal and regulatory issues



Bengt Ahlgren
SICS

                  SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Content distribution
• CDNs
• Peer-to-peer
     – User driven
     – Service provider
       driven
• Making use of
  storage for caching
     – In one way or another



2011-09-02 2         SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Evolution of networking
                                                                Information-centric
    Today’s Internet                                                 network
        Focuses on                                                   Focuses on
Conversations between Hosts                                  Dissemination of Information
                                                                       objects
 Host-centric abstraction            Evolution
 Who to communicate with                                    Information-centric abstraction
                               Web     CDN      P2P              What to communicate




                                 In today’s Internet,
                               accessing information is
                              the dominating use case!


  2011-09-02 3                  SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Host-centric networking
                                                        Trusted
          Connect to                                     Server
         Server X and
         get object B


                                                                     Server X



                                                                          B



                                                                   Secure
                                                                 Connection


2011-09-02 4            SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Information-centric networking

                                                                   A
                   Trustable                      D
                    copy of
                    object B
                                                 B                      C
                                                               E


               Get object B

                                                                       D
                                   B             B                              B
                                            E                               E
                              A                            A

                                                 A                              A
                                       C                               D

                Untrusted                        Untrusted
2011-09-02 5                   SCALABLE & ADAPTIVE INTERNET SOLUTIONS
               connection                          host
ICN main components

  Name resolution/routing                                                 Security
                                                                           Security
   Name resolution/routing                                         - - tied to the information
                                                                     tied to the information
       - - scalability main concern
         scalability main concern
                                                                         - - and the names
                                                                           and the names

                             Naming scheme for objects
                              Naming scheme for objects
                                        - - flat or hierarchical
                                          flat or hierarchical




                                 Forwarding/transport
                                  Forwarding/transport
                                      - - with in-network caching
                                        with in-network caching




2011-09-02 6                  SCALABLE & ADAPTIVE INTERNET SOLUTIONS
ICN naming
• Naming today:
     – Hierarchical (aggregatable) IP addresses
     – Hierarchical DNS names
     – URL/URIs name “stuff”, but includes one of the above!
           • So names are largely tied to hosts, that is, name the
             container, not the actual content
• New: names for information objects themselves
     – Names for the information independent of the container
     – Need security directly tied to the name and object
     – Hierarchical or flat namespace?
           • I.e., aggregatable or non-aggregatable
           • Consequences for resolution/routing
2011-09-02 7               SCALABLE & ADAPTIVE INTERNET SOLUTIONS
NetInf naming scheme
               Type          A = Hash(PKIO)            L = {identifier attr.}

 Structure:
     – Type: Defines the format
           • e.g. Hash algorithm used (SHA1, MD5, …)
     – Authenticator (A): Binds the ID of the IO to a public key PK
           • Hash function used to compress length of PK
     – Label (L): Identifying individual object published by Authenticator
           • contains a number of identifier attributes associated with an IO
     – (A, L) combination needs to be globally unique
 Supporting the combination of:
     – name persistence, self-certification, and owner authentication
     – for objects that change content, location, or owner
     – without need to trust the delivering host
 Internet-draft: draft-farrell-ni
2011-09-02 8                   SCALABLE & ADAPTIVE INTERNET SOLUTIONS
CCN naming scheme




• Hierarchical names rooted in publisher prefixes
     – Includes segmentation (packets!) and versioning
• Makes (some) routing aggregation possible
• Need to establish trust in signing key to verify integrity
•   (drawing from “Networking Named Data” paper at CoNEXT 2009 by Van Jacobson et al)

2011-09-02 9                  SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Name resolution / routing –
scalability
• Main scalability issue:
    – Number of information objects
          • bookkeeping needed to keep track of them
    – Cf. Internet: IP network prefixes in backbone & BGP convergence
• How many information objects?
• Some numbers to compare with:
    – One trillion (1,000,000,000,000) unique web URLs (Google 2008)
    – 26 billion web pages (http://www.worldwidewebsize.com/)
    – 119 million second-level domain names in the DNS (Dec 2010)
          • Applicable if we can aggregate information objects on the publisher
            level
    – 60.000 AS numbers, of which 34.000 announced in BGP

2011-09-02 10               SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Name resolution / routing
• Two main options:
     – Name resolution translating into another, routable,
       namespace
           • e.g., IP
     – Routing directly on information object names
           • sometimes called “name-based routing”
     – (Possible with hybrid schemes)
• Scalability depends on namespace
     – Flat or hierarchical


2011-09-02 11             SCALABLE & ADAPTIVE INTERNET SOLUTIONS
ICN application service
(“socket API”)
                            sender               receiver


                publish()

                                                            retrieve(object ID)

                                                            object




• “Publish/subscribe-like”
• Most approaches defines a synchronous
  “retrieve” instead of asynchronous “subscribe”


2011-09-02 12                   SCALABLE & ADAPTIVE INTERNET SOLUTIONS
ICN vs current networks
• Caches integrated in the network infrastructure
     – Combines today's CDNs and user caching (p2p) in
       the basic network service
• Network service in terms of named data objects
     – No direct host addressing




2011-09-02 13        SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Legal implications of caching

(a layman view)




2011-09-02 14     SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Copyright
• Copyright and distribution agreements currently do not seem to
  allow for general in-network caching
     – Distribution agreements need to change? Is this likely?
• What exactly differs packet buffering from caching?
     – Both stores content in a memory
• Can some mechanism in the network support the copyright
  agreements?
     – I.e., mechanisms that have legal meaning
     – (I do not believe in enforcing mechanisms – it has to be combined with contracts
       and/or legislation)
• Example mechanisms:
     – Access counting, distribution constraints, time-to-live
• Or, is the only solution to encrypt copyrighted material and replace
  the problem with key distribution
     – as is done for satellite TV
2011-09-02 15                  SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Responsibility for illegal content
• To what extent is the cache owner responsible
  for the cached content?
     – e.g., if it is illegal for some reason?
• Dependent on the time in the cache?
• (Anonymity and content control later...)




2011-09-02 16          SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Business issues
• Some current ISP business models work against
  in-network caching
     – Need to pay for delivering data to someone else
     – Delivering data from your own cache to others incurs
       a cost!
• Shouldn't there instead be value in providing
  content that users want?




2011-09-02 17        SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Discussion!




2011-09-02 18   SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Problems in host-centric
networks
 No common persistent naming scheme for information
     – URLs and IPs overloaded with locator and identifier functionality
           • Moving information = changing it‘s name („404 file not found“ errors)
     => Use flat namespace for persistent and secure identification
 Information dissemination is inefficient
     – Can‘t benefit from existing copies (e.g. local copy on client)
           • Also true for Content Delivery Networks (e.g. Akamai)
     – No “anycast”: e.g., get “nearest” copy
     – Problems like Flash-Crowd effect, Denial of Service, …
     => Add storage for caching as part of the infrastructure
 Security is host-centric
     – Mainly based on securing channels (encryption) and trusting servers
       (authentication)
     – Can’t trust a copy received from an untrusted server

                     Problems can be solved in a consistent manner
                         via an information-centric architecture
2011-09-02 19                     SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Flat namespace
• Name resolution:
     – Distributed hashtables (DHTs) only known technology
       that scales
     – Make use of publisher prefixes to increase scalability
• Routing:
     – Hard!
     – DHTs can be used here too (?)
     – “Routing hints” proposed as optimisation
           • ~ source route or topological address
           • Can be tied to publisher prefixes
           • Can be retrieved from a name resolution service
2011-09-02 20             SCALABLE & ADAPTIVE INTERNET SOLUTIONS
Hierarchical namespace
• Name resolution:
     – DNS type design scales well (?)
• Routing:
     – Problem similar to BGP, but harder




2011-09-02 21        SCALABLE & ADAPTIVE INTERNET SOLUTIONS

More Related Content

What's hot

IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
ArunKumar Subbiah
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
Pavan Kumar Sindgi
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
@zenafaris91
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
JAIGANESH SEKAR
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
Alan Percy
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
Rajesh Piryani
 
What is Content centric networking
What is Content centric networkingWhat is Content centric networking
What is Content centric networking
praison
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
priya Nithya
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
yousef emami
 
03. osi reference-layer
03. osi reference-layer03. osi reference-layer
03. osi reference-layer
Akshay Bhardwaj
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
KalpanaC14
 
Les Vpn
Les VpnLes Vpn
Les Vpn
medalaa
 
Protocole OSPF
Protocole OSPFProtocole OSPF
Protocole OSPF
Thomas Moegli
 
DCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsDCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packets
rajshreemuthiah
 
MPLS
MPLSMPLS
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
kriz5
 
Ccna day1
Ccna day1Ccna day1

What's hot (20)

IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
What is Content centric networking
What is Content centric networkingWhat is Content centric networking
What is Content centric networking
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
03. osi reference-layer
03. osi reference-layer03. osi reference-layer
03. osi reference-layer
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
 
Les Vpn
Les VpnLes Vpn
Les Vpn
 
Protocole OSPF
Protocole OSPFProtocole OSPF
Protocole OSPF
 
DCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packetsDCHP,NAT,forwarding of ip packets
DCHP,NAT,forwarding of ip packets
 
MPLS
MPLSMPLS
MPLS
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 

Similar to Information-centric networking and relaton to legal and regulatory issues

Netflix Velocity Conference 2011
Netflix Velocity Conference 2011Netflix Velocity Conference 2011
Netflix Velocity Conference 2011
Adrian Cockcroft
 
Intuit CTOF 2011 - Netflix for Mobile in the Cloud
Intuit CTOF 2011 - Netflix for Mobile in the CloudIntuit CTOF 2011 - Netflix for Mobile in the Cloud
Intuit CTOF 2011 - Netflix for Mobile in the Cloud
Sid Anand
 
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...Future Cities Project
 
Cloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloudCloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloud
SAIL
 
The Synergy Between the Object Database, Graph Database, Cloud Computing and ...
The Synergy Between the Object Database, Graph Database, Cloud Computing and ...The Synergy Between the Object Database, Graph Database, Cloud Computing and ...
The Synergy Between the Object Database, Graph Database, Cloud Computing and ...
InfiniteGraph
 
Ebs architecture con9036_pdf_9036_0001
Ebs architecture con9036_pdf_9036_0001Ebs architecture con9036_pdf_9036_0001
Ebs architecture con9036_pdf_9036_0001jucaab
 
Restfs
RestfsRestfs
Migrating Netflix from Datacenter Oracle to Global Cassandra
Migrating Netflix from Datacenter Oracle to Global CassandraMigrating Netflix from Datacenter Oracle to Global Cassandra
Migrating Netflix from Datacenter Oracle to Global Cassandra
Adrian Cockcroft
 
Oracle Cloud Infraestructure Update
Oracle Cloud Infraestructure UpdateOracle Cloud Infraestructure Update
Oracle Cloud Infraestructure Update
RaphaelCampelo
 
Oci meetup v1
Oci meetup v1Oci meetup v1
Oci meetup v1
RaphaelCampelo
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
Cisco Service Provider Mobility
 
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
Infoblox Cloud Solutions - Cisco Mid-Atlantic User GroupInfoblox Cloud Solutions - Cisco Mid-Atlantic User Group
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
NetCraftsmen
 
Netflix in the cloud 2011
Netflix in the cloud 2011Netflix in the cloud 2011
Netflix in the cloud 2011
Adrian Cockcroft
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environment
deepers
 
Hybrid and Private Cloud Architectures
Hybrid and Private Cloud ArchitecturesHybrid and Private Cloud Architectures
Hybrid and Private Cloud ArchitecturesDavid Linthicum
 
2011 boston open stack meetup 11 29_r1jmm
2011 boston open stack meetup 11 29_r1jmm2011 boston open stack meetup 11 29_r1jmm
2011 boston open stack meetup 11 29_r1jmmDellCloudEdge
 
AWS Partner Presentation-Sonian-AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation-Sonian-AWS Cloud Storage for the Enterprise 2012AWS Partner Presentation-Sonian-AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation-Sonian-AWS Cloud Storage for the Enterprise 2012
Amazon Web Services
 
Netflix web-adrian-qcon
Netflix web-adrian-qconNetflix web-adrian-qcon
Netflix web-adrian-qconYiwei Ma
 
VMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid ITVMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid IT
Benjamin Shrive
 
A constructive review of in network caching a core functionality of icn slides
A constructive review of in network caching a core functionality of icn slidesA constructive review of in network caching a core functionality of icn slides
A constructive review of in network caching a core functionality of icn slides
Anshuman Kalla
 

Similar to Information-centric networking and relaton to legal and regulatory issues (20)

Netflix Velocity Conference 2011
Netflix Velocity Conference 2011Netflix Velocity Conference 2011
Netflix Velocity Conference 2011
 
Intuit CTOF 2011 - Netflix for Mobile in the Cloud
Intuit CTOF 2011 - Netflix for Mobile in the CloudIntuit CTOF 2011 - Netflix for Mobile in the Cloud
Intuit CTOF 2011 - Netflix for Mobile in the Cloud
 
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
Future Cities Conference´13 / Peter Steenkiste - "The eXpressive Internet Arc...
 
Cloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloudCloud Networking: Network aspects of the cloud
Cloud Networking: Network aspects of the cloud
 
The Synergy Between the Object Database, Graph Database, Cloud Computing and ...
The Synergy Between the Object Database, Graph Database, Cloud Computing and ...The Synergy Between the Object Database, Graph Database, Cloud Computing and ...
The Synergy Between the Object Database, Graph Database, Cloud Computing and ...
 
Ebs architecture con9036_pdf_9036_0001
Ebs architecture con9036_pdf_9036_0001Ebs architecture con9036_pdf_9036_0001
Ebs architecture con9036_pdf_9036_0001
 
Restfs
RestfsRestfs
Restfs
 
Migrating Netflix from Datacenter Oracle to Global Cassandra
Migrating Netflix from Datacenter Oracle to Global CassandraMigrating Netflix from Datacenter Oracle to Global Cassandra
Migrating Netflix from Datacenter Oracle to Global Cassandra
 
Oracle Cloud Infraestructure Update
Oracle Cloud Infraestructure UpdateOracle Cloud Infraestructure Update
Oracle Cloud Infraestructure Update
 
Oci meetup v1
Oci meetup v1Oci meetup v1
Oci meetup v1
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
Infoblox Cloud Solutions - Cisco Mid-Atlantic User GroupInfoblox Cloud Solutions - Cisco Mid-Atlantic User Group
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
 
Netflix in the cloud 2011
Netflix in the cloud 2011Netflix in the cloud 2011
Netflix in the cloud 2011
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environment
 
Hybrid and Private Cloud Architectures
Hybrid and Private Cloud ArchitecturesHybrid and Private Cloud Architectures
Hybrid and Private Cloud Architectures
 
2011 boston open stack meetup 11 29_r1jmm
2011 boston open stack meetup 11 29_r1jmm2011 boston open stack meetup 11 29_r1jmm
2011 boston open stack meetup 11 29_r1jmm
 
AWS Partner Presentation-Sonian-AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation-Sonian-AWS Cloud Storage for the Enterprise 2012AWS Partner Presentation-Sonian-AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation-Sonian-AWS Cloud Storage for the Enterprise 2012
 
Netflix web-adrian-qcon
Netflix web-adrian-qconNetflix web-adrian-qcon
Netflix web-adrian-qcon
 
VMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid ITVMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid IT
 
A constructive review of in network caching a core functionality of icn slides
A constructive review of in network caching a core functionality of icn slidesA constructive review of in network caching a core functionality of icn slides
A constructive review of in network caching a core functionality of icn slides
 

More from SAIL

Agenda 120213 Future Media Distribuation using Information Centric Networks
Agenda 120213 Future Media Distribuation using Information Centric NetworksAgenda 120213 Future Media Distribuation using Information Centric Networks
Agenda 120213 Future Media Distribuation using Information Centric NetworksSAIL
 
SAIL: demo handout at Future Media Distribution using Information Centric Net...
SAIL: demo handout at Future Media Distribution using Information Centric Net...SAIL: demo handout at Future Media Distribution using Information Centric Net...
SAIL: demo handout at Future Media Distribution using Information Centric Net...SAIL
 
Cloud Interoperability Workshop Introduction
Cloud Interoperability Workshop IntroductionCloud Interoperability Workshop Introduction
Cloud Interoperability Workshop Introduction
SAIL
 
CloNe Interoperability Challenges
CloNe Interoperability ChallengesCloNe Interoperability Challenges
CloNe Interoperability Challenges
SAIL
 
Introduction to SAIL regulatory workshop 110902
Introduction to SAIL regulatory workshop 110902Introduction to SAIL regulatory workshop 110902
Introduction to SAIL regulatory workshop 110902SAIL
 
SAIL presentation at FuNeMS 2011
SAIL presentation at FuNeMS 2011SAIL presentation at FuNeMS 2011
SAIL presentation at FuNeMS 2011SAIL
 
Sail project presentation 101019
Sail project presentation 101019Sail project presentation 101019
Sail project presentation 101019
SAIL
 
Sail regulation governance 101018
Sail regulation governance 101018Sail regulation governance 101018
Sail regulation governance 101018
SAIL
 
Price of Quality, 6th concertation meeting
Price of Quality, 6th concertation meetingPrice of Quality, 6th concertation meeting
Price of Quality, 6th concertation meeting
SAIL
 

More from SAIL (9)

Agenda 120213 Future Media Distribuation using Information Centric Networks
Agenda 120213 Future Media Distribuation using Information Centric NetworksAgenda 120213 Future Media Distribuation using Information Centric Networks
Agenda 120213 Future Media Distribuation using Information Centric Networks
 
SAIL: demo handout at Future Media Distribution using Information Centric Net...
SAIL: demo handout at Future Media Distribution using Information Centric Net...SAIL: demo handout at Future Media Distribution using Information Centric Net...
SAIL: demo handout at Future Media Distribution using Information Centric Net...
 
Cloud Interoperability Workshop Introduction
Cloud Interoperability Workshop IntroductionCloud Interoperability Workshop Introduction
Cloud Interoperability Workshop Introduction
 
CloNe Interoperability Challenges
CloNe Interoperability ChallengesCloNe Interoperability Challenges
CloNe Interoperability Challenges
 
Introduction to SAIL regulatory workshop 110902
Introduction to SAIL regulatory workshop 110902Introduction to SAIL regulatory workshop 110902
Introduction to SAIL regulatory workshop 110902
 
SAIL presentation at FuNeMS 2011
SAIL presentation at FuNeMS 2011SAIL presentation at FuNeMS 2011
SAIL presentation at FuNeMS 2011
 
Sail project presentation 101019
Sail project presentation 101019Sail project presentation 101019
Sail project presentation 101019
 
Sail regulation governance 101018
Sail regulation governance 101018Sail regulation governance 101018
Sail regulation governance 101018
 
Price of Quality, 6th concertation meeting
Price of Quality, 6th concertation meetingPrice of Quality, 6th concertation meeting
Price of Quality, 6th concertation meeting
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Information-centric networking and relaton to legal and regulatory issues

  • 1. Information-centric networking – and relation to some legal and regulatory issues Bengt Ahlgren SICS SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 2. Content distribution • CDNs • Peer-to-peer – User driven – Service provider driven • Making use of storage for caching – In one way or another 2011-09-02 2 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 3. Evolution of networking Information-centric Today’s Internet network Focuses on Focuses on Conversations between Hosts Dissemination of Information objects Host-centric abstraction Evolution Who to communicate with Information-centric abstraction Web CDN P2P What to communicate In today’s Internet, accessing information is the dominating use case! 2011-09-02 3 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 4. Host-centric networking Trusted Connect to Server Server X and get object B Server X B Secure Connection 2011-09-02 4 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 5. Information-centric networking A Trustable D copy of object B B C E Get object B D B B B E E A A A A C D Untrusted Untrusted 2011-09-02 5 SCALABLE & ADAPTIVE INTERNET SOLUTIONS connection host
  • 6. ICN main components Name resolution/routing Security Security Name resolution/routing - - tied to the information tied to the information - - scalability main concern scalability main concern - - and the names and the names Naming scheme for objects Naming scheme for objects - - flat or hierarchical flat or hierarchical Forwarding/transport Forwarding/transport - - with in-network caching with in-network caching 2011-09-02 6 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 7. ICN naming • Naming today: – Hierarchical (aggregatable) IP addresses – Hierarchical DNS names – URL/URIs name “stuff”, but includes one of the above! • So names are largely tied to hosts, that is, name the container, not the actual content • New: names for information objects themselves – Names for the information independent of the container – Need security directly tied to the name and object – Hierarchical or flat namespace? • I.e., aggregatable or non-aggregatable • Consequences for resolution/routing 2011-09-02 7 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 8. NetInf naming scheme Type A = Hash(PKIO) L = {identifier attr.}  Structure: – Type: Defines the format • e.g. Hash algorithm used (SHA1, MD5, …) – Authenticator (A): Binds the ID of the IO to a public key PK • Hash function used to compress length of PK – Label (L): Identifying individual object published by Authenticator • contains a number of identifier attributes associated with an IO – (A, L) combination needs to be globally unique  Supporting the combination of: – name persistence, self-certification, and owner authentication – for objects that change content, location, or owner – without need to trust the delivering host  Internet-draft: draft-farrell-ni 2011-09-02 8 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 9. CCN naming scheme • Hierarchical names rooted in publisher prefixes – Includes segmentation (packets!) and versioning • Makes (some) routing aggregation possible • Need to establish trust in signing key to verify integrity • (drawing from “Networking Named Data” paper at CoNEXT 2009 by Van Jacobson et al) 2011-09-02 9 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 10. Name resolution / routing – scalability • Main scalability issue: – Number of information objects • bookkeeping needed to keep track of them – Cf. Internet: IP network prefixes in backbone & BGP convergence • How many information objects? • Some numbers to compare with: – One trillion (1,000,000,000,000) unique web URLs (Google 2008) – 26 billion web pages (http://www.worldwidewebsize.com/) – 119 million second-level domain names in the DNS (Dec 2010) • Applicable if we can aggregate information objects on the publisher level – 60.000 AS numbers, of which 34.000 announced in BGP 2011-09-02 10 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 11. Name resolution / routing • Two main options: – Name resolution translating into another, routable, namespace • e.g., IP – Routing directly on information object names • sometimes called “name-based routing” – (Possible with hybrid schemes) • Scalability depends on namespace – Flat or hierarchical 2011-09-02 11 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 12. ICN application service (“socket API”) sender receiver publish() retrieve(object ID) object • “Publish/subscribe-like” • Most approaches defines a synchronous “retrieve” instead of asynchronous “subscribe” 2011-09-02 12 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 13. ICN vs current networks • Caches integrated in the network infrastructure – Combines today's CDNs and user caching (p2p) in the basic network service • Network service in terms of named data objects – No direct host addressing 2011-09-02 13 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 14. Legal implications of caching (a layman view) 2011-09-02 14 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 15. Copyright • Copyright and distribution agreements currently do not seem to allow for general in-network caching – Distribution agreements need to change? Is this likely? • What exactly differs packet buffering from caching? – Both stores content in a memory • Can some mechanism in the network support the copyright agreements? – I.e., mechanisms that have legal meaning – (I do not believe in enforcing mechanisms – it has to be combined with contracts and/or legislation) • Example mechanisms: – Access counting, distribution constraints, time-to-live • Or, is the only solution to encrypt copyrighted material and replace the problem with key distribution – as is done for satellite TV 2011-09-02 15 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 16. Responsibility for illegal content • To what extent is the cache owner responsible for the cached content? – e.g., if it is illegal for some reason? • Dependent on the time in the cache? • (Anonymity and content control later...) 2011-09-02 16 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 17. Business issues • Some current ISP business models work against in-network caching – Need to pay for delivering data to someone else – Delivering data from your own cache to others incurs a cost! • Shouldn't there instead be value in providing content that users want? 2011-09-02 17 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 18. Discussion! 2011-09-02 18 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 19. Problems in host-centric networks  No common persistent naming scheme for information – URLs and IPs overloaded with locator and identifier functionality • Moving information = changing it‘s name („404 file not found“ errors) => Use flat namespace for persistent and secure identification  Information dissemination is inefficient – Can‘t benefit from existing copies (e.g. local copy on client) • Also true for Content Delivery Networks (e.g. Akamai) – No “anycast”: e.g., get “nearest” copy – Problems like Flash-Crowd effect, Denial of Service, … => Add storage for caching as part of the infrastructure  Security is host-centric – Mainly based on securing channels (encryption) and trusting servers (authentication) – Can’t trust a copy received from an untrusted server Problems can be solved in a consistent manner via an information-centric architecture 2011-09-02 19 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 20. Flat namespace • Name resolution: – Distributed hashtables (DHTs) only known technology that scales – Make use of publisher prefixes to increase scalability • Routing: – Hard! – DHTs can be used here too (?) – “Routing hints” proposed as optimisation • ~ source route or topological address • Can be tied to publisher prefixes • Can be retrieved from a name resolution service 2011-09-02 20 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
  • 21. Hierarchical namespace • Name resolution: – DNS type design scales well (?) • Routing: – Problem similar to BGP, but harder 2011-09-02 21 SCALABLE & ADAPTIVE INTERNET SOLUTIONS