Named Data Networking, for Computer Communications course presentation
pictures are cropped from that slides:
http://www.slideshare.net/wanderer_from/named-date?qid=1abab327-219a-4b69-a114-46e7f1634d42&v=qf1
http://www.slideshare.net/haroonrashidlone/named-data-networking?qid=bb7c7b7b-ee1b-4c2f-8df5-c4194282e8e2&v=qf1
http://named-data.net/content-centric-networking-video/
https://hal.inria.fr/file/index/docid/785298/filename/AIMS12_tutorial_CCN.pdf
Future internet information centric networking is the doorDr. Raaid Alubady
This slide can help recipients to highlight on basic concepts and dealing with the field of future Internet architecture (i.e. Information-Centric Networking).
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Named Data Networking, for Computer Communications course presentation
pictures are cropped from that slides:
http://www.slideshare.net/wanderer_from/named-date?qid=1abab327-219a-4b69-a114-46e7f1634d42&v=qf1
http://www.slideshare.net/haroonrashidlone/named-data-networking?qid=bb7c7b7b-ee1b-4c2f-8df5-c4194282e8e2&v=qf1
http://named-data.net/content-centric-networking-video/
https://hal.inria.fr/file/index/docid/785298/filename/AIMS12_tutorial_CCN.pdf
Future internet information centric networking is the doorDr. Raaid Alubady
This slide can help recipients to highlight on basic concepts and dealing with the field of future Internet architecture (i.e. Information-Centric Networking).
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
What is SS7? An Introduction to Signaling System 7Alan Percy
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some background on SS7, show how it is used in everyday communications, and provide some use cases in popular applications.
The TCP/IP protocol suite does not define any protocol in the data-link layer or
physical layer. These two layers are territories of networks that when connected
make up the Internet. These networks, wired or wireless, provide services to the upper
three layers of the TCP/IP suite. This may give us a clue that there are several standard
protocols in the market today. For this reason, we discuss the data-link layer in several
chapters. This chapter is an introduction that gives the general idea and common issues
in the data-link layer that relate to all networks.
❑ The first section introduces the data-link layer. It starts with defining the concept
of links and nodes. The section then lists and briefly describes the services provided
by the data-link layer. It next defines two categories of links: point-to-point
and broadcast links. The section finally defines two sublayers at the data-link layer
that will be elaborated on in the next few chapters.
❑ The second section discusses link-layer addressing. It first explains the rationale
behind the existence of an addressing mechanism at the data-link layer. It then
describes three types of link-layer addresses to be found in some link-layer protocols.
The section discusses the Address Resolution Protocol (ARP), which maps
the addresses at the network layer to addresses at the data-link layer. This protocol
helps a packet at the network layer find the link-layer address of the next node for
delivery of the frame that encapsulates the packet. To show how the network layer
helps us to find the data-link-layer addresses, a long example is included in this
section that shows what happens at each node when a packet is travelling through
the Internet.
What is SS7? An Introduction to Signaling System 7Alan Percy
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some background on SS7, show how it is used in everyday communications, and provide some use cases in popular applications.
The TCP/IP protocol suite does not define any protocol in the data-link layer or
physical layer. These two layers are territories of networks that when connected
make up the Internet. These networks, wired or wireless, provide services to the upper
three layers of the TCP/IP suite. This may give us a clue that there are several standard
protocols in the market today. For this reason, we discuss the data-link layer in several
chapters. This chapter is an introduction that gives the general idea and common issues
in the data-link layer that relate to all networks.
❑ The first section introduces the data-link layer. It starts with defining the concept
of links and nodes. The section then lists and briefly describes the services provided
by the data-link layer. It next defines two categories of links: point-to-point
and broadcast links. The section finally defines two sublayers at the data-link layer
that will be elaborated on in the next few chapters.
❑ The second section discusses link-layer addressing. It first explains the rationale
behind the existence of an addressing mechanism at the data-link layer. It then
describes three types of link-layer addresses to be found in some link-layer protocols.
The section discusses the Address Resolution Protocol (ARP), which maps
the addresses at the network layer to addresses at the data-link layer. This protocol
helps a packet at the network layer find the link-layer address of the next node for
delivery of the frame that encapsulates the packet. To show how the network layer
helps us to find the data-link-layer addresses, a long example is included in this
section that shows what happens at each node when a packet is travelling through
the Internet.
The RestFS is an experimental project to develop an open-source distributed filesystem for large environments. It is designed to scale up from a single server to thousand of nodes and delivering a high availability storage system with special features for high i/o performance and network optimization for work better in WAN environment. The Restfs is pure-python, but several of the libraries that it depends upon use C extensions (sometimes for speed, sometimes to interface to pre-existing C libraries). The Project is on the beginning stage, with some technology previews released.
Meeting the business and technical challenges of today's organizations requires an architectural approach. The Cisco Borderless Network Architecture is the technical architecture that allows organizations to connect anyone, anywhere, anytime, and on any device - securely, reliably, and seamlessly. It is built on an infrastructure of scalable and resilient hardware and software. Components of the architecture come together to build network systems that span your organization from network access to the cloud. Intelligent network, endpoint, and user services provide the flexibility, speed, and scale to support new devices, applications, and deployment models.
The impact of the consumerization of IT and mobility cannot be understated. The impact that these two key business elements have on the evolution of Enterprise Architecture and for Service Provider's ability to offer services to Enterprises, Governments, and Consumers will be addressed in this webinar. We will talk about the importance of the shift and movement of the secure network edge leads to a very close examination of the changing threat vectors and vulnerabilities impacting your businesses today. We will also detail service delivery and consumption on the three 'service horizons,' (Mobile Endpoint and CPE, Virtualized Network Edge/Data Center Edge, and the Cloud).
Infoblox Cloud Solutions - Cisco Mid-Atlantic User GroupNetCraftsmen
This presentation will cover an overview of cloud market trends, the Infoblox Cloud Network Automation, VMware Private Cloud Automation use cases, and Amazon AWS and Hybrid/Public Cloud.
A constructive review of in network caching a core functionality of icn slidesAnshuman Kalla
In-Network Caching in Information Centric Networking (ICN) with Content Centric Networking (CCN) as key design architecture. Aim is to make an exhaustive review of work related to in-network caching in ICN.
Similar to Information-centric networking and relaton to legal and regulatory issues (20)
Views on Regulation and Governance issues in the Network of the Future - presentation given by Tapio Levä on behalf of the SAIL project at the 6th FP7 concertation meeting.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. Content distribution
• CDNs
• Peer-to-peer
– User driven
– Service provider
driven
• Making use of
storage for caching
– In one way or another
2011-09-02 2 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
3. Evolution of networking
Information-centric
Today’s Internet network
Focuses on Focuses on
Conversations between Hosts Dissemination of Information
objects
Host-centric abstraction Evolution
Who to communicate with Information-centric abstraction
Web CDN P2P What to communicate
In today’s Internet,
accessing information is
the dominating use case!
2011-09-02 3 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
4. Host-centric networking
Trusted
Connect to Server
Server X and
get object B
Server X
B
Secure
Connection
2011-09-02 4 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
5. Information-centric networking
A
Trustable D
copy of
object B
B C
E
Get object B
D
B B B
E E
A A
A A
C D
Untrusted Untrusted
2011-09-02 5 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
connection host
6. ICN main components
Name resolution/routing Security
Security
Name resolution/routing - - tied to the information
tied to the information
- - scalability main concern
scalability main concern
- - and the names
and the names
Naming scheme for objects
Naming scheme for objects
- - flat or hierarchical
flat or hierarchical
Forwarding/transport
Forwarding/transport
- - with in-network caching
with in-network caching
2011-09-02 6 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
7. ICN naming
• Naming today:
– Hierarchical (aggregatable) IP addresses
– Hierarchical DNS names
– URL/URIs name “stuff”, but includes one of the above!
• So names are largely tied to hosts, that is, name the
container, not the actual content
• New: names for information objects themselves
– Names for the information independent of the container
– Need security directly tied to the name and object
– Hierarchical or flat namespace?
• I.e., aggregatable or non-aggregatable
• Consequences for resolution/routing
2011-09-02 7 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
8. NetInf naming scheme
Type A = Hash(PKIO) L = {identifier attr.}
Structure:
– Type: Defines the format
• e.g. Hash algorithm used (SHA1, MD5, …)
– Authenticator (A): Binds the ID of the IO to a public key PK
• Hash function used to compress length of PK
– Label (L): Identifying individual object published by Authenticator
• contains a number of identifier attributes associated with an IO
– (A, L) combination needs to be globally unique
Supporting the combination of:
– name persistence, self-certification, and owner authentication
– for objects that change content, location, or owner
– without need to trust the delivering host
Internet-draft: draft-farrell-ni
2011-09-02 8 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
9. CCN naming scheme
• Hierarchical names rooted in publisher prefixes
– Includes segmentation (packets!) and versioning
• Makes (some) routing aggregation possible
• Need to establish trust in signing key to verify integrity
• (drawing from “Networking Named Data” paper at CoNEXT 2009 by Van Jacobson et al)
2011-09-02 9 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
10. Name resolution / routing –
scalability
• Main scalability issue:
– Number of information objects
• bookkeeping needed to keep track of them
– Cf. Internet: IP network prefixes in backbone & BGP convergence
• How many information objects?
• Some numbers to compare with:
– One trillion (1,000,000,000,000) unique web URLs (Google 2008)
– 26 billion web pages (http://www.worldwidewebsize.com/)
– 119 million second-level domain names in the DNS (Dec 2010)
• Applicable if we can aggregate information objects on the publisher
level
– 60.000 AS numbers, of which 34.000 announced in BGP
2011-09-02 10 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
11. Name resolution / routing
• Two main options:
– Name resolution translating into another, routable,
namespace
• e.g., IP
– Routing directly on information object names
• sometimes called “name-based routing”
– (Possible with hybrid schemes)
• Scalability depends on namespace
– Flat or hierarchical
2011-09-02 11 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
12. ICN application service
(“socket API”)
sender receiver
publish()
retrieve(object ID)
object
• “Publish/subscribe-like”
• Most approaches defines a synchronous
“retrieve” instead of asynchronous “subscribe”
2011-09-02 12 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
13. ICN vs current networks
• Caches integrated in the network infrastructure
– Combines today's CDNs and user caching (p2p) in
the basic network service
• Network service in terms of named data objects
– No direct host addressing
2011-09-02 13 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
14. Legal implications of caching
(a layman view)
2011-09-02 14 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
15. Copyright
• Copyright and distribution agreements currently do not seem to
allow for general in-network caching
– Distribution agreements need to change? Is this likely?
• What exactly differs packet buffering from caching?
– Both stores content in a memory
• Can some mechanism in the network support the copyright
agreements?
– I.e., mechanisms that have legal meaning
– (I do not believe in enforcing mechanisms – it has to be combined with contracts
and/or legislation)
• Example mechanisms:
– Access counting, distribution constraints, time-to-live
• Or, is the only solution to encrypt copyrighted material and replace
the problem with key distribution
– as is done for satellite TV
2011-09-02 15 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
16. Responsibility for illegal content
• To what extent is the cache owner responsible
for the cached content?
– e.g., if it is illegal for some reason?
• Dependent on the time in the cache?
• (Anonymity and content control later...)
2011-09-02 16 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
17. Business issues
• Some current ISP business models work against
in-network caching
– Need to pay for delivering data to someone else
– Delivering data from your own cache to others incurs
a cost!
• Shouldn't there instead be value in providing
content that users want?
2011-09-02 17 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
19. Problems in host-centric
networks
No common persistent naming scheme for information
– URLs and IPs overloaded with locator and identifier functionality
• Moving information = changing it‘s name („404 file not found“ errors)
=> Use flat namespace for persistent and secure identification
Information dissemination is inefficient
– Can‘t benefit from existing copies (e.g. local copy on client)
• Also true for Content Delivery Networks (e.g. Akamai)
– No “anycast”: e.g., get “nearest” copy
– Problems like Flash-Crowd effect, Denial of Service, …
=> Add storage for caching as part of the infrastructure
Security is host-centric
– Mainly based on securing channels (encryption) and trusting servers
(authentication)
– Can’t trust a copy received from an untrusted server
Problems can be solved in a consistent manner
via an information-centric architecture
2011-09-02 19 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
20. Flat namespace
• Name resolution:
– Distributed hashtables (DHTs) only known technology
that scales
– Make use of publisher prefixes to increase scalability
• Routing:
– Hard!
– DHTs can be used here too (?)
– “Routing hints” proposed as optimisation
• ~ source route or topological address
• Can be tied to publisher prefixes
• Can be retrieved from a name resolution service
2011-09-02 20 SCALABLE & ADAPTIVE INTERNET SOLUTIONS
21. Hierarchical namespace
• Name resolution:
– DNS type design scales well (?)
• Routing:
– Problem similar to BGP, but harder
2011-09-02 21 SCALABLE & ADAPTIVE INTERNET SOLUTIONS