This document discusses supporting information-centric functionality in software defined networks. It focuses on the CONET framework and coCONET solution. The key points are:
1) coCONET is an ICN solution that can be deployed using the SDN philosophy, with ICN nodes as OpenFlow switches controlled by a Name Routing System controller via an extended OpenFlow protocol.
2) Two approaches for supporting ICN in OpenFlow are discussed: a short-term approach using existing OpenFlow and a long-term approach extending OpenFlow for ICN.
3) The paper analyzes required OpenFlow extensions for the long-term approach, including matching new packet formats, fields, and protocols to support clean
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
There is no doubt that network coding is a promising enhancement of routing to improve network throughput and provide high reliability. However, there are several open problems in practical network coding, especially on how to guarantee coding advantage for a decentralized control network without the knowledge of the network topology. The biggest benefit of OpenFlow is to decouple the control plane from the data plane, allowing the centralized forwarding decisions in comparison to traditional distributed control network. As a result, we propose a Software-Defined coding network and address key technical challenges in practice. We design NC-OF, a framework to enable networking coding in SDN networks, and use MMF-NC coding strategy proposed by Guan Xu in NC-OF. Finally, we proved that our solutions can effectively improve network performance through simulation experiments. And we also find that network coding is not necessary when the link bandwidth is enough , because it will bring the problems of time delay, the increase in the amount of calculation and so on.
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLS-VPN network and a classic VPN network using simulation studies done on OPNET®. The performance metrics used to carry out the comparison include; End to End Delay, Voice Packet Sent/Received and Label Switched Path’s Traffic. The simulation study was carried out with Voice over Internet Protocol (VoIP) as the test bed. The result of the study showed that MPLS-based VPN networks outperform classic VPN networks.
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
There is no doubt that network coding is a promising enhancement of routing to improve network throughput and provide high reliability. However, there are several open problems in practical network coding, especially on how to guarantee coding advantage for a decentralized control network without the knowledge of the network topology. The biggest benefit of OpenFlow is to decouple the control plane from the data plane, allowing the centralized forwarding decisions in comparison to traditional distributed control network. As a result, we propose a Software-Defined coding network and address key technical challenges in practice. We design NC-OF, a framework to enable networking coding in SDN networks, and use MMF-NC coding strategy proposed by Guan Xu in NC-OF. Finally, we proved that our solutions can effectively improve network performance through simulation experiments. And we also find that network coding is not necessary when the link bandwidth is enough , because it will bring the problems of time delay, the increase in the amount of calculation and so on.
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLS-VPN network and a classic VPN network using simulation studies done on OPNET®. The performance metrics used to carry out the comparison include; End to End Delay, Voice Packet Sent/Received and Label Switched Path’s Traffic. The simulation study was carried out with Voice over Internet Protocol (VoIP) as the test bed. The result of the study showed that MPLS-based VPN networks outperform classic VPN networks.
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Hiding message from hacker using novel network techniquesPriyangaRajaram
we address the trouble of selective jamming attacks in wireless networks. In these assaults, the adversary is energetic best for a brief period of time, selectively concentrated on messages of excessive significance. We illustrate the benefits of selective jamming in phrases of network performance degradation and adversary effort with the aid of offering case research. A selective assault on TCP and one on routing. We show that selective jamming attacks can be launched with the aid of performing actual-time packet classification at the physical layer. To mitigate these attacks, we develop 3 schemes that prevent actual-time packet class via combining cryptographic primitives with physical-layer attributes. We analyze the security of our strategies and examine their computational and communication overhead.
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
Presented at TM Forum Live ! on May 16th 2017
by Red Hat - François Duthilleul Telco Solutions Architect
For the past few decades, telecommunications networks have been built using closed-source monolithic products from network equipment vendors. Today, Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are disrupting the way telecommunications networks are being built and operated and are gradually becoming the foundation of modern networking. The introduction of virtualisation, automation and orchestration provides the basis from which the networks will evolve towards a Zero-touch Orchestration, Operations and Management (ZOOM) target.
This presentation highlights the prominent role of open source and Red Hat’s portfolio in the implementation of future networks.
Don't hesitate to contact me at: fduthill@redhat.com
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKSIJNSA Journal
Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network
operators will support ubiquitous connectivity and thus enhances users’ experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP
frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
The processor designing and development was designed to perform various complex logical information exchange and processing operations in a variety of resolutions. They mainly rely on concurrent and sync, both that of the software and hardware to enhance the productivity and performance. With the high speed growth approaching multi-billion transistor integration era, some of the main problems which are symbolized by all gate lengths in the range of 60-90 nm, will be from non-scalable delays generated by wire. All similar problems may be solved by using Network on Chip (NOC) systems. In the presented paper, we have summarized research papers and contributions in NOC area. With advancement in the technology in the on chip communication, faster interaction between devices is becoming vital. Network on Chip (NOC) can be one of the solutions for faster on chip communication. For efficient link between devices of NOC, routers are needed. This paper also reviews implementation of routing techniques. The use of routing gives higher throughput as required for dealing with complexity of modern systems. It is mainly focused on the routing design parameters on both system level including traffic pattern, network topology and routing algorithm, and architecture level including arbitration algorithm.
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...ijcsit
With the emergence of recent technologies in the field of computer network, traditional infrastructure in the field of networks have become obsolete and incompatible with respect to the new architectures of open networks that emerge with force. This is how software-defined networks emerge by enabling cloud computing ecosystem, enterprise data centers, and telecommunications service providers. The major contribution of this paper is the simulation of an ecosystem based on a software defined network by making use of certain types of networks topologies and using the virtualization of the open network operating system (ONOS) and Mininet as a network emulator.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Hiding message from hacker using novel network techniquesPriyangaRajaram
we address the trouble of selective jamming attacks in wireless networks. In these assaults, the adversary is energetic best for a brief period of time, selectively concentrated on messages of excessive significance. We illustrate the benefits of selective jamming in phrases of network performance degradation and adversary effort with the aid of offering case research. A selective assault on TCP and one on routing. We show that selective jamming attacks can be launched with the aid of performing actual-time packet classification at the physical layer. To mitigate these attacks, we develop 3 schemes that prevent actual-time packet class via combining cryptographic primitives with physical-layer attributes. We analyze the security of our strategies and examine their computational and communication overhead.
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
Presented at TM Forum Live ! on May 16th 2017
by Red Hat - François Duthilleul Telco Solutions Architect
For the past few decades, telecommunications networks have been built using closed-source monolithic products from network equipment vendors. Today, Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are disrupting the way telecommunications networks are being built and operated and are gradually becoming the foundation of modern networking. The introduction of virtualisation, automation and orchestration provides the basis from which the networks will evolve towards a Zero-touch Orchestration, Operations and Management (ZOOM) target.
This presentation highlights the prominent role of open source and Red Hat’s portfolio in the implementation of future networks.
Don't hesitate to contact me at: fduthill@redhat.com
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKSIJNSA Journal
Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network
operators will support ubiquitous connectivity and thus enhances users’ experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP
frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
The processor designing and development was designed to perform various complex logical information exchange and processing operations in a variety of resolutions. They mainly rely on concurrent and sync, both that of the software and hardware to enhance the productivity and performance. With the high speed growth approaching multi-billion transistor integration era, some of the main problems which are symbolized by all gate lengths in the range of 60-90 nm, will be from non-scalable delays generated by wire. All similar problems may be solved by using Network on Chip (NOC) systems. In the presented paper, we have summarized research papers and contributions in NOC area. With advancement in the technology in the on chip communication, faster interaction between devices is becoming vital. Network on Chip (NOC) can be one of the solutions for faster on chip communication. For efficient link between devices of NOC, routers are needed. This paper also reviews implementation of routing techniques. The use of routing gives higher throughput as required for dealing with complexity of modern systems. It is mainly focused on the routing design parameters on both system level including traffic pattern, network topology and routing algorithm, and architecture level including arbitration algorithm.
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...ijcsit
With the emergence of recent technologies in the field of computer network, traditional infrastructure in the field of networks have become obsolete and incompatible with respect to the new architectures of open networks that emerge with force. This is how software-defined networks emerge by enabling cloud computing ecosystem, enterprise data centers, and telecommunications service providers. The major contribution of this paper is the simulation of an ecosystem based on a software defined network by making use of certain types of networks topologies and using the virtualization of the open network operating system (ONOS) and Mininet as a network emulator.
With the emergence of recent technologies in the field of computer network, traditional infrastructure in the field of networks have become obsolete and incompatible with respect to the new architectures of open networks that emerge with force. This is how software-defined networks emerge by enabling cloud computing ecosystem, enterprise data centers, and telecommunications service providers. The major contribution of this paper is the simulation of an ecosystem based on a software defined network by making use of certain types of networks topologies and using the virtualization of the open network operating system (ONOS) and Mininet as a network emulator.
This lesson describes the concept of VPN and introduces some VPN terminology.
Importance
This lesson is the foundation lesson for the MPLS VPN Curriculum.
Objectives
Upon completion of this lesson, the learner will be able to perform the following
tasks:
■ Describe the concept of VPN
■ Explain VPN terminology as defined by MPLS VPN architecture
Artigo: Multilayer Networks: An Architecture FrameworkDiogo Oliveira
Artigo bem bacana do professor Nasir Ghani (University of South Florida) que explica o que são redes Multicamadas. O objetivo do artigo não é explicar a multicamadas, mas apresentar um framework. Porém através das explicações e do cenário a compreensão do termo é facilitada.
On the latency and jitter evaluation of software defined networksjournalBEEI
Conventional networking devices require that each is programmed with different rules to perform specific collective tasks. Next generation networks are required to be elastic, scalable and secured to connect millions of heterogeneous devices. Software defined networking (SDN) is an emerging network architecture that separates control from forwarding devices. This decoupling allows centralized network control to be done network-wide. This paper analyzes the latency and jitter of SDN against a conventional network. Through simulation, it is shown that SDN has an average three times lower jitter and latency per packet that translate to improved throughput under varying traffic conditions.
2. demonstrated by the fact that the OpenFlow protocol is already propagated towards the serving node. Note that in principle, in-
implemented by a number of commercial products, and network caching can significantly improve efficiency of
available in several research and prototyping projects. network resource utilization.
Therefore we focused on OpenFlow as a reference
implementation of SDN concepts. - Security embedded in the content. To date most of the
effort has been focused on securing the communication
When it comes to supporting ICN in OpenFlow, we see two channel between two end-hosts or two parties running a
basic options: a “short term” one, i.e. use the existing given application. In ICN solutions, instead, it is the
OpenFlow switches and API in order to realize the ICN content which matters accordingly mechanisms have been
functionality; a “long term” one, i.e. consider future, ICN proposed which embed security information in the content
capable switches and accordingly design an extended itself and therefore avoid fake version of a content to be
OpenFlow interface. We are exploring both options, but this even disseminated in the network.
paper deals with the latter one, focusing on the required
enhancements to the OpenFlow architecture, interfaces and Content-Centric Networking (CCN) is one of the most relevant
protocol that allow the supporting of ICN. existing ICN solutions [1]. CCN can be implemented as a clean
slate network in which a novel layer 3 protocol is meant to
We are doing this work in the context of the OFELIA project replace IP, or as an overlay layer, e.g., on top of UDP packets
[14], which provides a pan-European experimental platform over an IP network. CCNx [23] is an implementation of CCN
open to researchers based on OpenFlow2. We plan to integrate following the overlay approach.
our implementations (both for the short term and long term
approaches) in the OFELIA testbeds, in particular we will build CONET [11] [10] is an ICN framework based on the same
two additional OFELIA “islands” (i.e. in Rome and Catania) general principles than CCN. Compared to CCN, its main
which will be able to run our implementations. contribution is the proposal of a third approach, in addition to
the clean slate and the overlay ones, namely the “integration
In section II we shortly recall some general ICN concepts, then approach”. The idea is to extend the IP protocol towards ICN
provide few details about the CONET framework, the support in a backward compatible way. This is achieved by
coCONET solution and its implementation. Section III adding an IP option (both for IPv4 and IPv6 headers) than can
discusses the two above mentioned “short term” and “long take care of ICN related information. CONET can be seen as a
term” options. It also provides few details about the “short generic ICN framework that is capable to accommodate
term” approach and its ongoing implementation. Section IV different choices with respect to specific aspects like naming,
includes the main contribution of the paper, i.e. the analysis of routing, forwarding, and caching.
OpenFlow extensions to support ICN. In Section V we discuss
the status and the plan of our implementation activities. Within the CONET framework we have designed a specific
solution called coCONET by choosing the naming, the routing
mechanism, etc. We have implemented the proposed
II. ICN, CONET AND COCONET coCONET solutions and realized a testbed. Further details and
While the debate on the specific procedures which should be the open source implementation are available, see [21].
executed by ICNs is still ongoing, there is almost universal
consensus on the fact that an ICN solutions should support: III. SHORT TERM VS. LONG TERM APPROACH
Content-centric request/reply paradigm for data In this section we discuss how OpenFlow can be used to
distribution. Users interested in a given content issue an support CONET and, in general, ICN solutions. The OpenFlow
interest which is propagated in the network towards the host standard has been created to process IP packets; forwarding
storing the desired content (called the serving node). Upon rules can be created in terms of the header fields defined by IP
reception of an interest the serving replies by sending the and by standard transport protocols. Therefore, problems arise
desired data to the requesting user. when dealing with non-IP packets, such as for “clean-slate”
ICN solution. Likewise, current OpenFlow specifications
Route-by-name operations. Each data item is given a allows to process TCP and UDP ports, but it is not possible to
unique name and routing of all related information is deeply analyze the payload, as it could be needed for efficient
performed based on such name. This allows the interaction solution in case of overlay transport of ICN packets. Note that
between the users interested in a given content and the closest also an IP-based ICN solution, as proposed for CONET [11],
copy of the desired data item. that reuses the IP header for carrying ICN relevant information
In-network caching. Routers in the end-to-end path (e.g. content-name and chunk number) by exploiting the IP
between the serving node and the user can store in a local Options field, cannot be supported on the current version of
cache content. Accordingly, upon reception of an interest a OpenFlow, due to the lack of support of full IP header
router checks whether the requested piece of content is stored processing rules (the IP Options field in our case).
in the local cache. If this is the case then the desired content is
Two possible SDN approaches can be envisaged for building a
sent to the requesting user while the interest message is no ICN based on the OpenFlow protocol: i) a short term approach
further propagated. If this is not the case (i.e., the piece of based on the version of OpenFlow protocol implemented in the
content is not in the local cache) then the interest message is available OpenFlow-enabled switches; ii) a long term (clean
slate) approach in which the OpenFlow architecture is properly
2 Instructions for accessing the experimental platform can be found extended in order to accommodate non-IP packets, to support
at http://www.fp7-ofelia.eu.
6646
3. new (and more flexible) matching/forwarding rules and new A. Packet matching extension
switch processing functions as well. In this paper we The first direction, which is already followed by the OpenFlow
concentrate on the analysis of OpenFlow extensions for community, is to have a more flexible match in terms of new
fulfilling the second, “long term”, approach and only provide fields and protocol types that can be successfully parsed and
some information on our ongoing work on the “short term” matched with proper flow table entries. This is needed in all the
approach. three possible approaches for an ICN: clean slate ICN, overlay
ICN, and IPv4 compatible layer 3 ICN, as in CONET. In the
A. Few notes on the short term approach clean slate ICN approach, a complete new layer 3 protocol and
We have designed and we are currently implementing a testbed new packet format is used. Currently no standard has been
in which OpenFlow 1.0 equipment is used to support defined yet; however, whatever packet format will be defined
coCONET ICN functionality (see [20][22]). As previously for the new ICN layer 3, OpenFlow will need to match the new
mentioned, CONET framework provides that content-name is format and the corresponding header fields. In the overlay ICN
carried by an IP option in the IPv4 header, but OpenFlow 1.0 approach, ICN packet are encapsulated into standard IP packet,
equipment cannot parse IP options[0]. To overcome this for example as UDP payload; in this case OpenFlow would
impasse, the basic idea is to map the content-name into a tag, need to further process the incoming packet in order to
added in the same header position that is used to transport TCP elaborate the UDP payload to match the ICN packet fields.
and UDP port number. In general, border nodes need to Finally, in the CONET approach, although standard IP packets
add/remove such tag when entering/exiting in/out a domain are used, OpenFlow still needs to match ICN fields inserted as
composed by a set of cooperating nodes that use OpenFlow IPv4 or IPv6 options header fields. We will further examine
technology. The tag will uniquely identify the content in such this aspects later on in this section.
domain, more details can be found in [22].
&$ &$ 3.,
IV. EXTENDING OPENFLOW &$
156 QRGH
1DPH 5RXWLQJ 6VWHP
Following the SDN approach, we consider an OpenFlow-based 156 QRGH 156 QRGH
ICN architecture in which the intelligence of the ICN is de- 2SHU)ORZ &RQWUROOHU
coupled from the forwarding (of interest messages and content Extended OpenFlow Protocol Extended OpenFlow Protocol
data) and caching functions. These leads to an architecture that ,&1 QRGH
2SHQ)ORZ 6ZLWFK
is summarized in Figure 1 and that is composed by two
6HUYLQJ QRGH
different planes, that are: i) a data plane with the ICN nodes, 7HUPLQDO
7HUPLQDO ,&1 QRGH
the serving nodes (i.e. the content producers), and the terminals 'DWD SODQH
(i.e. the content requesters/consumers); ii) a control plane that 6HUYLQJ QRGH
includes both the Name Routing System (composed by NRS
nodes) and PKI for security. The two planes communicate Figure 1 Information Centric Network based on extended OpenFlow
through an extended OpenFlow interface described in this
section. Such an extended OpenFlow interface is used by the The definition of a new and more flexible match mechanism, in
NRS nodes (acting as OpenFlow Controllers) to control one or terms of new fields and protocol types that can be successfully
more ICN nodes (acting as OpenFlow Switches). We believe parsed and matched by an OpenFlow compliant switch, has
that such architecture is very well suited to support ICN and been already envisaged as an important requirement by the
can help in overcoming some critical issues of ICNs like OpenFlow community, and it is already under discussion. New
scalability. For example, as pointed out in [17], the size of the flexible match mechanisms may in fact help in both
name-based forwarding table is a scalability issue for ICN introducing new extensions to the current supported protocols
routers. In [10] (see also [21] for further details) we argue that (of the TCP/IP stack) and probably supporting future layer 3
by keeping the full routing tables in the NRS nodes and using and 4 protocols. Fortunately the OpenFlow Protocol and the
the forwarding tables as route “caches”, scalability can be corresponding API already consider the possibility of
achieved. The architecture depicted in Figure 1 based on the extending the current standard match mechanism by defining
extended OpenFlow approach, is perfectly suited to such new OpenFlow match types (called OFPMTs) and the
scenario, where the routing intelligence runs in the NRS, corresponding mach structure (i.e. the set of fields that
implemented as a set of OpenFlow controllers. compose the match) [15]. Hence, one simple extension could
be to define a new match type that allows the matching of the
Starting from the experience in the design and implementation entire layer two payload, seen as an opaque bit string, together
of coCONET on one side and of the “short term” approach for with a variable-length matching mask. Whether this simple
integrating ICN operations with OpenFlow on the other side, matching method works with an ICN packet format or not,
we considered the more general problem of the evolution of depends on the particular ICN protocol considered. In case of
OpenFlow in order to naturally support ICN. We observe that CONET, this mechanism is sufficient to properly parse the
there are two directions of work for making OpenFlow CONET packet header and to make the flow tables able to
compliant with the ICN paradigm, that are: i) revision/ forward the packet. Note that in case of CONET, due to the
extension of the OpenFlow packet matching rules; ii) extension fact that rather than defining a new packet format, it exploits IP
of the OpenFlow protocol/API. Let us consider these two (v4 or v6) options field, it would simply require some matching
aspects in the following two subsections. rules against such IPv4 and IPv6 header fields. Unfortunately,
at the moment we are writing this contribution, the current
6647
4. OpenFlow protocol (version 1.1) [15] does not support packet logically centralized controller. A further decision related on
match based on IP options fields. However we believe that this caching, is on which content has to be removed from cache
will available in standard mode in the next OpenFlow release. when the cache is full and new content has to be added. Also
this decision could be delegated to an external controller.
B. OpenFlow protocol extension Caching notification – It could be expected that the
However, flexible match, allowing the parsing of new packet controller is notified when some content has been cached by a
formats, is just one step in the direction of supporting ICN, but node. This in useful order to have an updated map within the
it is not enough. In fact, having variable match allows the controller of the availability of contents.
redirection of ICN packets somewhere, but does not fulfill all Proactive caching – The controller can proactively push
the functional requirements of an ICN node, like reactive or some content in an ICN node, therefore anticipating the
proactive caching, intelligent forwarding-by-names of interest “automatic” caching procedures that are the only solution if a
messages, security, and other functionalities. This leads to the purely distributed approach (i.e. without OpenFlow) is used.
second direction of work that has a deeper impact on These “proactive push” approaches could prove very useful for
OpenFlow, as it concerns the support by OpenFlow of new example for distribution of live content in ICN (e.g.
ICN specific methods. In fact, in order to fully implement an audio/video real-time streaming).
ICN paradigm as described in the previous sections, the 2) Routing-related operations
OpenFlow API should be changed or extended in order to
better handle the concept of “content” and to support new An ICN adopts an addressing scheme based on names, which
content-related methods, such as key management, caching and do not include references to their location; as consequence,
routing-by-name, and so on. The new set of ICN-specific interest messages have to be routed toward the closest copy of
operations that can be supported by an ICN node and by the the content, based on a “destination” content-name. The main
corresponding control protocol, can be classified as: “content- routing-related operations are:
related”, “routing-related”, and “security-related”, hereafter Forwarding-by-name – When receiving a new interest
summarized. message, the ICN node is expected to forward it to a next-hop
node on the basis of the targeted content name. This
1) Content-related operations forwarding operation is performed through a proper name-
Interest messages handling – An ICN node is requested to based Forwarding table present within the ICN node that maps
handle incoming content interest messages that have to be possible content names to the corresponding next-hops. The
properly routed based on a forwarding-by-name strategy (see insertion of new entries in such routing table is in charge of a
later). At this phase the node could also need to keep track of logic entity that in our architecture is mapped onto the
requested contents (for example if “Pending interest” state is controller. When a new content is requested with a name that is
used to forward back the content data) or it may want to keep not in the local forwarding table, the node requests the name-
track of the requests to optimize the processing of further to-next-hop lookup to the controller. If a route is found and
interest requests for the same content received from other returned, this is stored into the forwarding table. Particular care
interesting end-nodes. The ICN node could keep track locally should be taken when the forwarding table is full and a
or delegate such operation to an external controller. Moreover, previous entry has to be deleted and replaced by the new one.
also in case of stateless interest processing (no information is Such decision may be assisted by the controller (for example
maintained for the already processed interest requests), in order through some priority information), or can be autonomously
to better operate caching decisions, the node may still want to taken by the node on a basis on fixed and simple rules (e.g. “do
inform the controller about the received request. This may be remove the oldest entry”).
performed by notifying the controller on a per-request basis Forwarding table management – Such forwarding table is
(every time a new interest message arrives) or on a batch basis, dynamically updated each time a name-to-next-hop is
sending to the controller some periodic summary information requested to and returned from the controller. However the
reports about the requested contents. In this way the controller controller is expected to have the possibility to populate and
can build ordered lists of most popular content, useful also for modify the forwarding table according to some upper level
the following caching decision. strategy (for example by distributing the forwarding-by-name
Caching decisions – An ICN node may provide caching information for the most popular contents, or for contents that
functionality for achieving a native, in-network caching require some form of prioritization). Such operations should be
function. This may drastically improve multicast content controller-driven and they can be executed asynchronously
distribution (when the same content has to be distributed from with respect to the incoming packet events.
one source to multiple destinations), and, more in general, it Forwarding table exportation – In case the controller does
allows a more efficient content delivery in both fixed and not keep a copy of the routing table of each node attached to it
mobile environments [16] (when the same content is (e.g. for scalability reason), it is required that the ICN nodes
successively requested by to other destinations). Due to the could send to controller their current routing-by-name
large amount of packets (and contents) that a node is requested information stored in the table.
to forward, it is expected that a node decides to cache only a 3) Security-related operations
portion of the overall forwarded contents. Such decision of
which content is to be cached and which not, could be made An ICN node is expected to exploit security information
locally, inside the node or, more likely, by relying on a embedded in the content to avoid the diffusion of fake versions
6648
5. of contents and to protect the content, as opposed to exploit - A data packet arrives to the switch. The packet is forwarded
connection-based or application-based security [18]. to all the destination (that requested such content), and the
following operation is executed: Caching decision.
Security enforcement – Contents (or content chunks, like in - A full chunk of content arrives to the switch. In addition to
CONET) are cryptographically protected in order to assure the operations executed for data packets, the following
content (and content generator) authentication and data operation is required: Security enforcement, Caching
integrity. This security service is provided through digital notification.
signature and can be verified through the public key associated
to the private key of the content (or of thecontent generator). According to the above operations, a NRS node (OpenFlow
Every ICN node should verify such signature before Controller) should be able to command the ICN node
forwarding the content toward the interested end-nodes, in (OpenFlow Switch) to operate the following atomic ICN-
order to protect the network against DoS or other attacks. Such related tasks:
function in turn requires that the ICN node obtain the public
key associated to the content. One solution can involve the - (C1) Add/remove a route entry in the interest routing table;
NRS node (that acts as controller) that may provide the public - (C2) Add/remove a chunk of content in the switch cache;
key together with routing information (see next point). Other - (C3) Add/remove a key for security checks in the switch
possible solutions could be to use identity-based cryptography, key repository;
or self-certifying names. The investigation on what solution - (C4) Add/remove an entry in the Pending Interest Table.
better fits the ICN paradigm and requirements is out the scope - (C5) Configure/change caching policy.
of this paper. The CONET framework can support all these - (C6) Query for caching capability.
solutions.
Key management and distribution – In case some human Moreover, if the ICN capable node is used to distribute live
readable names are used, and an association between names content:
and public keys is required, this should be executed by the - (C7) Add/remove an entry in a static Pending Interest Table
controller NRS node, according to a proper key management
mechanism (e.g. through the use of a public key infrastructure - Likewise the ICN node should be able to query for name-
PKI, the use of a Web of Trust, or other key management lookup, notify events, and update state information as follows:
mechanism). The result of such mechanism should let the NRS - (S1) query for a name-lookup and routing information;
node to be aware of the correct name-to-key associations and - (S2) query for a content-name public key;
be able to pass this information to the ICN nodes. - (S3) notify of different content related events (e.g. arrival of
Key revocation – In parallel to a proper key management an interest message that does not require name lookup,
and distribution mechanism, it should be implemented also a content chunks completed, failure in authentication, etc).
key revocation mechanism that allow the revocation of
compromised or withdrawn keys. A part of the properly Such new methods should be properly encaspulated in the
selected mechanism, it will still in charge of the NRS node to following three standard OpenFlow types of messages:
communicate such revocation information to the ICN node.
controller-to-switch – initiated by the controller and used to
4) Analysis of operations manage the state of the switch; they may or may not require a
According to the previous description, all ICN-related response from the switch; the following methods are supported:
operations that involve both the ICN and NRS nodes can be Feature, Configuration, Modify-State, Read-State, Packet-out,
driven: i) by the NRS node, on the basis of a control logic; this Barrier. New Modify-State messages should be defined for C1-
happens asynchronously respect to the ICN node, or ii) by the 4, and C7. New Configuration message should be defined for
ICN node, when a new networking event happens, e.g. when C5. New Feature message should be defined for C6.
interest or content packet arrives. In the former case the asynchronous – initiated by the switch and used to update
operation may start in correspondence of an internal timeout or the controller of state changes or network events; the following
in accord to a control logic executed in the control plane main methods are supported: Packet-in, Flow-Removed, Port-
between different NRS nodes. In the latter case instead, the status, Error. New Packet-in messages should be defined for
operation can be driven by six different type of packet events at S1-2. A new asynchronous method should be introduced in
the ICN node: order to handle S3 non-error event notification.
- An interest message arrives to the switch - no route to symmetric – initiated asynchronously by either the switch
content (& no content in cache) is present. Hence these or the controller and sent without a solicitation by the other
following operations are required: Handling of content party; the following methods are defined: Hello, Echo (and
interest request, Name lookup, Key distribution. Experimental). No specific new symmetric message is required.
- An interest request arrives to the switch – a route is
available but no content is cached. Only this following V. IMPLEMENTATION ACTIVITIES AND PLANS
operation is now executed: Handling of content interest
request. We are currently implementing the proposed OpenFlow-based
- An interest request arrives to the switch: content available. ICN architecture in the OFELIA project testbed [14], pursuing
The request can be fulfilled and only the following both the “short term” approach that was only mentioned in
operation is executed: Handling of content interest request. section III and the “long term” approach which was extensively
6649
6. considered in previous section. Following the “short term” International Conference on emerging Networking EXperiments and
approach (i.e. using existing OpenFlow switches), the goal of Technologies (CoNEXT), 2009.
the implementation is to show how Information Centric [2] T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S.
Shenker, and I. Stoica. “A Data-Oriented (and Beyond) Network
functionality can be realized on top of OpenFlow. Following Architecture”. Proc. of ACM Sigcomm. August 2007.
the “long term” approach (i.e. assuming OpenFlow switches [3] European Future Internet Portal, http://www.future-internet.eu/
that are natively ICN enabled) we have the more ambitious
[4] The CONVERGENCE EU FP7 project, http://www.ict-convergence.eu
goal of realizing an ICN capable SDN network that can be
[5] The Named-Data Networking (NDN) project, under NSF Future Internet
exposed to experiments. Architecture (FIA) program, http://named-data.org/
The implemented architecture is the one described in the [6] The PURSUIT EU FP7 project, http://www.fp7-pursuit.eu/
previous sections, using the content protocol and packet format [7] The SAIL (Scalable & Adaptive Internet Solutions) EU FP7 project,
described in [11]. For the ICN nodes (both border and internal http://www.sail-project.eu/
nodes) that include forwarding and caching functionality we [8] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,
use Linux boxes with Open vSwitch. We are modifying the J. Rexford, S. Shenker, and J. Turner, “OpenFlow: Enabling Innovation
in Campus Networks”. White paper. March 2008 (available at:
current Open vSwitch implementation in order to adapt it to http://www.openflow.org).
our architecture. In particular the main changes/extensions that [9] http://wiki.tools.ietf.org/group/irtf/trac/wiki/icnrg
we are introducing in Open vSwitch are: i) allowing the [10] A. Detti, N. Blefari-Melazzi, S. Salsano, and M. Pomposini. “CONET:
forwarding based on a forwarding-by-name strategy (proper A Content-Centric Inter-Networking Architecture”, Proc. of ACM
new forwarding tables and table management mechanisms); ii) Sigcomm – ICN 2011. August 2011
implementing the OpenFlow extensions described in section [11] A. Detti, S. Salsano, N. Blefari-Melazzi. IPv4 and IPv6 Options to
IV, in order to support content-related, routing-related, and Support Information Centric Networking. Internet draft (draf-detti-
security-related operations. Caching functionality are conet-ip-option-02). November 2011.
implemented through a new caching unit, realized in the same [12] http://www.openflow.org/
Linux node, including both content storage and retrieval [13] N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and
functions and caching control logic. The caching unit S. Shenker, “NOX: Towards an Operating System for Networks”, ACM
Computer Communication Review. pp. 105-110. July 2008
communicates with the controller (NRS node) via the ICN-
[14] A. Köpsel and H. Woesner, “OFELIA – Pan-European Test Facility for
modified version of the OpenFlow protocol. For the controllers OpenFlow Experimentation”, Lecture Notes in Computer Science. Vol.
(NRS nodes) we use Linux boxes with the nox [13] OpenFlow 6994/2011. 2011
Controller. OpenFlow 1.0 has been used as starting version for [15] B. Pfaff, et al., “OpenFlow Specification”, Version 1.1, February 28,
the implementation/modification of the control protocol 2011, http://www.openflow.org/documents/openflow-spec-v1.1.0.pdf
between NRS node (acting as OpenFlow controller), the ICN [16] K Katsaros, G. Xylomenos, G. C. Polyzos: “MultiCache: An overlay
nodes (both border and internal node), and cache unit. architecture for information-centric networking”, Computer Networks,
According to the timeline of the OFELIA project our plans are Elsevier, Volume 55, Issue 4, 10 March 2011, Pages 936-947
to release the “short term” implementation by late spring 2012 [17] Diego Perino, Matteo Varvello, "A reality check for content centric
and have a first “long term” release by late summer 2012. networking", ACM SIGCOMM Workshop on Information Centric
Networking (ICN), Toronto, Canada, August 2011
[18] D. Smetters, V. Jacobson: “Securing Network Content”, PARC technical
VI. CONCLUSIONS report, October 2009
In this paper we have discussed some issues related to the [19] S. Oueslati, J. Roberts, N. Sbihi: “Ideas on Traffic Management in
CCN”, Information-Centric Networking, Dagstuhl Seminar
application of SDN concepts to Information Centric Networks.
[20] N. Blefari-Melazzi, A. Detti, G. Mazza, G. Morabito, S. Salsano, L.
We are considering how OpenFlow architecture and protocols Veltri: “An OpenFlow-based Testbed for Information Centric
can be modified and enhanced to support ICN. Our work is at Networking”, Future Network & Mobile Summit 2012, 4 - 6 July 2012,
early stage and we have reported here our first analysis of the Berlin, Germany
ICN functionality that can be offered on a controller/switch [21] N. Blefari Melazzi, M. Cancellieri, A. Detti, M. Pomposini, S. Salsano,
interface based on the OpenFlow architecture. Based on these “The CONET solution for Information Centric Networking”, Technical
first results, we believe that the application of SDN concepts to Report, December 2011, http://netgroup.uniroma2.it/CONET/
ICN is feasible and can bring important benefits. We think that [22] G. Mazza, G. Morabito, S. Salsano, “Supporting COntent NETworking
in OpenFlow”, Technical Report, November 2011,
the SDN research community should start discussing the http://netgroup.uniroma2.it/CONET/
support of ICN, this work is a contribution to the discussion.
[23] http://www.ccnx.org/
REFERENCES
[1] V. Jacobson, D. K. Smetters, J. D. Thornton, M.F. Plass, N.H. Briggs,
and R. L. Braynard, “Networking Named Content”, Fifth ACM
6650