named data networking

32
Named Data Networking Mustafa Cantürk Murat Can Sayılgan

Upload: mustafacanturk

Post on 29-Jul-2015

232 views

Category:

Technology


0 download

TRANSCRIPT

Named Data Networking

Mustafa CantürkMurat Can Sayılgan

Named Data Networking

Content Centric Networking By Van Jacobson At PARC www.ccnx.org

A trending topic: one idea, many names Content Centric Networking Named Data Networking Information Centric Networking Data Oriented architecture

Named Data Networking

Funded by NSF (National Science Foundation) At first, forked CCN code Then… They rewrite code from scratch

NDN Testbed

NDN Testbed

Main Ideas

Main Idea

Naming data/content instead of hosts Data will be addressed like URL (name)

itu.edu.tr/computer_comm/ndn.pptx Routers will operate on names, not IP’s No client-server model It is a client-cloud model Model is based on data itself

Request-Response Mechanism

Client’s doesn’t connect to a host

Client send interest packet to router

Router finds the data And replies to client

IP Networking (Host based model) NDN Networking (Cloud model)

Network Model

Main Idea

NDN Packet Format

Node Model

Node Model

NDN Forwarding Engine

Hierarchical Naming

Example Message Sequence

Example Message Sequence

Example Message Sequence

Example Message Sequence

Example Message Sequence

Example Message Sequence

Example Message Sequence

Example Message Sequence

Example Message Sequence

Example Message Sequence

NDN Routers

Work to verify data More state in its routing entries, stateful More complex entries (names vs IP addresses) Associated storage devices Increased cost

NDN Applications and Implementation No TCP or UDP

No ports Applications have to change their own network stack There are some PoC applications

NDN can work on UDP/IP overlay IP can work on NDN overlay IP and NDN both work hybrid on transition phase

IP protocol started working over telephone network

Security

HMAC for data integrity SDSI for authenticity and data privacy

Distributed key management mechanism Keys are mapped to identities via namespaces

Advantages

No DNS - IP conversion Wipes unnecessary network stacks

Not connection based Multiple interfaces can work together for a single request Efficient bandwidth usage

Mobility friendly No connection loss when moving

Data/Object oriented architecture (Not programming paradigm) Works with «named objects»

Advantages (cont.)

Easy administration No spanning tree DoS and DDoS are hard to implement

Thank you for listeningMustafa Cantürk

Murat Can Sayılgan