Anda di halaman 1dari 45

Introduction to Content Centric

Networking
BRKSPG-2704

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public
Agenda
Introduction
An Experiment
Content Centric Networking
CCN Operation Basics
CCN Node Model
Not Just Cached Content
Merits & Concerns
Further Information
Summary
Questions

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Introduction
Introduction

Current network infrastructure is still in terms of where.


Availability:
Rely on overlay solutions such as CDNs and P2P, heavily increasing bandwidth costs
Security:
Information for securing content is actually based on location
Security is an overlay
Location-Dependence:
Based on connecting two devices together

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
A Conversation Over a Wire. 1914

Source: http://www.flickr.com/photos/ironrodart/
BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
A Conversation Over a Wire. 2012

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
A Conversation Over a Wire ?

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Need to replace Where with What

Use Named Data instead of Named Host

Packets should address CONTENT, not the HOST

Endpoints should not be aware of the location

Use wires to move information in space as now, but.


but use Memory to move
information in time.

Network elements provide both Wires and Memory at every point in the network

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
An Experiment:
Does Anyone have the Time ?
Dissemination Networking

Data Request by Name


use any and all means available (IP, VPN tunnels, multicast, proxies, etc).

Anyone can Respond


Anything that hears the request and has a valid copy of the data can respond.

Inbuilt Security
The returned data is signed, and optionally secured, so its integrity & association
with name can be validated (data centric security)

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Content Centric Networking
What Happens Today is connection by LOCATION

Network Infrastructure

FIB

DST
SRC

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
What we need is content by NAME

Network Infrastructure

Content
FIB
Store

DST
SRC

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Content Centric Networking
nytimes

Client 1 Client 2 Client 3

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Example Content Distribution
nytimes

Network provides the


Wires and the Memory
Content goes only where
theres INTEREST
Traffic due to routing and
control associated with
the replicas is minimised

Client 1 Client 2 Client 3

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
CCN Operation Basics
CCN Packets

Two CCN packet types:


(similar to http get)
(similar to http response)
Both are encoded in an efficient binary XML.

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Basic CCN Forwarding

Consumer broadcasts an packet over any and all available


communications media:
get /parc.com/van/presentation.pdf

packet identifies a collection of data - all data items whose name


has the interest as a prefix.

Anything that hears the and has an element of the collection can
respond with that via a packet:
HereIs /parc.com/van/presentation.pdf/p1 <data>

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Basic CCN transport

Data that matches an consumes it.

must be re-expressed to get new .


Controlling the re-expression allows for traffic management and environmental
adaptation.

Multiple (distinct) in same collection may be expressed (similar


to TCP window).

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Content-Based Security
Name->Content mapping verified via per-data packet signature
packet is authenticated with digital signature
All content must be signed by its producer

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Content Name Hierarchy

Source:
Most
Name recent version
tree child of slides for
nodes are
lexically
this talk:ordered
parc.com/van/talks/mit10-08/v2/s2
<next> assumed if not explicitly
parc.com/van/talks/mit10-08 <rightmost
specified
child>

<rightmostchild> always used

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
CCN Naming Convention
Internally, CCN names are opaque, structured byte strings. For example:

is represented as a component count then, for each component, a byte


count followed by that many bytes:

7 8: parc.com 3: van 3: cal 32: 3FDC96

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Using CCN Names

The only assumption CCN makes about names is hierarchical structure.


Names or components can be encrypted or contain arbitrary binary data.

The hierarchical structure is used to do longest match lookups


(similar to IP prefix lookups) which helps guarantee log(n) state scaling for
globally accessible data.

Although CCN names are longer than IP identifiers, this structure allows
lookups as efficient as IP routing.

Source: Martin Dietzfelbinger, Rasmus Pagh: Succinct Data Structures for Retrieval and Approximate Membership Cornell
University Library 0803.3693

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Structure is Strength and Weakness

Name Privacy
NDN Content names related to the content itself
Observer can determine when two requests refer to the same content

Content Privacy
Any entity that knows name can retrieve the content
Encryption not applied to publicly available content

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Structure is Strength and Weakness

Cache Privacy
Network neighbours may learn each other content access by identifying cache hits
Multiple copies of content may by in violation of rights agreements

Signature Privacy
All digital signatures are publicly verifiable therefore identity of a content signer may
leak sensitive information

Research Efforts Underway:


- For example: ANDaNA - http://arxiv.org/abs/1112.2205v2

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Names and meaning

Like IP, a CCN node imposes no semantics on names.


Meaning comes from application, institution and global conventions reflected in
prefix forwarding rules.

For example,
/parc.com/people/van/presentations/FISS09
might be the name of a presentations data and
/thisRoom/projector
the name of the projector it should display on.

The former is a globally meaningful name leveraging the DNS global


naming structure. The latter is local and context sensitiveit refers to
different objects depending on the room youre in.

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
CCN Node Model
Combination of Router and Content Store
parc.com/videos/WdigetA.mpg/v3/s2
Request for content via Face 0 Face 0
Content Store
Name Data
get /parc.com/videos/WidgetA.mpg/v3/s2

parc.com/videos/WdigetA.mpg/v3/s2
Pending Interest Table
Face 1
Prefix Face data: /parc.com/videos/Widget.A.mpg/v3/s2
0
Various
HOLD Content
Prefer
Incoming
ContentTHIS
mechanisms
cached
response
QUESTION
Store
in content
on->
exist
Face
PITto
store
->
1flush
FIB
FIB Face 2
parc.com
Prefix Face
PIT due to DDoS, timeouts, etc
0, 1

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Leveraging Conventional Routing

Like IPv4 and IPv6 addresses, CCN


Content Store Face 0 ContentNames are aggregatable and
Name Data
routed based on longest match
However,
How does Content
the FIB get populated
Names with
are of
Face 1 varying
Pending Interest Table
Prefix Face
Contentlength
Prefixesand
? longer than IP
addresses
The TLV (Type Label Value) of OSPF
FIB Face 2 or IS-IS can distribute CCN content
Prefix Face
prefixes
parc.com
1 Therefore, CCN Interest/Data
forwarding can be built on existing
infrastructure without any modification
to the routers

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
The Dynamic Routing Scaling Problem

Take todays largest Internet Routing Table the DFZ has 4 x 105 BGP
routes
Growth of DFZ:
1998 50k Prefixes
2008 250k Prefixes
Today 400k Prefixes
How Big Should the CCNx Routing Table Be ?
Google has indexed 1012 Today
Web has 5 x 1010 Text Pages Today

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
The Dynamic Routing Scaling Problem

Take BGP as an example:


High end route-refelctors can handle 4-5 million routes

NDN use DNS Prefixes as first-level search


13 x 107 DNS names in gTLD
9.5 x 107 in .com alone !
If we add ccTLDs, that is nearly 2 x 108

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
The Dynamic Routing Scaling Problem

If NDN were to just carry TLD, that would be 2 x 108 routes


No summarization would be possible

Consider summurization:
Assume carry 2nd and 3rd level prefixes
Rough figure 6 x 108 routes

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Dynamic Routing Proposals
OSPF-N
Uses two new Opaque LSAs in OSPF to update FIB of CCNx Nodes
Operational on AsiaFI NDN testbed
Open-Source code that runs on CCNx
Does not address scaling issue

Convergence/Ofelia
Break network into ICN ASs
Have a RIB server as a default lookup if local FIB fails

IRTF Routing Labels Proposal

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Not Just Cached Content
Voice over CCN

Secure Voice over CCN was implemented using Linphone 3.0 and its
performance evaluated
Caller encodes SIP INVITE as CCN name and sends it as an interest
On receipt of the INVITE, the callee generates a signed Data packet with
the INVITE name as its name and the SIP response as its payload
From the SIP messages, the parties derive paired name prefixes under
which they write RTP packets

Source: http://conferences.sigcomm.org/co-next/2009/workshops/rearch/papers/Jacobson.pdf

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Merits & Concerns
Merits of CCN
Very understandable scheme

Shown to work also with streamed media

Clever reuse of existing mechanisms

Easy to deploy on existing routing protocols and IP networks

Easy, human-readable naming scheme

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Concerns/Future Work
The simple hierarchical (URI-like) naming scheme is also a limitation

Will CCN scale to billions of nodes?


Flooding (send out through all available faces)
Flow balance an Interest for every Data
How large can the FIB grow (soft state)?
Data takes the same (possibly non-optimal) path as Interest

Need real-world/at-scale tests to validate performance benefits

Security Architecture Issues

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Further Information
Further Information

CCNx Project Page www.ccnx.org


Named Data Networking www.named-data.net
Pursuit Project - http://www.fp7-pursuit.eu/PursuitWeb/
Convergence Project - http://www.ict-convergence.eu/
Netinf www.netinf.org
ANDaNA - http://sprout.ics.uci.edu/projects/ndn/
IRTF ICN Research Group - http://irtf.org/icnrg

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Summary
Content Centric Networking

CCN Operation Basics

CCN Node Model

Merits & Concerns

Questions

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Questions ?
Complete Your Online
Session Evaluation
Give us your feedback and you
could win fabulous prizes.
Winners announced daily.
Receive 20 Passport points for each
session evaluation you complete.
Complete your session evaluation
online now (open a browser through
our wireless network to access our Dont forget to activate your
portal) or visit one of the Internet Cisco Live Virtual account for access to
stations throughout the Convention all session material, communities, and
on-demand and live activities throughout
Center. the year. Activate your account at the
Cisco booth in the World of Solutions or visit
www.ciscolive.com.

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Final Thoughts

Get hands-on experience with the Walk-in Labs located in World of


Solutions, booth 1042
Come see demos of many key solutions and products in the main Cisco
booth 2924
Visit www.ciscoLive365.com after the event for updated PDFs, on-
demand session videos, networking, and more!
Follow Cisco Live! using social media:
Facebook: https://www.facebook.com/ciscoliveus
Twitter: https://twitter.com/#!/CiscoLive
LinkedIn Group: http://linkd.in/CiscoLI

BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
BRKSPG-2704 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public

Anda mungkin juga menyukai