Content-Centered Networking CS460 Spring 2010 Historic IP View of - - PowerPoint PPT Presentation

content centered networking
SMART_READER_LITE
LIVE PREVIEW

Content-Centered Networking CS460 Spring 2010 Historic IP View of - - PowerPoint PPT Presentation

Content-Centered Networking CS460 Spring 2010 Historic IP View of Communication Run the Physics Simulation on the Cray Resource, e.g. Printer Computation OK, Result Content Delivery Networks Communication is data oriented Data is


slide-1
SLIDE 1

Content-Centered Networking

CS460 Spring 2010

slide-2
SLIDE 2

Historic IP View of Communication

Resource, e.g. Printer Computation

Run the Physics Simulation on the Cray

OK, Result

slide-3
SLIDE 3

Content Delivery Networks

  • Communication is data oriented
  • Data is “in” the network
  • No one host holds the data
  • Caching, e.g. Squid
  • Strategic placement, e.g. Akamai
slide-4
SLIDE 4

Content-Centric Communication

Dancing Baby Muppet's Ode to Joy

Show me that funny Dancing Baby video

Curling Recaps

slide-5
SLIDE 5

Content-Centric Networking

  • Promoted by Van Jacobson and his team at

PARC

  • http://www.parc.com/publication/2318/network
slide-6
SLIDE 6

Basic Communication Elements

slide-7
SLIDE 7

Communication Infrastructure

slide-8
SLIDE 8

Security in CCN

  • With IP, you think about securing the connection
  • With CCN you just secure the data
  • Content packet is always signed (integrity)
  • Requester and/or infrastructure can verify the

signature

  • Key distribution?
  • Could chose to only look at data signed by

particular entities. Or signed by signed by particular entities.

slide-9
SLIDE 9

Confidentiality in CCN

  • Applications can chose to encrypt the payload
  • Again key management responsibility of higher

layers.

slide-10
SLIDE 10

Availability in CNN

  • Interest requests are merged
  • There is no way a client can directly probe a

server.

slide-11
SLIDE 11

Attacking the infrastucture?

  • Could you put up a Content router that doesn't

play by the rules?

  • Could you insert yourself in the middle of a

CCN network?

  • If you could “own” a CCN element, would you

be able to launch attacks on availability? Or integrity and confidentiality?