Functional Chaining System in ICN Phil Brown Fujitsu Laboratories - - PowerPoint PPT Presentation
Functional Chaining System in ICN Phil Brown Fujitsu Laboratories - - PowerPoint PPT Presentation
Functional Chaining System in ICN Phil Brown Fujitsu Laboratories of America, Inc. December 7, 2016 Functional Chaining demo setup 2 Routing optimization 3 In-network caching 4 Whole-chain security /video_compression/
2
Functional Chaining demo setup
3
Routing optimization
4
In-network caching
5
Whole-chain security
Content stack Signature stack
/video_compression/… /video_combination/.. /video_clips/.... Content 3 (compressed video) Content 2 (hash of combined video & header) Content 1 (multiple hashes of raw video clips & header ) Signature 3 /video/compression/key/3 Signature 2 /video/combiner/key/2 Signature 1 (including multiple signatures and keys) /user/Alex/key/1 /user/Bob/key/1 /user/Charlie/key/1
6
Path Search-Similar users
- ptimal vs edge caching
limited link capacity
𝑑𝑗 𝜇𝐶=.8, 𝑑𝑡 𝜇𝐶𝑆=.6
For small α more storage at core is
- ptimum, so the cost reduction
improvement comparing to only edge caching is bigger (20-30%)
7
Background
Differences with NFN (Named Function Networking)
8
NFN processing procedure
NFN uses a 3-phase strategy, i.e., upstream fetch, separate code and data fetch, and computation push, to process a functional chaining request
9
NFN
NDN Router NDN Router NDN Router NDN Router NFN-capable Router
Interest (|data|h|g) Interest (|data|h|g) Interest (data) Interest (g)
Assume we have a chain of function applications f(g(h(data))): NFN encodes it as |data|h|g|f Phase 2 of NFN (separate code and data fetch): An Interest is firstly forwarded to an NFN-capable router, which can divide the Interest to fetch multiple data and functions (codes). After that, data can be processed at the NFN-capable router and returned back to the consumer.
Data Function h Function g Data (data) Data (g) Data (|data|h|g) Data (|data|h|g)
10
Summary
Differences
- Naming
- Interest & Data processing procedure
- Functional chaining forwarding strategy
- Whole chain security