introduction to content centric networking
play

Introduction to Content Centric Networking Van Jacobson - PowerPoint PPT Presentation

Introduction to Content Centric Networking Van Jacobson van@parc.com FISS 09 Bremen, Germany 22 June 2009 This talk describes ongoing PARC work on CCN (Content-centric Networking) by: Jim Thornton Simon Barber Diana Smetters


  1. Introduction to Content Centric Networking Van Jacobson van@parc.com FISS 09 Bremen, Germany 22 June 2009

  2. This talk describes ongoing PARC work on CCN (Content-centric Networking) by: • Jim Thornton • Simon Barber • Diana Smetters • Ignacio Solis • Nick Briggs • Mark Mosko • Michael Plass • JJ Garcia-Luna • Rebecca Braynard • and me • Elaine Shi 2

  3. CCN goals Create a simple, universal, flexible communication architecture that: • Matches today’s communication problems • Matches today’s application design patterns • Is at least as scalable & efficient as TCP/IP • Is much more secure • Requires far less configuration 3

  4. Universal? • Any architecture designed to run over anything is necessarily an overlay. • What matters are capabilities: IP started as an overlay on the phone system; today the phone system is an overlay on IP ... IP has a universality independent of any layer-2. • CCN has the same character: it can run over anything, including IP, and anything can run over CCN, including IP. 4

  5. Talk Plan • History and motivation • Content Model • Security Model • Node Model • Routing • Transport 5

  6. Networking was invented in this world 6

  7. Networking was invented in this world It was about sharing resources, not data. 6

  8. Networking created today’s world of content but was never designed for it • The central abstraction is a host identifier. • The fundamental communication model is a point-to-point conversation between two hosts. 7

  9. Unfortunate consequences • Networking hates wireless, mobility and intermittent connectivity. • Cognitive mismatch - user/app model is ‘what’ , network wants ‘who’ . Mapping between models requires a lot of convention and configuration (middleware & wetware). • No useful security - content is opaque to the net and it can’t secure something it knows nothing about. 8

  10. Data Communications today is about moving content • There is a lot of content: As of Dec 2008 the Internet was moving 8 Exabytes/month. • IDC reports that 180 Exabytes of new content was created in 2006. • More than a Zettabyte is expected in 2010 (60% annual growth). Andrew Odlyzko, UMN, Minnesota Internet Traffic Studies (MINTS) John Gantz, IDC (March, 2008). "An Updated Forecast of Worldwide Information Growth Through 2011". 9

  11. Networking & storage cost evolution long-haul OC-3 10 IBM disk $ per MB at introduction 10 US OC-3 $ per Mbps per Mile Disc 1 0.1 0.01 1 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 Year Disk: D. Thompson, IBM JR&D, May 2000 Telco: Douglas Galbi, Chief Economist, US FCC, July 2000 10

  12. Introduction to Content Centric Networking Van Jacobson van@parc.com FISS 09 Bremen, Germany 22 June 2009

  13. This talk describes ongoing PARC work on CCN (Content-centric Networking) by: • Jim Thornton • Simon Barber • Diana Smetters • Ignacio Solis • Nick Briggs • Mark Mosko • Michael Plass • JJ Garcia-Luna • Rebecca Braynard • and me • Elaine Shi 2

  14. CCN goals Create a simple, universal, flexible communication architecture that: • Matches today’s communication problems • Matches today’s application design patterns • Is at least as scalable & efficient as TCP/IP • Is much more secure • Requires far less configuration 3

  15. Universal? • Any architecture designed to run over anything is necessarily an overlay. • What matters are capabilities: IP started as an overlay on the phone system; today the phone system is an overlay on IP ... IP has a universality independent of any layer-2. • CCN has the same character: it can run over anything, including IP, and anything can run over CCN, including IP. 4

  16. Talk Plan • History and motivation • Content Model • Security Model • Node Model • Routing • Transport 5

  17. Networking was invented in this world 6

  18. Networking was invented in this world It was about sharing resources, not data. 6

  19. Networking created today’s world of content but was never designed for it • The central abstraction is a host identifier. • The fundamental communication model is a point-to-point conversation between two hosts. 7

  20. Unfortunate consequences • Networking hates wireless, mobility and intermittent connectivity. • Cognitive mismatch - user/app model is ‘what’ , network wants ‘who’ . Mapping between models requires a lot of convention and configuration (middleware & wetware). • No useful security - content is opaque to the net and it can’t secure something it knows nothing about. 8

  21. Data Communications today is about moving content • There is a lot of content: As of Dec 2008 the Internet was moving 8 Exabytes/month. • IDC reports that 180 Exabytes of new content was created in 2006. • More than a Zettabyte is expected in 2010 (60% annual growth). Andrew Odlyzko, UMN, Minnesota Internet Traffic Studies (MINTS) John Gantz, IDC (March, 2008). "An Updated Forecast of Worldwide Information Growth Through 2011". 9

  22. Networking & storage cost evolution long-haul OC-3 10 IBM disk $ per MB at introduction 10 US OC-3 $ per Mbps per Mile Disc 1 0.1 0.01 1 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 Year Disk: D. Thompson, IBM JR&D, May 2000 Telco: Douglas Galbi, Chief Economist, US FCC, July 2000 10

  23. Networking & storage cost evolution long-haul OC-3 10 IBM disk $ per MB at introduction 10 US OC-3 $ per Mbps per Mile Disc 1 Disk cost/byte has fallen 3%/week for 0.1 the last 25 years! 0.01 1 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 Year Disk: D. Thompson, IBM JR&D, May 2000 Telco: Douglas Galbi, Chief Economist, US FCC, July 2000 10

  24. and storage is going to get a lot cheaper ... 200 Gb/in 2 PZT nano-capacitor non-volatile memory 10 Tb/in 2 co-polymer magnetic memory Max Planck Institute, LBL, Feb. 2009 June 2008 4 Tb/in 2 MEMS Tb/in 2 carbon nanotube memory array magnetic memory LBL, May 2009 Univ. Twente, July 2009 11

  25. Cost evolution favors trading storage for bandwidth but ... Storage names say what we want, Network names say who we want. Mapping between these two models requires a lot of plumbing (middleware & wetware). Can we create a network architecture based on named data instead of named hosts? 12

  26. Making content move itself 13

  27. Making content move itself • Devices express van’s calendar? ‘interest’ in data pointless mtg 08:30 collections. • Devices with data in collection respond. 13

  28. Making content move itself • Devices express ‘interest’ in data collections. van’s calendar? • Devices with data p o i n t l e s s in collection m t g 0 8 respond. : 3 0 13

  29. • Users specify the objective, not how to accomplish it. • Data appears wherever it needs to be. • Model loves wireless and broadcast (802.11, RFID, Bluetooth, NFC, ...). • There’s no distinction between bits in a memory and bits in a wire. • Data security and integrity are the architectural foundation, not an add-on. 14

  30. • History and motivation • Content Model • Security Model • Node Model • Routing • Transport 15

  31. Self-managing information needs context • Ontology (the relationship of this to other information) van’s calendar? • Provenance (some basis for pointless mtg 08:30 trust in the information) van’s calendar? pointless mtg 08:30 • Locality (proximity awareness and management) 16

  32. Friction Moving up-level is an amplifier. ‣ We shouldn’t amplify mistakes. (E.g., if you accidentally delete a file anywhere, van’s calendar? pointless mtg 08:30 FolderShare makes sure it’s deleted everywhere.) van’s calendar? pointless mtg 08:30 ‣ We shouldn’t amplify attacks. (Machines need a very high level of confidence in context & data integrity). 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend