Introduction to Content Centric Networking Van Jacobson - - PowerPoint PPT Presentation

introduction to content centric networking
SMART_READER_LITE
LIVE PREVIEW

Introduction to Content Centric Networking Van Jacobson - - PowerPoint PPT Presentation

Introduction to Content Centric Networking Van Jacobson van@parc.com FISS 09 Bremen, Germany 22 June 2009 This talk describes ongoing PARC work on CCN (Content-centric Networking) by: Jim Thornton Simon Barber Diana Smetters


slide-1
SLIDE 1

Introduction to

Content Centric Networking

Van Jacobson

van@parc.com

FISS 09 Bremen, Germany 22 June 2009

slide-2
SLIDE 2

2

This talk describes ongoing PARC work on CCN (Content-centric Networking) by:

  • Jim Thornton
  • Diana Smetters
  • Nick Briggs
  • Michael Plass
  • Rebecca Braynard
  • Elaine Shi
  • Simon Barber
  • Ignacio Solis
  • Mark Mosko
  • JJ Garcia-Luna
  • and me
slide-3
SLIDE 3

CCN goals

  • Matches today’s communication problems
  • Matches today’s application design patterns
  • Is at least as scalable & efficient as TCP/IP
  • Is much more secure
  • Requires far less configuration

3

Create a simple, universal, flexible communication architecture that:

slide-4
SLIDE 4

Universal?

  • Any architecture designed to run over

anything is necessarily an overlay.

  • What matters are capabilities: IP started as

an overlay on the phone system; today the phone system is an overlay on IP ... IP has a universality independent of any layer-2.

  • CCN has the same character: it can run
  • ver anything, including IP, and anything can

run over CCN, including IP.

4

slide-5
SLIDE 5

Talk Plan

  • History and motivation
  • Content Model
  • Security Model
  • Node Model
  • Routing
  • Transport

5

slide-6
SLIDE 6

Networking was invented in this world

6

slide-7
SLIDE 7

Networking was invented in this world

6

It was about sharing resources, not data.

slide-8
SLIDE 8
  • The central abstraction is a host identifier.
  • The fundamental communication model is a

point-to-point conversation between two hosts.

7

Networking created today’s world of content but was never designed for it

slide-9
SLIDE 9

8

  • Networking hates wireless, mobility and

intermittent connectivity.

  • Cognitive mismatch - user/app model is ‘what’,

network wants ‘who’. Mapping between models requires a lot of convention and configuration (middleware & wetware).

  • No useful security - content is opaque to the

net and it can’t secure something it knows nothing about.

Unfortunate consequences

slide-10
SLIDE 10
  • There is a lot of content: As of Dec 2008

the Internet was moving 8 Exabytes/month.

  • IDC reports that 180 Exabytes of new

content was created in 2006.

  • More than a Zettabyte is expected in 2010

(60% annual growth).

9

Data Communications today is about moving content

John Gantz, IDC (March, 2008). "An Updated Forecast of Worldwide Information Growth Through 2011". Andrew Odlyzko, UMN, Minnesota Internet Traffic Studies (MINTS)

slide-11
SLIDE 11

Networking & storage cost evolution

10

1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 0.01 0.1 1 10 1 10

US OC-3 $ per Mbps per Mile IBM disk $ per MB at introduction Disc long-haul OC-3 Year

Disk: D. Thompson, IBM JR&D, May 2000 Telco: Douglas Galbi, Chief Economist, US FCC, July 2000

slide-12
SLIDE 12

Introduction to

Content Centric Networking

Van Jacobson

van@parc.com

FISS 09 Bremen, Germany 22 June 2009

slide-13
SLIDE 13

2

This talk describes ongoing PARC work on CCN (Content-centric Networking) by:

  • Jim Thornton
  • Diana Smetters
  • Nick Briggs
  • Michael Plass
  • Rebecca Braynard
  • Elaine Shi
  • Simon Barber
  • Ignacio Solis
  • Mark Mosko
  • JJ Garcia-Luna
  • and me
slide-14
SLIDE 14

CCN goals

  • Matches today’s communication problems
  • Matches today’s application design patterns
  • Is at least as scalable & efficient as TCP/IP
  • Is much more secure
  • Requires far less configuration

3

Create a simple, universal, flexible communication architecture that:

slide-15
SLIDE 15

Universal?

  • Any architecture designed to run over

anything is necessarily an overlay.

  • What matters are capabilities: IP started as

an overlay on the phone system; today the phone system is an overlay on IP ... IP has a universality independent of any layer-2.

  • CCN has the same character: it can run
  • ver anything, including IP, and anything can

run over CCN, including IP.

4

slide-16
SLIDE 16

Talk Plan

  • History and motivation
  • Content Model
  • Security Model
  • Node Model
  • Routing
  • Transport

5

slide-17
SLIDE 17

Networking was invented in this world

6

slide-18
SLIDE 18

Networking was invented in this world

6

It was about sharing resources, not data.

slide-19
SLIDE 19
  • The central abstraction is a host identifier.
  • The fundamental communication model is a

point-to-point conversation between two hosts.

7

Networking created today’s world of content but was never designed for it

slide-20
SLIDE 20

8

  • Networking hates wireless, mobility and

intermittent connectivity.

  • Cognitive mismatch - user/app model is ‘what’,

network wants ‘who’. Mapping between models requires a lot of convention and configuration (middleware & wetware).

  • No useful security - content is opaque to the

net and it can’t secure something it knows nothing about.

Unfortunate consequences

slide-21
SLIDE 21
  • There is a lot of content: As of Dec 2008

the Internet was moving 8 Exabytes/month.

  • IDC reports that 180 Exabytes of new

content was created in 2006.

  • More than a Zettabyte is expected in 2010

(60% annual growth).

9

Data Communications today is about moving content

John Gantz, IDC (March, 2008). "An Updated Forecast of Worldwide Information Growth Through 2011". Andrew Odlyzko, UMN, Minnesota Internet Traffic Studies (MINTS)

slide-22
SLIDE 22

Networking & storage cost evolution

10

1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 0.01 0.1 1 10 1 10

US OC-3 $ per Mbps per Mile IBM disk $ per MB at introduction Disc long-haul OC-3 Year

Disk: D. Thompson, IBM JR&D, May 2000 Telco: Douglas Galbi, Chief Economist, US FCC, July 2000

slide-23
SLIDE 23

Networking & storage cost evolution

10

1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 0.01 0.1 1 10 1 10

US OC-3 $ per Mbps per Mile IBM disk $ per MB at introduction Disc long-haul OC-3 Year

Disk: D. Thompson, IBM JR&D, May 2000 Telco: Douglas Galbi, Chief Economist, US FCC, July 2000

Disk cost/byte has fallen 3%/week for the last 25 years!

slide-24
SLIDE 24

and storage is going to get a lot cheaper ...

11

Max Planck Institute, June 2008

200 Gb/in2 PZT nano-capacitor non-volatile memory 10 Tb/in2 co-polymer magnetic memory

LBL, Feb. 2009

Tb/in2 carbon nanotube magnetic memory

LBL, May 2009

4 Tb/in2 MEMS memory array

  • Univ. Twente, July 2009
slide-25
SLIDE 25

Can we create a network architecture based

  • n named data instead of named hosts?

Cost evolution favors trading storage for bandwidth but ...

Storage names say what we want, Network names say who we want.

Mapping between these two models requires a lot of plumbing (middleware & wetware).

12

slide-26
SLIDE 26

13

Making content move itself

slide-27
SLIDE 27

13

van’s calendar?

pointless mtg 08:30

  • Devices express

‘interest’ in data collections.

  • Devices with data

in collection respond.

Making content move itself

slide-28
SLIDE 28

13

van’s calendar?

p

  • i

n t l e s s m t g 8 : 3

  • Devices express

‘interest’ in data collections.

  • Devices with data

in collection respond.

Making content move itself

slide-29
SLIDE 29

14

  • Users specify the objective, not how to

accomplish it.

  • Data appears wherever it needs to be.
  • Model loves wireless and broadcast

(802.11, RFID, Bluetooth, NFC, ...).

  • There’s no distinction between bits in a

memory and bits in a wire.

  • Data security and integrity are the

architectural foundation, not an add-on.

slide-30
SLIDE 30
  • History and motivation
  • Content Model
  • Security Model
  • Node Model
  • Routing
  • Transport

15

slide-31
SLIDE 31

Self-managing information needs context

  • Ontology (the relationship of

this to other information)

  • Provenance (some basis for

trust in the information)

  • Locality (proximity awareness

and management)

16

van’s calendar? pointless mtg 08:30 van’s calendar? pointless mtg 08:30

slide-32
SLIDE 32

Friction

Moving up-level is an amplifier.

  • We shouldn’t amplify mistakes.

(E.g., if you accidentally delete a file anywhere, FolderShare makes sure it’s deleted everywhere.)

  • We shouldn’t amplify attacks.

(Machines need a very high level of confidence in context & data integrity).

17

van’s calendar? pointless mtg 08:30 van’s calendar? pointless mtg 08:30