Introduction to Information Centric Networking
Andrés Arcia-Moret N4D Lab, Computer Laboratory University of Cambridge
Introduction to Information Centric Networking Andrs Arcia-Moret - - PowerPoint PPT Presentation
Introduction to Information Centric Networking Andrs Arcia-Moret N4D Lab, Computer Laboratory University of Cambridge Agenda Motivation Information Centric Networking Implementations: NDN, DONA, NetInf, Juno, PURSUIT PURSUIT
Andrés Arcia-Moret N4D Lab, Computer Laboratory University of Cambridge
PURSUIT
(communication functions)
interest rather than end-hosts
information management perspective
what is in a name.
transparently.
every (replicated) object. routing, ICN uses bindings between points, and optimal content src. security, ICN secure integrity of objects rather than channels. API, exposed to produce and consume.
communication becomes receiver driven, thus no need for sender cooperation for in-order reliability. Better congestion/flow control due to convenient distribution.
between what (objects) and where (location).
the label that identifies content.
domain.
reference is found then it propagates in the tree till found. Then shortcut the way back to the consumer (possibly through TCP/IP).
packets.
made me remember the paper saying that with some configuration tricks one can get ICN networks.
[Koponen et al., 2007] Koponen, et al (2007). A data-oriented (and beyond) network
Architectures, and Protocols for Computer Communications, SIGCOMM ’07, pages 181–192, New York, NY, USA. ACM.
RH RH RH RH RH RH RH
Tier-1
Copy Copy Client
Figure 1: Registration state (solid arrows) in RHs after copies have registered themselves. RHs route client-issued FIND (dashed arrow) to a nearby copy.
[Koponen et al., 2007] Koponen, et al (2007). A data-oriented (and beyond) network architecture. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM ’07, pages 181–192, New York, NY, USA. ACM. [Tyson et al., 2013] Tyson, G., Sastry, N., Cuevas, R., Rimac, I., and Mauthe, A. (2013). Where is in a name? a survey of mobility in information-centric networks.
Transport protocol header Name (P:L, 40 bytes) Type IP header Next header type
Figure 3: Protocol headers of a FIND packet. Type is to separate FINDs from their responses.
reproducible)
rendezvous (having sub domains)
decentralised though in IP), and forwarding (keeps state).
namespaces
can potentially create state explosion in the core network).
[Tyson et al., 2013] Tyson, G., Sastry, N., Cuevas, R., Rimac, I., and Mauthe, A. (2013). Where is in a name? a survey of mobility in information-centric networks.
discovered later.
choose for optimal (s).
(by MDHT)
[Dannewitz et al., 2013] Dannewitz, C., Kutscher, D., Ohlman, B., Farrell, S., Ahlgren, B., and Karl, H. (2013). Network of information (netinf) - an information- centric networking architecture. Comput. Com- mun., 36(7):721–735. [Tyson et al., 2013] Tyson, G., Sastry, N., Cuevas, R., Rimac, I., and Mauthe, A. (2013). Where is in a name? a survey of mobility in information-centric networks.
Content Discovery Service (JCDS).
dynamically attachable protocol plug-ins.
[Tyson et al., 2013] Tyson, G., Sastry, N., Cuevas, R., Rimac, I., and Mauthe, A. (2013). Where is in a name? a survey of mobility in information-centric networks. [Tyson et al., 2012] Tyson, G., Mauthe, A., Kaune, S., Grace, P., Taweel, A., and Plagemann, T. (2012). Juno: A middleware platform for supporting delivery-centric
information with a late (as late as possible) binding to a location at which the computation over this graph is going to happen, enables the full potential for optimisation!
information & computation (and with it storage) into a single design approach for any resulting distributed system
source: PURSUIT FP7 public dissemination reports.
require solving another problem.
fragmentation on a restrained link(s) —> Computation in distributed systems is all about information dissemination (pertaining to a task at hand)
source: PURSUIT FP7 public dissemination reports.
flat), adapting to a particular computational problem
Trossen, D. and Parisis, G. (2012). Designing and realizing an information-centric internet. IEEE Communications Magazine, 50(7):60–67.
Figure 1. Functional layered model.
Problem-specific
Layer n+1 Layer n-1 Layer n Optimization through modularity within each problem Deconstraining through recursive layering Information flow manipulation Topology Forwarding Rendezvous The layering process is recursive! Dissemination strategy
[Trossen and Parisis] Trossen, D. and Parisis, G. (2012). Designing and realizing an information-centric internet. IEEE Communications Magazine, 50(7):60–67.
Forwarding and more Topology Rendezvous
Rendezvous
Forwarding and more Topology
T r a n s p o r t For- war- ding Network coding Frag- mentation Caching Error correction Rendez- vous Topol-
Figure 1: Rendezvous, Topology, Forwarding
Recursive models
[Jokela et al., 2009] Jokela, P., Zahemszky, A., Esteve Rothenberg, C., Arianfar, S., and Nikander, P. (2009). Lipsin: Line speed publish/subscribe inter-networking. SIGCOMM Comput. Commun. Rev., 39(4):195– 206.
Forwarding Network TM Forwarding Network TM Forwarding Network TM Forwarding Network TM FN Rendezvous Network RP ITF Pub Sub Pub Fragmentation Caching Forwarding Totpology Rendezvous Helper Service Model Error Control Network Architecture Node Architecture
source: PURSUIT FP7 public dissemination reports.
data is mutable (channel in the item)
segment visible)
I should be commenting on the specifics of this work and its relationship to DONA, CCN, etc. (how these other works are seen as dissemination strategies)
Internet
What if we could instead include the state in the packet?
To: {Hop1, Hop2, Hop N} To: {Bloom Filter}
the BF:
been tested? Then, positive response!
string 1 1 1 ID 1 ID 2 Hash1(ID1) = 2 Hash2(ID1) = 8 Hash1(ID2) = 9 Hash2(ID2) = 4 10-bit BF
1 1 1 ID 1 10-bit BF Test if “Data 1” has been inserted in the BF All corresponding bits are set => positive response! Hash1(ID1) = 2 Hash2(ID1) = 8
therefore there is no equivalent to IP addresses
defines the transit path
A->B 0 1 0 0 0 1 0 0 1 B->C 1 0 0 0 0 1 1 0 1 zF: A -> B -> C 1 1 0 0 0 1 1 0 1
Zorglub
& = ?
Link ID
zFilter zFilter
YES -- > FORWARD
nonhashed
into constant length Bloom filter)
then pick resulting Bloom filter with lowest false positive probability
decrease number of LIds to be used
with 20 subscribers
multicast groups
AS6461 Abovenet (US) 367 (R -ISP) 1,000 (L -ISP) 2,259 (R - CUST) 1,400 (L - CUST)
55 60 65 70 75 80 85 90 95 100 5 10 15 20 25 30 35 2 4 6 8 10 forwarding efficiency (%) false positive rate (%) Users (1 publisher and N-1 subscribers) False positive and forwarding efficiency evaluation in AS6461 (d=8, k=5) Standard zFilter fpr fpa-opt. zFilter fpr fpr-opt. zFilter fpr Standard zFilter fw. eff. fpa-opt. zFilter fw. eff. fpr-opt. zFilter fw. eff.
Figure 5: ns-3 simulation results for AS 6461.
[Jokela et al., 2009] Jokela, P., Zahemszky, A., Esteve Rothenberg, C., Arianfar, S., and Nikander, P. (2009). Lipsin: Line speed publish/subscribe inter-networking. SIGCOMM Comput. Commun. Rev., 39(4):195– 206.
manager
stage
header
stage
Stage 2 Stage 1 Stage 3
<256 bits <256 bits <256 bits
DATA
taking into account out_tree)
Elias_omega_coding)
length h 10 bits length h 8 bits length h 9 bits DATA
Stage 2 Stage 1 Stage 3
S P
in tree
positives is zero)
anomalies)
the tree source: PURSUIT FP7 public dissemination reports.
support
fp7-pursuit/blackadder
reaches 1GB/s
Figure 3. Node implementation architecture.
Click Local proxy Forwarding Rendezvous Topology formation IPC element Communication elements AppN
...
App4 App3 App2 App1 /dev/eth0 /dev/eth1 Raw IP sockets
Blackadder Node
*Trossen, D. and Parisis, G. (2012). Designing and realizing an information-centric internet. IEEE Communications Magazine, 50(7):60–67.
proxy loRV FW tonetlink raw socket (UDP , 55555)
IPClassifier(dst udp port 55555 and src udp port 55555)[0]
1000
thread safe queue 1 2 1 fromnetlink BA-APP
require(blackadder); globalconf::GlobalConf(MODE ip, NODEID 00000001, DEFAULTRV
0000000000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000000000 0000001000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000,
TMFID
0000000000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000000000 0000001000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000,
iLID
0000000000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000000000 0000001000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000);
localRV::LocalRV(globalconf); netlink::Netlink(); tonetlink::ToNetlink(netlink); fromnetlink::FromNetlink(netlink); proxy::LocalProxy(globalconf); fw::Forwarder(globalconf,2, 1,192.168.15.4,192.168.15.5,000000000000000000000000000000000000000000
0000000000000001000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000000 0000,
1,192.168.15.4,10.0.2.17,000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000010000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000000 0);
+40 on demand ones
configurable topologies
*Trossen, D. and Parisis, G. (2012). Designing and realizing an information-centric internet. IEEE Communications Magazine, 50(7):60–67.
Forwarding efficiency
(when nodes is sub)
when 3 subs per node for 13 nodes
pubs and more due to local copies
*Trossen, D. and Parisis, G. (2012). Designing and realizing an information-centric internet. IEEE Communications Magazine, 50(7):60–67.
scope
item, wait until receive it and reiterate (500 times)
(ignores any possible
rendezvous or mutable semantics)
processes per node (7000 subs)
node (73 in total), 680 ms for 500 subs
source: PURSUIT FP7 public dissemination reports.
dealing with scalable access to information
(CCN), and partially distributed (PURSUIT, PSIRP, LIPSIN).
economy of space for LIPSIN/PURSUIT
standardisation of interfaces for regular devices: discovery
area networks.