Networking Named Content

Download Report

Transcript Networking Named Content

Networking Named Content
Jacobson, V.; Smetters, D. K.;
Thornton, J. D.; Plass, M. F.; Briggs,
N.; Braynard, R.
CoNEXT 2009
Networking Named Content
1.Introduction
2.CCN Node Model
3.Transport
4.Routing
5.Content-Based Security
6.Evaluation
问题思考
1.Introduction

Content-Centric Networking(CCN)


People value the Internet for what
content it contains, but communication is
still in terms of where.
CCN has no notion of host at its lowest
level – a packet “address” names content,
not location
1.Introduction
与TCP/IP的异同

TCP/IP 网络与CCN 协议栈有很多的共同
点。



它们都采用7 层结构,并且底层完全相同
下层协议都是为了适配底层物理链路和通
信而设计,上层协议为对应相关的应用而
设计
两者最大的区别就是在全网统一标识的中
间层,前者的核心是IP 协议,后者的核心
是内容块协议
与TCP/IP的异同

相比IP 网络,CCN 有两个突出的特点,这与其
策略层和安全层有关。


一是CCN 可以最充分地同时利用多种连接方式,
如以太网、3G、蓝牙、Wi-Fi、WiMAX 等,并且
可以在不断变化的环境中动态地寻求最优化的实
现方式;
二是CCN 本身就保证了它所传送的信息内容的安
全。在IP 网络中,安全措施往往是通过对承载网
络或终端的加强来实施的,而CCN 对网络设备并
不关心,它所传送的内容已经是安全的了
2.CCN Node Model

CCN packet types
2.CCN Node Model

CCN names
2.CCN Node Model

CCN forwarding engine model
3.Transport

3.1 Reliability and Flow Control


Since CCN flow balance is maintained
at each hop, there is no need for
additional techniques to control
congestion in the middle of a path.
Authors will cover this topic in detail ina
future paper
3.Transport

3.2 Sequencing
3.Transport

3.3 Rich Connectivity, Mobility and
Strategy


CCN talks about data, not to nodes。
CCN can always exchange data as soon
as it is physically possible to do so.
与TCP/IP的异同

CCN 采用了不同于TCP 的重传机制, 它
由最终用户(产生最初请求数据包的应用)
负责发起重传请求,而接收端的策略层负
责按照一定的策略确定从列表中选择某个
特定端口进行重传。
4.Routing

Any routing scheme that works well for IP
should also work well for CCN

4.1 Link-state Intra-domain Routing

4.2 Inter-domain Routing
4.Routing
4.1
Link-state Intra-domain Routing
4.Routing

4.2 Inter-domain Routing


Once a few customers of an ISP start to use
CCN, it is in the ISP’s best interest to deploy
content router(s) to reduce peering costs
The central problem with this type of bottom-up
deployment is to bridge the gap between
domains that have content routers but are
separated by ISP(s) that do not.
5.Content-Based Security

5.1 Content Validation

CCN authenticates the binding between names and
content; the signature in each CCN data packet is over the
name, the content, and a small amount of supporting data
useful in signature verification

5.2 Managing Trust

Although CCN moves data in a peer-to-peer fashion, it
provides end-to-end security between content publisher
and content consumer.

CCN content consumers must determine whether received
content is acceptable, or trustworthy.
5.Content-Based Security

5.3 Content Protection and Access
Control


The primary means of controlling access
to CCN content is encryption.
5.4 Network Security and Policy
Enforcement
与TCP/IP的异同

由于CCN 没有主机的概念, 很难采取以
主机为目的的攻击, 因此对CCN 的攻击
仅限于拒绝服务攻击和内容隐藏等手段。
6.Evaluation

6.1 Data Transfer Efficiency
6.Evaluation

6.1 Data Transfer Efficiency
6.Evaluation

6.2 Content Distribution Efficiency
问题思考




本文有些部分内容语焉不详。
安全性仅是理论上的探讨,没有实质实验
证明。
外部路由没有试验支持。
实验6.1-2数据量太小
相关工作
项目名称
DONA
代表论文
基本内容
A data-oriented (and
beyond) network
architecture
提出了一种基于新命名
体系的域名解析方案来
替代现有的DNS
CBN
A routing scheme
for content-based
networking
对传统、基于地址的单
播、多播网络的补充 。
消息的流动(flow)路径
由内容驱动,而不是由
消息发送方指定的地址
来决定
CCN
Networking Named
Content
以内容的“名字”代替
IP地址,重新设计数据
包的格式和各层协议
谢谢!