SlideShare a Scribd company logo
Networking Named Content
Paper by: V. Jacobson et al.
Presented by : Haroon Rashid
1
Content Centric Networking
 No NAT traversal.
 Address space exhaustion.
 Average latency and total bandwidth is minimized.
 Networking in mobile scenarios is easy.
Content Centric Networking (CCN) removes the concept of
host identities (machine address) required for communication
and considers only named data packets. Some of its benefits:
2
Different Paradigms
IP Networking CCN Networking
Source: Lecture Notes on Internet 3
IP vs. CCN Network stack
IP Network Stack CCN Network Stack
4
CCN Packet Types
5
Forwarding Engine
6
Naming/Hierarchical Addressing
Query Traversal
Address Structure
7
Routing
 CCN Uses name prefixes instead of IP prefixes.
 Name prefixes are broadcasted via routing protocols.
 Conventional routing protocols like IS-IS and OSPF are
used in CCN by utilizing a general TLV(type label value)
scheme.
 Each node builds its FIB on receiving prefix.
8
Routing
Steps
1. Local map gets build up by
hello packets – adjacency
matrix.
2. Information of data
availability at a node gets
disseminated via Prefix
announcements (IGP-LSA).
 Prefix based longest
match lookups.
9
• CCN supports multicasting when more than one
announcer of data is found at a particular node while
as IP supports only uni-casting in such a case.
• For inter domain routing, BGP supports equivalent
of IGP TLV mechanism.
10
Security
• Security is build within data itself rather than
securing data channel.
• Digital signatures are used for authentication.
• Cryptographic encryption is used for private data
protection.
• Signature in each data packet is over the packet
name, the content, and on signed-info.
• Decryption keys are distributed along content as a
CCN data blocks – no need of trusted servers.
11
Network Security
• No tampering is possible due to digital signatures.
• Impossible to send the malicious content to a particular
machine as host identities are not revealed.
• Data-based distributed denial of service attacks not possible
as filtering of each data packet takes place at each
aggregation point towards content customer.
• For Interest flooding attack, attacker should be expert in
providing the different combinations of name components
of a prefix served by the target.
12
• CCN’s semantically selective control also
mitigates different attacks:
• Data packets follow same path as Interest – helps
intermediary routers to have fine grained control of Interests
forwarded under a certain prefix.
• Attacked domain can ask downstream routers to throttle
number of Interest packets for a certain prefix.
• Provides tools to organizations to control their
content travel.
• Policy based routing – requiring content name and signer.
• Interests can be digitally signed to enable the policy routing
by how often and into what namespaces a particular
consumer may query.
13
Evaluation
• More time to reach to
throughput asymptote in
CCN due to store and
forward stages.
• Un-optimized task level in
CCN vs. optimized kernel
level implementation in
TCP.
• CCN’s lower throughput due
to its encapsulation in
IP/UDP and its own headers.
• But remember CCN’s
implicit data security.
BULK DATA TRANSFER
14
Performance in secure & insecure
scenarios
• CCN over Jumbo-UDP is twice as efficient as HTTP and
three times more efficient than HTTPS in both overhead
and packets (sent).
15
Performance in data sharing scen.
• The performance penalty of using CCN vs. TCP is around
20% while the performance gain from sharing is integer
multiples, there is a net performance win from using CCN
even when sharing ratios / hit rates are low.
16
Architecture Difference
DONA
• Name given to packet is a
cryptographic hash of
publisher’s key and label.
• DNS type table required for
resolution of user familiar
name to digest based.
• Flat Namespace.
• Content must be first
registered with RHs.
CCN
• Name given is not a
cryptographic digest of
anything.
• User friendly, structured,
location independent
names.
• Hierarchical Namespace.
• Content generated
dynamically in response to
queries.
17
Concerns
• Names based on digest vs. user friendly,
structured names.
• Hierarchical namespace vs. flat namespace.
• Inter-domain routing feasibility.
• Caching level & replacement policy at the
intermediary routers.
• Does it depends on the ISP?
• Can we improve forward strategy?
18

More Related Content

What's hot (20)

PPTX
Content-Centric Networking (CCN)
Dilum Bandara
 
PPTX
F5 tcpdump
alex wade
 
PDF
FUTURE-PROOFING DATA CENTRES from Connectivity Perspective
MyNOG
 
PPT
MPLS RSVP-TE Auto-Bandwidth - Practical Lessons Learned
Richard Steenbergen
 
PDF
Edge virtualisation for Carrier Networks
MyNOG
 
PDF
Dns tunnelling its all in the name
Security BSides London
 
PPT
Digital switching system PDH-SDH-sonet.ppt
ssuser08a5ab
 
PPT
Presentation, Firewalls
kkkseld
 
PDF
MPLS
Elyes Naouar
 
PDF
Mininet Basics
Eueung Mulyana
 
PDF
Using MikroTik routers for BGP transit and IX points
Pavel Odintsov
 
PPT
Mpls vpn toi
ARACELY ZAPATA
 
PDF
macvlan and ipvlan
Suraj Deshmukh
 
PDF
Network Address Translation (NAT)
Joud Khattab
 
PPTX
SIP over TLS
Hossein Yavari
 
PDF
Cours réseaux chap3et4
Amel Morchdi
 
PPT
Request routing in CDN
Sandeep Kath
 
PDF
Muriel Medard - Network Coding in Satellites - Global SIP 2018
CodeOn
 
DOCX
2.6.6 Packet Tracer - Verify Single-Area OSPFv2 - ILM.docx
Josimar Caitano
 
PDF
IPv6: Internet Protocol version 6
Ankita Mahajan
 
Content-Centric Networking (CCN)
Dilum Bandara
 
F5 tcpdump
alex wade
 
FUTURE-PROOFING DATA CENTRES from Connectivity Perspective
MyNOG
 
MPLS RSVP-TE Auto-Bandwidth - Practical Lessons Learned
Richard Steenbergen
 
Edge virtualisation for Carrier Networks
MyNOG
 
Dns tunnelling its all in the name
Security BSides London
 
Digital switching system PDH-SDH-sonet.ppt
ssuser08a5ab
 
Presentation, Firewalls
kkkseld
 
Mininet Basics
Eueung Mulyana
 
Using MikroTik routers for BGP transit and IX points
Pavel Odintsov
 
Mpls vpn toi
ARACELY ZAPATA
 
macvlan and ipvlan
Suraj Deshmukh
 
Network Address Translation (NAT)
Joud Khattab
 
SIP over TLS
Hossein Yavari
 
Cours réseaux chap3et4
Amel Morchdi
 
Request routing in CDN
Sandeep Kath
 
Muriel Medard - Network Coding in Satellites - Global SIP 2018
CodeOn
 
2.6.6 Packet Tracer - Verify Single-Area OSPFv2 - ILM.docx
Josimar Caitano
 
IPv6: Internet Protocol version 6
Ankita Mahajan
 

Viewers also liked (17)

PPTX
Named data networking
namedatanetworking
 
PPTX
What is Content centric networking
praison
 
PDF
Content-Centric Networking: Security
PARC, a Xerox company
 
PPTX
Information Centric Networking and Content Addressability
Shi Junxiao
 
PPTX
Faster Content Distribution with Content Addressable NDN Repository
Shi Junxiao
 
PDF
Smart Congestion Control for Delay- and Disruption Tolerant Networks
Aloizio Silva
 
PDF
CCNxCon2012: Session 4: OSPFN
PARC, a Xerox company
 
PDF
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Gwendal Simon
 
PPTX
Naming in content_oriented_architectures [repaired]
haroonrashidlone
 
PPTX
Routing papers in ccn
haroonrashidlone
 
PPTX
Linked data representation
haroonrashidlone
 
PDF
Information-centric networking and relaton to legal and regulatory issues
SAIL
 
PDF
Binary decision diagrams
haroonrashidlone
 
PDF
Congestion Control in Networks
rapatil
 
PDF
Time series Forecasting
haroonrashidlone
 
PPTX
Congestion on computer network
Disi Dc
 
PPT
Seminar Presentation Hadoop
Varun Narang
 
Named data networking
namedatanetworking
 
What is Content centric networking
praison
 
Content-Centric Networking: Security
PARC, a Xerox company
 
Information Centric Networking and Content Addressability
Shi Junxiao
 
Faster Content Distribution with Content Addressable NDN Repository
Shi Junxiao
 
Smart Congestion Control for Delay- and Disruption Tolerant Networks
Aloizio Silva
 
CCNxCon2012: Session 4: OSPFN
PARC, a Xerox company
 
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Gwendal Simon
 
Naming in content_oriented_architectures [repaired]
haroonrashidlone
 
Routing papers in ccn
haroonrashidlone
 
Linked data representation
haroonrashidlone
 
Information-centric networking and relaton to legal and regulatory issues
SAIL
 
Binary decision diagrams
haroonrashidlone
 
Congestion Control in Networks
rapatil
 
Time series Forecasting
haroonrashidlone
 
Congestion on computer network
Disi Dc
 
Seminar Presentation Hadoop
Varun Narang
 
Ad

Similar to Named data networking (20)

PDF
Study and analysis of mobility, security, and caching issues in CCN
IJECEIAES
 
PDF
Part 1: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Dr. Mahfuzur Rahman Bosunia
 
PDF
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Dr. Mahfuzur Rahman Bosunia
 
PDF
Content centric networks
Meshingo Jack
 
PPTX
Cloud interconnection networks basic .pptx
RahulBhole12
 
PDF
Approaching Content Delivery in Software Defined Networking
FIBRE Testbed
 
PPTX
DC Moving I migracion a otro datacenterd
ElvisJessVillalva
 
PPTX
Security and Transport Performance in 5G
Dirk Kutscher
 
PPTX
Information Centric Networking
Shahneel Siddiqui
 
PPT
Slides cao
Aravindharamanan S
 
PPTX
A Transport Layer and Socket API for (h)ICN: Design, Implementation and Perfo...
Luca Muscariello
 
PDF
A constructive review of in network caching a core functionality of icn slides
Anshuman Kalla
 
ODP
ICN Publish/Subscribe Networking
Shi Junxiao
 
PPTX
Content-Centric Networking in Opportunistic and Mobile Networks
Torsten Braun, Universität Bern
 
PPTX
content centric networking for secu.pptx
imbasarath
 
PDF
Exploring off path caching with edge caching in information centric networkin...
Anshuman Kalla
 
PPT
Cours Cisco
123addou
 
PDF
Cisco vnp workshop 16-17 april v1-0
liemgpc2
 
PDF
Embedded CDNs in 2023
MyNOG
 
PDF
Information Centric Networks A New Paradigm For The Internet 1st Edition Pedr...
acjpzmfc962
 
Study and analysis of mobility, security, and caching issues in CCN
IJECEIAES
 
Part 1: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Dr. Mahfuzur Rahman Bosunia
 
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Dr. Mahfuzur Rahman Bosunia
 
Content centric networks
Meshingo Jack
 
Cloud interconnection networks basic .pptx
RahulBhole12
 
Approaching Content Delivery in Software Defined Networking
FIBRE Testbed
 
DC Moving I migracion a otro datacenterd
ElvisJessVillalva
 
Security and Transport Performance in 5G
Dirk Kutscher
 
Information Centric Networking
Shahneel Siddiqui
 
Slides cao
Aravindharamanan S
 
A Transport Layer and Socket API for (h)ICN: Design, Implementation and Perfo...
Luca Muscariello
 
A constructive review of in network caching a core functionality of icn slides
Anshuman Kalla
 
ICN Publish/Subscribe Networking
Shi Junxiao
 
Content-Centric Networking in Opportunistic and Mobile Networks
Torsten Braun, Universität Bern
 
content centric networking for secu.pptx
imbasarath
 
Exploring off path caching with edge caching in information centric networkin...
Anshuman Kalla
 
Cours Cisco
123addou
 
Cisco vnp workshop 16-17 april v1-0
liemgpc2
 
Embedded CDNs in 2023
MyNOG
 
Information Centric Networks A New Paradigm For The Internet 1st Edition Pedr...
acjpzmfc962
 
Ad

Recently uploaded (20)

PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PPTX
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
PPTX
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPTX
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PPT
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 

Named data networking

  • 1. Networking Named Content Paper by: V. Jacobson et al. Presented by : Haroon Rashid 1
  • 2. Content Centric Networking  No NAT traversal.  Address space exhaustion.  Average latency and total bandwidth is minimized.  Networking in mobile scenarios is easy. Content Centric Networking (CCN) removes the concept of host identities (machine address) required for communication and considers only named data packets. Some of its benefits: 2
  • 3. Different Paradigms IP Networking CCN Networking Source: Lecture Notes on Internet 3
  • 4. IP vs. CCN Network stack IP Network Stack CCN Network Stack 4
  • 8. Routing  CCN Uses name prefixes instead of IP prefixes.  Name prefixes are broadcasted via routing protocols.  Conventional routing protocols like IS-IS and OSPF are used in CCN by utilizing a general TLV(type label value) scheme.  Each node builds its FIB on receiving prefix. 8
  • 9. Routing Steps 1. Local map gets build up by hello packets – adjacency matrix. 2. Information of data availability at a node gets disseminated via Prefix announcements (IGP-LSA).  Prefix based longest match lookups. 9
  • 10. • CCN supports multicasting when more than one announcer of data is found at a particular node while as IP supports only uni-casting in such a case. • For inter domain routing, BGP supports equivalent of IGP TLV mechanism. 10
  • 11. Security • Security is build within data itself rather than securing data channel. • Digital signatures are used for authentication. • Cryptographic encryption is used for private data protection. • Signature in each data packet is over the packet name, the content, and on signed-info. • Decryption keys are distributed along content as a CCN data blocks – no need of trusted servers. 11
  • 12. Network Security • No tampering is possible due to digital signatures. • Impossible to send the malicious content to a particular machine as host identities are not revealed. • Data-based distributed denial of service attacks not possible as filtering of each data packet takes place at each aggregation point towards content customer. • For Interest flooding attack, attacker should be expert in providing the different combinations of name components of a prefix served by the target. 12
  • 13. • CCN’s semantically selective control also mitigates different attacks: • Data packets follow same path as Interest – helps intermediary routers to have fine grained control of Interests forwarded under a certain prefix. • Attacked domain can ask downstream routers to throttle number of Interest packets for a certain prefix. • Provides tools to organizations to control their content travel. • Policy based routing – requiring content name and signer. • Interests can be digitally signed to enable the policy routing by how often and into what namespaces a particular consumer may query. 13
  • 14. Evaluation • More time to reach to throughput asymptote in CCN due to store and forward stages. • Un-optimized task level in CCN vs. optimized kernel level implementation in TCP. • CCN’s lower throughput due to its encapsulation in IP/UDP and its own headers. • But remember CCN’s implicit data security. BULK DATA TRANSFER 14
  • 15. Performance in secure & insecure scenarios • CCN over Jumbo-UDP is twice as efficient as HTTP and three times more efficient than HTTPS in both overhead and packets (sent). 15
  • 16. Performance in data sharing scen. • The performance penalty of using CCN vs. TCP is around 20% while the performance gain from sharing is integer multiples, there is a net performance win from using CCN even when sharing ratios / hit rates are low. 16
  • 17. Architecture Difference DONA • Name given to packet is a cryptographic hash of publisher’s key and label. • DNS type table required for resolution of user familiar name to digest based. • Flat Namespace. • Content must be first registered with RHs. CCN • Name given is not a cryptographic digest of anything. • User friendly, structured, location independent names. • Hierarchical Namespace. • Content generated dynamically in response to queries. 17
  • 18. Concerns • Names based on digest vs. user friendly, structured names. • Hierarchical namespace vs. flat namespace. • Inter-domain routing feasibility. • Caching level & replacement policy at the intermediary routers. • Does it depends on the ISP? • Can we improve forward strategy? 18