Introduction To Information Centric Networking - Wireless

1y ago
4 Views
1 Downloads
2.00 MB
48 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Madison Stoltz
Transcription

Introduction toInformation CentricNetworkingAndrés Arcia-MoretN4D Lab, Computer LaboratoryUniversity of Cambridge

Agenda Motivation Information Centric Networking Implementations: NDN, DONA, NetInf, Juno,PURSUIT PURSUIT nitty-gritties Conclusions

Motivation Shift from resource sharing to information sharing host centric: TCP/IP information based: identification, retrieval(communication functions)Establishing comm relationship on informationinterest rather than end-hosts

Information CentricNetworking Problem mostly addressed from high-level routing orinformation management perspective Lately, it has been also exploited more efficiently (basedon BF) in the hardware and processing complexity at FW node resource allocation TE at intra-domain Dissemination of inter-domain

Information CentricNetworking rather than seeing where is in a name (like IP does) we seewhat is in a name. then we can change physical and topological locationtransparently. exposes the request style abstraction unlike the socket API differences with host centric: naming, uniquely namingevery (replicated) object. routing, ICN uses bindingsbetween points, and optimal content src. security, ICNsecure integrity of objects rather than channels. API,exposed to produce and consume.

Other salient characteristics No connection oriented sessions: ascommunication becomes receiver driven, thus noneed for sender cooperation for in-order reliability.Better congestion/flow control due to convenientdistribution. Content and location scoping: explicit separationbetween what (objects) and where (location). Resilience through replication.

ICN Implementations

made me remember the paper sayingthat with some configuration tricks onecan get ICN networks.DONA: Data OrientedNetwork Architecture ICN as an alternative to DNS Content names are: P:L, P being the cryptographic hash, and Lthe label that identifies content. Resolution Handlers (RH) store P:L, content location perdomain. Resembles BGP tree topology, thus consumer asks local RH. If noreference is found then it propagates in the tree till found. Thenshortcut the way back to the consumer (possibly through TCP/IP). DONA routes every request embedded within regular datapackets.[Koponen et al., 2007] Koponen, et al (2007). A data-oriented (and beyond) networkarchitecture. In Proceedings of the 2007 Conference on Applications, Technologies,Architectures, and Protocols for Computer Communications, SIGCOMM ’07, pages 181–192,New York, NY, USA. ACM.

[Koponen et al., 2007] Koponen, et al (2007). A data-oriented (and beyond) network architecture. In Proceedings of the 2007 Conference on Applications, Technologies,Architectures, and Protocols for Computer Communications, SIGCOMM ’07, pages 181–192, New York, NY, USA. ACM.[Tyson et al., 2013] Tyson, G., Sastry, N., Cuevas, R., Rimac, I., and Mauthe, A. (2013). Where is in a name? a survey of mobility in information-centric ure 1: Registration state (solid arrows) in RHs after copieshave registered themselves. RHs route client-issued FIND(dashed arrow) to a nearby copy.register : the received REGISTER message, if any.regs: all REGISTER messages for the name (P:L).pref reg: preferred REGISTER to disseminate to peers/parents,if any.name : the name (P:L) event concerns.1234567891011regs load(name);if register received thenif duplicate or invalid signature thenreturn;endset timer for expiration(register);else// A REGISTER expired.endforeach out in provider and peer links dopref reg decision process(out,regs);

DONA: FIND msgIP headerTypeName (P:L, 40 bytes)Next header typeTransport protocol headerFigure 3: Protocol headers of a FIND packet.separate FINDs from their responses.Type is totransport. In fact, many applications could be simplified whenimplemented on top of DONA. Using HTTP as an example, wenote that the only essential information in an HTTP initiation is theURL and header information (such as language, etc.); the URL isnot needed, since the data is already named in a lower layer, andthey cannoto the dataDONAand onlinrelated to akeys P hasname L, aimmediateclient wanfor this spalso supponotified ofFinally,already in(using DO

ICN of DONA P:L reproduces the scoping model (easilyreproducible) Data Handlers corresponds to a functionalrendezvous (having sub domains) IP routing fabric: topology (completelydecentralised though in IP), and forwarding (keepsstate).

NDN — CCN, CCNX Named data networking Flexible hierarchical structure allowing variousnamespaces Interest packets sent through to the network to the content. Longest prefix match. Aggregated name hierarchy Way back through breadcrumbs in PIT Content item’s naming reflect the underlying topology (thuscan potentially create state explosion in the core network).

[Tyson et al., 2013] Tyson, G., Sastry, N., Cuevas, R., Rimac, I., and Mauthe, A. (2013). Where is in a name? a survey of mobility in information-centric networks.NDN- CCN, CCNX

NetInf Relies on Name Resolution (NR) service. Publishing Named Data Objects and locators (named routing hints) to bediscovered later. Provide in a multilevel DHTs for finding the location (or the optimal location). Self certified NDO mapped to a set of locators. Requester-controlled lookups with eventual list of potencial sources, tochoose for optimal (s). MDHT-controlled mode, single consumer matched with single source(by MDHT)Content delivery can be done in many ways (e.g., in-router caching)

Distributed Hash Tables

[Dannewitz et al., 2013] Dannewitz, C., Kutscher, D., Ohlman, B., Farrell, S., Ahlgren, B., and Karl, H. (2013). Network of information (netinf) - an informationcentric networking architecture. Comput. Com- mun., 36(7):721–735.[Tyson et al., 2013] Tyson, G., Sastry, N., Cuevas, R., Rimac, I., and Mauthe, A. (2013). Where is in a name? a survey of mobility in information-centric networks.NetInf

Juno Placement of ICN at the middleware layer Flat self-certifying IDs indexed on DHT called JunoContent Discovery Service (JCDS). Can probe third party index services such as eMule. Delivery framework retrieves the content by usingdynamically attachable protocol plug-ins. Intelligent reconfiguration for different sources basedon: performance, cost, resilience.

[Tyson et al., 2013] Tyson, G., Sastry, N., Cuevas, R., Rimac, I., and Mauthe, A. (2013). Where is in a name? a survey of mobility in information-centric networks.[Tyson et al., 2012] Tyson, G., Mauthe, A., Kaune, S., Grace, P., Taweel, A., and Plagemann, T. (2012). Juno: A middleware platform for supporting delivery-centricapplications. ACM Trans. Internet Technol., 12(2):4:1–4:28.Juno

RIFE (a word) rife-project.eu

PURSUIT A systems approach that operates on graphs ofinformation with a late (as late as possible) bindingto a location at which the computation over thisgraph is going to happen, enables the full potentialfor optimisation! This systems approach requires to marryinformation & computation (and with it storage) intoa single design approach for any resultingdistributed systemsource: PURSUIT FP7 public dissemination reports.

Starting Point: Solving Problemsin Distributed Systems One wants to solve a problem, each of which mightrequire solving another problem. Example: Send data from A to B(s), eventually solvingfragmentation on a restrained link(s)— Computation in distributed systems is allabout information dissemination (pertaining to atask at hand)source: PURSUIT FP7 public dissemination reports.

Design Tenets Provide means for identifying individual information (items) Provide means for scoping information Rendezvous, topology management, and forwardingCommon dissemination strategy per sub-structure of information Allows for forming DAGs (directed acyclic graphs)Expose core functions Can be done via labelling or namingDefine particulars of functional implementation and information governance (naming type:flat), adapting to a particular computational problemExpose service model Can be pub/subTrossen, D. and Parisis, G. (2012). Designing and realizing an information-centric internet. IEEE CommunicationsMagazine, 50(7):60–67.

Layered ModelRendezvousTopologyForwarding and moreRendezvousT r anspo r tTopologyLAYOUT Layout 1ForwardingTROSSENand moreFigure cursive models6/21/12 3:21 PM Page 61NetworkCaching Forwardingcodingdeployment, including an international testbed.With this, we show the feasibility of ourRendezvous,approach in a Topology,first realization asForwardinga basis for ourfuture work. We then provide an outlook forinformation-centric networking.Information flowmanipulationLayer n 1Layer nDeconstraining throughrecursive wardingThe data plane takes care ofDESIGNforwardingfunctionalityasTENETSwell as traditional transportfunctions, such as error detecProblem-specificOptimization throughAt the heart of our efforts is a set of designoperationsmodularity within eachtenets thatthe basis forfunctionalviewtion and traffic scheduling.Informadditionto athat,a numberofproblemof an information-centric architecture. Thesenew network functionsarecanenvisioned(referredasofmore),The layeringtenetsbe implementedthroughtoa setLayer n-1process ischoices;it is40]the nextthaterrorpre- correcursive!such as ts the current implementation of our designrection [3].choices.Figure 1. Functional layered model.our tenets deriveourinmotiThe data and controlIntuitively,plane functionswill fromworkconcert,vation to place information at the heart of our[Trossen andeachParisis] otherTrossen, D.andParisis, G. (2012). wheelDesigning and realizingan information-centric internet. IEEEutilizinginarchitecture.a componentHence, aspects of[41],directlysimilarprovidingto theCommunications Magazine, 50(7):60–67.Combining the previous with our sixth andof informationtogetherwithwayHaggle managersmanipulationare organized[33]flowsintoan unlayered[Jokela et al., 2009] Jokela, P., kander,P. (2009).Lipsin:last tenetprovidestheLineflexible modularity acrossbuilding transient communication mmunicatingspeed mmun.Rev.,39(4):195–206.problems; a modularity that deconstrains thebetween computational entities are captured by

Node ArchitectureGlobal ingTotpologyRPITFNetwork ArchitectureHelperRendezvousRendezvousNetworkError e: PURSUIT FP7 public dissemination reports.

Information Graph

Information Semantics:immutable versus mutableI should be commenting on thespecifics of this work and itsrelationship to DONA, CCN, etc. (howthese other works are seen asdissemination strategies) Documents Each RId points to immutable data (e.g., document version) Not well suited for real-time type of traffic Each item is identifiable throughout the networkEach RId points to channel of data (e.g., a video stream), i.e., thedata is mutable (channel in the item) Well-suited for video type of traffic Problems with caching though (since no individual videosegment visible)

Built-in multicast capability Information is sent along a route of (intra-domain) hops in theInternet - Requires some form of minimal state in each hop If forwarding on names, limiting this state is hard/impossibleWhat if we could instead include the state in the packet?To: {Hop1, Hop2, Hop N}To: {Bloom Filter}

What are Bloom Filters? Test if a piece of information has been inserted inthe BF: All turned-on after a set of hash functions havebeen tested? Then, positive response!

Bloom Filters Data structure for compressing items into a bitstring0Hash1(ID1) 201 10-bit BFHash2(ID1) 80ID 101Hash1(ID2) 90Hash2(ID2) 40ID 210

Bloom FilterTest if “Data 1” has been inserted in the BFAll corresponding bits are set positive response!Hash1(ID1) 2Hash2(ID1) 8ID 1001 10-bit BF0010010

Line Speed Publish/SubscribeInter-Network (LIPSIN) Line speed forwarding with simplified logic Links are (domain-locally) named instead of nodes (LId),therefore there is no equivalent to IP addressesZorglub Link identifiers are combined in a bloom filter (called zFilter) thatdefines the transit pathBAdvantages Very fast forwarding No need for routing tables CAA- BNative multicast supportB- CzF: A - B - CD0 1 0 0 0 1 0 0 11 0 0 0 0 1 1 0 11 1 0 0 0 1 1 0 1

Forwarding Decision Forwarding decision based on binary AND and CMP zFilter in the packet matched with all outgoing Link IDs Multicasting: zFilter contains more than one outgoing linksLink ID&zFilter ?YES -- FORWARDzFilter

False Positive in Forwarding False positives occur when test is positive in a given node despitenonhashed LId (probability for consecutive false positives is multiplicative!) Two immediate solutions: Increase with number of links in a domain (since more data is hashedinto constant length Bloom filter)Use Link Identity Tags: tag a single link with N names instead of one,then pick resulting Bloom filter with lowest false positive probabilityVirtual trees: fold “popular” sub-trees into single virtual link, i.e.,decrease number of LIds to be used

[Jokela et al., 2009] Jokela, P., Zahemszky, A., Esteve Rothenberg, C., Arianfar, S., and Nikander, P. (2009).Lipsin: Line speed publish/subscribe inter-networking. SIGCOMM Comput. Commun. Rev., 39(4):195– 206.Forwarding Efficiencyfalse positive rate (%)forwarding efficiency (%)Efic. (%)fpr (%)False positive and forwarding efficiency evaluation in AS6461 (d 8, k 5) 598.08 88.890.372.13890 Rocketfuel99.831000.02085Standard zFilter fpr699.694.120.21.59fpa-opt. zFilter fpr80fpr-opt. zFilter fpr97.78 90.890.542.02Standard zFilter fw. eff. SNDlib75fpa-opt. zFilter fw. eff.98.9591.30.281.254fpr-opt. zFilter fw. eff.7097.92 91.670.832.6765295.51 88.221.283.17Forwardingefficiency6092.37 79.581.763.86with 06 83.332.655.19Users (1 publisher and N-1 subscribers)82.27 67.694.176.96 80%Figure 5: ns-3 simulation results for AS 6461.92.04 84.313.466.4688.22 78.954.327.4571.47 59.347.310.41Forwarding efficiency evaluation when virtual trees are installed- suited for MAN-sizemulticast groupsAS6461 Abovenet(US) 367 (R -ISP) 1,000 (L -ISP)982,259 (R - CUST) 1,400 (L - CUST)iency (%)or d 8, variable k-distr.10096

Multi Stage BF Stage 1Divide a delivery tree into stages Generally, each stage has individual trees Operation performed at topologymanagerStage 2 Provide single BF forwarding identifier perstage Concatenate all stage into variable sizeheader Perform BF-based forwarding at eachstage Remove appropriate BF after each stage 256 bits 256 bitsStage 3 256 bitsDATA

Topology Formation Calculate a tree with 0 false positives for given pub,subs relationship Within each stage: Define in tree as the set of LIds being in the tree and out tree as the ones that are not Determine minimal length of BF that can hold in tree with P(false positive) 0 (alsotaking into account out tree)Determine BF through ORing in tree into BF Test if BF would cause false positives, then increase the length if so. Determine overall header by joining all possible stages Write length of stageBF through Elias omega encoding (https://en.wikipedia.org/wiki/Elias omega coding) Write the stageBF

SummarisingPStage 1in treeout treeStage 2Stage 3Slength h10 bitslength h8 bitslength h9 bitsDATA

Pros and Cons Advantages Arbitrary tree size (limits may exist for maximum size for variable length header) Tradeoff between false positive rate and header size (in this approach falsepositives is zero) Single hop vs multi-hop stages possible (single hops naturally limit BFanomalies) Lends itself to inter-domain as well as intra-domain forwardingDisadvantages Higher complexity in forwarding (decompress/compress) Higher overhead due to variable length, but overhead reduces as you traversethe treesource: PURSUIT FP7 public dissemination reports.

Header Length

Prototype

BlackadderTROSSEN LAYOUT Layout 1 6/21/12 3:21 PM Page 63 Implements design tenetsreceiving a matching notification from the rendezvous function.Based on Click router platformApp1App2App3App4.AppNNODE IMPLEMENTATIONEasy user/kernel spacesupport Portable to other OSes Compatible with ns-3 Available at: https://github.com/fp7-pursuit/blackadder Domain-local throughputreaches 1GB/sClick Blackadder NodeFigure 3 shows the architecture of a single netIPC elementwork node in our system. Currently, our nodedesign is utilizing the Click Router framework[8], enabling the realization of problem solutionsTopologyfrom the lowest (Ethernet) level to the applicaLocal proxyRendezvousformationtion level. Our prototype runs as a user spaceapplication or kernel space Linux module. ThisForwardingis a direct benefit from basing our prototype onthe Click router framework.The IPC element implements a non-blockingCommunication elementsinterprocess mechanism (currently, we supportnetlink and TCP loopback sockets) so that userspace applications can issue publish/subscribe/dev/eth0/dev/eth1Raw IP socketsrequests to communicate with our prototype,using the service model described earlier.The lower part of Fig. 3 consists of the comFigure 3. Node implementation architecture.munication elements, which are responsible fortransmitting publications to the network. Thereplacing Click elements with memory-optimizedcurrent implementation is based on Click elemodules is a software engineering effort thatments, creating Ethernet frames and forwardingneeds to be undertaken to improve overall nodethem to the appropriate network interface. Inperformance.addition, we provide the ability to utilize raw IPdata packets as an alternative mechanism. ThisIMPLEMENTEDISSEMINATIONSTRATEGIES internet. IEEE Communicationsenables us to test the prototype*Trossen,inD.Internet-wideand Parisis, G. (2012).Designing andDrealizingan information-centricscenarios.Our prototype provides us with the basis forMagazine, 50(7):60–67.The local proxy element keeps a record of allimplementing a variety of dissemination strate-

Click schemethread safe queue0 FW 110002fromnetlinkBA-APPtonetlink0 proxy 10 loRVraw socket (UDP, 55555)IPClassifier(dst udp port 55555 and src udp port 55555)[0]

Node f(MODE ip, NODEID 00000000000000000000000000000000000000000000000);

Node 00000000000000000000000000000000000000000000);

Testbed 9 international sites 26 machines with 40 on demand ones tunneled viaopenVPN withconfigurabletopologies*Trossen, D. and Parisis, G. (2012). Designing and realizing an information-centric internet. IEEE CommunicationsMagazine, 50(7):60–67.

Fast Path EvaluationForwarding efficiency 15 in a chain Multicasting(when nodes issub) line speed evenwhen 3 subs pernode for 13 nodesDegradation when 6pubs and more dueto local copies*Trossen, D. and Parisis, G. (2012). Designing and realizing an information-centric internet. IEEE CommunicationsMagazine, 50(7):60–67.

source: PURSUIT FP7 public dissemination reports.Slow Path Evaluation 100.000 adverts under singlescope Subscribers subscribe to randomitem, wait until receive it andreiterate (500 times) - worst case for slow path(ignores any possibleoptimisations due to domain-localrendezvous or mutable semantics) Node local: No net delays, No TM, 20ms for 500 processes. Domain local (Gbit-LAN): Centralised TM, 400ms for 500processes per node (7000 subs) Domain local (Planet Lab): Large delays, 250ms for 1 sub pernode (73 in total), 680 ms for 500 subs

Conclusions Information centric networking as a raising paradigm fordealing with scalable access to information Two main different strategies: completely distributed(CCN), and partially distributed (PURSUIT, PSIRP, LIPSIN). Potential state explosion in CCN based on naming versuseconomy of space for LIPSIN/PURSUIT Open issues: interfacing existent services over IP,standardisation of interfaces for regular devices: discoveryof information and services in local networks, and widerarea networks.

Information Centric Networking rather than seeing where is in a name (like IP does) we see what is in a name. then we can change physical and topological location transparently. exposes the request style abstraction unlike the socket API differences with host centric: naming, uniquely naming every (replicated) object. routing, ICN uses bindings

Related Documents:

Content-based networking, publish/subscribe, information-centric networking, content-centric networking, named-data networking Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies

"A survey of Information-entric Networking", IEEE Communications Magazine, 2012 - G. Carofiglio et al. "From content delivery today to information centric networking", omputer Networks, 2013, in press - G. Xylomenos et al (G. Polyzos), "A survey of information-centric networking research", IEEE ommunications Surveys and Tutorials,

Information-Centric Networking (ICN) research direction raised by Van Jacobson. ICN represents a general trend of future Internet architecture that evolves from the today's host centric, end-to-end, IP focused architecture to a content centric and distributed one. CCN and Named Date Networking(NDN) [24] are the typical instances of the broad

Information-Centric Networking (ICN) architectures [4, 5, 41] have been proposed to improve the quality of information perceived by consumers compared to the current IP Internet. The Named Data Networking (NDN) [25] and the Content-Centric Networking (CCNx) [9] architectures advocate the use of what has been called a "stateful forwarding .

This information asymmetry often leads to a suboptimal system operation. Information-centric Networking (ICN) postulates a fundamental paradigm shift away from a host-centric model towards an information-centric one. ICN focuses on information item discovery and transmission and not on the connection of end-points that exchange data.

Pro:Centric Direct interactive features are available with IP connectivity. Easy Code Editing with HCAP API Customized UI & Interactive Service Pro:Centric Smart TV API SI Application IP Pro:Centric (Middleware Platform) Pro:Centric Hotel Management Solution The WU960H is the latest in the line of Pro:Centric TVs that provide a unique and .

Persistent pervasive identification, information centric networking 1 INTRODUCTION At the core of an information or content centric networking design are identifiers, because, without some form of identification, re-ferring to and accessing information is impossible. We focus on identifiers in this work as a target of the design process, because,

Abstract - Information Centric Networking (ICN) is a new networking paradigm in which the network provides users with content instead of communication channels between hosts. Software Defined Networking (SDN) is an approach that promises to enable the continuous evolution of networking architectures. In this paper we propose and discuss .