SlideShare a Scribd company logo
Content-Centric
Networking (CCN)
CS4482 High Performance Networking
Dilum Bandara
Dilum.Bandara@uom.lk
Outline
 V. Jacobson, D. K. Smetters, J. D. Thornton, M.
Plass, N. Briggs, and R. Braynard, “Networking
Named Content,” In Proc ACM CoNext ‘09, Dec.
2009.
 What?
 Why?
 How?
2
Motivation
 60’s & 70’s
 Internet was designed to
share resources
 2 end points talking to each
other
 Today
 Content is the key
 Location is irrelevant
 Content name  End point
 Use network to reach the
end point
3
Motivation (Cont.)
 Issue – Traffic aggregation
 Scalability
 Availability
 Security
 Location dependent
 End is not the true end
 Solution is not wrong, problem
has changed
 CCN/NDN solution
 Hierarchy of warehouses
 Spatial & temporal locality
 Name & secure content
 Route using name
 Cache contents
4
Incentives
 Content providers
 Lower traffic
 Better security, scalability,
performance
 Consumers
 Better QoS, QoE
 Free local access
 Edge & Tier 2/3 ISPs
 Reduce transit traffic
 Diminishing return from
caching at higher levels
 Tier 1 ISPs & routers close
to content providers
 Starve
5
CCN Applications
 Content Delivery Networks (CDN)
 Streaming
 IPTV, Video on Demand (VoD)
 VoIP, teleconferencing
 Gathering sensor data & streaming
 Controlling actuators
 Light control
6
CCN Features
 In-network caching
 Unicast, multicast, broadcast
 Flow control
 No routing loops – nonce
 Ability to name non-existing data
 Enable them to be routed to potential data sources
 Security
 Mobility
 Incremental deployment
 Route symmetry
 Performance measuring, security
 Fine grained control of FIB entries & policies
 No need for DNS
7
Architecture
 Bits are bits whether they are in routers, wires,
or disks
8
Packet Format
 Datagram packets
 XML-based packets
 Receiver driven communication
 An interest packet must be send to get a data packet
 Clocking, Window of interests, Flow control
 Use 1st interest packet to find segment names
 CCNx implementation 9
Naming Content
10
Naming Content (Cont.)
 Unique names
 Binary or human readable
 Favor hierarchical names
 Large content is segmented
 Can invoke remote methods & pass data
 /seti.org/resources/update/check_status
 /seti.org/resources/update/node102/free_CPU_90
 Name unavailable contents
 /nws.org/radar9/data_x1_x2_y1_y2/
11
Node Architecture
 All nodes have
same architecture
 Size of tables &
capabilities may vary
 Multiple faces
 CS – exact match
 4KB packets
 PIT – exact match
 4 sec timeout
 FIB – longest prefix
match
12
PIT – downstream data path
FIB – upstream interest path
FIB – Forwarding information base
In-Network Caching
 ISPs
 Benefit from caching its transit traffic
 Can charge content providers to cache
 Different policies for content providers
 Varying cache sizes – static & dynamic
 Content provider can set cache validity
 Cache replacement policies
 IP routers – MRU replacement
 CCN routers – LRU or LFU replacement
13
Routing & Policies
 IS-IS or OSPF can be used
to fill in FIB
 Control plane policies
 Prefix forwarding
 Multi-path routing
 Default route at edge routers
 Data plane policies
 Policies per FIB entry
 Advertise/block specific
prefixes
 Priorities for faces
 e.g., WiFi preferred
over 3G
 Cache access/sharing 14
Settlement-free peering
Consumer-provider
relationship
Security
 In current Internet we trust the server & not the content
 Content authentication – Digital signatures
 Content is secured, not its location
 Self-signing or hierarchical certificates
 Private content can be encrypted
 DoS/DDoS
 Hard to attack ends
 Don’t know where interest packet will be answered
 Interest /data flooding is limited to a link
 Drop packets without a matching PIT entry
 Routers can check whether interests are getting data
 Content provider can ask routers to block
15
Issues
 Size of CS, PIT, & FIB
 CCN name not just a TV but its components
 Billions of domains, contents, & chunks
 State full routers
 Solutions – IP Tunneling, CCN interest tagged with IP
 Doesn’t support asynchronous communication
 1 message in IP  2/4 CCN messages
 Block m-to-1 communication
 No TTL  no constrained flooding
 Packets are not modified
 When should PIT time out?
 No clear boundaries
 Hard to separate issues in node architecture, naming, & security
16

More Related Content

PDF
FINAL REPORT ON ENTERPRISE NETWORK
PPTX
PPTX
MPLS (Multi-Protocol Label Switching)
PPTX
Apic dc api deep dive
PPT
Soutenance Finale
PPTX
Named data networking
PPTX
PDF
How to integration DataPower with Zos
FINAL REPORT ON ENTERPRISE NETWORK
MPLS (Multi-Protocol Label Switching)
Apic dc api deep dive
Soutenance Finale
Named data networking
How to integration DataPower with Zos

What's hot (20)

PPTX
What is Network Address Translation (NAT)
PDF
MPLS L2VPN (VLL) Technology
PPTX
Domain name system (dns)
PPTX
Diameter Presentation
PPTX
Transform your enterprise branch with secure sd-wan
PPT
Configuration DHCP
PDF
SDWan Fortinet.pdf
PPTX
Proxy Presentation
PPTX
Introduction au Software Defined Networking (SDN)
PPTX
MPLS-TE
DOCX
ccna 4 frame relay exposée.docx
PPTX
IEEE 802 standards
DOC
mis en place dun vpn site à site
PPTX
CCNA.pptx
PPTX
The Differences Between Bluetooth, ZigBee and WiFi
PPT
Huawei Enterprise networking product icons
PDF
5 g network white paper
DOCX
Akash Gupta Network Engineer CV
PDF
5G Network Architecture and Design
PPTX
Dhcp ppt
What is Network Address Translation (NAT)
MPLS L2VPN (VLL) Technology
Domain name system (dns)
Diameter Presentation
Transform your enterprise branch with secure sd-wan
Configuration DHCP
SDWan Fortinet.pdf
Proxy Presentation
Introduction au Software Defined Networking (SDN)
MPLS-TE
ccna 4 frame relay exposée.docx
IEEE 802 standards
mis en place dun vpn site à site
CCNA.pptx
The Differences Between Bluetooth, ZigBee and WiFi
Huawei Enterprise networking product icons
5 g network white paper
Akash Gupta Network Engineer CV
5G Network Architecture and Design
Dhcp ppt
Ad

Similar to Content-Centric Networking (CCN) (20)

PPT
Mpls vpn1
PPTX
Named Data Networking
PPT
Real Time Java DDS
PDF
Open splice dds security
PPTX
Large-Scale System Integration with DDS for SCADA, C2, and Finance
PPT
Voice over MPLS
PDF
Signpost at FOCI 2013
PPTX
A Deep Dive in the World of IT Networking (Part 2)
PPTX
Abhishek presentation october 2013
PDF
Week1- basic Introduction to computer networks .pdf
PDF
Eclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
PDF
Protocol and Integration Challenges for SDN
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
ZT: CDN_tutorial_adcom
PDF
Cdn tutorial adcom
PPT
MWC 2010 DPI
PDF
DDS: The IoT Data Sharing Standard
PDF
Introduction to DDS: Context, Information Model, Security, and Applications.
Mpls vpn1
Named Data Networking
Real Time Java DDS
Open splice dds security
Large-Scale System Integration with DDS for SCADA, C2, and Finance
Voice over MPLS
Signpost at FOCI 2013
A Deep Dive in the World of IT Networking (Part 2)
Abhishek presentation october 2013
Week1- basic Introduction to computer networks .pdf
Eclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
Protocol and Integration Challenges for SDN
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
ZT: CDN_tutorial_adcom
Cdn tutorial adcom
MWC 2010 DPI
DDS: The IoT Data Sharing Standard
Introduction to DDS: Context, Information Model, Security, and Applications.
Ad

More from Dilum Bandara (20)

PPTX
Designing for Multiple Blockchains in Industry Ecosystems
PPTX
Introduction to Machine Learning
PPTX
Time Series Analysis and Forecasting in Practice
PPTX
Introduction to Dimension Reduction with PCA
PPTX
Introduction to Descriptive & Predictive Analytics
PPTX
Introduction to Concurrent Data Structures
PPTX
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
PPTX
Introduction to Map-Reduce Programming with Hadoop
PPTX
Embarrassingly/Delightfully Parallel Problems
PPTX
Introduction to Warehouse-Scale Computers
PPTX
Introduction to Thread Level Parallelism
PPTX
CPU Memory Hierarchy and Caching Techniques
PPTX
Data-Level Parallelism in Microprocessors
PDF
Instruction Level Parallelism – Hardware Techniques
PPTX
Instruction Level Parallelism – Compiler Techniques
PPTX
CPU Pipelining and Hazards - An Introduction
PPTX
Advanced Computer Architecture – An Introduction
PPTX
High Performance Networking with Advanced TCP
PPTX
Introduction to Content Delivery Networks
PPTX
Peer-to-Peer Networking Systems and Streaming
Designing for Multiple Blockchains in Industry Ecosystems
Introduction to Machine Learning
Time Series Analysis and Forecasting in Practice
Introduction to Dimension Reduction with PCA
Introduction to Descriptive & Predictive Analytics
Introduction to Concurrent Data Structures
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Introduction to Map-Reduce Programming with Hadoop
Embarrassingly/Delightfully Parallel Problems
Introduction to Warehouse-Scale Computers
Introduction to Thread Level Parallelism
CPU Memory Hierarchy and Caching Techniques
Data-Level Parallelism in Microprocessors
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Compiler Techniques
CPU Pipelining and Hazards - An Introduction
Advanced Computer Architecture – An Introduction
High Performance Networking with Advanced TCP
Introduction to Content Delivery Networks
Peer-to-Peer Networking Systems and Streaming

Recently uploaded (20)

PDF
PPT on Performance Review to get promotions
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
composite construction of structures.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Digital Logic Computer Design lecture notes
DOCX
573137875-Attendance-Management-System-original
PPTX
Welding lecture in detail for understanding
PPTX
web development for engineering and engineering
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Lecture Notes Electrical Wiring System Components
PPT on Performance Review to get promotions
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
UNIT 4 Total Quality Management .pptx
CH1 Production IntroductoryConcepts.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
composite construction of structures.pdf
bas. eng. economics group 4 presentation 1.pptx
Digital Logic Computer Design lecture notes
573137875-Attendance-Management-System-original
Welding lecture in detail for understanding
web development for engineering and engineering
OOP with Java - Java Introduction (Basics)
Lecture Notes Electrical Wiring System Components

Content-Centric Networking (CCN)

  • 1. Content-Centric Networking (CCN) CS4482 High Performance Networking Dilum Bandara Dilum.Bandara@uom.lk
  • 2. Outline  V. Jacobson, D. K. Smetters, J. D. Thornton, M. Plass, N. Briggs, and R. Braynard, “Networking Named Content,” In Proc ACM CoNext ‘09, Dec. 2009.  What?  Why?  How? 2
  • 3. Motivation  60’s & 70’s  Internet was designed to share resources  2 end points talking to each other  Today  Content is the key  Location is irrelevant  Content name  End point  Use network to reach the end point 3
  • 4. Motivation (Cont.)  Issue – Traffic aggregation  Scalability  Availability  Security  Location dependent  End is not the true end  Solution is not wrong, problem has changed  CCN/NDN solution  Hierarchy of warehouses  Spatial & temporal locality  Name & secure content  Route using name  Cache contents 4
  • 5. Incentives  Content providers  Lower traffic  Better security, scalability, performance  Consumers  Better QoS, QoE  Free local access  Edge & Tier 2/3 ISPs  Reduce transit traffic  Diminishing return from caching at higher levels  Tier 1 ISPs & routers close to content providers  Starve 5
  • 6. CCN Applications  Content Delivery Networks (CDN)  Streaming  IPTV, Video on Demand (VoD)  VoIP, teleconferencing  Gathering sensor data & streaming  Controlling actuators  Light control 6
  • 7. CCN Features  In-network caching  Unicast, multicast, broadcast  Flow control  No routing loops – nonce  Ability to name non-existing data  Enable them to be routed to potential data sources  Security  Mobility  Incremental deployment  Route symmetry  Performance measuring, security  Fine grained control of FIB entries & policies  No need for DNS 7
  • 8. Architecture  Bits are bits whether they are in routers, wires, or disks 8
  • 9. Packet Format  Datagram packets  XML-based packets  Receiver driven communication  An interest packet must be send to get a data packet  Clocking, Window of interests, Flow control  Use 1st interest packet to find segment names  CCNx implementation 9
  • 11. Naming Content (Cont.)  Unique names  Binary or human readable  Favor hierarchical names  Large content is segmented  Can invoke remote methods & pass data  /seti.org/resources/update/check_status  /seti.org/resources/update/node102/free_CPU_90  Name unavailable contents  /nws.org/radar9/data_x1_x2_y1_y2/ 11
  • 12. Node Architecture  All nodes have same architecture  Size of tables & capabilities may vary  Multiple faces  CS – exact match  4KB packets  PIT – exact match  4 sec timeout  FIB – longest prefix match 12 PIT – downstream data path FIB – upstream interest path FIB – Forwarding information base
  • 13. In-Network Caching  ISPs  Benefit from caching its transit traffic  Can charge content providers to cache  Different policies for content providers  Varying cache sizes – static & dynamic  Content provider can set cache validity  Cache replacement policies  IP routers – MRU replacement  CCN routers – LRU or LFU replacement 13
  • 14. Routing & Policies  IS-IS or OSPF can be used to fill in FIB  Control plane policies  Prefix forwarding  Multi-path routing  Default route at edge routers  Data plane policies  Policies per FIB entry  Advertise/block specific prefixes  Priorities for faces  e.g., WiFi preferred over 3G  Cache access/sharing 14 Settlement-free peering Consumer-provider relationship
  • 15. Security  In current Internet we trust the server & not the content  Content authentication – Digital signatures  Content is secured, not its location  Self-signing or hierarchical certificates  Private content can be encrypted  DoS/DDoS  Hard to attack ends  Don’t know where interest packet will be answered  Interest /data flooding is limited to a link  Drop packets without a matching PIT entry  Routers can check whether interests are getting data  Content provider can ask routers to block 15
  • 16. Issues  Size of CS, PIT, & FIB  CCN name not just a TV but its components  Billions of domains, contents, & chunks  State full routers  Solutions – IP Tunneling, CCN interest tagged with IP  Doesn’t support asynchronous communication  1 message in IP  2/4 CCN messages  Block m-to-1 communication  No TTL  no constrained flooding  Packets are not modified  When should PIT time out?  No clear boundaries  Hard to separate issues in node architecture, naming, & security 16

Editor's Notes

  • #6: NSP – Network access point
  • #8: Motes without IP support IP routes are not symetric
  • #9: Strategy layer define – forwarding preferences, which face to select based on performance, retransmission after loss, window size
  • #11: Local names are also possible
  • #13: PIT – suppress duplicate packets
  • #14: A1 – less skewed A2 – More skewed
  • #15: 1 circle – IP routers 2 circles – IP + CCN routers