SlideShare a Scribd company logo
INFORMATION CENTRIC NETWORKING
(ICN)
Agenda
▪ Problems In Current Internet Architecture
▪ How Internet is Evolving
▪ Host Centric Networking
▪ Information Centric Networking
▪ Key functionalities of ICN Networks
▪ Approaches to ICN
▪ Data Oriented Network Architecture (DONA)
▪ Architecture of DONA
▪ Advantages & Applications of ICN
2
Problems in Current Internet Architecture
▪ The current internet was designed to address the communication needs of limited
computers including communication between mainframe computers.
▪ The basic requirement from the Internet at that time was merely that of forwarding
packets of data among a limited number of stationary machines
▪ The tremendous growth of the Internet and the introduction of new applications to
fulfill emerging needs, has given rise to new requirements from the current
architecture.
▪ Many current and emerging requirements still cannot be addressed adequately by
the current Internet. This has raised the question of whether we can continue
“patching over patches,” or whether a new clean-slate architectural approach for
the Internet is actually needed.
3
Networking Evolution
▪ Traditional networking
▪ Host-centric communications addressing end-points
▪ Information-centric networking
▪ Data-centric communications addressing information (e.g., data in context).
▪ Decoupling in space – neither sender nor receiver need to know their partner.
▪ Decoupling in time – “answer” not necessarily directly triggered by “question”,
asynchronous communication.
4
Host Centric Networking
5
Information Centric Networking
6
Information Centric Networking
7
Information Centric Networking
8
Information Centric Networking
9
Key functionalities of ICN Network
▪ Naming
▪ Name Resolution & Data Routing
▪ Caching
▪ Mobility
▪ Security
10
Naming
▪ Structure of a Name assigned to a piece of Information to be communicated
▪ In all ICN architectures, names are location dependent
▪ Depending upon the approach, names may range from being flat to hierarchical
▪ Names may or may not be human readable
11
Naming
▪ Example of Naming the data
▪ Flat, not human readable identifiers
▪ 1DB76EB8DFD6B0b92A293AADC8421830BDE73CB6
▪ Hierarchical, meaningful structured names
▪ /nytimes/sport/baseball/mets/game022414/
12
Name Resolution & Data routing
▪ Name resolution involves matching an information name to a provider or source
that can supply that information
▪ Data routing involves constructing a path for transferring the information from that
provider to the requesting host
▪ Name Resolution & Data Routing can be coupled(or integrated) or decoupled(or
independent)
▪ In the coupled approach, the information request is routed to an information provider,
which subsequently sends the information to the requesting host by following the reverse
path over which the request was forwarded.
▪ In the decoupled approach, the name resolution function does not determine or restrict the path
that the data will use from the provider to the subscriber. For example, an independent data
routing module may send to the provider a source route to the requesting host.
13
Caching
▪ Caching is further divided into on-path and off-path caching.
▪ In on-path caching, the information is cached along the path taken by a name
resolution request
▪ In off-path caching the network exploits information cached outside that path
▪ In ICN architectures with decoupled name resolution and data routing, off-path
caching must be supported by the name resolution system, which handles caches
as regular information publishers.
▪ If name resolution and data transfer are coupled, off-path caching must be
supported by the routing system used to forward the requests for information.
14
Mobility
▪ Subscriber mobility is intrinsically supported in ICN architectures
▪ Mobile subscribers can just send new subscriptions for information after a
handoff.
▪ Publisher mobility is more difficult to support, since the name resolution system
(in the coupled approach) or the routing tables (in the decoupled approach) need
to be updated.
15
Security
▪ This aspect is tightly related to the naming structure
Human Readable Names Flat Names
Require a trusted agent or a trust
relationship with the
name resolution system to verify that
the returned information
corresponds to the requested name
flat names can support self-
certification
not-human readable, thus requiring
another trusted
system to map human-readable
names to flat names.
16
DONA (Data Oriented Network Architecture)
▪ Created by UC Berkeley
▪ Changes naming by replacing the hierarchical URLs with flat names
▪ Names in DONA allow users to verify that the received information matches a
requested name via cryptographic techniques
17
Naming
▪ DONA names are organized around principals
▪ Each principal is associated with public-private key pairs
▪ Names are of the form P:L
▪ P is the cryptographic hash of the principal’s public key and L is a label chosen by
the principal, who ensures that these names are unique.
▪ Naming granularity is left to the principals, who are considered to be the owners
of the corresponding information. For instance, principals may name either an
entire web site or each individual web page within it.
▪ Names are flat, application-independent, location-independent and globally
unique
18
Name Resolution & Data Routing
▪ Name resolution in DONA is provided by specialized servers called Resolution
Handlers (RHs).
▪ There is at least one logical RH at each AS.
▪ RHs are interconnected, forming a hierarchical name resolution service
19
DONA Architecture
20
Caching
▪ DONA supports on-path caching via the RH infrastructure.
▪ A RH that decides to cache a requested data object can replace the source IP
address of an incoming FIND request with its own IP address, before forwarding
the message to the next RH. As a result, any response will surely traverse the
current RH, thus the data returned will be cached there.
▪ If a subsequent FIND message requesting the same object reaches a caching
RH, the RH can directly return the data to the subscriber.
21
Mobility
▪ Mobile subscribers can simply issue new FIND messages from their current
location, relying on the RH infrastructure to provide them with the closest copy of
the information.
▪ Mobile publishers can also unregister and re-register their information when
changing their network location
22
Security
▪ Names in DONA are self-certifying
▪ They allow the subscriber to verify that the data received matches the name
requested.
▪ The design of DONA can either prevent or mitigate a series of attacks to the RH
infrastructure
▪ A RH will only accept information registrations by authenticated principals.
23
Examples of other Approaches to ICN
▪ NDN
▪ PURSUIT
▪ SAIL
▪ COMET
▪ CONVERGENCE
▪ Mobility First
24
Advantages of the ICN approach
▪ Scalable and cost-efficient content distribution
▪ IP traffic to quadruple from 2010 – 2015
▪ Mobile data traffic increased 26x
▪ Mostly attributed to media traffic that continues to be 90% of global consumer
traffic by 2015
25
Applications of ICN
▪ ICN has various applications in the field of
▪ Smart Grids
▪ Self Driving Autonomous Vehicles
▪ Internet of Things
▪ Content Distribution
▪ Real-Time Audio & Video Communications
26
This was all about Information Centric Networking
Thankyou !
27

More Related Content

PPT
UTM Unified Threat Management
PPTX
MANET in Mobile Computing
PDF
IPv6 and IoT
PPT
wireless application protocol
PDF
SDN Security: Two Sides of the Same Coin
PPTX
Presentation on 5G security
PPT
SSL & TLS Architecture short
PPTX
Campus Network Design Presentaion.pptx
UTM Unified Threat Management
MANET in Mobile Computing
IPv6 and IoT
wireless application protocol
SDN Security: Two Sides of the Same Coin
Presentation on 5G security
SSL & TLS Architecture short
Campus Network Design Presentaion.pptx

What's hot (20)

PDF
Mobile computing notes and material
PDF
PPTX
Transport layer security (tls)
PPT
Lecture 9 key distribution and user authentication
PPTX
Network management ppt
PDF
Routing in Mobile Ad hoc Networks
PPTX
OSI Security Architecture
PPTX
Cloud Security Mechanisms
PPTX
Key management and distribution
PPT
Mobile computing unit-5
PDF
Mobile Network Layer
PPTX
2. Distributed Systems Hardware & Software concepts
PDF
Information-centric networking and relaton to legal and regulatory issues
PPT
Architecture of Mobile Computing
PPT
Unit 4
PPT
Network Security and Cryptography
PDF
Network security - OSI Security Architecture
PDF
Web Security
PPTX
Transport Layer Security
PDF
20CS2021 DISTRIBUTED COMPUTING
Mobile computing notes and material
Transport layer security (tls)
Lecture 9 key distribution and user authentication
Network management ppt
Routing in Mobile Ad hoc Networks
OSI Security Architecture
Cloud Security Mechanisms
Key management and distribution
Mobile computing unit-5
Mobile Network Layer
2. Distributed Systems Hardware & Software concepts
Information-centric networking and relaton to legal and regulatory issues
Architecture of Mobile Computing
Unit 4
Network Security and Cryptography
Network security - OSI Security Architecture
Web Security
Transport Layer Security
20CS2021 DISTRIBUTED COMPUTING
Ad

Similar to Information Centric Networking (20)

PDF
10.0000@citeseerx.ist.psu.edu@generic 8 a6c4211cf65
PDF
Information Centric Networks A New Paradigm For The Internet 1st Edition Pedr...
PDF
Security Aspects of the Information Centric Networks Model
PPTX
Information Centric Networking and Content Addressability
PDF
From ID/locator split to ICN
PDF
A constructive review of in network caching a core functionality of icn slides
PPT
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
PPTX
IOT2.pptx is internet of things presentation
PDF
Networks For Pervasive Services Exarchakos George Liotta Antonio
PDF
VNNIC Internet Conference 2022: The Future of the Internet
PDF
Network Concepts
PPTX
Telecommunications, Internet and Wireless Technology
PDF
IoT Lab @COPELABS
PPTX
About the uses of internet & benefits of internet
PPTX
Information-Centric Networking in Mobile Networks
PDF
38th TWNIC OPM: Future network needs
PPSX
Future internet information centric networking is the door
PPTX
14-NDN (1) Security and Privacy of Future.pptx
PDF
Chapter 1 - Data Communications, Data Networks, and the Internet
10.0000@citeseerx.ist.psu.edu@generic 8 a6c4211cf65
Information Centric Networks A New Paradigm For The Internet 1st Edition Pedr...
Security Aspects of the Information Centric Networks Model
Information Centric Networking and Content Addressability
From ID/locator split to ICN
A constructive review of in network caching a core functionality of icn slides
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
IOT2.pptx is internet of things presentation
Networks For Pervasive Services Exarchakos George Liotta Antonio
VNNIC Internet Conference 2022: The Future of the Internet
Network Concepts
Telecommunications, Internet and Wireless Technology
IoT Lab @COPELABS
About the uses of internet & benefits of internet
Information-Centric Networking in Mobile Networks
38th TWNIC OPM: Future network needs
Future internet information centric networking is the door
14-NDN (1) Security and Privacy of Future.pptx
Chapter 1 - Data Communications, Data Networks, and the Internet
Ad

More from Shahneel Siddiqui (10)

PPTX
Comparison of Wifi, Lifi and Gifi
PPTX
Development of DNS
PPTX
Congestion Control in NDN
PPTX
The accounting cycle
PPTX
SCR protections
PPTX
Rewirable Fuses
PPTX
Quine Mc Cluskey Method
PPTX
Multiple input & Multiple Output Systems
PPTX
Laser diodes
PPTX
Internet of things
Comparison of Wifi, Lifi and Gifi
Development of DNS
Congestion Control in NDN
The accounting cycle
SCR protections
Rewirable Fuses
Quine Mc Cluskey Method
Multiple input & Multiple Output Systems
Laser diodes
Internet of things

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
DOCX
573137875-Attendance-Management-System-original
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Sustainable Sites - Green Building Construction
PPTX
web development for engineering and engineering
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
PPT on Performance Review to get promotions
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
composite construction of structures.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Geodesy 1.pptx...............................................
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
additive manufacturing of ss316l using mig welding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Foundation to blockchain - A guide to Blockchain Tech
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
573137875-Attendance-Management-System-original
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Sustainable Sites - Green Building Construction
web development for engineering and engineering
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT on Performance Review to get promotions
CH1 Production IntroductoryConcepts.pptx
composite construction of structures.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Geodesy 1.pptx...............................................
OOP with Java - Java Introduction (Basics)
CYBER-CRIMES AND SECURITY A guide to understanding

Information Centric Networking

  • 2. Agenda ▪ Problems In Current Internet Architecture ▪ How Internet is Evolving ▪ Host Centric Networking ▪ Information Centric Networking ▪ Key functionalities of ICN Networks ▪ Approaches to ICN ▪ Data Oriented Network Architecture (DONA) ▪ Architecture of DONA ▪ Advantages & Applications of ICN 2
  • 3. Problems in Current Internet Architecture ▪ The current internet was designed to address the communication needs of limited computers including communication between mainframe computers. ▪ The basic requirement from the Internet at that time was merely that of forwarding packets of data among a limited number of stationary machines ▪ The tremendous growth of the Internet and the introduction of new applications to fulfill emerging needs, has given rise to new requirements from the current architecture. ▪ Many current and emerging requirements still cannot be addressed adequately by the current Internet. This has raised the question of whether we can continue “patching over patches,” or whether a new clean-slate architectural approach for the Internet is actually needed. 3
  • 4. Networking Evolution ▪ Traditional networking ▪ Host-centric communications addressing end-points ▪ Information-centric networking ▪ Data-centric communications addressing information (e.g., data in context). ▪ Decoupling in space – neither sender nor receiver need to know their partner. ▪ Decoupling in time – “answer” not necessarily directly triggered by “question”, asynchronous communication. 4
  • 10. Key functionalities of ICN Network ▪ Naming ▪ Name Resolution & Data Routing ▪ Caching ▪ Mobility ▪ Security 10
  • 11. Naming ▪ Structure of a Name assigned to a piece of Information to be communicated ▪ In all ICN architectures, names are location dependent ▪ Depending upon the approach, names may range from being flat to hierarchical ▪ Names may or may not be human readable 11
  • 12. Naming ▪ Example of Naming the data ▪ Flat, not human readable identifiers ▪ 1DB76EB8DFD6B0b92A293AADC8421830BDE73CB6 ▪ Hierarchical, meaningful structured names ▪ /nytimes/sport/baseball/mets/game022414/ 12
  • 13. Name Resolution & Data routing ▪ Name resolution involves matching an information name to a provider or source that can supply that information ▪ Data routing involves constructing a path for transferring the information from that provider to the requesting host ▪ Name Resolution & Data Routing can be coupled(or integrated) or decoupled(or independent) ▪ In the coupled approach, the information request is routed to an information provider, which subsequently sends the information to the requesting host by following the reverse path over which the request was forwarded. ▪ In the decoupled approach, the name resolution function does not determine or restrict the path that the data will use from the provider to the subscriber. For example, an independent data routing module may send to the provider a source route to the requesting host. 13
  • 14. Caching ▪ Caching is further divided into on-path and off-path caching. ▪ In on-path caching, the information is cached along the path taken by a name resolution request ▪ In off-path caching the network exploits information cached outside that path ▪ In ICN architectures with decoupled name resolution and data routing, off-path caching must be supported by the name resolution system, which handles caches as regular information publishers. ▪ If name resolution and data transfer are coupled, off-path caching must be supported by the routing system used to forward the requests for information. 14
  • 15. Mobility ▪ Subscriber mobility is intrinsically supported in ICN architectures ▪ Mobile subscribers can just send new subscriptions for information after a handoff. ▪ Publisher mobility is more difficult to support, since the name resolution system (in the coupled approach) or the routing tables (in the decoupled approach) need to be updated. 15
  • 16. Security ▪ This aspect is tightly related to the naming structure Human Readable Names Flat Names Require a trusted agent or a trust relationship with the name resolution system to verify that the returned information corresponds to the requested name flat names can support self- certification not-human readable, thus requiring another trusted system to map human-readable names to flat names. 16
  • 17. DONA (Data Oriented Network Architecture) ▪ Created by UC Berkeley ▪ Changes naming by replacing the hierarchical URLs with flat names ▪ Names in DONA allow users to verify that the received information matches a requested name via cryptographic techniques 17
  • 18. Naming ▪ DONA names are organized around principals ▪ Each principal is associated with public-private key pairs ▪ Names are of the form P:L ▪ P is the cryptographic hash of the principal’s public key and L is a label chosen by the principal, who ensures that these names are unique. ▪ Naming granularity is left to the principals, who are considered to be the owners of the corresponding information. For instance, principals may name either an entire web site or each individual web page within it. ▪ Names are flat, application-independent, location-independent and globally unique 18
  • 19. Name Resolution & Data Routing ▪ Name resolution in DONA is provided by specialized servers called Resolution Handlers (RHs). ▪ There is at least one logical RH at each AS. ▪ RHs are interconnected, forming a hierarchical name resolution service 19
  • 21. Caching ▪ DONA supports on-path caching via the RH infrastructure. ▪ A RH that decides to cache a requested data object can replace the source IP address of an incoming FIND request with its own IP address, before forwarding the message to the next RH. As a result, any response will surely traverse the current RH, thus the data returned will be cached there. ▪ If a subsequent FIND message requesting the same object reaches a caching RH, the RH can directly return the data to the subscriber. 21
  • 22. Mobility ▪ Mobile subscribers can simply issue new FIND messages from their current location, relying on the RH infrastructure to provide them with the closest copy of the information. ▪ Mobile publishers can also unregister and re-register their information when changing their network location 22
  • 23. Security ▪ Names in DONA are self-certifying ▪ They allow the subscriber to verify that the data received matches the name requested. ▪ The design of DONA can either prevent or mitigate a series of attacks to the RH infrastructure ▪ A RH will only accept information registrations by authenticated principals. 23
  • 24. Examples of other Approaches to ICN ▪ NDN ▪ PURSUIT ▪ SAIL ▪ COMET ▪ CONVERGENCE ▪ Mobility First 24
  • 25. Advantages of the ICN approach ▪ Scalable and cost-efficient content distribution ▪ IP traffic to quadruple from 2010 – 2015 ▪ Mobile data traffic increased 26x ▪ Mostly attributed to media traffic that continues to be 90% of global consumer traffic by 2015 25
  • 26. Applications of ICN ▪ ICN has various applications in the field of ▪ Smart Grids ▪ Self Driving Autonomous Vehicles ▪ Internet of Things ▪ Content Distribution ▪ Real-Time Audio & Video Communications 26
  • 27. This was all about Information Centric Networking Thankyou ! 27