250 likes | 815 Views
Networking Named Content. Jacobson, V.; Smetters, D. K.; Thornton, J. D.; Plass, M. F.; Briggs, N.; Braynard, R. CoNEXT 2009. Networking Named Content. 1.Introduction 2.CCN Node Model 3.Transport 4.Routing 5.Content-Based Security 6.Evaluation 问题思考. 1.Introduction.
E N D
Networking Named Content Jacobson, V.; Smetters, D. K.; Thornton, J. D.; Plass, M. F.; Briggs, N.; Braynard, R. CoNEXT 2009
Networking Named Content 1.Introduction 2.CCN Node Model 3.Transport 4.Routing 5.Content-Based Security 6.Evaluation 问题思考
1.Introduction • Content-Centric Networking(CCN) • People value the Internet for what content it contains, but communication is still in terms of where. • CCN has no notion of host at its lowest level – a packet “address” names content, not location
与TCP/IP的异同 • TCP/IP 网络与CCN 协议栈有很多的共同点。 • 它们都采用7 层结构,并且底层完全相同 • 下层协议都是为了适配底层物理链路和通信而设计,上层协议为对应相关的应用而设计 • 两者最大的区别就是在全网统一标识的中间层,前者的核心是IP 协议,后者的核心是内容块协议
与TCP/IP的异同 • 相比IP 网络,CCN 有两个突出的特点,这与其策略层和安全层有关。 • 一是CCN 可以最充分地同时利用多种连接方式,如以太网、3G、蓝牙、Wi-Fi、WiMAX 等,并且可以在不断变化的环境中动态地寻求最优化的实现方式; • 二是CCN 本身就保证了它所传送的信息内容的安全。在IP 网络中,安全措施往往是通过对承载网络或终端的加强来实施的,而CCN 对网络设备并不关心,它所传送的内容已经是安全的了
2.CCN Node Model • CCN packet types
2.CCN Node Model • CCN names
2.CCN Node Model • CCN forwarding engine model
3.Transport • 3.1 Reliability and Flow Control • Since CCN flow balance is maintained at each hop, there is no need for additional techniques to control congestion in the middle of a path. • Authors will cover this topic in detail ina future paper
3.Transport • 3.2 Sequencing
3.Transport • 3.3 Rich Connectivity, Mobility and Strategy • CCN talks about data, not to nodes。 • CCN can always exchange data as soon as it is physically possible to do so.
与TCP/IP的异同 • CCN 采用了不同于TCP 的重传机制, 它由最终用户(产生最初请求数据包的应用)负责发起重传请求,而接收端的策略层负责按照一定的策略确定从列表中选择某个特定端口进行重传。
4.Routing • Any routing scheme that works well for IP should also work well for CCN • 4.1 Link-state Intra-domain Routing • 4.2 Inter-domain Routing
4.Routing • 4.1 Link-state Intra-domain Routing
4.Routing • 4.2 Inter-domain Routing • Once a few customers of an ISP start to use CCN, it is in the ISP’s best interest to deploy content router(s) to reduce peering costs • The central problem with this type of bottom-up deployment is to bridge the gap between domains that have content routers but are separated by ISP(s) that do not.
5.Content-Based Security • 5.1 Content Validation • CCN authenticates the binding between names and content; the signature in each CCN data packet is over the name, the content, and a small amount of supporting data useful in signature verification • 5.2 Managing Trust • Although CCN moves data in a peer-to-peer fashion, it provides end-to-end security between content publisher and content consumer. • CCN content consumers must determine whether received content is acceptable, or trustworthy.
5.Content-Based Security • 5.3 Content Protection and Access Control • The primary means of controlling access to CCN content is encryption. • 5.4 Network Security and Policy Enforcement
与TCP/IP的异同 • 由于CCN 没有主机的概念, 很难采取以主机为目的的攻击, 因此对CCN 的攻击仅限于拒绝服务攻击和内容隐藏等手段。
6.Evaluation • 6.1 Data Transfer Efficiency
6.Evaluation • 6.1 Data Transfer Efficiency
6.Evaluation • 6.2 Content Distribution Efficiency
问题思考 • 本文有些部分内容语焉不详。 • 安全性仅是理论上的探讨,没有实质实验证明。 • 外部路由没有试验支持。 • 实验6.1-2数据量太小