PPT file of slides

advertisement
Content Centric Networking in
Tactical and Emergency MANETs
Soon Y. Oh, Davide Lau, and Mario Gerla
Computer Science Department
University of California, Los Angeles
{soonoh, chiume, gerla}@cs.ucla.edu
Introduction
 Infrastructureless nature and quick deployment  a
MANET is ideally suited for emergency & tactical
operation, but
 Challenging environments
 Lossy channel and high mobility
 Limited resources
 Hard to find necessary content
 No search engine
 Scalable & efficient content search and dissemination
in MANETs  Content Centric Networking
2
Content Centric Networking (CCN)
 Users are interested in WHAT content – not
WHERE it is or WHO has it
 Data is addressed by NAME OR CONTENT –
rather than by location or IP address
 No overhead in binding name to location
 Enabled by low storage prices and high speed links
Can CCN be directly applied to
MANET environment?
3
WiCCN = CCN in MANETs
 Advantages
 Group based mobility/operation
 resource sharing within group
 Hierarchical data structure
 Information locality (via Cache)
Content Centric
Networking
 Challenges
 Lossy channel and resource shortage
 Data Push and Pull is required while Internet CCN is only Pull
 Must Push Critical information and operation messages
 Security and content authentication
 Critical data and wireless broadcast medium
4
WiCCN protocol design goals
 Hierarchical storage/search architecture
 Topic based data vs spatial/temporal contents
 Cross-layer approach
 Scalable and resource aware
5
Related Work
 TRIAD (2000)
 User-friendly, structured, with location-independent names and content
addressing (has influenced later protocols)
 Data-Oriented (and beyond) Network Architecture (DONA) (2007)
 Flat, self-certifying names instead of IP addresses and DNS
 Contents is published and registered with a tree of trusted Resolution
Handlers (RH)
 Routing on Flat Levels (ROFL) (2006)
 Semantic-free flat labels; it creates a circular namespace, e.g., DHT
 Content Centric Network (CCN) (2009)
 Network wide content caching and user-friendly, hierarchical names for
routing; Digital signature for security
 Named Data Networks (NDN) (2010)
 Future Internet Architecture
6
WiCCN Network Model




Group based mobility
Hierarchical topology
Interconnection via gateways
Heterogeneous devices – different capacities
Airborne
Network
Wideband
Network
Soldier
System
7
WiCCN Content Types
 Topic based content
 Data files, video and audio clips
 Data is stored at publisher (originator) or near backbone nodes and
travels anywhere in the network
 PULLED by users
 No location and time sensitivity
 Spatial/temporal content
 Situation awareness data; operational messages
 Content value is time and location sensitive
 PUSHED by publisher towards command center or proper
location
8
Local Storage
Content
Repository
 Content Repository
 Intermediate nodes cache content
 Maximize the probability of sharing
Meta-Data Registry
 Meta-Data Registry
 Hash table for efficient look up
Interest Table
 It is used to forward Interest packet
 Meta-Data includes content attributes, e.g., type, time, loc, etc
 Interest Table
 Stores Interest Query packets
 To suppress duplicate Interest packets
 To relay content to requestors
9
WiCCN Routing
 Content Pushing
 Spatial/temporal content
 Geo-routing to command center or other destination
10
WiCCN Routing (Cont.)
 Content Pulling
 Using an Interest packet and local storages
1. Check Content Repository and send data
if it exists
2. If there is no content, check Meta-Data
Repository
3. If Meta-Data entry exist, a node relays
Interest toward data origin
4. Otherwise, Interest is passed to a
Gateway toward upper level
Content
Repository
Interest
Meta-Data Registry
Interest
5. Interest is relayed
Interest Table
11
WiCCN Routing (Cont.)
 Difference to Internet CCN (due to wireless
common medium)
 Interest aggregation
 Time stagger re-broadcast Interest packets
 Upon overhearing the same Interest, cancel the re-broadcast
 Data Packet collision avoidance
 If more than one neighbors tries to transmit
 Exchange Request/Reply
 Respond with Reply before transmitting data
12
Packet Collision Avoidance
REPLY
Content
Interest
REQUEST
REPLY
13
Security and Authentication
 Using PKI
 A gateway has private key and members in the
domain have public keys
 A gateway adds digital signature using a private
key
 Members encrypt packets using the public key
 The private and public keys are pre-assigned
14
Implementation
 Implement WiCCN on Linux OS
 A gateway and members
 The gateway floods/updates meta-data
 A node sends Interest
 Request/Reply- exchange and data transmission
 Run simple four node topology
 Compare performance with peer-to-peer protocol,
e.g., Pastry over OLSR
15
Pastry Overhead




Every 3s new data generated (no real data transmitted)
A gateway floods meta-data
Pastry 378B/s average overhead
Traffic suddenly increases to maintain a P2P ring structure
 OLSR traffic in the background
16
WiCCN Overhead




Every 3s new data generated (no data transmission in this experiment)
A gateway floods meta-data
Pastry 72B/s average overhead
Only Meta-Data flooding
17
End-to-End Delay
 From node A to node D in the 4 node chain topology
 File size 1, 5, 10, 15, 20, 25, 100MB
 Pastry and WiCCN experience same delay in peer to peer transmissions
18
End-to-End Delay (Cont.)




From node A to all nodes in the previous 4 node topology
No broadcast; each node requests data at different time
WiCCN presents significant lower delay due to content caching
In Pastry, node A transmits 3 times, but WiCCN node A transmits only once;
cached data, at an intermediate node, is transmitted
19
Conclusion
 WiCCN performs better than DHT based
content sharing
 Mainly due to caching
 Future work:




Implement on smart phones
Experiment with mobility
Design cache strategies
Bigger testbed/emulator
20
21
Download