Networking Named Content Jacobson, V.; Smetters, D. K.; Thornton, J. D.; Plass, M. F.; Briggs, N.; Braynard, R. CoNEXT 2009 Networking Named Content 1.Introduction 2.CCN Node Model 3.Transport 4.Routing 5.Content-Based Security 6.Evaluation 问题思考 1.Introduction Content-Centric Networking(CCN) People value the Internet for what content it contains, but communication is still in terms of where. CCN has no notion of host at its lowest level – a packet “address” names content, not location 1.Introduction 与TCP/IP的异同 TCP/IP 网络与CCN 协议栈有很多的共同 点。 它们都采用7 层结构,并且底层完全相同 下层协议都是为了适配底层物理链路和通 信而设计,上层协议为对应相关的应用而 设计 两者最大的区别就是在全网统一标识的中 间层,前者的核心是IP 协议,后者的核心 是内容块协议 与TCP/IP的异同 相比IP 网络,CCN 有两个突出的特点,这与其 策略层和安全层有关。 一是CCN 可以最充分地同时利用多种连接方式, 如以太网、3G、蓝牙、Wi-Fi、WiMAX 等,并且 可以在不断变化的环境中动态地寻求最优化的实 现方式; 二是CCN 本身就保证了它所传送的信息内容的安 全。在IP 网络中,安全措施往往是通过对承载网 络或终端的加强来实施的,而CCN 对网络设备并 不关心,它所传送的内容已经是安全的了 2.CCN Node Model CCN packet types 2.CCN Node Model CCN names 2.CCN Node Model CCN forwarding engine model 3.Transport 3.1 Reliability and Flow Control Since CCN flow balance is maintained at each hop, there is no need for additional techniques to control congestion in the middle of a path. Authors will cover this topic in detail ina future paper 3.Transport 3.2 Sequencing 3.Transport 3.3 Rich Connectivity, Mobility and Strategy CCN talks about data, not to nodes。 CCN can always exchange data as soon as it is physically possible to do so. 与TCP/IP的异同 CCN 采用了不同于TCP 的重传机制, 它 由最终用户(产生最初请求数据包的应用) 负责发起重传请求,而接收端的策略层负 责按照一定的策略确定从列表中选择某个 特定端口进行重传。 4.Routing Any routing scheme that works well for IP should also work well for CCN 4.1 Link-state Intra-domain Routing 4.2 Inter-domain Routing 4.Routing 4.1 Link-state Intra-domain Routing 4.Routing 4.2 Inter-domain Routing Once a few customers of an ISP start to use CCN, it is in the ISP’s best interest to deploy content router(s) to reduce peering costs The central problem with this type of bottom-up deployment is to bridge the gap between domains that have content routers but are separated by ISP(s) that do not. 5.Content-Based Security 5.1 Content Validation CCN authenticates the binding between names and content; the signature in each CCN data packet is over the name, the content, and a small amount of supporting data useful in signature verification 5.2 Managing Trust Although CCN moves data in a peer-to-peer fashion, it provides end-to-end security between content publisher and content consumer. CCN content consumers must determine whether received content is acceptable, or trustworthy. 5.Content-Based Security 5.3 Content Protection and Access Control The primary means of controlling access to CCN content is encryption. 5.4 Network Security and Policy Enforcement 与TCP/IP的异同 由于CCN 没有主机的概念, 很难采取以 主机为目的的攻击, 因此对CCN 的攻击 仅限于拒绝服务攻击和内容隐藏等手段。 6.Evaluation 6.1 Data Transfer Efficiency 6.Evaluation 6.1 Data Transfer Efficiency 6.Evaluation 6.2 Content Distribution Efficiency 问题思考 本文有些部分内容语焉不详。 安全性仅是理论上的探讨,没有实质实验 证明。 外部路由没有试验支持。 实验6.1-2数据量太小 相关工作 项目名称 DONA 代表论文 基本内容 A data-oriented (and beyond) network architecture 提出了一种基于新命名 体系的域名解析方案来 替代现有的DNS CBN A routing scheme for content-based networking 对传统、基于地址的单 播、多播网络的补充 。 消息的流动(flow)路径 由内容驱动,而不是由 消息发送方指定的地址 来决定 CCN Networking Named Content 以内容的“名字”代替 IP地址,重新设计数据 包的格式和各层协议 谢谢!