Kazuaki Ueda, Yuma Ishigaki, A. Tagami, T. Hasegawa
This demonstration shows an efficient panoramic streaming application with ICN functionalities. The camera device splits its field-of-view into multiple named tiles, and clients request minimum tiles for their field-of-view. These named tiles are cached at the intermediate routers and the camera device can reduce the amount of traffic on its access network. By utilizing the ICN's merits, this application can work with limited resources, like IoT environment.
{"title":"Demo: panoramic streaming using named tiles","authors":"Kazuaki Ueda, Yuma Ishigaki, A. Tagami, T. Hasegawa","doi":"10.1145/3125719.3132093","DOIUrl":"https://doi.org/10.1145/3125719.3132093","url":null,"abstract":"This demonstration shows an efficient panoramic streaming application with ICN functionalities. The camera device splits its field-of-view into multiple named tiles, and clients request minimum tiles for their field-of-view. These named tiles are cached at the intermediate routers and the camera device can reduce the amount of traffic on its access network. By utilizing the ICN's merits, this application can work with limited resources, like IoT environment.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124389625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The goal of the paper is to present what an ideal NDN forwarding engine on a commercial off-the-shelf (COTS) computer is supposed to be. The paper designs a reference forwarding engine by selecting well-established high-speed techniques and then analyzes state-of-the-art prototype implementation to know its performance bottleneck. The microarchitectural analysis at the level of CPU pipelines and instructions reveals that dynamic random access memory (DRAM) access latency is one of bottlenecks for high-speed forwarding engines. Finally, the paper designs two prefetch-friendly packet processing techniques to hide DRAM access latency. The prototype according to the techniques achieves more than 40 million packets per second packet forwarding on a COTS computer.
{"title":"Toward an ideal NDN router on a commercial off-the-shelf computer","authors":"Junji Takemasa, Y. Koizumi, T. Hasegawa","doi":"10.1145/3125719.3125731","DOIUrl":"https://doi.org/10.1145/3125719.3125731","url":null,"abstract":"The goal of the paper is to present what an ideal NDN forwarding engine on a commercial off-the-shelf (COTS) computer is supposed to be. The paper designs a reference forwarding engine by selecting well-established high-speed techniques and then analyzes state-of-the-art prototype implementation to know its performance bottleneck. The microarchitectural analysis at the level of CPU pipelines and instructions reveals that dynamic random access memory (DRAM) access latency is one of bottlenecks for high-speed forwarding engines. Finally, the paper designs two prefetch-friendly packet processing techniques to hide DRAM access latency. The prototype according to the techniques achieves more than 40 million packets per second packet forwarding on a COTS computer.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127948665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Persistent Interests (PIs) are a promising approach to introduce push-type traffic in Named Data Networking (NDN), in particular for conversational services such as voice and video calls. Forwarding decisions for PIs are crucial in NDN because they establish a long-lived path for the data flowing back toward the PI issuer. In the course of studying the use of PIs in NDN, we investigate adaptive PI forwarding and present a strategy combining regular NDN forwarding information and results from probing potential alternative paths through the network. Simulation results indicate that our adaptive PI forwarding approach is superior to the PI-adapted Best Route strategy when network conditions change due to link failures.
{"title":"Adaptive forwarding of persistent interests in named data networking","authors":"Philipp Moll, Julian Janda, H. Hellwagner","doi":"10.1145/3125719.3132091","DOIUrl":"https://doi.org/10.1145/3125719.3132091","url":null,"abstract":"Persistent Interests (PIs) are a promising approach to introduce push-type traffic in Named Data Networking (NDN), in particular for conversational services such as voice and video calls. Forwarding decisions for PIs are crucial in NDN because they establish a long-lived path for the data flowing back toward the PI issuer. In the course of studying the use of PIs in NDN, we investigate adaptive PI forwarding and present a strategy combining regular NDN forwarding information and results from probing potential alternative paths through the network. Simulation results indicate that our adaptive PI forwarding approach is superior to the PI-adapted Best Route strategy when network conditions change due to link failures.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116898268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed dataset synchronization (sync for short) provides an important abstraction for multi-party data-centric communication in the Named Data Networking (NDN) architecture. Since the beginning of the NDN project, several sync protocols have been developed, each made its own design choices that cause inefficiency under various conditions. Furthermore, none of them provides group membership management, making it difficult to remove departed nodes from the protocol state maintained at each node. This poster presents VectorSync, a new NDN sync protocol that is built upon the lessons learned so far, provides group membership management, and improves the efficiency of dataset synchronization.
{"title":"VectorSync: distributed dataset synchronization over named data networking","authors":"Wentao Shang, A. Afanasyev, Lixia Zhang","doi":"10.1145/3125719.3132106","DOIUrl":"https://doi.org/10.1145/3125719.3132106","url":null,"abstract":"Distributed dataset synchronization (sync for short) provides an important abstraction for multi-party data-centric communication in the Named Data Networking (NDN) architecture. Since the beginning of the NDN project, several sync protocols have been developed, each made its own design choices that cause inefficiency under various conditions. Furthermore, none of them provides group membership management, making it difficult to remove departed nodes from the protocol state maintained at each node. This poster presents VectorSync, a new NDN sync protocol that is built upon the lessons learned so far, provides group membership management, and improves the efficiency of dataset synchronization.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117036860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Fotiou, G. Xylomenos, George C. Polyzos, Hasan M. A. Islam, D. Lagutin, T. Hakala, Eero Hakala
The Constrained Application Protocol (CoAP) and its extensions, such as observe and group communication, offer the potential for developing novel IoT applications. However, a full-fledged CoAP-based application requires delay-tolerant communication and support for multicast: since these properties cannot be easily provided by existing IP networks, developers cannot take full advantage of CoAP, preferring to use HTTP instead. In this demo we show how proxying CoAP traffic over an ICN network can unleash the full potential of CoAP, simultaneously shifting overhead and complexity from the (constrained) endpoints to the network.
{"title":"ICN enabling CoAP extensions for IP based IoT devices","authors":"N. Fotiou, G. Xylomenos, George C. Polyzos, Hasan M. A. Islam, D. Lagutin, T. Hakala, Eero Hakala","doi":"10.1145/3125719.3132105","DOIUrl":"https://doi.org/10.1145/3125719.3132105","url":null,"abstract":"The Constrained Application Protocol (CoAP) and its extensions, such as observe and group communication, offer the potential for developing novel IoT applications. However, a full-fledged CoAP-based application requires delay-tolerant communication and support for multicast: since these properties cannot be easily provided by existing IP networks, developers cannot take full advantage of CoAP, preferring to use HTTP instead. In this demo we show how proxying CoAP traffic over an ICN network can unleash the full potential of CoAP, simultaneously shifting overhead and complexity from the (constrained) endpoints to the network.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114489605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wentao Shang, A. Afanasyev, Yanbiao Li, J. Burke, Lixia Zhang
Named Data Networking (NDN) architecture uses data-centric communication primitives that naturally support direct device-to-device (D2D) communications. To make NDN-enabled D2D communication a reality, this poster aims at two goals. First, we report our recent progress in enabling NDN connectivity over a number of popular D2D networking technologies. Second, we share with the broader community the roadblocks that we discovered in the process. Our experience suggests that launching a new network protocol stack for D2D communication on common platforms can be a daunting engineering challenge because of the lack of standard cross-platform APIs, limited documentation, and general platform restrictions to use L2 interfaces directly. Moreover, platforms are often equipped with different D2D networking technologies, forcing one to use many different means to interconnect different types of systems.
{"title":"Device-to-device communication with named data networking","authors":"Wentao Shang, A. Afanasyev, Yanbiao Li, J. Burke, Lixia Zhang","doi":"10.1145/3125719.3132101","DOIUrl":"https://doi.org/10.1145/3125719.3132101","url":null,"abstract":"Named Data Networking (NDN) architecture uses data-centric communication primitives that naturally support direct device-to-device (D2D) communications. To make NDN-enabled D2D communication a reality, this poster aims at two goals. First, we report our recent progress in enabling NDN connectivity over a number of popular D2D networking technologies. Second, we share with the broader community the roadblocks that we discovered in the process. Our experience suggests that launching a new network protocol stack for D2D communication on common platforms can be a daunting engineering challenge because of the lack of standard cross-platform APIs, limited documentation, and general platform restrictions to use L2 interfaces directly. Moreover, platforms are often equipped with different D2D networking technologies, forcing one to use many different means to interconnect different types of systems.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This demo shows an implementation of 360/virtual reality video conferencing system implemented over NDN, including producing content, formatting into NDN format, transmitting over NDN network, managing the flow of interest/content requests, and displaying in a web browser so as to show 360 degree rotation and zoom in/out features.
{"title":"Demo: VR video conferencing over named data networks","authors":"Liyang Zhang, S. O. Amin, C. Westphal","doi":"10.1145/3125719.3132092","DOIUrl":"https://doi.org/10.1145/3125719.3132092","url":null,"abstract":"This demo shows an implementation of 360/virtual reality video conferencing system implemented over NDN, including producing content, formatting into NDN format, transmitting over NDN network, managing the flow of interest/content requests, and displaying in a web browser so as to show 360 degree rotation and zoom in/out features.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133807274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Davide Pesavento, Omar Ilias El Mimouni, Eric Newberry, L. Benmohamed, A. Battou
In this poster, we propose a network measurement framework for NDN. We define the goals of network measurement and discuss how these goals can be achieved by identifying the necessary measurement operations that must be built on top of NDN's primitives. Our main design goal is to empower NDN with a built-in measurement framework that can support multiple use cases and can be used by different applications that need to produce and/or consume network measurements. The framework uses NDN's native Interest/Data exchange to request and collect both active and passive measurements. Being a work-in-progress, we also discuss open issues and future work.
{"title":"A network measurement framework for named data networks","authors":"Davide Pesavento, Omar Ilias El Mimouni, Eric Newberry, L. Benmohamed, A. Battou","doi":"10.1145/3125719.3132113","DOIUrl":"https://doi.org/10.1145/3125719.3132113","url":null,"abstract":"In this poster, we propose a network measurement framework for NDN. We define the goals of network measurement and discuss how these goals can be achieved by identifying the necessary measurement operations that must be built on top of NDN's primitives. Our main design goal is to empower NDN with a built-in measurement framework that can support multiple use cases and can be used by different applications that need to produce and/or consume network measurements. The framework uses NDN's native Interest/Data exchange to request and collect both active and passive measurements. Being a work-in-progress, we also discuss open issues and future work.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115997585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yingdi Yu, A. Afanasyev, J. Seedorf, Zhiyi Zhang, Lixia Zhang
Named Data Networking (NDN) enables data-centric security in network communication by mandating digital signatures on network-layer data packets. Since the lifetime of some data can extend to many years, they outlive the lifetime of their signatures. This paper introduces NDN DeLorean, an authentication framework to ensure the long-term authenticity of long-lived data. The design of DeLorean takes a publicly auditable bookkeeping service approach to keep permanent proofs of data signatures and the times when the signatures were generated. To assess DeLorean's feasibility the paper presents a set of analytical evaluations on the operational cost as a function of data archive volumes. The paper also identifies several remaining issues that must be addressed in order to make DeLorean a general solution to authenticating long-lived data.
NDN (Named Data Networking)通过对网络层数据包进行数字签名,实现以数据为中心的网络通信安全。由于某些数据的生命周期可以延长到许多年,因此它们的寿命超过了其签名的生命周期。介绍了一种保证长寿命数据长期真实性的认证框架NDN DeLorean。DeLorean的设计采用了一种公开可审计的簿记服务方法,以保持数据签名和签名生成时间的永久证明。为了评估DeLorean的可行性,本文提出了一套关于运营成本作为数据存档量函数的分析评估。为了使DeLorean成为验证长期数据的通用解决方案,本文还指出了必须解决的几个遗留问题。
{"title":"NDN DeLorean: an authentication system for data archives in named data networking","authors":"Yingdi Yu, A. Afanasyev, J. Seedorf, Zhiyi Zhang, Lixia Zhang","doi":"10.1145/3125719.3125724","DOIUrl":"https://doi.org/10.1145/3125719.3125724","url":null,"abstract":"Named Data Networking (NDN) enables data-centric security in network communication by mandating digital signatures on network-layer data packets. Since the lifetime of some data can extend to many years, they outlive the lifetime of their signatures. This paper introduces NDN DeLorean, an authentication framework to ensure the long-term authenticity of long-lived data. The design of DeLorean takes a publicly auditable bookkeeping service approach to keep permanent proofs of data signatures and the times when the signatures were generated. To assess DeLorean's feasibility the paper presents a set of analytical evaluations on the operational cost as a function of data archive volumes. The paper also identifies several remaining issues that must be addressed in order to make DeLorean a general solution to authenticating long-lived data.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127333749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Named Data Networking (NDN) architecture builds the security primitives into the network layer: all retrieved data packets must be signed to ensure their integrity authenticity and provenance. To ensure that these primitives are used in a meaningful way without imposing undue burdens on NDN users, the management of cryptographic keys and certificates needs to work in a simple, secure, and user-friendly way. This poster introduces the NDN Trust Management system (NDNCERT) which is designed to fill this need. NDNCERT provides flexible mechanisms to delegate trust between certificates, either within a single device (managing permissions for local applications on a node to operate under a given namespace) or across devices/entities. NDNCERT features a modular design for security challenges that establish trust through out-of-band means for certificate issuing. Once a node or an application obtains a valid certificate for its namespace (or being configured with a self-signed certificate), it automatically becomes a certificate authority for its namespace, and can use the same NDNCERT protocol to produce certificates for the sub-namespaces.
{"title":"NDNCERT: universal usable trust management for NDN","authors":"Zhiyi Zhang, A. Afanasyev, Lixia Zhang","doi":"10.1145/3125719.3132090","DOIUrl":"https://doi.org/10.1145/3125719.3132090","url":null,"abstract":"The Named Data Networking (NDN) architecture builds the security primitives into the network layer: all retrieved data packets must be signed to ensure their integrity authenticity and provenance. To ensure that these primitives are used in a meaningful way without imposing undue burdens on NDN users, the management of cryptographic keys and certificates needs to work in a simple, secure, and user-friendly way. This poster introduces the NDN Trust Management system (NDNCERT) which is designed to fill this need. NDNCERT provides flexible mechanisms to delegate trust between certificates, either within a single device (managing permissions for local applications on a node to operate under a given namespace) or across devices/entities. NDNCERT features a modular design for security challenges that establish trust through out-of-band means for certificate issuing. Once a node or an application obtains a valid certificate for its namespace (or being configured with a self-signed certificate), it automatically becomes a certificate authority for its namespace, and can use the same NDNCERT protocol to produce certificates for the sub-namespaces.","PeriodicalId":394653,"journal":{"name":"Proceedings of the 4th ACM Conference on Information-Centric Networking","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129679035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}