* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download 130307-ICN-v4 - UCSD CSE - University of California San Diego
Computer network wikipedia , lookup
Computer security wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
TV Everywhere wikipedia , lookup
Airborne Networking wikipedia , lookup
Deep packet inspection wikipedia , lookup
Net neutrality law wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Information-Centric Networking & the Ψ Architecture George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens, Greece [email protected] http://mm.aueb.gr/ Dept. of Computer Science & Engineering University of California, San Diego [email protected] http://cs.ucsd.edu/~polyzos/ ICN talk Outline Introduction, motivation, overview The Pub/Sub Internet (Ψ) Architecture pub-sub, rendezvous identifiers forwarding/LIPSIN prototypes, testbeds, and evaluation Security aspects Mobility support Continuous Media/Multimedia The role of Satellites Discussion & Conclusion [email protected] 2 Internet History and Outlook At the beginning… cooperation; no competition… no commercial traffic! endpoint-centric services/E2E Now… Content distribution… viruses, phishing, DoS attacks… NAT, firewalls, middleboxes, CDNs The sender has the power… Tussles… Connecting Wires >50% of traffic today is video↑ E2E? the past… Interconnecting Computers Overlays… DPI by ISPs… Trust? Endpoint trust? towards… Information-Centric Networking the current Internet evolutionary development … started decades earlier Interconnecting Information the Future Internet revolutionary research 10-15 years in the future tussle resolution at or near run-time Trust-to-Trust principle e.g.: privacy vs. accountability [email protected] 3 Publish-Subscribe Internet Vision information centrism everything is information & information is everything Recursive & and generalized use of publish-subscribe enables dynamic change of roles between actors Network cache publishes info (cached) subscribes to get info to cache Access Points publish ID mobiles subscribe Objectives Specify, implement, & test an internetworked pub/sub architecture follow a clean-slate design approach Perform qualitative and quantitative evaluation Security and socio-economics important! Migration and incentive scenarios important (e.g., overlay)! [email protected] 4 Our ICN-related Research Projects PSIRP: Publish Subscribe Internet Routing Paradigm FP7 ICT STREP, 2008-2010 PURSUIT: Publish Subscribe Internet Technologies FP7 ICT STREP, 2010-2013 FP7 ICT Network of Excellence, 2008-2012 ASPECTS, GOVPIMIT, E-key-nets EIFFEL: Evolved Internet Future For European Leadership extending, above & below the Internet layer optical, wireless, mobility, transport… Euro-NF: Anticipating the Network of the Future—From Theory to Design the basis focus on (inter)-networking FP7 ICT SSA, 2008-2010; Think-Tank continued June 2011 TT @ MIT: Information-Centric Networking φSAT: The Role of Satellites in Future Internet Services European Space Agency funded 2011-2013 [email protected] 5 ICN timeline papers/talks projects CCN Van Jacobson “A Survey of Information-Centric Networking Research,” forthcoming [email protected] 6 ICN Research Community workshops… with ACM SIGCOMM ICN 2011 (Toronto) ICN 2012 (Helsinki) ICN 2013 (Hong Kong): 3rd ACM SIGCOMM ICN workshop – Abstract: March 10 – Paper: March 17 with IEEE INFOCOM NOMEN 2012 NOMEN 2013 ICNRG@IERTF Journal & Magazines Special Issues [email protected] 7 The PSI (Ψ) Architecture Pub/Sub Internet Architecture Clean-Slate Native Two different prototype implementations exist Blackhawk (PSIRP) Blackadder (PURSUIT) [email protected] 8 Basic PSI Functions Publications information/content metadata Subscriptions (interests) asynchronous & in any order Rendezvous: Matches publications with subscriptions & initializes the forwarding process Topology: Monitors the network and it creates information delivery paths Forwarding: Implements information forwarding [email protected] 9 Identifiers [email protected] 10 Ψ Publication N. Fotiou, D. Trossen, G.C. Polyzos, “Illustrating a Publish-Subscribe Internet Architecture,” Telecommunication Systems, Springer, vol. 52, no. 3, pp. 233-245, 2012 (Special Issue on ‘Future Internet Services and Architectures: Trends and Visions). [email protected] 11 Ψ Subscription [email protected] 12 ‘Caching’ or Multiple Information Providers & Multiple Paths G. Xylomenos, et al., “Caching and Mobility Support in a Publish-Subscribe Internet Architecture,” IEEE Communications Magazine, feature topic on ‘Information-Centric Networking,’ vol. 50, no. 7, pp. 52-58, July 2012. [email protected] 13 Resource Sharing / Multicast [email protected] 14 Building Blocks in Ψ: Bubbles Needed to implement the 3 basic functions: Rendezvous, Topology & Forwarding (RTF) The bubble concept is akin to the current layering model The basic building block of functionality at all levels from OS through LAN to Global Internetwork Bubbles offer availability and extensibility through the recursive execution of basic functions [email protected] 15 Secure Forwarding Mechanism Forwarding based on Bloom filter (called zFilter) that contains all the link IDs through which a packet has to travel Supports multicast Hashing False positives Limitations in size Hierarchical / inter-networks Link identifiers are unique per information flow zFilter creation involves an encryption mechanism DoS attack resistant Almost impossible to redirect an information flow send arbitrary packets to a destination [email protected] 16 zFilters Based Forwarding P. Jokela, et al., “LIPSIN: Line Speed Publish/ Subscribe Inter-networking,” Proc. ACM SIGCOMM 2009. [email protected] 17 Prototype Implementations & Testbeds PSIRP PURSUIT Testbed (w/ Blackadder) • 25 nodes • 5 countries: UK, FI, GR, D, US • Tunneled (VPN) • over the public Internet PURSUIT PSIRP Testbed (w/ Blackhawk) • 6 countries: UK, FI, GR, D, BU, US • In addition: Belgium during ICT demos • Tunneled over the public Internet • +dedicated fiber where available D. Trossen and G. Parisis, “Designing and realizing an information-centric internet,” IEEE Communications Magazine, vol. 50, July 2012. - https://github.com/fp7-pursuit/blackadder [email protected] 18 Caching and replication All content sources are equivalent in PSI Origin, cache, or replication point Chunks can be retrieved from different sources Sources are visible to the network Network-level caching Caching vs. replication Similar to the user, different to the network Replication is planned (as in CDNs) Caching is opportunistic (as in P2Ps) PSI handles both in a unified manner [email protected] 19 On-path caching u Local RENE Pub Very lightweight 3 bypasses rendezvous network 4 FN Internet 5 Good for Global RENE RP 2 multicast error control 1a Sub1 Sub Local RENE R 1b Sub2 Sub [email protected] 20 Off-path caching u Pub 3 Uses the rendezvous network Local RENE to serve more users Global RENE RP 4a 4b Good for Internet local (access network) caching 2 Local RENE Sub 1 R Cache Sub Sub [email protected] 21 Content replication Local RENE The rendezvous network chooses the best source Pub 3a Global RENE 4a 3b CDN Internet Good for CDN-like proactive replication 4b Sub 2 Local RENE 1 RP Sub [email protected] 22 Security Requirements Publications confidentiality Subscription confidentiality publications should not be revealed to unauthorized subscribers user subscriptions should be kept secret Integrity, Availability Authentication, Anonymity Accountability Information Scoping [email protected] 23 Scopes: Ψ’s Information Firewalls Scopes allow for information location as well as for control of information dissemination Can be physical…. … or logical e.g., a sub-network e.g., my friends in Facebook In scopes, access control and accounting mechanisms are/will be implemented [email protected] 24 Access Control Enforcement Delegation Motivation Kazaa: 50% of versions and copies polluted [INFOCOM’05, Liang et al.] Kazaa: 15% infected by 52 different viruses [SIGCOMM06, Shin et al.] Limewire: 68% of executables, archives is malware [SIGCOMM’06, Kalafut et al.] Observations users can change behavior, information cannot! Information identification is easier Hash function vs. Certificates Design only positive, implicit votes only 1 vote /item /publisher no communication overhead weight of a vote: α 1/(Σ votes of pub in this set ) N. Fotiou, G. Marias, G.C. Polyzos, “Access Control Enforcement Delegation for Information-Centric Networking Architectures,” Proc. ACM SIGCOMM ICN, August 2012. [email protected] 25 Information Identification facebook.com/nikos/pics/ Prefix May give a location hint, denote the principal/owner Associated with an access control policy Handled by a (set of ) dedicated network node(s) IMG32010234 Suffix Identifies uniquely the information object (globally or within the prefix) • Users can create prefix, advertise prefix/suffix pairs, request prefix/suffix pairs [email protected] 26 PSI Implementation Prefix: Scope Identifier (SId) Suffix: Rendezvous Identifier (RId) SIds are managed by the Rendezvous node Define access control policy: who can advertise, who can subscribe Users can advertise data and subscribe to data Information flow: A subscriber has properly authenticated himself and requests item X [email protected] Provide Credentials 27 Benefits Consumer credentials protected Minimum user intervention RP has no access to consumer’s personal information RP does not have to implement any access control policy Access control policies can be re-used Even by users who do not know their content “Access Control Store” Access control policies can be easily modified [email protected] 28 Mobility and Privacy support Bubbles support mobility as well as location privacy N. Fotiou, K.V. Katsaros G.C. Polyzos, M. Särelä, D. Trossen, G. Xylomenos, “Handling Mobility in Future PublishSubscribe Information-Centric Networks,” Telecommunication Systems, Springer, Special Issue on ‘Mobility Management in the Future Internet,’ to appear. [email protected] 29 Packet Level Authentication (PLA) Per packet public key cryptographic operations are possible The network carries only authentic data Requires third-party certificates Need not be implemented at all nodes at wire speed Selected key nodes PLA offers significant energy efficiency Implemented in NetFPGAs [email protected] 30 Security Characteristics of Ψ Pub/Sub restores the imbalance of power between sender and receiver(s) No information flow until explicit signal for Interest for specific piece of information Availability of a specific piece of information Anti-DoS mechanism Pub/Sub facilitates Anti-Spam mechanism Anonymity Mobility Multihoming Message aggregation Resource sharing (e.g., with multicast) [email protected] 31 InfoRanking: lightweight mechanism to distinguish and isolate polluted information Motivation Kazaa: 50% of versions and copies polluted [INFOCOM’05, Liang et al.] Kazaa: 15% infected by 52 different viruses [SIGCOMM06, Shin et al.] Limewire: 68% of executables, archives is malware [SIGCOMM’06, Kalafut et al.] Observations users can change behavior, information cannot! Information identification is easier Hash function vs. Certificates Design only positive, implicit votes only 1 vote /item /publisher no communication overhead weight of a vote: 1/(Σ votes of pub in this set )α N. Fotiou, G. Marias, G.C. Polyzos, “Information Ranking in Content-Centric Networks,” Proc. Future Network & Mobile Summit, Florence, Italy, June 2010. [email protected] 32 Security & Privacy E2E direct trust not applicable – Current Internet does not support it either – Socioeconomic trust through mediators (e.g., Rendezvous Providers) Users change behavior, content does not – Rely on new methods to evaluate content integrity and authenticity – Reputable Content D. Lagutin, K. Visala, A. Zahemszky, T. Burbridge, G.F. Marias, “Roles and Security in a Publish/Subscribe Network Architecture,” Proc. IEEE ISCC 2010, Bologna, Italy, June 2010. N. Fotiou, G.F. Marias, G.C. Polyzos, "Fighting Spam in Publish/Subscribe Networks Using Information Ranking," Proc. 6th Conf. on Next Generation Internet, Paris, France, June 2010. End-user privacy can be effectively supported in ICN (@ internetwork level) – Who asks for what content hidden from content provider, caches – Pub/Sub matching through trusted mediator service (e.g., Rendezvous providers) – BUT privacy from Rendezvous providers becomes more of an issue Spam & malicious content distribution is blocked – There is no unsolicited traffic in the network! • – Content is delivered after explicit request New adversary models P. Nikander, G.F. Marias, “Towards Understanding Pure Publish/Subscribe Cryptographic Protocols,” Cambridge Security Protocols Workshop, June 2008 . [email protected] 33 Advantages of PSI in Mobility Support Decoupling IDs from location Publish/Subscribe is asynchronous and multicast Publishers & Subscribers can seamlessly & simultaneously move Adapts better to frequent mobility Data (packets) are identified independently from source or destination Information (cached? content) is still transparently available Routing and Forwarding decoupling IDs from location is a major advantage locations are ephemeral no need for triangular routing ingress filtering problem anycast choice of the best source of content Mobility & user behavior prediction together with proactive caching/prefetching can be used to enhance mobility support G. Xylomenos et al., “Caching and Mobility Support in a Publish-Subscribe Internet Architecture,” IEEE Communications Magazine, July 2012. [email protected] 34 Proactive Selective Neighbor Caching for enhancing Mobility Support in ICN Mobility Delay can be reduced by using proxies to pre-fetch and cache data approaches Reactive Durable subscriptions Proactive Proactive Selective Neighbor Caching mobile initially connected to proxy i select an optimum subset of neighbor proxies i will send the mobile’s subscriptions, and which will proactively cache information items matching these subscriptions if the mobile connects to one of these proxies then it can immediately receive information items it did not receive due to its disconnection Cost Function: X. Vasilakos et al. “Proactive Selective Neighbor Caching for enhancing Mobility Support in Information-Centric Networks,” Proc. ACM SIGCOMM ICN, August 2012. [email protected] 35 Multimedia over Ψ Motive: Multimedia over Ψ Technologies Involved “YouTube” a la Ψ … Java- JMF player Streaming videos JPSIRP without RTP/TCP/IP only native Ψ JNI PSI Basic Components of the application: Publisher: the owner of the video Subscriber: the user that seeks to view the video We tried different applications [email protected] Video Audio/voice (VoPSI) ... 36 Publish Videos Publish a video or a directory with multiple videos Define the scope for the video she uploads to the network Currently done via local exchange of video knowledge Stream Source (e.g. VLC) Send updated data as datagrams Stream Publisher Search for the desirable video using the name of the video Currently done via local exchange of information Subscribe to its PSI-level identifiers Play the video while downloading Local UDP Socket Stream Subscriber Receive datagrams into a publication buffer Publish new versions with same RId [email protected] Stream Sink (e.g. VLC) Local UDP Socket Publication Subscribe to a Video Subscribe to RId and listen to updates Publication NOTE: The publisher knows the subscriber set for this RId, sends the metadata directly to the subscribers; no rendezvous. Subscriber with metadata for a new version, subscribes to the corresponding data chunks. 37 Optimization of Real-Time Media Distribution Exploit 1. Functional organization 2. Item resolution decoupled from forwarding (path establishment) In-network resources TM nodes → (logically) centralized path/tree formation Stateless multicast forwarding Compute minimum cost (Steiner) trees for multicast delivery Cost of optimization: 3. Signaling cost: resolve the subscription → analogous to a DNS or DHT resolution Computation delay at TM Evaluation: Emulation of AS 224 (Norwegian Univ. & Research Network) 233 routers, 75 access routers → 75 PSI access networks… For 90% of subscriptions, delay (Steiner - Shortest-path) < 2ms; For 99.6%, < 60ms Steiner-tree byte footprint compared to Shortest-path trees: - 30%, multiple unicasts: - 48% C. Tsilopoulos et al. “Efficient Real-time Information Delivery in Future Internet PublishSubscribe Networks,” Proc. IEEE ICNC, San Diego, CA, January 2013. [email protected] 38 An Information-Centric Overlay Network Architecture for Content Distribution and Mobility Support Ph.D. Dissertation by Konstantinos Katsaros Multicast Router Assisted Overlay Multicast (RAOM) Multicast & Caching MultiCache Enabling caching of data delivered by multicast trees Adapting to the inter-network structure H-Pastry Deploying multicast functionality in an overlay fashion Canonical version of Pastry Mobility Support Overlay Multicast Assisted Mobility (OMAM) Revisiting multicast assisted mobility K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “MultiCache: an Overlay Architecture for Information-Centric Networking,” Computer Networks, vol. 55, no. 4, pp. 936-947, Special Issue on ‘Architectures and Protocols for the Future Internet,’March 2011. [email protected] 39 φSAT: The role of Satellites in FI Services Aim: To investigate the technical feasibility & business viability of the integration of SatCom with terrestrial ICN architectures Name Server Name Resolution Data Transport Forwarding Node Subscriber Publisher Results Methodology to identify application/service scenarios where the capabilities of SatCom and ICN bring highest techno-economic gains Candidate scenarios identified Key SatCom capabilities: Broadcast/Multicast, Wide Coverage 400 Key ICN capabilities: Data aggregation, Multipath Routing, Mobility Support, In-network Caching Hybrid Broadcast netTV M2M Communications 4G Backhauling Socio-economic evaluation Market evolution for each scenario # of ICN adopters Saturation 300 200 Fast ICN adoption 100 Initial deployment 0 0 5 10 15 20 25 30 35 40 45 50 55 60 time [email protected] 40 Conclusions ICN is well positioned to address caching, mobility, multihoming, traffic management/QoS, security... evolution: tussles resolved at or near run-time PSI chose specific name/ID resolvers (for each scope: RP), rather than flooding separation or functions separate forwarding from resolution (no reverse path) The PSI architecture inherits the advantages of ICN & the publish/subscribe paradigm centralized aspects, optimizations, policies well matched to SDN/OpenFlow—all optical forwarding in particular the security ones, but…. PSI selected and added specific security mechanisms Secure Forwarding (zFilters), Scopes, Bubbles, Packet Level Authentication, Information Ranking [email protected] 41 PSI: Key Observations and Issues RIDs: hash of content vs. not... Implications of uniquely indentifying content SIDs as special case of RIDs pub/sub “recursively” at many levels of the hierarchy/network versions (& IDs) of publications? Algorithmic Identifiers (RIDs) from wire-level to the global Internet perhaps used to realize reliable transport Granularity of items (to publish/subscribe to): objects, chunks, packets… pub/sub model: documents vs. channels Caching (enabled/facilitated) nice for intra-channel IDs... asynchronous (subscribe before publish) search engines probably still important (at different level?) Wireless? [email protected] 42 More Observations, Questions & Issues Information- vs. Content-centric vs. Named Data vs. pub/sub vs. ... overlay vs. clean-slate vs. hybrid/integrated… special-purpose nets only? Not global? Rendezvous powerful trusted has lots of information... target of DOS attacks networks of RPs = RN belongs to different entities than network provider? competing RNs RP functionality needed at multiple & different levels Intranet, global... on a wire... [email protected] 43 Thank you! Information-Centric Networking & the Ψ Architecture George C. Polyzos Faculty: PostDocs: Doctoral cand.: V.A. Siris, G. Xylomenos, G. Marias C.N. Ververidis, K.V. Katsaros, P. Frangoudis N. Fotiou, C. Tsilopoulos, X. Vasilakos, C. Stais, I. Thomas Mobile Multimedia Laboratory Department of Informatics Athens University of Economics and Business Athens, Greece http://mm.aueb.gr/ [email protected] Visiting Professor Dept. of Computer Science & Engineering Jacobs School of Engineering University of California, San Diego [email protected] Related Publications K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “MultiCache: an Overlay Architecture for InformationCentric Networking,” Computer Networks, vol. 55, no. 4, pp. 936-947, Elsevier, Special Issue on ‘Architectures and Protocols for the Future Internet,’ Guest Editors: T. Wolf & L. Eggert, March 2011. N. Fotiou, D. Trossen, G.C. Polyzos, “Illustrating a Publish-Subscribe Internet Architecture,” Telecommunication Systems, Springer, vol. 51, no. 4, Special Issue on ‘Future Internet Services and Architectures: Trends and Visions,’ pp. 233 245, December 2012. G. Xylomenos, X. Vasilakos, C. Tsilopoulos, V.A. Siris, G.C. Polyzos, “Caching and Mobility Support in a Publish-Subscribe Internet Architecture,” IEEE Communications Magazine, Special Issue on ‘Information-Centric Networking,’ vol. 50, no. 7, pp. 52-58, July 2012. N. Fotiou, K. Katsaros, G.C. Polyzos, M. Sarela, D. Trossen, G. Xylomenos, “Handling Mobility in Future Publish-Subscribe Information-Centric Networks,” Telecommunication Systems, Springer, Special Issue on ‘Mobility Management in the Future Internet’ (to appear). P. Zhang, N. Fotiou, B.E. Helvik, G.F. Marias, G.C. Polyzos, “Analysis of the effect of InfoRanking on content pollution in P2P systems,” Security and Communication Networks, John Wiley & Sons, Ltd. (to appear). C. Doukas, N. Fotiou, G.C. Polyzos, I. Maglogiannis, “Cognitive and Context Aware Assistive Environments Using Future Internet Technologies,” Special Issue on ‘Cognitive Systems for Assistive Environments,’ Universal Access in the Information Society, Springer (to appear). N. Fotiou, G.F. Marias, G.C. Polyzos, “Publish-Subscribe Internetworking Security Aspects,” in Trustworthy Internet, N. Blefari-Melazzi, G. Bianchi, L. Salgarelli, eds., Springer, May 2011 (pp. 3-15, http://www.springerlink.com/content/g0l4283hq1206128/fulltext.pdf). [email protected] 45 more … Related Publications K.V. Katsaros, C. Stais, G. Xylomenos, G.C. Polyzos, “On the Incremental Deployment of Overlay Information Centric Networks,” Proc. Future Network & Mobile Summit, Florence, Italy, June 2010. N. Fotiou, G. Marias, G.C. Polyzos, “Information Ranking in Content-Centric Networks,” Proc. Future Network & Mobile Summit, Florence, Italy, June 2010. N. Fotiou, G. Marias, G.C. Polyzos, “Towards a Secure Rendezvous Network for Future Publish/Subscribe Architectures,” Proc. 3rd Future Internet Symposium, September 2010. N. Fotiou, G.F. Marias, G.C. Polyzos, “Fighting Phishing the Information-Centric way,” Proc. 5th IFIP NTMS, Security Track, Istanbul, Turkey, May 2012. K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “GlobeTraff: a traffic workload generator for the performance evaluation of future Internet architectures,” Proc. 5th IFIP NTMS, May 2012. K.V. Katsaros, et al., “On Inter-domain Name Resolution for Information-Centric Networks,” Proc. IFIP/TC6 Networking), Prague, Czech Republic, May 2012. G.F. Marias, N. Fotiou, G.C. Polyzos, “Efficient Information Lookup for the Internet of Things,” Proc. First IEEE WoWMoM IoT-SoS, San Francisco, CA, June 2012. X. Vasilakos, et al., “Proactive Selective Neighbor Caching for enhancing Mobility Support in Information-Centric Networks,” Proc. ACM SIGCOMM ICN'12, Helsinki, Finland, August 2012. N. Fotiou, G.F. Marias, G.C. Polyzos, “Access Control Enforcement Delegation for InformationCentric Networking Architectures,” Proc. ACM SIGCOMM ICN'12, Helsinki, Finland, August 2012. K.P. Liolis, et al., “Satellite-Terrestrial Integration Scenarios for Future Information-Centric Networks,” Proc. ICSSC, September 2012. V.A. Siris, C.N. Ververidis, G.C. Polyzos, K. Liolis, “Information-Centric Networking Architectures for Integration of Satellites Into the Future Internet,” Proc. ESTEL, Rome, Italy, October 2012. C. Tsilopoulos, I. Gasparis, G. Xylomenos, G.C. Polyzos, “Efficient Real-time Information Delivery in Future Internet Publish-Subscribe Networks,” Proc. IEEE ICNC, San Diego, CA, January 2013. [email protected] 46 φSAT Scenario #1: Hybrid broadcast netTV Key drivers for this scenario identification DTH Broadcasting: 1st market for telecom satellites Unlimited potential for hybrid access To bring a boost of the link capacity To increase availability of service and QoE To add a return link capability for interactive/added-value services To enlarge service offer (e.g. number of programs for linear / ondemand TV) with several service providers To favor partnerships and competitiveness and to lower costs In this context, IP/TV over MPEG-based broadcast brings ease and flexibility for service integration Common standards to any access network E.g. service management, native e2e IP transport… New usages and trends of TV consumption 47 Scenario #1: Hybrid broadcast netTV GEO Satcom Network GW Transit Networks Content Provider Network RVS RVS Fixed Access Network (xDSL, Cable,..) RVS Media Servers RVS RVS Security AAA RVS RVS SD RVS: RendezVous Servers 48 φSAT Scenario #2: Smart M2M Transport Smart Transport M2M use case Key Challenges • Mobility support ICN Specific Advantages • Information collection and • • • • • 49 dissemination to/from multiple sources/sinks Information aggregation Traffic Prioritization Mobility support Delay tolerant communications Reliable real-time SW upgrading φSAT Scenario #3: Extended 4G Backhauling Key driver for this scenario Provides advantages in SatCom integration within the 4G/mobile Internet context given the aggressive video traffic growth levels in terrestrial mobile networks. Integrating satellite in a terrestrial 4G infrastructure allows Service Providers to extend their services towards isolated areas and enhance network capabilities for more efficient video content delivery, such as Evolved Multimedia Broadcast Multicast (eMBMS). Satellite Network Configuration GEO or MEO topology In some areas terrestrial repeaters (such as in systems based on DVB-SH and – NGH) could also be used to boost the satellite signal, e.g. for reception in urban areas (Hybrid satellite –LTE system). ICN potential QoS based inter-component handover management Opportunistic/proactive caching for satellite backhauled BS Traffic Aggregation & Caching for operator managed VAS 50 φSAT Scenario #3: Extended 4G Backhauling 51