Download 130307-ICN-v4 - UCSD CSE - University of California San Diego

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer network wikipedia , lookup

Computer security wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Peering wikipedia , lookup

TV Everywhere wikipedia , lookup

Airborne Networking wikipedia , lookup

Deep packet inspection wikipedia , lookup

Net neutrality law wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Net bias wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Information-Centric Networking
& the Ψ Architecture
George C. Polyzos
Mobile Multimedia Laboratory
Department of Informatics
Athens University of Economics & Business
Athens, Greece
[email protected]
http://mm.aueb.gr/
Dept. of Computer Science & Engineering
University of California, San Diego
[email protected]
http://cs.ucsd.edu/~polyzos/
ICN talk Outline


Introduction, motivation, overview
The Pub/Sub Internet (Ψ) Architecture




pub-sub, rendezvous
identifiers
forwarding/LIPSIN
prototypes, testbeds, and evaluation

Security aspects
Mobility support
Continuous Media/Multimedia
The role of Satellites

Discussion & Conclusion



[email protected]
2
Internet
History and Outlook


At the beginning…
 cooperation; no competition…
 no commercial traffic!
 endpoint-centric services/E2E
Now…
 Content distribution…




viruses, phishing, DoS attacks…
NAT, firewalls, middleboxes, CDNs
The sender has the power…
Tussles…

Connecting Wires


>50% of traffic today is video↑
E2E?






the past…
Interconnecting Computers

Overlays… DPI by ISPs…
Trust? Endpoint trust?


towards…
Information-Centric Networking
the current Internet
evolutionary development
… started decades earlier
Interconnecting Information


the Future Internet
revolutionary research



10-15 years in the future
tussle resolution at or near run-time
Trust-to-Trust principle
e.g.: privacy vs. accountability
[email protected]
3
Publish-Subscribe Internet Vision

information centrism

everything is information & information is everything
Recursive & and generalized use of publish-subscribe


enables dynamic change of roles between actors

Network cache



publishes info (cached)
subscribes to get info to cache
Access Points publish ID

mobiles subscribe
Objectives


Specify, implement, & test
an internetworked pub/sub architecture
 follow a clean-slate design approach
Perform qualitative and quantitative evaluation
 Security and socio-economics important!
 Migration and incentive scenarios important (e.g., overlay)!
[email protected]
4
Our ICN-related Research Projects

PSIRP: Publish Subscribe Internet Routing Paradigm

FP7 ICT STREP, 2008-2010



PURSUIT: Publish Subscribe Internet Technologies

FP7 ICT STREP, 2010-2013



FP7 ICT Network of Excellence, 2008-2012

ASPECTS, GOVPIMIT, E-key-nets
EIFFEL: Evolved Internet Future For European Leadership



extending, above & below the Internet layer
optical, wireless, mobility, transport…
Euro-NF: Anticipating the Network of the Future—From Theory to Design


the basis
focus on (inter)-networking
FP7 ICT SSA, 2008-2010; Think-Tank continued
June 2011 TT @ MIT: Information-Centric Networking
φSAT: The Role of Satellites in Future Internet Services


European Space Agency funded
2011-2013
[email protected]
5
ICN
timeline
papers/talks
projects
CCN
Van Jacobson
“A Survey of
Information-Centric
Networking Research,”
forthcoming
[email protected]
6
ICN Research Community

workshops…

with ACM SIGCOMM
 ICN 2011 (Toronto)
 ICN 2012 (Helsinki)
 ICN 2013 (Hong Kong):

3rd ACM SIGCOMM ICN workshop
– Abstract: March 10
– Paper: March 17



with IEEE INFOCOM
 NOMEN 2012
 NOMEN 2013
ICNRG@IERTF
Journal & Magazines Special Issues
[email protected]
7
The PSI (Ψ) Architecture

Pub/Sub Internet Architecture


Clean-Slate
Native

Two different prototype implementations exist


Blackhawk (PSIRP)
Blackadder (PURSUIT)
[email protected]
8
Basic PSI Functions

Publications







information/content
metadata
Subscriptions (interests)
asynchronous
& in any order
Rendezvous: Matches
publications with
subscriptions & initializes
the forwarding process
Topology: Monitors the
network and it creates
information delivery paths
Forwarding: Implements
information forwarding
[email protected]
9
Identifiers
[email protected]
10
Ψ Publication
N. Fotiou, D. Trossen, G.C. Polyzos,
“Illustrating a Publish-Subscribe
Internet Architecture,”
Telecommunication Systems, Springer,
vol. 52, no. 3, pp. 233-245, 2012 (Special
Issue on ‘Future Internet Services and
Architectures: Trends and Visions).
[email protected]
11
Ψ Subscription
[email protected]
12
‘Caching’ or Multiple Information Providers &
Multiple Paths
G. Xylomenos, et al., “Caching and Mobility Support in a Publish-Subscribe
Internet Architecture,” IEEE Communications Magazine, feature topic on
‘Information-Centric Networking,’ vol. 50, no. 7, pp. 52-58, July 2012.
[email protected]
13
Resource Sharing / Multicast
[email protected]
14
Building Blocks in Ψ: Bubbles

Needed to implement the
3 basic functions:
Rendezvous, Topology &
Forwarding (RTF)

The bubble concept is akin to
the current layering model
The basic building block of
functionality at all levels





from OS
through LAN
to Global Internetwork
Bubbles offer availability and
extensibility through the recursive
execution of basic functions
[email protected]
15
Secure Forwarding Mechanism



Forwarding based on Bloom filter (called zFilter) that
contains all the link IDs through which a packet has to travel
Supports multicast
Hashing


False positives
Limitations in size



Hierarchical / inter-networks
Link identifiers are unique per information flow
zFilter creation involves an encryption mechanism


DoS attack resistant
Almost impossible to
 redirect an information flow
 send arbitrary packets to a destination
[email protected]
16
zFilters Based Forwarding
P. Jokela, et al., “LIPSIN: Line Speed Publish/
Subscribe Inter-networking,” Proc. ACM
SIGCOMM 2009.
[email protected]
17
Prototype Implementations & Testbeds
PSIRP
PURSUIT Testbed (w/ Blackadder)
• 25 nodes
• 5 countries: UK, FI, GR, D, US
• Tunneled (VPN)
• over the public Internet
PURSUIT
PSIRP Testbed (w/ Blackhawk)
• 6 countries: UK, FI, GR, D, BU, US
• In addition: Belgium during ICT demos
• Tunneled over the public Internet
• +dedicated fiber where available
D. Trossen and G. Parisis, “Designing and realizing an information-centric internet,” IEEE
Communications Magazine, vol. 50, July 2012. - https://github.com/fp7-pursuit/blackadder
[email protected]
18
Caching and replication

All content sources are equivalent in PSI





Origin, cache, or replication point
Chunks can be retrieved from different sources
Sources are visible to the network
Network-level caching
Caching vs. replication




Similar to the user, different to the network
Replication is planned (as in CDNs)
Caching is opportunistic (as in P2Ps)
PSI handles both in a unified manner
[email protected]
19
On-path caching
u
Local RENE
Pub

Very lightweight


3
bypasses
rendezvous
network
4
FN
Internet
5
Good for

Global RENE
RP
2
multicast error
control
1a
Sub1 Sub
Local RENE
R
1b
Sub2
Sub
[email protected]
20
Off-path caching
u
Pub

3
Uses the
rendezvous
network


Local RENE
to serve
more
users
Global RENE
RP
4a
4b
Good for

Internet
local
(access
network)
caching
2
Local RENE
Sub
1
R
Cache
Sub
Sub
[email protected]
21
Content replication
Local RENE

The
rendezvous
network
chooses the
best source
Pub
3a
Global RENE
4a
3b
CDN

Internet
Good for
CDN-like
proactive
replication
4b
Sub
2
Local RENE
1
RP
Sub
[email protected]
22
Security Requirements

Publications confidentiality


Subscription confidentiality





publications should not be revealed to unauthorized subscribers
user subscriptions should be kept secret
Integrity, Availability
Authentication, Anonymity
Accountability
Information Scoping
[email protected]
23
Scopes: Ψ’s Information Firewalls


Scopes allow for information location as well as for control
of information dissemination
Can be physical….


… or logical


e.g., a sub-network
e.g., my friends in Facebook
In scopes, access control and accounting mechanisms
are/will be implemented
[email protected]
24
Access Control Enforcement Delegation

Motivation




Kazaa: 50% of versions and copies polluted [INFOCOM’05, Liang et al.]
Kazaa: 15% infected by 52 different viruses [SIGCOMM06, Shin et al.]
Limewire: 68% of executables, archives is malware [SIGCOMM’06, Kalafut et al.]
Observations
 users can change behavior,
information cannot!

Information identification is easier


Hash function vs. Certificates
Design
 only positive, implicit votes



only 1 vote /item /publisher
no communication overhead
weight of a vote:
α
 1/(Σ votes of pub in this set )
N. Fotiou, G. Marias, G.C. Polyzos, “Access Control Enforcement Delegation for
Information-Centric Networking Architectures,” Proc. ACM SIGCOMM ICN, August 2012.
[email protected]
25
Information Identification
facebook.com/nikos/pics/



Prefix
May give a location hint,
denote the principal/owner
Associated with an access
control policy
Handled by a (set of )
dedicated network node(s)
IMG32010234

Suffix
Identifies uniquely the
information object (globally or
within the prefix)
• Users can create prefix, advertise prefix/suffix pairs,
request prefix/suffix pairs
[email protected]
26
PSI Implementation





Prefix: Scope Identifier (SId)
Suffix: Rendezvous Identifier (RId)
SIds are managed by the Rendezvous node
Define access
control policy: who
can advertise, who
can subscribe
Users can advertise data and subscribe to data
Information flow:
A subscriber has
properly authenticated
himself and requests
item X
[email protected]
Provide
Credentials
27
Benefits





Consumer credentials protected
Minimum user intervention
RP has no access to consumer’s personal information
RP does not have to implement any access control policy
Access control policies can be re-used



Even by users who do not know their content
“Access Control Store”
Access control policies can be easily modified
[email protected]
28
Mobility and Privacy
support

Bubbles support mobility
as well as location privacy
N. Fotiou, K.V. Katsaros G.C. Polyzos,
M. Särelä, D. Trossen, G. Xylomenos,
“Handling Mobility in Future PublishSubscribe Information-Centric Networks,”
Telecommunication Systems, Springer,
Special Issue on ‘Mobility Management in the
Future Internet,’ to appear.
[email protected]
29
Packet Level Authentication (PLA)

Per packet public key cryptographic operations are
possible


The network carries only authentic data



Requires third-party certificates
Need not be implemented at all nodes


at wire speed
Selected key nodes
PLA offers significant energy efficiency
Implemented in NetFPGAs
[email protected]
30
Security Characteristics of Ψ


Pub/Sub restores the imbalance of power between sender
and receiver(s)
No information flow until explicit signal for

Interest for specific piece of information


Availability of a specific piece of information


Anti-DoS mechanism
Pub/Sub facilitates




Anti-Spam mechanism
Anonymity
Mobility
Multihoming
Message aggregation

Resource sharing (e.g., with multicast)
[email protected]
31
InfoRanking: lightweight mechanism to
distinguish and isolate polluted information

Motivation




Kazaa: 50% of versions and copies polluted [INFOCOM’05, Liang et al.]
Kazaa: 15% infected by 52 different viruses [SIGCOMM06, Shin et al.]
Limewire: 68% of executables, archives is malware [SIGCOMM’06, Kalafut et al.]
Observations
 users can change behavior, information cannot!

Information identification is easier


Hash function vs. Certificates
Design
 only positive, implicit votes



only 1 vote /item /publisher
no communication overhead
weight of a vote:

1/(Σ votes of pub in this set )α
N. Fotiou, G. Marias, G.C. Polyzos, “Information Ranking in Content-Centric Networks,”
Proc. Future Network & Mobile Summit, Florence, Italy, June 2010.
[email protected]
32
Security & Privacy

E2E direct trust not applicable
–
Current Internet does not support it either
–
Socioeconomic trust through mediators (e.g., Rendezvous Providers)


Users change behavior, content does not
–
Rely on new methods to evaluate content integrity and authenticity
–
Reputable Content


D. Lagutin, K. Visala, A. Zahemszky, T. Burbridge, G.F. Marias, “Roles and Security in a
Publish/Subscribe Network Architecture,” Proc. IEEE ISCC 2010, Bologna, Italy, June 2010.
N. Fotiou, G.F. Marias, G.C. Polyzos, "Fighting Spam in Publish/Subscribe Networks Using
Information Ranking," Proc. 6th Conf. on Next Generation Internet, Paris, France, June 2010.
End-user privacy can be effectively supported in ICN (@ internetwork level)
–
Who asks for what content hidden from content provider, caches
–
Pub/Sub matching through trusted mediator service (e.g., Rendezvous providers)
–

BUT privacy from Rendezvous providers becomes more of an issue
Spam & malicious content distribution is blocked
–
There is no unsolicited traffic in the network!
•
–

Content is delivered after explicit request
New adversary models
P. Nikander, G.F. Marias, “Towards Understanding Pure Publish/Subscribe Cryptographic
Protocols,” Cambridge Security Protocols Workshop, June 2008 .
[email protected]
33
Advantages of PSI in Mobility Support


Decoupling IDs from location
Publish/Subscribe is asynchronous and multicast


Publishers & Subscribers can seamlessly & simultaneously move



Adapts better to frequent mobility
Data (packets) are identified independently from source or destination
Information (cached? content) is still transparently available
Routing and Forwarding

decoupling IDs from location is a major advantage





locations are ephemeral
no need for triangular routing
ingress filtering problem
anycast choice of the best source of content
Mobility & user behavior prediction together with proactive
caching/prefetching can be used to enhance mobility support
G. Xylomenos et al., “Caching and Mobility Support in a Publish-Subscribe Internet
Architecture,” IEEE Communications Magazine, July 2012.
[email protected]
34
Proactive Selective Neighbor Caching
for enhancing Mobility Support in ICN
Mobility
 Delay can be reduced by using proxies to pre-fetch and cache data

approaches




Reactive
Durable subscriptions
Proactive
Proactive Selective Neighbor Caching


mobile initially connected to proxy i
select an optimum subset of neighbor proxies


i will send the mobile’s subscriptions, and
which will proactively cache





information items matching these subscriptions
if the mobile connects to one of these proxies
then it can immediately receive information items
it did not receive due to its disconnection
Cost Function:
X. Vasilakos et al. “Proactive Selective Neighbor Caching for enhancing Mobility
Support in Information-Centric Networks,” Proc. ACM SIGCOMM ICN, August 2012.
[email protected]
35
Multimedia over Ψ

Motive: Multimedia over Ψ


Technologies Involved
“YouTube” a la Ψ …
Java- JMF player

Streaming videos



JPSIRP
without RTP/TCP/IP
only native Ψ
JNI
PSI
Basic Components of the
application:


Publisher: the owner of the video
Subscriber: the user that seeks to
view the video

We tried different
applications



[email protected]
Video
Audio/voice (VoPSI)
...
36
Publish Videos



Publish a video or a directory
with multiple videos
Define the scope for the video
she uploads to the network
Currently done via local
exchange of video knowledge
Stream Source
(e.g. VLC)
Send updated data
as datagrams
Stream Publisher
Search for the desirable video
using the name of the video



Currently done via local exchange
of information
Subscribe to its PSI-level identifiers
Play the video while downloading
Local UDP Socket
Stream Subscriber
Receive datagrams
into a publication buffer
Publish new versions
with same RId
[email protected]

Stream Sink
(e.g. VLC)
Local UDP Socket
Publication
Subscribe to a Video
Subscribe to RId and
listen to updates
Publication
NOTE: The publisher
knows the subscriber
set for this RId, sends
the metadata directly to
the subscribers; no
rendezvous. Subscriber
with metadata for a
new version,
subscribes to the
corresponding data
chunks.
37
Optimization of Real-Time Media Distribution
Exploit
1. Functional organization

2.
Item resolution decoupled from forwarding (path establishment)
In-network resources

TM nodes → (logically) centralized path/tree formation
Stateless multicast forwarding
Compute minimum cost (Steiner) trees for multicast delivery
 Cost of optimization:
3.

Signaling cost: resolve the subscription



→ analogous to a DNS or DHT resolution
Computation delay at TM
Evaluation: Emulation of AS 224 (Norwegian Univ. & Research Network)



233 routers, 75 access routers → 75 PSI access networks…
For 90% of subscriptions, delay (Steiner - Shortest-path) < 2ms; For 99.6%, < 60ms
Steiner-tree byte footprint compared to Shortest-path trees: - 30%, multiple unicasts: - 48%
C. Tsilopoulos et al. “Efficient Real-time Information Delivery in Future Internet PublishSubscribe Networks,” Proc. IEEE ICNC, San Diego, CA, January 2013.
[email protected]
38
An Information-Centric Overlay Network Architecture
for Content Distribution and Mobility Support
Ph.D. Dissertation by Konstantinos Katsaros

Multicast

Router Assisted Overlay Multicast (RAOM)


Multicast & Caching

MultiCache


Enabling caching of data delivered by multicast trees
Adapting to the inter-network structure

H-Pastry


Deploying multicast functionality in an overlay fashion
Canonical version of Pastry
Mobility Support

Overlay Multicast Assisted Mobility (OMAM)

Revisiting multicast assisted mobility
K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “MultiCache: an Overlay Architecture for
Information-Centric Networking,” Computer Networks, vol. 55, no. 4, pp. 936-947,
Special Issue on ‘Architectures and Protocols for the Future Internet,’March 2011.
[email protected]
39
φSAT: The role of Satellites in FI Services

Aim:


To investigate the technical
feasibility & business viability
of the integration of SatCom
with terrestrial ICN architectures
Name Server
Name Resolution
Data Transport
Forwarding
Node
Subscriber
Publisher
Results

Methodology to identify application/service scenarios where the
capabilities of SatCom and ICN bring highest techno-economic gains



Candidate scenarios identified




Key SatCom capabilities: Broadcast/Multicast, Wide Coverage
400
Key ICN capabilities: Data aggregation, Multipath
Routing, Mobility Support, In-network Caching
Hybrid Broadcast netTV
M2M Communications
4G Backhauling
Socio-economic evaluation

Market evolution for each scenario
# of ICN
adopters
Saturation
300
200
Fast ICN adoption
100
Initial deployment
0
0 5 10 15 20 25 30 35 40 45 50 55 60
time
[email protected]
40
Conclusions

ICN is well positioned to address



caching, mobility, multihoming, traffic management/QoS, security...
evolution: tussles resolved at or near run-time
PSI chose


specific name/ID resolvers (for each scope: RP), rather than flooding
separation or functions
 separate forwarding from resolution (no reverse path)



The PSI architecture inherits the advantages of

ICN & the publish/subscribe paradigm


centralized aspects, optimizations, policies
well matched to SDN/OpenFlow—all optical forwarding
in particular the security ones, but….
PSI selected and added specific security mechanisms

Secure Forwarding (zFilters), Scopes, Bubbles, Packet Level Authentication, Information Ranking
[email protected]
41
PSI: Key Observations and Issues

RIDs: hash of content vs. not...

Implications of uniquely indentifying content



SIDs as special case of RIDs
pub/sub “recursively”

at many levels of the hierarchy/network






versions (& IDs) of publications?
Algorithmic Identifiers (RIDs)


from wire-level to the global Internet
perhaps used to realize reliable transport
Granularity of items (to publish/subscribe to): objects, chunks, packets…
pub/sub model: documents vs. channels


Caching (enabled/facilitated)
nice for intra-channel IDs...
asynchronous (subscribe before publish)
search engines probably still important (at different level?)
Wireless?
[email protected]
42
More Observations, Questions & Issues


Information- vs. Content-centric vs. Named Data vs. pub/sub vs. ...
overlay vs. clean-slate vs. hybrid/integrated…


special-purpose nets only? Not global?
Rendezvous


powerful
trusted






has lots of information...
target of DOS attacks
networks of RPs = RN
belongs to different entities than network provider?
competing RNs
RP functionality needed at multiple & different levels

Intranet, global... on a wire...
[email protected]
43
Thank you!
Information-Centric Networking & the Ψ Architecture
George C. Polyzos
Faculty:
PostDocs:
Doctoral cand.:
V.A. Siris, G. Xylomenos, G. Marias
C.N. Ververidis, K.V. Katsaros, P. Frangoudis
N. Fotiou, C. Tsilopoulos, X. Vasilakos, C. Stais, I. Thomas
Mobile Multimedia Laboratory
Department of Informatics
Athens University of Economics and Business
Athens, Greece
http://mm.aueb.gr/
[email protected]
Visiting Professor
Dept. of Computer Science & Engineering
Jacobs School of Engineering
University of California, San Diego
[email protected]
Related Publications

K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “MultiCache: an Overlay Architecture for InformationCentric Networking,” Computer Networks, vol. 55, no. 4, pp. 936-947, Elsevier, Special Issue on
‘Architectures and Protocols for the Future Internet,’ Guest Editors: T. Wolf & L. Eggert, March 2011.

N. Fotiou, D. Trossen, G.C. Polyzos, “Illustrating a Publish-Subscribe Internet Architecture,”
Telecommunication Systems, Springer, vol. 51, no. 4, Special Issue on ‘Future Internet Services and
Architectures: Trends and Visions,’ pp. 233 245, December 2012.

G. Xylomenos, X. Vasilakos, C. Tsilopoulos, V.A. Siris, G.C. Polyzos, “Caching and Mobility Support
in a Publish-Subscribe Internet Architecture,” IEEE Communications Magazine, Special Issue on
‘Information-Centric Networking,’ vol. 50, no. 7, pp. 52-58, July 2012.

N. Fotiou, K. Katsaros, G.C. Polyzos, M. Sarela, D. Trossen, G. Xylomenos, “Handling Mobility in
Future Publish-Subscribe Information-Centric Networks,” Telecommunication Systems, Springer,
Special Issue on ‘Mobility Management in the Future Internet’ (to appear).

P. Zhang, N. Fotiou, B.E. Helvik, G.F. Marias, G.C. Polyzos, “Analysis of the effect of InfoRanking
on content pollution in P2P systems,” Security and Communication Networks, John Wiley & Sons,
Ltd. (to appear).

C. Doukas, N. Fotiou, G.C. Polyzos, I. Maglogiannis, “Cognitive and Context Aware Assistive
Environments Using Future Internet Technologies,” Special Issue on ‘Cognitive Systems for
Assistive Environments,’ Universal Access in the Information Society, Springer (to appear).

N. Fotiou, G.F. Marias, G.C. Polyzos, “Publish-Subscribe Internetworking Security Aspects,” in
Trustworthy Internet, N. Blefari-Melazzi, G. Bianchi, L. Salgarelli, eds., Springer, May 2011 (pp. 3-15,
http://www.springerlink.com/content/g0l4283hq1206128/fulltext.pdf).
[email protected]
45
more … Related Publications












K.V. Katsaros, C. Stais, G. Xylomenos, G.C. Polyzos, “On the Incremental Deployment of Overlay
Information Centric Networks,” Proc. Future Network & Mobile Summit, Florence, Italy, June 2010.
N. Fotiou, G. Marias, G.C. Polyzos, “Information Ranking in Content-Centric Networks,” Proc.
Future Network & Mobile Summit, Florence, Italy, June 2010.
N. Fotiou, G. Marias, G.C. Polyzos, “Towards a Secure Rendezvous Network for Future
Publish/Subscribe Architectures,” Proc. 3rd Future Internet Symposium, September 2010.
N. Fotiou, G.F. Marias, G.C. Polyzos, “Fighting Phishing the Information-Centric way,” Proc. 5th
IFIP NTMS, Security Track, Istanbul, Turkey, May 2012.
K.V. Katsaros, G. Xylomenos, G.C. Polyzos, “GlobeTraff: a traffic workload generator for the
performance evaluation of future Internet architectures,” Proc. 5th IFIP NTMS, May 2012.
K.V. Katsaros, et al., “On Inter-domain Name Resolution for Information-Centric Networks,” Proc.
IFIP/TC6 Networking), Prague, Czech Republic, May 2012.
G.F. Marias, N. Fotiou, G.C. Polyzos, “Efficient Information Lookup for the Internet of Things,”
Proc. First IEEE WoWMoM IoT-SoS, San Francisco, CA, June 2012.
X. Vasilakos, et al., “Proactive Selective Neighbor Caching for enhancing Mobility Support in
Information-Centric Networks,” Proc. ACM SIGCOMM ICN'12, Helsinki, Finland, August 2012.
N. Fotiou, G.F. Marias, G.C. Polyzos, “Access Control Enforcement Delegation for InformationCentric Networking Architectures,” Proc. ACM SIGCOMM ICN'12, Helsinki, Finland, August 2012.
K.P. Liolis, et al., “Satellite-Terrestrial Integration Scenarios for Future Information-Centric
Networks,” Proc. ICSSC, September 2012.
V.A. Siris, C.N. Ververidis, G.C. Polyzos, K. Liolis, “Information-Centric Networking Architectures
for Integration of Satellites Into the Future Internet,” Proc. ESTEL, Rome, Italy, October 2012.
C. Tsilopoulos, I. Gasparis, G. Xylomenos, G.C. Polyzos, “Efficient Real-time Information Delivery in
Future Internet Publish-Subscribe Networks,” Proc. IEEE ICNC, San Diego, CA, January 2013.
[email protected]
46
φSAT Scenario #1: Hybrid broadcast netTV
Key drivers for this scenario identification
DTH Broadcasting: 1st market for telecom satellites
Unlimited potential for hybrid access
To bring a boost of the link capacity
To increase availability of service and QoE
To add a return link capability for interactive/added-value services
To enlarge service offer (e.g. number of programs for linear / ondemand TV) with several service providers
To favor partnerships and competitiveness and to lower costs
In this context, IP/TV over MPEG-based broadcast brings ease and
flexibility for service integration
Common standards to any access network
E.g. service management, native e2e IP transport…
New usages and trends of TV consumption
47
Scenario #1: Hybrid broadcast netTV
GEO Satcom Network
GW
Transit Networks
Content Provider
Network
RVS
RVS
Fixed Access Network (xDSL, Cable,..)
RVS
Media Servers
RVS
RVS
Security AAA
RVS
RVS
SD
RVS: RendezVous Servers
48
φSAT Scenario #2: Smart M2M Transport
Smart Transport M2M use case
Key Challenges
• Mobility support
ICN Specific Advantages
• Information collection and
•
•
•
•
•
49
dissemination to/from
multiple sources/sinks
Information aggregation
Traffic Prioritization
Mobility support
Delay tolerant communications
Reliable real-time SW upgrading
φSAT Scenario #3: Extended 4G Backhauling
Key driver for this scenario
Provides advantages in SatCom integration within the 4G/mobile Internet context
given the aggressive video traffic growth levels in terrestrial mobile networks.
Integrating satellite in a terrestrial 4G infrastructure allows Service Providers to
extend their services towards isolated areas and enhance network capabilities for
more efficient video content delivery, such as Evolved Multimedia Broadcast
Multicast (eMBMS).
Satellite Network Configuration
GEO or MEO topology
In some areas terrestrial repeaters (such as in systems based on DVB-SH and –
NGH) could also be used to boost the satellite signal, e.g. for reception in urban
areas (Hybrid satellite –LTE system).
ICN potential
QoS based inter-component handover management
Opportunistic/proactive caching for satellite backhauled BS
Traffic Aggregation & Caching for operator managed VAS
50
φSAT Scenario #3: Extended 4G Backhauling
51