content centric networking in tactical and emergency manets

21
Content Centric Networking in Tactical and Emergency MANETs Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California, Los Angeles {soonoh, chiume, gerla}@cs.ucla.edu

Upload: penney

Post on 24-Feb-2016

31 views

Category:

Documents


0 download

DESCRIPTION

Content Centric Networking in Tactical and Emergency MANETs. Soon Y. Oh, Davide Lau, and Mario Gerla Computer Science Department University of California, Los Angeles { soonoh , chiume , gerla }@ cs.ucla.edu. Introduction. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Content Centric Networking in Tactical and Emergency MANETs

Content Centric Networking in Tactical and

Emergency MANETsSoon Y. Oh, Davide Lau, and Mario Gerla

Computer Science DepartmentUniversity of California, Los Angeles{soonoh, chiume, gerla}@cs.ucla.edu

Page 2: Content Centric Networking in Tactical and Emergency MANETs

2

Introduction Infrastructureless nature and quick deployment a

MANET is ideally suited for emergency & tactical operation, but Challenging environments

Lossy channel and high mobility Limited resources Hard to find necessary content

No search engine

Scalable & efficient content search and dissemination in MANETs Content Centric Networking

Page 3: Content Centric Networking in Tactical and Emergency MANETs

3

Content Centric Networking (CCN) Users are interested in WHAT content – not

WHERE it is or WHO has it Data is addressed by NAME OR CONTENT –

rather than by location or IP address No overhead in binding name to location Enabled by low storage prices and high speed links

Can CCN be directly applied to MANET environment?

Page 4: Content Centric Networking in Tactical and Emergency MANETs

4

WiCCN = CCN in MANETs Advantages

Group based mobility/operation resource sharing within group

Hierarchical data structure Information locality (via Cache)

Challenges Lossy channel and resource shortage Data Push and Pull is required while Internet CCN is only Pull

Must Push Critical information and operation messages Security and content authentication

Critical data and wireless broadcast medium

Content Centric Networking

Page 5: Content Centric Networking in Tactical and Emergency MANETs

5

WiCCN protocol design goals

Hierarchical storage/search architecture

Topic based data vs spatial/temporal contents

Cross-layer approach

Scalable and resource aware

Page 6: Content Centric Networking in Tactical and Emergency MANETs

6

Related Work TRIAD (2000)

User-friendly, structured, with location-independent names and content addressing (has influenced later protocols)

Data-Oriented (and beyond) Network Architecture (DONA) (2007) Flat, self-certifying names instead of IP addresses and DNS Contents is published and registered with a tree of trusted Resolution

Handlers (RH) Routing on Flat Levels (ROFL) (2006)

Semantic-free flat labels; it creates a circular namespace, e.g., DHT Content Centric Network (CCN) (2009)

Network wide content caching and user-friendly, hierarchical names for routing; Digital signature for security

Named Data Networks (NDN) (2010) Future Internet Architecture

Page 7: Content Centric Networking in Tactical and Emergency MANETs

7

WiCCN Network Model Group based mobility Hierarchical topology Interconnection via gateways Heterogeneous devices – different capacities

Soldier System

Airborne Network

Wideband Network

Page 8: Content Centric Networking in Tactical and Emergency MANETs

8

WiCCN Content Types Topic based content

Data files, video and audio clips Data is stored at publisher (originator) or near backbone nodes and

travels anywhere in the network PULLED by users No location and time sensitivity

Spatial/temporal content Situation awareness data; operational messages Content value is time and location sensitive PUSHED by publisher towards command center or proper

location

Page 9: Content Centric Networking in Tactical and Emergency MANETs

9

Local Storage Content Repository

Intermediate nodes cache content Maximize the probability of sharing

Meta-Data Registry Hash table for efficient look up It is used to forward Interest packet Meta-Data includes content attributes, e.g., type, time, loc, etc

Interest Table Stores Interest Query packets To suppress duplicate Interest packets To relay content to requestors

Content Repository

Meta-Data Registry

Interest Table

Page 10: Content Centric Networking in Tactical and Emergency MANETs

10

WiCCN Routing Content Pushing

Spatial/temporal content Geo-routing to command center or other destination

Page 11: Content Centric Networking in Tactical and Emergency MANETs

11

WiCCN Routing (Cont.) Content Pulling

Using an Interest packet and local storages

Content Repository

Meta-Data Registry

Interest Table

Interest

1. Check Content Repository and send data if it exists2. If there is no content, check Meta-Data Repository3. If Meta-Data entry exist, a node relays Interest toward data origin4. Otherwise, Interest is passed to a Gateway toward upper level

Interest

5. Interest is relayed

Page 12: Content Centric Networking in Tactical and Emergency MANETs

12

WiCCN Routing (Cont.) Difference to Internet CCN (due to wireless

common medium) Interest aggregation

Time stagger re-broadcast Interest packets Upon overhearing the same Interest, cancel the re-broadcast

Data Packet collision avoidance If more than one neighbors tries to transmit Exchange Request/Reply Respond with Reply before transmitting data

Page 13: Content Centric Networking in Tactical and Emergency MANETs

13

Packet Collision Avoidance

Interest

REPLY

REPLY

REQUEST

Content

Page 14: Content Centric Networking in Tactical and Emergency MANETs

14

Security and Authentication Using PKI

A gateway has private key and members in the domain have public keys

A gateway adds digital signature using a private key

Members encrypt packets using the public key The private and public keys are pre-assigned

Page 15: Content Centric Networking in Tactical and Emergency MANETs

15

Implementation Implement WiCCN on Linux OS

A gateway and members The gateway floods/updates meta-data A node sends Interest Request/Reply- exchange and data transmission

Run simple four node topology Compare performance with peer-to-peer protocol,

e.g., Pastry over OLSR

Page 16: Content Centric Networking in Tactical and Emergency MANETs

16

Pastry Overhead Every 3s new data generated (no real data transmitted) A gateway floods meta-data Pastry 378B/s average overhead Traffic suddenly increases to maintain a P2P ring structure

OLSR traffic in the background

Page 17: Content Centric Networking in Tactical and Emergency MANETs

17

WiCCN Overhead Every 3s new data generated (no data transmission in this experiment) A gateway floods meta-data Pastry 72B/s average overhead Only Meta-Data flooding

Page 18: Content Centric Networking in Tactical and Emergency MANETs

18

End-to-End Delay From node A to node D in the 4 node chain topology File size 1, 5, 10, 15, 20, 25, 100MB Pastry and WiCCN experience same delay in peer to peer transmissions

Page 19: Content Centric Networking in Tactical and Emergency MANETs

19

End-to-End Delay (Cont.) From node A to all nodes in the previous 4 node topology No broadcast; each node requests data at different time WiCCN presents significant lower delay due to content caching In Pastry, node A transmits 3 times, but WiCCN node A transmits only once;

cached data, at an intermediate node, is transmitted

Page 20: Content Centric Networking in Tactical and Emergency MANETs

20

Conclusion WiCCN performs better than DHT based

content sharing Mainly due to caching

Future work: Implement on smart phones Experiment with mobility Design cache strategies Bigger testbed/emulator

Page 21: Content Centric Networking in Tactical and Emergency MANETs

21