SlideShare uma empresa Scribd logo
1 de 18
Networking Named Content
Paper by: V. Jacobson et al.
Presented by : Haroon Rashid
1
Content Centric Networking
 No NAT traversal.
 Address space exhaustion.
 Average latency and total bandwidth is minimized.
 Networking in mobile scenarios is easy.
Content Centric Networking (CCN) removes the concept of
host identities (machine address) required for communication
and considers only named data packets. Some of its benefits:
2
Different Paradigms
IP Networking CCN Networking
Source: Lecture Notes on Internet 3
IP vs. CCN Network stack
IP Network Stack CCN Network Stack
4
CCN Packet Types
5
Forwarding Engine
6
Naming/Hierarchical Addressing
Query Traversal
Address Structure
7
Routing
 CCN Uses name prefixes instead of IP prefixes.
 Name prefixes are broadcasted via routing protocols.
 Conventional routing protocols like IS-IS and OSPF are
used in CCN by utilizing a general TLV(type label value)
scheme.
 Each node builds its FIB on receiving prefix.
8
Routing
Steps
1. Local map gets build up by
hello packets – adjacency
matrix.
2. Information of data
availability at a node gets
disseminated via Prefix
announcements (IGP-LSA).
 Prefix based longest
match lookups.
9
• CCN supports multicasting when more than one
announcer of data is found at a particular node while
as IP supports only uni-casting in such a case.
• For inter domain routing, BGP supports equivalent
of IGP TLV mechanism.
10
Security
• Security is build within data itself rather than
securing data channel.
• Digital signatures are used for authentication.
• Cryptographic encryption is used for private data
protection.
• Signature in each data packet is over the packet
name, the content, and on signed-info.
• Decryption keys are distributed along content as a
CCN data blocks – no need of trusted servers.
11
Network Security
• No tampering is possible due to digital signatures.
• Impossible to send the malicious content to a particular
machine as host identities are not revealed.
• Data-based distributed denial of service attacks not possible
as filtering of each data packet takes place at each
aggregation point towards content customer.
• For Interest flooding attack, attacker should be expert in
providing the different combinations of name components
of a prefix served by the target.
12
• CCN’s semantically selective control also
mitigates different attacks:
• Data packets follow same path as Interest – helps
intermediary routers to have fine grained control of Interests
forwarded under a certain prefix.
• Attacked domain can ask downstream routers to throttle
number of Interest packets for a certain prefix.
• Provides tools to organizations to control their
content travel.
• Policy based routing – requiring content name and signer.
• Interests can be digitally signed to enable the policy routing
by how often and into what namespaces a particular
consumer may query.
13
Evaluation
• More time to reach to
throughput asymptote in
CCN due to store and
forward stages.
• Un-optimized task level in
CCN vs. optimized kernel
level implementation in
TCP.
• CCN’s lower throughput due
to its encapsulation in
IP/UDP and its own headers.
• But remember CCN’s
implicit data security.
BULK DATA TRANSFER
14
Performance in secure & insecure
scenarios
• CCN over Jumbo-UDP is twice as efficient as HTTP and
three times more efficient than HTTPS in both overhead
and packets (sent).
15
Performance in data sharing scen.
• The performance penalty of using CCN vs. TCP is around
20% while the performance gain from sharing is integer
multiples, there is a net performance win from using CCN
even when sharing ratios / hit rates are low.
16
Architecture Difference
DONA
• Name given to packet is a
cryptographic hash of
publisher’s key and label.
• DNS type table required for
resolution of user familiar
name to digest based.
• Flat Namespace.
• Content must be first
registered with RHs.
CCN
• Name given is not a
cryptographic digest of
anything.
• User friendly, structured,
location independent
names.
• Hierarchical Namespace.
• Content generated
dynamically in response to
queries.
17
Concerns
• Names based on digest vs. user friendly,
structured names.
• Hierarchical namespace vs. flat namespace.
• Inter-domain routing feasibility.
• Caching level & replacement policy at the
intermediary routers.
• Does it depends on the ISP?
• Can we improve forward strategy?
18

Mais conteúdo relacionado

Mais procurados

System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
purplesea
 

Mais procurados (20)

Network address translation
Network address translationNetwork address translation
Network address translation
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
iptv over ngn
iptv over ngniptv over ngn
iptv over ngn
 
Adoptive flowcontrol in TCP
Adoptive flowcontrol in TCPAdoptive flowcontrol in TCP
Adoptive flowcontrol in TCP
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
 
Ospf routing protocol in gns3
Ospf routing protocol in gns3Ospf routing protocol in gns3
Ospf routing protocol in gns3
 
Securing the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native InfrastructureSecuring the Onion: 5G Cloud Native Infrastructure
Securing the Onion: 5G Cloud Native Infrastructure
 
Chap08 gb 03_kh
Chap08 gb 03_khChap08 gb 03_kh
Chap08 gb 03_kh
 
Model driven telemetry
Model driven telemetryModel driven telemetry
Model driven telemetry
 
MULTICAST BY SAIKIRAN PANJALA
MULTICAST BY SAIKIRAN PANJALAMULTICAST BY SAIKIRAN PANJALA
MULTICAST BY SAIKIRAN PANJALA
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
DDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacksDDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacks
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
Privacy issues in the cloud
Privacy issues in the cloudPrivacy issues in the cloud
Privacy issues in the cloud
 
Ims, Ip Multimedia System
Ims, Ip Multimedia SystemIms, Ip Multimedia System
Ims, Ip Multimedia System
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and Frames
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 

Destaque

Information Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityInformation Centric Networking and Content Addressability
Information Centric Networking and Content Addressability
Shi Junxiao
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN Repository
Shi Junxiao
 
Naming in content_oriented_architectures [repaired]
Naming in content_oriented_architectures [repaired]Naming in content_oriented_architectures [repaired]
Naming in content_oriented_architectures [repaired]
haroonrashidlone
 
Information-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issuesInformation-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issues
SAIL
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
rapatil
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
Disi Dc
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
Varun Narang
 

Destaque (16)

Named data networking
Named data networkingNamed data networking
Named data networking
 
Content-Centric Networking: Security
Content-Centric Networking: SecurityContent-Centric Networking: Security
Content-Centric Networking: Security
 
Information Centric Networking and Content Addressability
Information Centric Networking and Content AddressabilityInformation Centric Networking and Content Addressability
Information Centric Networking and Content Addressability
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN Repository
 
Smart Congestion Control for Delay- and Disruption Tolerant Networks
Smart Congestion Control for Delay- and Disruption Tolerant NetworksSmart Congestion Control for Delay- and Disruption Tolerant Networks
Smart Congestion Control for Delay- and Disruption Tolerant Networks
 
CCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFNCCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFN
 
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
Time-Shifted TV in Content Centric Networks: the Case for Cooperative In-Netw...
 
Naming in content_oriented_architectures [repaired]
Naming in content_oriented_architectures [repaired]Naming in content_oriented_architectures [repaired]
Naming in content_oriented_architectures [repaired]
 
Routing papers in ccn
Routing papers in ccnRouting papers in ccn
Routing papers in ccn
 
Linked data representation
Linked data representationLinked data representation
Linked data representation
 
Information-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issuesInformation-centric networking and relaton to legal and regulatory issues
Information-centric networking and relaton to legal and regulatory issues
 
Binary decision diagrams
Binary decision diagramsBinary decision diagrams
Binary decision diagrams
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
 
Time series Forecasting
Time series ForecastingTime series Forecasting
Time series Forecasting
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
 

Semelhante a Named data networking

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
Piero Fraternali
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
Mumbai Academisc
 
TAM new report
TAM new reportTAM new report
TAM new report
Suzit Punk
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
phanleson
 

Semelhante a Named data networking (20)

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Security issues in content centric networks-review2
Security issues in content centric networks-review2Security issues in content centric networks-review2
Security issues in content centric networks-review2
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Content centric networks
Content centric networksContent centric networks
Content centric networks
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 
Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111
 
Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
SDN and Named Data Networking Security
SDN and Named Data Networking SecuritySDN and Named Data Networking Security
SDN and Named Data Networking Security
 
Transport layer
Transport layer Transport layer
Transport layer
 
lecture-2-tcp-ip.ppt
lecture-2-tcp-ip.pptlecture-2-tcp-ip.ppt
lecture-2-tcp-ip.ppt
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Network cost services
Network cost servicesNetwork cost services
Network cost services
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptx
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
 

Último

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 

Named data networking

  • 1. Networking Named Content Paper by: V. Jacobson et al. Presented by : Haroon Rashid 1
  • 2. Content Centric Networking  No NAT traversal.  Address space exhaustion.  Average latency and total bandwidth is minimized.  Networking in mobile scenarios is easy. Content Centric Networking (CCN) removes the concept of host identities (machine address) required for communication and considers only named data packets. Some of its benefits: 2
  • 3. Different Paradigms IP Networking CCN Networking Source: Lecture Notes on Internet 3
  • 4. IP vs. CCN Network stack IP Network Stack CCN Network Stack 4
  • 8. Routing  CCN Uses name prefixes instead of IP prefixes.  Name prefixes are broadcasted via routing protocols.  Conventional routing protocols like IS-IS and OSPF are used in CCN by utilizing a general TLV(type label value) scheme.  Each node builds its FIB on receiving prefix. 8
  • 9. Routing Steps 1. Local map gets build up by hello packets – adjacency matrix. 2. Information of data availability at a node gets disseminated via Prefix announcements (IGP-LSA).  Prefix based longest match lookups. 9
  • 10. • CCN supports multicasting when more than one announcer of data is found at a particular node while as IP supports only uni-casting in such a case. • For inter domain routing, BGP supports equivalent of IGP TLV mechanism. 10
  • 11. Security • Security is build within data itself rather than securing data channel. • Digital signatures are used for authentication. • Cryptographic encryption is used for private data protection. • Signature in each data packet is over the packet name, the content, and on signed-info. • Decryption keys are distributed along content as a CCN data blocks – no need of trusted servers. 11
  • 12. Network Security • No tampering is possible due to digital signatures. • Impossible to send the malicious content to a particular machine as host identities are not revealed. • Data-based distributed denial of service attacks not possible as filtering of each data packet takes place at each aggregation point towards content customer. • For Interest flooding attack, attacker should be expert in providing the different combinations of name components of a prefix served by the target. 12
  • 13. • CCN’s semantically selective control also mitigates different attacks: • Data packets follow same path as Interest – helps intermediary routers to have fine grained control of Interests forwarded under a certain prefix. • Attacked domain can ask downstream routers to throttle number of Interest packets for a certain prefix. • Provides tools to organizations to control their content travel. • Policy based routing – requiring content name and signer. • Interests can be digitally signed to enable the policy routing by how often and into what namespaces a particular consumer may query. 13
  • 14. Evaluation • More time to reach to throughput asymptote in CCN due to store and forward stages. • Un-optimized task level in CCN vs. optimized kernel level implementation in TCP. • CCN’s lower throughput due to its encapsulation in IP/UDP and its own headers. • But remember CCN’s implicit data security. BULK DATA TRANSFER 14
  • 15. Performance in secure & insecure scenarios • CCN over Jumbo-UDP is twice as efficient as HTTP and three times more efficient than HTTPS in both overhead and packets (sent). 15
  • 16. Performance in data sharing scen. • The performance penalty of using CCN vs. TCP is around 20% while the performance gain from sharing is integer multiples, there is a net performance win from using CCN even when sharing ratios / hit rates are low. 16
  • 17. Architecture Difference DONA • Name given to packet is a cryptographic hash of publisher’s key and label. • DNS type table required for resolution of user familiar name to digest based. • Flat Namespace. • Content must be first registered with RHs. CCN • Name given is not a cryptographic digest of anything. • User friendly, structured, location independent names. • Hierarchical Namespace. • Content generated dynamically in response to queries. 17
  • 18. Concerns • Names based on digest vs. user friendly, structured names. • Hierarchical namespace vs. flat namespace. • Inter-domain routing feasibility. • Caching level & replacement policy at the intermediary routers. • Does it depends on the ISP? • Can we improve forward strategy? 18