RM Project
RM Project
Internet Architecture
Abstract -- Recently networks are thought as a addresses. One is designated for source or sending
source of communication between people. With the node, which represents the identification and address
passage of time use of network has further evolved, to of source node. And other is designated for
share documents, files and various other adept things
destination node, which will represent the
between two or multiple users. Up till this network
identification and address of destination node. IP is
technology only speaks about connections between hosts.
But now, network use is evolved and dominated by
only for the identification of source and destination
content distribution and retrieval. People are more node, and all the remaining communication between
concerned with content despite of location of content. nodes is done through TCP (Transmission Control
User’s philosophy and thinking is evolved for mapping Protocol) [3].
from where (user requirement) to what (traditional
network concern). We present Content Centric By the creation and validation of packet
Networking (CCN), which caters latest requirements and networking, the cost of computers and the
thinking of users. This approach treats content as a equipments associated with it begins to reduce
primitive, and decouples location from its identity. User continuously with the passage of time. The storage
now access content by its name despite of its location. spaces to store the data becomes cheap. Internet is all
Key Words: Networks, Communication, Content, Content
concerned with sharing of data through establishing
Centric Networking connection with existing nodes on the network. Thus,
it became very easy and cost effective to store large
I- INTRODUCTION amount of data available to share with other nodes
present over network. It gives the gateway and plays
Today’s Internet principles and architecture was vital role to access large amount of new content –
engineered and created in the 1960s and 70s [1]. The 500 exabytes created in 2008 alone [4]. People are
encouraging factor for development of this traditional more concerned with the nature of data or what
networks at that time was resource sharing. Sharing content, but communication is still in terms of where.
of expensive and rare devices like card readers or
high speed tape drivers or even super computers. The The simplest and easiest way to solve this
underlay communication model developed after these problem is to replace where with what. Host to host
initial concerns was strict communication model communication for exchanging data was the
between exactly two machines. One machine asking traditional consideration considered in 1960s and 70s.
to use the resources and other is giving access to it. We argue that named data is the better abstraction for
So the first Internet Protocol TCP/IP was made to today’s communication problems then named hosts.
fulfill initial requirements of the users and giving In early times people are more concerned with the
them way to communicate with one another [2]. communication of devices or hosts, so they named
Primarily, keeping in view the first requirement of the hosts or devices. Today people are more
communication between two machines or hosts, IP concerned with the communication of content despite
(Internet Protocol) packet has two identifiers or of their location, so it is better and effective to name
the content despite of their location or carrying node. thing eliminates various host relevant threats and
We present the Content Centric Networking (CCN), a vulnerabilities as faced in IP Networking.
communication architecture fabricated on named
data. We describe the architecture and operation
of CCN in section 2, Future Work is shown in section
The comparison between IP and CCN protocol is 3 and finally in section 4 we will conclude the paper.
shown in Figure 1. The layers shown in figure gives
the understanding of protocols and services offered in
their subsequent area. Most layers of both gives us
II- CCN ARCHITECTURE
same output or results but through their different
compatible protocols. The major impact is at layer 3, CCN (Content Centric Architecture) basically
the network layer. Much of IP’s success is due to has only two types of packets, “Interest Packet” and
simplicity of its IP layer called as the thin waist of “Data Packet”. All the architecture of CCN is based
stack [4]. The weakness of IP resides on layer 2 upon these two types of packets. Only these two
where it claims stateless, unreliable, unordered, best packets revolve in the whole network and fulfill the
effort delivery. The major distinction between IP and requirements of both the users and network. These
CCN is that, IP at layer 2 only can reside on TCP. It packets are responsible of satisfying the operability
is tightly coupled with TCP. But on other hand CCN and efficiency of network. The whole CCN model is
can be layered over anything, including IP itself. consumer or receiver dependent. The communication
in the CCN is totally dependent upon the consumer or
receiver. Consumer of information or data is the only
entity in the whole network to kick starts the
operability of CCN. Consumer of information or data
basically shows his willingness for any data or
information. His willingness is transformed in his
interest in the form of Interest Packet. Interest Packet
shown in figure 2, basically consists of information
of required data and also information about
consumer. Consumer simply broadcasts the Interest
Packet at its all connected links or hosts to get the
copy of data. If the receiving nodes have latest copy
of required data then they will consume the received
interest packet and reply the required data packet [5].
In other condition, if they do not have the updated
Figure 1. IP and CCN Comparison
copy of required data or information. Then they will
CCN outruns IP in many critical ways. The simply broadcast the received Interest Packet to their
introduction of Strategy Layer and Security Layer in connected or immediate links or hosts to get the copy
protocol stack gives great dominance to CCN. The of data or information. Same procedure and
strategy layer enables the CCN to take maximum philosophy will be done at next nodes. The procedure
advantage of multiple simultaneous connectivities. will be repeated till the successful response of data.
Strategy layer makes the CCN to communicate either The data packet will follow the same path, the
at Ethernet, 3G, Bluetooth or 802.11 simultaneously interest packet has followed to reach the data
at same time. This layer improves the functionality of carrying node. While its journey back towards the
CCN in terms of resource sharing and load balancing. original requesting node, the copy of data packet is
It will make the access to the Network through any cached or stored at every intermediate node. Standard
gateway simultaneously. Security Layer is also Multicast Suppression technique in which nodes
another attainment in CCN stack. It is responsible of shares the transmission over the broadcast medium is
securing content despite of Host, as done in IP. This also used in order to cater the multiple nodes
interested in same content [6].
hierarchical way. Hierarchical naming for mp3 song
can be thought as: mp3song/atif-aslam/album-
2014/ab. This interest packet will be replied as data
packet in the form of mp3 song, sung by atif aslam,
from the album released in 2014 and the song name
started with the phrase “ab”.
Forward the
The flow of data structure retrievals is also in Interest
flow chart represented in figure 4 Packet
REFRENCES
1. http://en.wikipedia.org/wiki/Computer_netw
ork
2. history of tcp/ip tiszai.tricon.hu
3. The present and the future of TCP/IP David
Espina, Dariusz Baha
4. J.F Grantz el al. IDC – The Expanding
Digital Universe: A Forecast of World Wide
Information Growth through 2010.
Technical Report, March 2007
5. Project CCNx http: //www.ccnx.org Sep
2009