Functional Chaining System in ICN
Phil Brown
Fujitsu Laboratories of America, Inc.
December 7, 2016
2
Functional Chaining demo setup
3
Routing optimization
4
In-network caching
5
Whole-chain security
Content
stack
Signature
stack
/video_compression/…  /video_combination/..  /video_clips/....
Content 3 (compressed video)
Content 2 (hash of combined video & header)
Content 1 (multiple hashes of raw video clips & header )
Signature 3 /video/compression/key/3
Signature 2 /video/combiner/key/2
Signature 1 (including multiple signatures and keys)
/user/Alex/key/1 /user/Bob/key/1 /user/Charlie/key/1
6
Path Search-Similar users
optimal vs edge caching
limited link capacity 𝑐 𝑖
𝜆𝐵
=.8,
𝑐 𝑠
𝜆𝐵𝑅
=.6
For small α more storage at core is
optimum, so the cost reduction
improvement comparing to only edge
caching is bigger (20-30%)
7
Background
Differences with NFN
(Named Function Networking)
8
NFN processing procedure
 NFN uses a 3-phase strategy, i.e., upstream fetch, separate code and data
fetch, and computation push, to process a functional chaining request
9
NFN
NDN Router NDN Router
NDN Router NDN Router
NFN-capable
Router
Interest (|data|h|g) Interest (|data|h|g) Interest (data)
Interest(g)
 Assume we have a chain of function applications f(g(h(data))): NFN encodes it
as |data|h|g|f
 Phase 2 of NFN (separate code and data fetch): An Interest is firstly forwarded
to an NFN-capable router, which can divide the Interest to fetch multiple data
and functions (codes). After that, data can be processed at the NFN-capable
router and returned back to the consumer.
Data
Function h
Function g
Data (data)
Data(g)
Data (|data|h|g)Data (|data|h|g)
10
Summary
 Differences
 Naming
 Interest & Data processing procedure
 Functional chaining forwarding strategy
 Whole chain security

More Related Content

PDF
ITU-T Study Group 20 Introduction
 
PDF
Consideration of fixed mobile convergence in 5G
 
PPTX
5G End to-end network slicing Demo
 
PDF
Implementing ITU-T International Standards to Shape Smart Sustainable Cities
 
PDF
Payment System Oversight and Interoperability
 
PDF
NGFI (Next Generation Fronthaul Interface) native RoE (Radio over Ethernet)
 
PDF
Using ICN to simplify data delivery, mobility management and secure transmission
 
PDF
ITU-T Study Group 13 Introduction
 
ITU-T Study Group 20 Introduction
 
Consideration of fixed mobile convergence in 5G
 
5G End to-end network slicing Demo
 
Implementing ITU-T International Standards to Shape Smart Sustainable Cities
 
Payment System Oversight and Interoperability
 
NGFI (Next Generation Fronthaul Interface) native RoE (Radio over Ethernet)
 
Using ICN to simplify data delivery, mobility management and secure transmission
 
ITU-T Study Group 13 Introduction
 

Viewers also liked (18)

PDF
Connected automated cars
 
PDF
Cybersecurity for automated driving
 
PDF
AI and Automated Driving : An Ethically Aligned Design
 
PDF
ITU-T Study Group 2 Introduction
 
PDF
System Transformation
 
PDF
Satellite network for automated driving
 
PDF
Regulatory & Legal Aspects of Distributed Ledger Technology
 
PDF
Technologies for future mobile transport networks
 
PDF
ITU-T Study Group 15 Introduction
 
PDF
Understanding Blockchain Security
 
PDF
ITU-T Study Group 17 Introduction
 
PDF
5G and Automative : Cellular V2X (vehicle-to-everything)
 
PPTX
ITU-T Study Group 16 Meeting Achievements
 
PDF
High Quality 360 Video Rendering and Streaming
 
PDF
Emerging 8K services and their applications towards 2020
 
PDF
EBU's report on DVB and VR
 
PDF
Immersive Telepresence
 
PDF
MPEG Immersive Media
 
Connected automated cars
 
Cybersecurity for automated driving
 
AI and Automated Driving : An Ethically Aligned Design
 
ITU-T Study Group 2 Introduction
 
System Transformation
 
Satellite network for automated driving
 
Regulatory & Legal Aspects of Distributed Ledger Technology
 
Technologies for future mobile transport networks
 
ITU-T Study Group 15 Introduction
 
Understanding Blockchain Security
 
ITU-T Study Group 17 Introduction
 
5G and Automative : Cellular V2X (vehicle-to-everything)
 
ITU-T Study Group 16 Meeting Achievements
 
High Quality 360 Video Rendering and Streaming
 
Emerging 8K services and their applications towards 2020
 
EBU's report on DVB and VR
 
Immersive Telepresence
 
MPEG Immersive Media
 
Ad

Similar to Using ICN to meet the IMT-2020 goals (20)

PDF
MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKING
PDF
Named data networking. Basic Principle
PDF
Content centric networks
PDF
Content centric networks
PPTX
Content centric networking
PPTX
Content-Centric Networking (CCN)
PDF
OPNFV Service Function Chaining
PPT
Caching in Information Centric Network (ICN)
PDF
Approaching Content Delivery in Software Defined Networking
PPTX
Virtual migration cloud
PPTX
UNIT-III STORAGE Networking Technologies .PPT
PPTX
Fault tolerance in Information Centric Networks
PPT
Named Data Networking Operational Aspects - IoT as a Use-case
PPTX
Information Centric Networking and Content Addressability
PDF
Unleash the power of functional chains with Capella 1.3.1
PDF
A New Efficient Cache Replacement Strategy for Named Data Networking
PDF
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
PDF
HydraICN : Scalable Content Exchange in Challenged ICNs
PPTX
HydraICN : Scalable Content Exchange in Challenged ICNs
PDF
Conference Paper: Towards High Performance Packet Processing for 5G
MEMORY EFFICIENT FORWARDING INFORMATION BASE FOR CONTENT-CENTRIC NETWORKING
Named data networking. Basic Principle
Content centric networks
Content centric networks
Content centric networking
Content-Centric Networking (CCN)
OPNFV Service Function Chaining
Caching in Information Centric Network (ICN)
Approaching Content Delivery in Software Defined Networking
Virtual migration cloud
UNIT-III STORAGE Networking Technologies .PPT
Fault tolerance in Information Centric Networks
Named Data Networking Operational Aspects - IoT as a Use-case
Information Centric Networking and Content Addressability
Unleash the power of functional chains with Capella 1.3.1
A New Efficient Cache Replacement Strategy for Named Data Networking
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
HydraICN : Scalable Content Exchange in Challenged ICNs
HydraICN : Scalable Content Exchange in Challenged ICNs
Conference Paper: Towards High Performance Packet Processing for 5G
Ad

More from ITU (20)

PDF
Do we need a wakeup call to keep driver-less cars protected?
 
PDF
Global Virtual Mobile Network for Car manufacturers
 
PDF
Coordination of Threat Analysis in ICT Ecosystems
 
PDF
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
PDF
Trustworthy networking and technical considerations for 5G
 
PDF
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
 
PDF
Connected Cars & 5G
 
PDF
5G for Connected and Automated Driving
 
PDF
Securing the future of Automotive
 
PDF
The Connected Vehicle - Challenges and Opportunities.
 
PDF
Machine learning for decentralized and flying radio devices
 
PDF
AI and machine learning
 
PDF
Machine learning for 5G and beyond
 
PDF
Efficient Deep Learning in Communications
 
PDF
AI for Good Global Summit - 2017 Report
 
PDF
Standardization of XDSL and MGfast in ITU-T SG15
 
PPTX
One World One Global Sim
 
PPTX
ICTs, LDCs and the SDGs
 
PDF
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
PDF
Enhancing innovation and participation in smart sustainable cities
 
Do we need a wakeup call to keep driver-less cars protected?
 
Global Virtual Mobile Network for Car manufacturers
 
Coordination of Threat Analysis in ICT Ecosystems
 
Learning from the past: Systematization for Attacks and Countermeasures on Mo...
 
Trustworthy networking and technical considerations for 5G
 
The role of Bicycles and E-Bikes in the future development of Intelligent Tra...
 
Connected Cars & 5G
 
5G for Connected and Automated Driving
 
Securing the future of Automotive
 
The Connected Vehicle - Challenges and Opportunities.
 
Machine learning for decentralized and flying radio devices
 
AI and machine learning
 
Machine learning for 5G and beyond
 
Efficient Deep Learning in Communications
 
AI for Good Global Summit - 2017 Report
 
Standardization of XDSL and MGfast in ITU-T SG15
 
One World One Global Sim
 
ICTs, LDCs and the SDGs
 
Collection Methodology for Key Performance Indicators for Smart Sustainable C...
 
Enhancing innovation and participation in smart sustainable cities
 

Recently uploaded (20)

PPT
What is a Computer? Input Devices /output devices
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Modernising the Digital Integration Hub
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
The various Industrial Revolutions .pptx
PPTX
Configure Apache Mutual Authentication
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PDF
CloudStack 4.21: First Look Webinar slides
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
STKI Israel Market Study 2025 version august
What is a Computer? Input Devices /output devices
Developing a website for English-speaking practice to English as a foreign la...
Modernising the Digital Integration Hub
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Convolutional neural network based encoder-decoder for efficient real-time ob...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
The various Industrial Revolutions .pptx
Configure Apache Mutual Authentication
A proposed approach for plagiarism detection in Myanmar Unicode text
Flame analysis and combustion estimation using large language and vision assi...
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
CloudStack 4.21: First Look Webinar slides
Module 1.ppt Iot fundamentals and Architecture
Getting started with AI Agents and Multi-Agent Systems
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
The influence of sentiment analysis in enhancing early warning system model f...
STKI Israel Market Study 2025 version august

Using ICN to meet the IMT-2020 goals

  • 1. Functional Chaining System in ICN Phil Brown Fujitsu Laboratories of America, Inc. December 7, 2016
  • 5. 5 Whole-chain security Content stack Signature stack /video_compression/…  /video_combination/..  /video_clips/.... Content 3 (compressed video) Content 2 (hash of combined video & header) Content 1 (multiple hashes of raw video clips & header ) Signature 3 /video/compression/key/3 Signature 2 /video/combiner/key/2 Signature 1 (including multiple signatures and keys) /user/Alex/key/1 /user/Bob/key/1 /user/Charlie/key/1
  • 6. 6 Path Search-Similar users optimal vs edge caching limited link capacity 𝑐 𝑖 𝜆𝐵 =.8, 𝑐 𝑠 𝜆𝐵𝑅 =.6 For small α more storage at core is optimum, so the cost reduction improvement comparing to only edge caching is bigger (20-30%)
  • 8. 8 NFN processing procedure  NFN uses a 3-phase strategy, i.e., upstream fetch, separate code and data fetch, and computation push, to process a functional chaining request
  • 9. 9 NFN NDN Router NDN Router NDN Router NDN Router NFN-capable Router Interest (|data|h|g) Interest (|data|h|g) Interest (data) Interest(g)  Assume we have a chain of function applications f(g(h(data))): NFN encodes it as |data|h|g|f  Phase 2 of NFN (separate code and data fetch): An Interest is firstly forwarded to an NFN-capable router, which can divide the Interest to fetch multiple data and functions (codes). After that, data can be processed at the NFN-capable router and returned back to the consumer. Data Function h Function g Data (data) Data(g) Data (|data|h|g)Data (|data|h|g)
  • 10. 10 Summary  Differences  Naming  Interest & Data processing procedure  Functional chaining forwarding strategy  Whole chain security