49 research outputs found
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking
Information-Centric Networking (ICN) is an internetworking paradigm that
offers an alternative to the current IP\nobreakdash-based Internet
architecture. ICN's most distinguishing feature is its emphasis on information
(content) instead of communication endpoints. One important open issue in ICN
is whether negative acknowledgments (NACKs) at the network layer are useful for
notifying downstream nodes about forwarding failures, or requests for incorrect
or non-existent information. In benign settings, NACKs are beneficial for ICN
architectures, such as CCNx and NDN, since they flush state in routers and
notify consumers. In terms of security, NACKs seem useful as they can help
mitigating so-called Interest Flooding attacks. However, as we show in this
paper, network-layer NACKs also have some unpleasant security implications. We
consider several types of NACKs and discuss their security design requirements
and implications. We also demonstrate that providing secure NACKs triggers the
threat of producer-bound flooding attacks. Although we discuss some potential
countermeasures to these attacks, the main conclusion of this paper is that
network-layer NACKs are best avoided, at least for security reasons.Comment: 10 pages, 7 figure
A Light-Weight Forwarding Plane for Content-Centric Networks
We present CCN-DART, a more efficient forwarding approach for content-centric
networking (CCN) than named data networking (NDN) that substitutes Pending
Interest Tables (PIT) with Data Answer Routing Tables (DART) and uses a novel
approach to eliminate forwarding loops. The forwarding state required at each
router using CCN-DART consists of segments of the routes between consumers and
content providers that traverse a content router, rather than the Interests
that the router forwards towards content providers. Accordingly, the size of a
DART is proportional to the number of routes used by Interests traversing a
router, rather than the number of Interests traversing a router. We show that
CCN-DART avoids forwarding loops by comparing distances to name prefixes
reported by neighbors, even when routing loops exist. Results of simulation
experiments comparing CCN-DART with NDN using the ndnSIM simulation tool show
that CCN-DART incurs 10 to 20 times less storage overhead
ADN: An Information-Centric Networking Architecture for the Internet of Things
Forwarding data by name has been assumed to be a necessary aspect of an
information-centric redesign of the current Internet architecture that makes
content access, dissemination, and storage more efficient. The Named Data
Networking (NDN) and Content-Centric Networking (CCNx) architectures are the
leading examples of such an approach. However, forwarding data by name incurs
storage and communication complexities that are orders of magnitude larger than
solutions based on forwarding data using addresses. Furthermore, the specific
algorithms used in NDN and CCNx have been shown to have a number of
limitations. The Addressable Data Networking (ADN) architecture is introduced
as an alternative to NDN and CCNx. ADN is particularly attractive for
large-scale deployments of the Internet of Things (IoT), because it requires
far less storage and processing in relaying nodes than NDN. ADN allows things
and data to be denoted by names, just like NDN and CCNx do. However, instead of
replacing the waist of the Internet with named-data forwarding, ADN uses an
address-based forwarding plane and introduces an information plane that
seamlessly maps names to addresses without the involvement of end-user
applications. Simulation results illustrate the order of magnitude savings in
complexity that can be attained with ADN compared to NDN.Comment: 10 page
In-Network Retransmissions in Named Data Networking
The strategy layer is an important architectural component in both Content-Centric Networking (CCN) and Named Data Networking (NDN). This component introduces a new forwarding model that allows an application to configure its namespace with a forwarding strategy. A core mechanism in every forwarding strategy is the decision of whether to retransmit an unsatisfied Interest or to wait for an application retransmission. While some applications request control of all retransmissions, others rely on the assumption that the strategy will retransmit an Interest when it is not satisfied. Although an application can select the forwarding strategy used in the local host, it cannot guarantee the selection of the same strategy in other nodes in the network, especially in shared resource environments. In some scenarios, a developer must bind the implementation of the application to the details of the deployed forwarding strategy to guarantee the correctness of his application. In this paper we discuss the core mechanisms of a forwarding strategy in NDN, and we explore the importance and impact of in-network retransmissions on the application\u27s performance and correctness. We propose and implement a simple forwarding strategy abstraction that allows the application to decide whether a network retransmission is required, and differentiate application retransmissions from network retransmissions. We show that in some scenarios, such as multiple producers application or multipath consumer-producer service, the proposed abstraction can significantly reduce the percentage of unsatisfied Interests
Study of Reliable Data Communication in Wireless Sensor Networks
A distributed wireless sensor network consists of numerous tiny autonomous sensing nodes deployed across a wide geographical area. These sensor nodes self organize and establish radio communication links with the neighboring nodes to form multi-hop routing paths to the central base station. The dynamic and lossy nature of wireless communication poses several challenges in reliable transfer of data from the sensor nodes to the sink. There are several applications of sensor networks wherein the data collected by the sensors in the network are critical and hence have to be reliably transported to the sink. An example of such an application is sensors with RFID readers mounted on them to read tag information from the objects in a factory warehouse. Here, the tag information recorded by the RFID reader is a critical piece of information which may not be available at a later point of time and hence has to be reliably transported to the sink. We study the various issues and analyze the design choices proposed in literature in addressing the challenge of sensors-to-sink reliable data communication in such applications. A cross-layer based protocol with MAC layer retransmissions and NACK (Negative Acknowledgment) based rerouting of data packets is developed to overcome link failures and provide reliability. The protocol is implemented on TinyOS and the performance of NACK based rerouting protocol in terms of percentage successful message reception is compared with NACK based retransmission protocol by running simulations on TOSSIM. The NACK based rerouting protocol provides greater reliability under different metrics like varying network size, network traffic and percentage of failed links in the network
Application-specific reliable data transfer in wireless sensor networks
A wireless sensor network (WSN) is a collection of sensor nodes and base stations connected via wireless medium. It sends data collected from the nodes to the base stations for generating information. The size and low cost of the sensor nodes as well as the WSN\u27s ability to connect without wired links are its key advantages which enable it to be deployed in hostile or inaccessible environments at low cost. However, WSNs suffer from high data loss due to the inherent weaknesses in a wireless transmission medium, transmission problems in hostile environments due to human interference, etc. and node failures due to limited energy of sensor nodes. Hence ensuring data transfer with minimum loss i.e. reliable data transfer is very important in WSNs. The amount of loss tolerated is application dependent.
We present a reliable protocol for data transfer from a base station to sensor nodes for time-critical applications in WSNs with zero tolerance for data loss. The protocol is based on hop-by-hop detection and recovery of lost data packets, out-of-sequence forwarding of packets and delayed request for missing packets at each node with non-acknowledgement of packets at each receiving node. We present a detailed analysis of the advantages of the key features of our protocol over other alternatives. The superiority of our protocol over an established protocol PSFQ is demonstrated via extensive simulations, in terms of both the delivery time of the entire data (sent from the base station to the sensor nodes) and the number of messages exchanged in the network during this process.
In addition, we present two methods, one, for ensuring that at least one packet is delivered to a node in non-acknowledgement based systems and another, for sending reports from destination nodes to the base station respectively.
We explore different methods for further improvement of protocol performance: (1) use of effective degree of a node in determining the optimum delay for requesting data packets missing at nodes, (2) variation of the priority order for sending different types of messages at nodes and, (3) selective response to requests for packets at nodes