[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1658939.1658941acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Networking named content

Published: 01 December 2009 Publication History

Abstract

Network use has evolved to be dominated by content distribution and retrieval, while networking technology still speaks only of connections between hosts. Accessing content and services requires mapping from the what that users care about to the network's where. We present Content-Centric Networking (CCN) which treats content as a primitive - decoupling location from identity, security and access, and retrieving content by name. Using new approaches to routing named content, derived heavily from IP, we can simultaneously achieve scalability, security and performance. We implemented our architecture's basic features and demonstrate resilience and performance with secure file downloads and VoIP calls.

References

[1]
Project CCNxTM. http://www.ccnx.org, Sep. 2009.
[2]
M. Abadi. On SDSI's Linked Local Name Spaces. Journal of Computer Security, 6(1-2):3--21, October 1998.
[3]
B. Adamson, C. Bormann, M. Handley, and J. Macker. Multicast Negative-Acknowledgement (NACK) Building Blocks. IETF, November 2008. RFC 5401.
[4]
W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley. The Design and Implementation of an Intentional Naming System. SIGOPS Oper. Syst. Rev., 33(5):186--201, 1999.
[5]
A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker. Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. In SIGCOMM, 2008.
[6]
H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish. A Layered Naming Architecture for the Internet. In SIGCOMM, 2004.
[7]
M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, I. Stoica, and S. Shenker. ROFL: Routing on Flat Labels. In SIGCOMM, 2006.
[8]
D. Cheriton and M. Gritter. TRIAD: A New Next-Generation Internet Architecture, Jan 2000.
[9]
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. Lecture Notes in Computer Science, 2009:46, 2001.
[10]
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Ylonen. SPKI Certificate Theory, September 1999. RFC2693.
[11]
S. Farrell and V. Cahill. Delay- and Disruption-Tolerant Networking. Artech House Publishers, 2006.
[12]
K. Fu, M. F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. ACM Trans. Comput. Syst., 20(1):1--24, 2002.
[13]
J. F. Gantz et al. IDC - The Expanding Digital Universe: A Forecast of Worldwide Inform ation Growth Through 2010. Technical report, March 2007.
[14]
A. Gulbrandsen, P. Vixie, and L. Esibov. A DNS RR for specifying the location of services (DNS SRV). IETF - Network Working Group, The Internet Society, February 2000. RFC 2782.
[15]
E. Guttman, C.Perkins, J. Veizades, and M. Day. Service Location Protocol. IETF - Network Working Group, The Internet Society, June 1999. RFC 2608.
[16]
IETF. RFC 2328 -- OSPF Version 2.
[17]
IETF. RFC 3787 -- Recommendations for Interoperable IP Networks using Intermediate System to Intermediate System (IS-IS).
[18]
IETF. RFC 4971 -- Intermediate System to Intermediate System (IS-IS) Extensions for Advertising Router Information.
[19]
IETF. RFC 5250 -- The OSPF Opaque LSA Option.
[20]
V. Jacobson. Congestion Avoidance and Control. In SIGCOMM, 1988.
[21]
V. Jacobson, R. Braden, and D. Borman. TCP Extensions for High Performance. IETF - Network Working Group, The Internet Society, May 1992. RFC 1323.
[22]
V. Jacobson, D. K. Smetters, N. Briggs, M. Plass, P. Stewart, J. D. Thornton, and R. Braynard. VoCCN: Voice-over Content-Centric Networks. In ReArch, 2009.
[23]
C. Kim, M. Caeser, and J. Rexford. Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises. In SIGCOMM, 2008.
[24]
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica. A Data-Oriented (and Beyond) Network Architecture. In SIGCOMM, 2007.
[25]
J. Kubiatowicz et al. OceanStore: An architecture for global-scale persistent storage. SIGPLAN Not., 35(11):190--201, 2000.
[26]
D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating Key Management from File System Security. In SOSP, 1999.
[27]
R. C. Merkle. Secrecy, authentication, and public key systems. PhD thesis, 1979.
[28]
R. Moskowitz and P. Nikander. Host Identity Protocol Architecture. IETF - Network Working Group, May 2006. RFC 4423.
[29]
B. Ohlman et al. First NetInf architecture description, April 2009. http://www.4ward-project.eu/index.php?s=file_download&id=39.
[30]
E. Osterweil, D. Massey, B. Tsendjav, B. Zhang, and L. Zhang. Security Through Publicity. In HOTSEC, 2006.
[31]
B. C. Popescu, M. van Steen, B. Crispo, A. S. Tanenbaum, J. Sacha, and I. Kuz. Securely replicated web documents. In IPDPS, 2005.
[32]
R. L. Rivest and B. Lampson. SDSI - A Simple Distributed Security Infrastructure. Technical report, MIT, 1996.
[33]
M. Särelä, T. Rinta-aho, and S. Tarkoma. RTFM: Publish/Subscribe Internetworking Architecture. In ICT-MobileSummit, 2008.
[34]
D. K. Smetters and V. Jacobson. Securing network content, October 2009. PARC Technical Report.
[35]
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet Indirection Infrastructure. In SIGCOMM, 2002.
[36]
I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. In SIGCOMM, 2001.
[37]
D. Wendlandt, D. Andersen, and A. Perrig. Perspectives: Improving SSH-style host authentication with multi-path probing. In USENIX, 2008.

Cited By

View all
  • (2025)QM-ARC: QoS-aware Multi-tier Adaptive Cache Replacement StrategyFuture Generation Computer Systems10.1016/j.future.2024.107548163(107548)Online publication date: Feb-2025
  • (2025)JamBIT: RL-based framework for disrupting adversarial information in battlefieldsAd Hoc Networks10.1016/j.adhoc.2024.103697167(103697)Online publication date: Feb-2025
  • (2024)RMBCC: A Replica Migration-Based Cooperative Caching Scheme for Information-Centric NetworksElectronics10.3390/electronics1313263613:13(2636)Online publication date: 4-Jul-2024
  • Show More Cited By

Index Terms

  1. Networking named content

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CoNEXT '09: Proceedings of the 5th international conference on Emerging networking experiments and technologies
      December 2009
      362 pages
      ISBN:9781605586366
      DOI:10.1145/1658939
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 December 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. content routing
      2. content-based security
      3. content-centric networking

      Qualifiers

      • Research-article

      Conference

      Co-NEXT '09
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 198 of 789 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)262
      • Downloads (Last 6 weeks)42
      Reflects downloads up to 10 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)QM-ARC: QoS-aware Multi-tier Adaptive Cache Replacement StrategyFuture Generation Computer Systems10.1016/j.future.2024.107548163(107548)Online publication date: Feb-2025
      • (2025)JamBIT: RL-based framework for disrupting adversarial information in battlefieldsAd Hoc Networks10.1016/j.adhoc.2024.103697167(103697)Online publication date: Feb-2025
      • (2024)RMBCC: A Replica Migration-Based Cooperative Caching Scheme for Information-Centric NetworksElectronics10.3390/electronics1313263613:13(2636)Online publication date: 4-Jul-2024
      • (2024)CMAF: Context and Mobility-Aware Forwarding Model for V-NDNElectronics10.3390/electronics1312239413:12(2394)Online publication date: 19-Jun-2024
      • (2024)QWLCPM: A Method for QoS-Aware Forwarding and Caching Using Simple Weighted Linear Combination and Proximity for Named Data Vehicular Sensor NetworkElectronics10.3390/electronics1307118313:7(1183)Online publication date: 23-Mar-2024
      • (2024)An ICN-Based On-Path Computing Resource Scheduling Architecture with User Preference Awareness for Computing NetworkElectronics10.3390/electronics1305093313:5(933)Online publication date: 29-Feb-2024
      • (2024)Efficient V2V Communications by Clustering-Based Collaborative CachingElectronics10.3390/electronics1305088313:5(883)Online publication date: 25-Feb-2024
      • (2024)A Link Status-Based Multipath Scheduling Scheme on Network NodesElectronics10.3390/electronics1303060813:3(608)Online publication date: 1-Feb-2024
      • (2024)[Paper] A Cache Decision Policy for QoE Enhancement of Video and Audio Transmission over ICN/CCNITE Transactions on Media Technology and Applications10.3169/mta.12.14312:1(143-152)Online publication date: 2024
      • (2024)Adaptability of Breadcrumbs Routing to Geographical Locality of Content Popularity in Information Centric NetworksIEICE Transactions on Communications10.23919/transcom.2024EBP3085E107-B:11(719-727)Online publication date: Nov-2024
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media