skip to main content
10.1145/1282380.1282402acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

A data-oriented (and beyond) network architecture

Published: 27 August 2007 Publication History
  • Get Citation Alerts
  • Abstract

    The Internet has evolved greatly from its original incarnation. For instance, the vast majority of current Internet usage is data retrieval and service access, whereas the architecture was designed around host-to-host applications such as telnet and ftp. Moreover, the original Internet was a purely transparent carrier of packets, but now the various network stakeholders use middleboxes to improve security and accelerate applications. To adapt to these changes, we propose the Data-Oriented Network Architecture (DONA), which involves a clean-slate redesign of Internet naming and name resolution.

    References

    [1]
    Abilene. http://abilene.internet2.edu.
    [2]
    H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish. A Layered Naming Architecture for the Internet. In Proc. of ACM SIGCOMM '04, pages 343--352, Portland, OR, USA, Aug. 2004.
    [3]
    M. Blumenthal and D. Clark. Rethinking the design of the Internet: The End-to-End arguments vs. The Brave New World. ACM TOIT, pages 70--109, 2001.
    [4]
    M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and K. van der Merwe. Design and Implementation of a Routing Control Platform. In Proc. of NSDI '05, pages 15--28, Boston, MA, USA, May 2005.
    [5]
    M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, S. Shenker, and I. Stoica. Routing on Flat Labels. In Proc. of ACM SIGCOMM '06, pages 363--374, Pisa, Italy, Sept. 2006.
    [6]
    V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss. Delay Tolerant Networking Architecture. Internet Draft, IETF, Dec. 2006.
    [7]
    D. Clark and D. Tennenhouse. Architectural Consideration for a New Generation of Protocols. In Proc. of ACM SIGCOMM '90, pages 200--208, Philadelphia, USA, 1990.
    [8]
    D. D. Clark. Interoperation, Open Interfaces, and Protocol Architecture. The Unpredictable Certainty, Information Infrastructure Through 2000: White Papers, pages 133--144, 1997.
    [9]
    C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylönen. SPKI Certificate Theory. RFC 2693, IETF, Sept. 1999.
    [10]
    End-Middle-End Research Group. http://www.irtf.org/charter?gtype=rg&group=eme.
    [11]
    P. T. Eugster, P. A. Felber, R. Guerraoui, and A. -M. Kermarrec. The Many Faces of Publish/Subscribe. ACM Computing Surveys, 35(2):114--131, June 2003.
    [12]
    K. Fall. A Delay-Tolerant Network Architecture for Challenged Internets. In Proc. of ACM SIGCOMM '03, pages 27--34, Karlsruhe, Germany, 2003.
    [13]
    R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext Transfer Protocol: HTTP/1.1. RFC 2616, IETF, June 1999.
    [14]
    B. Ford, J. Strauss, C. Lesniewski-Laas, S. Rhea, F. Kaashoek, and R. Morris. Persistent Personal Names for Globally Connected Mobile Devices. In Proc. of OSDI 2006, pages 233--248, Seattle, WA, USA, Nov. 2006.
    [15]
    P. Francis and R. Gummadi. IPNL: A NAT-extended Internet Architecture. In Proc. of ACM SIGCOMM '01, pages 69--80, San Diego, CA, USA, Aug. 2001.
    [16]
    M. J. Freedman, K. Lakshminarayanan, and D. Mazières. OASIS: Anycast for Any Service. In Proc. of NSDI '06, pages 129--142, San Jose, CA, USA, May 2006.
    [17]
    D. Funato, K. Yasuda, and H. Tokuda. TCP-R: TCP Mobility Support for Continuous Operation. In Proc. of ICNP '97, pages 229--236, Atlanta, GA, USA, 1997.
    [18]
    GEANT2. http://www.geant2.net.
    [19]
    M. Gritter and D. R. Cheriton. TRIAD: A New Next-Generation Internet Architecture. http://www-dsg.stanford.edu/triad/, July 2000.
    [20]
    S. Guha and P. Francis. An End-Middle-End Architecture for Secure Internet. In Proc. of ACM SIGCOMM '07, Kyoto, Japan, Aug. 2007.
    [21]
    A. Gulli and A. Signorini. The Indexable Web Is More Than 11.5 Billion Pages. In Special Interest Tracks and Posters of The 14th International Conference on World Wide Web, WWW '05, pages 902--903, Chiba, Japan, 2005.
    [22]
    M. Handley and A. Greenhalgh. Steps Towards a DoS-resistant Internet Architecture. In Proc. of ACM SIGCOMM FDNA '04, pages 49--56, Portland, OR, USA, Aug. 2004.
    [23]
    D. V. Krioukov, K. R. Fall, and X. Yang. Compact Routing on Internet-like Graphs. In Proc. of IEEE INFOCOM, Hong Kong, Mar. 2004.
    [24]
    J. Li, M. N. Krohn, D. Mazières, and D. Shasha. Secure Untrusted Data Repository (SUNDR). In Proc. of OSDI 2004, pages 121--136, San Francisco, CA, USA, Dec. 2004.
    [25]
    D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating Key Management from File System Security. In Proc. of SOSP '99, pages 124--139, Charleston, SC, USA, Dec. 1999.
    [26]
    Measurement Factory. Public Benchmarking Results. http://www.measurement-factory.com/results, Dec. 2001.
    [27]
    D. Meyer, L. Zhang, and K. Fall. Report from the IAB Workshop on Routing and Addressing. Internet Draft, IETF, Dec. 2006.
    [28]
    R. Moskowitz and P. Nikander. Host Identity Protocol Architecture. RFC 4423, IETF, May 2006.
    [29]
    A. Nandi, A. Ganjam, P. Druschel, T. Eugene, I. Stoica, H. Zhang, and B. Bhattacharjee. SAAR: A Shared Control Plane for Overlay Multicast. In Proc. of NSDI '07, pages 57--72, Cambridge, MA, USA, Apr. 2007.
    [30]
    T. Okamoto and J. Stern. Almost Uniform Density of Power Residues and the Provable Security of ESIGN. In ASIACRYPT, volume 2894 of LNCS, pages 287--301, Dec. 2003.
    [31]
    J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, and E. Schooler. SIP: Session Initiation Protocol. RFC 3261, IETF, June 2002.
    [32]
    M. A. C. Snoeren. A Session-based Architecture for Internet Mobility. PhD thesis, MIT, Department of Electrical Engineering and Computer Science, Feb. 2003.
    [33]
    R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson. Stream Control Transmission Protocol. RFC 2960, IETF, Oct. 2000.
    [34]
    J. Su, J. Scott, P. Hui, E. Upton, M. H. Lim, C. Diot, J. Crowcroft, A. Goel, and E. de Lara. Haggle: Clean-slate Networking for Mobile Devices. Technical Report UCAM-CL-TR-680, University of Cambridge, Computer Laboratory, Jan. 2007.
    [35]
    Sun Microsystems. Project Blackbox. http://www.sun.com/blackbox/, Jan. 2007.
    [36]
    N. Tolia, M. Kaminsky, D. G. Andersen, and S. Patil. An Architecture for Internet Data Transfer. In Proc. of NSDI '06, pages 253--266, San Jose, CA, USA, May 2006.
    [37]
    M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In Proc. of NSDI '04, pages 225--238, San Francisco, CA, USA, Mar. 2004.
    [38]
    M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker. Middleboxes No Longer Considered Harmful. In Proc. of OSDI 2004, pages 215--230, San Francisco, CA, USA, Dec. 2004.
    [39]
    M. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker. Distributed Quota Enforcement for Spam Control. In Proc. of NSDI '06, pages 281--296, San Jose, CA, USA, May 2006.
    [40]
    D. Wendlandt, I. Avramopoulos, D. G. Andersen, and J. Rexford. Don't Secure Routing Protocols, Secure Data Delivery. In Proc. of Hot Topics in Networks, Irvine, CA, USA, Nov. 2006.
    [41]
    A. Yaar, A. Perrig, and D. Song. SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. In Proc. of IEEE Symposium on Security and Privacy, pages 130--143, Oakland, CA, USA, 2004.
    [42]
    X. Yang, D. Clark, and A. Berger. NIRA: A New Inter-Domain Routing Architecture. IEEE/ACM Transactions on Networking (to appear), Dec. 2007.
    [43]
    X. Yang, D. Wetherall, and T. Anderson. A DoS-limiting Network Architecture. In Proc. of ACM SIGCOMM '05, pages 241--252, 2005.

    Cited By

    View all
    • (2024)An ICN-Based On-Path Computing Resource Scheduling Architecture with User Preference Awareness for Computing NetworkElectronics10.3390/electronics1305093313:5(933)Online publication date: 29-Feb-2024
    • (2024)A Recommendation-Based Auxiliary Caching for Mapping RecordIEICE Transactions on Communications10.23919/transcom.2023EBP3117E107-B:2(286-295)Online publication date: Feb-2024
    • (2024)DINNRS: A Distributed In-Network Name Resolution System for information-centric networksComputer Communications10.1016/j.comcom.2023.11.008213(188-198)Online publication date: Jan-2024
    • Show More Cited By

    Index Terms

    1. A data-oriented (and beyond) network architecture

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
          August 2007
          432 pages
          ISBN:9781595937131
          DOI:10.1145/1282380
          • cover image ACM SIGCOMM Computer Communication Review
            ACM SIGCOMM Computer Communication Review  Volume 37, Issue 4
            October 2007
            420 pages
            ISSN:0146-4833
            DOI:10.1145/1282427
            Issue’s Table of Contents
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 27 August 2007

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. data
          2. internet architecture
          3. middleboxes
          4. name resolution
          5. naming

          Qualifiers

          • Article

          Conference

          SIGCOMM07
          Sponsor:
          SIGCOMM07: ACM SIGCOMM 2007 Conference
          August 27 - 31, 2007
          Kyoto, Japan

          Acceptance Rates

          Overall Acceptance Rate 554 of 3,547 submissions, 16%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)364
          • Downloads (Last 6 weeks)54

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)An ICN-Based On-Path Computing Resource Scheduling Architecture with User Preference Awareness for Computing NetworkElectronics10.3390/electronics1305093313:5(933)Online publication date: 29-Feb-2024
          • (2024)A Recommendation-Based Auxiliary Caching for Mapping RecordIEICE Transactions on Communications10.23919/transcom.2023EBP3117E107-B:2(286-295)Online publication date: Feb-2024
          • (2024)DINNRS: A Distributed In-Network Name Resolution System for information-centric networksComputer Communications10.1016/j.comcom.2023.11.008213(188-198)Online publication date: Jan-2024
          • (2024)Flexible fingerprint cuckoo filter for information retrieval optimization in distributed networkDistributed and Parallel Databases10.1007/s10619-024-07440-wOnline publication date: 11-Apr-2024
          • (2024)Enabling a Sustainable and Inclusive Digital Future with Proactive Producer Mobility Management Mechanism in Named Data NetworkingComputing and Informatics10.1007/978-981-99-9589-9_26(343-354)Online publication date: 26-Jan-2024
          • (2024)Assessment of a Semi-supervised Machine Learning Method for Thwarting Network DDoS AssaultsEvolution in Signal Processing and Telecommunication Networks10.1007/978-981-97-0644-0_28(307-318)Online publication date: 23-Apr-2024
          • (2023)Enhancing Cache Robustness in Information-Centric Networks: Per-Face Popularity ApproachesNetwork10.3390/network30400223:4(502-521)Online publication date: 1-Nov-2023
          • (2023)ICN-Based Enhanced Content Delivery for CDNFuture Internet10.3390/fi1512039015:12(390)Online publication date: 30-Nov-2023
          • (2023)NDN-BDA: A Blockchain-Based Decentralized Data Authentication Mechanism for Vehicular Named Data NetworkingFuture Internet10.3390/fi1505016715:5(167)Online publication date: 29-Apr-2023
          • (2023)A Replica-Selection Algorithm Based on Transmission Completion Time Estimation in ICNFuture Internet10.3390/fi1504012015:4(120)Online publication date: 25-Mar-2023
          • Show More Cited By

          View Options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media