skip to main content
10.1145/1658939.1658941acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Networking named content

Published: 01 December 2009 Publication History
  • Get Citation Alerts
  • Abstract

    Network use has evolved to be dominated by content distribution and retrieval, while networking technology still speaks only of connections between hosts. Accessing content and services requires mapping from the what that users care about to the network's where. We present Content-Centric Networking (CCN) which treats content as a primitive - decoupling location from identity, security and access, and retrieving content by name. Using new approaches to routing named content, derived heavily from IP, we can simultaneously achieve scalability, security and performance. We implemented our architecture's basic features and demonstrate resilience and performance with secure file downloads and VoIP calls.

    References

    [1]
    Project CCNxTM. http://www.ccnx.org, Sep. 2009.
    [2]
    M. Abadi. On SDSI's Linked Local Name Spaces. Journal of Computer Security, 6(1-2):3--21, October 1998.
    [3]
    B. Adamson, C. Bormann, M. Handley, and J. Macker. Multicast Negative-Acknowledgement (NACK) Building Blocks. IETF, November 2008. RFC 5401.
    [4]
    W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley. The Design and Implementation of an Intentional Naming System. SIGOPS Oper. Syst. Rev., 33(5):186--201, 1999.
    [5]
    A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker. Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. In SIGCOMM, 2008.
    [6]
    H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish. A Layered Naming Architecture for the Internet. In SIGCOMM, 2004.
    [7]
    M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, I. Stoica, and S. Shenker. ROFL: Routing on Flat Labels. In SIGCOMM, 2006.
    [8]
    D. Cheriton and M. Gritter. TRIAD: A New Next-Generation Internet Architecture, Jan 2000.
    [9]
    I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. Lecture Notes in Computer Science, 2009:46, 2001.
    [10]
    C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Ylonen. SPKI Certificate Theory, September 1999. RFC2693.
    [11]
    S. Farrell and V. Cahill. Delay- and Disruption-Tolerant Networking. Artech House Publishers, 2006.
    [12]
    K. Fu, M. F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. ACM Trans. Comput. Syst., 20(1):1--24, 2002.
    [13]
    J. F. Gantz et al. IDC - The Expanding Digital Universe: A Forecast of Worldwide Inform ation Growth Through 2010. Technical report, March 2007.
    [14]
    A. Gulbrandsen, P. Vixie, and L. Esibov. A DNS RR for specifying the location of services (DNS SRV). IETF - Network Working Group, The Internet Society, February 2000. RFC 2782.
    [15]
    E. Guttman, C.Perkins, J. Veizades, and M. Day. Service Location Protocol. IETF - Network Working Group, The Internet Society, June 1999. RFC 2608.
    [16]
    IETF. RFC 2328 -- OSPF Version 2.
    [17]
    IETF. RFC 3787 -- Recommendations for Interoperable IP Networks using Intermediate System to Intermediate System (IS-IS).
    [18]
    IETF. RFC 4971 -- Intermediate System to Intermediate System (IS-IS) Extensions for Advertising Router Information.
    [19]
    IETF. RFC 5250 -- The OSPF Opaque LSA Option.
    [20]
    V. Jacobson. Congestion Avoidance and Control. In SIGCOMM, 1988.
    [21]
    V. Jacobson, R. Braden, and D. Borman. TCP Extensions for High Performance. IETF - Network Working Group, The Internet Society, May 1992. RFC 1323.
    [22]
    V. Jacobson, D. K. Smetters, N. Briggs, M. Plass, P. Stewart, J. D. Thornton, and R. Braynard. VoCCN: Voice-over Content-Centric Networks. In ReArch, 2009.
    [23]
    C. Kim, M. Caeser, and J. Rexford. Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises. In SIGCOMM, 2008.
    [24]
    T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica. A Data-Oriented (and Beyond) Network Architecture. In SIGCOMM, 2007.
    [25]
    J. Kubiatowicz et al. OceanStore: An architecture for global-scale persistent storage. SIGPLAN Not., 35(11):190--201, 2000.
    [26]
    D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating Key Management from File System Security. In SOSP, 1999.
    [27]
    R. C. Merkle. Secrecy, authentication, and public key systems. PhD thesis, 1979.
    [28]
    R. Moskowitz and P. Nikander. Host Identity Protocol Architecture. IETF - Network Working Group, May 2006. RFC 4423.
    [29]
    B. Ohlman et al. First NetInf architecture description, April 2009. http://www.4ward-project.eu/index.php?s=file_download&id=39.
    [30]
    E. Osterweil, D. Massey, B. Tsendjav, B. Zhang, and L. Zhang. Security Through Publicity. In HOTSEC, 2006.
    [31]
    B. C. Popescu, M. van Steen, B. Crispo, A. S. Tanenbaum, J. Sacha, and I. Kuz. Securely replicated web documents. In IPDPS, 2005.
    [32]
    R. L. Rivest and B. Lampson. SDSI - A Simple Distributed Security Infrastructure. Technical report, MIT, 1996.
    [33]
    M. Särelä, T. Rinta-aho, and S. Tarkoma. RTFM: Publish/Subscribe Internetworking Architecture. In ICT-MobileSummit, 2008.
    [34]
    D. K. Smetters and V. Jacobson. Securing network content, October 2009. PARC Technical Report.
    [35]
    I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet Indirection Infrastructure. In SIGCOMM, 2002.
    [36]
    I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. In SIGCOMM, 2001.
    [37]
    D. Wendlandt, D. Andersen, and A. Perrig. Perspectives: Improving SSH-style host authentication with multi-path probing. In USENIX, 2008.

    Cited By

    View all
    • (2024)CMAF: Context and Mobility-Aware Forwarding Model for V-NDNElectronics10.3390/electronics1312239413:12(2394)Online publication date: 19-Jun-2024
    • (2024)QWLCPM: A Method for QoS-Aware Forwarding and Caching Using Simple Weighted Linear Combination and Proximity for Named Data Vehicular Sensor NetworkElectronics10.3390/electronics1307118313:7(1183)Online publication date: 23-Mar-2024
    • (2024)An ICN-Based On-Path Computing Resource Scheduling Architecture with User Preference Awareness for Computing NetworkElectronics10.3390/electronics1305093313:5(933)Online publication date: 29-Feb-2024
    • Show More Cited By

    Index Terms

    1. Networking named content

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CoNEXT '09: Proceedings of the 5th international conference on Emerging networking experiments and technologies
        December 2009
        362 pages
        ISBN:9781605586366
        DOI:10.1145/1658939
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 December 2009

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. content routing
        2. content-based security
        3. content-centric networking

        Qualifiers

        • Research-article

        Conference

        Co-NEXT '09
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 198 of 789 submissions, 25%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)246
        • Downloads (Last 6 weeks)25

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)CMAF: Context and Mobility-Aware Forwarding Model for V-NDNElectronics10.3390/electronics1312239413:12(2394)Online publication date: 19-Jun-2024
        • (2024)QWLCPM: A Method for QoS-Aware Forwarding and Caching Using Simple Weighted Linear Combination and Proximity for Named Data Vehicular Sensor NetworkElectronics10.3390/electronics1307118313:7(1183)Online publication date: 23-Mar-2024
        • (2024)An ICN-Based On-Path Computing Resource Scheduling Architecture with User Preference Awareness for Computing NetworkElectronics10.3390/electronics1305093313:5(933)Online publication date: 29-Feb-2024
        • (2024)Efficient V2V Communications by Clustering-Based Collaborative CachingElectronics10.3390/electronics1305088313:5(883)Online publication date: 25-Feb-2024
        • (2024)A Link Status-Based Multipath Scheduling Scheme on Network NodesElectronics10.3390/electronics1303060813:3(608)Online publication date: 1-Feb-2024
        • (2024)[Paper] A Cache Decision Policy for QoE Enhancement of Video and Audio Transmission over ICN/CCNITE Transactions on Media Technology and Applications10.3169/mta.12.14312:1(143-152)Online publication date: 2024
        • (2024)Location Based Data-Centric Forwarding for Mobile Ad-Hoc Networks2024 26th International Conference on Advanced Communications Technology (ICACT)10.23919/ICACT60172.2024.10471959(01-04)Online publication date: 4-Feb-2024
        • (2024)Information-Centric Function Chaining for ICN-Based In-Network Computing in the Beyond 5G/6G EraIEICE Transactions on Communications10.1587/transcom.2023WWP0005E107.B:1(94-104)Online publication date: 1-Jan-2024
        • (2024)D2EcoSys: Decentralized Digital Twin EcoSystem Empower Co-Creation City-Level Digital TwinsIEICE Transactions on Communications10.1587/transcom.2023WWI0001E107.B:1(50-62)Online publication date: 1-Jan-2024
        • (2024)Content Search Method Utilizing the Metadata Matching Characteristics of Both Spatio-Temporal Content and User Request in the IoT EraIEICE Transactions on Communications10.1587/transcom.2023EBP3060E107.B:1(163-172)Online publication date: 1-Jan-2024
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media