Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2984356.2984373acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Network Names in Content-Centric Networking

Published: 26 September 2016 Publication History
  • Get Citation Alerts
  • Abstract

    Content-centric networking (CCN) is a networking paradigm that emphasizes request-response-based data transfer. A {\em consumer} issues a request explicitly referencing desired data by name. A {\em producer} assigns a name to each data it publishes. Names are used both to identify data to and route traffic between consumers and producers. The type, format, and representation of names are fundamental to CCN. Currently, names are represented as human-readable application-layer URIs. This has several important security and performance implications for the network.
    In this paper, we propose to transparently decouple application-layer names from their network-layer counterparts. We demonstrate a mapping between the two namespaces that can be deterministically computed by consumers and producers, using application names formatted according to the standard CCN URI scheme. Meanwhile, consumers and producers can continue to use application-layer names. We detail the computation and mapping function requirements and discuss their impact on consumers, producers, and routers. Finally, we comprehensively analyze several mapping functions to show their functional equivalence to standard application names and argue that they address several issues that stem from propagating application names into the network.

    References

    [1]
    M. Mosko et al., “CCNx semantics,” IRTF Draft, Palo Alto Research Center, Inc, 2016.
    [2]
    B. Ahlgren et al., “A survey of information-centric networking,” Communications Magazine, 2012.
    [3]
    [email protected] and C. Wood, “The CCNx URI Scheme,” Internet Engineering Task Force, Internet-Draft draft-mosko-icnrg-ccnxurischeme-01, Apr. 2016, work in Progress. {Online}. Available: https://tools.ietf.org/html/draft-mosko-icnrg-ccnxurischeme-01
    [4]
    P. Mockapetris, “RFC 1035: Domain names - implementation and specification,” 1987.
    [5]
    W. So et al., “Named data networking on a router: fast and dos-resistant forwarding with hash tables,” in ANCS, 2013.
    [6]
    R. De La Briandais, “File searching using variable length keys,” in Western joint computer conference, 1959.
    [7]
    P. Brass, Advanced data structures.1em plus 0.5em minus 0.4emCambridge University Press Cambridge, 2008.
    [8]
    T. Przygienda, “RFC 3359: Reserved type, length and value (TLV) codepoints in intermediate system to intermediate system,” 2002.
    [9]
    I. Solis, [email protected], and C. Wood, “CCNx Messages in TLV Format,” Internet Engineering Task Force, Internet-Draft draft-irtf-icnrg-ccnxmessages-03, Jun. 2016, work in Progress. {Online}. Available: https://tools.ietf.org/html/draft-irtf-icnrg-ccnxmessages-03
    [10]
    “The content name collection,” http://www.icn-names.net/, accessed: April 8, 2016.
    [11]
    “CCNx distillery,” https://github.com/parc/CCNx_Distillery, accessed: May 14, 2016.
    [12]
    S. Gulley and V. Gopal, “Haswell cryptographic performance,” Intel Corporation, 2013.
    [13]
    J. Burke et al., “Secure sensing over named data networking,” in NCA, 2014.
    [14]
    A. Compagno et al., “To NACK or not to NACK? negative acknowledgments in information-centric networking,” in ICCCN, 2015.
    [15]
    “WWW FAQs: What is the maximum length of a URL?” https://boutell.com/newfaq/misc/urllength.html, accessed: April 8, 2016.
    [16]
    A. Afanasyev et al., “Interest flooding attack and countermeasures in named data networking,” in IFIP Networking, 2013.
    [17]
    A. Compagno et al., “Poseidon: Mitigating interest flooding DDoS attacks in named data networking,” in LCN, 2013.
    [18]
    M. Wählisch et al., “Backscatter from the data plane–threats to stability and security in information-centric network infrastructure,” Computer Networks, 2013.
    [19]
    C. Yi et al., “A case for stateful forwarding plane,” Computer Communications, 2013.
    [20]
    W. Quan et al., “TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking,” in IFIP Networking, 2014.
    [21]
    M. Fukushima et al., “Efficiently looking up non-aggregatable name prefixes by reducing prefix seeking,” in INFOCOM WKSHPS, 2013.
    [22]
    W. Eatherton et al., “Tree bitmap: hardware/software IP lookups with incremental updates,” ACM CCR, 2004.
    [23]
    B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,” ACM Communications, 1970.
    [24]
    W. So et al., “Named data networking on a router: forwarding at 20gbps and beyond,” in ACM CCR, 2013.
    [25]
    D. Perino et al., “Caesar: a content router for high-speed forwarding on content names,” in ANCS, 2014.
    [26]
    Y. Wang et al., “Namefilter: Achieving fast name lookup with low memory cost via applying two-stage bloom filters,” in INFOCOM, 2013.
    [27]
    S. Dharmapurikar et al., “Longest prefix matching using bloom filters,” in SIGCOMM, 2003.
    [28]
    H. Song et al., “IPv6 lookups using distributed and load balanced bloom filters for 100gbps core router line cards,” in INFOCOM, 2009.
    [29]
    T. Song et al., “Scalable name-based packet forwarding: From millions to billions,” in ICN, 2015.
    [30]
    W. Szpankowski, “Patricia tries again revisited,” JACM, 1990.
    [31]
    Y. Wang et al., “Greedy name lookup for named data networking,” in ACM SIGMETRICS, 2013.
    [32]
    ——, “Scalable name lookup in NDN using effective name component encoding,” in ICDCS, 2012.
    [33]
    H. Yuan et al., “Scalable NDN forwarding: Concepts, issues and principles,” in ICCCN, 2012.
    [34]
    N. L. Van Adrichem and F. A. Kuipers, “Globally accessible names in named data networking,” in INFOCOM WKSHPS, 2013.
    [35]
    A. Ghodsi et al., “Naming in content-oriented architectures,” in ACM SIGCOMM workshop on Information-centric networking.1em plus 0.5em minus 0.4emACM, 2011.

    Cited By

    View all
    • (2020)A Perspective Towards NCIFA and CIFA in Named-Data Networking ArchitectureComputational Science and Technology10.1007/978-981-15-0058-9_46(481-490)Online publication date: 2020
    • (2019)Enabling ICN in the Internet ProtocolProceedings of the 6th ACM Conference on Information-Centric Networking10.1145/3357150.3357394(55-66)Online publication date: 24-Sep-2019
    • (2019)Naming Content on the Network LayerACM Computing Surveys10.1145/331188852:3(1-28)Online publication date: 18-Jun-2019
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ACM-ICN '16: Proceedings of the 3rd ACM Conference on Information-Centric Networking
    September 2016
    275 pages
    ISBN:9781450344678
    DOI:10.1145/2984356
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 September 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. content-centric networks
    2. name translation
    3. network name

    Qualifiers

    • Research-article

    Conference

    ICN'16
    Sponsor:

    Acceptance Rates

    ACM-ICN '16 Paper Acceptance Rate 23 of 84 submissions, 27%;
    Overall Acceptance Rate 133 of 482 submissions, 28%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)A Perspective Towards NCIFA and CIFA in Named-Data Networking ArchitectureComputational Science and Technology10.1007/978-981-15-0058-9_46(481-490)Online publication date: 2020
    • (2019)Enabling ICN in the Internet ProtocolProceedings of the 6th ACM Conference on Information-Centric Networking10.1145/3357150.3357394(55-66)Online publication date: 24-Sep-2019
    • (2019)Naming Content on the Network LayerACM Computing Surveys10.1145/331188852:3(1-28)Online publication date: 18-Jun-2019
    • (2019)InterestFence: Simple but Efficient Way to Counter Interest Flooding AttackComputers & Security10.1016/j.cose.2019.101628(101628)Online publication date: Sep-2019
    • (2018)A transport layer and socket API for (h)ICNProceedings of the 5th ACM Conference on Information-Centric Networking10.1145/3267955.3267972(137-147)Online publication date: 21-Sep-2018
    • (2018)Name Filter: A Countermeasure Against Information Leakage Attacks in Named Data NetworkingIEEE Access10.1109/ACCESS.2018.28777926(65151-65170)Online publication date: 2018
    • (2017)Node caching for content distribution in mobile delaytolerant network2017 IEEE 17th International Conference on Communication Technology (ICCT)10.1109/ICCT.2017.8359851(1334-1341)Online publication date: Oct-2017
    • (2017)Comparing apples to apples in ICN2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC.2017.7983087(89-94)Online publication date: Jan-2017

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media