ABSTRACT
Named-Data Transport (NDT) is introduced to provide efficient content delivery by name over the existing IP Internet. NDT consists of the integration of three end-to-end architectural components: The first connection-free reliable transport protocol, the Named-Data Transport Protocol (NDTP); minor extensions to the Domain Name System (DNS) to include records containing manifests describing content; and transparent caches that track pending requests for content. NDT uses receiver-driven requests (Interests) to request content and NDT proxies that provide transparent caching of content while enforcing privacy. The performance of NDT, the Transmission Control Protocol (TCP), and Named-Data Networking (NDN) is compared using off-the-shelf implementations in the ns-3 simulator. The results demonstrate that NDT outperforms TCP and is as efficient as NDN, but without making any changes to the existing Internet routing infrastructure.
Supplemental Material
- E.G. AbdAllah, H.S. Hassanein, and M. Zulkernine, "A Survey of Security Attacks in Information-Centric Networking," IEEE Communications Surveys & Tutorials, 2015.Google Scholar
- B. Ahlgren et al., "A Survey of Information-Centric Networking," IEEE Communications Magazine, July 2012, pp. 26--36.Google ScholarCross Ref
- A. Albalawi and J. J. Garcia-Luna-Aceves, "A Delay-Based Congestion-Control Protocol for Information-Centric Networks," Proc. IEEE ICNC '19, 2019.Google Scholar
- A. Albalawi and J.J. Garcia-Luna-Aceves, "NDT ns-3 Simulator." Available at: https://github.com/aalbalaw/NDT.Google Scholar
- M. Ambrosin et al., "Security and Privacy Analysis of National Science Foundation Future Internet Architectures," IEEE Communications Surveys & Tutorials, 2018.Google Scholar
- T. Anderson et al., "A Brief Overview of the NEBULA Future Internet Architecture," ACM SIGCOMM CCR, 2014.Google Scholar
- S. Arianfar et al., "On Preserving Privacy in Content-Oriented Networks," Proc. ACM SIGCOMM Workshop on Information-Centric Networking, 2011.Google Scholar
- S. Ariyapperuma and C. Mitchell, "Security vulnerabilities in DNS and DNSSEC," Proc. IEEE ARES '07, April 2007.Google Scholar
- R. Atkinson, S. Bhatti, and S. Hailes. "ILNP: Mobility, Multi-homing, Localised Addressing and Security through Naming," Telecommunication Systems, 2009.Google Scholar
- P. Baran, "On Distributed Communications Networks," IEEE Transactions on Communications Systems, March 1964.Google ScholarCross Ref
- M.F. Bari et al., "A Survey of Naming and Routing in Information-Centric Networks," IEEE Communications Magazine, July 2012, pp. 44--53.Google ScholarCross Ref
- N. Bartolini, E. Casalicchio, and S. Tucc, "A Walk through Content Delivery Networks," Proc. IEEE MASCOTS '03, 2003.Google Scholar
- M. Baugher et al., "Self-Verifying Names for Read-Only Named Data," Proc. IEEE INFOCOM Workshops '12, March 2012.Google Scholar
- BitTorrent. http://bittorrent.comGoogle Scholar
- M.S. Blumenthal and D.D. Clark, "Rethinking the Design of the Internet:The End-to-End Arguments vs. the Brave New World," ACM Trans. on Internet Technology, Aug. 2001.Google ScholarDigital Library
- N. Cardwell et al., "BBR: Congestion-Based Congestion Control," ACM Queue, Oct. 2016.Google Scholar
- N. Cardwell et al., "Model-based Network Congestion Control," Technical Disclosure Commons, March 27, 2019.Google Scholar
- G. Carofiglio, M. Gallo, and L. Muscariello, "ICP: Design and Evaluation of an Interest Control Protocol for Content-Centric Networking," Proc. IEEE NOMEN 12, March 2012.Google ScholarCross Ref
- G. Carofiglio et al., "Enabling ICN in the Internet Protocol: Analysis and Evaluation of the Hybrid-ICN Architecture," Proc. ACM ICN '19, Sept. 2019.Google ScholarDigital Library
- A. Carzaniga, D.S. Rosenblum, and A.L. Wolf, " Achieving Scalability and Expressiveness in an Internet-Scale Event Notification Service," Proc. ACM PODC '20, 2000.Google Scholar
- A. Carzaniga, D.S. Rosenblum, and A.L. Wolf, "Content-based Addressing and Routing: A General Model and Its Application," Tech. Report CU-CS-902-00, Univ. of Colorado, Jan. 2000.Google Scholar
- A. Carzaniga and A.L. Wolf, "Content-Based Networking: A New Communication Infrastructure," Proc. Workshop on Infrastructure for Mobile and Wireless Systems, 2002.Google ScholarCross Ref
- V.G. Cerf, Y.K. Dalal, and C.A. Sunshine, "Specification of Internet Transmission Control Program," INWG Note 72, revised Dec. 1974.Google Scholar
- Q. Chen et al., "Transport Control Strategies in Named Data Networking: A Survey," IEEE Communications Surveys & Tutorials, 2016.Google ScholarDigital Library
- X. Chen et al., "Maintaining Strong Cache Consistency for the Domain Name System," IEEE Transactions on Knowledge and Data Engineering, August 2007Google ScholarDigital Library
- S. Cheshire, J. Graessley, and R. McGuire, "Encapsulation of TCP and other Transport Protocols over UDP," Internet Draft, July 2013.Google Scholar
- A. Dabirmoghaddam, M.M. Barijough, and J. J. Garcia-Luna-Aceves, "Understanding Optimal Caching and Opportunistic Caching at the Edge of Information-Centric Networks," Proc. ACM ICN '14, Sept. 2014.Google Scholar
- A. Dabirmoghaddam, M. Dehghan, and J.J. Garcia-Luna-Aceves, "Characterizing Interest Aggregation in Content-Centric Networks," Proc. IFIP Networking 2016, May 17-19, 2016.Google Scholar
- S.E. Deering and D.R. Cheriton, "Multicast Routing in Datagram Internetwork and Extended LANs," ACM TOCS, May 1990.Google Scholar
- E. Demirors and C. Westphal, "DNS++: A Manifest Architecture for Enhanced Content-Based Traffic Engineering," Proc. IEEE GLOBECOM '17, 2017.Google ScholarCross Ref
- T. Dierks, "The Transport Layer Security (TLS) Protocol Version 1.2," 2008.Google Scholar
- D. E. Eastlake 3rd, "Domain Name System Security Extensions," RFC 2535, 1999.Google Scholar
- W.M.Eddy, "At What layer Does Mobility Belong?," IEEE Communications Magazine, 2004.Google Scholar
- A. Eriksson and A. Mohammad Malik, "A DNS-Based Information-Centric Network Architecture Open to Multiple Protocols for Transfer of Data Objects, Proc. IEEE ICIN '18, 2018.Google ScholarCross Ref
- S. K. Fayazbakhsh et al., "Less Pain, Most of the Gain: Incrementally Deployable ICN," Proc. ACM SIGCOMM '13, 2013.Google ScholarDigital Library
- D. Florez-Rodriguez et al., "Global Architecture of the COMET System," Seventh Framework STREP No. 248784, 2013.Google Scholar
- FP7 COMET project. [Online]. Available: http://www.comet-project.org/Google Scholar
- FP7 PSIRP project. [Online]. Available: http://www.psirp.org/Google Scholar
- FP7 PURSUIT project. [Online]. Available: http://www.fp7-pursuit.eu/PursuitWeb/Google Scholar
- FP7 SAIL project. [Online]. Available: http://www.sail-project.eu/Google Scholar
- FP7 4WARD project. [Online]. Available: http://www.4ward-project.eu/Google Scholar
- FP7 CONVERGENCE project. [Online]. Available: http://www.ictconvergence.eu/Google Scholar
- Z. Gao, A. Venkataramani, and J.F. Kurose, "Towards a Quantitative Comparison of Location-Independent Network Architectures," ACM SIGCOMM CCR, 2014.Google Scholar
- J. J. Garcia-Luna-Aceves, "System and Method for Discovering Information Objects and Information Object Repositories in Computer Networks," U.S. Patent 7,162,539, January 9, 2007.Google Scholar
- J. J. Garcia-Luna-Aceves, "Name-Based Content Routing in Information Centric Networks Using Distance Information," Proc. ACM ICN '14, Sept. 2014.Google Scholar
- J.J. Garcia-Luna-Aceves, Q. Li, and Turhan Karadeniz, "CORD: Content Oriented Routing with Directories," Proc. IEEE ICNC '15, Feb. 2015.Google Scholar
- J.J. Garcia-Luna-Aceves and M. Mirzazad-Barijough, "Content-Centric Networking Using Anonymous Datagrams," Proc. IFIP Networking '16, May 2016.Google Scholar
- J.J. Garcia-Luna-Aceves, M. Mirzazad-Barijough, and E. Hemmati, "Content-Centric Networking at Internet Scale through The Integration of Name Resolution and Routing," Proc. ACM ICN '16, Kyoto, Japan, Sept. 2016.Google ScholarDigital Library
- J.J. Garcia-Luna-Aceves and M. Mirzazad-Barijough, "Efficient Multicasting in Content-Centric Networks Using Datagrams," IEEE Globecom '16, Dec. 2016.Google Scholar
- J.J. Garcia-Luna-Aceves, "New Directions in Content Centric Networking," Proc. IEEE CCN '15 Oct. 2015.Google Scholar
- C. Ghasemi et al., "MUCA: New Routing for Named Data Networking," Proc. IFIP Networking '18, May 2018.Google Scholar
- D.K. Gifford, "Replica Routing," U.S. Patent 6,052,718, April 18, 2000.Google Scholar
- M. Gritter and D. Cheriton, "An Architecture for Content Routing Support in The Internet," Proc. USENIX Symposium on Internet Technologies and Systems, Sept. 2001.Google ScholarDigital Library
- Y. Gu and R. Grossman, " UDT: UDP-Based Data Transfer for High-Speed Wide Area Networks," Computer Networks, Elsevier, 2007.Google Scholar
- P. Gusev and J. Burke, "NDN-RTC: Real-Time Videoconferencing over Named Data Networking," Proc. ACM ICN '15, Sept. 2015.Google ScholarDigital Library
- D. Han et al., "XIA: Efficient Support for Evolvable Internetworking," Proc. USENIX NSDI '12, 2012.Google Scholar
- E. Hemmati and J.J. Garcia-Luna-Aceves, "A New Approach to Name-Based Link-State Routing for Information-Centric Networks," Proc. ACM ICN '15, Sept. 2015.Google ScholarDigital Library
- P. Hoffman and J. Schlyter, "The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA," RFC 6698, 2012.Google Scholar
- V. Jacobson, "Congestion Avoidance and Control, Proc. ACM SIGCOMM '88, Aug. 1988.Google ScholarDigital Library
- V. Jacobson et al., "Networking Named Content," Proc. ACM CoNEXT '09, Dec. 2009.Google Scholar
- V. Jacobson et al., "VoCCN: Voice-over Content-Centric Networks," Proc. ACM ReArch '09, Dec. 2009.Google ScholarDigital Library
- E. Kohler, M. Handley, and S. Floyd, "Datagram Congestion Control Protocol (DCCP)," RFC 4340, IETF, March 2006.Google Scholar
- T. Koponen et al., "A Data-Oriented (and Beyond) Network Architecture," Proc. ACM SIGCOMM '07, Aug. 2007.Google Scholar
- A. Langley et al., "The QUIC Transport Protocol: Design and Internet-Scale Deployment," Proc. ACM SIGCOMM '17, Aug. 2017.Google ScholarDigital Library
- D. Le, X. Fu, and D. Hogrefe, "A Review of Mobility Support Paradigms for the Internet, IEEE Communications Surveys & Tutorials, 2006.Google ScholarDigital Library
- B.N. Levine et al., "Consideration of Receiver Interest for IP Multicast Delivery," Proc. IEEE Infocom '00, March 2000.Google Scholar
- J. Li, "On peer-to-peer (P2P) content delivery," Peer-to-Peer Netw. Appl., 2008.Google Scholar
- E.K. Lua et al., "A Survey and Comparison of Peer-to-Peer Overlay Network Schemes," IEEE Communications Survey & Tutorial, March 2004.Google Scholar
- N.A. Lynch, Y. Mansour, and A. Fekete, "Data link layer: Two Impossibility Results," Proc. ACM PODC '88, 1988.Google ScholarDigital Library
- N.A. Lynch, Distributed Algorithms, Morgan Kauffman, 1996.Google Scholar
- P. Mockapetris, "Domain Names -- Implementation and Specification," RFC 1035, Nov. 1987.Google Scholar
- I. Moiseenko and L. Zhang. "Consumer-producer API for Named Data Networking," Proc. ACM ICN '14, 2014.Google Scholar
- I. Moiseenko, " Fetching content in Named Data Networking with Embedded Manifests," 2014.Google Scholar
- M. Mosko, I. Solis, E. Uzun, C. Wood, "CCNx 1.0 Protocol Architecture," Xerox PARC, April 2017.Google Scholar
- L. Muscariello et al., "Hybrid Information-Centric Networking," IETF Internet Draft, Oct. 2019.Google Scholar
- NSF Named Data Networking project. [Online]. Available: http://www.named-data.net/Google Scholar
- NS-3 based Named Data Networking (NDN) simulator [Online]. Available: https://ndnsim.net/current/index.htmlGoogle Scholar
- NSF Mobility First project. [Online]. Available:http://mobilittyfirst.winlab.rutgers.edu/.Google Scholar
- E. Nygren, R.K. Sitaraman, and J. Sun, "The Akamai Network: A Platform for High-Performance Internet Applications," ACM SIGOPS Operating Systems Review, Aug. 2010.Google ScholarDigital Library
- G. Papastergiou et al., "De-ossifying the Internet Transport Layer: A Survey and Future Perspectives," IEEE Communications Surveys & Tutorials, Nov. 2016.Google Scholar
- R. Peon, "Explicit proxies for HTTP/2.0," IETF Informational Internet Draft, 2012.Google Scholar
- E. Perera, V. Sivaraman, and A. Seneviratne, "Survey on Network Mobility Support," ACM SIGMOBILE Mobile Computing and Communications Review, 2004.Google ScholarDigital Library
- M. Polese et al., "A Survey on Recent Advances in Transport Layer Protocols," IEEE Communications Surveys & Tutorials, Aug. 2019.Google Scholar
- R. Pries, Z. Magyari, and P. Tran-Gia, "An HTTP Web Traffic Model based on the Top One Million Visited Web Pages," Proc. IEEE Euro-NF Conference on Next Generation Internet '12, 2012.Google Scholar
- J. Raju, J. J. Garcia-Luna-Aceves, and B. Smith, "System and Method for Information Object Routing in Computer Networks," U. S. Patent 7,552,233, June 23, 2009.Google Scholar
- D. Saha et al., "Mobility Support in IP: A Survey of Related Protocols," IEEE Network, 2004Google Scholar
- J.H. Saltzer, "End-to-End Arguments in System Design," RFC 185, 1980.Google Scholar
- L. Saino, C. Cocora, and G. Pavlou, "CCTCP: A Scalable Receiver-Driven Congestion Control Protocol for Content Centric Networking," Proc. IEEE ICC '13, 2013.Google ScholarCross Ref
- I. Seskar et al., "MobilityFirst Future Internet Architecture Project," Proc. AINTEC '11, Nov. 2011.Google Scholar
- S. Sevilla, P. Mahadevan, and J.J. Garcia-Luna-Aceves, "iDNS: Enabling Information Centric Networking through the DNS," Proc. IEEE INFOCOM Workshop on Name-Oriented Mobility '14, 2014.Google ScholarCross Ref
- S. Sevilla and J.J. Garcia-Luna-Aceves, "Freeing The IP Internet Architecture from Fixed IP Addresses," Proc. IEEE ICNP '15, Nov. 2015.Google Scholar
- S. Sevilla, J.J. Garcia-Luna-Aceves, and H. Sadjadpour, "GroupSec: ANew Security Model for the Web," Proc. IEEE ICC '17, 2017.Google Scholar
- S. Sevilla and J.J. Garcia-Luna-Aceves, "A Deployable Identifier-Locator Split Architecture," Proc. IFIP Networking '17, June 2017.Google Scholar
- J.M. Spinelli, "Reliable Communication on Data Links," LIDS-P-1844, MIT, Dec. 1988.Google Scholar
- A. Stubblefield and D. Wallach, "Dagster: Censorship-Resistant Publishing Without Replication," Rice University, Dept. of Computer Science, Tech. Rep. TR01-380, 2001.Google Scholar
- B. Tremblay et al., "(D.A.3) Final Harmonised SAIL Architecture," Report FP7-ICT-2009-5-257448-SAIL/D-2.3, Feb. 2013.Google Scholar
- F. Urbani, W. Dabbous, and A. Legout, NS3 DCE CCNx quick start, INRIA, Nov. 2011.Google Scholar
- P. Vixie et al., "Dynamic Updates in the Domain Name System," IETF RFC 2136, 1997.Google Scholar
- L. Wang et al., "A Secure Link State Routing Protocol for NDN," IEEE Access, March 2018.Google Scholar
- C. Westphal and E. Demirors, "An IP-Based Manifest Architecture for ICN," ACM ICN Demo, September 2015.Google Scholar
- Y. Wu, J. Tuononen, and M. Latvala, "Performance Analysis of DNS with TTL Value 0 as Location Repository in Mobile Internet," IEEE WCNC '07, March 2007.Google Scholar
- G. Xylomenos et al., "Caching and Mobility Support in a Publish-Subscribe Internet Architecture," IEEE Communications Magazine, July 2012Google ScholarCross Ref
- G. Xylomenos et al., "A Survey of Information-centric Networking Research," IEEE Communication Surveys & Tutorials, July 2013.Google Scholar
- B. Zolfaghari et al., "Content Delivery Networks: State of the Art, Trends, and Future Roadmap," ACM Computing Surveys, April 2020.Google Scholar
Index Terms
- Named-Data Transport: An End-to-End Approach for an Information-Centric IP Internet
Recommendations
TCP/ICN: Carrying TCP over Content Centric and Named Data Networks
ACM-ICN '16: Proceedings of the 3rd ACM Conference on Information-Centric NetworkingToday's Internet applications and protocols are not compatible with Information Centric Networking (ICN) protocols and there is no straightforward way of rapidly switching protocol architectures. Network operators incrementally deploying an ICN ...
Flash-forward CCN: flow-driven forwarding architecture for content centric networks
ACM-ICN '14: Proceedings of the 1st ACM Conference on Information-Centric NetworkingContent-centric Networking (CCN) promises significant advantages over the current Internet architecture by replacing its host-centric design with a content-centric one, and enabling in-network caching and name-based forwarding. However, despite its ...
A transport protocol to exploit multipath diversity in wireless networks
Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and providers, also makes it attractive for end-to-end transport connections to exploit ...
Comments