skip to main content
10.1145/3405656.3418714acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Open Access
Best Paper

Named-Data Transport: An End-to-End Approach for an Information-Centric IP Internet

Authors Info & Claims
Published:22 September 2020Publication History

ABSTRACT

Named-Data Transport (NDT) is introduced to provide efficient content delivery by name over the existing IP Internet. NDT consists of the integration of three end-to-end architectural components: The first connection-free reliable transport protocol, the Named-Data Transport Protocol (NDTP); minor extensions to the Domain Name System (DNS) to include records containing manifests describing content; and transparent caches that track pending requests for content. NDT uses receiver-driven requests (Interests) to request content and NDT proxies that provide transparent caching of content while enforcing privacy. The performance of NDT, the Transmission Control Protocol (TCP), and Named-Data Networking (NDN) is compared using off-the-shelf implementations in the ns-3 simulator. The results demonstrate that NDT outperforms TCP and is as efficient as NDN, but without making any changes to the existing Internet routing infrastructure.

Skip Supplemental Material Section

Supplemental Material

p136-albalawi-presentation.mp4

mp4

31.2 MB

References

  1. E.G. AbdAllah, H.S. Hassanein, and M. Zulkernine, "A Survey of Security Attacks in Information-Centric Networking," IEEE Communications Surveys & Tutorials, 2015.Google ScholarGoogle Scholar
  2. B. Ahlgren et al., "A Survey of Information-Centric Networking," IEEE Communications Magazine, July 2012, pp. 26--36.Google ScholarGoogle ScholarCross RefCross Ref
  3. A. Albalawi and J. J. Garcia-Luna-Aceves, "A Delay-Based Congestion-Control Protocol for Information-Centric Networks," Proc. IEEE ICNC '19, 2019.Google ScholarGoogle Scholar
  4. A. Albalawi and J.J. Garcia-Luna-Aceves, "NDT ns-3 Simulator." Available at: https://github.com/aalbalaw/NDT.Google ScholarGoogle Scholar
  5. M. Ambrosin et al., "Security and Privacy Analysis of National Science Foundation Future Internet Architectures," IEEE Communications Surveys & Tutorials, 2018.Google ScholarGoogle Scholar
  6. T. Anderson et al., "A Brief Overview of the NEBULA Future Internet Architecture," ACM SIGCOMM CCR, 2014.Google ScholarGoogle Scholar
  7. S. Arianfar et al., "On Preserving Privacy in Content-Oriented Networks," Proc. ACM SIGCOMM Workshop on Information-Centric Networking, 2011.Google ScholarGoogle Scholar
  8. S. Ariyapperuma and C. Mitchell, "Security vulnerabilities in DNS and DNSSEC," Proc. IEEE ARES '07, April 2007.Google ScholarGoogle Scholar
  9. R. Atkinson, S. Bhatti, and S. Hailes. "ILNP: Mobility, Multi-homing, Localised Addressing and Security through Naming," Telecommunication Systems, 2009.Google ScholarGoogle Scholar
  10. P. Baran, "On Distributed Communications Networks," IEEE Transactions on Communications Systems, March 1964.Google ScholarGoogle ScholarCross RefCross Ref
  11. M.F. Bari et al., "A Survey of Naming and Routing in Information-Centric Networks," IEEE Communications Magazine, July 2012, pp. 44--53.Google ScholarGoogle ScholarCross RefCross Ref
  12. N. Bartolini, E. Casalicchio, and S. Tucc, "A Walk through Content Delivery Networks," Proc. IEEE MASCOTS '03, 2003.Google ScholarGoogle Scholar
  13. M. Baugher et al., "Self-Verifying Names for Read-Only Named Data," Proc. IEEE INFOCOM Workshops '12, March 2012.Google ScholarGoogle Scholar
  14. BitTorrent. http://bittorrent.comGoogle ScholarGoogle Scholar
  15. M.S. Blumenthal and D.D. Clark, "Rethinking the Design of the Internet:The End-to-End Arguments vs. the Brave New World," ACM Trans. on Internet Technology, Aug. 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Cardwell et al., "BBR: Congestion-Based Congestion Control," ACM Queue, Oct. 2016.Google ScholarGoogle Scholar
  17. N. Cardwell et al., "Model-based Network Congestion Control," Technical Disclosure Commons, March 27, 2019.Google ScholarGoogle Scholar
  18. G. Carofiglio, M. Gallo, and L. Muscariello, "ICP: Design and Evaluation of an Interest Control Protocol for Content-Centric Networking," Proc. IEEE NOMEN 12, March 2012.Google ScholarGoogle ScholarCross RefCross Ref
  19. G. Carofiglio et al., "Enabling ICN in the Internet Protocol: Analysis and Evaluation of the Hybrid-ICN Architecture," Proc. ACM ICN '19, Sept. 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Carzaniga, D.S. Rosenblum, and A.L. Wolf, " Achieving Scalability and Expressiveness in an Internet-Scale Event Notification Service," Proc. ACM PODC '20, 2000.Google ScholarGoogle Scholar
  21. A. Carzaniga, D.S. Rosenblum, and A.L. Wolf, "Content-based Addressing and Routing: A General Model and Its Application," Tech. Report CU-CS-902-00, Univ. of Colorado, Jan. 2000.Google ScholarGoogle Scholar
  22. A. Carzaniga and A.L. Wolf, "Content-Based Networking: A New Communication Infrastructure," Proc. Workshop on Infrastructure for Mobile and Wireless Systems, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  23. V.G. Cerf, Y.K. Dalal, and C.A. Sunshine, "Specification of Internet Transmission Control Program," INWG Note 72, revised Dec. 1974.Google ScholarGoogle Scholar
  24. Q. Chen et al., "Transport Control Strategies in Named Data Networking: A Survey," IEEE Communications Surveys & Tutorials, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. X. Chen et al., "Maintaining Strong Cache Consistency for the Domain Name System," IEEE Transactions on Knowledge and Data Engineering, August 2007Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. Cheshire, J. Graessley, and R. McGuire, "Encapsulation of TCP and other Transport Protocols over UDP," Internet Draft, July 2013.Google ScholarGoogle Scholar
  27. A. Dabirmoghaddam, M.M. Barijough, and J. J. Garcia-Luna-Aceves, "Understanding Optimal Caching and Opportunistic Caching at the Edge of Information-Centric Networks," Proc. ACM ICN '14, Sept. 2014.Google ScholarGoogle Scholar
  28. A. Dabirmoghaddam, M. Dehghan, and J.J. Garcia-Luna-Aceves, "Characterizing Interest Aggregation in Content-Centric Networks," Proc. IFIP Networking 2016, May 17-19, 2016.Google ScholarGoogle Scholar
  29. S.E. Deering and D.R. Cheriton, "Multicast Routing in Datagram Internetwork and Extended LANs," ACM TOCS, May 1990.Google ScholarGoogle Scholar
  30. E. Demirors and C. Westphal, "DNS++: A Manifest Architecture for Enhanced Content-Based Traffic Engineering," Proc. IEEE GLOBECOM '17, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  31. T. Dierks, "The Transport Layer Security (TLS) Protocol Version 1.2," 2008.Google ScholarGoogle Scholar
  32. D. E. Eastlake 3rd, "Domain Name System Security Extensions," RFC 2535, 1999.Google ScholarGoogle Scholar
  33. W.M.Eddy, "At What layer Does Mobility Belong?," IEEE Communications Magazine, 2004.Google ScholarGoogle Scholar
  34. A. Eriksson and A. Mohammad Malik, "A DNS-Based Information-Centric Network Architecture Open to Multiple Protocols for Transfer of Data Objects, Proc. IEEE ICIN '18, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  35. S. K. Fayazbakhsh et al., "Less Pain, Most of the Gain: Incrementally Deployable ICN," Proc. ACM SIGCOMM '13, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. D. Florez-Rodriguez et al., "Global Architecture of the COMET System," Seventh Framework STREP No. 248784, 2013.Google ScholarGoogle Scholar
  37. FP7 COMET project. [Online]. Available: http://www.comet-project.org/Google ScholarGoogle Scholar
  38. FP7 PSIRP project. [Online]. Available: http://www.psirp.org/Google ScholarGoogle Scholar
  39. FP7 PURSUIT project. [Online]. Available: http://www.fp7-pursuit.eu/PursuitWeb/Google ScholarGoogle Scholar
  40. FP7 SAIL project. [Online]. Available: http://www.sail-project.eu/Google ScholarGoogle Scholar
  41. FP7 4WARD project. [Online]. Available: http://www.4ward-project.eu/Google ScholarGoogle Scholar
  42. FP7 CONVERGENCE project. [Online]. Available: http://www.ictconvergence.eu/Google ScholarGoogle Scholar
  43. Z. Gao, A. Venkataramani, and J.F. Kurose, "Towards a Quantitative Comparison of Location-Independent Network Architectures," ACM SIGCOMM CCR, 2014.Google ScholarGoogle Scholar
  44. J. J. Garcia-Luna-Aceves, "System and Method for Discovering Information Objects and Information Object Repositories in Computer Networks," U.S. Patent 7,162,539, January 9, 2007.Google ScholarGoogle Scholar
  45. J. J. Garcia-Luna-Aceves, "Name-Based Content Routing in Information Centric Networks Using Distance Information," Proc. ACM ICN '14, Sept. 2014.Google ScholarGoogle Scholar
  46. J.J. Garcia-Luna-Aceves, Q. Li, and Turhan Karadeniz, "CORD: Content Oriented Routing with Directories," Proc. IEEE ICNC '15, Feb. 2015.Google ScholarGoogle Scholar
  47. J.J. Garcia-Luna-Aceves and M. Mirzazad-Barijough, "Content-Centric Networking Using Anonymous Datagrams," Proc. IFIP Networking '16, May 2016.Google ScholarGoogle Scholar
  48. J.J. Garcia-Luna-Aceves, M. Mirzazad-Barijough, and E. Hemmati, "Content-Centric Networking at Internet Scale through The Integration of Name Resolution and Routing," Proc. ACM ICN '16, Kyoto, Japan, Sept. 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. J.J. Garcia-Luna-Aceves and M. Mirzazad-Barijough, "Efficient Multicasting in Content-Centric Networks Using Datagrams," IEEE Globecom '16, Dec. 2016.Google ScholarGoogle Scholar
  50. J.J. Garcia-Luna-Aceves, "New Directions in Content Centric Networking," Proc. IEEE CCN '15 Oct. 2015.Google ScholarGoogle Scholar
  51. C. Ghasemi et al., "MUCA: New Routing for Named Data Networking," Proc. IFIP Networking '18, May 2018.Google ScholarGoogle Scholar
  52. D.K. Gifford, "Replica Routing," U.S. Patent 6,052,718, April 18, 2000.Google ScholarGoogle Scholar
  53. M. Gritter and D. Cheriton, "An Architecture for Content Routing Support in The Internet," Proc. USENIX Symposium on Internet Technologies and Systems, Sept. 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Y. Gu and R. Grossman, " UDT: UDP-Based Data Transfer for High-Speed Wide Area Networks," Computer Networks, Elsevier, 2007.Google ScholarGoogle Scholar
  55. P. Gusev and J. Burke, "NDN-RTC: Real-Time Videoconferencing over Named Data Networking," Proc. ACM ICN '15, Sept. 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. D. Han et al., "XIA: Efficient Support for Evolvable Internetworking," Proc. USENIX NSDI '12, 2012.Google ScholarGoogle Scholar
  57. E. Hemmati and J.J. Garcia-Luna-Aceves, "A New Approach to Name-Based Link-State Routing for Information-Centric Networks," Proc. ACM ICN '15, Sept. 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. P. Hoffman and J. Schlyter, "The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA," RFC 6698, 2012.Google ScholarGoogle Scholar
  59. V. Jacobson, "Congestion Avoidance and Control, Proc. ACM SIGCOMM '88, Aug. 1988.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. V. Jacobson et al., "Networking Named Content," Proc. ACM CoNEXT '09, Dec. 2009.Google ScholarGoogle Scholar
  61. V. Jacobson et al., "VoCCN: Voice-over Content-Centric Networks," Proc. ACM ReArch '09, Dec. 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. E. Kohler, M. Handley, and S. Floyd, "Datagram Congestion Control Protocol (DCCP)," RFC 4340, IETF, March 2006.Google ScholarGoogle Scholar
  63. T. Koponen et al., "A Data-Oriented (and Beyond) Network Architecture," Proc. ACM SIGCOMM '07, Aug. 2007.Google ScholarGoogle Scholar
  64. A. Langley et al., "The QUIC Transport Protocol: Design and Internet-Scale Deployment," Proc. ACM SIGCOMM '17, Aug. 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. D. Le, X. Fu, and D. Hogrefe, "A Review of Mobility Support Paradigms for the Internet, IEEE Communications Surveys & Tutorials, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. B.N. Levine et al., "Consideration of Receiver Interest for IP Multicast Delivery," Proc. IEEE Infocom '00, March 2000.Google ScholarGoogle Scholar
  67. J. Li, "On peer-to-peer (P2P) content delivery," Peer-to-Peer Netw. Appl., 2008.Google ScholarGoogle Scholar
  68. E.K. Lua et al., "A Survey and Comparison of Peer-to-Peer Overlay Network Schemes," IEEE Communications Survey & Tutorial, March 2004.Google ScholarGoogle Scholar
  69. N.A. Lynch, Y. Mansour, and A. Fekete, "Data link layer: Two Impossibility Results," Proc. ACM PODC '88, 1988.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. N.A. Lynch, Distributed Algorithms, Morgan Kauffman, 1996.Google ScholarGoogle Scholar
  71. P. Mockapetris, "Domain Names -- Implementation and Specification," RFC 1035, Nov. 1987.Google ScholarGoogle Scholar
  72. I. Moiseenko and L. Zhang. "Consumer-producer API for Named Data Networking," Proc. ACM ICN '14, 2014.Google ScholarGoogle Scholar
  73. I. Moiseenko, " Fetching content in Named Data Networking with Embedded Manifests," 2014.Google ScholarGoogle Scholar
  74. M. Mosko, I. Solis, E. Uzun, C. Wood, "CCNx 1.0 Protocol Architecture," Xerox PARC, April 2017.Google ScholarGoogle Scholar
  75. L. Muscariello et al., "Hybrid Information-Centric Networking," IETF Internet Draft, Oct. 2019.Google ScholarGoogle Scholar
  76. NSF Named Data Networking project. [Online]. Available: http://www.named-data.net/Google ScholarGoogle Scholar
  77. NS-3 based Named Data Networking (NDN) simulator [Online]. Available: https://ndnsim.net/current/index.htmlGoogle ScholarGoogle Scholar
  78. NSF Mobility First project. [Online]. Available:http://mobilittyfirst.winlab.rutgers.edu/.Google ScholarGoogle Scholar
  79. E. Nygren, R.K. Sitaraman, and J. Sun, "The Akamai Network: A Platform for High-Performance Internet Applications," ACM SIGOPS Operating Systems Review, Aug. 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. G. Papastergiou et al., "De-ossifying the Internet Transport Layer: A Survey and Future Perspectives," IEEE Communications Surveys & Tutorials, Nov. 2016.Google ScholarGoogle Scholar
  81. R. Peon, "Explicit proxies for HTTP/2.0," IETF Informational Internet Draft, 2012.Google ScholarGoogle Scholar
  82. E. Perera, V. Sivaraman, and A. Seneviratne, "Survey on Network Mobility Support," ACM SIGMOBILE Mobile Computing and Communications Review, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. M. Polese et al., "A Survey on Recent Advances in Transport Layer Protocols," IEEE Communications Surveys & Tutorials, Aug. 2019.Google ScholarGoogle Scholar
  84. R. Pries, Z. Magyari, and P. Tran-Gia, "An HTTP Web Traffic Model based on the Top One Million Visited Web Pages," Proc. IEEE Euro-NF Conference on Next Generation Internet '12, 2012.Google ScholarGoogle Scholar
  85. J. Raju, J. J. Garcia-Luna-Aceves, and B. Smith, "System and Method for Information Object Routing in Computer Networks," U. S. Patent 7,552,233, June 23, 2009.Google ScholarGoogle Scholar
  86. D. Saha et al., "Mobility Support in IP: A Survey of Related Protocols," IEEE Network, 2004Google ScholarGoogle Scholar
  87. J.H. Saltzer, "End-to-End Arguments in System Design," RFC 185, 1980.Google ScholarGoogle Scholar
  88. L. Saino, C. Cocora, and G. Pavlou, "CCTCP: A Scalable Receiver-Driven Congestion Control Protocol for Content Centric Networking," Proc. IEEE ICC '13, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  89. I. Seskar et al., "MobilityFirst Future Internet Architecture Project," Proc. AINTEC '11, Nov. 2011.Google ScholarGoogle Scholar
  90. S. Sevilla, P. Mahadevan, and J.J. Garcia-Luna-Aceves, "iDNS: Enabling Information Centric Networking through the DNS," Proc. IEEE INFOCOM Workshop on Name-Oriented Mobility '14, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  91. S. Sevilla and J.J. Garcia-Luna-Aceves, "Freeing The IP Internet Architecture from Fixed IP Addresses," Proc. IEEE ICNP '15, Nov. 2015.Google ScholarGoogle Scholar
  92. S. Sevilla, J.J. Garcia-Luna-Aceves, and H. Sadjadpour, "GroupSec: ANew Security Model for the Web," Proc. IEEE ICC '17, 2017.Google ScholarGoogle Scholar
  93. S. Sevilla and J.J. Garcia-Luna-Aceves, "A Deployable Identifier-Locator Split Architecture," Proc. IFIP Networking '17, June 2017.Google ScholarGoogle Scholar
  94. J.M. Spinelli, "Reliable Communication on Data Links," LIDS-P-1844, MIT, Dec. 1988.Google ScholarGoogle Scholar
  95. A. Stubblefield and D. Wallach, "Dagster: Censorship-Resistant Publishing Without Replication," Rice University, Dept. of Computer Science, Tech. Rep. TR01-380, 2001.Google ScholarGoogle Scholar
  96. B. Tremblay et al., "(D.A.3) Final Harmonised SAIL Architecture," Report FP7-ICT-2009-5-257448-SAIL/D-2.3, Feb. 2013.Google ScholarGoogle Scholar
  97. F. Urbani, W. Dabbous, and A. Legout, NS3 DCE CCNx quick start, INRIA, Nov. 2011.Google ScholarGoogle Scholar
  98. P. Vixie et al., "Dynamic Updates in the Domain Name System," IETF RFC 2136, 1997.Google ScholarGoogle Scholar
  99. L. Wang et al., "A Secure Link State Routing Protocol for NDN," IEEE Access, March 2018.Google ScholarGoogle Scholar
  100. C. Westphal and E. Demirors, "An IP-Based Manifest Architecture for ICN," ACM ICN Demo, September 2015.Google ScholarGoogle Scholar
  101. Y. Wu, J. Tuononen, and M. Latvala, "Performance Analysis of DNS with TTL Value 0 as Location Repository in Mobile Internet," IEEE WCNC '07, March 2007.Google ScholarGoogle Scholar
  102. G. Xylomenos et al., "Caching and Mobility Support in a Publish-Subscribe Internet Architecture," IEEE Communications Magazine, July 2012Google ScholarGoogle ScholarCross RefCross Ref
  103. G. Xylomenos et al., "A Survey of Information-centric Networking Research," IEEE Communication Surveys & Tutorials, July 2013.Google ScholarGoogle Scholar
  104. B. Zolfaghari et al., "Content Delivery Networks: State of the Art, Trends, and Future Roadmap," ACM Computing Surveys, April 2020.Google ScholarGoogle Scholar

Index Terms

  1. Named-Data Transport: An End-to-End Approach for an Information-Centric IP Internet

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ICN '20: Proceedings of the 7th ACM Conference on Information-Centric Networking
          September 2020
          181 pages
          ISBN:9781450380409
          DOI:10.1145/3405656

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 September 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          ICN '20 Paper Acceptance Rate15of39submissions,38%Overall Acceptance Rate133of482submissions,28%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader