On broadcast-based self-learning in named data networking

In local area networks and mobile ad-hoc networks, broadcast-based self-learning is a common mechanism to find packet delivery paths. Self-learning broadcasts the first packet, observes where the returning packet comes from, then creates the corresponding forwarding table entry so that future packets will only need unicast. The main benefits of this mechanism are its simplicity, adaptability, and support of mobility. While the high-level idea of broadcast-based self-learning is straightforward, making the scheme efficient and secure, especially in a data-centric network architecture like Named Data Networking (NDN), requires careful examination. In this paper, we study how broadcast-based self-learning may be applied to NDN networks, point out two major issues: the name-prefix granularity problem and the trust problem, and propose corresponding solutions. We also apply self-learning to switched Ethernet as an example to develop a specific design that can build forwarding tables without any control protocol, recover quickly from link failures, and make use of off-path caches. Simulations are conducted using both real and synthetic traffic to evaluate the performance of the design.

[1]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[2]  James F. Kurose,et al.  Breadcrumbs: Efficient, Best-Effort Content Location in Cache Networks , 2009, IEEE INFOCOM 2009.

[3]  Vasileios Pappas,et al.  Listen First, Broadcast Later: Topology-Agnostic Forwarding under High Dynamics , 2010 .

[4]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[5]  David Levin,et al.  A secure content network in space , 2012, CHANTS '12.

[6]  Davide Pesavento,et al.  NFD Developer's Guide , 2014 .

[7]  Serge Fdida,et al.  Navigo: Interest forwarding by geolocations in vehicular Named Data Networking , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[8]  Michael Goldweber,et al.  VDE: an emulation environment for supporting computer networking courses , 2008, ITiCSE.

[9]  Christos Papadopoulos,et al.  Mitigating poisoned content with forwarding strategy , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[10]  Daniel Massey,et al.  Information-Centric Networking , 2019, Advances in Computer and Electrical Engineering.

[11]  Lixia Zhang,et al.  Real-Time Streaming Data Delivery over Named Data Networking , 2016, IEICE Trans. Commun..

[12]  Fei Li,et al.  Measurement and Analysis of an Internet Streaming Service to Mobile Devices , 2013, IEEE Transactions on Parallel and Distributed Systems.

[13]  Alexander Afanasyev,et al.  journal homepage: www.elsevier.com/locate/comcom , 2022 .

[14]  Nick McKeown,et al.  A network in a laptop: rapid prototyping for software-defined networks , 2010, Hotnets-IX.

[15]  Dave Katz,et al.  Bidirectional Forwarding Detection (BFD) , 2010, RFC.

[16]  George Pavlou,et al.  Opportunistic off-path content discovery in information-centric networks , 2016, 2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN).

[17]  Margo I. Seltzer,et al.  New NFS Tracing Tools and Techniques for System Analysis , 2003, LISA.

[18]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[19]  Thomas C. Schmidt,et al.  Information centric networking in the IoT: experiments with NDN in the wild , 2014, ICN '14.

[20]  Lixia Zhang,et al.  A Secure Link State Routing Protocol for NDN , 2018, IEEE Access.

[21]  Van Jacobson,et al.  Schematizing Trust in Named Data Networking , 2015, ICN.

[22]  Vern Paxson,et al.  Computing TCP's Retransmission Timer , 2000, RFC.