A layered naming architecture for the internet

Currently the Internet has only one level of name resolution, DNS, which converts user-level domain names into IP addresses. In this paper we borrow liberally from the literature to argue that there should be three levels of name resolution: from user-level descriptors to service identifiers; from service identifiers to endpoint identifiers; and from endpoint identifiers to IP addresses. These additional levels of naming and resolution (1) allow services and data to be first class Internet objects (in that they can be directly and persistently named), (2) seamlessly accommodate mobility and multi-homing and (3) integrate middleboxes (such as NATs and firewalls) into the Internet architecture. We further argue that flat names are a natural choice for the service and endpoint identifiers. Hence, this architecture requires scalable resolution of flat names, a capability that distributed hash tables (DHTs) can provide.

[1]  Scott Shenker,et al.  Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.

[2]  Xiaowei Yang,et al.  NIRA: a new Internet routing architecture , 2003, FDNA '03.

[3]  Antony I. T. Rowstron,et al.  Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.

[4]  Ralph Droms,et al.  What's In A Name: Thoughts from the NSRG , 2003 .

[5]  Pyda Srisuresh,et al.  Traditional IP Network Address Translator (Traditional NAT) , 2001, RFC.

[6]  David G. Andersen,et al.  Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .

[7]  G.J. Minden,et al.  A survey of active network research , 1997, IEEE Communications Magazine.

[8]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[9]  Mark Handley,et al.  From protocol stack to protocol heap: role-based architecture , 2003, CCRV.

[10]  David Mazières,et al.  Separating key management from file system security , 1999, SOSP.

[11]  Robbert van Renesse,et al.  Implementing IPv6 as a peer-to-peer overlay network , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..

[12]  Paul Francis,et al.  Addressing in internetwork protocols , 1994 .

[13]  Michael Walfish,et al.  Untangling the Web from DNS , 2004, NSDI.

[14]  David D. Clark,et al.  Architectural considerations for a new generation of protocols , 1990, SIGCOMM '90.

[15]  Charles Lynn,et al.  Endpoint Identifier Destination Option , 1996 .

[16]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .

[17]  Mark Alexander Connell Snoeren A session-based architecture for Internet mobility , 2002 .

[18]  Ion Stoica,et al.  Taming IP packet flooding attacks , 2004, Comput. Commun. Rev..

[19]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[20]  Michalis Faloutsos,et al.  PeerNet: Pushing Peer-to-Peer Down the Stack , 2003, IPTPS.

[21]  Renato Iannella,et al.  URN Namespace Definition Mechanisms , 1999, RFC.

[22]  David D. Clark,et al.  FARA: reorganizing the addressing architecture , 2003, FDNA '03.

[23]  Timothy Roscoe,et al.  Predicate routing: enabling controlled networking , 2003, CCRV.

[24]  Paul Francis,et al.  IPNL: A NAT-extended internet architecture , 2001, SIGCOMM '01.

[25]  David Wetherall,et al.  Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..

[26]  M. van Steen,et al.  Scalable User-Friendly Resource Names , 2001 .

[27]  Craig Partridge,et al.  Smart packets: applying active networks to network management , 2000, TOCS.

[28]  Paul V. Mockapetris,et al.  Domain names - implementation and specification , 1987, RFC.

[29]  Charles E. Perkins,et al.  A Mobile Host Protocol Supporting Route Optimization and Authentication , 1995, IEEE J. Sel. Areas Commun..

[30]  Franz J. Hauck,et al.  Locating objects in wide-area systems , 1998, IEEE Commun. Mag..

[31]  Hari Balakrishnan,et al.  An end-to-end approach to host mobility , 2000, MobiCom '00.

[32]  Michael J. O'Donnell,et al.  Open Network Handles Implemented in DNS , 2003, ArXiv.

[33]  Andrew G. Malis,et al.  A Framework for IP Based Virtual Private Networks , 2000, RFC.

[34]  Indranil Gupta,et al.  Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead , 2003, IPTPS.

[35]  Miguel Castro,et al.  Security for Structured Peer-to-peer Overlay Networks , 2004 .

[36]  Anjali Gupta,et al.  Efficient Routing for Peer-to-Peer Overlays , 2004, NSDI.

[37]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[38]  Kenneth L. Calvert,et al.  Lightweight network support for scalable end-to-end services , 2002, SIGCOMM '02.

[39]  Michael Walfish,et al.  Middleboxes No Longer Considered Harmful , 2004, OSDI.

[40]  Larry L. Peterson,et al.  A dynamic network architecture , 1992, TOCS.

[41]  Karen R. Sollins,et al.  Architectural Principles of Uniform Resource Name Resolution , 1998, RFC.

[42]  DruschelPeter,et al.  Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001 .

[43]  David R. Karger,et al.  Looking up data in P2P systems , 2003, CACM.

[44]  J. Noel Chiappa,et al.  The Nimrod Routing Architecture , 1996, RFC.

[45]  Karen R. Sollins,et al.  Functional Requirements for Uniform Resource Names , 1994, RFC.

[46]  Jerome H. Saltzer,et al.  On the Naming and Binding of Network Destinations , 1993, RFC.

[47]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM '02.

[48]  P. Francis,et al.  A near-term architecture for deploying Pip , 1993, IEEE Network.

[49]  Richard Gold,et al.  Network pointers , 2003, CCRV.

[50]  Ben Y. Zhao,et al.  Distributed Object Location in a Dynamic Network , 2002, SPAA '02.

[51]  Emin Gün Sirer,et al.  Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays , 2004, NSDI.

[52]  Hari Balakrishnan,et al.  Reconsidering Internet mobility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[53]  Pekka Nikander,et al.  Integrating Security, Mobility and Multi-Homing in a HIP Way , 2003, NDSS.

[54]  Robbert van Renesse,et al.  P6P: A Peer-to-Peer Approach to Internet Infrastructure , 2004, IPTPS.

[55]  Bryan Ford,et al.  Unmanaged Internet Protocol , 2004, Comput. Commun. Rev..