A data-oriented (and beyond) network architecture

The Internet has evolved greatly from its original incarnation. For instance, the vast majority of current Internet usage is data retrieval and service access, whereas the architecture was designed around host-to-host applications such as telnet and ftp. Moreover, the original Internet was a purely transparent carrier of packets, but now the various network stakeholders use middleboxes to improve security and accelerate applications. To adapt to these changes, we propose the Data-Oriented Network Architecture (DONA), which involves a clean-slate redesign of Internet naming and name resolution.

[1]  X.. Yang,et al.  NIRA: A New Inter-Domain Routing Architecture , 2007, IEEE/ACM Transactions on Networking.

[2]  Michael Walfish,et al.  A layered naming architecture for the internet , 2004, SIGCOMM 2004.

[3]  David Mazières,et al.  Separating key management from file system security , 1999, SOSP.

[4]  Roy T. Fielding,et al.  Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.

[5]  Jacques Stern,et al.  Almost Uniform Density of Power Residues and the Provable Security of ESIGN , 2003, ASIACRYPT.

[6]  Xiaowei Yang,et al.  Compact routing on Internet-like graphs , 2003, IEEE INFOCOM 2004.

[7]  Michael Walfish,et al.  Middleboxes No Longer Considered Harmful , 2004, OSDI.

[8]  Randall R. Stewart,et al.  Stream Control Transmission Protocol , 2000, RFC.

[9]  Antonio Gulli,et al.  The indexable web is more than 11.5 billion pages , 2005, WWW '05.

[10]  Michael Walfish,et al.  Distributed Quota Enforcement for Spam Control , 2006, NSDI.

[11]  David D. Clark,et al.  Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..

[12]  Ion Stoica,et al.  SAAR: A Shared Control Plane for Overlay Multicast , 2007, NSDI.

[13]  Jennifer Rexford,et al.  Don't Secure Routing Protocols, Secure Data Delivery , 2006, HotNets.

[14]  Saikat Guha,et al.  An end-middle-end approach to connection establishment , 2007, SIGCOMM 2007.

[15]  Dawn Xiaodong Song,et al.  SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[16]  David G. Andersen,et al.  An Architecture for Internet Data Transfer , 2006, NSDI.

[17]  David Mazières,et al.  OASIS: Anycast for Any Service , 2006, NSDI.

[18]  Michael Walfish,et al.  Untangling the Web from DNS , 2004, NSDI.

[19]  Hideyuki Tokuda,et al.  TCP-R: TCP mobility support for continuous operation , 1997, Proceedings 1997 International Conference on Network Protocols.

[20]  Vinton G. Cerf,et al.  Delay-Tolerant Networking Architecture , 2007, RFC.

[21]  Mark Handley,et al.  Steps towards a DoS-resistant internet architecture , 2004, FDNA '04.

[22]  Robert Tappan Morris,et al.  Persistent personal names for globally connected mobile devices , 2006, OSDI '06.

[23]  Mark Alexander Connell Snoeren A session-based architecture for Internet mobility , 2002 .

[24]  Anne-Marie Kermarrec,et al.  The many faces of publish/subscribe , 2003, CSUR.

[25]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[26]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[27]  Eyal de Lara,et al.  Haggle: Clean-slate networking for mobile devices , 2007 .

[28]  Dennis Shasha,et al.  Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.

[29]  Paul Francis,et al.  IPNL: A NAT-extended internet architecture , 2001, SIGCOMM 2001.

[30]  Scott Shenker,et al.  ROFL: routing on flat labels , 2006, SIGCOMM 2006.

[31]  David Clark,et al.  Architectural considerations for a new generation of protocols , 1990, SIGCOMM 1990.

[32]  Xiaowei Yang,et al.  A DoS-limiting network architecture , 2005, SIGCOMM '05.

[33]  Nick Feamster,et al.  Design and implementation of a routing control platform , 2005, NSDI.

[34]  Lixia Zhang,et al.  Report from the IAB Workshop on Routing and Addressing , 2007, RFC.