Networking named content

Current network use is dominated by content distribution and retrieval yet current networking protocols are designed for conversations between hosts. Accessing content and services requires mapping from the what that users care about to the network's where. We present Content-Centric Networking (CCN) which uses content chunks as a primitive---decoupling location from identity, security and access, and retrieving chunks of content by name. Using new approaches to routing named content, derived from IP, CCN simultaneously achieves scalability, security, and performance. We describe our implementation of the architecture's basic features and demonstrate its performance and resilience with secure file downloads and VoIP calls.

[1]  Michael Walfish,et al.  A layered naming architecture for the internet , 2004, SIGCOMM '04.

[2]  Ralph C. Merkle,et al.  Secrecy, authentication, and public key systems , 1979 .

[3]  Paul Vixie,et al.  A DNS RR for specifying the location of services (DNS SRV) , 1996, RFC.

[4]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[5]  Mark Handley,et al.  Multicast Negative-Acknowledgment (NACK) Building Blocks , 2008, RFC.

[6]  Srinivasan Seshan,et al.  Packet caches on routers: the implications of universal redundant traffic elimination , 2008, SIGCOMM '08.

[7]  정희영,et al.  IETF에서의 빠른 핸드오프 기술 표준화 동향 , 2002 .

[8]  Martín Abadi,et al.  On SDSI's linked local name spaces , 1997, Proceedings 10th Computer Security Foundations Workshop.

[9]  Adrian Perrig,et al.  Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.

[10]  Andrew S. Tanenbaum,et al.  Securely replicated Web documents , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[11]  Daniel Massey,et al.  Security Through Publicity , 2006, HotSec.

[12]  David Mazières,et al.  Fast and secure distributed read-only file system , 2000, TOCS.

[13]  Van Jacobson,et al.  Congestion avoidance and control , 1988, SIGCOMM '88.

[14]  Scott Shenker,et al.  Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.

[15]  Scott Shenker,et al.  A data-oriented (and beyond) network architecture , 2007, SIGCOMM '07.

[16]  Jacques Stern,et al.  Almost Uniform Density of Power Residues and the Provable Security of ESIGN , 2003, ASIACRYPT.

[17]  Sasu Tarkoma,et al.  RTFM: Publish/Subscribe Internetworking Architecture , 2008 .

[18]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[19]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[20]  Diana K. Smetters,et al.  VoCCN: voice-over content-centric networks , 2009, ReArch '09.

[21]  Jennifer Rexford,et al.  Floodless in seattle: a scalable ethernet architecture for large enterprises , 2008, SIGCOMM '08.

[22]  R. Arief Setyawan Networking Named Content , 2013 .

[23]  Mats Näslund,et al.  The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.

[24]  Van Jacobson,et al.  TCP Extensions for High Performance , 1992, RFC.

[25]  Jeff Parker Recommendations for Interoperable IP Networks using Intermediate System to Intermediate System (IS-IS) , 2004, RFC.

[26]  Charles E. Perkins,et al.  Service Location Protocol , 1997, RFC.

[27]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[28]  Ion Stoica,et al.  ROFL: routing on flat labels , 2006, SIGCOMM '06.

[29]  David Mazières,et al.  Separating key management from file system security , 1999, SOSP.

[30]  V. Jacobson,et al.  Securing Network Content , 2009 .

[31]  Jean-Philippe Vasseur,et al.  Intermediate System to Intermediate System (IS-IS) Extensions for Advertising Router Information , 2007, RFC.

[32]  Stephen Farrell,et al.  Delay- and Disruption-Tolerant Networking , 2006, IEEE Internet Computing.