Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2070562.2070563acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Information-centric networking: seeing the forest for the trees

Published: 14 November 2011 Publication History

Abstract

There have been many recent papers on data-oriented or content-centric network architectures. Despite the voluminous literature, surprisingly little clarity is emerging as most papers focus on what differentiates them from other proposals. We begin this paper by identifying the existing commonalities and important differences in these designs, and then discuss some remaining research issues. After our review, we emerge skeptical (but open-minded) about the value of this approach to networking.

References

[1]
B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman. A Survey of Information-Centric Networking, February 2011. http://drops.dagstuhl.de/opus/volltexte/2011/2941.
[2]
D. G. Andersen, J. Franklin, M. Kaminsky, A. Phanishayee, L. Tan, and V. Vasudevan. FAWN: A Fast Array of Wimpy Nodes. In Proc. of SOSP, 2009.
[3]
P. A. Aranda et al. Final Architectural Framework, June 2010. http://www.4ward-project.eu/.
[4]
S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker. On Preserving Privacy in Information-Centric Networks. In Proc of SIGCOMM Workshop on ICN, 2011.
[5]
B. Baccala. Data-oriented Networking. Internet draft, IETF, August 2002.
[6]
D. Beaver, S. Kumar, H. Li, J. Sobel, and P. Vajgel. Finding a Needle in Haystack: Facebook's Photo Storage. In Proc. of OSDI, 2010.
[7]
L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. Web Caching and Zipf-like Distributions: Evidence and Implications. In Proc. of INFOCOM, 1999.
[8]
W. K. Chai et al. Curling: Content-ubiquitous Resolution and Delivery Infrastructure for Next-generation Services. Communications Magazine, IEEE, 49(3), March 2011.
[9]
A. Chankhunthod, P. Danzig, C. Neerdaels, M. Schwartz, and K. Worrell. A Hierarchical Internet Object Cache. In Proc. of USENIX, 1996.
[10]
D. Clark, P. Faratin, P. Gilmore, S. Bauer, A. Berger, and W. Lehr. The Growing Complexity of Internet Interconnection. Communications & Strategies, 2008.
[11]
COntent Mediator architecture for content-aware nETworks (COMET). http://www.comet-project.org/.
[12]
P. T. Eugster, P. A. Felber, R. Guerraoui, and A.-M. Kermarrec. The Many Faces of Publish/Subscribe. ACM Computing Surveys, 35(2), June 2003.
[13]
L. Fan, P. Cao, J. Almeida, and A. Broder. Summary Cache: A Scalable Wide-area Web Cache Sharing Protocol. In Proc. of SIGCOMM, 1998.
[14]
A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker. Naming in Content-Oriented Architectures. In Proc of SIGCOMM Workshop on ICN, 2011.
[15]
M. Gritter and D. R. Cheriton. TRIAD: A New Next-Generation Internet Architecture. http://www-dsg.stanford.edu/triad/, July 2000.
[16]
K. P. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan. Measurement, Modeling, and Analysis of a Peer-to-peer File-sharing Workload. In Proc. of SOSP, 2003.
[17]
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking Named Content. In Proc. of CoNEXT, 2009.
[18]
P. Jokela, A. Zahemszky, C. Esteve Rothenberg, S. Arianfar, and P. Nikander. LIPSIN: Line Speed Publish/Subscribe Inter-Networking. In Proc. of SIGCOMM, 2009.
[19]
T. Koponen, M. Chawla. B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica. A Data-Oriented (and Beyond) Network Architecture. In Proc. of SIGCOMM, 2007.
[20]
D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating Key Management from File System Security. In Proc. of SOSP, 1999.
[21]
S. Michel, K. Nguyen, A. Rosenstein, L. Zhang, S. Floyd, and V. Jacobson. Adaptive Web Caching: Towards a New Global Caching Architecture. Computer Networks and ISDN Systems, 30(22--23), 1998.
[22]
L. Popa, A. Ghodsi, and I. Stoica. HTTP as the Narrow Waist of the Future Internet. In Proc. of HotNets, 2010.
[23]
M. Rabinovich, J. Chase, and S. Gadde. Not All Hits Are Created Equal: Cooperative Proxy Caching over a Wide-area Network. Computer Networks and ISDN Systems, 30(22--23), 1998.
[24]
Scalable and Adaptive Internet Solutions (SAIL). http://www.sail-project.eu/.
[25]
D. Skeen. Vitria's Publish-Subscribe Architecture: Publish-Subscribe Overview, 1998. http://www.vitria.com/.
[26]
D. Smetters and V. Jacobson. Securing Network Content. Technical report, PARC, October 2009.
[27]
Squid: Optimising Web Delivery. http://squid-cache.org/.
[28]
Tibco. Tibco Enterprise Message Service. http://tibco.com/.
[29]
D. Trossen et al. Conceptual Architecture: Principles, Patterns and Sub-components Descriptions, May 2011. http://www.fp7-pursuit.eu/PursuitWeb/.
[30]
M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In Proc. of NSDI, 2004.
[31]
D. Wendlandt, I. Avramopoulos, D. Andersen, and J. Rexford. Don't Secure Routing Protocols, Secure Data Delivery. In Proc. of HotNets, 2006.
[32]
A. Wolman, M. Voelker, N. Sharma, N. Cardwell, A. Karlin, and H. Levy. On the Scale and Performance of Cooperative Web Proxy Caching. In Proc. of SOSP, 1999.
[33]
L. Zhang et al. Named Data Networking (NDN) Project. October 2010. http://named-data.net/ndn-proj.pdf.

Cited By

View all
  • (2024)CBIDM: Controller Based Intelligent Detection and Mitigation Approach for Interest Flooding Attack in Named Data NetworkingSN Computer Science10.1007/s42979-024-03350-x5:8Online publication date: 1-Nov-2024
  • (2024)Enabling a Sustainable and Inclusive Digital Future with Proactive Producer Mobility Management Mechanism in Named Data NetworkingComputing and Informatics10.1007/978-981-99-9589-9_26(343-354)Online publication date: 26-Jan-2024
  • (2023)PoSiFWireless Communications & Mobile Computing10.1155/2023/83584382023Online publication date: 1-Jan-2023
  • Show More Cited By

Index Terms

  1. Information-centric networking: seeing the forest for the trees

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HotNets-X: Proceedings of the 10th ACM Workshop on Hot Topics in Networks
    November 2011
    148 pages
    ISBN:9781450310598
    DOI:10.1145/2070562
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 November 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. information-centric networking
    2. internet architecture

    Qualifiers

    • Research-article

    Conference

    HOTNETS-X
    Sponsor:
    HOTNETS-X: Tenth ACM Workshop on Hot Topics in Networks
    November 14 - 15, 2011
    Massachusetts, Cambridge

    Acceptance Rates

    Overall Acceptance Rate 110 of 460 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)38
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 28 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)CBIDM: Controller Based Intelligent Detection and Mitigation Approach for Interest Flooding Attack in Named Data NetworkingSN Computer Science10.1007/s42979-024-03350-x5:8Online publication date: 1-Nov-2024
    • (2024)Enabling a Sustainable and Inclusive Digital Future with Proactive Producer Mobility Management Mechanism in Named Data NetworkingComputing and Informatics10.1007/978-981-99-9589-9_26(343-354)Online publication date: 26-Jan-2024
    • (2023)PoSiFWireless Communications & Mobile Computing10.1155/2023/83584382023Online publication date: 1-Jan-2023
    • (2023)In-network caching in information-centric networks for different applications: A surveyCogent Engineering10.1080/23311916.2023.221000010:1Online publication date: 14-May-2023
    • (2023)Security Overall in Information‐Centric NetworksAttribute‐based Encryption (ABE)10.1002/9781119989387.ch12(195-214)Online publication date: 6-Oct-2023
    • (2022)A Scalable Bitwise Multicast Technology in Named Data NetworkingIEICE Transactions on Information and Systems10.1587/transinf.2022EDP7057E105.D:12(2104-2111)Online publication date: 1-Dec-2022
    • (2022)Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging SolutionsIEEE Transactions on Network and Service Management10.1109/TNSM.2021.309990219:1(538-553)Online publication date: Mar-2022
    • (2022)NCR-BN Cooperative Caching for ICN Based on Off-Path Cache2022 5th International Conference on Hot Information-Centric Networking (HotICN)10.1109/HotICN57539.2022.10036233(42-47)Online publication date: 24-Nov-2022
    • (2022)DSEA: A Traffic Control Method of Information Center Networking Based on Multi-objective Genetic AlgorithmsJournal of Network and Systems Management10.1007/s10922-022-09678-030:4Online publication date: 1-Oct-2022
    • (2021)The ties that un-bindProceedings of the 2021 ACM SIGCOMM 2021 Conference10.1145/3452296.3472922(433-446)Online publication date: 9-Aug-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media